aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorJason Zaman <perfinion@gentoo.org>2022-09-03 12:25:21 -0700
committerJason Zaman <perfinion@gentoo.org>2022-09-03 12:25:21 -0700
commit7cd9bdfa316e15e20ac537746de9e17b1c740faa (patch)
tree6e38d848913cdcdb3e188fb81c6f83e5c5e4b975 /doc
parentMerge upstream (diff)
downloadhardened-refpolicy-7cd9bdfa316e15e20ac537746de9e17b1c740faa.tar.gz
hardened-refpolicy-7cd9bdfa316e15e20ac537746de9e17b1c740faa.tar.bz2
hardened-refpolicy-7cd9bdfa316e15e20ac537746de9e17b1c740faa.zip
Update generated policy and doc files
Signed-off-by: Jason Zaman <perfinion@gentoo.org>
Diffstat (limited to 'doc')
-rw-r--r--doc/policy.xml15408
1 files changed, 8142 insertions, 7266 deletions
diff --git a/doc/policy.xml b/doc/policy.xml
index 35687d71..6dd4831a 100644
--- a/doc/policy.xml
+++ b/doc/policy.xml
@@ -940,6 +940,70 @@ Role allowed access.
</param>
</interface>
</module>
+<module name="cloudinit" filename="policy/modules/admin/cloudinit.if">
+<summary>Init scripts for cloud VMs</summary>
+<interface name="cloudinit_create_runtime_dirs" lineno="13">
+<summary>
+Create cloud-init runtime directory.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="cloudinit_write_runtime_files" lineno="32">
+<summary>
+Write cloud-init runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="cloudinit_create_runtime_files" lineno="51">
+<summary>
+Create cloud-init runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="cloudinit_filetrans_runtime" lineno="81">
+<summary>
+Create files in /run with the type used for
+cloud-init runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object_class">
+<summary>
+The class of the object to be created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="cloudinit_getattr_state_files" lineno="99">
+<summary>
+Get the attribute of cloud-init state files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+</module>
<module name="consoletype" filename="policy/modules/admin/consoletype.if">
<summary>
Determine of the console connected to the controlling terminal.
@@ -954,7 +1018,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="consoletype_run" lineno="44">
+<interface name="consoletype_run" lineno="42">
<summary>
Execute consoletype in the consoletype domain, and
allow the specified role the consoletype domain.
@@ -970,7 +1034,7 @@ Role allowed access.
</summary>
</param>
</interface>
-<interface name="consoletype_exec" lineno="64">
+<interface name="consoletype_exec" lineno="62">
<summary>
Execute consoletype in the caller domain.
</summary>
@@ -2482,7 +2546,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="prelink_exec" lineno="37">
+<interface name="prelink_exec" lineno="35">
<summary>
Execute prelink in the caller domain.
</summary>
@@ -2492,7 +2556,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="prelink_run" lineno="64">
+<interface name="prelink_run" lineno="62">
<summary>
Execute prelink in the prelink
domain, and allow the specified role
@@ -2510,7 +2574,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="prelink_object_file" lineno="83">
+<interface name="prelink_object_file" lineno="81">
<summary>
Make the specified file type prelinkable.
</summary>
@@ -2520,7 +2584,7 @@ File type to be prelinked.
</summary>
</param>
</interface>
-<interface name="prelink_read_cache" lineno="101">
+<interface name="prelink_read_cache" lineno="99">
<summary>
Read prelink cache files.
</summary>
@@ -2530,7 +2594,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="prelink_delete_cache" lineno="120">
+<interface name="prelink_delete_cache" lineno="118">
<summary>
Delete prelink cache files.
</summary>
@@ -2540,7 +2604,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="prelink_manage_log" lineno="140">
+<interface name="prelink_manage_log" lineno="138">
<summary>
Create, read, write, and delete
prelink log files.
@@ -2551,7 +2615,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="prelink_manage_lib" lineno="160">
+<interface name="prelink_manage_lib" lineno="158">
<summary>
Create, read, write, and delete
prelink var_lib files.
@@ -2562,7 +2626,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="prelink_relabelfrom_lib" lineno="179">
+<interface name="prelink_relabelfrom_lib" lineno="177">
<summary>
Relabel from prelink lib files.
</summary>
@@ -2572,7 +2636,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="prelink_relabel_lib" lineno="198">
+<interface name="prelink_relabel_lib" lineno="196">
<summary>
Relabel prelink lib files.
</summary>
@@ -3753,7 +3817,7 @@ Role allowed access
</summary>
</param>
</template>
-<interface name="sudo_sigchld" lineno="215">
+<interface name="sudo_sigchld" lineno="220">
<summary>
Send a SIGCHLD signal to the sudo domain.
</summary>
@@ -4068,7 +4132,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="usermanage_run_chfn" lineno="42">
+<interface name="usermanage_run_chfn" lineno="40">
<summary>
Execute chfn in the chfn domain, and
allow the specified role the chfn domain.
@@ -4084,7 +4148,7 @@ Role allowed access.
</summary>
</param>
</interface>
-<interface name="usermanage_domtrans_groupadd" lineno="61">
+<interface name="usermanage_domtrans_groupadd" lineno="59">
<summary>
Execute groupadd in the groupadd domain.
</summary>
@@ -4094,7 +4158,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="usermanage_run_groupadd" lineno="91">
+<interface name="usermanage_run_groupadd" lineno="87">
<summary>
Execute groupadd in the groupadd domain, and
allow the specified role the groupadd domain.
@@ -4111,7 +4175,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="usermanage_domtrans_passwd" lineno="110">
+<interface name="usermanage_domtrans_passwd" lineno="106">
<summary>
Execute passwd in the passwd domain.
</summary>
@@ -4121,7 +4185,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="usermanage_kill_passwd" lineno="133">
+<interface name="usermanage_kill_passwd" lineno="127">
<summary>
Send sigkills to passwd.
</summary>
@@ -4131,7 +4195,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="usermanage_check_exec_passwd" lineno="151">
+<interface name="usermanage_check_exec_passwd" lineno="145">
<summary>
Check if the passwd binary is executable.
</summary>
@@ -4141,7 +4205,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="usermanage_run_passwd" lineno="175">
+<interface name="usermanage_run_passwd" lineno="169">
<summary>
Execute passwd in the passwd domain, and
allow the specified role the passwd domain.
@@ -4157,7 +4221,7 @@ Role allowed access.
</summary>
</param>
</interface>
-<interface name="usermanage_domtrans_admin_passwd" lineno="195">
+<interface name="usermanage_domtrans_admin_passwd" lineno="189">
<summary>
Execute password admin functions in
the admin passwd domain.
@@ -4168,7 +4232,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="usermanage_run_admin_passwd" lineno="222">
+<interface name="usermanage_run_admin_passwd" lineno="216">
<summary>
Execute passwd admin functions in the admin
passwd domain, and allow the specified role
@@ -4186,7 +4250,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="usermanage_dontaudit_use_useradd_fds" lineno="241">
+<interface name="usermanage_dontaudit_use_useradd_fds" lineno="235">
<summary>
Do not audit attempts to use useradd fds.
</summary>
@@ -4196,7 +4260,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="usermanage_domtrans_useradd" lineno="259">
+<interface name="usermanage_domtrans_useradd" lineno="253">
<summary>
Execute useradd in the useradd domain.
</summary>
@@ -4206,7 +4270,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="usermanage_check_exec_useradd" lineno="282">
+<interface name="usermanage_check_exec_useradd" lineno="274">
<summary>
Check if the useradd binaries are executable.
</summary>
@@ -4216,7 +4280,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="usermanage_run_useradd" lineno="307">
+<interface name="usermanage_run_useradd" lineno="299">
<summary>
Execute useradd in the useradd domain, and
allow the specified role the useradd domain.
@@ -4233,7 +4297,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="usermanage_read_crack_db" lineno="326">
+<interface name="usermanage_read_crack_db" lineno="318">
<summary>
Read the crack database.
</summary>
@@ -7667,7 +7731,7 @@ Role allowed access.
</summary>
</param>
</interface>
-<interface name="seunshare_role" lineno="69">
+<interface name="seunshare_role" lineno="67">
<summary>
Role access for seunshare
</summary>
@@ -9868,7 +9932,17 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corecmd_getattr_bin_files" lineno="155">
+<interface name="corecmd_watch_bin_dirs" lineno="155">
+<summary>
+Watch bin directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corecmd_getattr_bin_files" lineno="173">
<summary>
Get the attributes of files in bin directories.
</summary>
@@ -9878,7 +9952,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_dontaudit_getattr_bin_files" lineno="174">
+<interface name="corecmd_dontaudit_getattr_bin_files" lineno="192">
<summary>
Do not audit attempts to get the attributes of files in bin directories.
</summary>
@@ -9888,7 +9962,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corecmd_check_exec_bin_files" lineno="193">
+<interface name="corecmd_check_exec_bin_files" lineno="211">
<summary>
Check if files in bin directories are executable (DAC-wise)
</summary>
@@ -9898,7 +9972,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_read_bin_files" lineno="212">
+<interface name="corecmd_read_bin_files" lineno="230">
<summary>
Read files in bin directories.
</summary>
@@ -9908,7 +9982,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_dontaudit_write_bin_files" lineno="231">
+<interface name="corecmd_dontaudit_write_bin_files" lineno="249">
<summary>
Do not audit attempts to write bin files.
</summary>
@@ -9918,7 +9992,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corecmd_read_bin_pipes" lineno="249">
+<interface name="corecmd_read_bin_pipes" lineno="267">
<summary>
Read pipes in bin directories.
</summary>
@@ -9928,7 +10002,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_read_bin_sockets" lineno="268">
+<interface name="corecmd_read_bin_sockets" lineno="286">
<summary>
Read named sockets in bin directories.
</summary>
@@ -9938,7 +10012,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_exec_bin" lineno="308">
+<interface name="corecmd_exec_bin" lineno="326">
<summary>
Execute generic programs in bin directories,
in the caller domain.
@@ -9969,7 +10043,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_manage_bin_files" lineno="327">
+<interface name="corecmd_manage_bin_files" lineno="345">
<summary>
Create, read, write, and delete bin files.
</summary>
@@ -9979,7 +10053,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_manage_bin_symlinks" lineno="346">
+<interface name="corecmd_manage_bin_symlinks" lineno="364">
<summary>
Manage symlinks for bin files.
</summary>
@@ -9989,7 +10063,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_relabel_bin_files" lineno="365">
+<interface name="corecmd_relabel_bin_files" lineno="383">
<summary>
Relabel to and from the bin type.
</summary>
@@ -9999,7 +10073,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_mmap_bin_files" lineno="384">
+<interface name="corecmd_mmap_bin_files" lineno="402">
<summary>
Mmap a bin file as executable.
</summary>
@@ -10009,7 +10083,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_bin_spec_domtrans" lineno="429">
+<interface name="corecmd_bin_spec_domtrans" lineno="447">
<summary>
Execute a file in a bin directory
in the specified domain but do not
@@ -10045,7 +10119,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="corecmd_bin_domtrans" lineno="472">
+<interface name="corecmd_bin_domtrans" lineno="490">
<summary>
Execute a file in a bin directory
in the specified domain.
@@ -10079,7 +10153,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="corecmd_check_exec_shell" lineno="491">
+<interface name="corecmd_check_exec_shell" lineno="509">
<summary>
Check if a shell is executable (DAC-wise).
</summary>
@@ -10089,7 +10163,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_exec_shell" lineno="528">
+<interface name="corecmd_exec_shell" lineno="546">
<summary>
Execute shells in the caller domain.
</summary>
@@ -10117,7 +10191,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_shell_spec_domtrans" lineno="566">
+<interface name="corecmd_shell_spec_domtrans" lineno="584">
<summary>
Execute a shell in the target domain. This
is an explicit transition, requiring the
@@ -10146,7 +10220,7 @@ The type of the shell process.
</summary>
</param>
</interface>
-<interface name="corecmd_shell_domtrans" lineno="600">
+<interface name="corecmd_shell_domtrans" lineno="618">
<summary>
Execute a shell in the specified domain.
</summary>
@@ -10171,7 +10245,7 @@ The type of the shell process.
</summary>
</param>
</interface>
-<interface name="corecmd_exec_chroot" lineno="619">
+<interface name="corecmd_exec_chroot" lineno="637">
<summary>
Execute chroot in the caller domain.
</summary>
@@ -10181,7 +10255,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_getattr_all_executables" lineno="640">
+<interface name="corecmd_getattr_all_executables" lineno="658">
<summary>
Get the attributes of all executable files.
</summary>
@@ -10192,7 +10266,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_read_all_executables" lineno="661">
+<interface name="corecmd_read_all_executables" lineno="679">
<summary>
Read all executable files.
</summary>
@@ -10203,7 +10277,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_exec_all_executables" lineno="681">
+<interface name="corecmd_exec_all_executables" lineno="699">
<summary>
Execute all executable files.
</summary>
@@ -10214,7 +10288,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_dontaudit_exec_all_executables" lineno="702">
+<interface name="corecmd_dontaudit_exec_all_executables" lineno="720">
<summary>
Do not audit attempts to execute all executables.
</summary>
@@ -10224,7 +10298,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corecmd_manage_all_executables" lineno="721">
+<interface name="corecmd_manage_all_executables" lineno="739">
<summary>
Create, read, write, and all executable files.
</summary>
@@ -10235,7 +10309,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_relabel_all_executables" lineno="743">
+<interface name="corecmd_relabel_all_executables" lineno="761">
<summary>
Relabel to and from the bin type.
</summary>
@@ -10246,7 +10320,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_mmap_all_executables" lineno="763">
+<interface name="corecmd_mmap_all_executables" lineno="781">
<summary>
Mmap all executables as executable.
</summary>
@@ -10256,7 +10330,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_relabel_bin_dirs" lineno="785">
+<interface name="corecmd_relabel_bin_dirs" lineno="803">
<summary>
Relabel to and from the bin type.
</summary>
@@ -10266,7 +10340,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_relabel_bin_lnk_files" lineno="803">
+<interface name="corecmd_relabel_bin_lnk_files" lineno="821">
<summary>
Relabel to and from the bin type.
</summary>
@@ -10893,7 +10967,17 @@ Domain allowed access.
</param>
<infoflow type="read" weight="1"/>
</interface>
-<interface name="corenet_udp_bind_generic_node" lineno="942">
+<interface name="corenet_dontaudit_tcp_bind_generic_node" lineno="927">
+<summary>
+Do not audit denials on binding TCP sockets to generic nodes.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="corenet_udp_bind_generic_node" lineno="960">
<summary>
Bind UDP sockets to generic nodes.
</summary>
@@ -10918,7 +11002,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="1"/>
</interface>
-<interface name="corenet_raw_bind_generic_node" lineno="961">
+<interface name="corenet_raw_bind_generic_node" lineno="979">
<summary>
Bind raw sockets to generic nodes.
</summary>
@@ -10928,7 +11012,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_out_generic_node" lineno="980">
+<interface name="corenet_out_generic_node" lineno="998">
<summary>
Allow outgoing network traffic to generic nodes.
</summary>
@@ -10939,7 +11023,7 @@ The peer label of the outgoing network traffic.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_in_generic_node" lineno="999">
+<interface name="corenet_in_generic_node" lineno="1017">
<summary>
Allow incoming network traffic from generic nodes.
</summary>
@@ -10950,7 +11034,7 @@ The peer label of the incoming network traffic.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_inout_generic_node" lineno="1018">
+<interface name="corenet_inout_generic_node" lineno="1036">
<summary>
Allow incoming and outgoing network traffic with generic nodes.
</summary>
@@ -10961,7 +11045,7 @@ The peer label of the network traffic.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_tcp_sendrecv_all_nodes" lineno="1033">
+<interface name="corenet_tcp_sendrecv_all_nodes" lineno="1051">
<summary>
Send and receive TCP network traffic on all nodes.
</summary>
@@ -10971,7 +11055,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_send_all_nodes" lineno="1051">
+<interface name="corenet_udp_send_all_nodes" lineno="1069">
<summary>
Send UDP network traffic on all nodes.
</summary>
@@ -10981,7 +11065,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_udp_send_all_nodes" lineno="1070">
+<interface name="corenet_dontaudit_udp_send_all_nodes" lineno="1088">
<summary>
Do not audit attempts to send UDP network
traffic on any nodes.
@@ -10992,7 +11076,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_sendrecv_all_nodes" lineno="1088">
+<interface name="corenet_sctp_sendrecv_all_nodes" lineno="1106">
<summary>
Send and receive SCTP network traffic on all nodes.
</summary>
@@ -11002,7 +11086,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_receive_all_nodes" lineno="1106">
+<interface name="corenet_udp_receive_all_nodes" lineno="1124">
<summary>
Receive UDP network traffic on all nodes.
</summary>
@@ -11012,7 +11096,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_udp_receive_all_nodes" lineno="1125">
+<interface name="corenet_dontaudit_udp_receive_all_nodes" lineno="1143">
<summary>
Do not audit attempts to receive UDP
network traffic on all nodes.
@@ -11023,7 +11107,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_udp_sendrecv_all_nodes" lineno="1143">
+<interface name="corenet_udp_sendrecv_all_nodes" lineno="1161">
<summary>
Send and receive UDP network traffic on all nodes.
</summary>
@@ -11033,7 +11117,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_all_nodes" lineno="1159">
+<interface name="corenet_dontaudit_udp_sendrecv_all_nodes" lineno="1177">
<summary>
Do not audit attempts to send and receive UDP
network traffic on any nodes nodes.
@@ -11044,7 +11128,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_raw_send_all_nodes" lineno="1174">
+<interface name="corenet_raw_send_all_nodes" lineno="1192">
<summary>
Send raw IP packets on all nodes.
</summary>
@@ -11054,7 +11138,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_raw_receive_all_nodes" lineno="1192">
+<interface name="corenet_raw_receive_all_nodes" lineno="1210">
<summary>
Receive raw IP packets on all nodes.
</summary>
@@ -11064,7 +11148,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_raw_sendrecv_all_nodes" lineno="1210">
+<interface name="corenet_raw_sendrecv_all_nodes" lineno="1228">
<summary>
Send and receive raw IP packets on all nodes.
</summary>
@@ -11074,7 +11158,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_bind_all_nodes" lineno="1225">
+<interface name="corenet_tcp_bind_all_nodes" lineno="1243">
<summary>
Bind TCP sockets to all nodes.
</summary>
@@ -11084,7 +11168,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_bind_all_nodes" lineno="1243">
+<interface name="corenet_udp_bind_all_nodes" lineno="1261">
<summary>
Bind UDP sockets to all nodes.
</summary>
@@ -11094,7 +11178,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_raw_bind_all_nodes" lineno="1262">
+<interface name="corenet_raw_bind_all_nodes" lineno="1280">
<summary>
Bind raw sockets to all nodes.
</summary>
@@ -11104,7 +11188,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_generic_port" lineno="1280">
+<interface name="corenet_tcp_sendrecv_generic_port" lineno="1298">
<summary>
Send and receive TCP network traffic on generic ports.
</summary>
@@ -11114,7 +11198,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_bind_all_nodes" lineno="1294">
+<interface name="corenet_sctp_bind_all_nodes" lineno="1312">
<summary>
Bind SCTP sockets to all nodes.
</summary>
@@ -11124,7 +11208,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_sendrecv_generic_port" lineno="1313">
+<interface name="corenet_dontaudit_tcp_sendrecv_generic_port" lineno="1331">
<summary>
Do not audit send and receive TCP network traffic on generic ports.
</summary>
@@ -11134,7 +11218,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_send_generic_port" lineno="1327">
+<interface name="corenet_udp_send_generic_port" lineno="1345">
<summary>
Send UDP network traffic on generic ports.
</summary>
@@ -11144,7 +11228,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_receive_generic_port" lineno="1341">
+<interface name="corenet_udp_receive_generic_port" lineno="1359">
<summary>
Receive UDP network traffic on generic ports.
</summary>
@@ -11154,7 +11238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_sendrecv_generic_port" lineno="1355">
+<interface name="corenet_udp_sendrecv_generic_port" lineno="1373">
<summary>
Send and receive UDP network traffic on generic ports.
</summary>
@@ -11164,7 +11248,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_bind_generic_port" lineno="1369">
+<interface name="corenet_tcp_bind_generic_port" lineno="1387">
<summary>
Bind TCP sockets to generic ports.
</summary>
@@ -11174,7 +11258,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_bind_generic_port" lineno="1389">
+<interface name="corenet_dontaudit_tcp_bind_generic_port" lineno="1407">
<summary>
Do not audit bind TCP sockets to generic ports.
</summary>
@@ -11184,7 +11268,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_udp_bind_generic_port" lineno="1407">
+<interface name="corenet_udp_bind_generic_port" lineno="1425">
<summary>
Bind UDP sockets to generic ports.
</summary>
@@ -11194,7 +11278,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_connect_generic_port" lineno="1427">
+<interface name="corenet_tcp_connect_generic_port" lineno="1445">
<summary>
Connect TCP sockets to generic ports.
</summary>
@@ -11204,7 +11288,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_all_ports" lineno="1471">
+<interface name="corenet_tcp_sendrecv_all_ports" lineno="1489">
<summary>
Send and receive TCP network traffic on all ports.
</summary>
@@ -11240,7 +11324,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_all_ports" lineno="1485">
+<interface name="corenet_udp_send_all_ports" lineno="1503">
<summary>
Send UDP network traffic on all ports.
</summary>
@@ -11250,7 +11334,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_bind_generic_port" lineno="1499">
+<interface name="corenet_sctp_bind_generic_port" lineno="1517">
<summary>
Bind SCTP sockets to generic ports.
</summary>
@@ -11260,7 +11344,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_receive_all_ports" lineno="1519">
+<interface name="corenet_udp_receive_all_ports" lineno="1537">
<summary>
Receive UDP network traffic on all ports.
</summary>
@@ -11270,7 +11354,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_sendrecv_all_ports" lineno="1557">
+<interface name="corenet_udp_sendrecv_all_ports" lineno="1575">
<summary>
Send and receive UDP network traffic on all ports.
</summary>
@@ -11304,7 +11388,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sctp_bind_generic_port" lineno="1572">
+<interface name="corenet_dontaudit_sctp_bind_generic_port" lineno="1590">
<summary>
Do not audit attempts to bind SCTP
sockets to generic ports.
@@ -11315,7 +11399,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_bind_all_ports" lineno="1590">
+<interface name="corenet_tcp_bind_all_ports" lineno="1608">
<summary>
Bind TCP sockets to all ports.
</summary>
@@ -11325,7 +11409,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_bind_all_ports" lineno="1609">
+<interface name="corenet_dontaudit_tcp_bind_all_ports" lineno="1627">
<summary>
Do not audit attepts to bind TCP sockets to any ports.
</summary>
@@ -11335,7 +11419,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_udp_bind_all_ports" lineno="1627">
+<interface name="corenet_udp_bind_all_ports" lineno="1645">
<summary>
Bind UDP sockets to all ports.
</summary>
@@ -11345,7 +11429,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_connect_generic_port" lineno="1646">
+<interface name="corenet_sctp_connect_generic_port" lineno="1664">
<summary>
Connect SCTP sockets to generic ports.
</summary>
@@ -11355,7 +11439,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_udp_bind_all_ports" lineno="1664">
+<interface name="corenet_dontaudit_udp_bind_all_ports" lineno="1682">
<summary>
Do not audit attepts to bind UDP sockets to any ports.
</summary>
@@ -11365,7 +11449,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_connect_all_ports" lineno="1710">
+<interface name="corenet_tcp_connect_all_ports" lineno="1728">
<summary>
Connect TCP sockets to all ports.
</summary>
@@ -11403,7 +11487,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="1"/>
</interface>
-<interface name="corenet_dontaudit_tcp_connect_all_ports" lineno="1729">
+<interface name="corenet_dontaudit_tcp_connect_all_ports" lineno="1747">
<summary>
Do not audit attempts to connect TCP sockets
to all ports.
@@ -11414,7 +11498,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_reserved_port" lineno="1747">
+<interface name="corenet_tcp_sendrecv_reserved_port" lineno="1765">
<summary>
Send and receive TCP network traffic on generic reserved ports.
</summary>
@@ -11424,7 +11508,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_send_reserved_port" lineno="1761">
+<interface name="corenet_udp_send_reserved_port" lineno="1779">
<summary>
Send UDP network traffic on generic reserved ports.
</summary>
@@ -11434,7 +11518,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_receive_reserved_port" lineno="1775">
+<interface name="corenet_udp_receive_reserved_port" lineno="1793">
<summary>
Receive UDP network traffic on generic reserved ports.
</summary>
@@ -11444,7 +11528,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_sendrecv_reserved_port" lineno="1789">
+<interface name="corenet_udp_sendrecv_reserved_port" lineno="1807">
<summary>
Send and receive UDP network traffic on generic reserved ports.
</summary>
@@ -11454,7 +11538,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_bind_reserved_port" lineno="1803">
+<interface name="corenet_tcp_bind_reserved_port" lineno="1821">
<summary>
Bind TCP sockets to generic reserved ports.
</summary>
@@ -11464,7 +11548,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_bind_all_ports" lineno="1822">
+<interface name="corenet_sctp_bind_all_ports" lineno="1840">
<summary>
Bind SCTP sockets to all ports.
</summary>
@@ -11474,7 +11558,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_bind_reserved_port" lineno="1841">
+<interface name="corenet_udp_bind_reserved_port" lineno="1859">
<summary>
Bind UDP sockets to generic reserved ports.
</summary>
@@ -11484,7 +11568,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_connect_reserved_port" lineno="1860">
+<interface name="corenet_tcp_connect_reserved_port" lineno="1878">
<summary>
Connect TCP sockets to generic reserved ports.
</summary>
@@ -11494,7 +11578,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_sctp_bind_all_ports" lineno="1878">
+<interface name="corenet_dontaudit_sctp_bind_all_ports" lineno="1896">
<summary>
Do not audit attempts to bind SCTP sockets to any ports.
</summary>
@@ -11504,7 +11588,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_all_reserved_ports" lineno="1896">
+<interface name="corenet_tcp_sendrecv_all_reserved_ports" lineno="1914">
<summary>
Send and receive TCP network traffic on all reserved ports.
</summary>
@@ -11514,7 +11598,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_send_all_reserved_ports" lineno="1910">
+<interface name="corenet_udp_send_all_reserved_ports" lineno="1928">
<summary>
Send UDP network traffic on all reserved ports.
</summary>
@@ -11524,7 +11608,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_receive_all_reserved_ports" lineno="1924">
+<interface name="corenet_udp_receive_all_reserved_ports" lineno="1942">
<summary>
Receive UDP network traffic on all reserved ports.
</summary>
@@ -11534,7 +11618,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_sendrecv_all_reserved_ports" lineno="1938">
+<interface name="corenet_udp_sendrecv_all_reserved_ports" lineno="1956">
<summary>
Send and receive UDP network traffic on all reserved ports.
</summary>
@@ -11544,7 +11628,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_connect_all_ports" lineno="1952">
+<interface name="corenet_sctp_connect_all_ports" lineno="1970">
<summary>
Connect SCTP sockets to all ports.
</summary>
@@ -11554,7 +11638,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_bind_all_reserved_ports" lineno="1970">
+<interface name="corenet_tcp_bind_all_reserved_ports" lineno="1988">
<summary>
Bind TCP sockets to all reserved ports.
</summary>
@@ -11564,7 +11648,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_bind_all_reserved_ports" lineno="1989">
+<interface name="corenet_dontaudit_tcp_bind_all_reserved_ports" lineno="2007">
<summary>
Do not audit attempts to bind TCP sockets to all reserved ports.
</summary>
@@ -11574,7 +11658,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_udp_bind_all_reserved_ports" lineno="2007">
+<interface name="corenet_udp_bind_all_reserved_ports" lineno="2025">
<summary>
Bind UDP sockets to all reserved ports.
</summary>
@@ -11584,7 +11668,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_udp_bind_all_reserved_ports" lineno="2026">
+<interface name="corenet_dontaudit_udp_bind_all_reserved_ports" lineno="2044">
<summary>
Do not audit attempts to bind UDP sockets to all reserved ports.
</summary>
@@ -11594,7 +11678,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_sctp_connect_all_ports" lineno="2045">
+<interface name="corenet_dontaudit_sctp_connect_all_ports" lineno="2063">
<summary>
Do not audit attempts to connect SCTP sockets
to all ports.
@@ -11605,7 +11689,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_bind_all_unreserved_ports" lineno="2063">
+<interface name="corenet_tcp_bind_all_unreserved_ports" lineno="2081">
<summary>
Bind TCP sockets to all ports > 1024.
</summary>
@@ -11615,7 +11699,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_bind_all_unreserved_ports" lineno="2081">
+<interface name="corenet_udp_bind_all_unreserved_ports" lineno="2099">
<summary>
Bind UDP sockets to all ports > 1024.
</summary>
@@ -11625,7 +11709,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_connect_all_reserved_ports" lineno="2099">
+<interface name="corenet_tcp_connect_all_reserved_ports" lineno="2117">
<summary>
Connect TCP sockets to reserved ports.
</summary>
@@ -11635,7 +11719,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_connect_all_unreserved_ports" lineno="2117">
+<interface name="corenet_sctp_connect_all_unreserved_ports" lineno="2135">
<summary>
Connect SCTP sockets to all ports > 1024.
</summary>
@@ -11645,7 +11729,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_connect_all_unreserved_ports" lineno="2136">
+<interface name="corenet_dontaudit_tcp_connect_all_unreserved_ports" lineno="2154">
<summary>
Do not audit connect attempts to TCP sockets on
ports greater than 1024.
@@ -11656,7 +11740,7 @@ Domain not to audit access to.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_connect_all_unreserved_ports" lineno="2154">
+<interface name="corenet_tcp_connect_all_unreserved_ports" lineno="2172">
<summary>
Connect TCP sockets to all ports > 1024.
</summary>
@@ -11666,7 +11750,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_connect_all_reserved_ports" lineno="2173">
+<interface name="corenet_dontaudit_tcp_connect_all_reserved_ports" lineno="2191">
<summary>
Do not audit attempts to connect TCP sockets
all reserved ports.
@@ -11677,7 +11761,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_connect_all_rpc_ports" lineno="2191">
+<interface name="corenet_tcp_connect_all_rpc_ports" lineno="2209">
<summary>
Connect TCP sockets to rpc ports.
</summary>
@@ -11687,7 +11771,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_connect_all_rpc_ports" lineno="2210">
+<interface name="corenet_dontaudit_tcp_connect_all_rpc_ports" lineno="2228">
<summary>
Do not audit attempts to connect TCP sockets
all rpc ports.
@@ -11698,7 +11782,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_bind_reserved_port" lineno="2228">
+<interface name="corenet_sctp_bind_reserved_port" lineno="2246">
<summary>
Bind SCTP sockets to generic reserved ports.
</summary>
@@ -11708,7 +11792,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_read_tun_tap_dev" lineno="2247">
+<interface name="corenet_read_tun_tap_dev" lineno="2265">
<summary>
Read the TUN/TAP virtual network device.
</summary>
@@ -11718,7 +11802,7 @@ The domain read allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_write_tun_tap_dev" lineno="2266">
+<interface name="corenet_write_tun_tap_dev" lineno="2284">
<summary>
Write the TUN/TAP virtual network device.
</summary>
@@ -11728,7 +11812,7 @@ The domain allowed write access.
</summary>
</param>
</interface>
-<interface name="corenet_rw_tun_tap_dev" lineno="2285">
+<interface name="corenet_rw_tun_tap_dev" lineno="2303">
<summary>
Read and write the TUN/TAP virtual network device.
</summary>
@@ -11738,7 +11822,7 @@ The domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_connect_reserved_port" lineno="2304">
+<interface name="corenet_sctp_connect_reserved_port" lineno="2322">
<summary>
Connect SCTP sockets to generic reserved ports.
</summary>
@@ -11748,7 +11832,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_rw_tun_tap_dev" lineno="2323">
+<interface name="corenet_dontaudit_rw_tun_tap_dev" lineno="2341">
<summary>
Do not audit attempts to read or write the TUN/TAP
virtual network device.
@@ -11759,7 +11843,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_getattr_ppp_dev" lineno="2341">
+<interface name="corenet_getattr_ppp_dev" lineno="2359">
<summary>
Getattr the point-to-point device.
</summary>
@@ -11769,7 +11853,7 @@ The domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_rw_ppp_dev" lineno="2359">
+<interface name="corenet_rw_ppp_dev" lineno="2377">
<summary>
Read and write the point-to-point device.
</summary>
@@ -11779,7 +11863,7 @@ The domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_bind_all_rpc_ports" lineno="2378">
+<interface name="corenet_tcp_bind_all_rpc_ports" lineno="2396">
<summary>
Bind TCP sockets to all RPC ports.
</summary>
@@ -11789,7 +11873,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_bind_all_rpc_ports" lineno="2397">
+<interface name="corenet_dontaudit_tcp_bind_all_rpc_ports" lineno="2415">
<summary>
Do not audit attempts to bind TCP sockets to all RPC ports.
</summary>
@@ -11799,7 +11883,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_udp_bind_all_rpc_ports" lineno="2415">
+<interface name="corenet_udp_bind_all_rpc_ports" lineno="2433">
<summary>
Bind UDP sockets to all RPC ports.
</summary>
@@ -11809,7 +11893,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_udp_bind_all_rpc_ports" lineno="2434">
+<interface name="corenet_dontaudit_udp_bind_all_rpc_ports" lineno="2452">
<summary>
Do not audit attempts to bind UDP sockets to all RPC ports.
</summary>
@@ -11819,7 +11903,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_bind_all_reserved_ports" lineno="2452">
+<interface name="corenet_sctp_bind_all_reserved_ports" lineno="2470">
<summary>
Bind SCTP sockets to all reserved ports.
</summary>
@@ -11829,7 +11913,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_recvfrom_netlabel" lineno="2471">
+<interface name="corenet_tcp_recvfrom_netlabel" lineno="2489">
<summary>
Receive TCP packets from a NetLabel connection.
</summary>
@@ -11839,7 +11923,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_recvfrom_unlabeled" lineno="2490">
+<interface name="corenet_tcp_recvfrom_unlabeled" lineno="2508">
<summary>
Receive TCP packets from an unlabled connection.
</summary>
@@ -11849,7 +11933,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_sctp_bind_all_reserved_ports" lineno="2510">
+<interface name="corenet_dontaudit_sctp_bind_all_reserved_ports" lineno="2528">
<summary>
Do not audit attempts to bind SCTP sockets to all reserved ports.
</summary>
@@ -11859,7 +11943,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_recvfrom_netlabel" lineno="2529">
+<interface name="corenet_dontaudit_tcp_recvfrom_netlabel" lineno="2547">
<summary>
Do not audit attempts to receive TCP packets from a NetLabel
connection.
@@ -11870,7 +11954,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_recvfrom_unlabeled" lineno="2549">
+<interface name="corenet_dontaudit_tcp_recvfrom_unlabeled" lineno="2567">
<summary>
Do not audit attempts to receive TCP packets from an unlabeled
connection.
@@ -11881,7 +11965,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_udp_recvfrom_netlabel" lineno="2569">
+<interface name="corenet_udp_recvfrom_netlabel" lineno="2587">
<summary>
Receive UDP packets from a NetLabel connection.
</summary>
@@ -11891,7 +11975,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_recvfrom_unlabeled" lineno="2588">
+<interface name="corenet_udp_recvfrom_unlabeled" lineno="2606">
<summary>
Receive UDP packets from an unlabeled connection.
</summary>
@@ -11901,7 +11985,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_bind_all_unreserved_ports" lineno="2608">
+<interface name="corenet_sctp_bind_all_unreserved_ports" lineno="2626">
<summary>
Bind SCTP sockets to all ports > 1024.
</summary>
@@ -11911,7 +11995,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_udp_recvfrom_netlabel" lineno="2627">
+<interface name="corenet_dontaudit_udp_recvfrom_netlabel" lineno="2645">
<summary>
Do not audit attempts to receive UDP packets from a NetLabel
connection.
@@ -11922,7 +12006,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_udp_recvfrom_unlabeled" lineno="2647">
+<interface name="corenet_dontaudit_udp_recvfrom_unlabeled" lineno="2665">
<summary>
Do not audit attempts to receive UDP packets from an unlabeled
connection.
@@ -11933,7 +12017,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_raw_recvfrom_netlabel" lineno="2667">
+<interface name="corenet_raw_recvfrom_netlabel" lineno="2685">
<summary>
Receive Raw IP packets from a NetLabel connection.
</summary>
@@ -11943,7 +12027,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_raw_recvfrom_unlabeled" lineno="2686">
+<interface name="corenet_raw_recvfrom_unlabeled" lineno="2704">
<summary>
Receive Raw IP packets from an unlabeled connection.
</summary>
@@ -11953,7 +12037,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_raw_recvfrom_netlabel" lineno="2707">
+<interface name="corenet_dontaudit_raw_recvfrom_netlabel" lineno="2725">
<summary>
Do not audit attempts to receive Raw IP packets from a NetLabel
connection.
@@ -11964,7 +12048,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_connect_all_reserved_ports" lineno="2726">
+<interface name="corenet_sctp_connect_all_reserved_ports" lineno="2744">
<summary>
Connect SCTP sockets to reserved ports.
</summary>
@@ -11974,7 +12058,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_raw_recvfrom_unlabeled" lineno="2745">
+<interface name="corenet_dontaudit_raw_recvfrom_unlabeled" lineno="2763">
<summary>
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
@@ -11985,7 +12069,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_all_recvfrom_unlabeled" lineno="2777">
+<interface name="corenet_all_recvfrom_unlabeled" lineno="2795">
<summary>
Receive packets from an unlabeled connection.
</summary>
@@ -12007,7 +12091,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_all_recvfrom_netlabel" lineno="2810">
+<interface name="corenet_all_recvfrom_netlabel" lineno="2828">
<summary>
Receive packets from a NetLabel connection.
</summary>
@@ -12028,7 +12112,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_all_recvfrom_unlabeled" lineno="2829">
+<interface name="corenet_dontaudit_all_recvfrom_unlabeled" lineno="2847">
<summary>
Do not audit attempts to receive packets from an unlabeled connection.
</summary>
@@ -12038,7 +12122,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_sctp_connect_all_reserved_ports" lineno="2852">
+<interface name="corenet_dontaudit_sctp_connect_all_reserved_ports" lineno="2870">
<summary>
Do not audit attempts to connect SCTP sockets
all reserved ports.
@@ -12049,7 +12133,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_all_recvfrom_netlabel" lineno="2871">
+<interface name="corenet_dontaudit_all_recvfrom_netlabel" lineno="2889">
<summary>
Do not audit attempts to receive packets from a NetLabel
connection.
@@ -12060,7 +12144,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_recvfrom_labeled" lineno="2903">
+<interface name="corenet_tcp_recvfrom_labeled" lineno="2921">
<summary>
Rules for receiving labeled TCP packets.
</summary>
@@ -12083,7 +12167,7 @@ Peer domain.
</summary>
</param>
</interface>
-<interface name="corenet_udp_recvfrom_labeled" lineno="2931">
+<interface name="corenet_udp_recvfrom_labeled" lineno="2949">
<summary>
Rules for receiving labeled UDP packets.
</summary>
@@ -12098,7 +12182,7 @@ Peer domain.
</summary>
</param>
</interface>
-<interface name="corenet_raw_recvfrom_labeled" lineno="2956">
+<interface name="corenet_raw_recvfrom_labeled" lineno="2974">
<summary>
Rules for receiving labeled raw IP packets.
</summary>
@@ -12113,7 +12197,7 @@ Peer domain.
</summary>
</param>
</interface>
-<interface name="corenet_all_recvfrom_labeled" lineno="2990">
+<interface name="corenet_all_recvfrom_labeled" lineno="3008">
<summary>
Rules for receiving labeled packets via TCP, UDP and raw IP.
</summary>
@@ -12137,7 +12221,7 @@ Peer domain.
</summary>
</param>
</interface>
-<interface name="corenet_setcontext_all_spds" lineno="3008">
+<interface name="corenet_setcontext_all_spds" lineno="3026">
<summary>
Allow specified type to set the context of
a SPD entry for labeled ipsec associations.
@@ -12148,7 +12232,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_generic_client_packets" lineno="3026">
+<interface name="corenet_send_generic_client_packets" lineno="3044">
<summary>
Send generic client packets.
</summary>
@@ -12158,7 +12242,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_receive_generic_client_packets" lineno="3044">
+<interface name="corenet_receive_generic_client_packets" lineno="3062">
<summary>
Receive generic client packets.
</summary>
@@ -12168,7 +12252,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sendrecv_generic_client_packets" lineno="3062">
+<interface name="corenet_sendrecv_generic_client_packets" lineno="3080">
<summary>
Send and receive generic client packets.
</summary>
@@ -12178,7 +12262,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_relabelto_generic_client_packets" lineno="3077">
+<interface name="corenet_relabelto_generic_client_packets" lineno="3095">
<summary>
Relabel packets to the generic client packet type.
</summary>
@@ -12188,7 +12272,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_generic_server_packets" lineno="3095">
+<interface name="corenet_send_generic_server_packets" lineno="3113">
<summary>
Send generic server packets.
</summary>
@@ -12198,7 +12282,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_receive_generic_server_packets" lineno="3113">
+<interface name="corenet_receive_generic_server_packets" lineno="3131">
<summary>
Receive generic server packets.
</summary>
@@ -12208,7 +12292,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sendrecv_generic_server_packets" lineno="3131">
+<interface name="corenet_sendrecv_generic_server_packets" lineno="3149">
<summary>
Send and receive generic server packets.
</summary>
@@ -12218,7 +12302,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_relabelto_generic_server_packets" lineno="3146">
+<interface name="corenet_relabelto_generic_server_packets" lineno="3164">
<summary>
Relabel packets to the generic server packet type.
</summary>
@@ -12228,7 +12312,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sendrecv_unlabeled_packets" lineno="3171">
+<interface name="corenet_sendrecv_unlabeled_packets" lineno="3189">
<summary>
Send and receive unlabeled packets.
</summary>
@@ -12245,7 +12329,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_all_client_packets" lineno="3185">
+<interface name="corenet_send_all_client_packets" lineno="3203">
<summary>
Send all client packets.
</summary>
@@ -12255,7 +12339,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_receive_all_client_packets" lineno="3203">
+<interface name="corenet_receive_all_client_packets" lineno="3221">
<summary>
Receive all client packets.
</summary>
@@ -12265,7 +12349,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sendrecv_all_client_packets" lineno="3221">
+<interface name="corenet_sendrecv_all_client_packets" lineno="3239">
<summary>
Send and receive all client packets.
</summary>
@@ -12275,7 +12359,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_relabelto_all_client_packets" lineno="3236">
+<interface name="corenet_relabelto_all_client_packets" lineno="3254">
<summary>
Relabel packets to any client packet type.
</summary>
@@ -12285,7 +12369,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_all_server_packets" lineno="3254">
+<interface name="corenet_send_all_server_packets" lineno="3272">
<summary>
Send all server packets.
</summary>
@@ -12295,7 +12379,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_recvfrom_netlabel" lineno="3272">
+<interface name="corenet_sctp_recvfrom_netlabel" lineno="3290">
<summary>
Receive SCTP packets from a NetLabel connection.
</summary>
@@ -12305,7 +12389,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_receive_all_server_packets" lineno="3290">
+<interface name="corenet_receive_all_server_packets" lineno="3308">
<summary>
Receive all server packets.
</summary>
@@ -12315,7 +12399,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sendrecv_all_server_packets" lineno="3308">
+<interface name="corenet_sendrecv_all_server_packets" lineno="3326">
<summary>
Send and receive all server packets.
</summary>
@@ -12325,7 +12409,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_relabelto_all_server_packets" lineno="3323">
+<interface name="corenet_relabelto_all_server_packets" lineno="3341">
<summary>
Relabel packets to any server packet type.
</summary>
@@ -12335,7 +12419,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_recvfrom_unlabeled" lineno="3341">
+<interface name="corenet_sctp_recvfrom_unlabeled" lineno="3359">
<summary>
Receive SCTP packets from an unlabled connection.
</summary>
@@ -12345,7 +12429,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_all_packets" lineno="3356">
+<interface name="corenet_send_all_packets" lineno="3374">
<summary>
Send all packets.
</summary>
@@ -12355,7 +12439,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_receive_all_packets" lineno="3374">
+<interface name="corenet_receive_all_packets" lineno="3392">
<summary>
Receive all packets.
</summary>
@@ -12365,7 +12449,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sendrecv_all_packets" lineno="3392">
+<interface name="corenet_sendrecv_all_packets" lineno="3410">
<summary>
Send and receive all packets.
</summary>
@@ -12375,7 +12459,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_relabelto_all_packets" lineno="3407">
+<interface name="corenet_relabelto_all_packets" lineno="3425">
<summary>
Relabel packets to any packet type.
</summary>
@@ -12385,7 +12469,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3425">
+<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3443">
<summary>
Access unlabeled infiniband pkeys.
</summary>
@@ -12395,7 +12479,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_ib_access_all_pkeys" lineno="3439">
+<interface name="corenet_ib_access_all_pkeys" lineno="3457">
<summary>
Access all labeled infiniband pkeys.
</summary>
@@ -12405,7 +12489,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_ib_manage_subnet_all_endports" lineno="3457">
+<interface name="corenet_ib_manage_subnet_all_endports" lineno="3475">
<summary>
Manage subnets on all labeled Infiniband endports
</summary>
@@ -12415,7 +12499,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3475">
+<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3493">
<summary>
Manage subnet on all unlabeled Infiniband endports
</summary>
@@ -12425,7 +12509,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_recvfrom_labeled" lineno="3494">
+<interface name="corenet_sctp_recvfrom_labeled" lineno="3512">
<summary>
Rules for receiving labeled SCTP packets.
</summary>
@@ -12440,7 +12524,7 @@ Peer domain.
</summary>
</param>
</interface>
-<interface name="corenet_unconfined" lineno="3517">
+<interface name="corenet_unconfined" lineno="3535">
<summary>
Unconfined access to network objects.
</summary>
@@ -12450,7 +12534,7 @@ The domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_icmp_packets" lineno="3537">
+<interface name="corenet_send_icmp_packets" lineno="3555">
<summary>
Send icmp packets.
</summary>
@@ -12461,7 +12545,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_icmp_packets" lineno="3556">
+<interface name="corenet_dontaudit_send_icmp_packets" lineno="3574">
<summary>
Do not audit attempts to send icmp packets.
</summary>
@@ -12472,7 +12556,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_icmp_packets" lineno="3575">
+<interface name="corenet_receive_icmp_packets" lineno="3593">
<summary>
Receive icmp packets.
</summary>
@@ -12483,7 +12567,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_icmp_packets" lineno="3594">
+<interface name="corenet_dontaudit_receive_icmp_packets" lineno="3612">
<summary>
Do not audit attempts to receive icmp packets.
</summary>
@@ -12494,7 +12578,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_icmp_packets" lineno="3613">
+<interface name="corenet_sendrecv_icmp_packets" lineno="3631">
<summary>
Send and receive icmp packets.
</summary>
@@ -12505,7 +12589,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_icmp_packets" lineno="3629">
+<interface name="corenet_dontaudit_sendrecv_icmp_packets" lineno="3647">
<summary>
Do not audit attempts to send and receive icmp packets.
</summary>
@@ -12516,7 +12600,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_icmp_packets" lineno="3644">
+<interface name="corenet_relabelto_icmp_packets" lineno="3662">
<summary>
Relabel packets to icmp the packet type.
</summary>
@@ -12526,7 +12610,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_adb_port" lineno="3666">
+<interface name="corenet_tcp_sendrecv_adb_port" lineno="3684">
<summary>
Send and receive TCP traffic on the adb port.
</summary>
@@ -12537,7 +12621,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_adb_port" lineno="3681">
+<interface name="corenet_udp_send_adb_port" lineno="3699">
<summary>
Send UDP traffic on the adb port.
</summary>
@@ -12548,7 +12632,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3696">
+<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3714">
<summary>
Do not audit attempts to send UDP traffic on the adb port.
</summary>
@@ -12559,7 +12643,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_adb_port" lineno="3711">
+<interface name="corenet_udp_receive_adb_port" lineno="3729">
<summary>
Receive UDP traffic on the adb port.
</summary>
@@ -12570,7 +12654,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3726">
+<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3744">
<summary>
Do not audit attempts to receive UDP traffic on the adb port.
</summary>
@@ -12581,7 +12665,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_adb_port" lineno="3741">
+<interface name="corenet_udp_sendrecv_adb_port" lineno="3759">
<summary>
Send and receive UDP traffic on the adb port.
</summary>
@@ -12592,7 +12676,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3757">
+<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3775">
<summary>
Do not audit attempts to send and receive
UDP traffic on the adb port.
@@ -12604,7 +12688,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_adb_port" lineno="3772">
+<interface name="corenet_tcp_bind_adb_port" lineno="3790">
<summary>
Bind TCP sockets to the adb port.
</summary>
@@ -12615,7 +12699,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_adb_port" lineno="3792">
+<interface name="corenet_udp_bind_adb_port" lineno="3810">
<summary>
Bind UDP sockets to the adb port.
</summary>
@@ -12626,7 +12710,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_adb_port" lineno="3811">
+<interface name="corenet_tcp_connect_adb_port" lineno="3829">
<summary>
Make a TCP connection to the adb port.
</summary>
@@ -12636,7 +12720,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_adb_client_packets" lineno="3831">
+<interface name="corenet_send_adb_client_packets" lineno="3849">
<summary>
Send adb_client packets.
</summary>
@@ -12647,7 +12731,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3850">
+<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3868">
<summary>
Do not audit attempts to send adb_client packets.
</summary>
@@ -12658,7 +12742,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_adb_client_packets" lineno="3869">
+<interface name="corenet_receive_adb_client_packets" lineno="3887">
<summary>
Receive adb_client packets.
</summary>
@@ -12669,7 +12753,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3888">
+<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3906">
<summary>
Do not audit attempts to receive adb_client packets.
</summary>
@@ -12680,7 +12764,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_adb_client_packets" lineno="3907">
+<interface name="corenet_sendrecv_adb_client_packets" lineno="3925">
<summary>
Send and receive adb_client packets.
</summary>
@@ -12691,7 +12775,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3923">
+<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3941">
<summary>
Do not audit attempts to send and receive adb_client packets.
</summary>
@@ -12702,7 +12786,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_adb_client_packets" lineno="3938">
+<interface name="corenet_relabelto_adb_client_packets" lineno="3956">
<summary>
Relabel packets to adb_client the packet type.
</summary>
@@ -12712,7 +12796,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_adb_server_packets" lineno="3958">
+<interface name="corenet_send_adb_server_packets" lineno="3976">
<summary>
Send adb_server packets.
</summary>
@@ -12723,7 +12807,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3977">
+<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3995">
<summary>
Do not audit attempts to send adb_server packets.
</summary>
@@ -12734,7 +12818,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_adb_server_packets" lineno="3996">
+<interface name="corenet_receive_adb_server_packets" lineno="4014">
<summary>
Receive adb_server packets.
</summary>
@@ -12745,7 +12829,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="4015">
+<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="4033">
<summary>
Do not audit attempts to receive adb_server packets.
</summary>
@@ -12756,7 +12840,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_adb_server_packets" lineno="4034">
+<interface name="corenet_sendrecv_adb_server_packets" lineno="4052">
<summary>
Send and receive adb_server packets.
</summary>
@@ -12767,7 +12851,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4050">
+<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4068">
<summary>
Do not audit attempts to send and receive adb_server packets.
</summary>
@@ -12778,7 +12862,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_adb_server_packets" lineno="4065">
+<interface name="corenet_relabelto_adb_server_packets" lineno="4083">
<summary>
Relabel packets to adb_server the packet type.
</summary>
@@ -12788,7 +12872,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4087">
+<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4105">
<summary>
Send and receive TCP traffic on the afs_bos port.
</summary>
@@ -12799,7 +12883,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs_bos_port" lineno="4102">
+<interface name="corenet_udp_send_afs_bos_port" lineno="4120">
<summary>
Send UDP traffic on the afs_bos port.
</summary>
@@ -12810,7 +12894,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4117">
+<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4135">
<summary>
Do not audit attempts to send UDP traffic on the afs_bos port.
</summary>
@@ -12821,7 +12905,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs_bos_port" lineno="4132">
+<interface name="corenet_udp_receive_afs_bos_port" lineno="4150">
<summary>
Receive UDP traffic on the afs_bos port.
</summary>
@@ -12832,7 +12916,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4147">
+<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4165">
<summary>
Do not audit attempts to receive UDP traffic on the afs_bos port.
</summary>
@@ -12843,7 +12927,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4162">
+<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4180">
<summary>
Send and receive UDP traffic on the afs_bos port.
</summary>
@@ -12854,7 +12938,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4178">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4196">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_bos port.
@@ -12866,7 +12950,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs_bos_port" lineno="4193">
+<interface name="corenet_tcp_bind_afs_bos_port" lineno="4211">
<summary>
Bind TCP sockets to the afs_bos port.
</summary>
@@ -12877,7 +12961,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_bos_port" lineno="4213">
+<interface name="corenet_udp_bind_afs_bos_port" lineno="4231">
<summary>
Bind UDP sockets to the afs_bos port.
</summary>
@@ -12888,7 +12972,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_bos_port" lineno="4232">
+<interface name="corenet_tcp_connect_afs_bos_port" lineno="4250">
<summary>
Make a TCP connection to the afs_bos port.
</summary>
@@ -12898,7 +12982,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_bos_client_packets" lineno="4252">
+<interface name="corenet_send_afs_bos_client_packets" lineno="4270">
<summary>
Send afs_bos_client packets.
</summary>
@@ -12909,7 +12993,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4271">
+<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4289">
<summary>
Do not audit attempts to send afs_bos_client packets.
</summary>
@@ -12920,7 +13004,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_bos_client_packets" lineno="4290">
+<interface name="corenet_receive_afs_bos_client_packets" lineno="4308">
<summary>
Receive afs_bos_client packets.
</summary>
@@ -12931,7 +13015,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4309">
+<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4327">
<summary>
Do not audit attempts to receive afs_bos_client packets.
</summary>
@@ -12942,7 +13026,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4328">
+<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4346">
<summary>
Send and receive afs_bos_client packets.
</summary>
@@ -12953,7 +13037,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4344">
+<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4362">
<summary>
Do not audit attempts to send and receive afs_bos_client packets.
</summary>
@@ -12964,7 +13048,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4359">
+<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4377">
<summary>
Relabel packets to afs_bos_client the packet type.
</summary>
@@ -12974,7 +13058,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_bos_server_packets" lineno="4379">
+<interface name="corenet_send_afs_bos_server_packets" lineno="4397">
<summary>
Send afs_bos_server packets.
</summary>
@@ -12985,7 +13069,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4398">
+<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4416">
<summary>
Do not audit attempts to send afs_bos_server packets.
</summary>
@@ -12996,7 +13080,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_bos_server_packets" lineno="4417">
+<interface name="corenet_receive_afs_bos_server_packets" lineno="4435">
<summary>
Receive afs_bos_server packets.
</summary>
@@ -13007,7 +13091,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4436">
+<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4454">
<summary>
Do not audit attempts to receive afs_bos_server packets.
</summary>
@@ -13018,7 +13102,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4455">
+<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4473">
<summary>
Send and receive afs_bos_server packets.
</summary>
@@ -13029,7 +13113,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4471">
+<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4489">
<summary>
Do not audit attempts to send and receive afs_bos_server packets.
</summary>
@@ -13040,7 +13124,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4486">
+<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4504">
<summary>
Relabel packets to afs_bos_server the packet type.
</summary>
@@ -13050,7 +13134,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4508">
+<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4526">
<summary>
Send and receive TCP traffic on the afs_fs port.
</summary>
@@ -13061,7 +13145,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs_fs_port" lineno="4523">
+<interface name="corenet_udp_send_afs_fs_port" lineno="4541">
<summary>
Send UDP traffic on the afs_fs port.
</summary>
@@ -13072,7 +13156,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4538">
+<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4556">
<summary>
Do not audit attempts to send UDP traffic on the afs_fs port.
</summary>
@@ -13083,7 +13167,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs_fs_port" lineno="4553">
+<interface name="corenet_udp_receive_afs_fs_port" lineno="4571">
<summary>
Receive UDP traffic on the afs_fs port.
</summary>
@@ -13094,7 +13178,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4568">
+<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4586">
<summary>
Do not audit attempts to receive UDP traffic on the afs_fs port.
</summary>
@@ -13105,7 +13189,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4583">
+<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4601">
<summary>
Send and receive UDP traffic on the afs_fs port.
</summary>
@@ -13116,7 +13200,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4599">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4617">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_fs port.
@@ -13128,7 +13212,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs_fs_port" lineno="4614">
+<interface name="corenet_tcp_bind_afs_fs_port" lineno="4632">
<summary>
Bind TCP sockets to the afs_fs port.
</summary>
@@ -13139,7 +13223,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_fs_port" lineno="4634">
+<interface name="corenet_udp_bind_afs_fs_port" lineno="4652">
<summary>
Bind UDP sockets to the afs_fs port.
</summary>
@@ -13150,7 +13234,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_fs_port" lineno="4653">
+<interface name="corenet_tcp_connect_afs_fs_port" lineno="4671">
<summary>
Make a TCP connection to the afs_fs port.
</summary>
@@ -13160,7 +13244,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_fs_client_packets" lineno="4673">
+<interface name="corenet_send_afs_fs_client_packets" lineno="4691">
<summary>
Send afs_fs_client packets.
</summary>
@@ -13171,7 +13255,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4692">
+<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4710">
<summary>
Do not audit attempts to send afs_fs_client packets.
</summary>
@@ -13182,7 +13266,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_fs_client_packets" lineno="4711">
+<interface name="corenet_receive_afs_fs_client_packets" lineno="4729">
<summary>
Receive afs_fs_client packets.
</summary>
@@ -13193,7 +13277,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4730">
+<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4748">
<summary>
Do not audit attempts to receive afs_fs_client packets.
</summary>
@@ -13204,7 +13288,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4749">
+<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4767">
<summary>
Send and receive afs_fs_client packets.
</summary>
@@ -13215,7 +13299,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4765">
+<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4783">
<summary>
Do not audit attempts to send and receive afs_fs_client packets.
</summary>
@@ -13226,7 +13310,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4780">
+<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4798">
<summary>
Relabel packets to afs_fs_client the packet type.
</summary>
@@ -13236,7 +13320,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_fs_server_packets" lineno="4800">
+<interface name="corenet_send_afs_fs_server_packets" lineno="4818">
<summary>
Send afs_fs_server packets.
</summary>
@@ -13247,7 +13331,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4819">
+<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4837">
<summary>
Do not audit attempts to send afs_fs_server packets.
</summary>
@@ -13258,7 +13342,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_fs_server_packets" lineno="4838">
+<interface name="corenet_receive_afs_fs_server_packets" lineno="4856">
<summary>
Receive afs_fs_server packets.
</summary>
@@ -13269,7 +13353,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4857">
+<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4875">
<summary>
Do not audit attempts to receive afs_fs_server packets.
</summary>
@@ -13280,7 +13364,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4876">
+<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4894">
<summary>
Send and receive afs_fs_server packets.
</summary>
@@ -13291,7 +13375,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4892">
+<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4910">
<summary>
Do not audit attempts to send and receive afs_fs_server packets.
</summary>
@@ -13302,7 +13386,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4907">
+<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4925">
<summary>
Relabel packets to afs_fs_server the packet type.
</summary>
@@ -13312,7 +13396,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4929">
+<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4947">
<summary>
Send and receive TCP traffic on the afs_ka port.
</summary>
@@ -13323,7 +13407,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs_ka_port" lineno="4944">
+<interface name="corenet_udp_send_afs_ka_port" lineno="4962">
<summary>
Send UDP traffic on the afs_ka port.
</summary>
@@ -13334,7 +13418,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4959">
+<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4977">
<summary>
Do not audit attempts to send UDP traffic on the afs_ka port.
</summary>
@@ -13345,7 +13429,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs_ka_port" lineno="4974">
+<interface name="corenet_udp_receive_afs_ka_port" lineno="4992">
<summary>
Receive UDP traffic on the afs_ka port.
</summary>
@@ -13356,7 +13440,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="4989">
+<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="5007">
<summary>
Do not audit attempts to receive UDP traffic on the afs_ka port.
</summary>
@@ -13367,7 +13451,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5004">
+<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5022">
<summary>
Send and receive UDP traffic on the afs_ka port.
</summary>
@@ -13378,7 +13462,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5020">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5038">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_ka port.
@@ -13390,7 +13474,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs_ka_port" lineno="5035">
+<interface name="corenet_tcp_bind_afs_ka_port" lineno="5053">
<summary>
Bind TCP sockets to the afs_ka port.
</summary>
@@ -13401,7 +13485,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_ka_port" lineno="5055">
+<interface name="corenet_udp_bind_afs_ka_port" lineno="5073">
<summary>
Bind UDP sockets to the afs_ka port.
</summary>
@@ -13412,7 +13496,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_ka_port" lineno="5074">
+<interface name="corenet_tcp_connect_afs_ka_port" lineno="5092">
<summary>
Make a TCP connection to the afs_ka port.
</summary>
@@ -13422,7 +13506,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_ka_client_packets" lineno="5094">
+<interface name="corenet_send_afs_ka_client_packets" lineno="5112">
<summary>
Send afs_ka_client packets.
</summary>
@@ -13433,7 +13517,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5113">
+<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5131">
<summary>
Do not audit attempts to send afs_ka_client packets.
</summary>
@@ -13444,7 +13528,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_ka_client_packets" lineno="5132">
+<interface name="corenet_receive_afs_ka_client_packets" lineno="5150">
<summary>
Receive afs_ka_client packets.
</summary>
@@ -13455,7 +13539,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5151">
+<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5169">
<summary>
Do not audit attempts to receive afs_ka_client packets.
</summary>
@@ -13466,7 +13550,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5170">
+<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5188">
<summary>
Send and receive afs_ka_client packets.
</summary>
@@ -13477,7 +13561,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5186">
+<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5204">
<summary>
Do not audit attempts to send and receive afs_ka_client packets.
</summary>
@@ -13488,7 +13572,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5201">
+<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5219">
<summary>
Relabel packets to afs_ka_client the packet type.
</summary>
@@ -13498,7 +13582,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_ka_server_packets" lineno="5221">
+<interface name="corenet_send_afs_ka_server_packets" lineno="5239">
<summary>
Send afs_ka_server packets.
</summary>
@@ -13509,7 +13593,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5240">
+<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5258">
<summary>
Do not audit attempts to send afs_ka_server packets.
</summary>
@@ -13520,7 +13604,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_ka_server_packets" lineno="5259">
+<interface name="corenet_receive_afs_ka_server_packets" lineno="5277">
<summary>
Receive afs_ka_server packets.
</summary>
@@ -13531,7 +13615,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5278">
+<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5296">
<summary>
Do not audit attempts to receive afs_ka_server packets.
</summary>
@@ -13542,7 +13626,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5297">
+<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5315">
<summary>
Send and receive afs_ka_server packets.
</summary>
@@ -13553,7 +13637,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5313">
+<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5331">
<summary>
Do not audit attempts to send and receive afs_ka_server packets.
</summary>
@@ -13564,7 +13648,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5328">
+<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5346">
<summary>
Relabel packets to afs_ka_server the packet type.
</summary>
@@ -13574,7 +13658,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5350">
+<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5368">
<summary>
Send and receive TCP traffic on the afs_pt port.
</summary>
@@ -13585,7 +13669,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs_pt_port" lineno="5365">
+<interface name="corenet_udp_send_afs_pt_port" lineno="5383">
<summary>
Send UDP traffic on the afs_pt port.
</summary>
@@ -13596,7 +13680,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5380">
+<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5398">
<summary>
Do not audit attempts to send UDP traffic on the afs_pt port.
</summary>
@@ -13607,7 +13691,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs_pt_port" lineno="5395">
+<interface name="corenet_udp_receive_afs_pt_port" lineno="5413">
<summary>
Receive UDP traffic on the afs_pt port.
</summary>
@@ -13618,7 +13702,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5410">
+<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5428">
<summary>
Do not audit attempts to receive UDP traffic on the afs_pt port.
</summary>
@@ -13629,7 +13713,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5425">
+<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5443">
<summary>
Send and receive UDP traffic on the afs_pt port.
</summary>
@@ -13640,7 +13724,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5441">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5459">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_pt port.
@@ -13652,7 +13736,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs_pt_port" lineno="5456">
+<interface name="corenet_tcp_bind_afs_pt_port" lineno="5474">
<summary>
Bind TCP sockets to the afs_pt port.
</summary>
@@ -13663,7 +13747,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_pt_port" lineno="5476">
+<interface name="corenet_udp_bind_afs_pt_port" lineno="5494">
<summary>
Bind UDP sockets to the afs_pt port.
</summary>
@@ -13674,7 +13758,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_pt_port" lineno="5495">
+<interface name="corenet_tcp_connect_afs_pt_port" lineno="5513">
<summary>
Make a TCP connection to the afs_pt port.
</summary>
@@ -13684,7 +13768,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_pt_client_packets" lineno="5515">
+<interface name="corenet_send_afs_pt_client_packets" lineno="5533">
<summary>
Send afs_pt_client packets.
</summary>
@@ -13695,7 +13779,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5534">
+<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5552">
<summary>
Do not audit attempts to send afs_pt_client packets.
</summary>
@@ -13706,7 +13790,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_pt_client_packets" lineno="5553">
+<interface name="corenet_receive_afs_pt_client_packets" lineno="5571">
<summary>
Receive afs_pt_client packets.
</summary>
@@ -13717,7 +13801,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5572">
+<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5590">
<summary>
Do not audit attempts to receive afs_pt_client packets.
</summary>
@@ -13728,7 +13812,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5591">
+<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5609">
<summary>
Send and receive afs_pt_client packets.
</summary>
@@ -13739,7 +13823,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5607">
+<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5625">
<summary>
Do not audit attempts to send and receive afs_pt_client packets.
</summary>
@@ -13750,7 +13834,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5622">
+<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5640">
<summary>
Relabel packets to afs_pt_client the packet type.
</summary>
@@ -13760,7 +13844,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_pt_server_packets" lineno="5642">
+<interface name="corenet_send_afs_pt_server_packets" lineno="5660">
<summary>
Send afs_pt_server packets.
</summary>
@@ -13771,7 +13855,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5661">
+<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5679">
<summary>
Do not audit attempts to send afs_pt_server packets.
</summary>
@@ -13782,7 +13866,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_pt_server_packets" lineno="5680">
+<interface name="corenet_receive_afs_pt_server_packets" lineno="5698">
<summary>
Receive afs_pt_server packets.
</summary>
@@ -13793,7 +13877,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5699">
+<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5717">
<summary>
Do not audit attempts to receive afs_pt_server packets.
</summary>
@@ -13804,7 +13888,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5718">
+<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5736">
<summary>
Send and receive afs_pt_server packets.
</summary>
@@ -13815,7 +13899,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5734">
+<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5752">
<summary>
Do not audit attempts to send and receive afs_pt_server packets.
</summary>
@@ -13826,7 +13910,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5749">
+<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5767">
<summary>
Relabel packets to afs_pt_server the packet type.
</summary>
@@ -13836,7 +13920,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5771">
+<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5789">
<summary>
Send and receive TCP traffic on the afs_vl port.
</summary>
@@ -13847,7 +13931,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs_vl_port" lineno="5786">
+<interface name="corenet_udp_send_afs_vl_port" lineno="5804">
<summary>
Send UDP traffic on the afs_vl port.
</summary>
@@ -13858,7 +13942,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5801">
+<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5819">
<summary>
Do not audit attempts to send UDP traffic on the afs_vl port.
</summary>
@@ -13869,7 +13953,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs_vl_port" lineno="5816">
+<interface name="corenet_udp_receive_afs_vl_port" lineno="5834">
<summary>
Receive UDP traffic on the afs_vl port.
</summary>
@@ -13880,7 +13964,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5831">
+<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5849">
<summary>
Do not audit attempts to receive UDP traffic on the afs_vl port.
</summary>
@@ -13891,7 +13975,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5846">
+<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5864">
<summary>
Send and receive UDP traffic on the afs_vl port.
</summary>
@@ -13902,7 +13986,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5862">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5880">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_vl port.
@@ -13914,7 +13998,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs_vl_port" lineno="5877">
+<interface name="corenet_tcp_bind_afs_vl_port" lineno="5895">
<summary>
Bind TCP sockets to the afs_vl port.
</summary>
@@ -13925,7 +14009,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_vl_port" lineno="5897">
+<interface name="corenet_udp_bind_afs_vl_port" lineno="5915">
<summary>
Bind UDP sockets to the afs_vl port.
</summary>
@@ -13936,7 +14020,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_vl_port" lineno="5916">
+<interface name="corenet_tcp_connect_afs_vl_port" lineno="5934">
<summary>
Make a TCP connection to the afs_vl port.
</summary>
@@ -13946,7 +14030,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_vl_client_packets" lineno="5936">
+<interface name="corenet_send_afs_vl_client_packets" lineno="5954">
<summary>
Send afs_vl_client packets.
</summary>
@@ -13957,7 +14041,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5955">
+<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5973">
<summary>
Do not audit attempts to send afs_vl_client packets.
</summary>
@@ -13968,7 +14052,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_vl_client_packets" lineno="5974">
+<interface name="corenet_receive_afs_vl_client_packets" lineno="5992">
<summary>
Receive afs_vl_client packets.
</summary>
@@ -13979,7 +14063,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5993">
+<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="6011">
<summary>
Do not audit attempts to receive afs_vl_client packets.
</summary>
@@ -13990,7 +14074,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6012">
+<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6030">
<summary>
Send and receive afs_vl_client packets.
</summary>
@@ -14001,7 +14085,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6028">
+<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6046">
<summary>
Do not audit attempts to send and receive afs_vl_client packets.
</summary>
@@ -14012,7 +14096,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6043">
+<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6061">
<summary>
Relabel packets to afs_vl_client the packet type.
</summary>
@@ -14022,7 +14106,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_vl_server_packets" lineno="6063">
+<interface name="corenet_send_afs_vl_server_packets" lineno="6081">
<summary>
Send afs_vl_server packets.
</summary>
@@ -14033,7 +14117,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6082">
+<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6100">
<summary>
Do not audit attempts to send afs_vl_server packets.
</summary>
@@ -14044,7 +14128,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_vl_server_packets" lineno="6101">
+<interface name="corenet_receive_afs_vl_server_packets" lineno="6119">
<summary>
Receive afs_vl_server packets.
</summary>
@@ -14055,7 +14139,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6120">
+<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6138">
<summary>
Do not audit attempts to receive afs_vl_server packets.
</summary>
@@ -14066,7 +14150,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6139">
+<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6157">
<summary>
Send and receive afs_vl_server packets.
</summary>
@@ -14077,7 +14161,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6155">
+<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6173">
<summary>
Do not audit attempts to send and receive afs_vl_server packets.
</summary>
@@ -14088,7 +14172,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6170">
+<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6188">
<summary>
Relabel packets to afs_vl_server the packet type.
</summary>
@@ -14098,7 +14182,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6192">
+<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6210">
<summary>
Send and receive TCP traffic on the afs3_callback port.
</summary>
@@ -14109,7 +14193,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs3_callback_port" lineno="6207">
+<interface name="corenet_udp_send_afs3_callback_port" lineno="6225">
<summary>
Send UDP traffic on the afs3_callback port.
</summary>
@@ -14120,7 +14204,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6222">
+<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6240">
<summary>
Do not audit attempts to send UDP traffic on the afs3_callback port.
</summary>
@@ -14131,7 +14215,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs3_callback_port" lineno="6237">
+<interface name="corenet_udp_receive_afs3_callback_port" lineno="6255">
<summary>
Receive UDP traffic on the afs3_callback port.
</summary>
@@ -14142,7 +14226,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6252">
+<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6270">
<summary>
Do not audit attempts to receive UDP traffic on the afs3_callback port.
</summary>
@@ -14153,7 +14237,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6267">
+<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6285">
<summary>
Send and receive UDP traffic on the afs3_callback port.
</summary>
@@ -14164,7 +14248,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6283">
+<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6301">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs3_callback port.
@@ -14176,7 +14260,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6298">
+<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6316">
<summary>
Bind TCP sockets to the afs3_callback port.
</summary>
@@ -14187,7 +14271,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs3_callback_port" lineno="6318">
+<interface name="corenet_udp_bind_afs3_callback_port" lineno="6336">
<summary>
Bind UDP sockets to the afs3_callback port.
</summary>
@@ -14198,7 +14282,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6337">
+<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6355">
<summary>
Make a TCP connection to the afs3_callback port.
</summary>
@@ -14208,7 +14292,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs3_callback_client_packets" lineno="6357">
+<interface name="corenet_send_afs3_callback_client_packets" lineno="6375">
<summary>
Send afs3_callback_client packets.
</summary>
@@ -14219,7 +14303,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6376">
+<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6394">
<summary>
Do not audit attempts to send afs3_callback_client packets.
</summary>
@@ -14230,7 +14314,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs3_callback_client_packets" lineno="6395">
+<interface name="corenet_receive_afs3_callback_client_packets" lineno="6413">
<summary>
Receive afs3_callback_client packets.
</summary>
@@ -14241,7 +14325,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6414">
+<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6432">
<summary>
Do not audit attempts to receive afs3_callback_client packets.
</summary>
@@ -14252,7 +14336,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6433">
+<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6451">
<summary>
Send and receive afs3_callback_client packets.
</summary>
@@ -14263,7 +14347,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6449">
+<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6467">
<summary>
Do not audit attempts to send and receive afs3_callback_client packets.
</summary>
@@ -14274,7 +14358,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6464">
+<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6482">
<summary>
Relabel packets to afs3_callback_client the packet type.
</summary>
@@ -14284,7 +14368,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs3_callback_server_packets" lineno="6484">
+<interface name="corenet_send_afs3_callback_server_packets" lineno="6502">
<summary>
Send afs3_callback_server packets.
</summary>
@@ -14295,7 +14379,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6503">
+<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6521">
<summary>
Do not audit attempts to send afs3_callback_server packets.
</summary>
@@ -14306,7 +14390,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs3_callback_server_packets" lineno="6522">
+<interface name="corenet_receive_afs3_callback_server_packets" lineno="6540">
<summary>
Receive afs3_callback_server packets.
</summary>
@@ -14317,7 +14401,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6541">
+<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6559">
<summary>
Do not audit attempts to receive afs3_callback_server packets.
</summary>
@@ -14328,7 +14412,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6560">
+<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6578">
<summary>
Send and receive afs3_callback_server packets.
</summary>
@@ -14339,7 +14423,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6576">
+<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6594">
<summary>
Do not audit attempts to send and receive afs3_callback_server packets.
</summary>
@@ -14350,7 +14434,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6591">
+<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6609">
<summary>
Relabel packets to afs3_callback_server the packet type.
</summary>
@@ -14360,7 +14444,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6613">
+<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6631">
<summary>
Send and receive TCP traffic on the agentx port.
</summary>
@@ -14371,7 +14455,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_agentx_port" lineno="6628">
+<interface name="corenet_udp_send_agentx_port" lineno="6646">
<summary>
Send UDP traffic on the agentx port.
</summary>
@@ -14382,7 +14466,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6643">
+<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6661">
<summary>
Do not audit attempts to send UDP traffic on the agentx port.
</summary>
@@ -14393,7 +14477,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_agentx_port" lineno="6658">
+<interface name="corenet_udp_receive_agentx_port" lineno="6676">
<summary>
Receive UDP traffic on the agentx port.
</summary>
@@ -14404,7 +14488,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6673">
+<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6691">
<summary>
Do not audit attempts to receive UDP traffic on the agentx port.
</summary>
@@ -14415,7 +14499,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_agentx_port" lineno="6688">
+<interface name="corenet_udp_sendrecv_agentx_port" lineno="6706">
<summary>
Send and receive UDP traffic on the agentx port.
</summary>
@@ -14426,7 +14510,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6704">
+<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6722">
<summary>
Do not audit attempts to send and receive
UDP traffic on the agentx port.
@@ -14438,7 +14522,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_agentx_port" lineno="6719">
+<interface name="corenet_tcp_bind_agentx_port" lineno="6737">
<summary>
Bind TCP sockets to the agentx port.
</summary>
@@ -14449,7 +14533,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_agentx_port" lineno="6739">
+<interface name="corenet_udp_bind_agentx_port" lineno="6757">
<summary>
Bind UDP sockets to the agentx port.
</summary>
@@ -14460,7 +14544,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_agentx_port" lineno="6758">
+<interface name="corenet_tcp_connect_agentx_port" lineno="6776">
<summary>
Make a TCP connection to the agentx port.
</summary>
@@ -14470,7 +14554,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_agentx_client_packets" lineno="6778">
+<interface name="corenet_send_agentx_client_packets" lineno="6796">
<summary>
Send agentx_client packets.
</summary>
@@ -14481,7 +14565,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6797">
+<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6815">
<summary>
Do not audit attempts to send agentx_client packets.
</summary>
@@ -14492,7 +14576,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_agentx_client_packets" lineno="6816">
+<interface name="corenet_receive_agentx_client_packets" lineno="6834">
<summary>
Receive agentx_client packets.
</summary>
@@ -14503,7 +14587,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6835">
+<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6853">
<summary>
Do not audit attempts to receive agentx_client packets.
</summary>
@@ -14514,7 +14598,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_agentx_client_packets" lineno="6854">
+<interface name="corenet_sendrecv_agentx_client_packets" lineno="6872">
<summary>
Send and receive agentx_client packets.
</summary>
@@ -14525,7 +14609,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6870">
+<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6888">
<summary>
Do not audit attempts to send and receive agentx_client packets.
</summary>
@@ -14536,7 +14620,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_agentx_client_packets" lineno="6885">
+<interface name="corenet_relabelto_agentx_client_packets" lineno="6903">
<summary>
Relabel packets to agentx_client the packet type.
</summary>
@@ -14546,7 +14630,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_agentx_server_packets" lineno="6905">
+<interface name="corenet_send_agentx_server_packets" lineno="6923">
<summary>
Send agentx_server packets.
</summary>
@@ -14557,7 +14641,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6924">
+<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6942">
<summary>
Do not audit attempts to send agentx_server packets.
</summary>
@@ -14568,7 +14652,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_agentx_server_packets" lineno="6943">
+<interface name="corenet_receive_agentx_server_packets" lineno="6961">
<summary>
Receive agentx_server packets.
</summary>
@@ -14579,7 +14663,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6962">
+<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6980">
<summary>
Do not audit attempts to receive agentx_server packets.
</summary>
@@ -14590,7 +14674,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_agentx_server_packets" lineno="6981">
+<interface name="corenet_sendrecv_agentx_server_packets" lineno="6999">
<summary>
Send and receive agentx_server packets.
</summary>
@@ -14601,7 +14685,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6997">
+<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="7015">
<summary>
Do not audit attempts to send and receive agentx_server packets.
</summary>
@@ -14612,7 +14696,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_agentx_server_packets" lineno="7012">
+<interface name="corenet_relabelto_agentx_server_packets" lineno="7030">
<summary>
Relabel packets to agentx_server the packet type.
</summary>
@@ -14622,7 +14706,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7034">
+<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7052">
<summary>
Send and receive TCP traffic on the amanda port.
</summary>
@@ -14633,7 +14717,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_amanda_port" lineno="7049">
+<interface name="corenet_udp_send_amanda_port" lineno="7067">
<summary>
Send UDP traffic on the amanda port.
</summary>
@@ -14644,7 +14728,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7064">
+<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7082">
<summary>
Do not audit attempts to send UDP traffic on the amanda port.
</summary>
@@ -14655,7 +14739,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_amanda_port" lineno="7079">
+<interface name="corenet_udp_receive_amanda_port" lineno="7097">
<summary>
Receive UDP traffic on the amanda port.
</summary>
@@ -14666,7 +14750,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7094">
+<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7112">
<summary>
Do not audit attempts to receive UDP traffic on the amanda port.
</summary>
@@ -14677,7 +14761,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_amanda_port" lineno="7109">
+<interface name="corenet_udp_sendrecv_amanda_port" lineno="7127">
<summary>
Send and receive UDP traffic on the amanda port.
</summary>
@@ -14688,7 +14772,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7125">
+<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7143">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amanda port.
@@ -14700,7 +14784,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_amanda_port" lineno="7140">
+<interface name="corenet_tcp_bind_amanda_port" lineno="7158">
<summary>
Bind TCP sockets to the amanda port.
</summary>
@@ -14711,7 +14795,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amanda_port" lineno="7160">
+<interface name="corenet_udp_bind_amanda_port" lineno="7178">
<summary>
Bind UDP sockets to the amanda port.
</summary>
@@ -14722,7 +14806,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amanda_port" lineno="7179">
+<interface name="corenet_tcp_connect_amanda_port" lineno="7197">
<summary>
Make a TCP connection to the amanda port.
</summary>
@@ -14732,7 +14816,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amanda_client_packets" lineno="7199">
+<interface name="corenet_send_amanda_client_packets" lineno="7217">
<summary>
Send amanda_client packets.
</summary>
@@ -14743,7 +14827,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7218">
+<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7236">
<summary>
Do not audit attempts to send amanda_client packets.
</summary>
@@ -14754,7 +14838,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amanda_client_packets" lineno="7237">
+<interface name="corenet_receive_amanda_client_packets" lineno="7255">
<summary>
Receive amanda_client packets.
</summary>
@@ -14765,7 +14849,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7256">
+<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7274">
<summary>
Do not audit attempts to receive amanda_client packets.
</summary>
@@ -14776,7 +14860,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amanda_client_packets" lineno="7275">
+<interface name="corenet_sendrecv_amanda_client_packets" lineno="7293">
<summary>
Send and receive amanda_client packets.
</summary>
@@ -14787,7 +14871,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7291">
+<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7309">
<summary>
Do not audit attempts to send and receive amanda_client packets.
</summary>
@@ -14798,7 +14882,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amanda_client_packets" lineno="7306">
+<interface name="corenet_relabelto_amanda_client_packets" lineno="7324">
<summary>
Relabel packets to amanda_client the packet type.
</summary>
@@ -14808,7 +14892,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amanda_server_packets" lineno="7326">
+<interface name="corenet_send_amanda_server_packets" lineno="7344">
<summary>
Send amanda_server packets.
</summary>
@@ -14819,7 +14903,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7345">
+<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7363">
<summary>
Do not audit attempts to send amanda_server packets.
</summary>
@@ -14830,7 +14914,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amanda_server_packets" lineno="7364">
+<interface name="corenet_receive_amanda_server_packets" lineno="7382">
<summary>
Receive amanda_server packets.
</summary>
@@ -14841,7 +14925,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7383">
+<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7401">
<summary>
Do not audit attempts to receive amanda_server packets.
</summary>
@@ -14852,7 +14936,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amanda_server_packets" lineno="7402">
+<interface name="corenet_sendrecv_amanda_server_packets" lineno="7420">
<summary>
Send and receive amanda_server packets.
</summary>
@@ -14863,7 +14947,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7418">
+<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7436">
<summary>
Do not audit attempts to send and receive amanda_server packets.
</summary>
@@ -14874,7 +14958,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amanda_server_packets" lineno="7433">
+<interface name="corenet_relabelto_amanda_server_packets" lineno="7451">
<summary>
Relabel packets to amanda_server the packet type.
</summary>
@@ -14884,7 +14968,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7455">
+<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7473">
<summary>
Send and receive TCP traffic on the amavisd_recv port.
</summary>
@@ -14895,7 +14979,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_amavisd_recv_port" lineno="7470">
+<interface name="corenet_udp_send_amavisd_recv_port" lineno="7488">
<summary>
Send UDP traffic on the amavisd_recv port.
</summary>
@@ -14906,7 +14990,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7485">
+<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7503">
<summary>
Do not audit attempts to send UDP traffic on the amavisd_recv port.
</summary>
@@ -14917,7 +15001,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7500">
+<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7518">
<summary>
Receive UDP traffic on the amavisd_recv port.
</summary>
@@ -14928,7 +15012,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7515">
+<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7533">
<summary>
Do not audit attempts to receive UDP traffic on the amavisd_recv port.
</summary>
@@ -14939,7 +15023,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7530">
+<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7548">
<summary>
Send and receive UDP traffic on the amavisd_recv port.
</summary>
@@ -14950,7 +15034,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7546">
+<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7564">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amavisd_recv port.
@@ -14962,7 +15046,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7561">
+<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7579">
<summary>
Bind TCP sockets to the amavisd_recv port.
</summary>
@@ -14973,7 +15057,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7581">
+<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7599">
<summary>
Bind UDP sockets to the amavisd_recv port.
</summary>
@@ -14984,7 +15068,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7600">
+<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7618">
<summary>
Make a TCP connection to the amavisd_recv port.
</summary>
@@ -14994,7 +15078,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_recv_client_packets" lineno="7620">
+<interface name="corenet_send_amavisd_recv_client_packets" lineno="7638">
<summary>
Send amavisd_recv_client packets.
</summary>
@@ -15005,7 +15089,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7639">
+<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7657">
<summary>
Do not audit attempts to send amavisd_recv_client packets.
</summary>
@@ -15016,7 +15100,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7658">
+<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7676">
<summary>
Receive amavisd_recv_client packets.
</summary>
@@ -15027,7 +15111,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7677">
+<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7695">
<summary>
Do not audit attempts to receive amavisd_recv_client packets.
</summary>
@@ -15038,7 +15122,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7696">
+<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7714">
<summary>
Send and receive amavisd_recv_client packets.
</summary>
@@ -15049,7 +15133,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7712">
+<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7730">
<summary>
Do not audit attempts to send and receive amavisd_recv_client packets.
</summary>
@@ -15060,7 +15144,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7727">
+<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7745">
<summary>
Relabel packets to amavisd_recv_client the packet type.
</summary>
@@ -15070,7 +15154,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_recv_server_packets" lineno="7747">
+<interface name="corenet_send_amavisd_recv_server_packets" lineno="7765">
<summary>
Send amavisd_recv_server packets.
</summary>
@@ -15081,7 +15165,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7766">
+<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7784">
<summary>
Do not audit attempts to send amavisd_recv_server packets.
</summary>
@@ -15092,7 +15176,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7785">
+<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7803">
<summary>
Receive amavisd_recv_server packets.
</summary>
@@ -15103,7 +15187,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7804">
+<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7822">
<summary>
Do not audit attempts to receive amavisd_recv_server packets.
</summary>
@@ -15114,7 +15198,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7823">
+<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7841">
<summary>
Send and receive amavisd_recv_server packets.
</summary>
@@ -15125,7 +15209,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7839">
+<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7857">
<summary>
Do not audit attempts to send and receive amavisd_recv_server packets.
</summary>
@@ -15136,7 +15220,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7854">
+<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7872">
<summary>
Relabel packets to amavisd_recv_server the packet type.
</summary>
@@ -15146,7 +15230,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7876">
+<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7894">
<summary>
Send and receive TCP traffic on the amavisd_send port.
</summary>
@@ -15157,7 +15241,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_amavisd_send_port" lineno="7891">
+<interface name="corenet_udp_send_amavisd_send_port" lineno="7909">
<summary>
Send UDP traffic on the amavisd_send port.
</summary>
@@ -15168,7 +15252,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7906">
+<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7924">
<summary>
Do not audit attempts to send UDP traffic on the amavisd_send port.
</summary>
@@ -15179,7 +15263,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_amavisd_send_port" lineno="7921">
+<interface name="corenet_udp_receive_amavisd_send_port" lineno="7939">
<summary>
Receive UDP traffic on the amavisd_send port.
</summary>
@@ -15190,7 +15274,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7936">
+<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7954">
<summary>
Do not audit attempts to receive UDP traffic on the amavisd_send port.
</summary>
@@ -15201,7 +15285,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7951">
+<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7969">
<summary>
Send and receive UDP traffic on the amavisd_send port.
</summary>
@@ -15212,7 +15296,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7967">
+<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7985">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amavisd_send port.
@@ -15224,7 +15308,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_amavisd_send_port" lineno="7982">
+<interface name="corenet_tcp_bind_amavisd_send_port" lineno="8000">
<summary>
Bind TCP sockets to the amavisd_send port.
</summary>
@@ -15235,7 +15319,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amavisd_send_port" lineno="8002">
+<interface name="corenet_udp_bind_amavisd_send_port" lineno="8020">
<summary>
Bind UDP sockets to the amavisd_send port.
</summary>
@@ -15246,7 +15330,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8021">
+<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8039">
<summary>
Make a TCP connection to the amavisd_send port.
</summary>
@@ -15256,7 +15340,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_send_client_packets" lineno="8041">
+<interface name="corenet_send_amavisd_send_client_packets" lineno="8059">
<summary>
Send amavisd_send_client packets.
</summary>
@@ -15267,7 +15351,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8060">
+<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8078">
<summary>
Do not audit attempts to send amavisd_send_client packets.
</summary>
@@ -15278,7 +15362,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_send_client_packets" lineno="8079">
+<interface name="corenet_receive_amavisd_send_client_packets" lineno="8097">
<summary>
Receive amavisd_send_client packets.
</summary>
@@ -15289,7 +15373,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8098">
+<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8116">
<summary>
Do not audit attempts to receive amavisd_send_client packets.
</summary>
@@ -15300,7 +15384,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8117">
+<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8135">
<summary>
Send and receive amavisd_send_client packets.
</summary>
@@ -15311,7 +15395,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8133">
+<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8151">
<summary>
Do not audit attempts to send and receive amavisd_send_client packets.
</summary>
@@ -15322,7 +15406,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8148">
+<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8166">
<summary>
Relabel packets to amavisd_send_client the packet type.
</summary>
@@ -15332,7 +15416,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_send_server_packets" lineno="8168">
+<interface name="corenet_send_amavisd_send_server_packets" lineno="8186">
<summary>
Send amavisd_send_server packets.
</summary>
@@ -15343,7 +15427,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8187">
+<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8205">
<summary>
Do not audit attempts to send amavisd_send_server packets.
</summary>
@@ -15354,7 +15438,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_send_server_packets" lineno="8206">
+<interface name="corenet_receive_amavisd_send_server_packets" lineno="8224">
<summary>
Receive amavisd_send_server packets.
</summary>
@@ -15365,7 +15449,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8225">
+<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8243">
<summary>
Do not audit attempts to receive amavisd_send_server packets.
</summary>
@@ -15376,7 +15460,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8244">
+<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8262">
<summary>
Send and receive amavisd_send_server packets.
</summary>
@@ -15387,7 +15471,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8260">
+<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8278">
<summary>
Do not audit attempts to send and receive amavisd_send_server packets.
</summary>
@@ -15398,7 +15482,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8275">
+<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8293">
<summary>
Relabel packets to amavisd_send_server the packet type.
</summary>
@@ -15408,7 +15492,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8297">
+<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8315">
<summary>
Send and receive TCP traffic on the amqp port.
</summary>
@@ -15419,7 +15503,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_amqp_port" lineno="8312">
+<interface name="corenet_udp_send_amqp_port" lineno="8330">
<summary>
Send UDP traffic on the amqp port.
</summary>
@@ -15430,7 +15514,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8327">
+<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8345">
<summary>
Do not audit attempts to send UDP traffic on the amqp port.
</summary>
@@ -15441,7 +15525,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_amqp_port" lineno="8342">
+<interface name="corenet_udp_receive_amqp_port" lineno="8360">
<summary>
Receive UDP traffic on the amqp port.
</summary>
@@ -15452,7 +15536,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8357">
+<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8375">
<summary>
Do not audit attempts to receive UDP traffic on the amqp port.
</summary>
@@ -15463,7 +15547,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_amqp_port" lineno="8372">
+<interface name="corenet_udp_sendrecv_amqp_port" lineno="8390">
<summary>
Send and receive UDP traffic on the amqp port.
</summary>
@@ -15474,7 +15558,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8388">
+<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8406">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amqp port.
@@ -15486,7 +15570,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_amqp_port" lineno="8403">
+<interface name="corenet_tcp_bind_amqp_port" lineno="8421">
<summary>
Bind TCP sockets to the amqp port.
</summary>
@@ -15497,7 +15581,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amqp_port" lineno="8423">
+<interface name="corenet_udp_bind_amqp_port" lineno="8441">
<summary>
Bind UDP sockets to the amqp port.
</summary>
@@ -15508,7 +15592,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amqp_port" lineno="8442">
+<interface name="corenet_tcp_connect_amqp_port" lineno="8460">
<summary>
Make a TCP connection to the amqp port.
</summary>
@@ -15518,7 +15602,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amqp_client_packets" lineno="8462">
+<interface name="corenet_send_amqp_client_packets" lineno="8480">
<summary>
Send amqp_client packets.
</summary>
@@ -15529,7 +15613,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8481">
+<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8499">
<summary>
Do not audit attempts to send amqp_client packets.
</summary>
@@ -15540,7 +15624,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amqp_client_packets" lineno="8500">
+<interface name="corenet_receive_amqp_client_packets" lineno="8518">
<summary>
Receive amqp_client packets.
</summary>
@@ -15551,7 +15635,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8519">
+<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8537">
<summary>
Do not audit attempts to receive amqp_client packets.
</summary>
@@ -15562,7 +15646,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amqp_client_packets" lineno="8538">
+<interface name="corenet_sendrecv_amqp_client_packets" lineno="8556">
<summary>
Send and receive amqp_client packets.
</summary>
@@ -15573,7 +15657,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8554">
+<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8572">
<summary>
Do not audit attempts to send and receive amqp_client packets.
</summary>
@@ -15584,7 +15668,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amqp_client_packets" lineno="8569">
+<interface name="corenet_relabelto_amqp_client_packets" lineno="8587">
<summary>
Relabel packets to amqp_client the packet type.
</summary>
@@ -15594,7 +15678,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amqp_server_packets" lineno="8589">
+<interface name="corenet_send_amqp_server_packets" lineno="8607">
<summary>
Send amqp_server packets.
</summary>
@@ -15605,7 +15689,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8608">
+<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8626">
<summary>
Do not audit attempts to send amqp_server packets.
</summary>
@@ -15616,7 +15700,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amqp_server_packets" lineno="8627">
+<interface name="corenet_receive_amqp_server_packets" lineno="8645">
<summary>
Receive amqp_server packets.
</summary>
@@ -15627,7 +15711,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8646">
+<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8664">
<summary>
Do not audit attempts to receive amqp_server packets.
</summary>
@@ -15638,7 +15722,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amqp_server_packets" lineno="8665">
+<interface name="corenet_sendrecv_amqp_server_packets" lineno="8683">
<summary>
Send and receive amqp_server packets.
</summary>
@@ -15649,7 +15733,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8681">
+<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8699">
<summary>
Do not audit attempts to send and receive amqp_server packets.
</summary>
@@ -15660,7 +15744,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amqp_server_packets" lineno="8696">
+<interface name="corenet_relabelto_amqp_server_packets" lineno="8714">
<summary>
Relabel packets to amqp_server the packet type.
</summary>
@@ -15670,7 +15754,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_aol_port" lineno="8718">
+<interface name="corenet_tcp_sendrecv_aol_port" lineno="8736">
<summary>
Send and receive TCP traffic on the aol port.
</summary>
@@ -15681,7 +15765,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_aol_port" lineno="8733">
+<interface name="corenet_udp_send_aol_port" lineno="8751">
<summary>
Send UDP traffic on the aol port.
</summary>
@@ -15692,7 +15776,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8748">
+<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8766">
<summary>
Do not audit attempts to send UDP traffic on the aol port.
</summary>
@@ -15703,7 +15787,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_aol_port" lineno="8763">
+<interface name="corenet_udp_receive_aol_port" lineno="8781">
<summary>
Receive UDP traffic on the aol port.
</summary>
@@ -15714,7 +15798,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8778">
+<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8796">
<summary>
Do not audit attempts to receive UDP traffic on the aol port.
</summary>
@@ -15725,7 +15809,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_aol_port" lineno="8793">
+<interface name="corenet_udp_sendrecv_aol_port" lineno="8811">
<summary>
Send and receive UDP traffic on the aol port.
</summary>
@@ -15736,7 +15820,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8809">
+<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8827">
<summary>
Do not audit attempts to send and receive
UDP traffic on the aol port.
@@ -15748,7 +15832,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_aol_port" lineno="8824">
+<interface name="corenet_tcp_bind_aol_port" lineno="8842">
<summary>
Bind TCP sockets to the aol port.
</summary>
@@ -15759,7 +15843,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_aol_port" lineno="8844">
+<interface name="corenet_udp_bind_aol_port" lineno="8862">
<summary>
Bind UDP sockets to the aol port.
</summary>
@@ -15770,7 +15854,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_aol_port" lineno="8863">
+<interface name="corenet_tcp_connect_aol_port" lineno="8881">
<summary>
Make a TCP connection to the aol port.
</summary>
@@ -15780,7 +15864,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_aol_client_packets" lineno="8883">
+<interface name="corenet_send_aol_client_packets" lineno="8901">
<summary>
Send aol_client packets.
</summary>
@@ -15791,7 +15875,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8902">
+<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8920">
<summary>
Do not audit attempts to send aol_client packets.
</summary>
@@ -15802,7 +15886,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_aol_client_packets" lineno="8921">
+<interface name="corenet_receive_aol_client_packets" lineno="8939">
<summary>
Receive aol_client packets.
</summary>
@@ -15813,7 +15897,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8940">
+<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8958">
<summary>
Do not audit attempts to receive aol_client packets.
</summary>
@@ -15824,7 +15908,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_aol_client_packets" lineno="8959">
+<interface name="corenet_sendrecv_aol_client_packets" lineno="8977">
<summary>
Send and receive aol_client packets.
</summary>
@@ -15835,7 +15919,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8975">
+<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8993">
<summary>
Do not audit attempts to send and receive aol_client packets.
</summary>
@@ -15846,7 +15930,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_aol_client_packets" lineno="8990">
+<interface name="corenet_relabelto_aol_client_packets" lineno="9008">
<summary>
Relabel packets to aol_client the packet type.
</summary>
@@ -15856,7 +15940,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_aol_server_packets" lineno="9010">
+<interface name="corenet_send_aol_server_packets" lineno="9028">
<summary>
Send aol_server packets.
</summary>
@@ -15867,7 +15951,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9029">
+<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9047">
<summary>
Do not audit attempts to send aol_server packets.
</summary>
@@ -15878,7 +15962,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_aol_server_packets" lineno="9048">
+<interface name="corenet_receive_aol_server_packets" lineno="9066">
<summary>
Receive aol_server packets.
</summary>
@@ -15889,7 +15973,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9067">
+<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9085">
<summary>
Do not audit attempts to receive aol_server packets.
</summary>
@@ -15900,7 +15984,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_aol_server_packets" lineno="9086">
+<interface name="corenet_sendrecv_aol_server_packets" lineno="9104">
<summary>
Send and receive aol_server packets.
</summary>
@@ -15911,7 +15995,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9102">
+<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9120">
<summary>
Do not audit attempts to send and receive aol_server packets.
</summary>
@@ -15922,7 +16006,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_aol_server_packets" lineno="9117">
+<interface name="corenet_relabelto_aol_server_packets" lineno="9135">
<summary>
Relabel packets to aol_server the packet type.
</summary>
@@ -15932,7 +16016,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9139">
+<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9157">
<summary>
Send and receive TCP traffic on the apcupsd port.
</summary>
@@ -15943,7 +16027,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_apcupsd_port" lineno="9154">
+<interface name="corenet_udp_send_apcupsd_port" lineno="9172">
<summary>
Send UDP traffic on the apcupsd port.
</summary>
@@ -15954,7 +16038,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9169">
+<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9187">
<summary>
Do not audit attempts to send UDP traffic on the apcupsd port.
</summary>
@@ -15965,7 +16049,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_apcupsd_port" lineno="9184">
+<interface name="corenet_udp_receive_apcupsd_port" lineno="9202">
<summary>
Receive UDP traffic on the apcupsd port.
</summary>
@@ -15976,7 +16060,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9199">
+<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9217">
<summary>
Do not audit attempts to receive UDP traffic on the apcupsd port.
</summary>
@@ -15987,7 +16071,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9214">
+<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9232">
<summary>
Send and receive UDP traffic on the apcupsd port.
</summary>
@@ -15998,7 +16082,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9230">
+<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9248">
<summary>
Do not audit attempts to send and receive
UDP traffic on the apcupsd port.
@@ -16010,7 +16094,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_apcupsd_port" lineno="9245">
+<interface name="corenet_tcp_bind_apcupsd_port" lineno="9263">
<summary>
Bind TCP sockets to the apcupsd port.
</summary>
@@ -16021,7 +16105,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_apcupsd_port" lineno="9265">
+<interface name="corenet_udp_bind_apcupsd_port" lineno="9283">
<summary>
Bind UDP sockets to the apcupsd port.
</summary>
@@ -16032,7 +16116,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_apcupsd_port" lineno="9284">
+<interface name="corenet_tcp_connect_apcupsd_port" lineno="9302">
<summary>
Make a TCP connection to the apcupsd port.
</summary>
@@ -16042,7 +16126,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apcupsd_client_packets" lineno="9304">
+<interface name="corenet_send_apcupsd_client_packets" lineno="9322">
<summary>
Send apcupsd_client packets.
</summary>
@@ -16053,7 +16137,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9323">
+<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9341">
<summary>
Do not audit attempts to send apcupsd_client packets.
</summary>
@@ -16064,7 +16148,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apcupsd_client_packets" lineno="9342">
+<interface name="corenet_receive_apcupsd_client_packets" lineno="9360">
<summary>
Receive apcupsd_client packets.
</summary>
@@ -16075,7 +16159,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9361">
+<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9379">
<summary>
Do not audit attempts to receive apcupsd_client packets.
</summary>
@@ -16086,7 +16170,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9380">
+<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9398">
<summary>
Send and receive apcupsd_client packets.
</summary>
@@ -16097,7 +16181,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9396">
+<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9414">
<summary>
Do not audit attempts to send and receive apcupsd_client packets.
</summary>
@@ -16108,7 +16192,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9411">
+<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9429">
<summary>
Relabel packets to apcupsd_client the packet type.
</summary>
@@ -16118,7 +16202,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apcupsd_server_packets" lineno="9431">
+<interface name="corenet_send_apcupsd_server_packets" lineno="9449">
<summary>
Send apcupsd_server packets.
</summary>
@@ -16129,7 +16213,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9450">
+<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9468">
<summary>
Do not audit attempts to send apcupsd_server packets.
</summary>
@@ -16140,7 +16224,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apcupsd_server_packets" lineno="9469">
+<interface name="corenet_receive_apcupsd_server_packets" lineno="9487">
<summary>
Receive apcupsd_server packets.
</summary>
@@ -16151,7 +16235,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9488">
+<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9506">
<summary>
Do not audit attempts to receive apcupsd_server packets.
</summary>
@@ -16162,7 +16246,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9507">
+<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9525">
<summary>
Send and receive apcupsd_server packets.
</summary>
@@ -16173,7 +16257,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9523">
+<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9541">
<summary>
Do not audit attempts to send and receive apcupsd_server packets.
</summary>
@@ -16184,7 +16268,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9538">
+<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9556">
<summary>
Relabel packets to apcupsd_server the packet type.
</summary>
@@ -16194,7 +16278,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9560">
+<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9578">
<summary>
Send and receive TCP traffic on the apertus_ldp port.
</summary>
@@ -16205,7 +16289,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_apertus_ldp_port" lineno="9575">
+<interface name="corenet_udp_send_apertus_ldp_port" lineno="9593">
<summary>
Send UDP traffic on the apertus_ldp port.
</summary>
@@ -16216,7 +16300,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9590">
+<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9608">
<summary>
Do not audit attempts to send UDP traffic on the apertus_ldp port.
</summary>
@@ -16227,7 +16311,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9605">
+<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9623">
<summary>
Receive UDP traffic on the apertus_ldp port.
</summary>
@@ -16238,7 +16322,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9620">
+<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9638">
<summary>
Do not audit attempts to receive UDP traffic on the apertus_ldp port.
</summary>
@@ -16249,7 +16333,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9635">
+<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9653">
<summary>
Send and receive UDP traffic on the apertus_ldp port.
</summary>
@@ -16260,7 +16344,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9651">
+<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9669">
<summary>
Do not audit attempts to send and receive
UDP traffic on the apertus_ldp port.
@@ -16272,7 +16356,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9666">
+<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9684">
<summary>
Bind TCP sockets to the apertus_ldp port.
</summary>
@@ -16283,7 +16367,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9686">
+<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9704">
<summary>
Bind UDP sockets to the apertus_ldp port.
</summary>
@@ -16294,7 +16378,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9705">
+<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9723">
<summary>
Make a TCP connection to the apertus_ldp port.
</summary>
@@ -16304,7 +16388,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apertus_ldp_client_packets" lineno="9725">
+<interface name="corenet_send_apertus_ldp_client_packets" lineno="9743">
<summary>
Send apertus_ldp_client packets.
</summary>
@@ -16315,7 +16399,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9744">
+<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9762">
<summary>
Do not audit attempts to send apertus_ldp_client packets.
</summary>
@@ -16326,7 +16410,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9763">
+<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9781">
<summary>
Receive apertus_ldp_client packets.
</summary>
@@ -16337,7 +16421,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9782">
+<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9800">
<summary>
Do not audit attempts to receive apertus_ldp_client packets.
</summary>
@@ -16348,7 +16432,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9801">
+<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9819">
<summary>
Send and receive apertus_ldp_client packets.
</summary>
@@ -16359,7 +16443,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9817">
+<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9835">
<summary>
Do not audit attempts to send and receive apertus_ldp_client packets.
</summary>
@@ -16370,7 +16454,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9832">
+<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9850">
<summary>
Relabel packets to apertus_ldp_client the packet type.
</summary>
@@ -16380,7 +16464,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apertus_ldp_server_packets" lineno="9852">
+<interface name="corenet_send_apertus_ldp_server_packets" lineno="9870">
<summary>
Send apertus_ldp_server packets.
</summary>
@@ -16391,7 +16475,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9871">
+<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9889">
<summary>
Do not audit attempts to send apertus_ldp_server packets.
</summary>
@@ -16402,7 +16486,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9890">
+<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9908">
<summary>
Receive apertus_ldp_server packets.
</summary>
@@ -16413,7 +16497,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9909">
+<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9927">
<summary>
Do not audit attempts to receive apertus_ldp_server packets.
</summary>
@@ -16424,7 +16508,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9928">
+<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9946">
<summary>
Send and receive apertus_ldp_server packets.
</summary>
@@ -16435,7 +16519,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9944">
+<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9962">
<summary>
Do not audit attempts to send and receive apertus_ldp_server packets.
</summary>
@@ -16446,7 +16530,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9959">
+<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9977">
<summary>
Relabel packets to apertus_ldp_server the packet type.
</summary>
@@ -16456,7 +16540,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_aptcacher_port" lineno="9981">
+<interface name="corenet_tcp_sendrecv_aptcacher_port" lineno="9999">
<summary>
Send and receive TCP traffic on the aptcacher port.
</summary>
@@ -16467,7 +16551,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_aptcacher_port" lineno="9996">
+<interface name="corenet_udp_send_aptcacher_port" lineno="10014">
<summary>
Send UDP traffic on the aptcacher port.
</summary>
@@ -16478,7 +16562,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_aptcacher_port" lineno="10011">
+<interface name="corenet_dontaudit_udp_send_aptcacher_port" lineno="10029">
<summary>
Do not audit attempts to send UDP traffic on the aptcacher port.
</summary>
@@ -16489,7 +16573,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_aptcacher_port" lineno="10026">
+<interface name="corenet_udp_receive_aptcacher_port" lineno="10044">
<summary>
Receive UDP traffic on the aptcacher port.
</summary>
@@ -16500,7 +16584,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_aptcacher_port" lineno="10041">
+<interface name="corenet_dontaudit_udp_receive_aptcacher_port" lineno="10059">
<summary>
Do not audit attempts to receive UDP traffic on the aptcacher port.
</summary>
@@ -16511,7 +16595,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_aptcacher_port" lineno="10056">
+<interface name="corenet_udp_sendrecv_aptcacher_port" lineno="10074">
<summary>
Send and receive UDP traffic on the aptcacher port.
</summary>
@@ -16522,7 +16606,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_aptcacher_port" lineno="10072">
+<interface name="corenet_dontaudit_udp_sendrecv_aptcacher_port" lineno="10090">
<summary>
Do not audit attempts to send and receive
UDP traffic on the aptcacher port.
@@ -16534,7 +16618,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_aptcacher_port" lineno="10087">
+<interface name="corenet_tcp_bind_aptcacher_port" lineno="10105">
<summary>
Bind TCP sockets to the aptcacher port.
</summary>
@@ -16545,7 +16629,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_aptcacher_port" lineno="10107">
+<interface name="corenet_udp_bind_aptcacher_port" lineno="10125">
<summary>
Bind UDP sockets to the aptcacher port.
</summary>
@@ -16556,7 +16640,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_aptcacher_port" lineno="10126">
+<interface name="corenet_tcp_connect_aptcacher_port" lineno="10144">
<summary>
Make a TCP connection to the aptcacher port.
</summary>
@@ -16566,7 +16650,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_aptcacher_client_packets" lineno="10146">
+<interface name="corenet_send_aptcacher_client_packets" lineno="10164">
<summary>
Send aptcacher_client packets.
</summary>
@@ -16577,7 +16661,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="10165">
+<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="10183">
<summary>
Do not audit attempts to send aptcacher_client packets.
</summary>
@@ -16588,7 +16672,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_aptcacher_client_packets" lineno="10184">
+<interface name="corenet_receive_aptcacher_client_packets" lineno="10202">
<summary>
Receive aptcacher_client packets.
</summary>
@@ -16599,7 +16683,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="10203">
+<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="10221">
<summary>
Do not audit attempts to receive aptcacher_client packets.
</summary>
@@ -16610,7 +16694,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="10222">
+<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="10240">
<summary>
Send and receive aptcacher_client packets.
</summary>
@@ -16621,7 +16705,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="10238">
+<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="10256">
<summary>
Do not audit attempts to send and receive aptcacher_client packets.
</summary>
@@ -16632,7 +16716,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_aptcacher_client_packets" lineno="10253">
+<interface name="corenet_relabelto_aptcacher_client_packets" lineno="10271">
<summary>
Relabel packets to aptcacher_client the packet type.
</summary>
@@ -16642,7 +16726,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_aptcacher_server_packets" lineno="10273">
+<interface name="corenet_send_aptcacher_server_packets" lineno="10291">
<summary>
Send aptcacher_server packets.
</summary>
@@ -16653,7 +16737,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="10292">
+<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="10310">
<summary>
Do not audit attempts to send aptcacher_server packets.
</summary>
@@ -16664,7 +16748,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_aptcacher_server_packets" lineno="10311">
+<interface name="corenet_receive_aptcacher_server_packets" lineno="10329">
<summary>
Receive aptcacher_server packets.
</summary>
@@ -16675,7 +16759,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="10330">
+<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="10348">
<summary>
Do not audit attempts to receive aptcacher_server packets.
</summary>
@@ -16686,7 +16770,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="10349">
+<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="10367">
<summary>
Send and receive aptcacher_server packets.
</summary>
@@ -16697,7 +16781,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="10365">
+<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="10383">
<summary>
Do not audit attempts to send and receive aptcacher_server packets.
</summary>
@@ -16708,7 +16792,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_aptcacher_server_packets" lineno="10380">
+<interface name="corenet_relabelto_aptcacher_server_packets" lineno="10398">
<summary>
Relabel packets to aptcacher_server the packet type.
</summary>
@@ -16718,7 +16802,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10402">
+<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10420">
<summary>
Send and receive TCP traffic on the armtechdaemon port.
</summary>
@@ -16729,7 +16813,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_armtechdaemon_port" lineno="10417">
+<interface name="corenet_udp_send_armtechdaemon_port" lineno="10435">
<summary>
Send UDP traffic on the armtechdaemon port.
</summary>
@@ -16740,7 +16824,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10432">
+<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10450">
<summary>
Do not audit attempts to send UDP traffic on the armtechdaemon port.
</summary>
@@ -16751,7 +16835,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10447">
+<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10465">
<summary>
Receive UDP traffic on the armtechdaemon port.
</summary>
@@ -16762,7 +16846,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10462">
+<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10480">
<summary>
Do not audit attempts to receive UDP traffic on the armtechdaemon port.
</summary>
@@ -16773,7 +16857,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10477">
+<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10495">
<summary>
Send and receive UDP traffic on the armtechdaemon port.
</summary>
@@ -16784,7 +16868,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10493">
+<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10511">
<summary>
Do not audit attempts to send and receive
UDP traffic on the armtechdaemon port.
@@ -16796,7 +16880,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10508">
+<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10526">
<summary>
Bind TCP sockets to the armtechdaemon port.
</summary>
@@ -16807,7 +16891,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10528">
+<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10546">
<summary>
Bind UDP sockets to the armtechdaemon port.
</summary>
@@ -16818,7 +16902,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10547">
+<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10565">
<summary>
Make a TCP connection to the armtechdaemon port.
</summary>
@@ -16828,7 +16912,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_armtechdaemon_client_packets" lineno="10567">
+<interface name="corenet_send_armtechdaemon_client_packets" lineno="10585">
<summary>
Send armtechdaemon_client packets.
</summary>
@@ -16839,7 +16923,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10586">
+<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10604">
<summary>
Do not audit attempts to send armtechdaemon_client packets.
</summary>
@@ -16850,7 +16934,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10605">
+<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10623">
<summary>
Receive armtechdaemon_client packets.
</summary>
@@ -16861,7 +16945,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10624">
+<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10642">
<summary>
Do not audit attempts to receive armtechdaemon_client packets.
</summary>
@@ -16872,7 +16956,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10643">
+<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10661">
<summary>
Send and receive armtechdaemon_client packets.
</summary>
@@ -16883,7 +16967,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10659">
+<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10677">
<summary>
Do not audit attempts to send and receive armtechdaemon_client packets.
</summary>
@@ -16894,7 +16978,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10674">
+<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10692">
<summary>
Relabel packets to armtechdaemon_client the packet type.
</summary>
@@ -16904,7 +16988,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_armtechdaemon_server_packets" lineno="10694">
+<interface name="corenet_send_armtechdaemon_server_packets" lineno="10712">
<summary>
Send armtechdaemon_server packets.
</summary>
@@ -16915,7 +16999,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10713">
+<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10731">
<summary>
Do not audit attempts to send armtechdaemon_server packets.
</summary>
@@ -16926,7 +17010,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10732">
+<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10750">
<summary>
Receive armtechdaemon_server packets.
</summary>
@@ -16937,7 +17021,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10751">
+<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10769">
<summary>
Do not audit attempts to receive armtechdaemon_server packets.
</summary>
@@ -16948,7 +17032,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10770">
+<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10788">
<summary>
Send and receive armtechdaemon_server packets.
</summary>
@@ -16959,7 +17043,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10786">
+<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10804">
<summary>
Do not audit attempts to send and receive armtechdaemon_server packets.
</summary>
@@ -16970,7 +17054,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10801">
+<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10819">
<summary>
Relabel packets to armtechdaemon_server the packet type.
</summary>
@@ -16980,7 +17064,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10823">
+<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10841">
<summary>
Send and receive TCP traffic on the asterisk port.
</summary>
@@ -16991,7 +17075,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_asterisk_port" lineno="10838">
+<interface name="corenet_udp_send_asterisk_port" lineno="10856">
<summary>
Send UDP traffic on the asterisk port.
</summary>
@@ -17002,7 +17086,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10853">
+<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10871">
<summary>
Do not audit attempts to send UDP traffic on the asterisk port.
</summary>
@@ -17013,7 +17097,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_asterisk_port" lineno="10868">
+<interface name="corenet_udp_receive_asterisk_port" lineno="10886">
<summary>
Receive UDP traffic on the asterisk port.
</summary>
@@ -17024,7 +17108,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10883">
+<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10901">
<summary>
Do not audit attempts to receive UDP traffic on the asterisk port.
</summary>
@@ -17035,7 +17119,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10898">
+<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10916">
<summary>
Send and receive UDP traffic on the asterisk port.
</summary>
@@ -17046,7 +17130,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10914">
+<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10932">
<summary>
Do not audit attempts to send and receive
UDP traffic on the asterisk port.
@@ -17058,7 +17142,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_asterisk_port" lineno="10929">
+<interface name="corenet_tcp_bind_asterisk_port" lineno="10947">
<summary>
Bind TCP sockets to the asterisk port.
</summary>
@@ -17069,7 +17153,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_asterisk_port" lineno="10949">
+<interface name="corenet_udp_bind_asterisk_port" lineno="10967">
<summary>
Bind UDP sockets to the asterisk port.
</summary>
@@ -17080,7 +17164,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_asterisk_port" lineno="10968">
+<interface name="corenet_tcp_connect_asterisk_port" lineno="10986">
<summary>
Make a TCP connection to the asterisk port.
</summary>
@@ -17090,7 +17174,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_asterisk_client_packets" lineno="10988">
+<interface name="corenet_send_asterisk_client_packets" lineno="11006">
<summary>
Send asterisk_client packets.
</summary>
@@ -17101,7 +17185,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="11007">
+<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="11025">
<summary>
Do not audit attempts to send asterisk_client packets.
</summary>
@@ -17112,7 +17196,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_asterisk_client_packets" lineno="11026">
+<interface name="corenet_receive_asterisk_client_packets" lineno="11044">
<summary>
Receive asterisk_client packets.
</summary>
@@ -17123,7 +17207,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="11045">
+<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="11063">
<summary>
Do not audit attempts to receive asterisk_client packets.
</summary>
@@ -17134,7 +17218,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_asterisk_client_packets" lineno="11064">
+<interface name="corenet_sendrecv_asterisk_client_packets" lineno="11082">
<summary>
Send and receive asterisk_client packets.
</summary>
@@ -17145,7 +17229,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="11080">
+<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="11098">
<summary>
Do not audit attempts to send and receive asterisk_client packets.
</summary>
@@ -17156,7 +17240,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_asterisk_client_packets" lineno="11095">
+<interface name="corenet_relabelto_asterisk_client_packets" lineno="11113">
<summary>
Relabel packets to asterisk_client the packet type.
</summary>
@@ -17166,7 +17250,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_asterisk_server_packets" lineno="11115">
+<interface name="corenet_send_asterisk_server_packets" lineno="11133">
<summary>
Send asterisk_server packets.
</summary>
@@ -17177,7 +17261,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11134">
+<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11152">
<summary>
Do not audit attempts to send asterisk_server packets.
</summary>
@@ -17188,7 +17272,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_asterisk_server_packets" lineno="11153">
+<interface name="corenet_receive_asterisk_server_packets" lineno="11171">
<summary>
Receive asterisk_server packets.
</summary>
@@ -17199,7 +17283,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11172">
+<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11190">
<summary>
Do not audit attempts to receive asterisk_server packets.
</summary>
@@ -17210,7 +17294,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11191">
+<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11209">
<summary>
Send and receive asterisk_server packets.
</summary>
@@ -17221,7 +17305,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11207">
+<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11225">
<summary>
Do not audit attempts to send and receive asterisk_server packets.
</summary>
@@ -17232,7 +17316,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_asterisk_server_packets" lineno="11222">
+<interface name="corenet_relabelto_asterisk_server_packets" lineno="11240">
<summary>
Relabel packets to asterisk_server the packet type.
</summary>
@@ -17242,7 +17326,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_audit_port" lineno="11244">
+<interface name="corenet_tcp_sendrecv_audit_port" lineno="11262">
<summary>
Send and receive TCP traffic on the audit port.
</summary>
@@ -17253,7 +17337,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_audit_port" lineno="11259">
+<interface name="corenet_udp_send_audit_port" lineno="11277">
<summary>
Send UDP traffic on the audit port.
</summary>
@@ -17264,7 +17348,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11274">
+<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11292">
<summary>
Do not audit attempts to send UDP traffic on the audit port.
</summary>
@@ -17275,7 +17359,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_audit_port" lineno="11289">
+<interface name="corenet_udp_receive_audit_port" lineno="11307">
<summary>
Receive UDP traffic on the audit port.
</summary>
@@ -17286,7 +17370,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11304">
+<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11322">
<summary>
Do not audit attempts to receive UDP traffic on the audit port.
</summary>
@@ -17297,7 +17381,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_audit_port" lineno="11319">
+<interface name="corenet_udp_sendrecv_audit_port" lineno="11337">
<summary>
Send and receive UDP traffic on the audit port.
</summary>
@@ -17308,7 +17392,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11335">
+<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11353">
<summary>
Do not audit attempts to send and receive
UDP traffic on the audit port.
@@ -17320,7 +17404,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_audit_port" lineno="11350">
+<interface name="corenet_tcp_bind_audit_port" lineno="11368">
<summary>
Bind TCP sockets to the audit port.
</summary>
@@ -17331,7 +17415,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_audit_port" lineno="11370">
+<interface name="corenet_udp_bind_audit_port" lineno="11388">
<summary>
Bind UDP sockets to the audit port.
</summary>
@@ -17342,7 +17426,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_audit_port" lineno="11389">
+<interface name="corenet_tcp_connect_audit_port" lineno="11407">
<summary>
Make a TCP connection to the audit port.
</summary>
@@ -17352,7 +17436,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_audit_client_packets" lineno="11409">
+<interface name="corenet_send_audit_client_packets" lineno="11427">
<summary>
Send audit_client packets.
</summary>
@@ -17363,7 +17447,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11428">
+<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11446">
<summary>
Do not audit attempts to send audit_client packets.
</summary>
@@ -17374,7 +17458,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_audit_client_packets" lineno="11447">
+<interface name="corenet_receive_audit_client_packets" lineno="11465">
<summary>
Receive audit_client packets.
</summary>
@@ -17385,7 +17469,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11466">
+<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11484">
<summary>
Do not audit attempts to receive audit_client packets.
</summary>
@@ -17396,7 +17480,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_audit_client_packets" lineno="11485">
+<interface name="corenet_sendrecv_audit_client_packets" lineno="11503">
<summary>
Send and receive audit_client packets.
</summary>
@@ -17407,7 +17491,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11501">
+<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11519">
<summary>
Do not audit attempts to send and receive audit_client packets.
</summary>
@@ -17418,7 +17502,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_audit_client_packets" lineno="11516">
+<interface name="corenet_relabelto_audit_client_packets" lineno="11534">
<summary>
Relabel packets to audit_client the packet type.
</summary>
@@ -17428,7 +17512,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_audit_server_packets" lineno="11536">
+<interface name="corenet_send_audit_server_packets" lineno="11554">
<summary>
Send audit_server packets.
</summary>
@@ -17439,7 +17523,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11555">
+<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11573">
<summary>
Do not audit attempts to send audit_server packets.
</summary>
@@ -17450,7 +17534,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_audit_server_packets" lineno="11574">
+<interface name="corenet_receive_audit_server_packets" lineno="11592">
<summary>
Receive audit_server packets.
</summary>
@@ -17461,7 +17545,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11593">
+<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11611">
<summary>
Do not audit attempts to receive audit_server packets.
</summary>
@@ -17472,7 +17556,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_audit_server_packets" lineno="11612">
+<interface name="corenet_sendrecv_audit_server_packets" lineno="11630">
<summary>
Send and receive audit_server packets.
</summary>
@@ -17483,7 +17567,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11628">
+<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11646">
<summary>
Do not audit attempts to send and receive audit_server packets.
</summary>
@@ -17494,7 +17578,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_audit_server_packets" lineno="11643">
+<interface name="corenet_relabelto_audit_server_packets" lineno="11661">
<summary>
Relabel packets to audit_server the packet type.
</summary>
@@ -17504,7 +17588,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_auth_port" lineno="11665">
+<interface name="corenet_tcp_sendrecv_auth_port" lineno="11683">
<summary>
Send and receive TCP traffic on the auth port.
</summary>
@@ -17515,7 +17599,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_auth_port" lineno="11680">
+<interface name="corenet_udp_send_auth_port" lineno="11698">
<summary>
Send UDP traffic on the auth port.
</summary>
@@ -17526,7 +17610,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11695">
+<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11713">
<summary>
Do not audit attempts to send UDP traffic on the auth port.
</summary>
@@ -17537,7 +17621,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_auth_port" lineno="11710">
+<interface name="corenet_udp_receive_auth_port" lineno="11728">
<summary>
Receive UDP traffic on the auth port.
</summary>
@@ -17548,7 +17632,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11725">
+<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11743">
<summary>
Do not audit attempts to receive UDP traffic on the auth port.
</summary>
@@ -17559,7 +17643,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_auth_port" lineno="11740">
+<interface name="corenet_udp_sendrecv_auth_port" lineno="11758">
<summary>
Send and receive UDP traffic on the auth port.
</summary>
@@ -17570,7 +17654,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11756">
+<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11774">
<summary>
Do not audit attempts to send and receive
UDP traffic on the auth port.
@@ -17582,7 +17666,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_auth_port" lineno="11771">
+<interface name="corenet_tcp_bind_auth_port" lineno="11789">
<summary>
Bind TCP sockets to the auth port.
</summary>
@@ -17593,7 +17677,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_auth_port" lineno="11791">
+<interface name="corenet_udp_bind_auth_port" lineno="11809">
<summary>
Bind UDP sockets to the auth port.
</summary>
@@ -17604,7 +17688,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_auth_port" lineno="11810">
+<interface name="corenet_tcp_connect_auth_port" lineno="11828">
<summary>
Make a TCP connection to the auth port.
</summary>
@@ -17614,7 +17698,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_auth_client_packets" lineno="11830">
+<interface name="corenet_send_auth_client_packets" lineno="11848">
<summary>
Send auth_client packets.
</summary>
@@ -17625,7 +17709,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11849">
+<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11867">
<summary>
Do not audit attempts to send auth_client packets.
</summary>
@@ -17636,7 +17720,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_auth_client_packets" lineno="11868">
+<interface name="corenet_receive_auth_client_packets" lineno="11886">
<summary>
Receive auth_client packets.
</summary>
@@ -17647,7 +17731,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11887">
+<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11905">
<summary>
Do not audit attempts to receive auth_client packets.
</summary>
@@ -17658,7 +17742,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_auth_client_packets" lineno="11906">
+<interface name="corenet_sendrecv_auth_client_packets" lineno="11924">
<summary>
Send and receive auth_client packets.
</summary>
@@ -17669,7 +17753,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11922">
+<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11940">
<summary>
Do not audit attempts to send and receive auth_client packets.
</summary>
@@ -17680,7 +17764,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_auth_client_packets" lineno="11937">
+<interface name="corenet_relabelto_auth_client_packets" lineno="11955">
<summary>
Relabel packets to auth_client the packet type.
</summary>
@@ -17690,7 +17774,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_auth_server_packets" lineno="11957">
+<interface name="corenet_send_auth_server_packets" lineno="11975">
<summary>
Send auth_server packets.
</summary>
@@ -17701,7 +17785,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11976">
+<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11994">
<summary>
Do not audit attempts to send auth_server packets.
</summary>
@@ -17712,7 +17796,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_auth_server_packets" lineno="11995">
+<interface name="corenet_receive_auth_server_packets" lineno="12013">
<summary>
Receive auth_server packets.
</summary>
@@ -17723,7 +17807,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="12014">
+<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="12032">
<summary>
Do not audit attempts to receive auth_server packets.
</summary>
@@ -17734,7 +17818,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_auth_server_packets" lineno="12033">
+<interface name="corenet_sendrecv_auth_server_packets" lineno="12051">
<summary>
Send and receive auth_server packets.
</summary>
@@ -17745,7 +17829,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="12049">
+<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="12067">
<summary>
Do not audit attempts to send and receive auth_server packets.
</summary>
@@ -17756,7 +17840,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_auth_server_packets" lineno="12064">
+<interface name="corenet_relabelto_auth_server_packets" lineno="12082">
<summary>
Relabel packets to auth_server the packet type.
</summary>
@@ -17766,7 +17850,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12086">
+<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12104">
<summary>
Send and receive TCP traffic on the bgp port.
</summary>
@@ -17777,7 +17861,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_bgp_port" lineno="12101">
+<interface name="corenet_udp_send_bgp_port" lineno="12119">
<summary>
Send UDP traffic on the bgp port.
</summary>
@@ -17788,7 +17872,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12116">
+<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12134">
<summary>
Do not audit attempts to send UDP traffic on the bgp port.
</summary>
@@ -17799,7 +17883,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_bgp_port" lineno="12131">
+<interface name="corenet_udp_receive_bgp_port" lineno="12149">
<summary>
Receive UDP traffic on the bgp port.
</summary>
@@ -17810,7 +17894,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12146">
+<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12164">
<summary>
Do not audit attempts to receive UDP traffic on the bgp port.
</summary>
@@ -17821,7 +17905,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_bgp_port" lineno="12161">
+<interface name="corenet_udp_sendrecv_bgp_port" lineno="12179">
<summary>
Send and receive UDP traffic on the bgp port.
</summary>
@@ -17832,7 +17916,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12177">
+<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12195">
<summary>
Do not audit attempts to send and receive
UDP traffic on the bgp port.
@@ -17844,7 +17928,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_bgp_port" lineno="12192">
+<interface name="corenet_tcp_bind_bgp_port" lineno="12210">
<summary>
Bind TCP sockets to the bgp port.
</summary>
@@ -17855,7 +17939,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_bgp_port" lineno="12212">
+<interface name="corenet_udp_bind_bgp_port" lineno="12230">
<summary>
Bind UDP sockets to the bgp port.
</summary>
@@ -17866,7 +17950,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_bgp_port" lineno="12231">
+<interface name="corenet_tcp_connect_bgp_port" lineno="12249">
<summary>
Make a TCP connection to the bgp port.
</summary>
@@ -17876,7 +17960,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bgp_client_packets" lineno="12251">
+<interface name="corenet_send_bgp_client_packets" lineno="12269">
<summary>
Send bgp_client packets.
</summary>
@@ -17887,7 +17971,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12270">
+<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12288">
<summary>
Do not audit attempts to send bgp_client packets.
</summary>
@@ -17898,7 +17982,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bgp_client_packets" lineno="12289">
+<interface name="corenet_receive_bgp_client_packets" lineno="12307">
<summary>
Receive bgp_client packets.
</summary>
@@ -17909,7 +17993,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12308">
+<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12326">
<summary>
Do not audit attempts to receive bgp_client packets.
</summary>
@@ -17920,7 +18004,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bgp_client_packets" lineno="12327">
+<interface name="corenet_sendrecv_bgp_client_packets" lineno="12345">
<summary>
Send and receive bgp_client packets.
</summary>
@@ -17931,7 +18015,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12343">
+<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12361">
<summary>
Do not audit attempts to send and receive bgp_client packets.
</summary>
@@ -17942,7 +18026,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bgp_client_packets" lineno="12358">
+<interface name="corenet_relabelto_bgp_client_packets" lineno="12376">
<summary>
Relabel packets to bgp_client the packet type.
</summary>
@@ -17952,7 +18036,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bgp_server_packets" lineno="12378">
+<interface name="corenet_send_bgp_server_packets" lineno="12396">
<summary>
Send bgp_server packets.
</summary>
@@ -17963,7 +18047,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12397">
+<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12415">
<summary>
Do not audit attempts to send bgp_server packets.
</summary>
@@ -17974,7 +18058,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bgp_server_packets" lineno="12416">
+<interface name="corenet_receive_bgp_server_packets" lineno="12434">
<summary>
Receive bgp_server packets.
</summary>
@@ -17985,7 +18069,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12435">
+<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12453">
<summary>
Do not audit attempts to receive bgp_server packets.
</summary>
@@ -17996,7 +18080,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bgp_server_packets" lineno="12454">
+<interface name="corenet_sendrecv_bgp_server_packets" lineno="12472">
<summary>
Send and receive bgp_server packets.
</summary>
@@ -18007,7 +18091,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12470">
+<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12488">
<summary>
Do not audit attempts to send and receive bgp_server packets.
</summary>
@@ -18018,7 +18102,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bgp_server_packets" lineno="12485">
+<interface name="corenet_relabelto_bgp_server_packets" lineno="12503">
<summary>
Relabel packets to bgp_server the packet type.
</summary>
@@ -18028,7 +18112,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12507">
+<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12525">
<summary>
Send and receive TCP traffic on the bitcoin port.
</summary>
@@ -18039,7 +18123,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_bitcoin_port" lineno="12522">
+<interface name="corenet_udp_send_bitcoin_port" lineno="12540">
<summary>
Send UDP traffic on the bitcoin port.
</summary>
@@ -18050,7 +18134,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12537">
+<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12555">
<summary>
Do not audit attempts to send UDP traffic on the bitcoin port.
</summary>
@@ -18061,7 +18145,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_bitcoin_port" lineno="12552">
+<interface name="corenet_udp_receive_bitcoin_port" lineno="12570">
<summary>
Receive UDP traffic on the bitcoin port.
</summary>
@@ -18072,7 +18156,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12567">
+<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12585">
<summary>
Do not audit attempts to receive UDP traffic on the bitcoin port.
</summary>
@@ -18083,7 +18167,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12582">
+<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12600">
<summary>
Send and receive UDP traffic on the bitcoin port.
</summary>
@@ -18094,7 +18178,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12598">
+<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12616">
<summary>
Do not audit attempts to send and receive
UDP traffic on the bitcoin port.
@@ -18106,7 +18190,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_bitcoin_port" lineno="12613">
+<interface name="corenet_tcp_bind_bitcoin_port" lineno="12631">
<summary>
Bind TCP sockets to the bitcoin port.
</summary>
@@ -18117,7 +18201,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_bitcoin_port" lineno="12633">
+<interface name="corenet_udp_bind_bitcoin_port" lineno="12651">
<summary>
Bind UDP sockets to the bitcoin port.
</summary>
@@ -18128,7 +18212,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_bitcoin_port" lineno="12652">
+<interface name="corenet_tcp_connect_bitcoin_port" lineno="12670">
<summary>
Make a TCP connection to the bitcoin port.
</summary>
@@ -18138,7 +18222,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bitcoin_client_packets" lineno="12672">
+<interface name="corenet_send_bitcoin_client_packets" lineno="12690">
<summary>
Send bitcoin_client packets.
</summary>
@@ -18149,7 +18233,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12691">
+<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12709">
<summary>
Do not audit attempts to send bitcoin_client packets.
</summary>
@@ -18160,7 +18244,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bitcoin_client_packets" lineno="12710">
+<interface name="corenet_receive_bitcoin_client_packets" lineno="12728">
<summary>
Receive bitcoin_client packets.
</summary>
@@ -18171,7 +18255,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12729">
+<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12747">
<summary>
Do not audit attempts to receive bitcoin_client packets.
</summary>
@@ -18182,7 +18266,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12748">
+<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12766">
<summary>
Send and receive bitcoin_client packets.
</summary>
@@ -18193,7 +18277,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12764">
+<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12782">
<summary>
Do not audit attempts to send and receive bitcoin_client packets.
</summary>
@@ -18204,7 +18288,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12779">
+<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12797">
<summary>
Relabel packets to bitcoin_client the packet type.
</summary>
@@ -18214,7 +18298,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bitcoin_server_packets" lineno="12799">
+<interface name="corenet_send_bitcoin_server_packets" lineno="12817">
<summary>
Send bitcoin_server packets.
</summary>
@@ -18225,7 +18309,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12818">
+<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12836">
<summary>
Do not audit attempts to send bitcoin_server packets.
</summary>
@@ -18236,7 +18320,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bitcoin_server_packets" lineno="12837">
+<interface name="corenet_receive_bitcoin_server_packets" lineno="12855">
<summary>
Receive bitcoin_server packets.
</summary>
@@ -18247,7 +18331,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12856">
+<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12874">
<summary>
Do not audit attempts to receive bitcoin_server packets.
</summary>
@@ -18258,7 +18342,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12875">
+<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12893">
<summary>
Send and receive bitcoin_server packets.
</summary>
@@ -18269,7 +18353,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12891">
+<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12909">
<summary>
Do not audit attempts to send and receive bitcoin_server packets.
</summary>
@@ -18280,7 +18364,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12906">
+<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12924">
<summary>
Relabel packets to bitcoin_server the packet type.
</summary>
@@ -18290,7 +18374,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12928">
+<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12946">
<summary>
Send and receive TCP traffic on the boinc port.
</summary>
@@ -18301,7 +18385,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_boinc_port" lineno="12943">
+<interface name="corenet_udp_send_boinc_port" lineno="12961">
<summary>
Send UDP traffic on the boinc port.
</summary>
@@ -18312,7 +18396,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12958">
+<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12976">
<summary>
Do not audit attempts to send UDP traffic on the boinc port.
</summary>
@@ -18323,7 +18407,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_boinc_port" lineno="12973">
+<interface name="corenet_udp_receive_boinc_port" lineno="12991">
<summary>
Receive UDP traffic on the boinc port.
</summary>
@@ -18334,7 +18418,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="12988">
+<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="13006">
<summary>
Do not audit attempts to receive UDP traffic on the boinc port.
</summary>
@@ -18345,7 +18429,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_boinc_port" lineno="13003">
+<interface name="corenet_udp_sendrecv_boinc_port" lineno="13021">
<summary>
Send and receive UDP traffic on the boinc port.
</summary>
@@ -18356,7 +18440,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13019">
+<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13037">
<summary>
Do not audit attempts to send and receive
UDP traffic on the boinc port.
@@ -18368,7 +18452,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_boinc_port" lineno="13034">
+<interface name="corenet_tcp_bind_boinc_port" lineno="13052">
<summary>
Bind TCP sockets to the boinc port.
</summary>
@@ -18379,7 +18463,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_boinc_port" lineno="13054">
+<interface name="corenet_udp_bind_boinc_port" lineno="13072">
<summary>
Bind UDP sockets to the boinc port.
</summary>
@@ -18390,7 +18474,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_boinc_port" lineno="13073">
+<interface name="corenet_tcp_connect_boinc_port" lineno="13091">
<summary>
Make a TCP connection to the boinc port.
</summary>
@@ -18400,7 +18484,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_client_packets" lineno="13093">
+<interface name="corenet_send_boinc_client_packets" lineno="13111">
<summary>
Send boinc_client packets.
</summary>
@@ -18411,7 +18495,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13112">
+<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13130">
<summary>
Do not audit attempts to send boinc_client packets.
</summary>
@@ -18422,7 +18506,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_client_packets" lineno="13131">
+<interface name="corenet_receive_boinc_client_packets" lineno="13149">
<summary>
Receive boinc_client packets.
</summary>
@@ -18433,7 +18517,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13150">
+<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13168">
<summary>
Do not audit attempts to receive boinc_client packets.
</summary>
@@ -18444,7 +18528,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_client_packets" lineno="13169">
+<interface name="corenet_sendrecv_boinc_client_packets" lineno="13187">
<summary>
Send and receive boinc_client packets.
</summary>
@@ -18455,7 +18539,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13185">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13203">
<summary>
Do not audit attempts to send and receive boinc_client packets.
</summary>
@@ -18466,7 +18550,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_client_packets" lineno="13200">
+<interface name="corenet_relabelto_boinc_client_packets" lineno="13218">
<summary>
Relabel packets to boinc_client the packet type.
</summary>
@@ -18476,7 +18560,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_server_packets" lineno="13220">
+<interface name="corenet_send_boinc_server_packets" lineno="13238">
<summary>
Send boinc_server packets.
</summary>
@@ -18487,7 +18571,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13239">
+<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13257">
<summary>
Do not audit attempts to send boinc_server packets.
</summary>
@@ -18498,7 +18582,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_server_packets" lineno="13258">
+<interface name="corenet_receive_boinc_server_packets" lineno="13276">
<summary>
Receive boinc_server packets.
</summary>
@@ -18509,7 +18593,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13277">
+<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13295">
<summary>
Do not audit attempts to receive boinc_server packets.
</summary>
@@ -18520,7 +18604,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_server_packets" lineno="13296">
+<interface name="corenet_sendrecv_boinc_server_packets" lineno="13314">
<summary>
Send and receive boinc_server packets.
</summary>
@@ -18531,7 +18615,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13312">
+<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13330">
<summary>
Do not audit attempts to send and receive boinc_server packets.
</summary>
@@ -18542,7 +18626,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_server_packets" lineno="13327">
+<interface name="corenet_relabelto_boinc_server_packets" lineno="13345">
<summary>
Relabel packets to boinc_server the packet type.
</summary>
@@ -18552,7 +18636,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13349">
+<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13367">
<summary>
Send and receive TCP traffic on the boinc_client port.
</summary>
@@ -18563,7 +18647,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_boinc_client_port" lineno="13364">
+<interface name="corenet_udp_send_boinc_client_port" lineno="13382">
<summary>
Send UDP traffic on the boinc_client port.
</summary>
@@ -18574,7 +18658,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13379">
+<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13397">
<summary>
Do not audit attempts to send UDP traffic on the boinc_client port.
</summary>
@@ -18585,7 +18669,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_boinc_client_port" lineno="13394">
+<interface name="corenet_udp_receive_boinc_client_port" lineno="13412">
<summary>
Receive UDP traffic on the boinc_client port.
</summary>
@@ -18596,7 +18680,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13409">
+<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13427">
<summary>
Do not audit attempts to receive UDP traffic on the boinc_client port.
</summary>
@@ -18607,7 +18691,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13424">
+<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13442">
<summary>
Send and receive UDP traffic on the boinc_client port.
</summary>
@@ -18618,7 +18702,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13440">
+<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13458">
<summary>
Do not audit attempts to send and receive
UDP traffic on the boinc_client port.
@@ -18630,7 +18714,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_boinc_client_port" lineno="13455">
+<interface name="corenet_tcp_bind_boinc_client_port" lineno="13473">
<summary>
Bind TCP sockets to the boinc_client port.
</summary>
@@ -18641,7 +18725,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_boinc_client_port" lineno="13475">
+<interface name="corenet_udp_bind_boinc_client_port" lineno="13493">
<summary>
Bind UDP sockets to the boinc_client port.
</summary>
@@ -18652,7 +18736,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_boinc_client_port" lineno="13494">
+<interface name="corenet_tcp_connect_boinc_client_port" lineno="13512">
<summary>
Make a TCP connection to the boinc_client port.
</summary>
@@ -18662,7 +18746,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_client_client_packets" lineno="13514">
+<interface name="corenet_send_boinc_client_client_packets" lineno="13532">
<summary>
Send boinc_client_client packets.
</summary>
@@ -18673,7 +18757,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13533">
+<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13551">
<summary>
Do not audit attempts to send boinc_client_client packets.
</summary>
@@ -18684,7 +18768,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_client_client_packets" lineno="13552">
+<interface name="corenet_receive_boinc_client_client_packets" lineno="13570">
<summary>
Receive boinc_client_client packets.
</summary>
@@ -18695,7 +18779,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13571">
+<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13589">
<summary>
Do not audit attempts to receive boinc_client_client packets.
</summary>
@@ -18706,7 +18790,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13590">
+<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13608">
<summary>
Send and receive boinc_client_client packets.
</summary>
@@ -18717,7 +18801,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13606">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13624">
<summary>
Do not audit attempts to send and receive boinc_client_client packets.
</summary>
@@ -18728,7 +18812,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13621">
+<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13639">
<summary>
Relabel packets to boinc_client_client the packet type.
</summary>
@@ -18738,7 +18822,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_client_server_packets" lineno="13641">
+<interface name="corenet_send_boinc_client_server_packets" lineno="13659">
<summary>
Send boinc_client_server packets.
</summary>
@@ -18749,7 +18833,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13660">
+<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13678">
<summary>
Do not audit attempts to send boinc_client_server packets.
</summary>
@@ -18760,7 +18844,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_client_server_packets" lineno="13679">
+<interface name="corenet_receive_boinc_client_server_packets" lineno="13697">
<summary>
Receive boinc_client_server packets.
</summary>
@@ -18771,7 +18855,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13698">
+<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13716">
<summary>
Do not audit attempts to receive boinc_client_server packets.
</summary>
@@ -18782,7 +18866,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13717">
+<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13735">
<summary>
Send and receive boinc_client_server packets.
</summary>
@@ -18793,7 +18877,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13733">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13751">
<summary>
Do not audit attempts to send and receive boinc_client_server packets.
</summary>
@@ -18804,7 +18888,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13748">
+<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13766">
<summary>
Relabel packets to boinc_client_server the packet type.
</summary>
@@ -18814,7 +18898,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_biff_port" lineno="13770">
+<interface name="corenet_tcp_sendrecv_biff_port" lineno="13788">
<summary>
Send and receive TCP traffic on the biff port.
</summary>
@@ -18825,7 +18909,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_biff_port" lineno="13785">
+<interface name="corenet_udp_send_biff_port" lineno="13803">
<summary>
Send UDP traffic on the biff port.
</summary>
@@ -18836,7 +18920,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13800">
+<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13818">
<summary>
Do not audit attempts to send UDP traffic on the biff port.
</summary>
@@ -18847,7 +18931,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_biff_port" lineno="13815">
+<interface name="corenet_udp_receive_biff_port" lineno="13833">
<summary>
Receive UDP traffic on the biff port.
</summary>
@@ -18858,7 +18942,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13830">
+<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13848">
<summary>
Do not audit attempts to receive UDP traffic on the biff port.
</summary>
@@ -18869,7 +18953,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_biff_port" lineno="13845">
+<interface name="corenet_udp_sendrecv_biff_port" lineno="13863">
<summary>
Send and receive UDP traffic on the biff port.
</summary>
@@ -18880,7 +18964,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13861">
+<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13879">
<summary>
Do not audit attempts to send and receive
UDP traffic on the biff port.
@@ -18892,7 +18976,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_biff_port" lineno="13876">
+<interface name="corenet_tcp_bind_biff_port" lineno="13894">
<summary>
Bind TCP sockets to the biff port.
</summary>
@@ -18903,7 +18987,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_biff_port" lineno="13896">
+<interface name="corenet_udp_bind_biff_port" lineno="13914">
<summary>
Bind UDP sockets to the biff port.
</summary>
@@ -18914,7 +18998,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_biff_port" lineno="13915">
+<interface name="corenet_tcp_connect_biff_port" lineno="13933">
<summary>
Make a TCP connection to the biff port.
</summary>
@@ -18924,7 +19008,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_biff_client_packets" lineno="13935">
+<interface name="corenet_send_biff_client_packets" lineno="13953">
<summary>
Send biff_client packets.
</summary>
@@ -18935,7 +19019,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13954">
+<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13972">
<summary>
Do not audit attempts to send biff_client packets.
</summary>
@@ -18946,7 +19030,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_biff_client_packets" lineno="13973">
+<interface name="corenet_receive_biff_client_packets" lineno="13991">
<summary>
Receive biff_client packets.
</summary>
@@ -18957,7 +19041,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="13992">
+<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="14010">
<summary>
Do not audit attempts to receive biff_client packets.
</summary>
@@ -18968,7 +19052,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_biff_client_packets" lineno="14011">
+<interface name="corenet_sendrecv_biff_client_packets" lineno="14029">
<summary>
Send and receive biff_client packets.
</summary>
@@ -18979,7 +19063,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14027">
+<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14045">
<summary>
Do not audit attempts to send and receive biff_client packets.
</summary>
@@ -18990,7 +19074,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_biff_client_packets" lineno="14042">
+<interface name="corenet_relabelto_biff_client_packets" lineno="14060">
<summary>
Relabel packets to biff_client the packet type.
</summary>
@@ -19000,7 +19084,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_biff_server_packets" lineno="14062">
+<interface name="corenet_send_biff_server_packets" lineno="14080">
<summary>
Send biff_server packets.
</summary>
@@ -19011,7 +19095,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14081">
+<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14099">
<summary>
Do not audit attempts to send biff_server packets.
</summary>
@@ -19022,7 +19106,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_biff_server_packets" lineno="14100">
+<interface name="corenet_receive_biff_server_packets" lineno="14118">
<summary>
Receive biff_server packets.
</summary>
@@ -19033,7 +19117,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14119">
+<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14137">
<summary>
Do not audit attempts to receive biff_server packets.
</summary>
@@ -19044,7 +19128,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_biff_server_packets" lineno="14138">
+<interface name="corenet_sendrecv_biff_server_packets" lineno="14156">
<summary>
Send and receive biff_server packets.
</summary>
@@ -19055,7 +19139,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14154">
+<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14172">
<summary>
Do not audit attempts to send and receive biff_server packets.
</summary>
@@ -19066,7 +19150,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_biff_server_packets" lineno="14169">
+<interface name="corenet_relabelto_biff_server_packets" lineno="14187">
<summary>
Relabel packets to biff_server the packet type.
</summary>
@@ -19076,7 +19160,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14191">
+<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14209">
<summary>
Send and receive TCP traffic on the certmaster port.
</summary>
@@ -19087,7 +19171,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_certmaster_port" lineno="14206">
+<interface name="corenet_udp_send_certmaster_port" lineno="14224">
<summary>
Send UDP traffic on the certmaster port.
</summary>
@@ -19098,7 +19182,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14221">
+<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14239">
<summary>
Do not audit attempts to send UDP traffic on the certmaster port.
</summary>
@@ -19109,7 +19193,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_certmaster_port" lineno="14236">
+<interface name="corenet_udp_receive_certmaster_port" lineno="14254">
<summary>
Receive UDP traffic on the certmaster port.
</summary>
@@ -19120,7 +19204,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14251">
+<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14269">
<summary>
Do not audit attempts to receive UDP traffic on the certmaster port.
</summary>
@@ -19131,7 +19215,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14266">
+<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14284">
<summary>
Send and receive UDP traffic on the certmaster port.
</summary>
@@ -19142,7 +19226,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14282">
+<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14300">
<summary>
Do not audit attempts to send and receive
UDP traffic on the certmaster port.
@@ -19154,7 +19238,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_certmaster_port" lineno="14297">
+<interface name="corenet_tcp_bind_certmaster_port" lineno="14315">
<summary>
Bind TCP sockets to the certmaster port.
</summary>
@@ -19165,7 +19249,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_certmaster_port" lineno="14317">
+<interface name="corenet_udp_bind_certmaster_port" lineno="14335">
<summary>
Bind UDP sockets to the certmaster port.
</summary>
@@ -19176,7 +19260,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_certmaster_port" lineno="14336">
+<interface name="corenet_tcp_connect_certmaster_port" lineno="14354">
<summary>
Make a TCP connection to the certmaster port.
</summary>
@@ -19186,7 +19270,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_certmaster_client_packets" lineno="14356">
+<interface name="corenet_send_certmaster_client_packets" lineno="14374">
<summary>
Send certmaster_client packets.
</summary>
@@ -19197,7 +19281,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14375">
+<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14393">
<summary>
Do not audit attempts to send certmaster_client packets.
</summary>
@@ -19208,7 +19292,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_certmaster_client_packets" lineno="14394">
+<interface name="corenet_receive_certmaster_client_packets" lineno="14412">
<summary>
Receive certmaster_client packets.
</summary>
@@ -19219,7 +19303,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14413">
+<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14431">
<summary>
Do not audit attempts to receive certmaster_client packets.
</summary>
@@ -19230,7 +19314,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14432">
+<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14450">
<summary>
Send and receive certmaster_client packets.
</summary>
@@ -19241,7 +19325,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14448">
+<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14466">
<summary>
Do not audit attempts to send and receive certmaster_client packets.
</summary>
@@ -19252,7 +19336,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_certmaster_client_packets" lineno="14463">
+<interface name="corenet_relabelto_certmaster_client_packets" lineno="14481">
<summary>
Relabel packets to certmaster_client the packet type.
</summary>
@@ -19262,7 +19346,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_certmaster_server_packets" lineno="14483">
+<interface name="corenet_send_certmaster_server_packets" lineno="14501">
<summary>
Send certmaster_server packets.
</summary>
@@ -19273,7 +19357,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14502">
+<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14520">
<summary>
Do not audit attempts to send certmaster_server packets.
</summary>
@@ -19284,7 +19368,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_certmaster_server_packets" lineno="14521">
+<interface name="corenet_receive_certmaster_server_packets" lineno="14539">
<summary>
Receive certmaster_server packets.
</summary>
@@ -19295,7 +19379,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14540">
+<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14558">
<summary>
Do not audit attempts to receive certmaster_server packets.
</summary>
@@ -19306,7 +19390,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14559">
+<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14577">
<summary>
Send and receive certmaster_server packets.
</summary>
@@ -19317,7 +19401,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14575">
+<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14593">
<summary>
Do not audit attempts to send and receive certmaster_server packets.
</summary>
@@ -19328,7 +19412,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_certmaster_server_packets" lineno="14590">
+<interface name="corenet_relabelto_certmaster_server_packets" lineno="14608">
<summary>
Relabel packets to certmaster_server the packet type.
</summary>
@@ -19338,7 +19422,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14612">
+<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14630">
<summary>
Send and receive TCP traffic on the chronyd port.
</summary>
@@ -19349,7 +19433,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_chronyd_port" lineno="14627">
+<interface name="corenet_udp_send_chronyd_port" lineno="14645">
<summary>
Send UDP traffic on the chronyd port.
</summary>
@@ -19360,7 +19444,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14642">
+<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14660">
<summary>
Do not audit attempts to send UDP traffic on the chronyd port.
</summary>
@@ -19371,7 +19455,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_chronyd_port" lineno="14657">
+<interface name="corenet_udp_receive_chronyd_port" lineno="14675">
<summary>
Receive UDP traffic on the chronyd port.
</summary>
@@ -19382,7 +19466,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14672">
+<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14690">
<summary>
Do not audit attempts to receive UDP traffic on the chronyd port.
</summary>
@@ -19393,7 +19477,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14687">
+<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14705">
<summary>
Send and receive UDP traffic on the chronyd port.
</summary>
@@ -19404,7 +19488,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14703">
+<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14721">
<summary>
Do not audit attempts to send and receive
UDP traffic on the chronyd port.
@@ -19416,7 +19500,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_chronyd_port" lineno="14718">
+<interface name="corenet_tcp_bind_chronyd_port" lineno="14736">
<summary>
Bind TCP sockets to the chronyd port.
</summary>
@@ -19427,7 +19511,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_chronyd_port" lineno="14738">
+<interface name="corenet_udp_bind_chronyd_port" lineno="14756">
<summary>
Bind UDP sockets to the chronyd port.
</summary>
@@ -19438,7 +19522,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_chronyd_port" lineno="14757">
+<interface name="corenet_tcp_connect_chronyd_port" lineno="14775">
<summary>
Make a TCP connection to the chronyd port.
</summary>
@@ -19448,7 +19532,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_chronyd_client_packets" lineno="14777">
+<interface name="corenet_send_chronyd_client_packets" lineno="14795">
<summary>
Send chronyd_client packets.
</summary>
@@ -19459,7 +19543,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14796">
+<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14814">
<summary>
Do not audit attempts to send chronyd_client packets.
</summary>
@@ -19470,7 +19554,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_chronyd_client_packets" lineno="14815">
+<interface name="corenet_receive_chronyd_client_packets" lineno="14833">
<summary>
Receive chronyd_client packets.
</summary>
@@ -19481,7 +19565,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14834">
+<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14852">
<summary>
Do not audit attempts to receive chronyd_client packets.
</summary>
@@ -19492,7 +19576,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14853">
+<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14871">
<summary>
Send and receive chronyd_client packets.
</summary>
@@ -19503,7 +19587,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14869">
+<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14887">
<summary>
Do not audit attempts to send and receive chronyd_client packets.
</summary>
@@ -19514,7 +19598,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_chronyd_client_packets" lineno="14884">
+<interface name="corenet_relabelto_chronyd_client_packets" lineno="14902">
<summary>
Relabel packets to chronyd_client the packet type.
</summary>
@@ -19524,7 +19608,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_chronyd_server_packets" lineno="14904">
+<interface name="corenet_send_chronyd_server_packets" lineno="14922">
<summary>
Send chronyd_server packets.
</summary>
@@ -19535,7 +19619,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14923">
+<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14941">
<summary>
Do not audit attempts to send chronyd_server packets.
</summary>
@@ -19546,7 +19630,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_chronyd_server_packets" lineno="14942">
+<interface name="corenet_receive_chronyd_server_packets" lineno="14960">
<summary>
Receive chronyd_server packets.
</summary>
@@ -19557,7 +19641,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14961">
+<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14979">
<summary>
Do not audit attempts to receive chronyd_server packets.
</summary>
@@ -19568,7 +19652,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14980">
+<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14998">
<summary>
Send and receive chronyd_server packets.
</summary>
@@ -19579,7 +19663,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="14996">
+<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="15014">
<summary>
Do not audit attempts to send and receive chronyd_server packets.
</summary>
@@ -19590,7 +19674,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_chronyd_server_packets" lineno="15011">
+<interface name="corenet_relabelto_chronyd_server_packets" lineno="15029">
<summary>
Relabel packets to chronyd_server the packet type.
</summary>
@@ -19600,7 +19684,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15033">
+<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15051">
<summary>
Send and receive TCP traffic on the clamd port.
</summary>
@@ -19611,7 +19695,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_clamd_port" lineno="15048">
+<interface name="corenet_udp_send_clamd_port" lineno="15066">
<summary>
Send UDP traffic on the clamd port.
</summary>
@@ -19622,7 +19706,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15063">
+<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15081">
<summary>
Do not audit attempts to send UDP traffic on the clamd port.
</summary>
@@ -19633,7 +19717,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_clamd_port" lineno="15078">
+<interface name="corenet_udp_receive_clamd_port" lineno="15096">
<summary>
Receive UDP traffic on the clamd port.
</summary>
@@ -19644,7 +19728,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15093">
+<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15111">
<summary>
Do not audit attempts to receive UDP traffic on the clamd port.
</summary>
@@ -19655,7 +19739,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_clamd_port" lineno="15108">
+<interface name="corenet_udp_sendrecv_clamd_port" lineno="15126">
<summary>
Send and receive UDP traffic on the clamd port.
</summary>
@@ -19666,7 +19750,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15124">
+<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15142">
<summary>
Do not audit attempts to send and receive
UDP traffic on the clamd port.
@@ -19678,7 +19762,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_clamd_port" lineno="15139">
+<interface name="corenet_tcp_bind_clamd_port" lineno="15157">
<summary>
Bind TCP sockets to the clamd port.
</summary>
@@ -19689,7 +19773,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_clamd_port" lineno="15159">
+<interface name="corenet_udp_bind_clamd_port" lineno="15177">
<summary>
Bind UDP sockets to the clamd port.
</summary>
@@ -19700,7 +19784,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_clamd_port" lineno="15178">
+<interface name="corenet_tcp_connect_clamd_port" lineno="15196">
<summary>
Make a TCP connection to the clamd port.
</summary>
@@ -19710,7 +19794,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clamd_client_packets" lineno="15198">
+<interface name="corenet_send_clamd_client_packets" lineno="15216">
<summary>
Send clamd_client packets.
</summary>
@@ -19721,7 +19805,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15217">
+<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15235">
<summary>
Do not audit attempts to send clamd_client packets.
</summary>
@@ -19732,7 +19816,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clamd_client_packets" lineno="15236">
+<interface name="corenet_receive_clamd_client_packets" lineno="15254">
<summary>
Receive clamd_client packets.
</summary>
@@ -19743,7 +19827,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15255">
+<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15273">
<summary>
Do not audit attempts to receive clamd_client packets.
</summary>
@@ -19754,7 +19838,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clamd_client_packets" lineno="15274">
+<interface name="corenet_sendrecv_clamd_client_packets" lineno="15292">
<summary>
Send and receive clamd_client packets.
</summary>
@@ -19765,7 +19849,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15290">
+<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15308">
<summary>
Do not audit attempts to send and receive clamd_client packets.
</summary>
@@ -19776,7 +19860,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clamd_client_packets" lineno="15305">
+<interface name="corenet_relabelto_clamd_client_packets" lineno="15323">
<summary>
Relabel packets to clamd_client the packet type.
</summary>
@@ -19786,7 +19870,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clamd_server_packets" lineno="15325">
+<interface name="corenet_send_clamd_server_packets" lineno="15343">
<summary>
Send clamd_server packets.
</summary>
@@ -19797,7 +19881,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15344">
+<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15362">
<summary>
Do not audit attempts to send clamd_server packets.
</summary>
@@ -19808,7 +19892,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clamd_server_packets" lineno="15363">
+<interface name="corenet_receive_clamd_server_packets" lineno="15381">
<summary>
Receive clamd_server packets.
</summary>
@@ -19819,7 +19903,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15382">
+<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15400">
<summary>
Do not audit attempts to receive clamd_server packets.
</summary>
@@ -19830,7 +19914,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clamd_server_packets" lineno="15401">
+<interface name="corenet_sendrecv_clamd_server_packets" lineno="15419">
<summary>
Send and receive clamd_server packets.
</summary>
@@ -19841,7 +19925,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15417">
+<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15435">
<summary>
Do not audit attempts to send and receive clamd_server packets.
</summary>
@@ -19852,7 +19936,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clamd_server_packets" lineno="15432">
+<interface name="corenet_relabelto_clamd_server_packets" lineno="15450">
<summary>
Relabel packets to clamd_server the packet type.
</summary>
@@ -19862,7 +19946,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15454">
+<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15472">
<summary>
Send and receive TCP traffic on the clockspeed port.
</summary>
@@ -19873,7 +19957,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_clockspeed_port" lineno="15469">
+<interface name="corenet_udp_send_clockspeed_port" lineno="15487">
<summary>
Send UDP traffic on the clockspeed port.
</summary>
@@ -19884,7 +19968,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15484">
+<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15502">
<summary>
Do not audit attempts to send UDP traffic on the clockspeed port.
</summary>
@@ -19895,7 +19979,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_clockspeed_port" lineno="15499">
+<interface name="corenet_udp_receive_clockspeed_port" lineno="15517">
<summary>
Receive UDP traffic on the clockspeed port.
</summary>
@@ -19906,7 +19990,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15514">
+<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15532">
<summary>
Do not audit attempts to receive UDP traffic on the clockspeed port.
</summary>
@@ -19917,7 +20001,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15529">
+<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15547">
<summary>
Send and receive UDP traffic on the clockspeed port.
</summary>
@@ -19928,7 +20012,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15545">
+<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15563">
<summary>
Do not audit attempts to send and receive
UDP traffic on the clockspeed port.
@@ -19940,7 +20024,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_clockspeed_port" lineno="15560">
+<interface name="corenet_tcp_bind_clockspeed_port" lineno="15578">
<summary>
Bind TCP sockets to the clockspeed port.
</summary>
@@ -19951,7 +20035,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_clockspeed_port" lineno="15580">
+<interface name="corenet_udp_bind_clockspeed_port" lineno="15598">
<summary>
Bind UDP sockets to the clockspeed port.
</summary>
@@ -19962,7 +20046,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_clockspeed_port" lineno="15599">
+<interface name="corenet_tcp_connect_clockspeed_port" lineno="15617">
<summary>
Make a TCP connection to the clockspeed port.
</summary>
@@ -19972,7 +20056,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clockspeed_client_packets" lineno="15619">
+<interface name="corenet_send_clockspeed_client_packets" lineno="15637">
<summary>
Send clockspeed_client packets.
</summary>
@@ -19983,7 +20067,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15638">
+<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15656">
<summary>
Do not audit attempts to send clockspeed_client packets.
</summary>
@@ -19994,7 +20078,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clockspeed_client_packets" lineno="15657">
+<interface name="corenet_receive_clockspeed_client_packets" lineno="15675">
<summary>
Receive clockspeed_client packets.
</summary>
@@ -20005,7 +20089,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15676">
+<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15694">
<summary>
Do not audit attempts to receive clockspeed_client packets.
</summary>
@@ -20016,7 +20100,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15695">
+<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15713">
<summary>
Send and receive clockspeed_client packets.
</summary>
@@ -20027,7 +20111,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15711">
+<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15729">
<summary>
Do not audit attempts to send and receive clockspeed_client packets.
</summary>
@@ -20038,7 +20122,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15726">
+<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15744">
<summary>
Relabel packets to clockspeed_client the packet type.
</summary>
@@ -20048,7 +20132,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clockspeed_server_packets" lineno="15746">
+<interface name="corenet_send_clockspeed_server_packets" lineno="15764">
<summary>
Send clockspeed_server packets.
</summary>
@@ -20059,7 +20143,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15765">
+<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15783">
<summary>
Do not audit attempts to send clockspeed_server packets.
</summary>
@@ -20070,7 +20154,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clockspeed_server_packets" lineno="15784">
+<interface name="corenet_receive_clockspeed_server_packets" lineno="15802">
<summary>
Receive clockspeed_server packets.
</summary>
@@ -20081,7 +20165,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15803">
+<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15821">
<summary>
Do not audit attempts to receive clockspeed_server packets.
</summary>
@@ -20092,7 +20176,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15822">
+<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15840">
<summary>
Send and receive clockspeed_server packets.
</summary>
@@ -20103,7 +20187,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15838">
+<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15856">
<summary>
Do not audit attempts to send and receive clockspeed_server packets.
</summary>
@@ -20114,7 +20198,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15853">
+<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15871">
<summary>
Relabel packets to clockspeed_server the packet type.
</summary>
@@ -20124,7 +20208,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15875">
+<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15893">
<summary>
Send and receive TCP traffic on the cluster port.
</summary>
@@ -20135,7 +20219,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cluster_port" lineno="15890">
+<interface name="corenet_udp_send_cluster_port" lineno="15908">
<summary>
Send UDP traffic on the cluster port.
</summary>
@@ -20146,7 +20230,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15905">
+<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15923">
<summary>
Do not audit attempts to send UDP traffic on the cluster port.
</summary>
@@ -20157,7 +20241,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cluster_port" lineno="15920">
+<interface name="corenet_udp_receive_cluster_port" lineno="15938">
<summary>
Receive UDP traffic on the cluster port.
</summary>
@@ -20168,7 +20252,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15935">
+<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15953">
<summary>
Do not audit attempts to receive UDP traffic on the cluster port.
</summary>
@@ -20179,7 +20263,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cluster_port" lineno="15950">
+<interface name="corenet_udp_sendrecv_cluster_port" lineno="15968">
<summary>
Send and receive UDP traffic on the cluster port.
</summary>
@@ -20190,7 +20274,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15966">
+<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15984">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cluster port.
@@ -20202,7 +20286,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cluster_port" lineno="15981">
+<interface name="corenet_tcp_bind_cluster_port" lineno="15999">
<summary>
Bind TCP sockets to the cluster port.
</summary>
@@ -20213,7 +20297,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cluster_port" lineno="16001">
+<interface name="corenet_udp_bind_cluster_port" lineno="16019">
<summary>
Bind UDP sockets to the cluster port.
</summary>
@@ -20224,7 +20308,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cluster_port" lineno="16020">
+<interface name="corenet_tcp_connect_cluster_port" lineno="16038">
<summary>
Make a TCP connection to the cluster port.
</summary>
@@ -20234,7 +20318,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cluster_client_packets" lineno="16040">
+<interface name="corenet_send_cluster_client_packets" lineno="16058">
<summary>
Send cluster_client packets.
</summary>
@@ -20245,7 +20329,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16059">
+<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16077">
<summary>
Do not audit attempts to send cluster_client packets.
</summary>
@@ -20256,7 +20340,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cluster_client_packets" lineno="16078">
+<interface name="corenet_receive_cluster_client_packets" lineno="16096">
<summary>
Receive cluster_client packets.
</summary>
@@ -20267,7 +20351,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16097">
+<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16115">
<summary>
Do not audit attempts to receive cluster_client packets.
</summary>
@@ -20278,7 +20362,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cluster_client_packets" lineno="16116">
+<interface name="corenet_sendrecv_cluster_client_packets" lineno="16134">
<summary>
Send and receive cluster_client packets.
</summary>
@@ -20289,7 +20373,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16132">
+<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16150">
<summary>
Do not audit attempts to send and receive cluster_client packets.
</summary>
@@ -20300,7 +20384,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cluster_client_packets" lineno="16147">
+<interface name="corenet_relabelto_cluster_client_packets" lineno="16165">
<summary>
Relabel packets to cluster_client the packet type.
</summary>
@@ -20310,7 +20394,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cluster_server_packets" lineno="16167">
+<interface name="corenet_send_cluster_server_packets" lineno="16185">
<summary>
Send cluster_server packets.
</summary>
@@ -20321,7 +20405,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16186">
+<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16204">
<summary>
Do not audit attempts to send cluster_server packets.
</summary>
@@ -20332,7 +20416,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cluster_server_packets" lineno="16205">
+<interface name="corenet_receive_cluster_server_packets" lineno="16223">
<summary>
Receive cluster_server packets.
</summary>
@@ -20343,7 +20427,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16224">
+<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16242">
<summary>
Do not audit attempts to receive cluster_server packets.
</summary>
@@ -20354,7 +20438,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cluster_server_packets" lineno="16243">
+<interface name="corenet_sendrecv_cluster_server_packets" lineno="16261">
<summary>
Send and receive cluster_server packets.
</summary>
@@ -20365,7 +20449,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16259">
+<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16277">
<summary>
Do not audit attempts to send and receive cluster_server packets.
</summary>
@@ -20376,7 +20460,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cluster_server_packets" lineno="16274">
+<interface name="corenet_relabelto_cluster_server_packets" lineno="16292">
<summary>
Relabel packets to cluster_server the packet type.
</summary>
@@ -20386,7 +20470,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cma_port" lineno="16296">
+<interface name="corenet_tcp_sendrecv_cma_port" lineno="16314">
<summary>
Send and receive TCP traffic on the cma port.
</summary>
@@ -20397,7 +20481,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cma_port" lineno="16311">
+<interface name="corenet_udp_send_cma_port" lineno="16329">
<summary>
Send UDP traffic on the cma port.
</summary>
@@ -20408,7 +20492,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16326">
+<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16344">
<summary>
Do not audit attempts to send UDP traffic on the cma port.
</summary>
@@ -20419,7 +20503,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cma_port" lineno="16341">
+<interface name="corenet_udp_receive_cma_port" lineno="16359">
<summary>
Receive UDP traffic on the cma port.
</summary>
@@ -20430,7 +20514,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16356">
+<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16374">
<summary>
Do not audit attempts to receive UDP traffic on the cma port.
</summary>
@@ -20441,7 +20525,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cma_port" lineno="16371">
+<interface name="corenet_udp_sendrecv_cma_port" lineno="16389">
<summary>
Send and receive UDP traffic on the cma port.
</summary>
@@ -20452,7 +20536,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16387">
+<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16405">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cma port.
@@ -20464,7 +20548,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cma_port" lineno="16402">
+<interface name="corenet_tcp_bind_cma_port" lineno="16420">
<summary>
Bind TCP sockets to the cma port.
</summary>
@@ -20475,7 +20559,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cma_port" lineno="16422">
+<interface name="corenet_udp_bind_cma_port" lineno="16440">
<summary>
Bind UDP sockets to the cma port.
</summary>
@@ -20486,7 +20570,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cma_port" lineno="16441">
+<interface name="corenet_tcp_connect_cma_port" lineno="16459">
<summary>
Make a TCP connection to the cma port.
</summary>
@@ -20496,7 +20580,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cma_client_packets" lineno="16461">
+<interface name="corenet_send_cma_client_packets" lineno="16479">
<summary>
Send cma_client packets.
</summary>
@@ -20507,7 +20591,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16480">
+<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16498">
<summary>
Do not audit attempts to send cma_client packets.
</summary>
@@ -20518,7 +20602,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cma_client_packets" lineno="16499">
+<interface name="corenet_receive_cma_client_packets" lineno="16517">
<summary>
Receive cma_client packets.
</summary>
@@ -20529,7 +20613,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16518">
+<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16536">
<summary>
Do not audit attempts to receive cma_client packets.
</summary>
@@ -20540,7 +20624,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cma_client_packets" lineno="16537">
+<interface name="corenet_sendrecv_cma_client_packets" lineno="16555">
<summary>
Send and receive cma_client packets.
</summary>
@@ -20551,7 +20635,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16553">
+<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16571">
<summary>
Do not audit attempts to send and receive cma_client packets.
</summary>
@@ -20562,7 +20646,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cma_client_packets" lineno="16568">
+<interface name="corenet_relabelto_cma_client_packets" lineno="16586">
<summary>
Relabel packets to cma_client the packet type.
</summary>
@@ -20572,7 +20656,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cma_server_packets" lineno="16588">
+<interface name="corenet_send_cma_server_packets" lineno="16606">
<summary>
Send cma_server packets.
</summary>
@@ -20583,7 +20667,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16607">
+<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16625">
<summary>
Do not audit attempts to send cma_server packets.
</summary>
@@ -20594,7 +20678,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cma_server_packets" lineno="16626">
+<interface name="corenet_receive_cma_server_packets" lineno="16644">
<summary>
Receive cma_server packets.
</summary>
@@ -20605,7 +20689,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16645">
+<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16663">
<summary>
Do not audit attempts to receive cma_server packets.
</summary>
@@ -20616,7 +20700,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cma_server_packets" lineno="16664">
+<interface name="corenet_sendrecv_cma_server_packets" lineno="16682">
<summary>
Send and receive cma_server packets.
</summary>
@@ -20627,7 +20711,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16680">
+<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16698">
<summary>
Do not audit attempts to send and receive cma_server packets.
</summary>
@@ -20638,7 +20722,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cma_server_packets" lineno="16695">
+<interface name="corenet_relabelto_cma_server_packets" lineno="16713">
<summary>
Relabel packets to cma_server the packet type.
</summary>
@@ -20648,7 +20732,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16717">
+<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16735">
<summary>
Send and receive TCP traffic on the cobbler port.
</summary>
@@ -20659,7 +20743,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cobbler_port" lineno="16732">
+<interface name="corenet_udp_send_cobbler_port" lineno="16750">
<summary>
Send UDP traffic on the cobbler port.
</summary>
@@ -20670,7 +20754,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16747">
+<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16765">
<summary>
Do not audit attempts to send UDP traffic on the cobbler port.
</summary>
@@ -20681,7 +20765,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cobbler_port" lineno="16762">
+<interface name="corenet_udp_receive_cobbler_port" lineno="16780">
<summary>
Receive UDP traffic on the cobbler port.
</summary>
@@ -20692,7 +20776,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16777">
+<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16795">
<summary>
Do not audit attempts to receive UDP traffic on the cobbler port.
</summary>
@@ -20703,7 +20787,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16792">
+<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16810">
<summary>
Send and receive UDP traffic on the cobbler port.
</summary>
@@ -20714,7 +20798,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16808">
+<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16826">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cobbler port.
@@ -20726,7 +20810,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cobbler_port" lineno="16823">
+<interface name="corenet_tcp_bind_cobbler_port" lineno="16841">
<summary>
Bind TCP sockets to the cobbler port.
</summary>
@@ -20737,7 +20821,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cobbler_port" lineno="16843">
+<interface name="corenet_udp_bind_cobbler_port" lineno="16861">
<summary>
Bind UDP sockets to the cobbler port.
</summary>
@@ -20748,7 +20832,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cobbler_port" lineno="16862">
+<interface name="corenet_tcp_connect_cobbler_port" lineno="16880">
<summary>
Make a TCP connection to the cobbler port.
</summary>
@@ -20758,7 +20842,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cobbler_client_packets" lineno="16882">
+<interface name="corenet_send_cobbler_client_packets" lineno="16900">
<summary>
Send cobbler_client packets.
</summary>
@@ -20769,7 +20853,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16901">
+<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16919">
<summary>
Do not audit attempts to send cobbler_client packets.
</summary>
@@ -20780,7 +20864,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cobbler_client_packets" lineno="16920">
+<interface name="corenet_receive_cobbler_client_packets" lineno="16938">
<summary>
Receive cobbler_client packets.
</summary>
@@ -20791,7 +20875,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16939">
+<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16957">
<summary>
Do not audit attempts to receive cobbler_client packets.
</summary>
@@ -20802,7 +20886,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16958">
+<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16976">
<summary>
Send and receive cobbler_client packets.
</summary>
@@ -20813,7 +20897,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16974">
+<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16992">
<summary>
Do not audit attempts to send and receive cobbler_client packets.
</summary>
@@ -20824,7 +20908,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cobbler_client_packets" lineno="16989">
+<interface name="corenet_relabelto_cobbler_client_packets" lineno="17007">
<summary>
Relabel packets to cobbler_client the packet type.
</summary>
@@ -20834,7 +20918,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cobbler_server_packets" lineno="17009">
+<interface name="corenet_send_cobbler_server_packets" lineno="17027">
<summary>
Send cobbler_server packets.
</summary>
@@ -20845,7 +20929,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17028">
+<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17046">
<summary>
Do not audit attempts to send cobbler_server packets.
</summary>
@@ -20856,7 +20940,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cobbler_server_packets" lineno="17047">
+<interface name="corenet_receive_cobbler_server_packets" lineno="17065">
<summary>
Receive cobbler_server packets.
</summary>
@@ -20867,7 +20951,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17066">
+<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17084">
<summary>
Do not audit attempts to receive cobbler_server packets.
</summary>
@@ -20878,7 +20962,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17085">
+<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17103">
<summary>
Send and receive cobbler_server packets.
</summary>
@@ -20889,7 +20973,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17101">
+<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17119">
<summary>
Do not audit attempts to send and receive cobbler_server packets.
</summary>
@@ -20900,7 +20984,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cobbler_server_packets" lineno="17116">
+<interface name="corenet_relabelto_cobbler_server_packets" lineno="17134">
<summary>
Relabel packets to cobbler_server the packet type.
</summary>
@@ -20910,7 +20994,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17138">
+<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17156">
<summary>
Send and receive TCP traffic on the commplex_link port.
</summary>
@@ -20921,7 +21005,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_commplex_link_port" lineno="17153">
+<interface name="corenet_udp_send_commplex_link_port" lineno="17171">
<summary>
Send UDP traffic on the commplex_link port.
</summary>
@@ -20932,7 +21016,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17168">
+<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17186">
<summary>
Do not audit attempts to send UDP traffic on the commplex_link port.
</summary>
@@ -20943,7 +21027,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_commplex_link_port" lineno="17183">
+<interface name="corenet_udp_receive_commplex_link_port" lineno="17201">
<summary>
Receive UDP traffic on the commplex_link port.
</summary>
@@ -20954,7 +21038,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17198">
+<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17216">
<summary>
Do not audit attempts to receive UDP traffic on the commplex_link port.
</summary>
@@ -20965,7 +21049,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17213">
+<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17231">
<summary>
Send and receive UDP traffic on the commplex_link port.
</summary>
@@ -20976,7 +21060,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17229">
+<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17247">
<summary>
Do not audit attempts to send and receive
UDP traffic on the commplex_link port.
@@ -20988,7 +21072,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_commplex_link_port" lineno="17244">
+<interface name="corenet_tcp_bind_commplex_link_port" lineno="17262">
<summary>
Bind TCP sockets to the commplex_link port.
</summary>
@@ -20999,7 +21083,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_commplex_link_port" lineno="17264">
+<interface name="corenet_udp_bind_commplex_link_port" lineno="17282">
<summary>
Bind UDP sockets to the commplex_link port.
</summary>
@@ -21010,7 +21094,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_commplex_link_port" lineno="17283">
+<interface name="corenet_tcp_connect_commplex_link_port" lineno="17301">
<summary>
Make a TCP connection to the commplex_link port.
</summary>
@@ -21020,7 +21104,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_link_client_packets" lineno="17303">
+<interface name="corenet_send_commplex_link_client_packets" lineno="17321">
<summary>
Send commplex_link_client packets.
</summary>
@@ -21031,7 +21115,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17322">
+<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17340">
<summary>
Do not audit attempts to send commplex_link_client packets.
</summary>
@@ -21042,7 +21126,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_link_client_packets" lineno="17341">
+<interface name="corenet_receive_commplex_link_client_packets" lineno="17359">
<summary>
Receive commplex_link_client packets.
</summary>
@@ -21053,7 +21137,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17360">
+<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17378">
<summary>
Do not audit attempts to receive commplex_link_client packets.
</summary>
@@ -21064,7 +21148,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17379">
+<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17397">
<summary>
Send and receive commplex_link_client packets.
</summary>
@@ -21075,7 +21159,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17395">
+<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17413">
<summary>
Do not audit attempts to send and receive commplex_link_client packets.
</summary>
@@ -21086,7 +21170,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17410">
+<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17428">
<summary>
Relabel packets to commplex_link_client the packet type.
</summary>
@@ -21096,7 +21180,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_link_server_packets" lineno="17430">
+<interface name="corenet_send_commplex_link_server_packets" lineno="17448">
<summary>
Send commplex_link_server packets.
</summary>
@@ -21107,7 +21191,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17449">
+<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17467">
<summary>
Do not audit attempts to send commplex_link_server packets.
</summary>
@@ -21118,7 +21202,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_link_server_packets" lineno="17468">
+<interface name="corenet_receive_commplex_link_server_packets" lineno="17486">
<summary>
Receive commplex_link_server packets.
</summary>
@@ -21129,7 +21213,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17487">
+<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17505">
<summary>
Do not audit attempts to receive commplex_link_server packets.
</summary>
@@ -21140,7 +21224,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17506">
+<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17524">
<summary>
Send and receive commplex_link_server packets.
</summary>
@@ -21151,7 +21235,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17522">
+<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17540">
<summary>
Do not audit attempts to send and receive commplex_link_server packets.
</summary>
@@ -21162,7 +21246,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17537">
+<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17555">
<summary>
Relabel packets to commplex_link_server the packet type.
</summary>
@@ -21172,7 +21256,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17559">
+<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17577">
<summary>
Send and receive TCP traffic on the commplex_main port.
</summary>
@@ -21183,7 +21267,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_commplex_main_port" lineno="17574">
+<interface name="corenet_udp_send_commplex_main_port" lineno="17592">
<summary>
Send UDP traffic on the commplex_main port.
</summary>
@@ -21194,7 +21278,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17589">
+<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17607">
<summary>
Do not audit attempts to send UDP traffic on the commplex_main port.
</summary>
@@ -21205,7 +21289,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_commplex_main_port" lineno="17604">
+<interface name="corenet_udp_receive_commplex_main_port" lineno="17622">
<summary>
Receive UDP traffic on the commplex_main port.
</summary>
@@ -21216,7 +21300,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17619">
+<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17637">
<summary>
Do not audit attempts to receive UDP traffic on the commplex_main port.
</summary>
@@ -21227,7 +21311,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17634">
+<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17652">
<summary>
Send and receive UDP traffic on the commplex_main port.
</summary>
@@ -21238,7 +21322,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17650">
+<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17668">
<summary>
Do not audit attempts to send and receive
UDP traffic on the commplex_main port.
@@ -21250,7 +21334,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_commplex_main_port" lineno="17665">
+<interface name="corenet_tcp_bind_commplex_main_port" lineno="17683">
<summary>
Bind TCP sockets to the commplex_main port.
</summary>
@@ -21261,7 +21345,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_commplex_main_port" lineno="17685">
+<interface name="corenet_udp_bind_commplex_main_port" lineno="17703">
<summary>
Bind UDP sockets to the commplex_main port.
</summary>
@@ -21272,7 +21356,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_commplex_main_port" lineno="17704">
+<interface name="corenet_tcp_connect_commplex_main_port" lineno="17722">
<summary>
Make a TCP connection to the commplex_main port.
</summary>
@@ -21282,7 +21366,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_main_client_packets" lineno="17724">
+<interface name="corenet_send_commplex_main_client_packets" lineno="17742">
<summary>
Send commplex_main_client packets.
</summary>
@@ -21293,7 +21377,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17743">
+<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17761">
<summary>
Do not audit attempts to send commplex_main_client packets.
</summary>
@@ -21304,7 +21388,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_main_client_packets" lineno="17762">
+<interface name="corenet_receive_commplex_main_client_packets" lineno="17780">
<summary>
Receive commplex_main_client packets.
</summary>
@@ -21315,7 +21399,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17781">
+<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17799">
<summary>
Do not audit attempts to receive commplex_main_client packets.
</summary>
@@ -21326,7 +21410,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17800">
+<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17818">
<summary>
Send and receive commplex_main_client packets.
</summary>
@@ -21337,7 +21421,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17816">
+<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17834">
<summary>
Do not audit attempts to send and receive commplex_main_client packets.
</summary>
@@ -21348,7 +21432,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17831">
+<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17849">
<summary>
Relabel packets to commplex_main_client the packet type.
</summary>
@@ -21358,7 +21442,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_main_server_packets" lineno="17851">
+<interface name="corenet_send_commplex_main_server_packets" lineno="17869">
<summary>
Send commplex_main_server packets.
</summary>
@@ -21369,7 +21453,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17870">
+<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17888">
<summary>
Do not audit attempts to send commplex_main_server packets.
</summary>
@@ -21380,7 +21464,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_main_server_packets" lineno="17889">
+<interface name="corenet_receive_commplex_main_server_packets" lineno="17907">
<summary>
Receive commplex_main_server packets.
</summary>
@@ -21391,7 +21475,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17908">
+<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17926">
<summary>
Do not audit attempts to receive commplex_main_server packets.
</summary>
@@ -21402,7 +21486,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17927">
+<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17945">
<summary>
Send and receive commplex_main_server packets.
</summary>
@@ -21413,7 +21497,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17943">
+<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17961">
<summary>
Do not audit attempts to send and receive commplex_main_server packets.
</summary>
@@ -21424,7 +21508,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17958">
+<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17976">
<summary>
Relabel packets to commplex_main_server the packet type.
</summary>
@@ -21434,7 +21518,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17980">
+<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17998">
<summary>
Send and receive TCP traffic on the comsat port.
</summary>
@@ -21445,7 +21529,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_comsat_port" lineno="17995">
+<interface name="corenet_udp_send_comsat_port" lineno="18013">
<summary>
Send UDP traffic on the comsat port.
</summary>
@@ -21456,7 +21540,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18010">
+<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18028">
<summary>
Do not audit attempts to send UDP traffic on the comsat port.
</summary>
@@ -21467,7 +21551,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_comsat_port" lineno="18025">
+<interface name="corenet_udp_receive_comsat_port" lineno="18043">
<summary>
Receive UDP traffic on the comsat port.
</summary>
@@ -21478,7 +21562,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18040">
+<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18058">
<summary>
Do not audit attempts to receive UDP traffic on the comsat port.
</summary>
@@ -21489,7 +21573,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_comsat_port" lineno="18055">
+<interface name="corenet_udp_sendrecv_comsat_port" lineno="18073">
<summary>
Send and receive UDP traffic on the comsat port.
</summary>
@@ -21500,7 +21584,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18071">
+<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18089">
<summary>
Do not audit attempts to send and receive
UDP traffic on the comsat port.
@@ -21512,7 +21596,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_comsat_port" lineno="18086">
+<interface name="corenet_tcp_bind_comsat_port" lineno="18104">
<summary>
Bind TCP sockets to the comsat port.
</summary>
@@ -21523,7 +21607,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_comsat_port" lineno="18106">
+<interface name="corenet_udp_bind_comsat_port" lineno="18124">
<summary>
Bind UDP sockets to the comsat port.
</summary>
@@ -21534,7 +21618,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_comsat_port" lineno="18125">
+<interface name="corenet_tcp_connect_comsat_port" lineno="18143">
<summary>
Make a TCP connection to the comsat port.
</summary>
@@ -21544,7 +21628,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_comsat_client_packets" lineno="18145">
+<interface name="corenet_send_comsat_client_packets" lineno="18163">
<summary>
Send comsat_client packets.
</summary>
@@ -21555,7 +21639,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18164">
+<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18182">
<summary>
Do not audit attempts to send comsat_client packets.
</summary>
@@ -21566,7 +21650,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_comsat_client_packets" lineno="18183">
+<interface name="corenet_receive_comsat_client_packets" lineno="18201">
<summary>
Receive comsat_client packets.
</summary>
@@ -21577,7 +21661,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18202">
+<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18220">
<summary>
Do not audit attempts to receive comsat_client packets.
</summary>
@@ -21588,7 +21672,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_comsat_client_packets" lineno="18221">
+<interface name="corenet_sendrecv_comsat_client_packets" lineno="18239">
<summary>
Send and receive comsat_client packets.
</summary>
@@ -21599,7 +21683,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18237">
+<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18255">
<summary>
Do not audit attempts to send and receive comsat_client packets.
</summary>
@@ -21610,7 +21694,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_comsat_client_packets" lineno="18252">
+<interface name="corenet_relabelto_comsat_client_packets" lineno="18270">
<summary>
Relabel packets to comsat_client the packet type.
</summary>
@@ -21620,7 +21704,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_comsat_server_packets" lineno="18272">
+<interface name="corenet_send_comsat_server_packets" lineno="18290">
<summary>
Send comsat_server packets.
</summary>
@@ -21631,7 +21715,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18291">
+<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18309">
<summary>
Do not audit attempts to send comsat_server packets.
</summary>
@@ -21642,7 +21726,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_comsat_server_packets" lineno="18310">
+<interface name="corenet_receive_comsat_server_packets" lineno="18328">
<summary>
Receive comsat_server packets.
</summary>
@@ -21653,7 +21737,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18329">
+<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18347">
<summary>
Do not audit attempts to receive comsat_server packets.
</summary>
@@ -21664,7 +21748,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_comsat_server_packets" lineno="18348">
+<interface name="corenet_sendrecv_comsat_server_packets" lineno="18366">
<summary>
Send and receive comsat_server packets.
</summary>
@@ -21675,7 +21759,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18364">
+<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18382">
<summary>
Do not audit attempts to send and receive comsat_server packets.
</summary>
@@ -21686,7 +21770,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_comsat_server_packets" lineno="18379">
+<interface name="corenet_relabelto_comsat_server_packets" lineno="18397">
<summary>
Relabel packets to comsat_server the packet type.
</summary>
@@ -21696,7 +21780,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_condor_port" lineno="18401">
+<interface name="corenet_tcp_sendrecv_condor_port" lineno="18419">
<summary>
Send and receive TCP traffic on the condor port.
</summary>
@@ -21707,7 +21791,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_condor_port" lineno="18416">
+<interface name="corenet_udp_send_condor_port" lineno="18434">
<summary>
Send UDP traffic on the condor port.
</summary>
@@ -21718,7 +21802,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18431">
+<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18449">
<summary>
Do not audit attempts to send UDP traffic on the condor port.
</summary>
@@ -21729,7 +21813,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_condor_port" lineno="18446">
+<interface name="corenet_udp_receive_condor_port" lineno="18464">
<summary>
Receive UDP traffic on the condor port.
</summary>
@@ -21740,7 +21824,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18461">
+<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18479">
<summary>
Do not audit attempts to receive UDP traffic on the condor port.
</summary>
@@ -21751,7 +21835,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_condor_port" lineno="18476">
+<interface name="corenet_udp_sendrecv_condor_port" lineno="18494">
<summary>
Send and receive UDP traffic on the condor port.
</summary>
@@ -21762,7 +21846,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18492">
+<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18510">
<summary>
Do not audit attempts to send and receive
UDP traffic on the condor port.
@@ -21774,7 +21858,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_condor_port" lineno="18507">
+<interface name="corenet_tcp_bind_condor_port" lineno="18525">
<summary>
Bind TCP sockets to the condor port.
</summary>
@@ -21785,7 +21869,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_condor_port" lineno="18527">
+<interface name="corenet_udp_bind_condor_port" lineno="18545">
<summary>
Bind UDP sockets to the condor port.
</summary>
@@ -21796,7 +21880,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_condor_port" lineno="18546">
+<interface name="corenet_tcp_connect_condor_port" lineno="18564">
<summary>
Make a TCP connection to the condor port.
</summary>
@@ -21806,7 +21890,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_condor_client_packets" lineno="18566">
+<interface name="corenet_send_condor_client_packets" lineno="18584">
<summary>
Send condor_client packets.
</summary>
@@ -21817,7 +21901,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18585">
+<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18603">
<summary>
Do not audit attempts to send condor_client packets.
</summary>
@@ -21828,7 +21912,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_condor_client_packets" lineno="18604">
+<interface name="corenet_receive_condor_client_packets" lineno="18622">
<summary>
Receive condor_client packets.
</summary>
@@ -21839,7 +21923,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18623">
+<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18641">
<summary>
Do not audit attempts to receive condor_client packets.
</summary>
@@ -21850,7 +21934,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_condor_client_packets" lineno="18642">
+<interface name="corenet_sendrecv_condor_client_packets" lineno="18660">
<summary>
Send and receive condor_client packets.
</summary>
@@ -21861,7 +21945,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18658">
+<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18676">
<summary>
Do not audit attempts to send and receive condor_client packets.
</summary>
@@ -21872,7 +21956,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_condor_client_packets" lineno="18673">
+<interface name="corenet_relabelto_condor_client_packets" lineno="18691">
<summary>
Relabel packets to condor_client the packet type.
</summary>
@@ -21882,7 +21966,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_condor_server_packets" lineno="18693">
+<interface name="corenet_send_condor_server_packets" lineno="18711">
<summary>
Send condor_server packets.
</summary>
@@ -21893,7 +21977,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18712">
+<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18730">
<summary>
Do not audit attempts to send condor_server packets.
</summary>
@@ -21904,7 +21988,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_condor_server_packets" lineno="18731">
+<interface name="corenet_receive_condor_server_packets" lineno="18749">
<summary>
Receive condor_server packets.
</summary>
@@ -21915,7 +21999,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18750">
+<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18768">
<summary>
Do not audit attempts to receive condor_server packets.
</summary>
@@ -21926,7 +22010,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_condor_server_packets" lineno="18769">
+<interface name="corenet_sendrecv_condor_server_packets" lineno="18787">
<summary>
Send and receive condor_server packets.
</summary>
@@ -21937,7 +22021,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18785">
+<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18803">
<summary>
Do not audit attempts to send and receive condor_server packets.
</summary>
@@ -21948,7 +22032,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_condor_server_packets" lineno="18800">
+<interface name="corenet_relabelto_condor_server_packets" lineno="18818">
<summary>
Relabel packets to condor_server the packet type.
</summary>
@@ -21958,7 +22042,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18822">
+<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18840">
<summary>
Send and receive TCP traffic on the couchdb port.
</summary>
@@ -21969,7 +22053,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_couchdb_port" lineno="18837">
+<interface name="corenet_udp_send_couchdb_port" lineno="18855">
<summary>
Send UDP traffic on the couchdb port.
</summary>
@@ -21980,7 +22064,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18852">
+<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18870">
<summary>
Do not audit attempts to send UDP traffic on the couchdb port.
</summary>
@@ -21991,7 +22075,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_couchdb_port" lineno="18867">
+<interface name="corenet_udp_receive_couchdb_port" lineno="18885">
<summary>
Receive UDP traffic on the couchdb port.
</summary>
@@ -22002,7 +22086,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18882">
+<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18900">
<summary>
Do not audit attempts to receive UDP traffic on the couchdb port.
</summary>
@@ -22013,7 +22097,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18897">
+<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18915">
<summary>
Send and receive UDP traffic on the couchdb port.
</summary>
@@ -22024,7 +22108,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18913">
+<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18931">
<summary>
Do not audit attempts to send and receive
UDP traffic on the couchdb port.
@@ -22036,7 +22120,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_couchdb_port" lineno="18928">
+<interface name="corenet_tcp_bind_couchdb_port" lineno="18946">
<summary>
Bind TCP sockets to the couchdb port.
</summary>
@@ -22047,7 +22131,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_couchdb_port" lineno="18948">
+<interface name="corenet_udp_bind_couchdb_port" lineno="18966">
<summary>
Bind UDP sockets to the couchdb port.
</summary>
@@ -22058,7 +22142,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_couchdb_port" lineno="18967">
+<interface name="corenet_tcp_connect_couchdb_port" lineno="18985">
<summary>
Make a TCP connection to the couchdb port.
</summary>
@@ -22068,7 +22152,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_couchdb_client_packets" lineno="18987">
+<interface name="corenet_send_couchdb_client_packets" lineno="19005">
<summary>
Send couchdb_client packets.
</summary>
@@ -22079,7 +22163,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19006">
+<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19024">
<summary>
Do not audit attempts to send couchdb_client packets.
</summary>
@@ -22090,7 +22174,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_couchdb_client_packets" lineno="19025">
+<interface name="corenet_receive_couchdb_client_packets" lineno="19043">
<summary>
Receive couchdb_client packets.
</summary>
@@ -22101,7 +22185,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19044">
+<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19062">
<summary>
Do not audit attempts to receive couchdb_client packets.
</summary>
@@ -22112,7 +22196,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19063">
+<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19081">
<summary>
Send and receive couchdb_client packets.
</summary>
@@ -22123,7 +22207,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19079">
+<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19097">
<summary>
Do not audit attempts to send and receive couchdb_client packets.
</summary>
@@ -22134,7 +22218,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_couchdb_client_packets" lineno="19094">
+<interface name="corenet_relabelto_couchdb_client_packets" lineno="19112">
<summary>
Relabel packets to couchdb_client the packet type.
</summary>
@@ -22144,7 +22228,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_couchdb_server_packets" lineno="19114">
+<interface name="corenet_send_couchdb_server_packets" lineno="19132">
<summary>
Send couchdb_server packets.
</summary>
@@ -22155,7 +22239,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19133">
+<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19151">
<summary>
Do not audit attempts to send couchdb_server packets.
</summary>
@@ -22166,7 +22250,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_couchdb_server_packets" lineno="19152">
+<interface name="corenet_receive_couchdb_server_packets" lineno="19170">
<summary>
Receive couchdb_server packets.
</summary>
@@ -22177,7 +22261,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19171">
+<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19189">
<summary>
Do not audit attempts to receive couchdb_server packets.
</summary>
@@ -22188,7 +22272,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19190">
+<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19208">
<summary>
Send and receive couchdb_server packets.
</summary>
@@ -22199,7 +22283,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19206">
+<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19224">
<summary>
Do not audit attempts to send and receive couchdb_server packets.
</summary>
@@ -22210,7 +22294,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_couchdb_server_packets" lineno="19221">
+<interface name="corenet_relabelto_couchdb_server_packets" lineno="19239">
<summary>
Relabel packets to couchdb_server the packet type.
</summary>
@@ -22220,7 +22304,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19243">
+<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19261">
<summary>
Send and receive TCP traffic on the cslistener port.
</summary>
@@ -22231,7 +22315,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cslistener_port" lineno="19258">
+<interface name="corenet_udp_send_cslistener_port" lineno="19276">
<summary>
Send UDP traffic on the cslistener port.
</summary>
@@ -22242,7 +22326,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19273">
+<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19291">
<summary>
Do not audit attempts to send UDP traffic on the cslistener port.
</summary>
@@ -22253,7 +22337,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cslistener_port" lineno="19288">
+<interface name="corenet_udp_receive_cslistener_port" lineno="19306">
<summary>
Receive UDP traffic on the cslistener port.
</summary>
@@ -22264,7 +22348,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19303">
+<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19321">
<summary>
Do not audit attempts to receive UDP traffic on the cslistener port.
</summary>
@@ -22275,7 +22359,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19318">
+<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19336">
<summary>
Send and receive UDP traffic on the cslistener port.
</summary>
@@ -22286,7 +22370,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19334">
+<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19352">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cslistener port.
@@ -22298,7 +22382,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cslistener_port" lineno="19349">
+<interface name="corenet_tcp_bind_cslistener_port" lineno="19367">
<summary>
Bind TCP sockets to the cslistener port.
</summary>
@@ -22309,7 +22393,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cslistener_port" lineno="19369">
+<interface name="corenet_udp_bind_cslistener_port" lineno="19387">
<summary>
Bind UDP sockets to the cslistener port.
</summary>
@@ -22320,7 +22404,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cslistener_port" lineno="19388">
+<interface name="corenet_tcp_connect_cslistener_port" lineno="19406">
<summary>
Make a TCP connection to the cslistener port.
</summary>
@@ -22330,7 +22414,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cslistener_client_packets" lineno="19408">
+<interface name="corenet_send_cslistener_client_packets" lineno="19426">
<summary>
Send cslistener_client packets.
</summary>
@@ -22341,7 +22425,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19427">
+<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19445">
<summary>
Do not audit attempts to send cslistener_client packets.
</summary>
@@ -22352,7 +22436,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cslistener_client_packets" lineno="19446">
+<interface name="corenet_receive_cslistener_client_packets" lineno="19464">
<summary>
Receive cslistener_client packets.
</summary>
@@ -22363,7 +22447,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19465">
+<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19483">
<summary>
Do not audit attempts to receive cslistener_client packets.
</summary>
@@ -22374,7 +22458,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19484">
+<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19502">
<summary>
Send and receive cslistener_client packets.
</summary>
@@ -22385,7 +22469,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19500">
+<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19518">
<summary>
Do not audit attempts to send and receive cslistener_client packets.
</summary>
@@ -22396,7 +22480,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cslistener_client_packets" lineno="19515">
+<interface name="corenet_relabelto_cslistener_client_packets" lineno="19533">
<summary>
Relabel packets to cslistener_client the packet type.
</summary>
@@ -22406,7 +22490,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cslistener_server_packets" lineno="19535">
+<interface name="corenet_send_cslistener_server_packets" lineno="19553">
<summary>
Send cslistener_server packets.
</summary>
@@ -22417,7 +22501,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19554">
+<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19572">
<summary>
Do not audit attempts to send cslistener_server packets.
</summary>
@@ -22428,7 +22512,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cslistener_server_packets" lineno="19573">
+<interface name="corenet_receive_cslistener_server_packets" lineno="19591">
<summary>
Receive cslistener_server packets.
</summary>
@@ -22439,7 +22523,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19592">
+<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19610">
<summary>
Do not audit attempts to receive cslistener_server packets.
</summary>
@@ -22450,7 +22534,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19611">
+<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19629">
<summary>
Send and receive cslistener_server packets.
</summary>
@@ -22461,7 +22545,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19627">
+<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19645">
<summary>
Do not audit attempts to send and receive cslistener_server packets.
</summary>
@@ -22472,7 +22556,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cslistener_server_packets" lineno="19642">
+<interface name="corenet_relabelto_cslistener_server_packets" lineno="19660">
<summary>
Relabel packets to cslistener_server the packet type.
</summary>
@@ -22482,7 +22566,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19664">
+<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19682">
<summary>
Send and receive TCP traffic on the ctdb port.
</summary>
@@ -22493,7 +22577,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ctdb_port" lineno="19679">
+<interface name="corenet_udp_send_ctdb_port" lineno="19697">
<summary>
Send UDP traffic on the ctdb port.
</summary>
@@ -22504,7 +22588,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19694">
+<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19712">
<summary>
Do not audit attempts to send UDP traffic on the ctdb port.
</summary>
@@ -22515,7 +22599,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ctdb_port" lineno="19709">
+<interface name="corenet_udp_receive_ctdb_port" lineno="19727">
<summary>
Receive UDP traffic on the ctdb port.
</summary>
@@ -22526,7 +22610,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19724">
+<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19742">
<summary>
Do not audit attempts to receive UDP traffic on the ctdb port.
</summary>
@@ -22537,7 +22621,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19739">
+<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19757">
<summary>
Send and receive UDP traffic on the ctdb port.
</summary>
@@ -22548,7 +22632,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19755">
+<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19773">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ctdb port.
@@ -22560,7 +22644,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ctdb_port" lineno="19770">
+<interface name="corenet_tcp_bind_ctdb_port" lineno="19788">
<summary>
Bind TCP sockets to the ctdb port.
</summary>
@@ -22571,7 +22655,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ctdb_port" lineno="19790">
+<interface name="corenet_udp_bind_ctdb_port" lineno="19808">
<summary>
Bind UDP sockets to the ctdb port.
</summary>
@@ -22582,7 +22666,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ctdb_port" lineno="19809">
+<interface name="corenet_tcp_connect_ctdb_port" lineno="19827">
<summary>
Make a TCP connection to the ctdb port.
</summary>
@@ -22592,7 +22676,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ctdb_client_packets" lineno="19829">
+<interface name="corenet_send_ctdb_client_packets" lineno="19847">
<summary>
Send ctdb_client packets.
</summary>
@@ -22603,7 +22687,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19848">
+<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19866">
<summary>
Do not audit attempts to send ctdb_client packets.
</summary>
@@ -22614,7 +22698,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ctdb_client_packets" lineno="19867">
+<interface name="corenet_receive_ctdb_client_packets" lineno="19885">
<summary>
Receive ctdb_client packets.
</summary>
@@ -22625,7 +22709,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19886">
+<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19904">
<summary>
Do not audit attempts to receive ctdb_client packets.
</summary>
@@ -22636,7 +22720,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19905">
+<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19923">
<summary>
Send and receive ctdb_client packets.
</summary>
@@ -22647,7 +22731,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19921">
+<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19939">
<summary>
Do not audit attempts to send and receive ctdb_client packets.
</summary>
@@ -22658,7 +22742,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ctdb_client_packets" lineno="19936">
+<interface name="corenet_relabelto_ctdb_client_packets" lineno="19954">
<summary>
Relabel packets to ctdb_client the packet type.
</summary>
@@ -22668,7 +22752,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ctdb_server_packets" lineno="19956">
+<interface name="corenet_send_ctdb_server_packets" lineno="19974">
<summary>
Send ctdb_server packets.
</summary>
@@ -22679,7 +22763,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19975">
+<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19993">
<summary>
Do not audit attempts to send ctdb_server packets.
</summary>
@@ -22690,7 +22774,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ctdb_server_packets" lineno="19994">
+<interface name="corenet_receive_ctdb_server_packets" lineno="20012">
<summary>
Receive ctdb_server packets.
</summary>
@@ -22701,7 +22785,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20013">
+<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20031">
<summary>
Do not audit attempts to receive ctdb_server packets.
</summary>
@@ -22712,7 +22796,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20032">
+<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20050">
<summary>
Send and receive ctdb_server packets.
</summary>
@@ -22723,7 +22807,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20048">
+<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20066">
<summary>
Do not audit attempts to send and receive ctdb_server packets.
</summary>
@@ -22734,7 +22818,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ctdb_server_packets" lineno="20063">
+<interface name="corenet_relabelto_ctdb_server_packets" lineno="20081">
<summary>
Relabel packets to ctdb_server the packet type.
</summary>
@@ -22744,7 +22828,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20085">
+<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20103">
<summary>
Send and receive TCP traffic on the cvs port.
</summary>
@@ -22755,7 +22839,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cvs_port" lineno="20100">
+<interface name="corenet_udp_send_cvs_port" lineno="20118">
<summary>
Send UDP traffic on the cvs port.
</summary>
@@ -22766,7 +22850,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20115">
+<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20133">
<summary>
Do not audit attempts to send UDP traffic on the cvs port.
</summary>
@@ -22777,7 +22861,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cvs_port" lineno="20130">
+<interface name="corenet_udp_receive_cvs_port" lineno="20148">
<summary>
Receive UDP traffic on the cvs port.
</summary>
@@ -22788,7 +22872,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20145">
+<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20163">
<summary>
Do not audit attempts to receive UDP traffic on the cvs port.
</summary>
@@ -22799,7 +22883,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cvs_port" lineno="20160">
+<interface name="corenet_udp_sendrecv_cvs_port" lineno="20178">
<summary>
Send and receive UDP traffic on the cvs port.
</summary>
@@ -22810,7 +22894,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20176">
+<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20194">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cvs port.
@@ -22822,7 +22906,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cvs_port" lineno="20191">
+<interface name="corenet_tcp_bind_cvs_port" lineno="20209">
<summary>
Bind TCP sockets to the cvs port.
</summary>
@@ -22833,7 +22917,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cvs_port" lineno="20211">
+<interface name="corenet_udp_bind_cvs_port" lineno="20229">
<summary>
Bind UDP sockets to the cvs port.
</summary>
@@ -22844,7 +22928,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cvs_port" lineno="20230">
+<interface name="corenet_tcp_connect_cvs_port" lineno="20248">
<summary>
Make a TCP connection to the cvs port.
</summary>
@@ -22854,7 +22938,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cvs_client_packets" lineno="20250">
+<interface name="corenet_send_cvs_client_packets" lineno="20268">
<summary>
Send cvs_client packets.
</summary>
@@ -22865,7 +22949,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20269">
+<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20287">
<summary>
Do not audit attempts to send cvs_client packets.
</summary>
@@ -22876,7 +22960,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cvs_client_packets" lineno="20288">
+<interface name="corenet_receive_cvs_client_packets" lineno="20306">
<summary>
Receive cvs_client packets.
</summary>
@@ -22887,7 +22971,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20307">
+<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20325">
<summary>
Do not audit attempts to receive cvs_client packets.
</summary>
@@ -22898,7 +22982,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cvs_client_packets" lineno="20326">
+<interface name="corenet_sendrecv_cvs_client_packets" lineno="20344">
<summary>
Send and receive cvs_client packets.
</summary>
@@ -22909,7 +22993,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20342">
+<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20360">
<summary>
Do not audit attempts to send and receive cvs_client packets.
</summary>
@@ -22920,7 +23004,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cvs_client_packets" lineno="20357">
+<interface name="corenet_relabelto_cvs_client_packets" lineno="20375">
<summary>
Relabel packets to cvs_client the packet type.
</summary>
@@ -22930,7 +23014,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cvs_server_packets" lineno="20377">
+<interface name="corenet_send_cvs_server_packets" lineno="20395">
<summary>
Send cvs_server packets.
</summary>
@@ -22941,7 +23025,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20396">
+<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20414">
<summary>
Do not audit attempts to send cvs_server packets.
</summary>
@@ -22952,7 +23036,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cvs_server_packets" lineno="20415">
+<interface name="corenet_receive_cvs_server_packets" lineno="20433">
<summary>
Receive cvs_server packets.
</summary>
@@ -22963,7 +23047,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20434">
+<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20452">
<summary>
Do not audit attempts to receive cvs_server packets.
</summary>
@@ -22974,7 +23058,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cvs_server_packets" lineno="20453">
+<interface name="corenet_sendrecv_cvs_server_packets" lineno="20471">
<summary>
Send and receive cvs_server packets.
</summary>
@@ -22985,7 +23069,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20469">
+<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20487">
<summary>
Do not audit attempts to send and receive cvs_server packets.
</summary>
@@ -22996,7 +23080,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cvs_server_packets" lineno="20484">
+<interface name="corenet_relabelto_cvs_server_packets" lineno="20502">
<summary>
Relabel packets to cvs_server the packet type.
</summary>
@@ -23006,7 +23090,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20506">
+<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20524">
<summary>
Send and receive TCP traffic on the cyphesis port.
</summary>
@@ -23017,7 +23101,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cyphesis_port" lineno="20521">
+<interface name="corenet_udp_send_cyphesis_port" lineno="20539">
<summary>
Send UDP traffic on the cyphesis port.
</summary>
@@ -23028,7 +23112,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20536">
+<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20554">
<summary>
Do not audit attempts to send UDP traffic on the cyphesis port.
</summary>
@@ -23039,7 +23123,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cyphesis_port" lineno="20551">
+<interface name="corenet_udp_receive_cyphesis_port" lineno="20569">
<summary>
Receive UDP traffic on the cyphesis port.
</summary>
@@ -23050,7 +23134,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20566">
+<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20584">
<summary>
Do not audit attempts to receive UDP traffic on the cyphesis port.
</summary>
@@ -23061,7 +23145,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20581">
+<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20599">
<summary>
Send and receive UDP traffic on the cyphesis port.
</summary>
@@ -23072,7 +23156,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20597">
+<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20615">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cyphesis port.
@@ -23084,7 +23168,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cyphesis_port" lineno="20612">
+<interface name="corenet_tcp_bind_cyphesis_port" lineno="20630">
<summary>
Bind TCP sockets to the cyphesis port.
</summary>
@@ -23095,7 +23179,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cyphesis_port" lineno="20632">
+<interface name="corenet_udp_bind_cyphesis_port" lineno="20650">
<summary>
Bind UDP sockets to the cyphesis port.
</summary>
@@ -23106,7 +23190,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cyphesis_port" lineno="20651">
+<interface name="corenet_tcp_connect_cyphesis_port" lineno="20669">
<summary>
Make a TCP connection to the cyphesis port.
</summary>
@@ -23116,7 +23200,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cyphesis_client_packets" lineno="20671">
+<interface name="corenet_send_cyphesis_client_packets" lineno="20689">
<summary>
Send cyphesis_client packets.
</summary>
@@ -23127,7 +23211,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20690">
+<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20708">
<summary>
Do not audit attempts to send cyphesis_client packets.
</summary>
@@ -23138,7 +23222,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cyphesis_client_packets" lineno="20709">
+<interface name="corenet_receive_cyphesis_client_packets" lineno="20727">
<summary>
Receive cyphesis_client packets.
</summary>
@@ -23149,7 +23233,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20728">
+<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20746">
<summary>
Do not audit attempts to receive cyphesis_client packets.
</summary>
@@ -23160,7 +23244,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20747">
+<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20765">
<summary>
Send and receive cyphesis_client packets.
</summary>
@@ -23171,7 +23255,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20763">
+<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20781">
<summary>
Do not audit attempts to send and receive cyphesis_client packets.
</summary>
@@ -23182,7 +23266,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20778">
+<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20796">
<summary>
Relabel packets to cyphesis_client the packet type.
</summary>
@@ -23192,7 +23276,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cyphesis_server_packets" lineno="20798">
+<interface name="corenet_send_cyphesis_server_packets" lineno="20816">
<summary>
Send cyphesis_server packets.
</summary>
@@ -23203,7 +23287,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20817">
+<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20835">
<summary>
Do not audit attempts to send cyphesis_server packets.
</summary>
@@ -23214,7 +23298,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cyphesis_server_packets" lineno="20836">
+<interface name="corenet_receive_cyphesis_server_packets" lineno="20854">
<summary>
Receive cyphesis_server packets.
</summary>
@@ -23225,7 +23309,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20855">
+<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20873">
<summary>
Do not audit attempts to receive cyphesis_server packets.
</summary>
@@ -23236,7 +23320,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20874">
+<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20892">
<summary>
Send and receive cyphesis_server packets.
</summary>
@@ -23247,7 +23331,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20890">
+<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20908">
<summary>
Do not audit attempts to send and receive cyphesis_server packets.
</summary>
@@ -23258,7 +23342,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20905">
+<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20923">
<summary>
Relabel packets to cyphesis_server the packet type.
</summary>
@@ -23268,7 +23352,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_daap_port" lineno="20927">
+<interface name="corenet_tcp_sendrecv_daap_port" lineno="20945">
<summary>
Send and receive TCP traffic on the daap port.
</summary>
@@ -23279,7 +23363,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_daap_port" lineno="20942">
+<interface name="corenet_udp_send_daap_port" lineno="20960">
<summary>
Send UDP traffic on the daap port.
</summary>
@@ -23290,7 +23374,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20957">
+<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20975">
<summary>
Do not audit attempts to send UDP traffic on the daap port.
</summary>
@@ -23301,7 +23385,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_daap_port" lineno="20972">
+<interface name="corenet_udp_receive_daap_port" lineno="20990">
<summary>
Receive UDP traffic on the daap port.
</summary>
@@ -23312,7 +23396,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="20987">
+<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="21005">
<summary>
Do not audit attempts to receive UDP traffic on the daap port.
</summary>
@@ -23323,7 +23407,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_daap_port" lineno="21002">
+<interface name="corenet_udp_sendrecv_daap_port" lineno="21020">
<summary>
Send and receive UDP traffic on the daap port.
</summary>
@@ -23334,7 +23418,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21018">
+<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21036">
<summary>
Do not audit attempts to send and receive
UDP traffic on the daap port.
@@ -23346,7 +23430,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_daap_port" lineno="21033">
+<interface name="corenet_tcp_bind_daap_port" lineno="21051">
<summary>
Bind TCP sockets to the daap port.
</summary>
@@ -23357,7 +23441,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_daap_port" lineno="21053">
+<interface name="corenet_udp_bind_daap_port" lineno="21071">
<summary>
Bind UDP sockets to the daap port.
</summary>
@@ -23368,7 +23452,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_daap_port" lineno="21072">
+<interface name="corenet_tcp_connect_daap_port" lineno="21090">
<summary>
Make a TCP connection to the daap port.
</summary>
@@ -23378,7 +23462,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_daap_client_packets" lineno="21092">
+<interface name="corenet_send_daap_client_packets" lineno="21110">
<summary>
Send daap_client packets.
</summary>
@@ -23389,7 +23473,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21111">
+<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21129">
<summary>
Do not audit attempts to send daap_client packets.
</summary>
@@ -23400,7 +23484,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_daap_client_packets" lineno="21130">
+<interface name="corenet_receive_daap_client_packets" lineno="21148">
<summary>
Receive daap_client packets.
</summary>
@@ -23411,7 +23495,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21149">
+<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21167">
<summary>
Do not audit attempts to receive daap_client packets.
</summary>
@@ -23422,7 +23506,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_daap_client_packets" lineno="21168">
+<interface name="corenet_sendrecv_daap_client_packets" lineno="21186">
<summary>
Send and receive daap_client packets.
</summary>
@@ -23433,7 +23517,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21184">
+<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21202">
<summary>
Do not audit attempts to send and receive daap_client packets.
</summary>
@@ -23444,7 +23528,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_daap_client_packets" lineno="21199">
+<interface name="corenet_relabelto_daap_client_packets" lineno="21217">
<summary>
Relabel packets to daap_client the packet type.
</summary>
@@ -23454,7 +23538,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_daap_server_packets" lineno="21219">
+<interface name="corenet_send_daap_server_packets" lineno="21237">
<summary>
Send daap_server packets.
</summary>
@@ -23465,7 +23549,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21238">
+<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21256">
<summary>
Do not audit attempts to send daap_server packets.
</summary>
@@ -23476,7 +23560,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_daap_server_packets" lineno="21257">
+<interface name="corenet_receive_daap_server_packets" lineno="21275">
<summary>
Receive daap_server packets.
</summary>
@@ -23487,7 +23571,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21276">
+<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21294">
<summary>
Do not audit attempts to receive daap_server packets.
</summary>
@@ -23498,7 +23582,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_daap_server_packets" lineno="21295">
+<interface name="corenet_sendrecv_daap_server_packets" lineno="21313">
<summary>
Send and receive daap_server packets.
</summary>
@@ -23509,7 +23593,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21311">
+<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21329">
<summary>
Do not audit attempts to send and receive daap_server packets.
</summary>
@@ -23520,7 +23604,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_daap_server_packets" lineno="21326">
+<interface name="corenet_relabelto_daap_server_packets" lineno="21344">
<summary>
Relabel packets to daap_server the packet type.
</summary>
@@ -23530,7 +23614,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21348">
+<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21366">
<summary>
Send and receive TCP traffic on the dbskkd port.
</summary>
@@ -23541,7 +23625,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dbskkd_port" lineno="21363">
+<interface name="corenet_udp_send_dbskkd_port" lineno="21381">
<summary>
Send UDP traffic on the dbskkd port.
</summary>
@@ -23552,7 +23636,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21378">
+<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21396">
<summary>
Do not audit attempts to send UDP traffic on the dbskkd port.
</summary>
@@ -23563,7 +23647,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dbskkd_port" lineno="21393">
+<interface name="corenet_udp_receive_dbskkd_port" lineno="21411">
<summary>
Receive UDP traffic on the dbskkd port.
</summary>
@@ -23574,7 +23658,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21408">
+<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21426">
<summary>
Do not audit attempts to receive UDP traffic on the dbskkd port.
</summary>
@@ -23585,7 +23669,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21423">
+<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21441">
<summary>
Send and receive UDP traffic on the dbskkd port.
</summary>
@@ -23596,7 +23680,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21439">
+<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21457">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dbskkd port.
@@ -23608,7 +23692,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dbskkd_port" lineno="21454">
+<interface name="corenet_tcp_bind_dbskkd_port" lineno="21472">
<summary>
Bind TCP sockets to the dbskkd port.
</summary>
@@ -23619,7 +23703,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dbskkd_port" lineno="21474">
+<interface name="corenet_udp_bind_dbskkd_port" lineno="21492">
<summary>
Bind UDP sockets to the dbskkd port.
</summary>
@@ -23630,7 +23714,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dbskkd_port" lineno="21493">
+<interface name="corenet_tcp_connect_dbskkd_port" lineno="21511">
<summary>
Make a TCP connection to the dbskkd port.
</summary>
@@ -23640,7 +23724,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dbskkd_client_packets" lineno="21513">
+<interface name="corenet_send_dbskkd_client_packets" lineno="21531">
<summary>
Send dbskkd_client packets.
</summary>
@@ -23651,7 +23735,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21532">
+<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21550">
<summary>
Do not audit attempts to send dbskkd_client packets.
</summary>
@@ -23662,7 +23746,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dbskkd_client_packets" lineno="21551">
+<interface name="corenet_receive_dbskkd_client_packets" lineno="21569">
<summary>
Receive dbskkd_client packets.
</summary>
@@ -23673,7 +23757,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21570">
+<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21588">
<summary>
Do not audit attempts to receive dbskkd_client packets.
</summary>
@@ -23684,7 +23768,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21589">
+<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21607">
<summary>
Send and receive dbskkd_client packets.
</summary>
@@ -23695,7 +23779,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21605">
+<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21623">
<summary>
Do not audit attempts to send and receive dbskkd_client packets.
</summary>
@@ -23706,7 +23790,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21620">
+<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21638">
<summary>
Relabel packets to dbskkd_client the packet type.
</summary>
@@ -23716,7 +23800,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dbskkd_server_packets" lineno="21640">
+<interface name="corenet_send_dbskkd_server_packets" lineno="21658">
<summary>
Send dbskkd_server packets.
</summary>
@@ -23727,7 +23811,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21659">
+<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21677">
<summary>
Do not audit attempts to send dbskkd_server packets.
</summary>
@@ -23738,7 +23822,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dbskkd_server_packets" lineno="21678">
+<interface name="corenet_receive_dbskkd_server_packets" lineno="21696">
<summary>
Receive dbskkd_server packets.
</summary>
@@ -23749,7 +23833,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21697">
+<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21715">
<summary>
Do not audit attempts to receive dbskkd_server packets.
</summary>
@@ -23760,7 +23844,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21716">
+<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21734">
<summary>
Send and receive dbskkd_server packets.
</summary>
@@ -23771,7 +23855,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21732">
+<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21750">
<summary>
Do not audit attempts to send and receive dbskkd_server packets.
</summary>
@@ -23782,7 +23866,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21747">
+<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21765">
<summary>
Relabel packets to dbskkd_server the packet type.
</summary>
@@ -23792,7 +23876,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21769">
+<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21787">
<summary>
Send and receive TCP traffic on the dcc port.
</summary>
@@ -23803,7 +23887,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dcc_port" lineno="21784">
+<interface name="corenet_udp_send_dcc_port" lineno="21802">
<summary>
Send UDP traffic on the dcc port.
</summary>
@@ -23814,7 +23898,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21799">
+<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21817">
<summary>
Do not audit attempts to send UDP traffic on the dcc port.
</summary>
@@ -23825,7 +23909,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dcc_port" lineno="21814">
+<interface name="corenet_udp_receive_dcc_port" lineno="21832">
<summary>
Receive UDP traffic on the dcc port.
</summary>
@@ -23836,7 +23920,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21829">
+<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21847">
<summary>
Do not audit attempts to receive UDP traffic on the dcc port.
</summary>
@@ -23847,7 +23931,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dcc_port" lineno="21844">
+<interface name="corenet_udp_sendrecv_dcc_port" lineno="21862">
<summary>
Send and receive UDP traffic on the dcc port.
</summary>
@@ -23858,7 +23942,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21860">
+<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21878">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dcc port.
@@ -23870,7 +23954,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dcc_port" lineno="21875">
+<interface name="corenet_tcp_bind_dcc_port" lineno="21893">
<summary>
Bind TCP sockets to the dcc port.
</summary>
@@ -23881,7 +23965,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dcc_port" lineno="21895">
+<interface name="corenet_udp_bind_dcc_port" lineno="21913">
<summary>
Bind UDP sockets to the dcc port.
</summary>
@@ -23892,7 +23976,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dcc_port" lineno="21914">
+<interface name="corenet_tcp_connect_dcc_port" lineno="21932">
<summary>
Make a TCP connection to the dcc port.
</summary>
@@ -23902,7 +23986,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dcc_client_packets" lineno="21934">
+<interface name="corenet_send_dcc_client_packets" lineno="21952">
<summary>
Send dcc_client packets.
</summary>
@@ -23913,7 +23997,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21953">
+<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21971">
<summary>
Do not audit attempts to send dcc_client packets.
</summary>
@@ -23924,7 +24008,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dcc_client_packets" lineno="21972">
+<interface name="corenet_receive_dcc_client_packets" lineno="21990">
<summary>
Receive dcc_client packets.
</summary>
@@ -23935,7 +24019,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="21991">
+<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="22009">
<summary>
Do not audit attempts to receive dcc_client packets.
</summary>
@@ -23946,7 +24030,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dcc_client_packets" lineno="22010">
+<interface name="corenet_sendrecv_dcc_client_packets" lineno="22028">
<summary>
Send and receive dcc_client packets.
</summary>
@@ -23957,7 +24041,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22026">
+<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22044">
<summary>
Do not audit attempts to send and receive dcc_client packets.
</summary>
@@ -23968,7 +24052,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dcc_client_packets" lineno="22041">
+<interface name="corenet_relabelto_dcc_client_packets" lineno="22059">
<summary>
Relabel packets to dcc_client the packet type.
</summary>
@@ -23978,7 +24062,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dcc_server_packets" lineno="22061">
+<interface name="corenet_send_dcc_server_packets" lineno="22079">
<summary>
Send dcc_server packets.
</summary>
@@ -23989,7 +24073,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22080">
+<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22098">
<summary>
Do not audit attempts to send dcc_server packets.
</summary>
@@ -24000,7 +24084,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dcc_server_packets" lineno="22099">
+<interface name="corenet_receive_dcc_server_packets" lineno="22117">
<summary>
Receive dcc_server packets.
</summary>
@@ -24011,7 +24095,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22118">
+<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22136">
<summary>
Do not audit attempts to receive dcc_server packets.
</summary>
@@ -24022,7 +24106,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dcc_server_packets" lineno="22137">
+<interface name="corenet_sendrecv_dcc_server_packets" lineno="22155">
<summary>
Send and receive dcc_server packets.
</summary>
@@ -24033,7 +24117,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22153">
+<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22171">
<summary>
Do not audit attempts to send and receive dcc_server packets.
</summary>
@@ -24044,7 +24128,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dcc_server_packets" lineno="22168">
+<interface name="corenet_relabelto_dcc_server_packets" lineno="22186">
<summary>
Relabel packets to dcc_server the packet type.
</summary>
@@ -24054,7 +24138,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22190">
+<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22208">
<summary>
Send and receive TCP traffic on the dccm port.
</summary>
@@ -24065,7 +24149,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dccm_port" lineno="22205">
+<interface name="corenet_udp_send_dccm_port" lineno="22223">
<summary>
Send UDP traffic on the dccm port.
</summary>
@@ -24076,7 +24160,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22220">
+<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22238">
<summary>
Do not audit attempts to send UDP traffic on the dccm port.
</summary>
@@ -24087,7 +24171,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dccm_port" lineno="22235">
+<interface name="corenet_udp_receive_dccm_port" lineno="22253">
<summary>
Receive UDP traffic on the dccm port.
</summary>
@@ -24098,7 +24182,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22250">
+<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22268">
<summary>
Do not audit attempts to receive UDP traffic on the dccm port.
</summary>
@@ -24109,7 +24193,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dccm_port" lineno="22265">
+<interface name="corenet_udp_sendrecv_dccm_port" lineno="22283">
<summary>
Send and receive UDP traffic on the dccm port.
</summary>
@@ -24120,7 +24204,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22281">
+<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22299">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dccm port.
@@ -24132,7 +24216,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dccm_port" lineno="22296">
+<interface name="corenet_tcp_bind_dccm_port" lineno="22314">
<summary>
Bind TCP sockets to the dccm port.
</summary>
@@ -24143,7 +24227,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dccm_port" lineno="22316">
+<interface name="corenet_udp_bind_dccm_port" lineno="22334">
<summary>
Bind UDP sockets to the dccm port.
</summary>
@@ -24154,7 +24238,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dccm_port" lineno="22335">
+<interface name="corenet_tcp_connect_dccm_port" lineno="22353">
<summary>
Make a TCP connection to the dccm port.
</summary>
@@ -24164,7 +24248,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dccm_client_packets" lineno="22355">
+<interface name="corenet_send_dccm_client_packets" lineno="22373">
<summary>
Send dccm_client packets.
</summary>
@@ -24175,7 +24259,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22374">
+<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22392">
<summary>
Do not audit attempts to send dccm_client packets.
</summary>
@@ -24186,7 +24270,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dccm_client_packets" lineno="22393">
+<interface name="corenet_receive_dccm_client_packets" lineno="22411">
<summary>
Receive dccm_client packets.
</summary>
@@ -24197,7 +24281,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22412">
+<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22430">
<summary>
Do not audit attempts to receive dccm_client packets.
</summary>
@@ -24208,7 +24292,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dccm_client_packets" lineno="22431">
+<interface name="corenet_sendrecv_dccm_client_packets" lineno="22449">
<summary>
Send and receive dccm_client packets.
</summary>
@@ -24219,7 +24303,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22447">
+<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22465">
<summary>
Do not audit attempts to send and receive dccm_client packets.
</summary>
@@ -24230,7 +24314,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dccm_client_packets" lineno="22462">
+<interface name="corenet_relabelto_dccm_client_packets" lineno="22480">
<summary>
Relabel packets to dccm_client the packet type.
</summary>
@@ -24240,7 +24324,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dccm_server_packets" lineno="22482">
+<interface name="corenet_send_dccm_server_packets" lineno="22500">
<summary>
Send dccm_server packets.
</summary>
@@ -24251,7 +24335,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22501">
+<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22519">
<summary>
Do not audit attempts to send dccm_server packets.
</summary>
@@ -24262,7 +24346,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dccm_server_packets" lineno="22520">
+<interface name="corenet_receive_dccm_server_packets" lineno="22538">
<summary>
Receive dccm_server packets.
</summary>
@@ -24273,7 +24357,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="22539">
+<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="22557">
<summary>
Do not audit attempts to receive dccm_server packets.
</summary>
@@ -24284,7 +24368,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dccm_server_packets" lineno="22558">
+<interface name="corenet_sendrecv_dccm_server_packets" lineno="22576">
<summary>
Send and receive dccm_server packets.
</summary>
@@ -24295,7 +24379,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22574">
+<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22592">
<summary>
Do not audit attempts to send and receive dccm_server packets.
</summary>
@@ -24306,7 +24390,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dccm_server_packets" lineno="22589">
+<interface name="corenet_relabelto_dccm_server_packets" lineno="22607">
<summary>
Relabel packets to dccm_server the packet type.
</summary>
@@ -24316,7 +24400,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22611">
+<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22629">
<summary>
Send and receive TCP traffic on the dhcpc port.
</summary>
@@ -24327,7 +24411,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dhcpc_port" lineno="22626">
+<interface name="corenet_udp_send_dhcpc_port" lineno="22644">
<summary>
Send UDP traffic on the dhcpc port.
</summary>
@@ -24338,7 +24422,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22641">
+<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22659">
<summary>
Do not audit attempts to send UDP traffic on the dhcpc port.
</summary>
@@ -24349,7 +24433,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dhcpc_port" lineno="22656">
+<interface name="corenet_udp_receive_dhcpc_port" lineno="22674">
<summary>
Receive UDP traffic on the dhcpc port.
</summary>
@@ -24360,7 +24444,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22671">
+<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22689">
<summary>
Do not audit attempts to receive UDP traffic on the dhcpc port.
</summary>
@@ -24371,7 +24455,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22686">
+<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22704">
<summary>
Send and receive UDP traffic on the dhcpc port.
</summary>
@@ -24382,7 +24466,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22702">
+<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22720">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dhcpc port.
@@ -24394,7 +24478,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dhcpc_port" lineno="22717">
+<interface name="corenet_tcp_bind_dhcpc_port" lineno="22735">
<summary>
Bind TCP sockets to the dhcpc port.
</summary>
@@ -24405,7 +24489,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dhcpc_port" lineno="22737">
+<interface name="corenet_udp_bind_dhcpc_port" lineno="22755">
<summary>
Bind UDP sockets to the dhcpc port.
</summary>
@@ -24416,7 +24500,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dhcpc_port" lineno="22756">
+<interface name="corenet_tcp_connect_dhcpc_port" lineno="22774">
<summary>
Make a TCP connection to the dhcpc port.
</summary>
@@ -24426,7 +24510,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpc_client_packets" lineno="22776">
+<interface name="corenet_send_dhcpc_client_packets" lineno="22794">
<summary>
Send dhcpc_client packets.
</summary>
@@ -24437,7 +24521,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22795">
+<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22813">
<summary>
Do not audit attempts to send dhcpc_client packets.
</summary>
@@ -24448,7 +24532,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpc_client_packets" lineno="22814">
+<interface name="corenet_receive_dhcpc_client_packets" lineno="22832">
<summary>
Receive dhcpc_client packets.
</summary>
@@ -24459,7 +24543,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22833">
+<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22851">
<summary>
Do not audit attempts to receive dhcpc_client packets.
</summary>
@@ -24470,7 +24554,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22852">
+<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22870">
<summary>
Send and receive dhcpc_client packets.
</summary>
@@ -24481,7 +24565,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22868">
+<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22886">
<summary>
Do not audit attempts to send and receive dhcpc_client packets.
</summary>
@@ -24492,7 +24576,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22883">
+<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22901">
<summary>
Relabel packets to dhcpc_client the packet type.
</summary>
@@ -24502,7 +24586,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpc_server_packets" lineno="22903">
+<interface name="corenet_send_dhcpc_server_packets" lineno="22921">
<summary>
Send dhcpc_server packets.
</summary>
@@ -24513,7 +24597,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22922">
+<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22940">
<summary>
Do not audit attempts to send dhcpc_server packets.
</summary>
@@ -24524,7 +24608,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpc_server_packets" lineno="22941">
+<interface name="corenet_receive_dhcpc_server_packets" lineno="22959">
<summary>
Receive dhcpc_server packets.
</summary>
@@ -24535,7 +24619,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22960">
+<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22978">
<summary>
Do not audit attempts to receive dhcpc_server packets.
</summary>
@@ -24546,7 +24630,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22979">
+<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22997">
<summary>
Send and receive dhcpc_server packets.
</summary>
@@ -24557,7 +24641,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="22995">
+<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="23013">
<summary>
Do not audit attempts to send and receive dhcpc_server packets.
</summary>
@@ -24568,7 +24652,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23010">
+<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23028">
<summary>
Relabel packets to dhcpc_server the packet type.
</summary>
@@ -24578,7 +24662,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23032">
+<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23050">
<summary>
Send and receive TCP traffic on the dhcpd port.
</summary>
@@ -24589,7 +24673,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dhcpd_port" lineno="23047">
+<interface name="corenet_udp_send_dhcpd_port" lineno="23065">
<summary>
Send UDP traffic on the dhcpd port.
</summary>
@@ -24600,7 +24684,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23062">
+<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23080">
<summary>
Do not audit attempts to send UDP traffic on the dhcpd port.
</summary>
@@ -24611,7 +24695,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dhcpd_port" lineno="23077">
+<interface name="corenet_udp_receive_dhcpd_port" lineno="23095">
<summary>
Receive UDP traffic on the dhcpd port.
</summary>
@@ -24622,7 +24706,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23092">
+<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23110">
<summary>
Do not audit attempts to receive UDP traffic on the dhcpd port.
</summary>
@@ -24633,7 +24717,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23107">
+<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23125">
<summary>
Send and receive UDP traffic on the dhcpd port.
</summary>
@@ -24644,7 +24728,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23123">
+<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23141">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dhcpd port.
@@ -24656,7 +24740,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dhcpd_port" lineno="23138">
+<interface name="corenet_tcp_bind_dhcpd_port" lineno="23156">
<summary>
Bind TCP sockets to the dhcpd port.
</summary>
@@ -24667,7 +24751,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dhcpd_port" lineno="23158">
+<interface name="corenet_udp_bind_dhcpd_port" lineno="23176">
<summary>
Bind UDP sockets to the dhcpd port.
</summary>
@@ -24678,7 +24762,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dhcpd_port" lineno="23177">
+<interface name="corenet_tcp_connect_dhcpd_port" lineno="23195">
<summary>
Make a TCP connection to the dhcpd port.
</summary>
@@ -24688,7 +24772,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpd_client_packets" lineno="23197">
+<interface name="corenet_send_dhcpd_client_packets" lineno="23215">
<summary>
Send dhcpd_client packets.
</summary>
@@ -24699,7 +24783,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23216">
+<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23234">
<summary>
Do not audit attempts to send dhcpd_client packets.
</summary>
@@ -24710,7 +24794,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpd_client_packets" lineno="23235">
+<interface name="corenet_receive_dhcpd_client_packets" lineno="23253">
<summary>
Receive dhcpd_client packets.
</summary>
@@ -24721,7 +24805,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23254">
+<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23272">
<summary>
Do not audit attempts to receive dhcpd_client packets.
</summary>
@@ -24732,7 +24816,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23273">
+<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23291">
<summary>
Send and receive dhcpd_client packets.
</summary>
@@ -24743,7 +24827,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23289">
+<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23307">
<summary>
Do not audit attempts to send and receive dhcpd_client packets.
</summary>
@@ -24754,7 +24838,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23304">
+<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23322">
<summary>
Relabel packets to dhcpd_client the packet type.
</summary>
@@ -24764,7 +24848,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpd_server_packets" lineno="23324">
+<interface name="corenet_send_dhcpd_server_packets" lineno="23342">
<summary>
Send dhcpd_server packets.
</summary>
@@ -24775,7 +24859,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23343">
+<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23361">
<summary>
Do not audit attempts to send dhcpd_server packets.
</summary>
@@ -24786,7 +24870,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpd_server_packets" lineno="23362">
+<interface name="corenet_receive_dhcpd_server_packets" lineno="23380">
<summary>
Receive dhcpd_server packets.
</summary>
@@ -24797,7 +24881,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23381">
+<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23399">
<summary>
Do not audit attempts to receive dhcpd_server packets.
</summary>
@@ -24808,7 +24892,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23400">
+<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23418">
<summary>
Send and receive dhcpd_server packets.
</summary>
@@ -24819,7 +24903,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23416">
+<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23434">
<summary>
Do not audit attempts to send and receive dhcpd_server packets.
</summary>
@@ -24830,7 +24914,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23431">
+<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23449">
<summary>
Relabel packets to dhcpd_server the packet type.
</summary>
@@ -24840,7 +24924,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dict_port" lineno="23453">
+<interface name="corenet_tcp_sendrecv_dict_port" lineno="23471">
<summary>
Send and receive TCP traffic on the dict port.
</summary>
@@ -24851,7 +24935,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dict_port" lineno="23468">
+<interface name="corenet_udp_send_dict_port" lineno="23486">
<summary>
Send UDP traffic on the dict port.
</summary>
@@ -24862,7 +24946,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dict_port" lineno="23483">
+<interface name="corenet_dontaudit_udp_send_dict_port" lineno="23501">
<summary>
Do not audit attempts to send UDP traffic on the dict port.
</summary>
@@ -24873,7 +24957,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dict_port" lineno="23498">
+<interface name="corenet_udp_receive_dict_port" lineno="23516">
<summary>
Receive UDP traffic on the dict port.
</summary>
@@ -24884,7 +24968,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="23513">
+<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="23531">
<summary>
Do not audit attempts to receive UDP traffic on the dict port.
</summary>
@@ -24895,7 +24979,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dict_port" lineno="23528">
+<interface name="corenet_udp_sendrecv_dict_port" lineno="23546">
<summary>
Send and receive UDP traffic on the dict port.
</summary>
@@ -24906,7 +24990,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23544">
+<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23562">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dict port.
@@ -24918,7 +25002,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dict_port" lineno="23559">
+<interface name="corenet_tcp_bind_dict_port" lineno="23577">
<summary>
Bind TCP sockets to the dict port.
</summary>
@@ -24929,7 +25013,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dict_port" lineno="23579">
+<interface name="corenet_udp_bind_dict_port" lineno="23597">
<summary>
Bind UDP sockets to the dict port.
</summary>
@@ -24940,7 +25024,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dict_port" lineno="23598">
+<interface name="corenet_tcp_connect_dict_port" lineno="23616">
<summary>
Make a TCP connection to the dict port.
</summary>
@@ -24950,7 +25034,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dict_client_packets" lineno="23618">
+<interface name="corenet_send_dict_client_packets" lineno="23636">
<summary>
Send dict_client packets.
</summary>
@@ -24961,7 +25045,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23637">
+<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23655">
<summary>
Do not audit attempts to send dict_client packets.
</summary>
@@ -24972,7 +25056,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dict_client_packets" lineno="23656">
+<interface name="corenet_receive_dict_client_packets" lineno="23674">
<summary>
Receive dict_client packets.
</summary>
@@ -24983,7 +25067,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23675">
+<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23693">
<summary>
Do not audit attempts to receive dict_client packets.
</summary>
@@ -24994,7 +25078,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dict_client_packets" lineno="23694">
+<interface name="corenet_sendrecv_dict_client_packets" lineno="23712">
<summary>
Send and receive dict_client packets.
</summary>
@@ -25005,7 +25089,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23710">
+<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23728">
<summary>
Do not audit attempts to send and receive dict_client packets.
</summary>
@@ -25016,7 +25100,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dict_client_packets" lineno="23725">
+<interface name="corenet_relabelto_dict_client_packets" lineno="23743">
<summary>
Relabel packets to dict_client the packet type.
</summary>
@@ -25026,7 +25110,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dict_server_packets" lineno="23745">
+<interface name="corenet_send_dict_server_packets" lineno="23763">
<summary>
Send dict_server packets.
</summary>
@@ -25037,7 +25121,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23764">
+<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23782">
<summary>
Do not audit attempts to send dict_server packets.
</summary>
@@ -25048,7 +25132,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dict_server_packets" lineno="23783">
+<interface name="corenet_receive_dict_server_packets" lineno="23801">
<summary>
Receive dict_server packets.
</summary>
@@ -25059,7 +25143,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23802">
+<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23820">
<summary>
Do not audit attempts to receive dict_server packets.
</summary>
@@ -25070,7 +25154,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dict_server_packets" lineno="23821">
+<interface name="corenet_sendrecv_dict_server_packets" lineno="23839">
<summary>
Send and receive dict_server packets.
</summary>
@@ -25081,7 +25165,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23837">
+<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23855">
<summary>
Do not audit attempts to send and receive dict_server packets.
</summary>
@@ -25092,7 +25176,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dict_server_packets" lineno="23852">
+<interface name="corenet_relabelto_dict_server_packets" lineno="23870">
<summary>
Relabel packets to dict_server the packet type.
</summary>
@@ -25102,7 +25186,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23874">
+<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23892">
<summary>
Send and receive TCP traffic on the distccd port.
</summary>
@@ -25113,7 +25197,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_distccd_port" lineno="23889">
+<interface name="corenet_udp_send_distccd_port" lineno="23907">
<summary>
Send UDP traffic on the distccd port.
</summary>
@@ -25124,7 +25208,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23904">
+<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23922">
<summary>
Do not audit attempts to send UDP traffic on the distccd port.
</summary>
@@ -25135,7 +25219,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_distccd_port" lineno="23919">
+<interface name="corenet_udp_receive_distccd_port" lineno="23937">
<summary>
Receive UDP traffic on the distccd port.
</summary>
@@ -25146,7 +25230,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23934">
+<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23952">
<summary>
Do not audit attempts to receive UDP traffic on the distccd port.
</summary>
@@ -25157,7 +25241,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_distccd_port" lineno="23949">
+<interface name="corenet_udp_sendrecv_distccd_port" lineno="23967">
<summary>
Send and receive UDP traffic on the distccd port.
</summary>
@@ -25168,7 +25252,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23965">
+<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23983">
<summary>
Do not audit attempts to send and receive
UDP traffic on the distccd port.
@@ -25180,7 +25264,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_distccd_port" lineno="23980">
+<interface name="corenet_tcp_bind_distccd_port" lineno="23998">
<summary>
Bind TCP sockets to the distccd port.
</summary>
@@ -25191,7 +25275,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_distccd_port" lineno="24000">
+<interface name="corenet_udp_bind_distccd_port" lineno="24018">
<summary>
Bind UDP sockets to the distccd port.
</summary>
@@ -25202,7 +25286,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_distccd_port" lineno="24019">
+<interface name="corenet_tcp_connect_distccd_port" lineno="24037">
<summary>
Make a TCP connection to the distccd port.
</summary>
@@ -25212,7 +25296,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_distccd_client_packets" lineno="24039">
+<interface name="corenet_send_distccd_client_packets" lineno="24057">
<summary>
Send distccd_client packets.
</summary>
@@ -25223,7 +25307,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24058">
+<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24076">
<summary>
Do not audit attempts to send distccd_client packets.
</summary>
@@ -25234,7 +25318,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_distccd_client_packets" lineno="24077">
+<interface name="corenet_receive_distccd_client_packets" lineno="24095">
<summary>
Receive distccd_client packets.
</summary>
@@ -25245,7 +25329,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24096">
+<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24114">
<summary>
Do not audit attempts to receive distccd_client packets.
</summary>
@@ -25256,7 +25340,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_distccd_client_packets" lineno="24115">
+<interface name="corenet_sendrecv_distccd_client_packets" lineno="24133">
<summary>
Send and receive distccd_client packets.
</summary>
@@ -25267,7 +25351,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24131">
+<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24149">
<summary>
Do not audit attempts to send and receive distccd_client packets.
</summary>
@@ -25278,7 +25362,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_distccd_client_packets" lineno="24146">
+<interface name="corenet_relabelto_distccd_client_packets" lineno="24164">
<summary>
Relabel packets to distccd_client the packet type.
</summary>
@@ -25288,7 +25372,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_distccd_server_packets" lineno="24166">
+<interface name="corenet_send_distccd_server_packets" lineno="24184">
<summary>
Send distccd_server packets.
</summary>
@@ -25299,7 +25383,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24185">
+<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24203">
<summary>
Do not audit attempts to send distccd_server packets.
</summary>
@@ -25310,7 +25394,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_distccd_server_packets" lineno="24204">
+<interface name="corenet_receive_distccd_server_packets" lineno="24222">
<summary>
Receive distccd_server packets.
</summary>
@@ -25321,7 +25405,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24223">
+<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24241">
<summary>
Do not audit attempts to receive distccd_server packets.
</summary>
@@ -25332,7 +25416,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_distccd_server_packets" lineno="24242">
+<interface name="corenet_sendrecv_distccd_server_packets" lineno="24260">
<summary>
Send and receive distccd_server packets.
</summary>
@@ -25343,7 +25427,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24258">
+<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24276">
<summary>
Do not audit attempts to send and receive distccd_server packets.
</summary>
@@ -25354,7 +25438,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_distccd_server_packets" lineno="24273">
+<interface name="corenet_relabelto_distccd_server_packets" lineno="24291">
<summary>
Relabel packets to distccd_server the packet type.
</summary>
@@ -25364,7 +25448,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dns_port" lineno="24295">
+<interface name="corenet_tcp_sendrecv_dns_port" lineno="24313">
<summary>
Send and receive TCP traffic on the dns port.
</summary>
@@ -25375,7 +25459,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dns_port" lineno="24310">
+<interface name="corenet_udp_send_dns_port" lineno="24328">
<summary>
Send UDP traffic on the dns port.
</summary>
@@ -25386,7 +25470,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24325">
+<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24343">
<summary>
Do not audit attempts to send UDP traffic on the dns port.
</summary>
@@ -25397,7 +25481,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dns_port" lineno="24340">
+<interface name="corenet_udp_receive_dns_port" lineno="24358">
<summary>
Receive UDP traffic on the dns port.
</summary>
@@ -25408,7 +25492,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24355">
+<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24373">
<summary>
Do not audit attempts to receive UDP traffic on the dns port.
</summary>
@@ -25419,7 +25503,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dns_port" lineno="24370">
+<interface name="corenet_udp_sendrecv_dns_port" lineno="24388">
<summary>
Send and receive UDP traffic on the dns port.
</summary>
@@ -25430,7 +25514,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24386">
+<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24404">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dns port.
@@ -25442,7 +25526,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dns_port" lineno="24401">
+<interface name="corenet_tcp_bind_dns_port" lineno="24419">
<summary>
Bind TCP sockets to the dns port.
</summary>
@@ -25453,7 +25537,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dns_port" lineno="24421">
+<interface name="corenet_udp_bind_dns_port" lineno="24439">
<summary>
Bind UDP sockets to the dns port.
</summary>
@@ -25464,7 +25548,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dns_port" lineno="24440">
+<interface name="corenet_tcp_connect_dns_port" lineno="24458">
<summary>
Make a TCP connection to the dns port.
</summary>
@@ -25474,7 +25558,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dns_client_packets" lineno="24460">
+<interface name="corenet_send_dns_client_packets" lineno="24478">
<summary>
Send dns_client packets.
</summary>
@@ -25485,7 +25569,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dns_client_packets" lineno="24479">
+<interface name="corenet_dontaudit_send_dns_client_packets" lineno="24497">
<summary>
Do not audit attempts to send dns_client packets.
</summary>
@@ -25496,7 +25580,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dns_client_packets" lineno="24498">
+<interface name="corenet_receive_dns_client_packets" lineno="24516">
<summary>
Receive dns_client packets.
</summary>
@@ -25507,7 +25591,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="24517">
+<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="24535">
<summary>
Do not audit attempts to receive dns_client packets.
</summary>
@@ -25518,7 +25602,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dns_client_packets" lineno="24536">
+<interface name="corenet_sendrecv_dns_client_packets" lineno="24554">
<summary>
Send and receive dns_client packets.
</summary>
@@ -25529,7 +25613,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24552">
+<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24570">
<summary>
Do not audit attempts to send and receive dns_client packets.
</summary>
@@ -25540,7 +25624,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dns_client_packets" lineno="24567">
+<interface name="corenet_relabelto_dns_client_packets" lineno="24585">
<summary>
Relabel packets to dns_client the packet type.
</summary>
@@ -25550,7 +25634,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dns_server_packets" lineno="24587">
+<interface name="corenet_send_dns_server_packets" lineno="24605">
<summary>
Send dns_server packets.
</summary>
@@ -25561,7 +25645,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24606">
+<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24624">
<summary>
Do not audit attempts to send dns_server packets.
</summary>
@@ -25572,7 +25656,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dns_server_packets" lineno="24625">
+<interface name="corenet_receive_dns_server_packets" lineno="24643">
<summary>
Receive dns_server packets.
</summary>
@@ -25583,7 +25667,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24644">
+<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24662">
<summary>
Do not audit attempts to receive dns_server packets.
</summary>
@@ -25594,7 +25678,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dns_server_packets" lineno="24663">
+<interface name="corenet_sendrecv_dns_server_packets" lineno="24681">
<summary>
Send and receive dns_server packets.
</summary>
@@ -25605,7 +25689,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24679">
+<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24697">
<summary>
Do not audit attempts to send and receive dns_server packets.
</summary>
@@ -25616,7 +25700,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dns_server_packets" lineno="24694">
+<interface name="corenet_relabelto_dns_server_packets" lineno="24712">
<summary>
Relabel packets to dns_server the packet type.
</summary>
@@ -25626,7 +25710,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24716">
+<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24734">
<summary>
Send and receive TCP traffic on the dropbox port.
</summary>
@@ -25637,7 +25721,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dropbox_port" lineno="24731">
+<interface name="corenet_udp_send_dropbox_port" lineno="24749">
<summary>
Send UDP traffic on the dropbox port.
</summary>
@@ -25648,7 +25732,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24746">
+<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24764">
<summary>
Do not audit attempts to send UDP traffic on the dropbox port.
</summary>
@@ -25659,7 +25743,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dropbox_port" lineno="24761">
+<interface name="corenet_udp_receive_dropbox_port" lineno="24779">
<summary>
Receive UDP traffic on the dropbox port.
</summary>
@@ -25670,7 +25754,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24776">
+<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24794">
<summary>
Do not audit attempts to receive UDP traffic on the dropbox port.
</summary>
@@ -25681,7 +25765,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24791">
+<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24809">
<summary>
Send and receive UDP traffic on the dropbox port.
</summary>
@@ -25692,7 +25776,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24807">
+<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24825">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dropbox port.
@@ -25704,7 +25788,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dropbox_port" lineno="24822">
+<interface name="corenet_tcp_bind_dropbox_port" lineno="24840">
<summary>
Bind TCP sockets to the dropbox port.
</summary>
@@ -25715,7 +25799,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dropbox_port" lineno="24842">
+<interface name="corenet_udp_bind_dropbox_port" lineno="24860">
<summary>
Bind UDP sockets to the dropbox port.
</summary>
@@ -25726,7 +25810,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dropbox_port" lineno="24861">
+<interface name="corenet_tcp_connect_dropbox_port" lineno="24879">
<summary>
Make a TCP connection to the dropbox port.
</summary>
@@ -25736,7 +25820,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dropbox_client_packets" lineno="24881">
+<interface name="corenet_send_dropbox_client_packets" lineno="24899">
<summary>
Send dropbox_client packets.
</summary>
@@ -25747,7 +25831,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24900">
+<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24918">
<summary>
Do not audit attempts to send dropbox_client packets.
</summary>
@@ -25758,7 +25842,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dropbox_client_packets" lineno="24919">
+<interface name="corenet_receive_dropbox_client_packets" lineno="24937">
<summary>
Receive dropbox_client packets.
</summary>
@@ -25769,7 +25853,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24938">
+<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24956">
<summary>
Do not audit attempts to receive dropbox_client packets.
</summary>
@@ -25780,7 +25864,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24957">
+<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24975">
<summary>
Send and receive dropbox_client packets.
</summary>
@@ -25791,7 +25875,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24973">
+<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24991">
<summary>
Do not audit attempts to send and receive dropbox_client packets.
</summary>
@@ -25802,7 +25886,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dropbox_client_packets" lineno="24988">
+<interface name="corenet_relabelto_dropbox_client_packets" lineno="25006">
<summary>
Relabel packets to dropbox_client the packet type.
</summary>
@@ -25812,7 +25896,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dropbox_server_packets" lineno="25008">
+<interface name="corenet_send_dropbox_server_packets" lineno="25026">
<summary>
Send dropbox_server packets.
</summary>
@@ -25823,7 +25907,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25027">
+<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25045">
<summary>
Do not audit attempts to send dropbox_server packets.
</summary>
@@ -25834,7 +25918,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dropbox_server_packets" lineno="25046">
+<interface name="corenet_receive_dropbox_server_packets" lineno="25064">
<summary>
Receive dropbox_server packets.
</summary>
@@ -25845,7 +25929,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25065">
+<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25083">
<summary>
Do not audit attempts to receive dropbox_server packets.
</summary>
@@ -25856,7 +25940,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25084">
+<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25102">
<summary>
Send and receive dropbox_server packets.
</summary>
@@ -25867,7 +25951,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25100">
+<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25118">
<summary>
Do not audit attempts to send and receive dropbox_server packets.
</summary>
@@ -25878,7 +25962,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dropbox_server_packets" lineno="25115">
+<interface name="corenet_relabelto_dropbox_server_packets" lineno="25133">
<summary>
Relabel packets to dropbox_server the packet type.
</summary>
@@ -25888,7 +25972,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_efs_port" lineno="25137">
+<interface name="corenet_tcp_sendrecv_efs_port" lineno="25155">
<summary>
Send and receive TCP traffic on the efs port.
</summary>
@@ -25899,7 +25983,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_efs_port" lineno="25152">
+<interface name="corenet_udp_send_efs_port" lineno="25170">
<summary>
Send UDP traffic on the efs port.
</summary>
@@ -25910,7 +25994,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25167">
+<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25185">
<summary>
Do not audit attempts to send UDP traffic on the efs port.
</summary>
@@ -25921,7 +26005,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_efs_port" lineno="25182">
+<interface name="corenet_udp_receive_efs_port" lineno="25200">
<summary>
Receive UDP traffic on the efs port.
</summary>
@@ -25932,7 +26016,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25197">
+<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25215">
<summary>
Do not audit attempts to receive UDP traffic on the efs port.
</summary>
@@ -25943,7 +26027,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_efs_port" lineno="25212">
+<interface name="corenet_udp_sendrecv_efs_port" lineno="25230">
<summary>
Send and receive UDP traffic on the efs port.
</summary>
@@ -25954,7 +26038,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25228">
+<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25246">
<summary>
Do not audit attempts to send and receive
UDP traffic on the efs port.
@@ -25966,7 +26050,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_efs_port" lineno="25243">
+<interface name="corenet_tcp_bind_efs_port" lineno="25261">
<summary>
Bind TCP sockets to the efs port.
</summary>
@@ -25977,7 +26061,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_efs_port" lineno="25263">
+<interface name="corenet_udp_bind_efs_port" lineno="25281">
<summary>
Bind UDP sockets to the efs port.
</summary>
@@ -25988,7 +26072,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_efs_port" lineno="25282">
+<interface name="corenet_tcp_connect_efs_port" lineno="25300">
<summary>
Make a TCP connection to the efs port.
</summary>
@@ -25998,7 +26082,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_efs_client_packets" lineno="25302">
+<interface name="corenet_send_efs_client_packets" lineno="25320">
<summary>
Send efs_client packets.
</summary>
@@ -26009,7 +26093,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25321">
+<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25339">
<summary>
Do not audit attempts to send efs_client packets.
</summary>
@@ -26020,7 +26104,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_efs_client_packets" lineno="25340">
+<interface name="corenet_receive_efs_client_packets" lineno="25358">
<summary>
Receive efs_client packets.
</summary>
@@ -26031,7 +26115,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25359">
+<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25377">
<summary>
Do not audit attempts to receive efs_client packets.
</summary>
@@ -26042,7 +26126,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_efs_client_packets" lineno="25378">
+<interface name="corenet_sendrecv_efs_client_packets" lineno="25396">
<summary>
Send and receive efs_client packets.
</summary>
@@ -26053,7 +26137,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="25394">
+<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="25412">
<summary>
Do not audit attempts to send and receive efs_client packets.
</summary>
@@ -26064,7 +26148,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_efs_client_packets" lineno="25409">
+<interface name="corenet_relabelto_efs_client_packets" lineno="25427">
<summary>
Relabel packets to efs_client the packet type.
</summary>
@@ -26074,7 +26158,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_efs_server_packets" lineno="25429">
+<interface name="corenet_send_efs_server_packets" lineno="25447">
<summary>
Send efs_server packets.
</summary>
@@ -26085,7 +26169,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_efs_server_packets" lineno="25448">
+<interface name="corenet_dontaudit_send_efs_server_packets" lineno="25466">
<summary>
Do not audit attempts to send efs_server packets.
</summary>
@@ -26096,7 +26180,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_efs_server_packets" lineno="25467">
+<interface name="corenet_receive_efs_server_packets" lineno="25485">
<summary>
Receive efs_server packets.
</summary>
@@ -26107,7 +26191,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="25486">
+<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="25504">
<summary>
Do not audit attempts to receive efs_server packets.
</summary>
@@ -26118,7 +26202,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_efs_server_packets" lineno="25505">
+<interface name="corenet_sendrecv_efs_server_packets" lineno="25523">
<summary>
Send and receive efs_server packets.
</summary>
@@ -26129,7 +26213,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="25521">
+<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="25539">
<summary>
Do not audit attempts to send and receive efs_server packets.
</summary>
@@ -26140,7 +26224,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_efs_server_packets" lineno="25536">
+<interface name="corenet_relabelto_efs_server_packets" lineno="25554">
<summary>
Relabel packets to efs_server the packet type.
</summary>
@@ -26150,7 +26234,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25558">
+<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25576">
<summary>
Send and receive TCP traffic on the embrace_dp_c port.
</summary>
@@ -26161,7 +26245,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25573">
+<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25591">
<summary>
Send UDP traffic on the embrace_dp_c port.
</summary>
@@ -26172,7 +26256,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25588">
+<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25606">
<summary>
Do not audit attempts to send UDP traffic on the embrace_dp_c port.
</summary>
@@ -26183,7 +26267,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25603">
+<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25621">
<summary>
Receive UDP traffic on the embrace_dp_c port.
</summary>
@@ -26194,7 +26278,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25618">
+<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25636">
<summary>
Do not audit attempts to receive UDP traffic on the embrace_dp_c port.
</summary>
@@ -26205,7 +26289,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25633">
+<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25651">
<summary>
Send and receive UDP traffic on the embrace_dp_c port.
</summary>
@@ -26216,7 +26300,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25649">
+<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25667">
<summary>
Do not audit attempts to send and receive
UDP traffic on the embrace_dp_c port.
@@ -26228,7 +26312,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25664">
+<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25682">
<summary>
Bind TCP sockets to the embrace_dp_c port.
</summary>
@@ -26239,7 +26323,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25684">
+<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25702">
<summary>
Bind UDP sockets to the embrace_dp_c port.
</summary>
@@ -26250,7 +26334,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25703">
+<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25721">
<summary>
Make a TCP connection to the embrace_dp_c port.
</summary>
@@ -26260,7 +26344,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25723">
+<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25741">
<summary>
Send embrace_dp_c_client packets.
</summary>
@@ -26271,7 +26355,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25742">
+<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25760">
<summary>
Do not audit attempts to send embrace_dp_c_client packets.
</summary>
@@ -26282,7 +26366,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25761">
+<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25779">
<summary>
Receive embrace_dp_c_client packets.
</summary>
@@ -26293,7 +26377,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25780">
+<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25798">
<summary>
Do not audit attempts to receive embrace_dp_c_client packets.
</summary>
@@ -26304,7 +26388,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25799">
+<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25817">
<summary>
Send and receive embrace_dp_c_client packets.
</summary>
@@ -26315,7 +26399,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25815">
+<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25833">
<summary>
Do not audit attempts to send and receive embrace_dp_c_client packets.
</summary>
@@ -26326,7 +26410,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25830">
+<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25848">
<summary>
Relabel packets to embrace_dp_c_client the packet type.
</summary>
@@ -26336,7 +26420,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25850">
+<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25868">
<summary>
Send embrace_dp_c_server packets.
</summary>
@@ -26347,7 +26431,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25869">
+<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25887">
<summary>
Do not audit attempts to send embrace_dp_c_server packets.
</summary>
@@ -26358,7 +26442,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25888">
+<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25906">
<summary>
Receive embrace_dp_c_server packets.
</summary>
@@ -26369,7 +26453,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25907">
+<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25925">
<summary>
Do not audit attempts to receive embrace_dp_c_server packets.
</summary>
@@ -26380,7 +26464,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25926">
+<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25944">
<summary>
Send and receive embrace_dp_c_server packets.
</summary>
@@ -26391,7 +26475,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25942">
+<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25960">
<summary>
Do not audit attempts to send and receive embrace_dp_c_server packets.
</summary>
@@ -26402,7 +26486,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25957">
+<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25975">
<summary>
Relabel packets to embrace_dp_c_server the packet type.
</summary>
@@ -26412,7 +26496,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25979">
+<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25997">
<summary>
Send and receive TCP traffic on the epmap port.
</summary>
@@ -26423,7 +26507,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_epmap_port" lineno="25994">
+<interface name="corenet_udp_send_epmap_port" lineno="26012">
<summary>
Send UDP traffic on the epmap port.
</summary>
@@ -26434,7 +26518,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26009">
+<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26027">
<summary>
Do not audit attempts to send UDP traffic on the epmap port.
</summary>
@@ -26445,7 +26529,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_epmap_port" lineno="26024">
+<interface name="corenet_udp_receive_epmap_port" lineno="26042">
<summary>
Receive UDP traffic on the epmap port.
</summary>
@@ -26456,7 +26540,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26039">
+<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26057">
<summary>
Do not audit attempts to receive UDP traffic on the epmap port.
</summary>
@@ -26467,7 +26551,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_epmap_port" lineno="26054">
+<interface name="corenet_udp_sendrecv_epmap_port" lineno="26072">
<summary>
Send and receive UDP traffic on the epmap port.
</summary>
@@ -26478,7 +26562,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26070">
+<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26088">
<summary>
Do not audit attempts to send and receive
UDP traffic on the epmap port.
@@ -26490,7 +26574,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_epmap_port" lineno="26085">
+<interface name="corenet_tcp_bind_epmap_port" lineno="26103">
<summary>
Bind TCP sockets to the epmap port.
</summary>
@@ -26501,7 +26585,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_epmap_port" lineno="26105">
+<interface name="corenet_udp_bind_epmap_port" lineno="26123">
<summary>
Bind UDP sockets to the epmap port.
</summary>
@@ -26512,7 +26596,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_epmap_port" lineno="26124">
+<interface name="corenet_tcp_connect_epmap_port" lineno="26142">
<summary>
Make a TCP connection to the epmap port.
</summary>
@@ -26522,7 +26606,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmap_client_packets" lineno="26144">
+<interface name="corenet_send_epmap_client_packets" lineno="26162">
<summary>
Send epmap_client packets.
</summary>
@@ -26533,7 +26617,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26163">
+<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26181">
<summary>
Do not audit attempts to send epmap_client packets.
</summary>
@@ -26544,7 +26628,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmap_client_packets" lineno="26182">
+<interface name="corenet_receive_epmap_client_packets" lineno="26200">
<summary>
Receive epmap_client packets.
</summary>
@@ -26555,7 +26639,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26201">
+<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26219">
<summary>
Do not audit attempts to receive epmap_client packets.
</summary>
@@ -26566,7 +26650,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmap_client_packets" lineno="26220">
+<interface name="corenet_sendrecv_epmap_client_packets" lineno="26238">
<summary>
Send and receive epmap_client packets.
</summary>
@@ -26577,7 +26661,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26236">
+<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26254">
<summary>
Do not audit attempts to send and receive epmap_client packets.
</summary>
@@ -26588,7 +26672,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmap_client_packets" lineno="26251">
+<interface name="corenet_relabelto_epmap_client_packets" lineno="26269">
<summary>
Relabel packets to epmap_client the packet type.
</summary>
@@ -26598,7 +26682,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmap_server_packets" lineno="26271">
+<interface name="corenet_send_epmap_server_packets" lineno="26289">
<summary>
Send epmap_server packets.
</summary>
@@ -26609,7 +26693,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26290">
+<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26308">
<summary>
Do not audit attempts to send epmap_server packets.
</summary>
@@ -26620,7 +26704,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmap_server_packets" lineno="26309">
+<interface name="corenet_receive_epmap_server_packets" lineno="26327">
<summary>
Receive epmap_server packets.
</summary>
@@ -26631,7 +26715,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="26328">
+<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="26346">
<summary>
Do not audit attempts to receive epmap_server packets.
</summary>
@@ -26642,7 +26726,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmap_server_packets" lineno="26347">
+<interface name="corenet_sendrecv_epmap_server_packets" lineno="26365">
<summary>
Send and receive epmap_server packets.
</summary>
@@ -26653,7 +26737,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="26363">
+<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="26381">
<summary>
Do not audit attempts to send and receive epmap_server packets.
</summary>
@@ -26664,7 +26748,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmap_server_packets" lineno="26378">
+<interface name="corenet_relabelto_epmap_server_packets" lineno="26396">
<summary>
Relabel packets to epmap_server the packet type.
</summary>
@@ -26674,7 +26758,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_epmd_port" lineno="26400">
+<interface name="corenet_tcp_sendrecv_epmd_port" lineno="26418">
<summary>
Send and receive TCP traffic on the epmd port.
</summary>
@@ -26685,7 +26769,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_epmd_port" lineno="26415">
+<interface name="corenet_udp_send_epmd_port" lineno="26433">
<summary>
Send UDP traffic on the epmd port.
</summary>
@@ -26696,7 +26780,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="26430">
+<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="26448">
<summary>
Do not audit attempts to send UDP traffic on the epmd port.
</summary>
@@ -26707,7 +26791,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_epmd_port" lineno="26445">
+<interface name="corenet_udp_receive_epmd_port" lineno="26463">
<summary>
Receive UDP traffic on the epmd port.
</summary>
@@ -26718,7 +26802,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="26460">
+<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="26478">
<summary>
Do not audit attempts to receive UDP traffic on the epmd port.
</summary>
@@ -26729,7 +26813,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_epmd_port" lineno="26475">
+<interface name="corenet_udp_sendrecv_epmd_port" lineno="26493">
<summary>
Send and receive UDP traffic on the epmd port.
</summary>
@@ -26740,7 +26824,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="26491">
+<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="26509">
<summary>
Do not audit attempts to send and receive
UDP traffic on the epmd port.
@@ -26752,7 +26836,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_epmd_port" lineno="26506">
+<interface name="corenet_tcp_bind_epmd_port" lineno="26524">
<summary>
Bind TCP sockets to the epmd port.
</summary>
@@ -26763,7 +26847,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_epmd_port" lineno="26526">
+<interface name="corenet_udp_bind_epmd_port" lineno="26544">
<summary>
Bind UDP sockets to the epmd port.
</summary>
@@ -26774,7 +26858,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_epmd_port" lineno="26545">
+<interface name="corenet_tcp_connect_epmd_port" lineno="26563">
<summary>
Make a TCP connection to the epmd port.
</summary>
@@ -26784,7 +26868,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmd_client_packets" lineno="26565">
+<interface name="corenet_send_epmd_client_packets" lineno="26583">
<summary>
Send epmd_client packets.
</summary>
@@ -26795,7 +26879,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26584">
+<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26602">
<summary>
Do not audit attempts to send epmd_client packets.
</summary>
@@ -26806,7 +26890,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmd_client_packets" lineno="26603">
+<interface name="corenet_receive_epmd_client_packets" lineno="26621">
<summary>
Receive epmd_client packets.
</summary>
@@ -26817,7 +26901,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26622">
+<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26640">
<summary>
Do not audit attempts to receive epmd_client packets.
</summary>
@@ -26828,7 +26912,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmd_client_packets" lineno="26641">
+<interface name="corenet_sendrecv_epmd_client_packets" lineno="26659">
<summary>
Send and receive epmd_client packets.
</summary>
@@ -26839,7 +26923,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26657">
+<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26675">
<summary>
Do not audit attempts to send and receive epmd_client packets.
</summary>
@@ -26850,7 +26934,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmd_client_packets" lineno="26672">
+<interface name="corenet_relabelto_epmd_client_packets" lineno="26690">
<summary>
Relabel packets to epmd_client the packet type.
</summary>
@@ -26860,7 +26944,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmd_server_packets" lineno="26692">
+<interface name="corenet_send_epmd_server_packets" lineno="26710">
<summary>
Send epmd_server packets.
</summary>
@@ -26871,7 +26955,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26711">
+<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26729">
<summary>
Do not audit attempts to send epmd_server packets.
</summary>
@@ -26882,7 +26966,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmd_server_packets" lineno="26730">
+<interface name="corenet_receive_epmd_server_packets" lineno="26748">
<summary>
Receive epmd_server packets.
</summary>
@@ -26893,7 +26977,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26749">
+<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26767">
<summary>
Do not audit attempts to receive epmd_server packets.
</summary>
@@ -26904,7 +26988,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmd_server_packets" lineno="26768">
+<interface name="corenet_sendrecv_epmd_server_packets" lineno="26786">
<summary>
Send and receive epmd_server packets.
</summary>
@@ -26915,7 +26999,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26784">
+<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26802">
<summary>
Do not audit attempts to send and receive epmd_server packets.
</summary>
@@ -26926,7 +27010,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmd_server_packets" lineno="26799">
+<interface name="corenet_relabelto_epmd_server_packets" lineno="26817">
<summary>
Relabel packets to epmd_server the packet type.
</summary>
@@ -26936,7 +27020,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26821">
+<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26839">
<summary>
Send and receive TCP traffic on the fingerd port.
</summary>
@@ -26947,7 +27031,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_fingerd_port" lineno="26836">
+<interface name="corenet_udp_send_fingerd_port" lineno="26854">
<summary>
Send UDP traffic on the fingerd port.
</summary>
@@ -26958,7 +27042,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26851">
+<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26869">
<summary>
Do not audit attempts to send UDP traffic on the fingerd port.
</summary>
@@ -26969,7 +27053,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_fingerd_port" lineno="26866">
+<interface name="corenet_udp_receive_fingerd_port" lineno="26884">
<summary>
Receive UDP traffic on the fingerd port.
</summary>
@@ -26980,7 +27064,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26881">
+<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26899">
<summary>
Do not audit attempts to receive UDP traffic on the fingerd port.
</summary>
@@ -26991,7 +27075,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26896">
+<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26914">
<summary>
Send and receive UDP traffic on the fingerd port.
</summary>
@@ -27002,7 +27086,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26912">
+<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26930">
<summary>
Do not audit attempts to send and receive
UDP traffic on the fingerd port.
@@ -27014,7 +27098,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_fingerd_port" lineno="26927">
+<interface name="corenet_tcp_bind_fingerd_port" lineno="26945">
<summary>
Bind TCP sockets to the fingerd port.
</summary>
@@ -27025,7 +27109,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_fingerd_port" lineno="26947">
+<interface name="corenet_udp_bind_fingerd_port" lineno="26965">
<summary>
Bind UDP sockets to the fingerd port.
</summary>
@@ -27036,7 +27120,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_fingerd_port" lineno="26966">
+<interface name="corenet_tcp_connect_fingerd_port" lineno="26984">
<summary>
Make a TCP connection to the fingerd port.
</summary>
@@ -27046,7 +27130,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_fingerd_client_packets" lineno="26986">
+<interface name="corenet_send_fingerd_client_packets" lineno="27004">
<summary>
Send fingerd_client packets.
</summary>
@@ -27057,7 +27141,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27005">
+<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27023">
<summary>
Do not audit attempts to send fingerd_client packets.
</summary>
@@ -27068,7 +27152,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_fingerd_client_packets" lineno="27024">
+<interface name="corenet_receive_fingerd_client_packets" lineno="27042">
<summary>
Receive fingerd_client packets.
</summary>
@@ -27079,7 +27163,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27043">
+<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27061">
<summary>
Do not audit attempts to receive fingerd_client packets.
</summary>
@@ -27090,7 +27174,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27062">
+<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27080">
<summary>
Send and receive fingerd_client packets.
</summary>
@@ -27101,7 +27185,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27078">
+<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27096">
<summary>
Do not audit attempts to send and receive fingerd_client packets.
</summary>
@@ -27112,7 +27196,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_fingerd_client_packets" lineno="27093">
+<interface name="corenet_relabelto_fingerd_client_packets" lineno="27111">
<summary>
Relabel packets to fingerd_client the packet type.
</summary>
@@ -27122,7 +27206,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_fingerd_server_packets" lineno="27113">
+<interface name="corenet_send_fingerd_server_packets" lineno="27131">
<summary>
Send fingerd_server packets.
</summary>
@@ -27133,7 +27217,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27132">
+<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27150">
<summary>
Do not audit attempts to send fingerd_server packets.
</summary>
@@ -27144,7 +27228,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_fingerd_server_packets" lineno="27151">
+<interface name="corenet_receive_fingerd_server_packets" lineno="27169">
<summary>
Receive fingerd_server packets.
</summary>
@@ -27155,7 +27239,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27170">
+<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27188">
<summary>
Do not audit attempts to receive fingerd_server packets.
</summary>
@@ -27166,7 +27250,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27189">
+<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27207">
<summary>
Send and receive fingerd_server packets.
</summary>
@@ -27177,7 +27261,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27205">
+<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27223">
<summary>
Do not audit attempts to send and receive fingerd_server packets.
</summary>
@@ -27188,7 +27272,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_fingerd_server_packets" lineno="27220">
+<interface name="corenet_relabelto_fingerd_server_packets" lineno="27238">
<summary>
Relabel packets to fingerd_server the packet type.
</summary>
@@ -27198,7 +27282,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27242">
+<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27260">
<summary>
Send and receive TCP traffic on the ftp port.
</summary>
@@ -27209,7 +27293,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ftp_port" lineno="27257">
+<interface name="corenet_udp_send_ftp_port" lineno="27275">
<summary>
Send UDP traffic on the ftp port.
</summary>
@@ -27220,7 +27304,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="27272">
+<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="27290">
<summary>
Do not audit attempts to send UDP traffic on the ftp port.
</summary>
@@ -27231,7 +27315,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ftp_port" lineno="27287">
+<interface name="corenet_udp_receive_ftp_port" lineno="27305">
<summary>
Receive UDP traffic on the ftp port.
</summary>
@@ -27242,7 +27326,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="27302">
+<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="27320">
<summary>
Do not audit attempts to receive UDP traffic on the ftp port.
</summary>
@@ -27253,7 +27337,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ftp_port" lineno="27317">
+<interface name="corenet_udp_sendrecv_ftp_port" lineno="27335">
<summary>
Send and receive UDP traffic on the ftp port.
</summary>
@@ -27264,7 +27348,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="27333">
+<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="27351">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ftp port.
@@ -27276,7 +27360,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ftp_port" lineno="27348">
+<interface name="corenet_tcp_bind_ftp_port" lineno="27366">
<summary>
Bind TCP sockets to the ftp port.
</summary>
@@ -27287,7 +27371,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ftp_port" lineno="27368">
+<interface name="corenet_udp_bind_ftp_port" lineno="27386">
<summary>
Bind UDP sockets to the ftp port.
</summary>
@@ -27298,7 +27382,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ftp_port" lineno="27387">
+<interface name="corenet_tcp_connect_ftp_port" lineno="27405">
<summary>
Make a TCP connection to the ftp port.
</summary>
@@ -27308,7 +27392,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_client_packets" lineno="27407">
+<interface name="corenet_send_ftp_client_packets" lineno="27425">
<summary>
Send ftp_client packets.
</summary>
@@ -27319,7 +27403,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="27426">
+<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="27444">
<summary>
Do not audit attempts to send ftp_client packets.
</summary>
@@ -27330,7 +27414,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_client_packets" lineno="27445">
+<interface name="corenet_receive_ftp_client_packets" lineno="27463">
<summary>
Receive ftp_client packets.
</summary>
@@ -27341,7 +27425,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="27464">
+<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="27482">
<summary>
Do not audit attempts to receive ftp_client packets.
</summary>
@@ -27352,7 +27436,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_client_packets" lineno="27483">
+<interface name="corenet_sendrecv_ftp_client_packets" lineno="27501">
<summary>
Send and receive ftp_client packets.
</summary>
@@ -27363,7 +27447,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="27499">
+<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="27517">
<summary>
Do not audit attempts to send and receive ftp_client packets.
</summary>
@@ -27374,7 +27458,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_client_packets" lineno="27514">
+<interface name="corenet_relabelto_ftp_client_packets" lineno="27532">
<summary>
Relabel packets to ftp_client the packet type.
</summary>
@@ -27384,7 +27468,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_server_packets" lineno="27534">
+<interface name="corenet_send_ftp_server_packets" lineno="27552">
<summary>
Send ftp_server packets.
</summary>
@@ -27395,7 +27479,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27553">
+<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27571">
<summary>
Do not audit attempts to send ftp_server packets.
</summary>
@@ -27406,7 +27490,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_server_packets" lineno="27572">
+<interface name="corenet_receive_ftp_server_packets" lineno="27590">
<summary>
Receive ftp_server packets.
</summary>
@@ -27417,7 +27501,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27591">
+<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27609">
<summary>
Do not audit attempts to receive ftp_server packets.
</summary>
@@ -27428,7 +27512,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_server_packets" lineno="27610">
+<interface name="corenet_sendrecv_ftp_server_packets" lineno="27628">
<summary>
Send and receive ftp_server packets.
</summary>
@@ -27439,7 +27523,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27626">
+<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27644">
<summary>
Do not audit attempts to send and receive ftp_server packets.
</summary>
@@ -27450,7 +27534,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_server_packets" lineno="27641">
+<interface name="corenet_relabelto_ftp_server_packets" lineno="27659">
<summary>
Relabel packets to ftp_server the packet type.
</summary>
@@ -27460,7 +27544,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27663">
+<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27681">
<summary>
Send and receive TCP traffic on the ftp_data port.
</summary>
@@ -27471,7 +27555,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ftp_data_port" lineno="27678">
+<interface name="corenet_udp_send_ftp_data_port" lineno="27696">
<summary>
Send UDP traffic on the ftp_data port.
</summary>
@@ -27482,7 +27566,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27693">
+<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27711">
<summary>
Do not audit attempts to send UDP traffic on the ftp_data port.
</summary>
@@ -27493,7 +27577,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ftp_data_port" lineno="27708">
+<interface name="corenet_udp_receive_ftp_data_port" lineno="27726">
<summary>
Receive UDP traffic on the ftp_data port.
</summary>
@@ -27504,7 +27588,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27723">
+<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27741">
<summary>
Do not audit attempts to receive UDP traffic on the ftp_data port.
</summary>
@@ -27515,7 +27599,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27738">
+<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27756">
<summary>
Send and receive UDP traffic on the ftp_data port.
</summary>
@@ -27526,7 +27610,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27754">
+<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27772">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ftp_data port.
@@ -27538,7 +27622,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ftp_data_port" lineno="27769">
+<interface name="corenet_tcp_bind_ftp_data_port" lineno="27787">
<summary>
Bind TCP sockets to the ftp_data port.
</summary>
@@ -27549,7 +27633,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ftp_data_port" lineno="27789">
+<interface name="corenet_udp_bind_ftp_data_port" lineno="27807">
<summary>
Bind UDP sockets to the ftp_data port.
</summary>
@@ -27560,7 +27644,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ftp_data_port" lineno="27808">
+<interface name="corenet_tcp_connect_ftp_data_port" lineno="27826">
<summary>
Make a TCP connection to the ftp_data port.
</summary>
@@ -27570,7 +27654,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_data_client_packets" lineno="27828">
+<interface name="corenet_send_ftp_data_client_packets" lineno="27846">
<summary>
Send ftp_data_client packets.
</summary>
@@ -27581,7 +27665,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27847">
+<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27865">
<summary>
Do not audit attempts to send ftp_data_client packets.
</summary>
@@ -27592,7 +27676,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_data_client_packets" lineno="27866">
+<interface name="corenet_receive_ftp_data_client_packets" lineno="27884">
<summary>
Receive ftp_data_client packets.
</summary>
@@ -27603,7 +27687,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27885">
+<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27903">
<summary>
Do not audit attempts to receive ftp_data_client packets.
</summary>
@@ -27614,7 +27698,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27904">
+<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27922">
<summary>
Send and receive ftp_data_client packets.
</summary>
@@ -27625,7 +27709,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27920">
+<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27938">
<summary>
Do not audit attempts to send and receive ftp_data_client packets.
</summary>
@@ -27636,7 +27720,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27935">
+<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27953">
<summary>
Relabel packets to ftp_data_client the packet type.
</summary>
@@ -27646,7 +27730,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_data_server_packets" lineno="27955">
+<interface name="corenet_send_ftp_data_server_packets" lineno="27973">
<summary>
Send ftp_data_server packets.
</summary>
@@ -27657,7 +27741,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27974">
+<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27992">
<summary>
Do not audit attempts to send ftp_data_server packets.
</summary>
@@ -27668,7 +27752,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_data_server_packets" lineno="27993">
+<interface name="corenet_receive_ftp_data_server_packets" lineno="28011">
<summary>
Receive ftp_data_server packets.
</summary>
@@ -27679,7 +27763,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28012">
+<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28030">
<summary>
Do not audit attempts to receive ftp_data_server packets.
</summary>
@@ -27690,7 +27774,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28031">
+<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28049">
<summary>
Send and receive ftp_data_server packets.
</summary>
@@ -27701,7 +27785,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28047">
+<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28065">
<summary>
Do not audit attempts to send and receive ftp_data_server packets.
</summary>
@@ -27712,7 +27796,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28062">
+<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28080">
<summary>
Relabel packets to ftp_data_server the packet type.
</summary>
@@ -27722,7 +27806,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28084">
+<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28102">
<summary>
Send and receive TCP traffic on the gatekeeper port.
</summary>
@@ -27733,7 +27817,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gatekeeper_port" lineno="28099">
+<interface name="corenet_udp_send_gatekeeper_port" lineno="28117">
<summary>
Send UDP traffic on the gatekeeper port.
</summary>
@@ -27744,7 +27828,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28114">
+<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28132">
<summary>
Do not audit attempts to send UDP traffic on the gatekeeper port.
</summary>
@@ -27755,7 +27839,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gatekeeper_port" lineno="28129">
+<interface name="corenet_udp_receive_gatekeeper_port" lineno="28147">
<summary>
Receive UDP traffic on the gatekeeper port.
</summary>
@@ -27766,7 +27850,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28144">
+<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28162">
<summary>
Do not audit attempts to receive UDP traffic on the gatekeeper port.
</summary>
@@ -27777,7 +27861,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28159">
+<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28177">
<summary>
Send and receive UDP traffic on the gatekeeper port.
</summary>
@@ -27788,7 +27872,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28175">
+<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28193">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gatekeeper port.
@@ -27800,7 +27884,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28190">
+<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28208">
<summary>
Bind TCP sockets to the gatekeeper port.
</summary>
@@ -27811,7 +27895,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gatekeeper_port" lineno="28210">
+<interface name="corenet_udp_bind_gatekeeper_port" lineno="28228">
<summary>
Bind UDP sockets to the gatekeeper port.
</summary>
@@ -27822,7 +27906,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gatekeeper_port" lineno="28229">
+<interface name="corenet_tcp_connect_gatekeeper_port" lineno="28247">
<summary>
Make a TCP connection to the gatekeeper port.
</summary>
@@ -27832,7 +27916,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gatekeeper_client_packets" lineno="28249">
+<interface name="corenet_send_gatekeeper_client_packets" lineno="28267">
<summary>
Send gatekeeper_client packets.
</summary>
@@ -27843,7 +27927,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="28268">
+<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="28286">
<summary>
Do not audit attempts to send gatekeeper_client packets.
</summary>
@@ -27854,7 +27938,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gatekeeper_client_packets" lineno="28287">
+<interface name="corenet_receive_gatekeeper_client_packets" lineno="28305">
<summary>
Receive gatekeeper_client packets.
</summary>
@@ -27865,7 +27949,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="28306">
+<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="28324">
<summary>
Do not audit attempts to receive gatekeeper_client packets.
</summary>
@@ -27876,7 +27960,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="28325">
+<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="28343">
<summary>
Send and receive gatekeeper_client packets.
</summary>
@@ -27887,7 +27971,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="28341">
+<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="28359">
<summary>
Do not audit attempts to send and receive gatekeeper_client packets.
</summary>
@@ -27898,7 +27982,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="28356">
+<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="28374">
<summary>
Relabel packets to gatekeeper_client the packet type.
</summary>
@@ -27908,7 +27992,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gatekeeper_server_packets" lineno="28376">
+<interface name="corenet_send_gatekeeper_server_packets" lineno="28394">
<summary>
Send gatekeeper_server packets.
</summary>
@@ -27919,7 +28003,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="28395">
+<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="28413">
<summary>
Do not audit attempts to send gatekeeper_server packets.
</summary>
@@ -27930,7 +28014,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gatekeeper_server_packets" lineno="28414">
+<interface name="corenet_receive_gatekeeper_server_packets" lineno="28432">
<summary>
Receive gatekeeper_server packets.
</summary>
@@ -27941,7 +28025,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="28433">
+<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="28451">
<summary>
Do not audit attempts to receive gatekeeper_server packets.
</summary>
@@ -27952,7 +28036,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="28452">
+<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="28470">
<summary>
Send and receive gatekeeper_server packets.
</summary>
@@ -27963,7 +28047,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="28468">
+<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="28486">
<summary>
Do not audit attempts to send and receive gatekeeper_server packets.
</summary>
@@ -27974,7 +28058,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="28483">
+<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="28501">
<summary>
Relabel packets to gatekeeper_server the packet type.
</summary>
@@ -27984,7 +28068,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="28505">
+<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="28523">
<summary>
Send and receive TCP traffic on the gdomap port.
</summary>
@@ -27995,7 +28079,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gdomap_port" lineno="28520">
+<interface name="corenet_udp_send_gdomap_port" lineno="28538">
<summary>
Send UDP traffic on the gdomap port.
</summary>
@@ -28006,7 +28090,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="28535">
+<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="28553">
<summary>
Do not audit attempts to send UDP traffic on the gdomap port.
</summary>
@@ -28017,7 +28101,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gdomap_port" lineno="28550">
+<interface name="corenet_udp_receive_gdomap_port" lineno="28568">
<summary>
Receive UDP traffic on the gdomap port.
</summary>
@@ -28028,7 +28112,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28565">
+<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28583">
<summary>
Do not audit attempts to receive UDP traffic on the gdomap port.
</summary>
@@ -28039,7 +28123,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28580">
+<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28598">
<summary>
Send and receive UDP traffic on the gdomap port.
</summary>
@@ -28050,7 +28134,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28596">
+<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28614">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gdomap port.
@@ -28062,7 +28146,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gdomap_port" lineno="28611">
+<interface name="corenet_tcp_bind_gdomap_port" lineno="28629">
<summary>
Bind TCP sockets to the gdomap port.
</summary>
@@ -28073,7 +28157,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gdomap_port" lineno="28631">
+<interface name="corenet_udp_bind_gdomap_port" lineno="28649">
<summary>
Bind UDP sockets to the gdomap port.
</summary>
@@ -28084,7 +28168,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gdomap_port" lineno="28650">
+<interface name="corenet_tcp_connect_gdomap_port" lineno="28668">
<summary>
Make a TCP connection to the gdomap port.
</summary>
@@ -28094,7 +28178,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gdomap_client_packets" lineno="28670">
+<interface name="corenet_send_gdomap_client_packets" lineno="28688">
<summary>
Send gdomap_client packets.
</summary>
@@ -28105,7 +28189,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28689">
+<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28707">
<summary>
Do not audit attempts to send gdomap_client packets.
</summary>
@@ -28116,7 +28200,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gdomap_client_packets" lineno="28708">
+<interface name="corenet_receive_gdomap_client_packets" lineno="28726">
<summary>
Receive gdomap_client packets.
</summary>
@@ -28127,7 +28211,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28727">
+<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28745">
<summary>
Do not audit attempts to receive gdomap_client packets.
</summary>
@@ -28138,7 +28222,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28746">
+<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28764">
<summary>
Send and receive gdomap_client packets.
</summary>
@@ -28149,7 +28233,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28762">
+<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28780">
<summary>
Do not audit attempts to send and receive gdomap_client packets.
</summary>
@@ -28160,7 +28244,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gdomap_client_packets" lineno="28777">
+<interface name="corenet_relabelto_gdomap_client_packets" lineno="28795">
<summary>
Relabel packets to gdomap_client the packet type.
</summary>
@@ -28170,7 +28254,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gdomap_server_packets" lineno="28797">
+<interface name="corenet_send_gdomap_server_packets" lineno="28815">
<summary>
Send gdomap_server packets.
</summary>
@@ -28181,7 +28265,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28816">
+<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28834">
<summary>
Do not audit attempts to send gdomap_server packets.
</summary>
@@ -28192,7 +28276,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gdomap_server_packets" lineno="28835">
+<interface name="corenet_receive_gdomap_server_packets" lineno="28853">
<summary>
Receive gdomap_server packets.
</summary>
@@ -28203,7 +28287,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28854">
+<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28872">
<summary>
Do not audit attempts to receive gdomap_server packets.
</summary>
@@ -28214,7 +28298,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28873">
+<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28891">
<summary>
Send and receive gdomap_server packets.
</summary>
@@ -28225,7 +28309,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28889">
+<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28907">
<summary>
Do not audit attempts to send and receive gdomap_server packets.
</summary>
@@ -28236,7 +28320,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gdomap_server_packets" lineno="28904">
+<interface name="corenet_relabelto_gdomap_server_packets" lineno="28922">
<summary>
Relabel packets to gdomap_server the packet type.
</summary>
@@ -28246,7 +28330,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28926">
+<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28944">
<summary>
Send and receive TCP traffic on the gds_db port.
</summary>
@@ -28257,7 +28341,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gds_db_port" lineno="28941">
+<interface name="corenet_udp_send_gds_db_port" lineno="28959">
<summary>
Send UDP traffic on the gds_db port.
</summary>
@@ -28268,7 +28352,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28956">
+<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28974">
<summary>
Do not audit attempts to send UDP traffic on the gds_db port.
</summary>
@@ -28279,7 +28363,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gds_db_port" lineno="28971">
+<interface name="corenet_udp_receive_gds_db_port" lineno="28989">
<summary>
Receive UDP traffic on the gds_db port.
</summary>
@@ -28290,7 +28374,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="28986">
+<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="29004">
<summary>
Do not audit attempts to receive UDP traffic on the gds_db port.
</summary>
@@ -28301,7 +28385,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29001">
+<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29019">
<summary>
Send and receive UDP traffic on the gds_db port.
</summary>
@@ -28312,7 +28396,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29017">
+<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29035">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gds_db port.
@@ -28324,7 +28408,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gds_db_port" lineno="29032">
+<interface name="corenet_tcp_bind_gds_db_port" lineno="29050">
<summary>
Bind TCP sockets to the gds_db port.
</summary>
@@ -28335,7 +28419,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gds_db_port" lineno="29052">
+<interface name="corenet_udp_bind_gds_db_port" lineno="29070">
<summary>
Bind UDP sockets to the gds_db port.
</summary>
@@ -28346,7 +28430,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gds_db_port" lineno="29071">
+<interface name="corenet_tcp_connect_gds_db_port" lineno="29089">
<summary>
Make a TCP connection to the gds_db port.
</summary>
@@ -28356,7 +28440,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gds_db_client_packets" lineno="29091">
+<interface name="corenet_send_gds_db_client_packets" lineno="29109">
<summary>
Send gds_db_client packets.
</summary>
@@ -28367,7 +28451,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29110">
+<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29128">
<summary>
Do not audit attempts to send gds_db_client packets.
</summary>
@@ -28378,7 +28462,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gds_db_client_packets" lineno="29129">
+<interface name="corenet_receive_gds_db_client_packets" lineno="29147">
<summary>
Receive gds_db_client packets.
</summary>
@@ -28389,7 +28473,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29148">
+<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29166">
<summary>
Do not audit attempts to receive gds_db_client packets.
</summary>
@@ -28400,7 +28484,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29167">
+<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29185">
<summary>
Send and receive gds_db_client packets.
</summary>
@@ -28411,7 +28495,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="29183">
+<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="29201">
<summary>
Do not audit attempts to send and receive gds_db_client packets.
</summary>
@@ -28422,7 +28506,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gds_db_client_packets" lineno="29198">
+<interface name="corenet_relabelto_gds_db_client_packets" lineno="29216">
<summary>
Relabel packets to gds_db_client the packet type.
</summary>
@@ -28432,7 +28516,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gds_db_server_packets" lineno="29218">
+<interface name="corenet_send_gds_db_server_packets" lineno="29236">
<summary>
Send gds_db_server packets.
</summary>
@@ -28443,7 +28527,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="29237">
+<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="29255">
<summary>
Do not audit attempts to send gds_db_server packets.
</summary>
@@ -28454,7 +28538,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gds_db_server_packets" lineno="29256">
+<interface name="corenet_receive_gds_db_server_packets" lineno="29274">
<summary>
Receive gds_db_server packets.
</summary>
@@ -28465,7 +28549,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="29275">
+<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="29293">
<summary>
Do not audit attempts to receive gds_db_server packets.
</summary>
@@ -28476,7 +28560,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gds_db_server_packets" lineno="29294">
+<interface name="corenet_sendrecv_gds_db_server_packets" lineno="29312">
<summary>
Send and receive gds_db_server packets.
</summary>
@@ -28487,7 +28571,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="29310">
+<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="29328">
<summary>
Do not audit attempts to send and receive gds_db_server packets.
</summary>
@@ -28498,7 +28582,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gds_db_server_packets" lineno="29325">
+<interface name="corenet_relabelto_gds_db_server_packets" lineno="29343">
<summary>
Relabel packets to gds_db_server the packet type.
</summary>
@@ -28508,7 +28592,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_git_port" lineno="29347">
+<interface name="corenet_tcp_sendrecv_git_port" lineno="29365">
<summary>
Send and receive TCP traffic on the git port.
</summary>
@@ -28519,7 +28603,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_git_port" lineno="29362">
+<interface name="corenet_udp_send_git_port" lineno="29380">
<summary>
Send UDP traffic on the git port.
</summary>
@@ -28530,7 +28614,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_git_port" lineno="29377">
+<interface name="corenet_dontaudit_udp_send_git_port" lineno="29395">
<summary>
Do not audit attempts to send UDP traffic on the git port.
</summary>
@@ -28541,7 +28625,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_git_port" lineno="29392">
+<interface name="corenet_udp_receive_git_port" lineno="29410">
<summary>
Receive UDP traffic on the git port.
</summary>
@@ -28552,7 +28636,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29407">
+<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29425">
<summary>
Do not audit attempts to receive UDP traffic on the git port.
</summary>
@@ -28563,7 +28647,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_git_port" lineno="29422">
+<interface name="corenet_udp_sendrecv_git_port" lineno="29440">
<summary>
Send and receive UDP traffic on the git port.
</summary>
@@ -28574,7 +28658,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29438">
+<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29456">
<summary>
Do not audit attempts to send and receive
UDP traffic on the git port.
@@ -28586,7 +28670,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_git_port" lineno="29453">
+<interface name="corenet_tcp_bind_git_port" lineno="29471">
<summary>
Bind TCP sockets to the git port.
</summary>
@@ -28597,7 +28681,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_git_port" lineno="29473">
+<interface name="corenet_udp_bind_git_port" lineno="29491">
<summary>
Bind UDP sockets to the git port.
</summary>
@@ -28608,7 +28692,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_git_port" lineno="29492">
+<interface name="corenet_tcp_connect_git_port" lineno="29510">
<summary>
Make a TCP connection to the git port.
</summary>
@@ -28618,7 +28702,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_git_client_packets" lineno="29512">
+<interface name="corenet_send_git_client_packets" lineno="29530">
<summary>
Send git_client packets.
</summary>
@@ -28629,7 +28713,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_git_client_packets" lineno="29531">
+<interface name="corenet_dontaudit_send_git_client_packets" lineno="29549">
<summary>
Do not audit attempts to send git_client packets.
</summary>
@@ -28640,7 +28724,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_git_client_packets" lineno="29550">
+<interface name="corenet_receive_git_client_packets" lineno="29568">
<summary>
Receive git_client packets.
</summary>
@@ -28651,7 +28735,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29569">
+<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29587">
<summary>
Do not audit attempts to receive git_client packets.
</summary>
@@ -28662,7 +28746,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_git_client_packets" lineno="29588">
+<interface name="corenet_sendrecv_git_client_packets" lineno="29606">
<summary>
Send and receive git_client packets.
</summary>
@@ -28673,7 +28757,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29604">
+<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29622">
<summary>
Do not audit attempts to send and receive git_client packets.
</summary>
@@ -28684,7 +28768,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_git_client_packets" lineno="29619">
+<interface name="corenet_relabelto_git_client_packets" lineno="29637">
<summary>
Relabel packets to git_client the packet type.
</summary>
@@ -28694,7 +28778,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_git_server_packets" lineno="29639">
+<interface name="corenet_send_git_server_packets" lineno="29657">
<summary>
Send git_server packets.
</summary>
@@ -28705,7 +28789,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_git_server_packets" lineno="29658">
+<interface name="corenet_dontaudit_send_git_server_packets" lineno="29676">
<summary>
Do not audit attempts to send git_server packets.
</summary>
@@ -28716,7 +28800,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_git_server_packets" lineno="29677">
+<interface name="corenet_receive_git_server_packets" lineno="29695">
<summary>
Receive git_server packets.
</summary>
@@ -28727,7 +28811,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29696">
+<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29714">
<summary>
Do not audit attempts to receive git_server packets.
</summary>
@@ -28738,7 +28822,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_git_server_packets" lineno="29715">
+<interface name="corenet_sendrecv_git_server_packets" lineno="29733">
<summary>
Send and receive git_server packets.
</summary>
@@ -28749,7 +28833,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29731">
+<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29749">
<summary>
Do not audit attempts to send and receive git_server packets.
</summary>
@@ -28760,7 +28844,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_git_server_packets" lineno="29746">
+<interface name="corenet_relabelto_git_server_packets" lineno="29764">
<summary>
Relabel packets to git_server the packet type.
</summary>
@@ -28770,7 +28854,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29768">
+<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29786">
<summary>
Send and receive TCP traffic on the glance_registry port.
</summary>
@@ -28781,7 +28865,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_glance_registry_port" lineno="29783">
+<interface name="corenet_udp_send_glance_registry_port" lineno="29801">
<summary>
Send UDP traffic on the glance_registry port.
</summary>
@@ -28792,7 +28876,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29798">
+<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29816">
<summary>
Do not audit attempts to send UDP traffic on the glance_registry port.
</summary>
@@ -28803,7 +28887,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_glance_registry_port" lineno="29813">
+<interface name="corenet_udp_receive_glance_registry_port" lineno="29831">
<summary>
Receive UDP traffic on the glance_registry port.
</summary>
@@ -28814,7 +28898,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29828">
+<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29846">
<summary>
Do not audit attempts to receive UDP traffic on the glance_registry port.
</summary>
@@ -28825,7 +28909,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29843">
+<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29861">
<summary>
Send and receive UDP traffic on the glance_registry port.
</summary>
@@ -28836,7 +28920,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29859">
+<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29877">
<summary>
Do not audit attempts to send and receive
UDP traffic on the glance_registry port.
@@ -28848,7 +28932,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_glance_registry_port" lineno="29874">
+<interface name="corenet_tcp_bind_glance_registry_port" lineno="29892">
<summary>
Bind TCP sockets to the glance_registry port.
</summary>
@@ -28859,7 +28943,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_glance_registry_port" lineno="29894">
+<interface name="corenet_udp_bind_glance_registry_port" lineno="29912">
<summary>
Bind UDP sockets to the glance_registry port.
</summary>
@@ -28870,7 +28954,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_glance_registry_port" lineno="29913">
+<interface name="corenet_tcp_connect_glance_registry_port" lineno="29931">
<summary>
Make a TCP connection to the glance_registry port.
</summary>
@@ -28880,7 +28964,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_glance_registry_client_packets" lineno="29933">
+<interface name="corenet_send_glance_registry_client_packets" lineno="29951">
<summary>
Send glance_registry_client packets.
</summary>
@@ -28891,7 +28975,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29952">
+<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29970">
<summary>
Do not audit attempts to send glance_registry_client packets.
</summary>
@@ -28902,7 +28986,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_glance_registry_client_packets" lineno="29971">
+<interface name="corenet_receive_glance_registry_client_packets" lineno="29989">
<summary>
Receive glance_registry_client packets.
</summary>
@@ -28913,7 +28997,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="29990">
+<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="30008">
<summary>
Do not audit attempts to receive glance_registry_client packets.
</summary>
@@ -28924,7 +29008,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="30009">
+<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="30027">
<summary>
Send and receive glance_registry_client packets.
</summary>
@@ -28935,7 +29019,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="30025">
+<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="30043">
<summary>
Do not audit attempts to send and receive glance_registry_client packets.
</summary>
@@ -28946,7 +29030,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_glance_registry_client_packets" lineno="30040">
+<interface name="corenet_relabelto_glance_registry_client_packets" lineno="30058">
<summary>
Relabel packets to glance_registry_client the packet type.
</summary>
@@ -28956,7 +29040,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_glance_registry_server_packets" lineno="30060">
+<interface name="corenet_send_glance_registry_server_packets" lineno="30078">
<summary>
Send glance_registry_server packets.
</summary>
@@ -28967,7 +29051,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="30079">
+<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="30097">
<summary>
Do not audit attempts to send glance_registry_server packets.
</summary>
@@ -28978,7 +29062,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_glance_registry_server_packets" lineno="30098">
+<interface name="corenet_receive_glance_registry_server_packets" lineno="30116">
<summary>
Receive glance_registry_server packets.
</summary>
@@ -28989,7 +29073,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="30117">
+<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="30135">
<summary>
Do not audit attempts to receive glance_registry_server packets.
</summary>
@@ -29000,7 +29084,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30136">
+<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30154">
<summary>
Send and receive glance_registry_server packets.
</summary>
@@ -29011,7 +29095,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30152">
+<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30170">
<summary>
Do not audit attempts to send and receive glance_registry_server packets.
</summary>
@@ -29022,7 +29106,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30167">
+<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30185">
<summary>
Relabel packets to glance_registry_server the packet type.
</summary>
@@ -29032,7 +29116,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30189">
+<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30207">
<summary>
Send and receive TCP traffic on the gopher port.
</summary>
@@ -29043,7 +29127,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gopher_port" lineno="30204">
+<interface name="corenet_udp_send_gopher_port" lineno="30222">
<summary>
Send UDP traffic on the gopher port.
</summary>
@@ -29054,7 +29138,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30219">
+<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30237">
<summary>
Do not audit attempts to send UDP traffic on the gopher port.
</summary>
@@ -29065,7 +29149,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gopher_port" lineno="30234">
+<interface name="corenet_udp_receive_gopher_port" lineno="30252">
<summary>
Receive UDP traffic on the gopher port.
</summary>
@@ -29076,7 +29160,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30249">
+<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30267">
<summary>
Do not audit attempts to receive UDP traffic on the gopher port.
</summary>
@@ -29087,7 +29171,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gopher_port" lineno="30264">
+<interface name="corenet_udp_sendrecv_gopher_port" lineno="30282">
<summary>
Send and receive UDP traffic on the gopher port.
</summary>
@@ -29098,7 +29182,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30280">
+<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30298">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gopher port.
@@ -29110,7 +29194,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gopher_port" lineno="30295">
+<interface name="corenet_tcp_bind_gopher_port" lineno="30313">
<summary>
Bind TCP sockets to the gopher port.
</summary>
@@ -29121,7 +29205,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gopher_port" lineno="30315">
+<interface name="corenet_udp_bind_gopher_port" lineno="30333">
<summary>
Bind UDP sockets to the gopher port.
</summary>
@@ -29132,7 +29216,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gopher_port" lineno="30334">
+<interface name="corenet_tcp_connect_gopher_port" lineno="30352">
<summary>
Make a TCP connection to the gopher port.
</summary>
@@ -29142,7 +29226,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gopher_client_packets" lineno="30354">
+<interface name="corenet_send_gopher_client_packets" lineno="30372">
<summary>
Send gopher_client packets.
</summary>
@@ -29153,7 +29237,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30373">
+<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30391">
<summary>
Do not audit attempts to send gopher_client packets.
</summary>
@@ -29164,7 +29248,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gopher_client_packets" lineno="30392">
+<interface name="corenet_receive_gopher_client_packets" lineno="30410">
<summary>
Receive gopher_client packets.
</summary>
@@ -29175,7 +29259,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30411">
+<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30429">
<summary>
Do not audit attempts to receive gopher_client packets.
</summary>
@@ -29186,7 +29270,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gopher_client_packets" lineno="30430">
+<interface name="corenet_sendrecv_gopher_client_packets" lineno="30448">
<summary>
Send and receive gopher_client packets.
</summary>
@@ -29197,7 +29281,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30446">
+<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30464">
<summary>
Do not audit attempts to send and receive gopher_client packets.
</summary>
@@ -29208,7 +29292,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gopher_client_packets" lineno="30461">
+<interface name="corenet_relabelto_gopher_client_packets" lineno="30479">
<summary>
Relabel packets to gopher_client the packet type.
</summary>
@@ -29218,7 +29302,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gopher_server_packets" lineno="30481">
+<interface name="corenet_send_gopher_server_packets" lineno="30499">
<summary>
Send gopher_server packets.
</summary>
@@ -29229,7 +29313,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30500">
+<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30518">
<summary>
Do not audit attempts to send gopher_server packets.
</summary>
@@ -29240,7 +29324,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gopher_server_packets" lineno="30519">
+<interface name="corenet_receive_gopher_server_packets" lineno="30537">
<summary>
Receive gopher_server packets.
</summary>
@@ -29251,7 +29335,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30538">
+<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30556">
<summary>
Do not audit attempts to receive gopher_server packets.
</summary>
@@ -29262,7 +29346,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gopher_server_packets" lineno="30557">
+<interface name="corenet_sendrecv_gopher_server_packets" lineno="30575">
<summary>
Send and receive gopher_server packets.
</summary>
@@ -29273,7 +29357,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30573">
+<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30591">
<summary>
Do not audit attempts to send and receive gopher_server packets.
</summary>
@@ -29284,7 +29368,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gopher_server_packets" lineno="30588">
+<interface name="corenet_relabelto_gopher_server_packets" lineno="30606">
<summary>
Relabel packets to gopher_server the packet type.
</summary>
@@ -29294,7 +29378,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30610">
+<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30628">
<summary>
Send and receive TCP traffic on the gpsd port.
</summary>
@@ -29305,7 +29389,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gpsd_port" lineno="30625">
+<interface name="corenet_udp_send_gpsd_port" lineno="30643">
<summary>
Send UDP traffic on the gpsd port.
</summary>
@@ -29316,7 +29400,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30640">
+<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30658">
<summary>
Do not audit attempts to send UDP traffic on the gpsd port.
</summary>
@@ -29327,7 +29411,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gpsd_port" lineno="30655">
+<interface name="corenet_udp_receive_gpsd_port" lineno="30673">
<summary>
Receive UDP traffic on the gpsd port.
</summary>
@@ -29338,7 +29422,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30670">
+<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30688">
<summary>
Do not audit attempts to receive UDP traffic on the gpsd port.
</summary>
@@ -29349,7 +29433,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30685">
+<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30703">
<summary>
Send and receive UDP traffic on the gpsd port.
</summary>
@@ -29360,7 +29444,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30701">
+<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30719">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gpsd port.
@@ -29372,7 +29456,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gpsd_port" lineno="30716">
+<interface name="corenet_tcp_bind_gpsd_port" lineno="30734">
<summary>
Bind TCP sockets to the gpsd port.
</summary>
@@ -29383,7 +29467,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gpsd_port" lineno="30736">
+<interface name="corenet_udp_bind_gpsd_port" lineno="30754">
<summary>
Bind UDP sockets to the gpsd port.
</summary>
@@ -29394,7 +29478,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gpsd_port" lineno="30755">
+<interface name="corenet_tcp_connect_gpsd_port" lineno="30773">
<summary>
Make a TCP connection to the gpsd port.
</summary>
@@ -29404,7 +29488,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gpsd_client_packets" lineno="30775">
+<interface name="corenet_send_gpsd_client_packets" lineno="30793">
<summary>
Send gpsd_client packets.
</summary>
@@ -29415,7 +29499,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30794">
+<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30812">
<summary>
Do not audit attempts to send gpsd_client packets.
</summary>
@@ -29426,7 +29510,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gpsd_client_packets" lineno="30813">
+<interface name="corenet_receive_gpsd_client_packets" lineno="30831">
<summary>
Receive gpsd_client packets.
</summary>
@@ -29437,7 +29521,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30832">
+<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30850">
<summary>
Do not audit attempts to receive gpsd_client packets.
</summary>
@@ -29448,7 +29532,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30851">
+<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30869">
<summary>
Send and receive gpsd_client packets.
</summary>
@@ -29459,7 +29543,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30867">
+<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30885">
<summary>
Do not audit attempts to send and receive gpsd_client packets.
</summary>
@@ -29470,7 +29554,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gpsd_client_packets" lineno="30882">
+<interface name="corenet_relabelto_gpsd_client_packets" lineno="30900">
<summary>
Relabel packets to gpsd_client the packet type.
</summary>
@@ -29480,7 +29564,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gpsd_server_packets" lineno="30902">
+<interface name="corenet_send_gpsd_server_packets" lineno="30920">
<summary>
Send gpsd_server packets.
</summary>
@@ -29491,7 +29575,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30921">
+<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30939">
<summary>
Do not audit attempts to send gpsd_server packets.
</summary>
@@ -29502,7 +29586,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gpsd_server_packets" lineno="30940">
+<interface name="corenet_receive_gpsd_server_packets" lineno="30958">
<summary>
Receive gpsd_server packets.
</summary>
@@ -29513,7 +29597,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30959">
+<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30977">
<summary>
Do not audit attempts to receive gpsd_server packets.
</summary>
@@ -29524,7 +29608,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30978">
+<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30996">
<summary>
Send and receive gpsd_server packets.
</summary>
@@ -29535,7 +29619,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="30994">
+<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="31012">
<summary>
Do not audit attempts to send and receive gpsd_server packets.
</summary>
@@ -29546,7 +29630,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gpsd_server_packets" lineno="31009">
+<interface name="corenet_relabelto_gpsd_server_packets" lineno="31027">
<summary>
Relabel packets to gpsd_server the packet type.
</summary>
@@ -29556,7 +29640,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="31031">
+<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="31049">
<summary>
Send and receive TCP traffic on the hadoop_datanode port.
</summary>
@@ -29567,7 +29651,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_hadoop_datanode_port" lineno="31046">
+<interface name="corenet_udp_send_hadoop_datanode_port" lineno="31064">
<summary>
Send UDP traffic on the hadoop_datanode port.
</summary>
@@ -29578,7 +29662,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="31061">
+<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="31079">
<summary>
Do not audit attempts to send UDP traffic on the hadoop_datanode port.
</summary>
@@ -29589,7 +29673,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="31076">
+<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="31094">
<summary>
Receive UDP traffic on the hadoop_datanode port.
</summary>
@@ -29600,7 +29684,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="31091">
+<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="31109">
<summary>
Do not audit attempts to receive UDP traffic on the hadoop_datanode port.
</summary>
@@ -29611,7 +29695,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="31106">
+<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="31124">
<summary>
Send and receive UDP traffic on the hadoop_datanode port.
</summary>
@@ -29622,7 +29706,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="31122">
+<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="31140">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hadoop_datanode port.
@@ -29634,7 +29718,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31137">
+<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31155">
<summary>
Bind TCP sockets to the hadoop_datanode port.
</summary>
@@ -29645,7 +29729,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31157">
+<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31175">
<summary>
Bind UDP sockets to the hadoop_datanode port.
</summary>
@@ -29656,7 +29740,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31176">
+<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31194">
<summary>
Make a TCP connection to the hadoop_datanode port.
</summary>
@@ -29666,7 +29750,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31196">
+<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31214">
<summary>
Send hadoop_datanode_client packets.
</summary>
@@ -29677,7 +29761,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31215">
+<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31233">
<summary>
Do not audit attempts to send hadoop_datanode_client packets.
</summary>
@@ -29688,7 +29772,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31234">
+<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31252">
<summary>
Receive hadoop_datanode_client packets.
</summary>
@@ -29699,7 +29783,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31253">
+<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31271">
<summary>
Do not audit attempts to receive hadoop_datanode_client packets.
</summary>
@@ -29710,7 +29794,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31272">
+<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31290">
<summary>
Send and receive hadoop_datanode_client packets.
</summary>
@@ -29721,7 +29805,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31288">
+<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31306">
<summary>
Do not audit attempts to send and receive hadoop_datanode_client packets.
</summary>
@@ -29732,7 +29816,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31303">
+<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31321">
<summary>
Relabel packets to hadoop_datanode_client the packet type.
</summary>
@@ -29742,7 +29826,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31323">
+<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31341">
<summary>
Send hadoop_datanode_server packets.
</summary>
@@ -29753,7 +29837,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31342">
+<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31360">
<summary>
Do not audit attempts to send hadoop_datanode_server packets.
</summary>
@@ -29764,7 +29848,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31361">
+<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31379">
<summary>
Receive hadoop_datanode_server packets.
</summary>
@@ -29775,7 +29859,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31380">
+<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31398">
<summary>
Do not audit attempts to receive hadoop_datanode_server packets.
</summary>
@@ -29786,7 +29870,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31399">
+<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31417">
<summary>
Send and receive hadoop_datanode_server packets.
</summary>
@@ -29797,7 +29881,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31415">
+<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31433">
<summary>
Do not audit attempts to send and receive hadoop_datanode_server packets.
</summary>
@@ -29808,7 +29892,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31430">
+<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31448">
<summary>
Relabel packets to hadoop_datanode_server the packet type.
</summary>
@@ -29818,7 +29902,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31452">
+<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31470">
<summary>
Send and receive TCP traffic on the hadoop_namenode port.
</summary>
@@ -29829,7 +29913,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31467">
+<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31485">
<summary>
Send UDP traffic on the hadoop_namenode port.
</summary>
@@ -29840,7 +29924,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31482">
+<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31500">
<summary>
Do not audit attempts to send UDP traffic on the hadoop_namenode port.
</summary>
@@ -29851,7 +29935,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31497">
+<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31515">
<summary>
Receive UDP traffic on the hadoop_namenode port.
</summary>
@@ -29862,7 +29946,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31512">
+<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31530">
<summary>
Do not audit attempts to receive UDP traffic on the hadoop_namenode port.
</summary>
@@ -29873,7 +29957,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31527">
+<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31545">
<summary>
Send and receive UDP traffic on the hadoop_namenode port.
</summary>
@@ -29884,7 +29968,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31543">
+<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31561">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hadoop_namenode port.
@@ -29896,7 +29980,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31558">
+<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31576">
<summary>
Bind TCP sockets to the hadoop_namenode port.
</summary>
@@ -29907,7 +29991,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31578">
+<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31596">
<summary>
Bind UDP sockets to the hadoop_namenode port.
</summary>
@@ -29918,7 +30002,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31597">
+<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31615">
<summary>
Make a TCP connection to the hadoop_namenode port.
</summary>
@@ -29928,7 +30012,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31617">
+<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31635">
<summary>
Send hadoop_namenode_client packets.
</summary>
@@ -29939,7 +30023,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31636">
+<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31654">
<summary>
Do not audit attempts to send hadoop_namenode_client packets.
</summary>
@@ -29950,7 +30034,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31655">
+<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31673">
<summary>
Receive hadoop_namenode_client packets.
</summary>
@@ -29961,7 +30045,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31674">
+<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31692">
<summary>
Do not audit attempts to receive hadoop_namenode_client packets.
</summary>
@@ -29972,7 +30056,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31693">
+<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31711">
<summary>
Send and receive hadoop_namenode_client packets.
</summary>
@@ -29983,7 +30067,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31709">
+<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31727">
<summary>
Do not audit attempts to send and receive hadoop_namenode_client packets.
</summary>
@@ -29994,7 +30078,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31724">
+<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31742">
<summary>
Relabel packets to hadoop_namenode_client the packet type.
</summary>
@@ -30004,7 +30088,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31744">
+<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31762">
<summary>
Send hadoop_namenode_server packets.
</summary>
@@ -30015,7 +30099,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31763">
+<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31781">
<summary>
Do not audit attempts to send hadoop_namenode_server packets.
</summary>
@@ -30026,7 +30110,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31782">
+<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31800">
<summary>
Receive hadoop_namenode_server packets.
</summary>
@@ -30037,7 +30121,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31801">
+<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31819">
<summary>
Do not audit attempts to receive hadoop_namenode_server packets.
</summary>
@@ -30048,7 +30132,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31820">
+<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31838">
<summary>
Send and receive hadoop_namenode_server packets.
</summary>
@@ -30059,7 +30143,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31836">
+<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31854">
<summary>
Do not audit attempts to send and receive hadoop_namenode_server packets.
</summary>
@@ -30070,7 +30154,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31851">
+<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31869">
<summary>
Relabel packets to hadoop_namenode_server the packet type.
</summary>
@@ -30080,7 +30164,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31873">
+<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31891">
<summary>
Send and receive TCP traffic on the hddtemp port.
</summary>
@@ -30091,7 +30175,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_hddtemp_port" lineno="31888">
+<interface name="corenet_udp_send_hddtemp_port" lineno="31906">
<summary>
Send UDP traffic on the hddtemp port.
</summary>
@@ -30102,7 +30186,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31903">
+<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31921">
<summary>
Do not audit attempts to send UDP traffic on the hddtemp port.
</summary>
@@ -30113,7 +30197,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_hddtemp_port" lineno="31918">
+<interface name="corenet_udp_receive_hddtemp_port" lineno="31936">
<summary>
Receive UDP traffic on the hddtemp port.
</summary>
@@ -30124,7 +30208,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31933">
+<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31951">
<summary>
Do not audit attempts to receive UDP traffic on the hddtemp port.
</summary>
@@ -30135,7 +30219,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31948">
+<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31966">
<summary>
Send and receive UDP traffic on the hddtemp port.
</summary>
@@ -30146,7 +30230,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31964">
+<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31982">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hddtemp port.
@@ -30158,7 +30242,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_hddtemp_port" lineno="31979">
+<interface name="corenet_tcp_bind_hddtemp_port" lineno="31997">
<summary>
Bind TCP sockets to the hddtemp port.
</summary>
@@ -30169,7 +30253,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hddtemp_port" lineno="31999">
+<interface name="corenet_udp_bind_hddtemp_port" lineno="32017">
<summary>
Bind UDP sockets to the hddtemp port.
</summary>
@@ -30180,7 +30264,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hddtemp_port" lineno="32018">
+<interface name="corenet_tcp_connect_hddtemp_port" lineno="32036">
<summary>
Make a TCP connection to the hddtemp port.
</summary>
@@ -30190,7 +30274,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hddtemp_client_packets" lineno="32038">
+<interface name="corenet_send_hddtemp_client_packets" lineno="32056">
<summary>
Send hddtemp_client packets.
</summary>
@@ -30201,7 +30285,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="32057">
+<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="32075">
<summary>
Do not audit attempts to send hddtemp_client packets.
</summary>
@@ -30212,7 +30296,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hddtemp_client_packets" lineno="32076">
+<interface name="corenet_receive_hddtemp_client_packets" lineno="32094">
<summary>
Receive hddtemp_client packets.
</summary>
@@ -30223,7 +30307,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="32095">
+<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="32113">
<summary>
Do not audit attempts to receive hddtemp_client packets.
</summary>
@@ -30234,7 +30318,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="32114">
+<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="32132">
<summary>
Send and receive hddtemp_client packets.
</summary>
@@ -30245,7 +30329,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32130">
+<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32148">
<summary>
Do not audit attempts to send and receive hddtemp_client packets.
</summary>
@@ -30256,7 +30340,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32145">
+<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32163">
<summary>
Relabel packets to hddtemp_client the packet type.
</summary>
@@ -30266,7 +30350,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hddtemp_server_packets" lineno="32165">
+<interface name="corenet_send_hddtemp_server_packets" lineno="32183">
<summary>
Send hddtemp_server packets.
</summary>
@@ -30277,7 +30361,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32184">
+<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32202">
<summary>
Do not audit attempts to send hddtemp_server packets.
</summary>
@@ -30288,7 +30372,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hddtemp_server_packets" lineno="32203">
+<interface name="corenet_receive_hddtemp_server_packets" lineno="32221">
<summary>
Receive hddtemp_server packets.
</summary>
@@ -30299,7 +30383,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32222">
+<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32240">
<summary>
Do not audit attempts to receive hddtemp_server packets.
</summary>
@@ -30310,7 +30394,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32241">
+<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32259">
<summary>
Send and receive hddtemp_server packets.
</summary>
@@ -30321,7 +30405,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32257">
+<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32275">
<summary>
Do not audit attempts to send and receive hddtemp_server packets.
</summary>
@@ -30332,7 +30416,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32272">
+<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32290">
<summary>
Relabel packets to hddtemp_server the packet type.
</summary>
@@ -30342,7 +30426,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_howl_port" lineno="32294">
+<interface name="corenet_tcp_sendrecv_howl_port" lineno="32312">
<summary>
Send and receive TCP traffic on the howl port.
</summary>
@@ -30353,7 +30437,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_howl_port" lineno="32309">
+<interface name="corenet_udp_send_howl_port" lineno="32327">
<summary>
Send UDP traffic on the howl port.
</summary>
@@ -30364,7 +30448,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32324">
+<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32342">
<summary>
Do not audit attempts to send UDP traffic on the howl port.
</summary>
@@ -30375,7 +30459,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_howl_port" lineno="32339">
+<interface name="corenet_udp_receive_howl_port" lineno="32357">
<summary>
Receive UDP traffic on the howl port.
</summary>
@@ -30386,7 +30470,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32354">
+<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32372">
<summary>
Do not audit attempts to receive UDP traffic on the howl port.
</summary>
@@ -30397,7 +30481,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_howl_port" lineno="32369">
+<interface name="corenet_udp_sendrecv_howl_port" lineno="32387">
<summary>
Send and receive UDP traffic on the howl port.
</summary>
@@ -30408,7 +30492,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32385">
+<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32403">
<summary>
Do not audit attempts to send and receive
UDP traffic on the howl port.
@@ -30420,7 +30504,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_howl_port" lineno="32400">
+<interface name="corenet_tcp_bind_howl_port" lineno="32418">
<summary>
Bind TCP sockets to the howl port.
</summary>
@@ -30431,7 +30515,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_howl_port" lineno="32420">
+<interface name="corenet_udp_bind_howl_port" lineno="32438">
<summary>
Bind UDP sockets to the howl port.
</summary>
@@ -30442,7 +30526,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_howl_port" lineno="32439">
+<interface name="corenet_tcp_connect_howl_port" lineno="32457">
<summary>
Make a TCP connection to the howl port.
</summary>
@@ -30452,7 +30536,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_howl_client_packets" lineno="32459">
+<interface name="corenet_send_howl_client_packets" lineno="32477">
<summary>
Send howl_client packets.
</summary>
@@ -30463,7 +30547,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32478">
+<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32496">
<summary>
Do not audit attempts to send howl_client packets.
</summary>
@@ -30474,7 +30558,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_howl_client_packets" lineno="32497">
+<interface name="corenet_receive_howl_client_packets" lineno="32515">
<summary>
Receive howl_client packets.
</summary>
@@ -30485,7 +30569,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32516">
+<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32534">
<summary>
Do not audit attempts to receive howl_client packets.
</summary>
@@ -30496,7 +30580,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_howl_client_packets" lineno="32535">
+<interface name="corenet_sendrecv_howl_client_packets" lineno="32553">
<summary>
Send and receive howl_client packets.
</summary>
@@ -30507,7 +30591,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32551">
+<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32569">
<summary>
Do not audit attempts to send and receive howl_client packets.
</summary>
@@ -30518,7 +30602,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_howl_client_packets" lineno="32566">
+<interface name="corenet_relabelto_howl_client_packets" lineno="32584">
<summary>
Relabel packets to howl_client the packet type.
</summary>
@@ -30528,7 +30612,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_howl_server_packets" lineno="32586">
+<interface name="corenet_send_howl_server_packets" lineno="32604">
<summary>
Send howl_server packets.
</summary>
@@ -30539,7 +30623,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32605">
+<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32623">
<summary>
Do not audit attempts to send howl_server packets.
</summary>
@@ -30550,7 +30634,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_howl_server_packets" lineno="32624">
+<interface name="corenet_receive_howl_server_packets" lineno="32642">
<summary>
Receive howl_server packets.
</summary>
@@ -30561,7 +30645,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32643">
+<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32661">
<summary>
Do not audit attempts to receive howl_server packets.
</summary>
@@ -30572,7 +30656,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_howl_server_packets" lineno="32662">
+<interface name="corenet_sendrecv_howl_server_packets" lineno="32680">
<summary>
Send and receive howl_server packets.
</summary>
@@ -30583,7 +30667,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32678">
+<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32696">
<summary>
Do not audit attempts to send and receive howl_server packets.
</summary>
@@ -30594,7 +30678,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_howl_server_packets" lineno="32693">
+<interface name="corenet_relabelto_howl_server_packets" lineno="32711">
<summary>
Relabel packets to howl_server the packet type.
</summary>
@@ -30604,7 +30688,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32715">
+<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32733">
<summary>
Send and receive TCP traffic on the hplip port.
</summary>
@@ -30615,7 +30699,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_hplip_port" lineno="32730">
+<interface name="corenet_udp_send_hplip_port" lineno="32748">
<summary>
Send UDP traffic on the hplip port.
</summary>
@@ -30626,7 +30710,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32745">
+<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32763">
<summary>
Do not audit attempts to send UDP traffic on the hplip port.
</summary>
@@ -30637,7 +30721,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_hplip_port" lineno="32760">
+<interface name="corenet_udp_receive_hplip_port" lineno="32778">
<summary>
Receive UDP traffic on the hplip port.
</summary>
@@ -30648,7 +30732,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32775">
+<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32793">
<summary>
Do not audit attempts to receive UDP traffic on the hplip port.
</summary>
@@ -30659,7 +30743,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_hplip_port" lineno="32790">
+<interface name="corenet_udp_sendrecv_hplip_port" lineno="32808">
<summary>
Send and receive UDP traffic on the hplip port.
</summary>
@@ -30670,7 +30754,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32806">
+<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32824">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hplip port.
@@ -30682,7 +30766,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_hplip_port" lineno="32821">
+<interface name="corenet_tcp_bind_hplip_port" lineno="32839">
<summary>
Bind TCP sockets to the hplip port.
</summary>
@@ -30693,7 +30777,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hplip_port" lineno="32841">
+<interface name="corenet_udp_bind_hplip_port" lineno="32859">
<summary>
Bind UDP sockets to the hplip port.
</summary>
@@ -30704,7 +30788,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hplip_port" lineno="32860">
+<interface name="corenet_tcp_connect_hplip_port" lineno="32878">
<summary>
Make a TCP connection to the hplip port.
</summary>
@@ -30714,7 +30798,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hplip_client_packets" lineno="32880">
+<interface name="corenet_send_hplip_client_packets" lineno="32898">
<summary>
Send hplip_client packets.
</summary>
@@ -30725,7 +30809,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32899">
+<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32917">
<summary>
Do not audit attempts to send hplip_client packets.
</summary>
@@ -30736,7 +30820,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hplip_client_packets" lineno="32918">
+<interface name="corenet_receive_hplip_client_packets" lineno="32936">
<summary>
Receive hplip_client packets.
</summary>
@@ -30747,7 +30831,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32937">
+<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32955">
<summary>
Do not audit attempts to receive hplip_client packets.
</summary>
@@ -30758,7 +30842,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hplip_client_packets" lineno="32956">
+<interface name="corenet_sendrecv_hplip_client_packets" lineno="32974">
<summary>
Send and receive hplip_client packets.
</summary>
@@ -30769,7 +30853,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32972">
+<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32990">
<summary>
Do not audit attempts to send and receive hplip_client packets.
</summary>
@@ -30780,7 +30864,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hplip_client_packets" lineno="32987">
+<interface name="corenet_relabelto_hplip_client_packets" lineno="33005">
<summary>
Relabel packets to hplip_client the packet type.
</summary>
@@ -30790,7 +30874,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hplip_server_packets" lineno="33007">
+<interface name="corenet_send_hplip_server_packets" lineno="33025">
<summary>
Send hplip_server packets.
</summary>
@@ -30801,7 +30885,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="33026">
+<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="33044">
<summary>
Do not audit attempts to send hplip_server packets.
</summary>
@@ -30812,7 +30896,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hplip_server_packets" lineno="33045">
+<interface name="corenet_receive_hplip_server_packets" lineno="33063">
<summary>
Receive hplip_server packets.
</summary>
@@ -30823,7 +30907,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="33064">
+<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="33082">
<summary>
Do not audit attempts to receive hplip_server packets.
</summary>
@@ -30834,7 +30918,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hplip_server_packets" lineno="33083">
+<interface name="corenet_sendrecv_hplip_server_packets" lineno="33101">
<summary>
Send and receive hplip_server packets.
</summary>
@@ -30845,7 +30929,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="33099">
+<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="33117">
<summary>
Do not audit attempts to send and receive hplip_server packets.
</summary>
@@ -30856,7 +30940,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hplip_server_packets" lineno="33114">
+<interface name="corenet_relabelto_hplip_server_packets" lineno="33132">
<summary>
Relabel packets to hplip_server the packet type.
</summary>
@@ -30866,7 +30950,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_http_port" lineno="33136">
+<interface name="corenet_tcp_sendrecv_http_port" lineno="33154">
<summary>
Send and receive TCP traffic on the http port.
</summary>
@@ -30877,7 +30961,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_http_port" lineno="33151">
+<interface name="corenet_udp_send_http_port" lineno="33169">
<summary>
Send UDP traffic on the http port.
</summary>
@@ -30888,7 +30972,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_http_port" lineno="33166">
+<interface name="corenet_dontaudit_udp_send_http_port" lineno="33184">
<summary>
Do not audit attempts to send UDP traffic on the http port.
</summary>
@@ -30899,7 +30983,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_http_port" lineno="33181">
+<interface name="corenet_udp_receive_http_port" lineno="33199">
<summary>
Receive UDP traffic on the http port.
</summary>
@@ -30910,7 +30994,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33196">
+<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33214">
<summary>
Do not audit attempts to receive UDP traffic on the http port.
</summary>
@@ -30921,7 +31005,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_http_port" lineno="33211">
+<interface name="corenet_udp_sendrecv_http_port" lineno="33229">
<summary>
Send and receive UDP traffic on the http port.
</summary>
@@ -30932,7 +31016,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33227">
+<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33245">
<summary>
Do not audit attempts to send and receive
UDP traffic on the http port.
@@ -30944,7 +31028,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_http_port" lineno="33242">
+<interface name="corenet_tcp_bind_http_port" lineno="33260">
<summary>
Bind TCP sockets to the http port.
</summary>
@@ -30955,7 +31039,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_http_port" lineno="33262">
+<interface name="corenet_udp_bind_http_port" lineno="33280">
<summary>
Bind UDP sockets to the http port.
</summary>
@@ -30966,7 +31050,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_http_port" lineno="33281">
+<interface name="corenet_tcp_connect_http_port" lineno="33299">
<summary>
Make a TCP connection to the http port.
</summary>
@@ -30976,7 +31060,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_client_packets" lineno="33301">
+<interface name="corenet_send_http_client_packets" lineno="33319">
<summary>
Send http_client packets.
</summary>
@@ -30987,7 +31071,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_client_packets" lineno="33320">
+<interface name="corenet_dontaudit_send_http_client_packets" lineno="33338">
<summary>
Do not audit attempts to send http_client packets.
</summary>
@@ -30998,7 +31082,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_client_packets" lineno="33339">
+<interface name="corenet_receive_http_client_packets" lineno="33357">
<summary>
Receive http_client packets.
</summary>
@@ -31009,7 +31093,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33358">
+<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33376">
<summary>
Do not audit attempts to receive http_client packets.
</summary>
@@ -31020,7 +31104,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_client_packets" lineno="33377">
+<interface name="corenet_sendrecv_http_client_packets" lineno="33395">
<summary>
Send and receive http_client packets.
</summary>
@@ -31031,7 +31115,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33393">
+<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33411">
<summary>
Do not audit attempts to send and receive http_client packets.
</summary>
@@ -31042,7 +31126,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_client_packets" lineno="33408">
+<interface name="corenet_relabelto_http_client_packets" lineno="33426">
<summary>
Relabel packets to http_client the packet type.
</summary>
@@ -31052,7 +31136,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_server_packets" lineno="33428">
+<interface name="corenet_send_http_server_packets" lineno="33446">
<summary>
Send http_server packets.
</summary>
@@ -31063,7 +31147,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_server_packets" lineno="33447">
+<interface name="corenet_dontaudit_send_http_server_packets" lineno="33465">
<summary>
Do not audit attempts to send http_server packets.
</summary>
@@ -31074,7 +31158,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_server_packets" lineno="33466">
+<interface name="corenet_receive_http_server_packets" lineno="33484">
<summary>
Receive http_server packets.
</summary>
@@ -31085,7 +31169,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33485">
+<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33503">
<summary>
Do not audit attempts to receive http_server packets.
</summary>
@@ -31096,7 +31180,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_server_packets" lineno="33504">
+<interface name="corenet_sendrecv_http_server_packets" lineno="33522">
<summary>
Send and receive http_server packets.
</summary>
@@ -31107,7 +31191,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33520">
+<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33538">
<summary>
Do not audit attempts to send and receive http_server packets.
</summary>
@@ -31118,7 +31202,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_server_packets" lineno="33535">
+<interface name="corenet_relabelto_http_server_packets" lineno="33553">
<summary>
Relabel packets to http_server the packet type.
</summary>
@@ -31128,7 +31212,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33557">
+<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33575">
<summary>
Send and receive TCP traffic on the http_cache port.
</summary>
@@ -31139,7 +31223,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_http_cache_port" lineno="33572">
+<interface name="corenet_udp_send_http_cache_port" lineno="33590">
<summary>
Send UDP traffic on the http_cache port.
</summary>
@@ -31150,7 +31234,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33587">
+<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33605">
<summary>
Do not audit attempts to send UDP traffic on the http_cache port.
</summary>
@@ -31161,7 +31245,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_http_cache_port" lineno="33602">
+<interface name="corenet_udp_receive_http_cache_port" lineno="33620">
<summary>
Receive UDP traffic on the http_cache port.
</summary>
@@ -31172,7 +31256,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33617">
+<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33635">
<summary>
Do not audit attempts to receive UDP traffic on the http_cache port.
</summary>
@@ -31183,7 +31267,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33632">
+<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33650">
<summary>
Send and receive UDP traffic on the http_cache port.
</summary>
@@ -31194,7 +31278,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33648">
+<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33666">
<summary>
Do not audit attempts to send and receive
UDP traffic on the http_cache port.
@@ -31206,7 +31290,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_http_cache_port" lineno="33663">
+<interface name="corenet_tcp_bind_http_cache_port" lineno="33681">
<summary>
Bind TCP sockets to the http_cache port.
</summary>
@@ -31217,7 +31301,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_http_cache_port" lineno="33683">
+<interface name="corenet_udp_bind_http_cache_port" lineno="33701">
<summary>
Bind UDP sockets to the http_cache port.
</summary>
@@ -31228,7 +31312,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_http_cache_port" lineno="33702">
+<interface name="corenet_tcp_connect_http_cache_port" lineno="33720">
<summary>
Make a TCP connection to the http_cache port.
</summary>
@@ -31238,7 +31322,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_cache_client_packets" lineno="33722">
+<interface name="corenet_send_http_cache_client_packets" lineno="33740">
<summary>
Send http_cache_client packets.
</summary>
@@ -31249,7 +31333,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33741">
+<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33759">
<summary>
Do not audit attempts to send http_cache_client packets.
</summary>
@@ -31260,7 +31344,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_cache_client_packets" lineno="33760">
+<interface name="corenet_receive_http_cache_client_packets" lineno="33778">
<summary>
Receive http_cache_client packets.
</summary>
@@ -31271,7 +31355,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33779">
+<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33797">
<summary>
Do not audit attempts to receive http_cache_client packets.
</summary>
@@ -31282,7 +31366,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33798">
+<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33816">
<summary>
Send and receive http_cache_client packets.
</summary>
@@ -31293,7 +31377,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33814">
+<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33832">
<summary>
Do not audit attempts to send and receive http_cache_client packets.
</summary>
@@ -31304,7 +31388,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_cache_client_packets" lineno="33829">
+<interface name="corenet_relabelto_http_cache_client_packets" lineno="33847">
<summary>
Relabel packets to http_cache_client the packet type.
</summary>
@@ -31314,7 +31398,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_cache_server_packets" lineno="33849">
+<interface name="corenet_send_http_cache_server_packets" lineno="33867">
<summary>
Send http_cache_server packets.
</summary>
@@ -31325,7 +31409,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33868">
+<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33886">
<summary>
Do not audit attempts to send http_cache_server packets.
</summary>
@@ -31336,7 +31420,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_cache_server_packets" lineno="33887">
+<interface name="corenet_receive_http_cache_server_packets" lineno="33905">
<summary>
Receive http_cache_server packets.
</summary>
@@ -31347,7 +31431,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33906">
+<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33924">
<summary>
Do not audit attempts to receive http_cache_server packets.
</summary>
@@ -31358,7 +31442,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33925">
+<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33943">
<summary>
Send and receive http_cache_server packets.
</summary>
@@ -31369,7 +31453,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33941">
+<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33959">
<summary>
Do not audit attempts to send and receive http_cache_server packets.
</summary>
@@ -31380,7 +31464,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_cache_server_packets" lineno="33956">
+<interface name="corenet_relabelto_http_cache_server_packets" lineno="33974">
<summary>
Relabel packets to http_cache_server the packet type.
</summary>
@@ -31390,7 +31474,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33978">
+<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33996">
<summary>
Send and receive TCP traffic on the i18n_input port.
</summary>
@@ -31401,7 +31485,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_i18n_input_port" lineno="33993">
+<interface name="corenet_udp_send_i18n_input_port" lineno="34011">
<summary>
Send UDP traffic on the i18n_input port.
</summary>
@@ -31412,7 +31496,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="34008">
+<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="34026">
<summary>
Do not audit attempts to send UDP traffic on the i18n_input port.
</summary>
@@ -31423,7 +31507,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_i18n_input_port" lineno="34023">
+<interface name="corenet_udp_receive_i18n_input_port" lineno="34041">
<summary>
Receive UDP traffic on the i18n_input port.
</summary>
@@ -31434,7 +31518,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="34038">
+<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="34056">
<summary>
Do not audit attempts to receive UDP traffic on the i18n_input port.
</summary>
@@ -31445,7 +31529,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="34053">
+<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="34071">
<summary>
Send and receive UDP traffic on the i18n_input port.
</summary>
@@ -31456,7 +31540,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="34069">
+<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="34087">
<summary>
Do not audit attempts to send and receive
UDP traffic on the i18n_input port.
@@ -31468,7 +31552,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_i18n_input_port" lineno="34084">
+<interface name="corenet_tcp_bind_i18n_input_port" lineno="34102">
<summary>
Bind TCP sockets to the i18n_input port.
</summary>
@@ -31479,7 +31563,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_i18n_input_port" lineno="34104">
+<interface name="corenet_udp_bind_i18n_input_port" lineno="34122">
<summary>
Bind UDP sockets to the i18n_input port.
</summary>
@@ -31490,7 +31574,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_i18n_input_port" lineno="34123">
+<interface name="corenet_tcp_connect_i18n_input_port" lineno="34141">
<summary>
Make a TCP connection to the i18n_input port.
</summary>
@@ -31500,7 +31584,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_i18n_input_client_packets" lineno="34143">
+<interface name="corenet_send_i18n_input_client_packets" lineno="34161">
<summary>
Send i18n_input_client packets.
</summary>
@@ -31511,7 +31595,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34162">
+<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34180">
<summary>
Do not audit attempts to send i18n_input_client packets.
</summary>
@@ -31522,7 +31606,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_i18n_input_client_packets" lineno="34181">
+<interface name="corenet_receive_i18n_input_client_packets" lineno="34199">
<summary>
Receive i18n_input_client packets.
</summary>
@@ -31533,7 +31617,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34200">
+<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34218">
<summary>
Do not audit attempts to receive i18n_input_client packets.
</summary>
@@ -31544,7 +31628,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34219">
+<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34237">
<summary>
Send and receive i18n_input_client packets.
</summary>
@@ -31555,7 +31639,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34235">
+<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34253">
<summary>
Do not audit attempts to send and receive i18n_input_client packets.
</summary>
@@ -31566,7 +31650,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34250">
+<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34268">
<summary>
Relabel packets to i18n_input_client the packet type.
</summary>
@@ -31576,7 +31660,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_i18n_input_server_packets" lineno="34270">
+<interface name="corenet_send_i18n_input_server_packets" lineno="34288">
<summary>
Send i18n_input_server packets.
</summary>
@@ -31587,7 +31671,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34289">
+<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34307">
<summary>
Do not audit attempts to send i18n_input_server packets.
</summary>
@@ -31598,7 +31682,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_i18n_input_server_packets" lineno="34308">
+<interface name="corenet_receive_i18n_input_server_packets" lineno="34326">
<summary>
Receive i18n_input_server packets.
</summary>
@@ -31609,7 +31693,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34327">
+<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34345">
<summary>
Do not audit attempts to receive i18n_input_server packets.
</summary>
@@ -31620,7 +31704,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34346">
+<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34364">
<summary>
Send and receive i18n_input_server packets.
</summary>
@@ -31631,7 +31715,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34362">
+<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34380">
<summary>
Do not audit attempts to send and receive i18n_input_server packets.
</summary>
@@ -31642,7 +31726,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34377">
+<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34395">
<summary>
Relabel packets to i18n_input_server the packet type.
</summary>
@@ -31652,7 +31736,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34399">
+<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34417">
<summary>
Send and receive TCP traffic on the imaze port.
</summary>
@@ -31663,7 +31747,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_imaze_port" lineno="34414">
+<interface name="corenet_udp_send_imaze_port" lineno="34432">
<summary>
Send UDP traffic on the imaze port.
</summary>
@@ -31674,7 +31758,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34429">
+<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34447">
<summary>
Do not audit attempts to send UDP traffic on the imaze port.
</summary>
@@ -31685,7 +31769,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_imaze_port" lineno="34444">
+<interface name="corenet_udp_receive_imaze_port" lineno="34462">
<summary>
Receive UDP traffic on the imaze port.
</summary>
@@ -31696,7 +31780,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34459">
+<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34477">
<summary>
Do not audit attempts to receive UDP traffic on the imaze port.
</summary>
@@ -31707,7 +31791,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_imaze_port" lineno="34474">
+<interface name="corenet_udp_sendrecv_imaze_port" lineno="34492">
<summary>
Send and receive UDP traffic on the imaze port.
</summary>
@@ -31718,7 +31802,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34490">
+<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34508">
<summary>
Do not audit attempts to send and receive
UDP traffic on the imaze port.
@@ -31730,7 +31814,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_imaze_port" lineno="34505">
+<interface name="corenet_tcp_bind_imaze_port" lineno="34523">
<summary>
Bind TCP sockets to the imaze port.
</summary>
@@ -31741,7 +31825,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_imaze_port" lineno="34525">
+<interface name="corenet_udp_bind_imaze_port" lineno="34543">
<summary>
Bind UDP sockets to the imaze port.
</summary>
@@ -31752,7 +31836,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_imaze_port" lineno="34544">
+<interface name="corenet_tcp_connect_imaze_port" lineno="34562">
<summary>
Make a TCP connection to the imaze port.
</summary>
@@ -31762,7 +31846,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_imaze_client_packets" lineno="34564">
+<interface name="corenet_send_imaze_client_packets" lineno="34582">
<summary>
Send imaze_client packets.
</summary>
@@ -31773,7 +31857,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34583">
+<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34601">
<summary>
Do not audit attempts to send imaze_client packets.
</summary>
@@ -31784,7 +31868,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_imaze_client_packets" lineno="34602">
+<interface name="corenet_receive_imaze_client_packets" lineno="34620">
<summary>
Receive imaze_client packets.
</summary>
@@ -31795,7 +31879,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34621">
+<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34639">
<summary>
Do not audit attempts to receive imaze_client packets.
</summary>
@@ -31806,7 +31890,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_imaze_client_packets" lineno="34640">
+<interface name="corenet_sendrecv_imaze_client_packets" lineno="34658">
<summary>
Send and receive imaze_client packets.
</summary>
@@ -31817,7 +31901,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34656">
+<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34674">
<summary>
Do not audit attempts to send and receive imaze_client packets.
</summary>
@@ -31828,7 +31912,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_imaze_client_packets" lineno="34671">
+<interface name="corenet_relabelto_imaze_client_packets" lineno="34689">
<summary>
Relabel packets to imaze_client the packet type.
</summary>
@@ -31838,7 +31922,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_imaze_server_packets" lineno="34691">
+<interface name="corenet_send_imaze_server_packets" lineno="34709">
<summary>
Send imaze_server packets.
</summary>
@@ -31849,7 +31933,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34710">
+<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34728">
<summary>
Do not audit attempts to send imaze_server packets.
</summary>
@@ -31860,7 +31944,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_imaze_server_packets" lineno="34729">
+<interface name="corenet_receive_imaze_server_packets" lineno="34747">
<summary>
Receive imaze_server packets.
</summary>
@@ -31871,7 +31955,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34748">
+<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34766">
<summary>
Do not audit attempts to receive imaze_server packets.
</summary>
@@ -31882,7 +31966,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_imaze_server_packets" lineno="34767">
+<interface name="corenet_sendrecv_imaze_server_packets" lineno="34785">
<summary>
Send and receive imaze_server packets.
</summary>
@@ -31893,7 +31977,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34783">
+<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34801">
<summary>
Do not audit attempts to send and receive imaze_server packets.
</summary>
@@ -31904,7 +31988,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_imaze_server_packets" lineno="34798">
+<interface name="corenet_relabelto_imaze_server_packets" lineno="34816">
<summary>
Relabel packets to imaze_server the packet type.
</summary>
@@ -31914,7 +31998,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34820">
+<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34838">
<summary>
Send and receive TCP traffic on the inetd_child port.
</summary>
@@ -31925,7 +32009,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_inetd_child_port" lineno="34835">
+<interface name="corenet_udp_send_inetd_child_port" lineno="34853">
<summary>
Send UDP traffic on the inetd_child port.
</summary>
@@ -31936,7 +32020,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34850">
+<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34868">
<summary>
Do not audit attempts to send UDP traffic on the inetd_child port.
</summary>
@@ -31947,7 +32031,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_inetd_child_port" lineno="34865">
+<interface name="corenet_udp_receive_inetd_child_port" lineno="34883">
<summary>
Receive UDP traffic on the inetd_child port.
</summary>
@@ -31958,7 +32042,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34880">
+<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34898">
<summary>
Do not audit attempts to receive UDP traffic on the inetd_child port.
</summary>
@@ -31969,7 +32053,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34895">
+<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34913">
<summary>
Send and receive UDP traffic on the inetd_child port.
</summary>
@@ -31980,7 +32064,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34911">
+<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34929">
<summary>
Do not audit attempts to send and receive
UDP traffic on the inetd_child port.
@@ -31992,7 +32076,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_inetd_child_port" lineno="34926">
+<interface name="corenet_tcp_bind_inetd_child_port" lineno="34944">
<summary>
Bind TCP sockets to the inetd_child port.
</summary>
@@ -32003,7 +32087,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_inetd_child_port" lineno="34946">
+<interface name="corenet_udp_bind_inetd_child_port" lineno="34964">
<summary>
Bind UDP sockets to the inetd_child port.
</summary>
@@ -32014,7 +32098,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_inetd_child_port" lineno="34965">
+<interface name="corenet_tcp_connect_inetd_child_port" lineno="34983">
<summary>
Make a TCP connection to the inetd_child port.
</summary>
@@ -32024,7 +32108,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_inetd_child_client_packets" lineno="34985">
+<interface name="corenet_send_inetd_child_client_packets" lineno="35003">
<summary>
Send inetd_child_client packets.
</summary>
@@ -32035,7 +32119,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="35004">
+<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="35022">
<summary>
Do not audit attempts to send inetd_child_client packets.
</summary>
@@ -32046,7 +32130,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_inetd_child_client_packets" lineno="35023">
+<interface name="corenet_receive_inetd_child_client_packets" lineno="35041">
<summary>
Receive inetd_child_client packets.
</summary>
@@ -32057,7 +32141,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="35042">
+<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="35060">
<summary>
Do not audit attempts to receive inetd_child_client packets.
</summary>
@@ -32068,7 +32152,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="35061">
+<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="35079">
<summary>
Send and receive inetd_child_client packets.
</summary>
@@ -32079,7 +32163,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="35077">
+<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="35095">
<summary>
Do not audit attempts to send and receive inetd_child_client packets.
</summary>
@@ -32090,7 +32174,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_inetd_child_client_packets" lineno="35092">
+<interface name="corenet_relabelto_inetd_child_client_packets" lineno="35110">
<summary>
Relabel packets to inetd_child_client the packet type.
</summary>
@@ -32100,7 +32184,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_inetd_child_server_packets" lineno="35112">
+<interface name="corenet_send_inetd_child_server_packets" lineno="35130">
<summary>
Send inetd_child_server packets.
</summary>
@@ -32111,7 +32195,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35131">
+<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35149">
<summary>
Do not audit attempts to send inetd_child_server packets.
</summary>
@@ -32122,7 +32206,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_inetd_child_server_packets" lineno="35150">
+<interface name="corenet_receive_inetd_child_server_packets" lineno="35168">
<summary>
Receive inetd_child_server packets.
</summary>
@@ -32133,7 +32217,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35169">
+<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35187">
<summary>
Do not audit attempts to receive inetd_child_server packets.
</summary>
@@ -32144,7 +32228,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35188">
+<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35206">
<summary>
Send and receive inetd_child_server packets.
</summary>
@@ -32155,7 +32239,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35204">
+<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35222">
<summary>
Do not audit attempts to send and receive inetd_child_server packets.
</summary>
@@ -32166,7 +32250,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35219">
+<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35237">
<summary>
Relabel packets to inetd_child_server the packet type.
</summary>
@@ -32176,7 +32260,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_innd_port" lineno="35241">
+<interface name="corenet_tcp_sendrecv_innd_port" lineno="35259">
<summary>
Send and receive TCP traffic on the innd port.
</summary>
@@ -32187,7 +32271,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_innd_port" lineno="35256">
+<interface name="corenet_udp_send_innd_port" lineno="35274">
<summary>
Send UDP traffic on the innd port.
</summary>
@@ -32198,7 +32282,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35271">
+<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35289">
<summary>
Do not audit attempts to send UDP traffic on the innd port.
</summary>
@@ -32209,7 +32293,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_innd_port" lineno="35286">
+<interface name="corenet_udp_receive_innd_port" lineno="35304">
<summary>
Receive UDP traffic on the innd port.
</summary>
@@ -32220,7 +32304,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35301">
+<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35319">
<summary>
Do not audit attempts to receive UDP traffic on the innd port.
</summary>
@@ -32231,7 +32315,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_innd_port" lineno="35316">
+<interface name="corenet_udp_sendrecv_innd_port" lineno="35334">
<summary>
Send and receive UDP traffic on the innd port.
</summary>
@@ -32242,7 +32326,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35332">
+<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35350">
<summary>
Do not audit attempts to send and receive
UDP traffic on the innd port.
@@ -32254,7 +32338,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_innd_port" lineno="35347">
+<interface name="corenet_tcp_bind_innd_port" lineno="35365">
<summary>
Bind TCP sockets to the innd port.
</summary>
@@ -32265,7 +32349,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_innd_port" lineno="35367">
+<interface name="corenet_udp_bind_innd_port" lineno="35385">
<summary>
Bind UDP sockets to the innd port.
</summary>
@@ -32276,7 +32360,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_innd_port" lineno="35386">
+<interface name="corenet_tcp_connect_innd_port" lineno="35404">
<summary>
Make a TCP connection to the innd port.
</summary>
@@ -32286,7 +32370,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_innd_client_packets" lineno="35406">
+<interface name="corenet_send_innd_client_packets" lineno="35424">
<summary>
Send innd_client packets.
</summary>
@@ -32297,7 +32381,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35425">
+<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35443">
<summary>
Do not audit attempts to send innd_client packets.
</summary>
@@ -32308,7 +32392,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_innd_client_packets" lineno="35444">
+<interface name="corenet_receive_innd_client_packets" lineno="35462">
<summary>
Receive innd_client packets.
</summary>
@@ -32319,7 +32403,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35463">
+<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35481">
<summary>
Do not audit attempts to receive innd_client packets.
</summary>
@@ -32330,7 +32414,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_innd_client_packets" lineno="35482">
+<interface name="corenet_sendrecv_innd_client_packets" lineno="35500">
<summary>
Send and receive innd_client packets.
</summary>
@@ -32341,7 +32425,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35498">
+<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35516">
<summary>
Do not audit attempts to send and receive innd_client packets.
</summary>
@@ -32352,7 +32436,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_innd_client_packets" lineno="35513">
+<interface name="corenet_relabelto_innd_client_packets" lineno="35531">
<summary>
Relabel packets to innd_client the packet type.
</summary>
@@ -32362,7 +32446,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_innd_server_packets" lineno="35533">
+<interface name="corenet_send_innd_server_packets" lineno="35551">
<summary>
Send innd_server packets.
</summary>
@@ -32373,7 +32457,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35552">
+<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35570">
<summary>
Do not audit attempts to send innd_server packets.
</summary>
@@ -32384,7 +32468,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_innd_server_packets" lineno="35571">
+<interface name="corenet_receive_innd_server_packets" lineno="35589">
<summary>
Receive innd_server packets.
</summary>
@@ -32395,7 +32479,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35590">
+<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35608">
<summary>
Do not audit attempts to receive innd_server packets.
</summary>
@@ -32406,7 +32490,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_innd_server_packets" lineno="35609">
+<interface name="corenet_sendrecv_innd_server_packets" lineno="35627">
<summary>
Send and receive innd_server packets.
</summary>
@@ -32417,7 +32501,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35625">
+<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35643">
<summary>
Do not audit attempts to send and receive innd_server packets.
</summary>
@@ -32428,7 +32512,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_innd_server_packets" lineno="35640">
+<interface name="corenet_relabelto_innd_server_packets" lineno="35658">
<summary>
Relabel packets to innd_server the packet type.
</summary>
@@ -32438,7 +32522,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35662">
+<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35680">
<summary>
Send and receive TCP traffic on the interwise port.
</summary>
@@ -32449,7 +32533,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_interwise_port" lineno="35677">
+<interface name="corenet_udp_send_interwise_port" lineno="35695">
<summary>
Send UDP traffic on the interwise port.
</summary>
@@ -32460,7 +32544,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35692">
+<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35710">
<summary>
Do not audit attempts to send UDP traffic on the interwise port.
</summary>
@@ -32471,7 +32555,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_interwise_port" lineno="35707">
+<interface name="corenet_udp_receive_interwise_port" lineno="35725">
<summary>
Receive UDP traffic on the interwise port.
</summary>
@@ -32482,7 +32566,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35722">
+<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35740">
<summary>
Do not audit attempts to receive UDP traffic on the interwise port.
</summary>
@@ -32493,7 +32577,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_interwise_port" lineno="35737">
+<interface name="corenet_udp_sendrecv_interwise_port" lineno="35755">
<summary>
Send and receive UDP traffic on the interwise port.
</summary>
@@ -32504,7 +32588,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35753">
+<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35771">
<summary>
Do not audit attempts to send and receive
UDP traffic on the interwise port.
@@ -32516,7 +32600,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_interwise_port" lineno="35768">
+<interface name="corenet_tcp_bind_interwise_port" lineno="35786">
<summary>
Bind TCP sockets to the interwise port.
</summary>
@@ -32527,7 +32611,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_interwise_port" lineno="35788">
+<interface name="corenet_udp_bind_interwise_port" lineno="35806">
<summary>
Bind UDP sockets to the interwise port.
</summary>
@@ -32538,7 +32622,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_interwise_port" lineno="35807">
+<interface name="corenet_tcp_connect_interwise_port" lineno="35825">
<summary>
Make a TCP connection to the interwise port.
</summary>
@@ -32548,7 +32632,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_interwise_client_packets" lineno="35827">
+<interface name="corenet_send_interwise_client_packets" lineno="35845">
<summary>
Send interwise_client packets.
</summary>
@@ -32559,7 +32643,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35846">
+<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35864">
<summary>
Do not audit attempts to send interwise_client packets.
</summary>
@@ -32570,7 +32654,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_interwise_client_packets" lineno="35865">
+<interface name="corenet_receive_interwise_client_packets" lineno="35883">
<summary>
Receive interwise_client packets.
</summary>
@@ -32581,7 +32665,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35884">
+<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35902">
<summary>
Do not audit attempts to receive interwise_client packets.
</summary>
@@ -32592,7 +32676,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_interwise_client_packets" lineno="35903">
+<interface name="corenet_sendrecv_interwise_client_packets" lineno="35921">
<summary>
Send and receive interwise_client packets.
</summary>
@@ -32603,7 +32687,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35919">
+<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35937">
<summary>
Do not audit attempts to send and receive interwise_client packets.
</summary>
@@ -32614,7 +32698,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_interwise_client_packets" lineno="35934">
+<interface name="corenet_relabelto_interwise_client_packets" lineno="35952">
<summary>
Relabel packets to interwise_client the packet type.
</summary>
@@ -32624,7 +32708,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_interwise_server_packets" lineno="35954">
+<interface name="corenet_send_interwise_server_packets" lineno="35972">
<summary>
Send interwise_server packets.
</summary>
@@ -32635,7 +32719,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35973">
+<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35991">
<summary>
Do not audit attempts to send interwise_server packets.
</summary>
@@ -32646,7 +32730,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_interwise_server_packets" lineno="35992">
+<interface name="corenet_receive_interwise_server_packets" lineno="36010">
<summary>
Receive interwise_server packets.
</summary>
@@ -32657,7 +32741,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="36011">
+<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="36029">
<summary>
Do not audit attempts to receive interwise_server packets.
</summary>
@@ -32668,7 +32752,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_interwise_server_packets" lineno="36030">
+<interface name="corenet_sendrecv_interwise_server_packets" lineno="36048">
<summary>
Send and receive interwise_server packets.
</summary>
@@ -32679,7 +32763,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="36046">
+<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="36064">
<summary>
Do not audit attempts to send and receive interwise_server packets.
</summary>
@@ -32690,7 +32774,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_interwise_server_packets" lineno="36061">
+<interface name="corenet_relabelto_interwise_server_packets" lineno="36079">
<summary>
Relabel packets to interwise_server the packet type.
</summary>
@@ -32700,7 +32784,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="36083">
+<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="36101">
<summary>
Send and receive TCP traffic on the ionixnetmon port.
</summary>
@@ -32711,7 +32795,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ionixnetmon_port" lineno="36098">
+<interface name="corenet_udp_send_ionixnetmon_port" lineno="36116">
<summary>
Send UDP traffic on the ionixnetmon port.
</summary>
@@ -32722,7 +32806,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="36113">
+<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="36131">
<summary>
Do not audit attempts to send UDP traffic on the ionixnetmon port.
</summary>
@@ -32733,7 +32817,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36128">
+<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36146">
<summary>
Receive UDP traffic on the ionixnetmon port.
</summary>
@@ -32744,7 +32828,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36143">
+<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36161">
<summary>
Do not audit attempts to receive UDP traffic on the ionixnetmon port.
</summary>
@@ -32755,7 +32839,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36158">
+<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36176">
<summary>
Send and receive UDP traffic on the ionixnetmon port.
</summary>
@@ -32766,7 +32850,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36174">
+<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36192">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ionixnetmon port.
@@ -32778,7 +32862,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36189">
+<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36207">
<summary>
Bind TCP sockets to the ionixnetmon port.
</summary>
@@ -32789,7 +32873,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36209">
+<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36227">
<summary>
Bind UDP sockets to the ionixnetmon port.
</summary>
@@ -32800,7 +32884,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36228">
+<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36246">
<summary>
Make a TCP connection to the ionixnetmon port.
</summary>
@@ -32810,7 +32894,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ionixnetmon_client_packets" lineno="36248">
+<interface name="corenet_send_ionixnetmon_client_packets" lineno="36266">
<summary>
Send ionixnetmon_client packets.
</summary>
@@ -32821,7 +32905,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36267">
+<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36285">
<summary>
Do not audit attempts to send ionixnetmon_client packets.
</summary>
@@ -32832,7 +32916,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36286">
+<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36304">
<summary>
Receive ionixnetmon_client packets.
</summary>
@@ -32843,7 +32927,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36305">
+<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36323">
<summary>
Do not audit attempts to receive ionixnetmon_client packets.
</summary>
@@ -32854,7 +32938,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36324">
+<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36342">
<summary>
Send and receive ionixnetmon_client packets.
</summary>
@@ -32865,7 +32949,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36340">
+<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36358">
<summary>
Do not audit attempts to send and receive ionixnetmon_client packets.
</summary>
@@ -32876,7 +32960,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36355">
+<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36373">
<summary>
Relabel packets to ionixnetmon_client the packet type.
</summary>
@@ -32886,7 +32970,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ionixnetmon_server_packets" lineno="36375">
+<interface name="corenet_send_ionixnetmon_server_packets" lineno="36393">
<summary>
Send ionixnetmon_server packets.
</summary>
@@ -32897,7 +32981,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36394">
+<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36412">
<summary>
Do not audit attempts to send ionixnetmon_server packets.
</summary>
@@ -32908,7 +32992,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36413">
+<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36431">
<summary>
Receive ionixnetmon_server packets.
</summary>
@@ -32919,7 +33003,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36432">
+<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36450">
<summary>
Do not audit attempts to receive ionixnetmon_server packets.
</summary>
@@ -32930,7 +33014,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36451">
+<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36469">
<summary>
Send and receive ionixnetmon_server packets.
</summary>
@@ -32941,7 +33025,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36467">
+<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36485">
<summary>
Do not audit attempts to send and receive ionixnetmon_server packets.
</summary>
@@ -32952,7 +33036,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36482">
+<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36500">
<summary>
Relabel packets to ionixnetmon_server the packet type.
</summary>
@@ -32962,7 +33046,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36504">
+<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36522">
<summary>
Send and receive TCP traffic on the ipmi port.
</summary>
@@ -32973,7 +33057,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ipmi_port" lineno="36519">
+<interface name="corenet_udp_send_ipmi_port" lineno="36537">
<summary>
Send UDP traffic on the ipmi port.
</summary>
@@ -32984,7 +33068,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36534">
+<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36552">
<summary>
Do not audit attempts to send UDP traffic on the ipmi port.
</summary>
@@ -32995,7 +33079,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ipmi_port" lineno="36549">
+<interface name="corenet_udp_receive_ipmi_port" lineno="36567">
<summary>
Receive UDP traffic on the ipmi port.
</summary>
@@ -33006,7 +33090,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36564">
+<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36582">
<summary>
Do not audit attempts to receive UDP traffic on the ipmi port.
</summary>
@@ -33017,7 +33101,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36579">
+<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36597">
<summary>
Send and receive UDP traffic on the ipmi port.
</summary>
@@ -33028,7 +33112,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36595">
+<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36613">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ipmi port.
@@ -33040,7 +33124,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ipmi_port" lineno="36610">
+<interface name="corenet_tcp_bind_ipmi_port" lineno="36628">
<summary>
Bind TCP sockets to the ipmi port.
</summary>
@@ -33051,7 +33135,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ipmi_port" lineno="36630">
+<interface name="corenet_udp_bind_ipmi_port" lineno="36648">
<summary>
Bind UDP sockets to the ipmi port.
</summary>
@@ -33062,7 +33146,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ipmi_port" lineno="36649">
+<interface name="corenet_tcp_connect_ipmi_port" lineno="36667">
<summary>
Make a TCP connection to the ipmi port.
</summary>
@@ -33072,7 +33156,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipmi_client_packets" lineno="36669">
+<interface name="corenet_send_ipmi_client_packets" lineno="36687">
<summary>
Send ipmi_client packets.
</summary>
@@ -33083,7 +33167,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36688">
+<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36706">
<summary>
Do not audit attempts to send ipmi_client packets.
</summary>
@@ -33094,7 +33178,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipmi_client_packets" lineno="36707">
+<interface name="corenet_receive_ipmi_client_packets" lineno="36725">
<summary>
Receive ipmi_client packets.
</summary>
@@ -33105,7 +33189,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36726">
+<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36744">
<summary>
Do not audit attempts to receive ipmi_client packets.
</summary>
@@ -33116,7 +33200,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36745">
+<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36763">
<summary>
Send and receive ipmi_client packets.
</summary>
@@ -33127,7 +33211,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36761">
+<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36779">
<summary>
Do not audit attempts to send and receive ipmi_client packets.
</summary>
@@ -33138,7 +33222,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipmi_client_packets" lineno="36776">
+<interface name="corenet_relabelto_ipmi_client_packets" lineno="36794">
<summary>
Relabel packets to ipmi_client the packet type.
</summary>
@@ -33148,7 +33232,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipmi_server_packets" lineno="36796">
+<interface name="corenet_send_ipmi_server_packets" lineno="36814">
<summary>
Send ipmi_server packets.
</summary>
@@ -33159,7 +33243,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36815">
+<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36833">
<summary>
Do not audit attempts to send ipmi_server packets.
</summary>
@@ -33170,7 +33254,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipmi_server_packets" lineno="36834">
+<interface name="corenet_receive_ipmi_server_packets" lineno="36852">
<summary>
Receive ipmi_server packets.
</summary>
@@ -33181,7 +33265,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36853">
+<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36871">
<summary>
Do not audit attempts to receive ipmi_server packets.
</summary>
@@ -33192,7 +33276,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36872">
+<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36890">
<summary>
Send and receive ipmi_server packets.
</summary>
@@ -33203,7 +33287,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36888">
+<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36906">
<summary>
Do not audit attempts to send and receive ipmi_server packets.
</summary>
@@ -33214,7 +33298,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipmi_server_packets" lineno="36903">
+<interface name="corenet_relabelto_ipmi_server_packets" lineno="36921">
<summary>
Relabel packets to ipmi_server the packet type.
</summary>
@@ -33224,7 +33308,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36925">
+<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36943">
<summary>
Send and receive TCP traffic on the ipp port.
</summary>
@@ -33235,7 +33319,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ipp_port" lineno="36940">
+<interface name="corenet_udp_send_ipp_port" lineno="36958">
<summary>
Send UDP traffic on the ipp port.
</summary>
@@ -33246,7 +33330,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36955">
+<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36973">
<summary>
Do not audit attempts to send UDP traffic on the ipp port.
</summary>
@@ -33257,7 +33341,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ipp_port" lineno="36970">
+<interface name="corenet_udp_receive_ipp_port" lineno="36988">
<summary>
Receive UDP traffic on the ipp port.
</summary>
@@ -33268,7 +33352,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="36985">
+<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="37003">
<summary>
Do not audit attempts to receive UDP traffic on the ipp port.
</summary>
@@ -33279,7 +33363,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ipp_port" lineno="37000">
+<interface name="corenet_udp_sendrecv_ipp_port" lineno="37018">
<summary>
Send and receive UDP traffic on the ipp port.
</summary>
@@ -33290,7 +33374,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="37016">
+<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="37034">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ipp port.
@@ -33302,7 +33386,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ipp_port" lineno="37031">
+<interface name="corenet_tcp_bind_ipp_port" lineno="37049">
<summary>
Bind TCP sockets to the ipp port.
</summary>
@@ -33313,7 +33397,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ipp_port" lineno="37051">
+<interface name="corenet_udp_bind_ipp_port" lineno="37069">
<summary>
Bind UDP sockets to the ipp port.
</summary>
@@ -33324,7 +33408,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ipp_port" lineno="37070">
+<interface name="corenet_tcp_connect_ipp_port" lineno="37088">
<summary>
Make a TCP connection to the ipp port.
</summary>
@@ -33334,7 +33418,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipp_client_packets" lineno="37090">
+<interface name="corenet_send_ipp_client_packets" lineno="37108">
<summary>
Send ipp_client packets.
</summary>
@@ -33345,7 +33429,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="37109">
+<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="37127">
<summary>
Do not audit attempts to send ipp_client packets.
</summary>
@@ -33356,7 +33440,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipp_client_packets" lineno="37128">
+<interface name="corenet_receive_ipp_client_packets" lineno="37146">
<summary>
Receive ipp_client packets.
</summary>
@@ -33367,7 +33451,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37147">
+<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37165">
<summary>
Do not audit attempts to receive ipp_client packets.
</summary>
@@ -33378,7 +33462,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipp_client_packets" lineno="37166">
+<interface name="corenet_sendrecv_ipp_client_packets" lineno="37184">
<summary>
Send and receive ipp_client packets.
</summary>
@@ -33389,7 +33473,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37182">
+<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37200">
<summary>
Do not audit attempts to send and receive ipp_client packets.
</summary>
@@ -33400,7 +33484,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipp_client_packets" lineno="37197">
+<interface name="corenet_relabelto_ipp_client_packets" lineno="37215">
<summary>
Relabel packets to ipp_client the packet type.
</summary>
@@ -33410,7 +33494,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipp_server_packets" lineno="37217">
+<interface name="corenet_send_ipp_server_packets" lineno="37235">
<summary>
Send ipp_server packets.
</summary>
@@ -33421,7 +33505,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37236">
+<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37254">
<summary>
Do not audit attempts to send ipp_server packets.
</summary>
@@ -33432,7 +33516,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipp_server_packets" lineno="37255">
+<interface name="corenet_receive_ipp_server_packets" lineno="37273">
<summary>
Receive ipp_server packets.
</summary>
@@ -33443,7 +33527,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37274">
+<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37292">
<summary>
Do not audit attempts to receive ipp_server packets.
</summary>
@@ -33454,7 +33538,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipp_server_packets" lineno="37293">
+<interface name="corenet_sendrecv_ipp_server_packets" lineno="37311">
<summary>
Send and receive ipp_server packets.
</summary>
@@ -33465,7 +33549,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37309">
+<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37327">
<summary>
Do not audit attempts to send and receive ipp_server packets.
</summary>
@@ -33476,7 +33560,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipp_server_packets" lineno="37324">
+<interface name="corenet_relabelto_ipp_server_packets" lineno="37342">
<summary>
Relabel packets to ipp_server the packet type.
</summary>
@@ -33486,7 +33570,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37346">
+<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37364">
<summary>
Send and receive TCP traffic on the ipsecnat port.
</summary>
@@ -33497,7 +33581,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ipsecnat_port" lineno="37361">
+<interface name="corenet_udp_send_ipsecnat_port" lineno="37379">
<summary>
Send UDP traffic on the ipsecnat port.
</summary>
@@ -33508,7 +33592,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37376">
+<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37394">
<summary>
Do not audit attempts to send UDP traffic on the ipsecnat port.
</summary>
@@ -33519,7 +33603,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ipsecnat_port" lineno="37391">
+<interface name="corenet_udp_receive_ipsecnat_port" lineno="37409">
<summary>
Receive UDP traffic on the ipsecnat port.
</summary>
@@ -33530,7 +33614,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37406">
+<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37424">
<summary>
Do not audit attempts to receive UDP traffic on the ipsecnat port.
</summary>
@@ -33541,7 +33625,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37421">
+<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37439">
<summary>
Send and receive UDP traffic on the ipsecnat port.
</summary>
@@ -33552,7 +33636,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37437">
+<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37455">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ipsecnat port.
@@ -33564,7 +33648,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37452">
+<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37470">
<summary>
Bind TCP sockets to the ipsecnat port.
</summary>
@@ -33575,7 +33659,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ipsecnat_port" lineno="37472">
+<interface name="corenet_udp_bind_ipsecnat_port" lineno="37490">
<summary>
Bind UDP sockets to the ipsecnat port.
</summary>
@@ -33586,7 +33670,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37491">
+<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37509">
<summary>
Make a TCP connection to the ipsecnat port.
</summary>
@@ -33596,7 +33680,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipsecnat_client_packets" lineno="37511">
+<interface name="corenet_send_ipsecnat_client_packets" lineno="37529">
<summary>
Send ipsecnat_client packets.
</summary>
@@ -33607,7 +33691,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37530">
+<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37548">
<summary>
Do not audit attempts to send ipsecnat_client packets.
</summary>
@@ -33618,7 +33702,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipsecnat_client_packets" lineno="37549">
+<interface name="corenet_receive_ipsecnat_client_packets" lineno="37567">
<summary>
Receive ipsecnat_client packets.
</summary>
@@ -33629,7 +33713,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37568">
+<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37586">
<summary>
Do not audit attempts to receive ipsecnat_client packets.
</summary>
@@ -33640,7 +33724,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37587">
+<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37605">
<summary>
Send and receive ipsecnat_client packets.
</summary>
@@ -33651,7 +33735,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37603">
+<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37621">
<summary>
Do not audit attempts to send and receive ipsecnat_client packets.
</summary>
@@ -33662,7 +33746,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37618">
+<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37636">
<summary>
Relabel packets to ipsecnat_client the packet type.
</summary>
@@ -33672,7 +33756,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipsecnat_server_packets" lineno="37638">
+<interface name="corenet_send_ipsecnat_server_packets" lineno="37656">
<summary>
Send ipsecnat_server packets.
</summary>
@@ -33683,7 +33767,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37657">
+<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37675">
<summary>
Do not audit attempts to send ipsecnat_server packets.
</summary>
@@ -33694,7 +33778,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipsecnat_server_packets" lineno="37676">
+<interface name="corenet_receive_ipsecnat_server_packets" lineno="37694">
<summary>
Receive ipsecnat_server packets.
</summary>
@@ -33705,7 +33789,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37695">
+<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37713">
<summary>
Do not audit attempts to receive ipsecnat_server packets.
</summary>
@@ -33716,7 +33800,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37714">
+<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37732">
<summary>
Send and receive ipsecnat_server packets.
</summary>
@@ -33727,7 +33811,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37730">
+<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37748">
<summary>
Do not audit attempts to send and receive ipsecnat_server packets.
</summary>
@@ -33738,7 +33822,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37745">
+<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37763">
<summary>
Relabel packets to ipsecnat_server the packet type.
</summary>
@@ -33748,7 +33832,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37767">
+<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37785">
<summary>
Send and receive TCP traffic on the ircd port.
</summary>
@@ -33759,7 +33843,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ircd_port" lineno="37782">
+<interface name="corenet_udp_send_ircd_port" lineno="37800">
<summary>
Send UDP traffic on the ircd port.
</summary>
@@ -33770,7 +33854,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37797">
+<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37815">
<summary>
Do not audit attempts to send UDP traffic on the ircd port.
</summary>
@@ -33781,7 +33865,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ircd_port" lineno="37812">
+<interface name="corenet_udp_receive_ircd_port" lineno="37830">
<summary>
Receive UDP traffic on the ircd port.
</summary>
@@ -33792,7 +33876,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37827">
+<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37845">
<summary>
Do not audit attempts to receive UDP traffic on the ircd port.
</summary>
@@ -33803,7 +33887,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ircd_port" lineno="37842">
+<interface name="corenet_udp_sendrecv_ircd_port" lineno="37860">
<summary>
Send and receive UDP traffic on the ircd port.
</summary>
@@ -33814,7 +33898,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37858">
+<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37876">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ircd port.
@@ -33826,7 +33910,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ircd_port" lineno="37873">
+<interface name="corenet_tcp_bind_ircd_port" lineno="37891">
<summary>
Bind TCP sockets to the ircd port.
</summary>
@@ -33837,7 +33921,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ircd_port" lineno="37893">
+<interface name="corenet_udp_bind_ircd_port" lineno="37911">
<summary>
Bind UDP sockets to the ircd port.
</summary>
@@ -33848,7 +33932,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ircd_port" lineno="37912">
+<interface name="corenet_tcp_connect_ircd_port" lineno="37930">
<summary>
Make a TCP connection to the ircd port.
</summary>
@@ -33858,7 +33942,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ircd_client_packets" lineno="37932">
+<interface name="corenet_send_ircd_client_packets" lineno="37950">
<summary>
Send ircd_client packets.
</summary>
@@ -33869,7 +33953,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37951">
+<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37969">
<summary>
Do not audit attempts to send ircd_client packets.
</summary>
@@ -33880,7 +33964,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ircd_client_packets" lineno="37970">
+<interface name="corenet_receive_ircd_client_packets" lineno="37988">
<summary>
Receive ircd_client packets.
</summary>
@@ -33891,7 +33975,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="37989">
+<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="38007">
<summary>
Do not audit attempts to receive ircd_client packets.
</summary>
@@ -33902,7 +33986,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ircd_client_packets" lineno="38008">
+<interface name="corenet_sendrecv_ircd_client_packets" lineno="38026">
<summary>
Send and receive ircd_client packets.
</summary>
@@ -33913,7 +33997,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="38024">
+<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="38042">
<summary>
Do not audit attempts to send and receive ircd_client packets.
</summary>
@@ -33924,7 +34008,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ircd_client_packets" lineno="38039">
+<interface name="corenet_relabelto_ircd_client_packets" lineno="38057">
<summary>
Relabel packets to ircd_client the packet type.
</summary>
@@ -33934,7 +34018,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ircd_server_packets" lineno="38059">
+<interface name="corenet_send_ircd_server_packets" lineno="38077">
<summary>
Send ircd_server packets.
</summary>
@@ -33945,7 +34029,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="38078">
+<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="38096">
<summary>
Do not audit attempts to send ircd_server packets.
</summary>
@@ -33956,7 +34040,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ircd_server_packets" lineno="38097">
+<interface name="corenet_receive_ircd_server_packets" lineno="38115">
<summary>
Receive ircd_server packets.
</summary>
@@ -33967,7 +34051,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="38116">
+<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="38134">
<summary>
Do not audit attempts to receive ircd_server packets.
</summary>
@@ -33978,7 +34062,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ircd_server_packets" lineno="38135">
+<interface name="corenet_sendrecv_ircd_server_packets" lineno="38153">
<summary>
Send and receive ircd_server packets.
</summary>
@@ -33989,7 +34073,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38151">
+<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38169">
<summary>
Do not audit attempts to send and receive ircd_server packets.
</summary>
@@ -34000,7 +34084,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ircd_server_packets" lineno="38166">
+<interface name="corenet_relabelto_ircd_server_packets" lineno="38184">
<summary>
Relabel packets to ircd_server the packet type.
</summary>
@@ -34010,7 +34094,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38188">
+<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38206">
<summary>
Send and receive TCP traffic on the isakmp port.
</summary>
@@ -34021,7 +34105,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_isakmp_port" lineno="38203">
+<interface name="corenet_udp_send_isakmp_port" lineno="38221">
<summary>
Send UDP traffic on the isakmp port.
</summary>
@@ -34032,7 +34116,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38218">
+<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38236">
<summary>
Do not audit attempts to send UDP traffic on the isakmp port.
</summary>
@@ -34043,7 +34127,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_isakmp_port" lineno="38233">
+<interface name="corenet_udp_receive_isakmp_port" lineno="38251">
<summary>
Receive UDP traffic on the isakmp port.
</summary>
@@ -34054,7 +34138,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38248">
+<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38266">
<summary>
Do not audit attempts to receive UDP traffic on the isakmp port.
</summary>
@@ -34065,7 +34149,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38263">
+<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38281">
<summary>
Send and receive UDP traffic on the isakmp port.
</summary>
@@ -34076,7 +34160,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38279">
+<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38297">
<summary>
Do not audit attempts to send and receive
UDP traffic on the isakmp port.
@@ -34088,7 +34172,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_isakmp_port" lineno="38294">
+<interface name="corenet_tcp_bind_isakmp_port" lineno="38312">
<summary>
Bind TCP sockets to the isakmp port.
</summary>
@@ -34099,7 +34183,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_isakmp_port" lineno="38314">
+<interface name="corenet_udp_bind_isakmp_port" lineno="38332">
<summary>
Bind UDP sockets to the isakmp port.
</summary>
@@ -34110,7 +34194,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_isakmp_port" lineno="38333">
+<interface name="corenet_tcp_connect_isakmp_port" lineno="38351">
<summary>
Make a TCP connection to the isakmp port.
</summary>
@@ -34120,7 +34204,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isakmp_client_packets" lineno="38353">
+<interface name="corenet_send_isakmp_client_packets" lineno="38371">
<summary>
Send isakmp_client packets.
</summary>
@@ -34131,7 +34215,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38372">
+<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38390">
<summary>
Do not audit attempts to send isakmp_client packets.
</summary>
@@ -34142,7 +34226,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isakmp_client_packets" lineno="38391">
+<interface name="corenet_receive_isakmp_client_packets" lineno="38409">
<summary>
Receive isakmp_client packets.
</summary>
@@ -34153,7 +34237,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38410">
+<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38428">
<summary>
Do not audit attempts to receive isakmp_client packets.
</summary>
@@ -34164,7 +34248,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38429">
+<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38447">
<summary>
Send and receive isakmp_client packets.
</summary>
@@ -34175,7 +34259,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38445">
+<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38463">
<summary>
Do not audit attempts to send and receive isakmp_client packets.
</summary>
@@ -34186,7 +34270,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isakmp_client_packets" lineno="38460">
+<interface name="corenet_relabelto_isakmp_client_packets" lineno="38478">
<summary>
Relabel packets to isakmp_client the packet type.
</summary>
@@ -34196,7 +34280,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isakmp_server_packets" lineno="38480">
+<interface name="corenet_send_isakmp_server_packets" lineno="38498">
<summary>
Send isakmp_server packets.
</summary>
@@ -34207,7 +34291,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38499">
+<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38517">
<summary>
Do not audit attempts to send isakmp_server packets.
</summary>
@@ -34218,7 +34302,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isakmp_server_packets" lineno="38518">
+<interface name="corenet_receive_isakmp_server_packets" lineno="38536">
<summary>
Receive isakmp_server packets.
</summary>
@@ -34229,7 +34313,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38537">
+<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38555">
<summary>
Do not audit attempts to receive isakmp_server packets.
</summary>
@@ -34240,7 +34324,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38556">
+<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38574">
<summary>
Send and receive isakmp_server packets.
</summary>
@@ -34251,7 +34335,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38572">
+<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38590">
<summary>
Do not audit attempts to send and receive isakmp_server packets.
</summary>
@@ -34262,7 +34346,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isakmp_server_packets" lineno="38587">
+<interface name="corenet_relabelto_isakmp_server_packets" lineno="38605">
<summary>
Relabel packets to isakmp_server the packet type.
</summary>
@@ -34272,7 +34356,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38609">
+<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38627">
<summary>
Send and receive TCP traffic on the iscsi port.
</summary>
@@ -34283,7 +34367,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_iscsi_port" lineno="38624">
+<interface name="corenet_udp_send_iscsi_port" lineno="38642">
<summary>
Send UDP traffic on the iscsi port.
</summary>
@@ -34294,7 +34378,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38639">
+<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38657">
<summary>
Do not audit attempts to send UDP traffic on the iscsi port.
</summary>
@@ -34305,7 +34389,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_iscsi_port" lineno="38654">
+<interface name="corenet_udp_receive_iscsi_port" lineno="38672">
<summary>
Receive UDP traffic on the iscsi port.
</summary>
@@ -34316,7 +34400,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38669">
+<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38687">
<summary>
Do not audit attempts to receive UDP traffic on the iscsi port.
</summary>
@@ -34327,7 +34411,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38684">
+<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38702">
<summary>
Send and receive UDP traffic on the iscsi port.
</summary>
@@ -34338,7 +34422,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38700">
+<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38718">
<summary>
Do not audit attempts to send and receive
UDP traffic on the iscsi port.
@@ -34350,7 +34434,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_iscsi_port" lineno="38715">
+<interface name="corenet_tcp_bind_iscsi_port" lineno="38733">
<summary>
Bind TCP sockets to the iscsi port.
</summary>
@@ -34361,7 +34445,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_iscsi_port" lineno="38735">
+<interface name="corenet_udp_bind_iscsi_port" lineno="38753">
<summary>
Bind UDP sockets to the iscsi port.
</summary>
@@ -34372,7 +34456,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_iscsi_port" lineno="38754">
+<interface name="corenet_tcp_connect_iscsi_port" lineno="38772">
<summary>
Make a TCP connection to the iscsi port.
</summary>
@@ -34382,7 +34466,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_iscsi_client_packets" lineno="38774">
+<interface name="corenet_send_iscsi_client_packets" lineno="38792">
<summary>
Send iscsi_client packets.
</summary>
@@ -34393,7 +34477,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38793">
+<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38811">
<summary>
Do not audit attempts to send iscsi_client packets.
</summary>
@@ -34404,7 +34488,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_iscsi_client_packets" lineno="38812">
+<interface name="corenet_receive_iscsi_client_packets" lineno="38830">
<summary>
Receive iscsi_client packets.
</summary>
@@ -34415,7 +34499,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38831">
+<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38849">
<summary>
Do not audit attempts to receive iscsi_client packets.
</summary>
@@ -34426,7 +34510,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38850">
+<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38868">
<summary>
Send and receive iscsi_client packets.
</summary>
@@ -34437,7 +34521,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38866">
+<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38884">
<summary>
Do not audit attempts to send and receive iscsi_client packets.
</summary>
@@ -34448,7 +34532,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_iscsi_client_packets" lineno="38881">
+<interface name="corenet_relabelto_iscsi_client_packets" lineno="38899">
<summary>
Relabel packets to iscsi_client the packet type.
</summary>
@@ -34458,7 +34542,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_iscsi_server_packets" lineno="38901">
+<interface name="corenet_send_iscsi_server_packets" lineno="38919">
<summary>
Send iscsi_server packets.
</summary>
@@ -34469,7 +34553,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38920">
+<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38938">
<summary>
Do not audit attempts to send iscsi_server packets.
</summary>
@@ -34480,7 +34564,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_iscsi_server_packets" lineno="38939">
+<interface name="corenet_receive_iscsi_server_packets" lineno="38957">
<summary>
Receive iscsi_server packets.
</summary>
@@ -34491,7 +34575,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38958">
+<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38976">
<summary>
Do not audit attempts to receive iscsi_server packets.
</summary>
@@ -34502,7 +34586,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38977">
+<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38995">
<summary>
Send and receive iscsi_server packets.
</summary>
@@ -34513,7 +34597,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="38993">
+<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="39011">
<summary>
Do not audit attempts to send and receive iscsi_server packets.
</summary>
@@ -34524,7 +34608,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_iscsi_server_packets" lineno="39008">
+<interface name="corenet_relabelto_iscsi_server_packets" lineno="39026">
<summary>
Relabel packets to iscsi_server the packet type.
</summary>
@@ -34534,7 +34618,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_isns_port" lineno="39030">
+<interface name="corenet_tcp_sendrecv_isns_port" lineno="39048">
<summary>
Send and receive TCP traffic on the isns port.
</summary>
@@ -34545,7 +34629,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_isns_port" lineno="39045">
+<interface name="corenet_udp_send_isns_port" lineno="39063">
<summary>
Send UDP traffic on the isns port.
</summary>
@@ -34556,7 +34640,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_isns_port" lineno="39060">
+<interface name="corenet_dontaudit_udp_send_isns_port" lineno="39078">
<summary>
Do not audit attempts to send UDP traffic on the isns port.
</summary>
@@ -34567,7 +34651,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_isns_port" lineno="39075">
+<interface name="corenet_udp_receive_isns_port" lineno="39093">
<summary>
Receive UDP traffic on the isns port.
</summary>
@@ -34578,7 +34662,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="39090">
+<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="39108">
<summary>
Do not audit attempts to receive UDP traffic on the isns port.
</summary>
@@ -34589,7 +34673,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_isns_port" lineno="39105">
+<interface name="corenet_udp_sendrecv_isns_port" lineno="39123">
<summary>
Send and receive UDP traffic on the isns port.
</summary>
@@ -34600,7 +34684,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="39121">
+<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="39139">
<summary>
Do not audit attempts to send and receive
UDP traffic on the isns port.
@@ -34612,7 +34696,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_isns_port" lineno="39136">
+<interface name="corenet_tcp_bind_isns_port" lineno="39154">
<summary>
Bind TCP sockets to the isns port.
</summary>
@@ -34623,7 +34707,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_isns_port" lineno="39156">
+<interface name="corenet_udp_bind_isns_port" lineno="39174">
<summary>
Bind UDP sockets to the isns port.
</summary>
@@ -34634,7 +34718,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_isns_port" lineno="39175">
+<interface name="corenet_tcp_connect_isns_port" lineno="39193">
<summary>
Make a TCP connection to the isns port.
</summary>
@@ -34644,7 +34728,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isns_client_packets" lineno="39195">
+<interface name="corenet_send_isns_client_packets" lineno="39213">
<summary>
Send isns_client packets.
</summary>
@@ -34655,7 +34739,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39214">
+<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39232">
<summary>
Do not audit attempts to send isns_client packets.
</summary>
@@ -34666,7 +34750,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isns_client_packets" lineno="39233">
+<interface name="corenet_receive_isns_client_packets" lineno="39251">
<summary>
Receive isns_client packets.
</summary>
@@ -34677,7 +34761,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39252">
+<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39270">
<summary>
Do not audit attempts to receive isns_client packets.
</summary>
@@ -34688,7 +34772,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isns_client_packets" lineno="39271">
+<interface name="corenet_sendrecv_isns_client_packets" lineno="39289">
<summary>
Send and receive isns_client packets.
</summary>
@@ -34699,7 +34783,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39287">
+<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39305">
<summary>
Do not audit attempts to send and receive isns_client packets.
</summary>
@@ -34710,7 +34794,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isns_client_packets" lineno="39302">
+<interface name="corenet_relabelto_isns_client_packets" lineno="39320">
<summary>
Relabel packets to isns_client the packet type.
</summary>
@@ -34720,7 +34804,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isns_server_packets" lineno="39322">
+<interface name="corenet_send_isns_server_packets" lineno="39340">
<summary>
Send isns_server packets.
</summary>
@@ -34731,7 +34815,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39341">
+<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39359">
<summary>
Do not audit attempts to send isns_server packets.
</summary>
@@ -34742,7 +34826,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isns_server_packets" lineno="39360">
+<interface name="corenet_receive_isns_server_packets" lineno="39378">
<summary>
Receive isns_server packets.
</summary>
@@ -34753,7 +34837,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39379">
+<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39397">
<summary>
Do not audit attempts to receive isns_server packets.
</summary>
@@ -34764,7 +34848,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isns_server_packets" lineno="39398">
+<interface name="corenet_sendrecv_isns_server_packets" lineno="39416">
<summary>
Send and receive isns_server packets.
</summary>
@@ -34775,7 +34859,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39414">
+<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39432">
<summary>
Do not audit attempts to send and receive isns_server packets.
</summary>
@@ -34786,7 +34870,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isns_server_packets" lineno="39429">
+<interface name="corenet_relabelto_isns_server_packets" lineno="39447">
<summary>
Relabel packets to isns_server the packet type.
</summary>
@@ -34796,7 +34880,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39451">
+<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39469">
<summary>
Send and receive TCP traffic on the jabber_client port.
</summary>
@@ -34807,7 +34891,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_jabber_client_port" lineno="39466">
+<interface name="corenet_udp_send_jabber_client_port" lineno="39484">
<summary>
Send UDP traffic on the jabber_client port.
</summary>
@@ -34818,7 +34902,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39481">
+<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39499">
<summary>
Do not audit attempts to send UDP traffic on the jabber_client port.
</summary>
@@ -34829,7 +34913,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_jabber_client_port" lineno="39496">
+<interface name="corenet_udp_receive_jabber_client_port" lineno="39514">
<summary>
Receive UDP traffic on the jabber_client port.
</summary>
@@ -34840,7 +34924,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39511">
+<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39529">
<summary>
Do not audit attempts to receive UDP traffic on the jabber_client port.
</summary>
@@ -34851,7 +34935,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39526">
+<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39544">
<summary>
Send and receive UDP traffic on the jabber_client port.
</summary>
@@ -34862,7 +34946,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39542">
+<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39560">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jabber_client port.
@@ -34874,7 +34958,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_jabber_client_port" lineno="39557">
+<interface name="corenet_tcp_bind_jabber_client_port" lineno="39575">
<summary>
Bind TCP sockets to the jabber_client port.
</summary>
@@ -34885,7 +34969,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_jabber_client_port" lineno="39577">
+<interface name="corenet_udp_bind_jabber_client_port" lineno="39595">
<summary>
Bind UDP sockets to the jabber_client port.
</summary>
@@ -34896,7 +34980,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_jabber_client_port" lineno="39596">
+<interface name="corenet_tcp_connect_jabber_client_port" lineno="39614">
<summary>
Make a TCP connection to the jabber_client port.
</summary>
@@ -34906,7 +34990,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_client_client_packets" lineno="39616">
+<interface name="corenet_send_jabber_client_client_packets" lineno="39634">
<summary>
Send jabber_client_client packets.
</summary>
@@ -34917,7 +35001,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39635">
+<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39653">
<summary>
Do not audit attempts to send jabber_client_client packets.
</summary>
@@ -34928,7 +35012,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_client_client_packets" lineno="39654">
+<interface name="corenet_receive_jabber_client_client_packets" lineno="39672">
<summary>
Receive jabber_client_client packets.
</summary>
@@ -34939,7 +35023,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39673">
+<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39691">
<summary>
Do not audit attempts to receive jabber_client_client packets.
</summary>
@@ -34950,7 +35034,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39692">
+<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39710">
<summary>
Send and receive jabber_client_client packets.
</summary>
@@ -34961,7 +35045,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39708">
+<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39726">
<summary>
Do not audit attempts to send and receive jabber_client_client packets.
</summary>
@@ -34972,7 +35056,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39723">
+<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39741">
<summary>
Relabel packets to jabber_client_client the packet type.
</summary>
@@ -34982,7 +35066,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_client_server_packets" lineno="39743">
+<interface name="corenet_send_jabber_client_server_packets" lineno="39761">
<summary>
Send jabber_client_server packets.
</summary>
@@ -34993,7 +35077,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39762">
+<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39780">
<summary>
Do not audit attempts to send jabber_client_server packets.
</summary>
@@ -35004,7 +35088,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_client_server_packets" lineno="39781">
+<interface name="corenet_receive_jabber_client_server_packets" lineno="39799">
<summary>
Receive jabber_client_server packets.
</summary>
@@ -35015,7 +35099,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39800">
+<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39818">
<summary>
Do not audit attempts to receive jabber_client_server packets.
</summary>
@@ -35026,7 +35110,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39819">
+<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39837">
<summary>
Send and receive jabber_client_server packets.
</summary>
@@ -35037,7 +35121,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39835">
+<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39853">
<summary>
Do not audit attempts to send and receive jabber_client_server packets.
</summary>
@@ -35048,7 +35132,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39850">
+<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39868">
<summary>
Relabel packets to jabber_client_server the packet type.
</summary>
@@ -35058,7 +35142,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39872">
+<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39890">
<summary>
Send and receive TCP traffic on the jabber_interserver port.
</summary>
@@ -35069,7 +35153,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_jabber_interserver_port" lineno="39887">
+<interface name="corenet_udp_send_jabber_interserver_port" lineno="39905">
<summary>
Send UDP traffic on the jabber_interserver port.
</summary>
@@ -35080,7 +35164,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39902">
+<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39920">
<summary>
Do not audit attempts to send UDP traffic on the jabber_interserver port.
</summary>
@@ -35091,7 +35175,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39917">
+<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39935">
<summary>
Receive UDP traffic on the jabber_interserver port.
</summary>
@@ -35102,7 +35186,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39932">
+<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39950">
<summary>
Do not audit attempts to receive UDP traffic on the jabber_interserver port.
</summary>
@@ -35113,7 +35197,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39947">
+<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39965">
<summary>
Send and receive UDP traffic on the jabber_interserver port.
</summary>
@@ -35124,7 +35208,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39963">
+<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39981">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jabber_interserver port.
@@ -35136,7 +35220,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39978">
+<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39996">
<summary>
Bind TCP sockets to the jabber_interserver port.
</summary>
@@ -35147,7 +35231,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_jabber_interserver_port" lineno="39998">
+<interface name="corenet_udp_bind_jabber_interserver_port" lineno="40016">
<summary>
Bind UDP sockets to the jabber_interserver port.
</summary>
@@ -35158,7 +35242,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="40017">
+<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="40035">
<summary>
Make a TCP connection to the jabber_interserver port.
</summary>
@@ -35168,7 +35252,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_interserver_client_packets" lineno="40037">
+<interface name="corenet_send_jabber_interserver_client_packets" lineno="40055">
<summary>
Send jabber_interserver_client packets.
</summary>
@@ -35179,7 +35263,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="40056">
+<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="40074">
<summary>
Do not audit attempts to send jabber_interserver_client packets.
</summary>
@@ -35190,7 +35274,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_interserver_client_packets" lineno="40075">
+<interface name="corenet_receive_jabber_interserver_client_packets" lineno="40093">
<summary>
Receive jabber_interserver_client packets.
</summary>
@@ -35201,7 +35285,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="40094">
+<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="40112">
<summary>
Do not audit attempts to receive jabber_interserver_client packets.
</summary>
@@ -35212,7 +35296,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="40113">
+<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="40131">
<summary>
Send and receive jabber_interserver_client packets.
</summary>
@@ -35223,7 +35307,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40129">
+<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40147">
<summary>
Do not audit attempts to send and receive jabber_interserver_client packets.
</summary>
@@ -35234,7 +35318,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40144">
+<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40162">
<summary>
Relabel packets to jabber_interserver_client the packet type.
</summary>
@@ -35244,7 +35328,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_interserver_server_packets" lineno="40164">
+<interface name="corenet_send_jabber_interserver_server_packets" lineno="40182">
<summary>
Send jabber_interserver_server packets.
</summary>
@@ -35255,7 +35339,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40183">
+<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40201">
<summary>
Do not audit attempts to send jabber_interserver_server packets.
</summary>
@@ -35266,7 +35350,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40202">
+<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40220">
<summary>
Receive jabber_interserver_server packets.
</summary>
@@ -35277,7 +35361,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40221">
+<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40239">
<summary>
Do not audit attempts to receive jabber_interserver_server packets.
</summary>
@@ -35288,7 +35372,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40240">
+<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40258">
<summary>
Send and receive jabber_interserver_server packets.
</summary>
@@ -35299,7 +35383,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40256">
+<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40274">
<summary>
Do not audit attempts to send and receive jabber_interserver_server packets.
</summary>
@@ -35310,7 +35394,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40271">
+<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40289">
<summary>
Relabel packets to jabber_interserver_server the packet type.
</summary>
@@ -35320,7 +35404,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40293">
+<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40311">
<summary>
Send and receive TCP traffic on the jboss_iiop port.
</summary>
@@ -35331,7 +35415,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_jboss_iiop_port" lineno="40308">
+<interface name="corenet_udp_send_jboss_iiop_port" lineno="40326">
<summary>
Send UDP traffic on the jboss_iiop port.
</summary>
@@ -35342,7 +35426,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40323">
+<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40341">
<summary>
Do not audit attempts to send UDP traffic on the jboss_iiop port.
</summary>
@@ -35353,7 +35437,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40338">
+<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40356">
<summary>
Receive UDP traffic on the jboss_iiop port.
</summary>
@@ -35364,7 +35448,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40353">
+<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40371">
<summary>
Do not audit attempts to receive UDP traffic on the jboss_iiop port.
</summary>
@@ -35375,7 +35459,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40368">
+<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40386">
<summary>
Send and receive UDP traffic on the jboss_iiop port.
</summary>
@@ -35386,7 +35470,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40384">
+<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40402">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jboss_iiop port.
@@ -35398,7 +35482,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40399">
+<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40417">
<summary>
Bind TCP sockets to the jboss_iiop port.
</summary>
@@ -35409,7 +35493,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40419">
+<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40437">
<summary>
Bind UDP sockets to the jboss_iiop port.
</summary>
@@ -35420,7 +35504,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40438">
+<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40456">
<summary>
Make a TCP connection to the jboss_iiop port.
</summary>
@@ -35430,7 +35514,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jboss_iiop_client_packets" lineno="40458">
+<interface name="corenet_send_jboss_iiop_client_packets" lineno="40476">
<summary>
Send jboss_iiop_client packets.
</summary>
@@ -35441,7 +35525,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40477">
+<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40495">
<summary>
Do not audit attempts to send jboss_iiop_client packets.
</summary>
@@ -35452,7 +35536,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40496">
+<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40514">
<summary>
Receive jboss_iiop_client packets.
</summary>
@@ -35463,7 +35547,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40515">
+<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40533">
<summary>
Do not audit attempts to receive jboss_iiop_client packets.
</summary>
@@ -35474,7 +35558,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40534">
+<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40552">
<summary>
Send and receive jboss_iiop_client packets.
</summary>
@@ -35485,7 +35569,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40550">
+<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40568">
<summary>
Do not audit attempts to send and receive jboss_iiop_client packets.
</summary>
@@ -35496,7 +35580,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40565">
+<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40583">
<summary>
Relabel packets to jboss_iiop_client the packet type.
</summary>
@@ -35506,7 +35590,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jboss_iiop_server_packets" lineno="40585">
+<interface name="corenet_send_jboss_iiop_server_packets" lineno="40603">
<summary>
Send jboss_iiop_server packets.
</summary>
@@ -35517,7 +35601,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40604">
+<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40622">
<summary>
Do not audit attempts to send jboss_iiop_server packets.
</summary>
@@ -35528,7 +35612,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40623">
+<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40641">
<summary>
Receive jboss_iiop_server packets.
</summary>
@@ -35539,7 +35623,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40642">
+<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40660">
<summary>
Do not audit attempts to receive jboss_iiop_server packets.
</summary>
@@ -35550,7 +35634,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40661">
+<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40679">
<summary>
Send and receive jboss_iiop_server packets.
</summary>
@@ -35561,7 +35645,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40677">
+<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40695">
<summary>
Do not audit attempts to send and receive jboss_iiop_server packets.
</summary>
@@ -35572,7 +35656,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40692">
+<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40710">
<summary>
Relabel packets to jboss_iiop_server the packet type.
</summary>
@@ -35582,7 +35666,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40714">
+<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40732">
<summary>
Send and receive TCP traffic on the kerberos port.
</summary>
@@ -35593,7 +35677,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kerberos_port" lineno="40729">
+<interface name="corenet_udp_send_kerberos_port" lineno="40747">
<summary>
Send UDP traffic on the kerberos port.
</summary>
@@ -35604,7 +35688,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40744">
+<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40762">
<summary>
Do not audit attempts to send UDP traffic on the kerberos port.
</summary>
@@ -35615,7 +35699,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kerberos_port" lineno="40759">
+<interface name="corenet_udp_receive_kerberos_port" lineno="40777">
<summary>
Receive UDP traffic on the kerberos port.
</summary>
@@ -35626,7 +35710,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40774">
+<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40792">
<summary>
Do not audit attempts to receive UDP traffic on the kerberos port.
</summary>
@@ -35637,7 +35721,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40789">
+<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40807">
<summary>
Send and receive UDP traffic on the kerberos port.
</summary>
@@ -35648,7 +35732,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40805">
+<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40823">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kerberos port.
@@ -35660,7 +35744,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kerberos_port" lineno="40820">
+<interface name="corenet_tcp_bind_kerberos_port" lineno="40838">
<summary>
Bind TCP sockets to the kerberos port.
</summary>
@@ -35671,7 +35755,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kerberos_port" lineno="40840">
+<interface name="corenet_udp_bind_kerberos_port" lineno="40858">
<summary>
Bind UDP sockets to the kerberos port.
</summary>
@@ -35682,7 +35766,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kerberos_port" lineno="40859">
+<interface name="corenet_tcp_connect_kerberos_port" lineno="40877">
<summary>
Make a TCP connection to the kerberos port.
</summary>
@@ -35692,7 +35776,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_client_packets" lineno="40879">
+<interface name="corenet_send_kerberos_client_packets" lineno="40897">
<summary>
Send kerberos_client packets.
</summary>
@@ -35703,7 +35787,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40898">
+<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40916">
<summary>
Do not audit attempts to send kerberos_client packets.
</summary>
@@ -35714,7 +35798,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_client_packets" lineno="40917">
+<interface name="corenet_receive_kerberos_client_packets" lineno="40935">
<summary>
Receive kerberos_client packets.
</summary>
@@ -35725,7 +35809,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40936">
+<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40954">
<summary>
Do not audit attempts to receive kerberos_client packets.
</summary>
@@ -35736,7 +35820,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40955">
+<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40973">
<summary>
Send and receive kerberos_client packets.
</summary>
@@ -35747,7 +35831,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40971">
+<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40989">
<summary>
Do not audit attempts to send and receive kerberos_client packets.
</summary>
@@ -35758,7 +35842,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_client_packets" lineno="40986">
+<interface name="corenet_relabelto_kerberos_client_packets" lineno="41004">
<summary>
Relabel packets to kerberos_client the packet type.
</summary>
@@ -35768,7 +35852,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_server_packets" lineno="41006">
+<interface name="corenet_send_kerberos_server_packets" lineno="41024">
<summary>
Send kerberos_server packets.
</summary>
@@ -35779,7 +35863,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="41025">
+<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="41043">
<summary>
Do not audit attempts to send kerberos_server packets.
</summary>
@@ -35790,7 +35874,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_server_packets" lineno="41044">
+<interface name="corenet_receive_kerberos_server_packets" lineno="41062">
<summary>
Receive kerberos_server packets.
</summary>
@@ -35801,7 +35885,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="41063">
+<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="41081">
<summary>
Do not audit attempts to receive kerberos_server packets.
</summary>
@@ -35812,7 +35896,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_server_packets" lineno="41082">
+<interface name="corenet_sendrecv_kerberos_server_packets" lineno="41100">
<summary>
Send and receive kerberos_server packets.
</summary>
@@ -35823,7 +35907,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="41098">
+<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="41116">
<summary>
Do not audit attempts to send and receive kerberos_server packets.
</summary>
@@ -35834,7 +35918,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_server_packets" lineno="41113">
+<interface name="corenet_relabelto_kerberos_server_packets" lineno="41131">
<summary>
Relabel packets to kerberos_server the packet type.
</summary>
@@ -35844,7 +35928,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41135">
+<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41153">
<summary>
Send and receive TCP traffic on the kerberos_admin port.
</summary>
@@ -35855,7 +35939,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kerberos_admin_port" lineno="41150">
+<interface name="corenet_udp_send_kerberos_admin_port" lineno="41168">
<summary>
Send UDP traffic on the kerberos_admin port.
</summary>
@@ -35866,7 +35950,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41165">
+<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41183">
<summary>
Do not audit attempts to send UDP traffic on the kerberos_admin port.
</summary>
@@ -35877,7 +35961,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41180">
+<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41198">
<summary>
Receive UDP traffic on the kerberos_admin port.
</summary>
@@ -35888,7 +35972,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41195">
+<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41213">
<summary>
Do not audit attempts to receive UDP traffic on the kerberos_admin port.
</summary>
@@ -35899,7 +35983,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41210">
+<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41228">
<summary>
Send and receive UDP traffic on the kerberos_admin port.
</summary>
@@ -35910,7 +35994,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41226">
+<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41244">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kerberos_admin port.
@@ -35922,7 +36006,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41241">
+<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41259">
<summary>
Bind TCP sockets to the kerberos_admin port.
</summary>
@@ -35933,7 +36017,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41261">
+<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41279">
<summary>
Bind UDP sockets to the kerberos_admin port.
</summary>
@@ -35944,7 +36028,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41280">
+<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41298">
<summary>
Make a TCP connection to the kerberos_admin port.
</summary>
@@ -35954,7 +36038,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_admin_client_packets" lineno="41300">
+<interface name="corenet_send_kerberos_admin_client_packets" lineno="41318">
<summary>
Send kerberos_admin_client packets.
</summary>
@@ -35965,7 +36049,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41319">
+<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41337">
<summary>
Do not audit attempts to send kerberos_admin_client packets.
</summary>
@@ -35976,7 +36060,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41338">
+<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41356">
<summary>
Receive kerberos_admin_client packets.
</summary>
@@ -35987,7 +36071,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41357">
+<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41375">
<summary>
Do not audit attempts to receive kerberos_admin_client packets.
</summary>
@@ -35998,7 +36082,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41376">
+<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41394">
<summary>
Send and receive kerberos_admin_client packets.
</summary>
@@ -36009,7 +36093,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41392">
+<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41410">
<summary>
Do not audit attempts to send and receive kerberos_admin_client packets.
</summary>
@@ -36020,7 +36104,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41407">
+<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41425">
<summary>
Relabel packets to kerberos_admin_client the packet type.
</summary>
@@ -36030,7 +36114,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_admin_server_packets" lineno="41427">
+<interface name="corenet_send_kerberos_admin_server_packets" lineno="41445">
<summary>
Send kerberos_admin_server packets.
</summary>
@@ -36041,7 +36125,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41446">
+<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41464">
<summary>
Do not audit attempts to send kerberos_admin_server packets.
</summary>
@@ -36052,7 +36136,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41465">
+<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41483">
<summary>
Receive kerberos_admin_server packets.
</summary>
@@ -36063,7 +36147,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41484">
+<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41502">
<summary>
Do not audit attempts to receive kerberos_admin_server packets.
</summary>
@@ -36074,7 +36158,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41503">
+<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41521">
<summary>
Send and receive kerberos_admin_server packets.
</summary>
@@ -36085,7 +36169,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41519">
+<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41537">
<summary>
Do not audit attempts to send and receive kerberos_admin_server packets.
</summary>
@@ -36096,7 +36180,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41534">
+<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41552">
<summary>
Relabel packets to kerberos_admin_server the packet type.
</summary>
@@ -36106,7 +36190,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41556">
+<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41574">
<summary>
Send and receive TCP traffic on the kerberos_master port.
</summary>
@@ -36117,7 +36201,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kerberos_master_port" lineno="41571">
+<interface name="corenet_udp_send_kerberos_master_port" lineno="41589">
<summary>
Send UDP traffic on the kerberos_master port.
</summary>
@@ -36128,7 +36212,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41586">
+<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41604">
<summary>
Do not audit attempts to send UDP traffic on the kerberos_master port.
</summary>
@@ -36139,7 +36223,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kerberos_master_port" lineno="41601">
+<interface name="corenet_udp_receive_kerberos_master_port" lineno="41619">
<summary>
Receive UDP traffic on the kerberos_master port.
</summary>
@@ -36150,7 +36234,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41616">
+<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41634">
<summary>
Do not audit attempts to receive UDP traffic on the kerberos_master port.
</summary>
@@ -36161,7 +36245,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41631">
+<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41649">
<summary>
Send and receive UDP traffic on the kerberos_master port.
</summary>
@@ -36172,7 +36256,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41647">
+<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41665">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kerberos_master port.
@@ -36184,7 +36268,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41662">
+<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41680">
<summary>
Bind TCP sockets to the kerberos_master port.
</summary>
@@ -36195,7 +36279,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kerberos_master_port" lineno="41682">
+<interface name="corenet_udp_bind_kerberos_master_port" lineno="41700">
<summary>
Bind UDP sockets to the kerberos_master port.
</summary>
@@ -36206,7 +36290,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41701">
+<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41719">
<summary>
Make a TCP connection to the kerberos_master port.
</summary>
@@ -36216,7 +36300,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_master_client_packets" lineno="41721">
+<interface name="corenet_send_kerberos_master_client_packets" lineno="41739">
<summary>
Send kerberos_master_client packets.
</summary>
@@ -36227,7 +36311,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41740">
+<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41758">
<summary>
Do not audit attempts to send kerberos_master_client packets.
</summary>
@@ -36238,7 +36322,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_master_client_packets" lineno="41759">
+<interface name="corenet_receive_kerberos_master_client_packets" lineno="41777">
<summary>
Receive kerberos_master_client packets.
</summary>
@@ -36249,7 +36333,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41778">
+<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41796">
<summary>
Do not audit attempts to receive kerberos_master_client packets.
</summary>
@@ -36260,7 +36344,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41797">
+<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41815">
<summary>
Send and receive kerberos_master_client packets.
</summary>
@@ -36271,7 +36355,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41813">
+<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41831">
<summary>
Do not audit attempts to send and receive kerberos_master_client packets.
</summary>
@@ -36282,7 +36366,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41828">
+<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41846">
<summary>
Relabel packets to kerberos_master_client the packet type.
</summary>
@@ -36292,7 +36376,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_master_server_packets" lineno="41848">
+<interface name="corenet_send_kerberos_master_server_packets" lineno="41866">
<summary>
Send kerberos_master_server packets.
</summary>
@@ -36303,7 +36387,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41867">
+<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41885">
<summary>
Do not audit attempts to send kerberos_master_server packets.
</summary>
@@ -36314,7 +36398,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_master_server_packets" lineno="41886">
+<interface name="corenet_receive_kerberos_master_server_packets" lineno="41904">
<summary>
Receive kerberos_master_server packets.
</summary>
@@ -36325,7 +36409,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41905">
+<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41923">
<summary>
Do not audit attempts to receive kerberos_master_server packets.
</summary>
@@ -36336,7 +36420,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41924">
+<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41942">
<summary>
Send and receive kerberos_master_server packets.
</summary>
@@ -36347,7 +36431,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41940">
+<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41958">
<summary>
Do not audit attempts to send and receive kerberos_master_server packets.
</summary>
@@ -36358,7 +36442,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41955">
+<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41973">
<summary>
Relabel packets to kerberos_master_server the packet type.
</summary>
@@ -36368,7 +36452,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41977">
+<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41995">
<summary>
Send and receive TCP traffic on the kismet port.
</summary>
@@ -36379,7 +36463,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kismet_port" lineno="41992">
+<interface name="corenet_udp_send_kismet_port" lineno="42010">
<summary>
Send UDP traffic on the kismet port.
</summary>
@@ -36390,7 +36474,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="42007">
+<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="42025">
<summary>
Do not audit attempts to send UDP traffic on the kismet port.
</summary>
@@ -36401,7 +36485,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kismet_port" lineno="42022">
+<interface name="corenet_udp_receive_kismet_port" lineno="42040">
<summary>
Receive UDP traffic on the kismet port.
</summary>
@@ -36412,7 +36496,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="42037">
+<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="42055">
<summary>
Do not audit attempts to receive UDP traffic on the kismet port.
</summary>
@@ -36423,7 +36507,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kismet_port" lineno="42052">
+<interface name="corenet_udp_sendrecv_kismet_port" lineno="42070">
<summary>
Send and receive UDP traffic on the kismet port.
</summary>
@@ -36434,7 +36518,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="42068">
+<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="42086">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kismet port.
@@ -36446,7 +36530,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kismet_port" lineno="42083">
+<interface name="corenet_tcp_bind_kismet_port" lineno="42101">
<summary>
Bind TCP sockets to the kismet port.
</summary>
@@ -36457,7 +36541,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kismet_port" lineno="42103">
+<interface name="corenet_udp_bind_kismet_port" lineno="42121">
<summary>
Bind UDP sockets to the kismet port.
</summary>
@@ -36468,7 +36552,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kismet_port" lineno="42122">
+<interface name="corenet_tcp_connect_kismet_port" lineno="42140">
<summary>
Make a TCP connection to the kismet port.
</summary>
@@ -36478,7 +36562,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kismet_client_packets" lineno="42142">
+<interface name="corenet_send_kismet_client_packets" lineno="42160">
<summary>
Send kismet_client packets.
</summary>
@@ -36489,7 +36573,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42161">
+<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42179">
<summary>
Do not audit attempts to send kismet_client packets.
</summary>
@@ -36500,7 +36584,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kismet_client_packets" lineno="42180">
+<interface name="corenet_receive_kismet_client_packets" lineno="42198">
<summary>
Receive kismet_client packets.
</summary>
@@ -36511,7 +36595,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42199">
+<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42217">
<summary>
Do not audit attempts to receive kismet_client packets.
</summary>
@@ -36522,7 +36606,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kismet_client_packets" lineno="42218">
+<interface name="corenet_sendrecv_kismet_client_packets" lineno="42236">
<summary>
Send and receive kismet_client packets.
</summary>
@@ -36533,7 +36617,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42234">
+<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42252">
<summary>
Do not audit attempts to send and receive kismet_client packets.
</summary>
@@ -36544,7 +36628,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kismet_client_packets" lineno="42249">
+<interface name="corenet_relabelto_kismet_client_packets" lineno="42267">
<summary>
Relabel packets to kismet_client the packet type.
</summary>
@@ -36554,7 +36638,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kismet_server_packets" lineno="42269">
+<interface name="corenet_send_kismet_server_packets" lineno="42287">
<summary>
Send kismet_server packets.
</summary>
@@ -36565,7 +36649,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42288">
+<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42306">
<summary>
Do not audit attempts to send kismet_server packets.
</summary>
@@ -36576,7 +36660,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kismet_server_packets" lineno="42307">
+<interface name="corenet_receive_kismet_server_packets" lineno="42325">
<summary>
Receive kismet_server packets.
</summary>
@@ -36587,7 +36671,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42326">
+<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42344">
<summary>
Do not audit attempts to receive kismet_server packets.
</summary>
@@ -36598,7 +36682,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kismet_server_packets" lineno="42345">
+<interface name="corenet_sendrecv_kismet_server_packets" lineno="42363">
<summary>
Send and receive kismet_server packets.
</summary>
@@ -36609,7 +36693,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42361">
+<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42379">
<summary>
Do not audit attempts to send and receive kismet_server packets.
</summary>
@@ -36620,7 +36704,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kismet_server_packets" lineno="42376">
+<interface name="corenet_relabelto_kismet_server_packets" lineno="42394">
<summary>
Relabel packets to kismet_server the packet type.
</summary>
@@ -36630,7 +36714,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42398">
+<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42416">
<summary>
Send and receive TCP traffic on the kdeconnect port.
</summary>
@@ -36641,7 +36725,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kdeconnect_port" lineno="42413">
+<interface name="corenet_udp_send_kdeconnect_port" lineno="42431">
<summary>
Send UDP traffic on the kdeconnect port.
</summary>
@@ -36652,7 +36736,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42428">
+<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42446">
<summary>
Do not audit attempts to send UDP traffic on the kdeconnect port.
</summary>
@@ -36663,7 +36747,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kdeconnect_port" lineno="42443">
+<interface name="corenet_udp_receive_kdeconnect_port" lineno="42461">
<summary>
Receive UDP traffic on the kdeconnect port.
</summary>
@@ -36674,7 +36758,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42458">
+<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42476">
<summary>
Do not audit attempts to receive UDP traffic on the kdeconnect port.
</summary>
@@ -36685,7 +36769,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42473">
+<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42491">
<summary>
Send and receive UDP traffic on the kdeconnect port.
</summary>
@@ -36696,7 +36780,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42489">
+<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42507">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kdeconnect port.
@@ -36708,7 +36792,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42504">
+<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42522">
<summary>
Bind TCP sockets to the kdeconnect port.
</summary>
@@ -36719,7 +36803,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kdeconnect_port" lineno="42524">
+<interface name="corenet_udp_bind_kdeconnect_port" lineno="42542">
<summary>
Bind UDP sockets to the kdeconnect port.
</summary>
@@ -36730,7 +36814,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42543">
+<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42561">
<summary>
Make a TCP connection to the kdeconnect port.
</summary>
@@ -36740,7 +36824,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kdeconnect_client_packets" lineno="42563">
+<interface name="corenet_send_kdeconnect_client_packets" lineno="42581">
<summary>
Send kdeconnect_client packets.
</summary>
@@ -36751,7 +36835,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42582">
+<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42600">
<summary>
Do not audit attempts to send kdeconnect_client packets.
</summary>
@@ -36762,7 +36846,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kdeconnect_client_packets" lineno="42601">
+<interface name="corenet_receive_kdeconnect_client_packets" lineno="42619">
<summary>
Receive kdeconnect_client packets.
</summary>
@@ -36773,7 +36857,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42620">
+<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42638">
<summary>
Do not audit attempts to receive kdeconnect_client packets.
</summary>
@@ -36784,7 +36868,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42639">
+<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42657">
<summary>
Send and receive kdeconnect_client packets.
</summary>
@@ -36795,7 +36879,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42655">
+<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42673">
<summary>
Do not audit attempts to send and receive kdeconnect_client packets.
</summary>
@@ -36806,7 +36890,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42670">
+<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42688">
<summary>
Relabel packets to kdeconnect_client the packet type.
</summary>
@@ -36816,7 +36900,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kdeconnect_server_packets" lineno="42690">
+<interface name="corenet_send_kdeconnect_server_packets" lineno="42708">
<summary>
Send kdeconnect_server packets.
</summary>
@@ -36827,7 +36911,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42709">
+<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42727">
<summary>
Do not audit attempts to send kdeconnect_server packets.
</summary>
@@ -36838,7 +36922,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kdeconnect_server_packets" lineno="42728">
+<interface name="corenet_receive_kdeconnect_server_packets" lineno="42746">
<summary>
Receive kdeconnect_server packets.
</summary>
@@ -36849,7 +36933,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42747">
+<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42765">
<summary>
Do not audit attempts to receive kdeconnect_server packets.
</summary>
@@ -36860,7 +36944,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42766">
+<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42784">
<summary>
Send and receive kdeconnect_server packets.
</summary>
@@ -36871,7 +36955,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42782">
+<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42800">
<summary>
Do not audit attempts to send and receive kdeconnect_server packets.
</summary>
@@ -36882,7 +36966,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42797">
+<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42815">
<summary>
Relabel packets to kdeconnect_server the packet type.
</summary>
@@ -36892,7 +36976,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42819">
+<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42837">
<summary>
Send and receive TCP traffic on the kprop port.
</summary>
@@ -36903,7 +36987,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kprop_port" lineno="42834">
+<interface name="corenet_udp_send_kprop_port" lineno="42852">
<summary>
Send UDP traffic on the kprop port.
</summary>
@@ -36914,7 +36998,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42849">
+<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42867">
<summary>
Do not audit attempts to send UDP traffic on the kprop port.
</summary>
@@ -36925,7 +37009,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kprop_port" lineno="42864">
+<interface name="corenet_udp_receive_kprop_port" lineno="42882">
<summary>
Receive UDP traffic on the kprop port.
</summary>
@@ -36936,7 +37020,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42879">
+<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42897">
<summary>
Do not audit attempts to receive UDP traffic on the kprop port.
</summary>
@@ -36947,7 +37031,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kprop_port" lineno="42894">
+<interface name="corenet_udp_sendrecv_kprop_port" lineno="42912">
<summary>
Send and receive UDP traffic on the kprop port.
</summary>
@@ -36958,7 +37042,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42910">
+<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42928">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kprop port.
@@ -36970,7 +37054,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kprop_port" lineno="42925">
+<interface name="corenet_tcp_bind_kprop_port" lineno="42943">
<summary>
Bind TCP sockets to the kprop port.
</summary>
@@ -36981,7 +37065,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kprop_port" lineno="42945">
+<interface name="corenet_udp_bind_kprop_port" lineno="42963">
<summary>
Bind UDP sockets to the kprop port.
</summary>
@@ -36992,7 +37076,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kprop_port" lineno="42964">
+<interface name="corenet_tcp_connect_kprop_port" lineno="42982">
<summary>
Make a TCP connection to the kprop port.
</summary>
@@ -37002,7 +37086,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kprop_client_packets" lineno="42984">
+<interface name="corenet_send_kprop_client_packets" lineno="43002">
<summary>
Send kprop_client packets.
</summary>
@@ -37013,7 +37097,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="43003">
+<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="43021">
<summary>
Do not audit attempts to send kprop_client packets.
</summary>
@@ -37024,7 +37108,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kprop_client_packets" lineno="43022">
+<interface name="corenet_receive_kprop_client_packets" lineno="43040">
<summary>
Receive kprop_client packets.
</summary>
@@ -37035,7 +37119,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="43041">
+<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="43059">
<summary>
Do not audit attempts to receive kprop_client packets.
</summary>
@@ -37046,7 +37130,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kprop_client_packets" lineno="43060">
+<interface name="corenet_sendrecv_kprop_client_packets" lineno="43078">
<summary>
Send and receive kprop_client packets.
</summary>
@@ -37057,7 +37141,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="43076">
+<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="43094">
<summary>
Do not audit attempts to send and receive kprop_client packets.
</summary>
@@ -37068,7 +37152,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kprop_client_packets" lineno="43091">
+<interface name="corenet_relabelto_kprop_client_packets" lineno="43109">
<summary>
Relabel packets to kprop_client the packet type.
</summary>
@@ -37078,7 +37162,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kprop_server_packets" lineno="43111">
+<interface name="corenet_send_kprop_server_packets" lineno="43129">
<summary>
Send kprop_server packets.
</summary>
@@ -37089,7 +37173,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43130">
+<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43148">
<summary>
Do not audit attempts to send kprop_server packets.
</summary>
@@ -37100,7 +37184,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kprop_server_packets" lineno="43149">
+<interface name="corenet_receive_kprop_server_packets" lineno="43167">
<summary>
Receive kprop_server packets.
</summary>
@@ -37111,7 +37195,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43168">
+<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43186">
<summary>
Do not audit attempts to receive kprop_server packets.
</summary>
@@ -37122,7 +37206,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kprop_server_packets" lineno="43187">
+<interface name="corenet_sendrecv_kprop_server_packets" lineno="43205">
<summary>
Send and receive kprop_server packets.
</summary>
@@ -37133,7 +37217,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43203">
+<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43221">
<summary>
Do not audit attempts to send and receive kprop_server packets.
</summary>
@@ -37144,7 +37228,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kprop_server_packets" lineno="43218">
+<interface name="corenet_relabelto_kprop_server_packets" lineno="43236">
<summary>
Relabel packets to kprop_server the packet type.
</summary>
@@ -37154,7 +37238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43240">
+<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43258">
<summary>
Send and receive TCP traffic on the ktalkd port.
</summary>
@@ -37165,7 +37249,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ktalkd_port" lineno="43255">
+<interface name="corenet_udp_send_ktalkd_port" lineno="43273">
<summary>
Send UDP traffic on the ktalkd port.
</summary>
@@ -37176,7 +37260,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43270">
+<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43288">
<summary>
Do not audit attempts to send UDP traffic on the ktalkd port.
</summary>
@@ -37187,7 +37271,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ktalkd_port" lineno="43285">
+<interface name="corenet_udp_receive_ktalkd_port" lineno="43303">
<summary>
Receive UDP traffic on the ktalkd port.
</summary>
@@ -37198,7 +37282,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43300">
+<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43318">
<summary>
Do not audit attempts to receive UDP traffic on the ktalkd port.
</summary>
@@ -37209,7 +37293,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43315">
+<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43333">
<summary>
Send and receive UDP traffic on the ktalkd port.
</summary>
@@ -37220,7 +37304,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43331">
+<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43349">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ktalkd port.
@@ -37232,7 +37316,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ktalkd_port" lineno="43346">
+<interface name="corenet_tcp_bind_ktalkd_port" lineno="43364">
<summary>
Bind TCP sockets to the ktalkd port.
</summary>
@@ -37243,7 +37327,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ktalkd_port" lineno="43366">
+<interface name="corenet_udp_bind_ktalkd_port" lineno="43384">
<summary>
Bind UDP sockets to the ktalkd port.
</summary>
@@ -37254,7 +37338,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ktalkd_port" lineno="43385">
+<interface name="corenet_tcp_connect_ktalkd_port" lineno="43403">
<summary>
Make a TCP connection to the ktalkd port.
</summary>
@@ -37264,7 +37348,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ktalkd_client_packets" lineno="43405">
+<interface name="corenet_send_ktalkd_client_packets" lineno="43423">
<summary>
Send ktalkd_client packets.
</summary>
@@ -37275,7 +37359,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43424">
+<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43442">
<summary>
Do not audit attempts to send ktalkd_client packets.
</summary>
@@ -37286,7 +37370,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ktalkd_client_packets" lineno="43443">
+<interface name="corenet_receive_ktalkd_client_packets" lineno="43461">
<summary>
Receive ktalkd_client packets.
</summary>
@@ -37297,7 +37381,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43462">
+<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43480">
<summary>
Do not audit attempts to receive ktalkd_client packets.
</summary>
@@ -37308,7 +37392,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43481">
+<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43499">
<summary>
Send and receive ktalkd_client packets.
</summary>
@@ -37319,7 +37403,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43497">
+<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43515">
<summary>
Do not audit attempts to send and receive ktalkd_client packets.
</summary>
@@ -37330,7 +37414,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43512">
+<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43530">
<summary>
Relabel packets to ktalkd_client the packet type.
</summary>
@@ -37340,7 +37424,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ktalkd_server_packets" lineno="43532">
+<interface name="corenet_send_ktalkd_server_packets" lineno="43550">
<summary>
Send ktalkd_server packets.
</summary>
@@ -37351,7 +37435,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43551">
+<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43569">
<summary>
Do not audit attempts to send ktalkd_server packets.
</summary>
@@ -37362,7 +37446,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ktalkd_server_packets" lineno="43570">
+<interface name="corenet_receive_ktalkd_server_packets" lineno="43588">
<summary>
Receive ktalkd_server packets.
</summary>
@@ -37373,7 +37457,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43589">
+<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43607">
<summary>
Do not audit attempts to receive ktalkd_server packets.
</summary>
@@ -37384,7 +37468,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43608">
+<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43626">
<summary>
Send and receive ktalkd_server packets.
</summary>
@@ -37395,7 +37479,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43624">
+<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43642">
<summary>
Do not audit attempts to send and receive ktalkd_server packets.
</summary>
@@ -37406,7 +37490,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43639">
+<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43657">
<summary>
Relabel packets to ktalkd_server the packet type.
</summary>
@@ -37416,7 +37500,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43661">
+<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43679">
<summary>
Send and receive TCP traffic on the l2tp port.
</summary>
@@ -37427,7 +37511,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_l2tp_port" lineno="43676">
+<interface name="corenet_udp_send_l2tp_port" lineno="43694">
<summary>
Send UDP traffic on the l2tp port.
</summary>
@@ -37438,7 +37522,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43691">
+<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43709">
<summary>
Do not audit attempts to send UDP traffic on the l2tp port.
</summary>
@@ -37449,7 +37533,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_l2tp_port" lineno="43706">
+<interface name="corenet_udp_receive_l2tp_port" lineno="43724">
<summary>
Receive UDP traffic on the l2tp port.
</summary>
@@ -37460,7 +37544,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43721">
+<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43739">
<summary>
Do not audit attempts to receive UDP traffic on the l2tp port.
</summary>
@@ -37471,7 +37555,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43736">
+<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43754">
<summary>
Send and receive UDP traffic on the l2tp port.
</summary>
@@ -37482,7 +37566,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43752">
+<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43770">
<summary>
Do not audit attempts to send and receive
UDP traffic on the l2tp port.
@@ -37494,7 +37578,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_l2tp_port" lineno="43767">
+<interface name="corenet_tcp_bind_l2tp_port" lineno="43785">
<summary>
Bind TCP sockets to the l2tp port.
</summary>
@@ -37505,7 +37589,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_l2tp_port" lineno="43787">
+<interface name="corenet_udp_bind_l2tp_port" lineno="43805">
<summary>
Bind UDP sockets to the l2tp port.
</summary>
@@ -37516,7 +37600,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_l2tp_port" lineno="43806">
+<interface name="corenet_tcp_connect_l2tp_port" lineno="43824">
<summary>
Make a TCP connection to the l2tp port.
</summary>
@@ -37526,7 +37610,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_l2tp_client_packets" lineno="43826">
+<interface name="corenet_send_l2tp_client_packets" lineno="43844">
<summary>
Send l2tp_client packets.
</summary>
@@ -37537,7 +37621,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43845">
+<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43863">
<summary>
Do not audit attempts to send l2tp_client packets.
</summary>
@@ -37548,7 +37632,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_l2tp_client_packets" lineno="43864">
+<interface name="corenet_receive_l2tp_client_packets" lineno="43882">
<summary>
Receive l2tp_client packets.
</summary>
@@ -37559,7 +37643,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43883">
+<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43901">
<summary>
Do not audit attempts to receive l2tp_client packets.
</summary>
@@ -37570,7 +37654,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43902">
+<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43920">
<summary>
Send and receive l2tp_client packets.
</summary>
@@ -37581,7 +37665,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43918">
+<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43936">
<summary>
Do not audit attempts to send and receive l2tp_client packets.
</summary>
@@ -37592,7 +37676,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_l2tp_client_packets" lineno="43933">
+<interface name="corenet_relabelto_l2tp_client_packets" lineno="43951">
<summary>
Relabel packets to l2tp_client the packet type.
</summary>
@@ -37602,7 +37686,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_l2tp_server_packets" lineno="43953">
+<interface name="corenet_send_l2tp_server_packets" lineno="43971">
<summary>
Send l2tp_server packets.
</summary>
@@ -37613,7 +37697,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43972">
+<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43990">
<summary>
Do not audit attempts to send l2tp_server packets.
</summary>
@@ -37624,7 +37708,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_l2tp_server_packets" lineno="43991">
+<interface name="corenet_receive_l2tp_server_packets" lineno="44009">
<summary>
Receive l2tp_server packets.
</summary>
@@ -37635,7 +37719,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="44010">
+<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="44028">
<summary>
Do not audit attempts to receive l2tp_server packets.
</summary>
@@ -37646,7 +37730,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_l2tp_server_packets" lineno="44029">
+<interface name="corenet_sendrecv_l2tp_server_packets" lineno="44047">
<summary>
Send and receive l2tp_server packets.
</summary>
@@ -37657,7 +37741,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="44045">
+<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="44063">
<summary>
Do not audit attempts to send and receive l2tp_server packets.
</summary>
@@ -37668,7 +37752,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_l2tp_server_packets" lineno="44060">
+<interface name="corenet_relabelto_l2tp_server_packets" lineno="44078">
<summary>
Relabel packets to l2tp_server the packet type.
</summary>
@@ -37678,7 +37762,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ldap_port" lineno="44082">
+<interface name="corenet_tcp_sendrecv_ldap_port" lineno="44100">
<summary>
Send and receive TCP traffic on the ldap port.
</summary>
@@ -37689,7 +37773,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ldap_port" lineno="44097">
+<interface name="corenet_udp_send_ldap_port" lineno="44115">
<summary>
Send UDP traffic on the ldap port.
</summary>
@@ -37700,7 +37784,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="44112">
+<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="44130">
<summary>
Do not audit attempts to send UDP traffic on the ldap port.
</summary>
@@ -37711,7 +37795,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ldap_port" lineno="44127">
+<interface name="corenet_udp_receive_ldap_port" lineno="44145">
<summary>
Receive UDP traffic on the ldap port.
</summary>
@@ -37722,7 +37806,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44142">
+<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44160">
<summary>
Do not audit attempts to receive UDP traffic on the ldap port.
</summary>
@@ -37733,7 +37817,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ldap_port" lineno="44157">
+<interface name="corenet_udp_sendrecv_ldap_port" lineno="44175">
<summary>
Send and receive UDP traffic on the ldap port.
</summary>
@@ -37744,7 +37828,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44173">
+<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44191">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ldap port.
@@ -37756,7 +37840,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ldap_port" lineno="44188">
+<interface name="corenet_tcp_bind_ldap_port" lineno="44206">
<summary>
Bind TCP sockets to the ldap port.
</summary>
@@ -37767,7 +37851,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ldap_port" lineno="44208">
+<interface name="corenet_udp_bind_ldap_port" lineno="44226">
<summary>
Bind UDP sockets to the ldap port.
</summary>
@@ -37778,7 +37862,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ldap_port" lineno="44227">
+<interface name="corenet_tcp_connect_ldap_port" lineno="44245">
<summary>
Make a TCP connection to the ldap port.
</summary>
@@ -37788,7 +37872,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ldap_client_packets" lineno="44247">
+<interface name="corenet_send_ldap_client_packets" lineno="44265">
<summary>
Send ldap_client packets.
</summary>
@@ -37799,7 +37883,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44266">
+<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44284">
<summary>
Do not audit attempts to send ldap_client packets.
</summary>
@@ -37810,7 +37894,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ldap_client_packets" lineno="44285">
+<interface name="corenet_receive_ldap_client_packets" lineno="44303">
<summary>
Receive ldap_client packets.
</summary>
@@ -37821,7 +37905,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44304">
+<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44322">
<summary>
Do not audit attempts to receive ldap_client packets.
</summary>
@@ -37832,7 +37916,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ldap_client_packets" lineno="44323">
+<interface name="corenet_sendrecv_ldap_client_packets" lineno="44341">
<summary>
Send and receive ldap_client packets.
</summary>
@@ -37843,7 +37927,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44339">
+<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44357">
<summary>
Do not audit attempts to send and receive ldap_client packets.
</summary>
@@ -37854,7 +37938,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ldap_client_packets" lineno="44354">
+<interface name="corenet_relabelto_ldap_client_packets" lineno="44372">
<summary>
Relabel packets to ldap_client the packet type.
</summary>
@@ -37864,7 +37948,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ldap_server_packets" lineno="44374">
+<interface name="corenet_send_ldap_server_packets" lineno="44392">
<summary>
Send ldap_server packets.
</summary>
@@ -37875,7 +37959,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44393">
+<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44411">
<summary>
Do not audit attempts to send ldap_server packets.
</summary>
@@ -37886,7 +37970,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ldap_server_packets" lineno="44412">
+<interface name="corenet_receive_ldap_server_packets" lineno="44430">
<summary>
Receive ldap_server packets.
</summary>
@@ -37897,7 +37981,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44431">
+<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44449">
<summary>
Do not audit attempts to receive ldap_server packets.
</summary>
@@ -37908,7 +37992,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ldap_server_packets" lineno="44450">
+<interface name="corenet_sendrecv_ldap_server_packets" lineno="44468">
<summary>
Send and receive ldap_server packets.
</summary>
@@ -37919,7 +38003,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44466">
+<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44484">
<summary>
Do not audit attempts to send and receive ldap_server packets.
</summary>
@@ -37930,7 +38014,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ldap_server_packets" lineno="44481">
+<interface name="corenet_relabelto_ldap_server_packets" lineno="44499">
<summary>
Relabel packets to ldap_server the packet type.
</summary>
@@ -37940,7 +38024,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44503">
+<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44521">
<summary>
Send and receive TCP traffic on the lirc port.
</summary>
@@ -37951,7 +38035,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_lirc_port" lineno="44518">
+<interface name="corenet_udp_send_lirc_port" lineno="44536">
<summary>
Send UDP traffic on the lirc port.
</summary>
@@ -37962,7 +38046,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44533">
+<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44551">
<summary>
Do not audit attempts to send UDP traffic on the lirc port.
</summary>
@@ -37973,7 +38057,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_lirc_port" lineno="44548">
+<interface name="corenet_udp_receive_lirc_port" lineno="44566">
<summary>
Receive UDP traffic on the lirc port.
</summary>
@@ -37984,7 +38068,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44563">
+<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44581">
<summary>
Do not audit attempts to receive UDP traffic on the lirc port.
</summary>
@@ -37995,7 +38079,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_lirc_port" lineno="44578">
+<interface name="corenet_udp_sendrecv_lirc_port" lineno="44596">
<summary>
Send and receive UDP traffic on the lirc port.
</summary>
@@ -38006,7 +38090,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44594">
+<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44612">
<summary>
Do not audit attempts to send and receive
UDP traffic on the lirc port.
@@ -38018,7 +38102,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_lirc_port" lineno="44609">
+<interface name="corenet_tcp_bind_lirc_port" lineno="44627">
<summary>
Bind TCP sockets to the lirc port.
</summary>
@@ -38029,7 +38113,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_lirc_port" lineno="44629">
+<interface name="corenet_udp_bind_lirc_port" lineno="44647">
<summary>
Bind UDP sockets to the lirc port.
</summary>
@@ -38040,7 +38124,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_lirc_port" lineno="44648">
+<interface name="corenet_tcp_connect_lirc_port" lineno="44666">
<summary>
Make a TCP connection to the lirc port.
</summary>
@@ -38050,7 +38134,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lirc_client_packets" lineno="44668">
+<interface name="corenet_send_lirc_client_packets" lineno="44686">
<summary>
Send lirc_client packets.
</summary>
@@ -38061,7 +38145,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44687">
+<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44705">
<summary>
Do not audit attempts to send lirc_client packets.
</summary>
@@ -38072,7 +38156,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lirc_client_packets" lineno="44706">
+<interface name="corenet_receive_lirc_client_packets" lineno="44724">
<summary>
Receive lirc_client packets.
</summary>
@@ -38083,7 +38167,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44725">
+<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44743">
<summary>
Do not audit attempts to receive lirc_client packets.
</summary>
@@ -38094,7 +38178,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lirc_client_packets" lineno="44744">
+<interface name="corenet_sendrecv_lirc_client_packets" lineno="44762">
<summary>
Send and receive lirc_client packets.
</summary>
@@ -38105,7 +38189,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44760">
+<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44778">
<summary>
Do not audit attempts to send and receive lirc_client packets.
</summary>
@@ -38116,7 +38200,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lirc_client_packets" lineno="44775">
+<interface name="corenet_relabelto_lirc_client_packets" lineno="44793">
<summary>
Relabel packets to lirc_client the packet type.
</summary>
@@ -38126,7 +38210,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lirc_server_packets" lineno="44795">
+<interface name="corenet_send_lirc_server_packets" lineno="44813">
<summary>
Send lirc_server packets.
</summary>
@@ -38137,7 +38221,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44814">
+<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44832">
<summary>
Do not audit attempts to send lirc_server packets.
</summary>
@@ -38148,7 +38232,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lirc_server_packets" lineno="44833">
+<interface name="corenet_receive_lirc_server_packets" lineno="44851">
<summary>
Receive lirc_server packets.
</summary>
@@ -38159,7 +38243,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44852">
+<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44870">
<summary>
Do not audit attempts to receive lirc_server packets.
</summary>
@@ -38170,7 +38254,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lirc_server_packets" lineno="44871">
+<interface name="corenet_sendrecv_lirc_server_packets" lineno="44889">
<summary>
Send and receive lirc_server packets.
</summary>
@@ -38181,7 +38265,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44887">
+<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44905">
<summary>
Do not audit attempts to send and receive lirc_server packets.
</summary>
@@ -38192,7 +38276,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lirc_server_packets" lineno="44902">
+<interface name="corenet_relabelto_lirc_server_packets" lineno="44920">
<summary>
Relabel packets to lirc_server the packet type.
</summary>
@@ -38202,7 +38286,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44924">
+<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44942">
<summary>
Send and receive TCP traffic on the llmnr port.
</summary>
@@ -38213,7 +38297,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_llmnr_port" lineno="44939">
+<interface name="corenet_udp_send_llmnr_port" lineno="44957">
<summary>
Send UDP traffic on the llmnr port.
</summary>
@@ -38224,7 +38308,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44954">
+<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44972">
<summary>
Do not audit attempts to send UDP traffic on the llmnr port.
</summary>
@@ -38235,7 +38319,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_llmnr_port" lineno="44969">
+<interface name="corenet_udp_receive_llmnr_port" lineno="44987">
<summary>
Receive UDP traffic on the llmnr port.
</summary>
@@ -38246,7 +38330,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="44984">
+<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="45002">
<summary>
Do not audit attempts to receive UDP traffic on the llmnr port.
</summary>
@@ -38257,7 +38341,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_llmnr_port" lineno="44999">
+<interface name="corenet_udp_sendrecv_llmnr_port" lineno="45017">
<summary>
Send and receive UDP traffic on the llmnr port.
</summary>
@@ -38268,7 +38352,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="45015">
+<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="45033">
<summary>
Do not audit attempts to send and receive
UDP traffic on the llmnr port.
@@ -38280,7 +38364,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_llmnr_port" lineno="45030">
+<interface name="corenet_tcp_bind_llmnr_port" lineno="45048">
<summary>
Bind TCP sockets to the llmnr port.
</summary>
@@ -38291,7 +38375,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_llmnr_port" lineno="45050">
+<interface name="corenet_udp_bind_llmnr_port" lineno="45068">
<summary>
Bind UDP sockets to the llmnr port.
</summary>
@@ -38302,7 +38386,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_llmnr_port" lineno="45069">
+<interface name="corenet_tcp_connect_llmnr_port" lineno="45087">
<summary>
Make a TCP connection to the llmnr port.
</summary>
@@ -38312,7 +38396,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_llmnr_client_packets" lineno="45089">
+<interface name="corenet_send_llmnr_client_packets" lineno="45107">
<summary>
Send llmnr_client packets.
</summary>
@@ -38323,7 +38407,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="45108">
+<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="45126">
<summary>
Do not audit attempts to send llmnr_client packets.
</summary>
@@ -38334,7 +38418,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_llmnr_client_packets" lineno="45127">
+<interface name="corenet_receive_llmnr_client_packets" lineno="45145">
<summary>
Receive llmnr_client packets.
</summary>
@@ -38345,7 +38429,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45146">
+<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45164">
<summary>
Do not audit attempts to receive llmnr_client packets.
</summary>
@@ -38356,7 +38440,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45165">
+<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45183">
<summary>
Send and receive llmnr_client packets.
</summary>
@@ -38367,7 +38451,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45181">
+<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45199">
<summary>
Do not audit attempts to send and receive llmnr_client packets.
</summary>
@@ -38378,7 +38462,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_llmnr_client_packets" lineno="45196">
+<interface name="corenet_relabelto_llmnr_client_packets" lineno="45214">
<summary>
Relabel packets to llmnr_client the packet type.
</summary>
@@ -38388,7 +38472,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_llmnr_server_packets" lineno="45216">
+<interface name="corenet_send_llmnr_server_packets" lineno="45234">
<summary>
Send llmnr_server packets.
</summary>
@@ -38399,7 +38483,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45235">
+<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45253">
<summary>
Do not audit attempts to send llmnr_server packets.
</summary>
@@ -38410,7 +38494,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_llmnr_server_packets" lineno="45254">
+<interface name="corenet_receive_llmnr_server_packets" lineno="45272">
<summary>
Receive llmnr_server packets.
</summary>
@@ -38421,7 +38505,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45273">
+<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45291">
<summary>
Do not audit attempts to receive llmnr_server packets.
</summary>
@@ -38432,7 +38516,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45292">
+<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45310">
<summary>
Send and receive llmnr_server packets.
</summary>
@@ -38443,7 +38527,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45308">
+<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45326">
<summary>
Do not audit attempts to send and receive llmnr_server packets.
</summary>
@@ -38454,7 +38538,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_llmnr_server_packets" lineno="45323">
+<interface name="corenet_relabelto_llmnr_server_packets" lineno="45341">
<summary>
Relabel packets to llmnr_server the packet type.
</summary>
@@ -38464,7 +38548,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45345">
+<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45363">
<summary>
Send and receive TCP traffic on the lmtp port.
</summary>
@@ -38475,7 +38559,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_lmtp_port" lineno="45360">
+<interface name="corenet_udp_send_lmtp_port" lineno="45378">
<summary>
Send UDP traffic on the lmtp port.
</summary>
@@ -38486,7 +38570,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45375">
+<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45393">
<summary>
Do not audit attempts to send UDP traffic on the lmtp port.
</summary>
@@ -38497,7 +38581,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_lmtp_port" lineno="45390">
+<interface name="corenet_udp_receive_lmtp_port" lineno="45408">
<summary>
Receive UDP traffic on the lmtp port.
</summary>
@@ -38508,7 +38592,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45405">
+<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45423">
<summary>
Do not audit attempts to receive UDP traffic on the lmtp port.
</summary>
@@ -38519,7 +38603,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45420">
+<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45438">
<summary>
Send and receive UDP traffic on the lmtp port.
</summary>
@@ -38530,7 +38614,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45436">
+<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45454">
<summary>
Do not audit attempts to send and receive
UDP traffic on the lmtp port.
@@ -38542,7 +38626,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_lmtp_port" lineno="45451">
+<interface name="corenet_tcp_bind_lmtp_port" lineno="45469">
<summary>
Bind TCP sockets to the lmtp port.
</summary>
@@ -38553,7 +38637,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_lmtp_port" lineno="45471">
+<interface name="corenet_udp_bind_lmtp_port" lineno="45489">
<summary>
Bind UDP sockets to the lmtp port.
</summary>
@@ -38564,7 +38648,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_lmtp_port" lineno="45490">
+<interface name="corenet_tcp_connect_lmtp_port" lineno="45508">
<summary>
Make a TCP connection to the lmtp port.
</summary>
@@ -38574,7 +38658,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lmtp_client_packets" lineno="45510">
+<interface name="corenet_send_lmtp_client_packets" lineno="45528">
<summary>
Send lmtp_client packets.
</summary>
@@ -38585,7 +38669,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45529">
+<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45547">
<summary>
Do not audit attempts to send lmtp_client packets.
</summary>
@@ -38596,7 +38680,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lmtp_client_packets" lineno="45548">
+<interface name="corenet_receive_lmtp_client_packets" lineno="45566">
<summary>
Receive lmtp_client packets.
</summary>
@@ -38607,7 +38691,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45567">
+<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45585">
<summary>
Do not audit attempts to receive lmtp_client packets.
</summary>
@@ -38618,7 +38702,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45586">
+<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45604">
<summary>
Send and receive lmtp_client packets.
</summary>
@@ -38629,7 +38713,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45602">
+<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45620">
<summary>
Do not audit attempts to send and receive lmtp_client packets.
</summary>
@@ -38640,7 +38724,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lmtp_client_packets" lineno="45617">
+<interface name="corenet_relabelto_lmtp_client_packets" lineno="45635">
<summary>
Relabel packets to lmtp_client the packet type.
</summary>
@@ -38650,7 +38734,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lmtp_server_packets" lineno="45637">
+<interface name="corenet_send_lmtp_server_packets" lineno="45655">
<summary>
Send lmtp_server packets.
</summary>
@@ -38661,7 +38745,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45656">
+<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45674">
<summary>
Do not audit attempts to send lmtp_server packets.
</summary>
@@ -38672,7 +38756,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lmtp_server_packets" lineno="45675">
+<interface name="corenet_receive_lmtp_server_packets" lineno="45693">
<summary>
Receive lmtp_server packets.
</summary>
@@ -38683,7 +38767,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45694">
+<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45712">
<summary>
Do not audit attempts to receive lmtp_server packets.
</summary>
@@ -38694,7 +38778,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45713">
+<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45731">
<summary>
Send and receive lmtp_server packets.
</summary>
@@ -38705,7 +38789,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45729">
+<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45747">
<summary>
Do not audit attempts to send and receive lmtp_server packets.
</summary>
@@ -38716,7 +38800,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lmtp_server_packets" lineno="45744">
+<interface name="corenet_relabelto_lmtp_server_packets" lineno="45762">
<summary>
Relabel packets to lmtp_server the packet type.
</summary>
@@ -38726,7 +38810,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45766">
+<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45784">
<summary>
Send and receive TCP traffic on the lrrd port.
</summary>
@@ -38737,7 +38821,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_lrrd_port" lineno="45781">
+<interface name="corenet_udp_send_lrrd_port" lineno="45799">
<summary>
Send UDP traffic on the lrrd port.
</summary>
@@ -38748,7 +38832,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45796">
+<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45814">
<summary>
Do not audit attempts to send UDP traffic on the lrrd port.
</summary>
@@ -38759,7 +38843,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_lrrd_port" lineno="45811">
+<interface name="corenet_udp_receive_lrrd_port" lineno="45829">
<summary>
Receive UDP traffic on the lrrd port.
</summary>
@@ -38770,7 +38854,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45826">
+<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45844">
<summary>
Do not audit attempts to receive UDP traffic on the lrrd port.
</summary>
@@ -38781,7 +38865,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45841">
+<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45859">
<summary>
Send and receive UDP traffic on the lrrd port.
</summary>
@@ -38792,7 +38876,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45857">
+<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45875">
<summary>
Do not audit attempts to send and receive
UDP traffic on the lrrd port.
@@ -38804,7 +38888,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_lrrd_port" lineno="45872">
+<interface name="corenet_tcp_bind_lrrd_port" lineno="45890">
<summary>
Bind TCP sockets to the lrrd port.
</summary>
@@ -38815,7 +38899,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_lrrd_port" lineno="45892">
+<interface name="corenet_udp_bind_lrrd_port" lineno="45910">
<summary>
Bind UDP sockets to the lrrd port.
</summary>
@@ -38826,7 +38910,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_lrrd_port" lineno="45911">
+<interface name="corenet_tcp_connect_lrrd_port" lineno="45929">
<summary>
Make a TCP connection to the lrrd port.
</summary>
@@ -38836,7 +38920,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lrrd_client_packets" lineno="45931">
+<interface name="corenet_send_lrrd_client_packets" lineno="45949">
<summary>
Send lrrd_client packets.
</summary>
@@ -38847,7 +38931,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45950">
+<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45968">
<summary>
Do not audit attempts to send lrrd_client packets.
</summary>
@@ -38858,7 +38942,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lrrd_client_packets" lineno="45969">
+<interface name="corenet_receive_lrrd_client_packets" lineno="45987">
<summary>
Receive lrrd_client packets.
</summary>
@@ -38869,7 +38953,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="45988">
+<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="46006">
<summary>
Do not audit attempts to receive lrrd_client packets.
</summary>
@@ -38880,7 +38964,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lrrd_client_packets" lineno="46007">
+<interface name="corenet_sendrecv_lrrd_client_packets" lineno="46025">
<summary>
Send and receive lrrd_client packets.
</summary>
@@ -38891,7 +38975,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="46023">
+<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="46041">
<summary>
Do not audit attempts to send and receive lrrd_client packets.
</summary>
@@ -38902,7 +38986,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lrrd_client_packets" lineno="46038">
+<interface name="corenet_relabelto_lrrd_client_packets" lineno="46056">
<summary>
Relabel packets to lrrd_client the packet type.
</summary>
@@ -38912,7 +38996,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lrrd_server_packets" lineno="46058">
+<interface name="corenet_send_lrrd_server_packets" lineno="46076">
<summary>
Send lrrd_server packets.
</summary>
@@ -38923,7 +39007,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="46077">
+<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="46095">
<summary>
Do not audit attempts to send lrrd_server packets.
</summary>
@@ -38934,7 +39018,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lrrd_server_packets" lineno="46096">
+<interface name="corenet_receive_lrrd_server_packets" lineno="46114">
<summary>
Receive lrrd_server packets.
</summary>
@@ -38945,7 +39029,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="46115">
+<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="46133">
<summary>
Do not audit attempts to receive lrrd_server packets.
</summary>
@@ -38956,7 +39040,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46134">
+<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46152">
<summary>
Send and receive lrrd_server packets.
</summary>
@@ -38967,7 +39051,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46150">
+<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46168">
<summary>
Do not audit attempts to send and receive lrrd_server packets.
</summary>
@@ -38978,7 +39062,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lrrd_server_packets" lineno="46165">
+<interface name="corenet_relabelto_lrrd_server_packets" lineno="46183">
<summary>
Relabel packets to lrrd_server the packet type.
</summary>
@@ -38988,7 +39072,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mail_port" lineno="46187">
+<interface name="corenet_tcp_sendrecv_mail_port" lineno="46205">
<summary>
Send and receive TCP traffic on the mail port.
</summary>
@@ -38999,7 +39083,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mail_port" lineno="46202">
+<interface name="corenet_udp_send_mail_port" lineno="46220">
<summary>
Send UDP traffic on the mail port.
</summary>
@@ -39010,7 +39094,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46217">
+<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46235">
<summary>
Do not audit attempts to send UDP traffic on the mail port.
</summary>
@@ -39021,7 +39105,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mail_port" lineno="46232">
+<interface name="corenet_udp_receive_mail_port" lineno="46250">
<summary>
Receive UDP traffic on the mail port.
</summary>
@@ -39032,7 +39116,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46247">
+<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46265">
<summary>
Do not audit attempts to receive UDP traffic on the mail port.
</summary>
@@ -39043,7 +39127,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mail_port" lineno="46262">
+<interface name="corenet_udp_sendrecv_mail_port" lineno="46280">
<summary>
Send and receive UDP traffic on the mail port.
</summary>
@@ -39054,7 +39138,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46278">
+<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46296">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mail port.
@@ -39066,7 +39150,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mail_port" lineno="46293">
+<interface name="corenet_tcp_bind_mail_port" lineno="46311">
<summary>
Bind TCP sockets to the mail port.
</summary>
@@ -39077,7 +39161,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mail_port" lineno="46313">
+<interface name="corenet_udp_bind_mail_port" lineno="46331">
<summary>
Bind UDP sockets to the mail port.
</summary>
@@ -39088,7 +39172,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mail_port" lineno="46332">
+<interface name="corenet_tcp_connect_mail_port" lineno="46350">
<summary>
Make a TCP connection to the mail port.
</summary>
@@ -39098,7 +39182,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mail_client_packets" lineno="46352">
+<interface name="corenet_send_mail_client_packets" lineno="46370">
<summary>
Send mail_client packets.
</summary>
@@ -39109,7 +39193,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46371">
+<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46389">
<summary>
Do not audit attempts to send mail_client packets.
</summary>
@@ -39120,7 +39204,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mail_client_packets" lineno="46390">
+<interface name="corenet_receive_mail_client_packets" lineno="46408">
<summary>
Receive mail_client packets.
</summary>
@@ -39131,7 +39215,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46409">
+<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46427">
<summary>
Do not audit attempts to receive mail_client packets.
</summary>
@@ -39142,7 +39226,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mail_client_packets" lineno="46428">
+<interface name="corenet_sendrecv_mail_client_packets" lineno="46446">
<summary>
Send and receive mail_client packets.
</summary>
@@ -39153,7 +39237,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46444">
+<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46462">
<summary>
Do not audit attempts to send and receive mail_client packets.
</summary>
@@ -39164,7 +39248,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mail_client_packets" lineno="46459">
+<interface name="corenet_relabelto_mail_client_packets" lineno="46477">
<summary>
Relabel packets to mail_client the packet type.
</summary>
@@ -39174,7 +39258,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mail_server_packets" lineno="46479">
+<interface name="corenet_send_mail_server_packets" lineno="46497">
<summary>
Send mail_server packets.
</summary>
@@ -39185,7 +39269,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46498">
+<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46516">
<summary>
Do not audit attempts to send mail_server packets.
</summary>
@@ -39196,7 +39280,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mail_server_packets" lineno="46517">
+<interface name="corenet_receive_mail_server_packets" lineno="46535">
<summary>
Receive mail_server packets.
</summary>
@@ -39207,7 +39291,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46536">
+<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46554">
<summary>
Do not audit attempts to receive mail_server packets.
</summary>
@@ -39218,7 +39302,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mail_server_packets" lineno="46555">
+<interface name="corenet_sendrecv_mail_server_packets" lineno="46573">
<summary>
Send and receive mail_server packets.
</summary>
@@ -39229,7 +39313,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46571">
+<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46589">
<summary>
Do not audit attempts to send and receive mail_server packets.
</summary>
@@ -39240,7 +39324,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mail_server_packets" lineno="46586">
+<interface name="corenet_relabelto_mail_server_packets" lineno="46604">
<summary>
Relabel packets to mail_server the packet type.
</summary>
@@ -39250,7 +39334,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46608">
+<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46626">
<summary>
Send and receive TCP traffic on the matahari port.
</summary>
@@ -39261,7 +39345,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_matahari_port" lineno="46623">
+<interface name="corenet_udp_send_matahari_port" lineno="46641">
<summary>
Send UDP traffic on the matahari port.
</summary>
@@ -39272,7 +39356,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46638">
+<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46656">
<summary>
Do not audit attempts to send UDP traffic on the matahari port.
</summary>
@@ -39283,7 +39367,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_matahari_port" lineno="46653">
+<interface name="corenet_udp_receive_matahari_port" lineno="46671">
<summary>
Receive UDP traffic on the matahari port.
</summary>
@@ -39294,7 +39378,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46668">
+<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46686">
<summary>
Do not audit attempts to receive UDP traffic on the matahari port.
</summary>
@@ -39305,7 +39389,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_matahari_port" lineno="46683">
+<interface name="corenet_udp_sendrecv_matahari_port" lineno="46701">
<summary>
Send and receive UDP traffic on the matahari port.
</summary>
@@ -39316,7 +39400,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46699">
+<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46717">
<summary>
Do not audit attempts to send and receive
UDP traffic on the matahari port.
@@ -39328,7 +39412,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_matahari_port" lineno="46714">
+<interface name="corenet_tcp_bind_matahari_port" lineno="46732">
<summary>
Bind TCP sockets to the matahari port.
</summary>
@@ -39339,7 +39423,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_matahari_port" lineno="46734">
+<interface name="corenet_udp_bind_matahari_port" lineno="46752">
<summary>
Bind UDP sockets to the matahari port.
</summary>
@@ -39350,7 +39434,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_matahari_port" lineno="46753">
+<interface name="corenet_tcp_connect_matahari_port" lineno="46771">
<summary>
Make a TCP connection to the matahari port.
</summary>
@@ -39360,7 +39444,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_matahari_client_packets" lineno="46773">
+<interface name="corenet_send_matahari_client_packets" lineno="46791">
<summary>
Send matahari_client packets.
</summary>
@@ -39371,7 +39455,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46792">
+<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46810">
<summary>
Do not audit attempts to send matahari_client packets.
</summary>
@@ -39382,7 +39466,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_matahari_client_packets" lineno="46811">
+<interface name="corenet_receive_matahari_client_packets" lineno="46829">
<summary>
Receive matahari_client packets.
</summary>
@@ -39393,7 +39477,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46830">
+<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46848">
<summary>
Do not audit attempts to receive matahari_client packets.
</summary>
@@ -39404,7 +39488,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_matahari_client_packets" lineno="46849">
+<interface name="corenet_sendrecv_matahari_client_packets" lineno="46867">
<summary>
Send and receive matahari_client packets.
</summary>
@@ -39415,7 +39499,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46865">
+<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46883">
<summary>
Do not audit attempts to send and receive matahari_client packets.
</summary>
@@ -39426,7 +39510,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_matahari_client_packets" lineno="46880">
+<interface name="corenet_relabelto_matahari_client_packets" lineno="46898">
<summary>
Relabel packets to matahari_client the packet type.
</summary>
@@ -39436,7 +39520,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_matahari_server_packets" lineno="46900">
+<interface name="corenet_send_matahari_server_packets" lineno="46918">
<summary>
Send matahari_server packets.
</summary>
@@ -39447,7 +39531,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46919">
+<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46937">
<summary>
Do not audit attempts to send matahari_server packets.
</summary>
@@ -39458,7 +39542,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_matahari_server_packets" lineno="46938">
+<interface name="corenet_receive_matahari_server_packets" lineno="46956">
<summary>
Receive matahari_server packets.
</summary>
@@ -39469,7 +39553,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46957">
+<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46975">
<summary>
Do not audit attempts to receive matahari_server packets.
</summary>
@@ -39480,7 +39564,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_matahari_server_packets" lineno="46976">
+<interface name="corenet_sendrecv_matahari_server_packets" lineno="46994">
<summary>
Send and receive matahari_server packets.
</summary>
@@ -39491,7 +39575,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="46992">
+<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="47010">
<summary>
Do not audit attempts to send and receive matahari_server packets.
</summary>
@@ -39502,7 +39586,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_matahari_server_packets" lineno="47007">
+<interface name="corenet_relabelto_matahari_server_packets" lineno="47025">
<summary>
Relabel packets to matahari_server the packet type.
</summary>
@@ -39512,7 +39596,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_memcache_port" lineno="47029">
+<interface name="corenet_tcp_sendrecv_memcache_port" lineno="47047">
<summary>
Send and receive TCP traffic on the memcache port.
</summary>
@@ -39523,7 +39607,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_memcache_port" lineno="47044">
+<interface name="corenet_udp_send_memcache_port" lineno="47062">
<summary>
Send UDP traffic on the memcache port.
</summary>
@@ -39534,7 +39618,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="47059">
+<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="47077">
<summary>
Do not audit attempts to send UDP traffic on the memcache port.
</summary>
@@ -39545,7 +39629,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_memcache_port" lineno="47074">
+<interface name="corenet_udp_receive_memcache_port" lineno="47092">
<summary>
Receive UDP traffic on the memcache port.
</summary>
@@ -39556,7 +39640,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="47089">
+<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="47107">
<summary>
Do not audit attempts to receive UDP traffic on the memcache port.
</summary>
@@ -39567,7 +39651,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_memcache_port" lineno="47104">
+<interface name="corenet_udp_sendrecv_memcache_port" lineno="47122">
<summary>
Send and receive UDP traffic on the memcache port.
</summary>
@@ -39578,7 +39662,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="47120">
+<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="47138">
<summary>
Do not audit attempts to send and receive
UDP traffic on the memcache port.
@@ -39590,7 +39674,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_memcache_port" lineno="47135">
+<interface name="corenet_tcp_bind_memcache_port" lineno="47153">
<summary>
Bind TCP sockets to the memcache port.
</summary>
@@ -39601,7 +39685,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_memcache_port" lineno="47155">
+<interface name="corenet_udp_bind_memcache_port" lineno="47173">
<summary>
Bind UDP sockets to the memcache port.
</summary>
@@ -39612,7 +39696,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_memcache_port" lineno="47174">
+<interface name="corenet_tcp_connect_memcache_port" lineno="47192">
<summary>
Make a TCP connection to the memcache port.
</summary>
@@ -39622,7 +39706,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_memcache_client_packets" lineno="47194">
+<interface name="corenet_send_memcache_client_packets" lineno="47212">
<summary>
Send memcache_client packets.
</summary>
@@ -39633,7 +39717,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47213">
+<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47231">
<summary>
Do not audit attempts to send memcache_client packets.
</summary>
@@ -39644,7 +39728,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_memcache_client_packets" lineno="47232">
+<interface name="corenet_receive_memcache_client_packets" lineno="47250">
<summary>
Receive memcache_client packets.
</summary>
@@ -39655,7 +39739,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47251">
+<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47269">
<summary>
Do not audit attempts to receive memcache_client packets.
</summary>
@@ -39666,7 +39750,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_memcache_client_packets" lineno="47270">
+<interface name="corenet_sendrecv_memcache_client_packets" lineno="47288">
<summary>
Send and receive memcache_client packets.
</summary>
@@ -39677,7 +39761,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47286">
+<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47304">
<summary>
Do not audit attempts to send and receive memcache_client packets.
</summary>
@@ -39688,7 +39772,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_memcache_client_packets" lineno="47301">
+<interface name="corenet_relabelto_memcache_client_packets" lineno="47319">
<summary>
Relabel packets to memcache_client the packet type.
</summary>
@@ -39698,7 +39782,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_memcache_server_packets" lineno="47321">
+<interface name="corenet_send_memcache_server_packets" lineno="47339">
<summary>
Send memcache_server packets.
</summary>
@@ -39709,7 +39793,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47340">
+<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47358">
<summary>
Do not audit attempts to send memcache_server packets.
</summary>
@@ -39720,7 +39804,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_memcache_server_packets" lineno="47359">
+<interface name="corenet_receive_memcache_server_packets" lineno="47377">
<summary>
Receive memcache_server packets.
</summary>
@@ -39731,7 +39815,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47378">
+<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47396">
<summary>
Do not audit attempts to receive memcache_server packets.
</summary>
@@ -39742,7 +39826,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_memcache_server_packets" lineno="47397">
+<interface name="corenet_sendrecv_memcache_server_packets" lineno="47415">
<summary>
Send and receive memcache_server packets.
</summary>
@@ -39753,7 +39837,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47413">
+<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47431">
<summary>
Do not audit attempts to send and receive memcache_server packets.
</summary>
@@ -39764,7 +39848,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_memcache_server_packets" lineno="47428">
+<interface name="corenet_relabelto_memcache_server_packets" lineno="47446">
<summary>
Relabel packets to memcache_server the packet type.
</summary>
@@ -39774,7 +39858,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_milter_port" lineno="47450">
+<interface name="corenet_tcp_sendrecv_milter_port" lineno="47468">
<summary>
Send and receive TCP traffic on the milter port.
</summary>
@@ -39785,7 +39869,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_milter_port" lineno="47465">
+<interface name="corenet_udp_send_milter_port" lineno="47483">
<summary>
Send UDP traffic on the milter port.
</summary>
@@ -39796,7 +39880,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47480">
+<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47498">
<summary>
Do not audit attempts to send UDP traffic on the milter port.
</summary>
@@ -39807,7 +39891,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_milter_port" lineno="47495">
+<interface name="corenet_udp_receive_milter_port" lineno="47513">
<summary>
Receive UDP traffic on the milter port.
</summary>
@@ -39818,7 +39902,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47510">
+<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47528">
<summary>
Do not audit attempts to receive UDP traffic on the milter port.
</summary>
@@ -39829,7 +39913,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_milter_port" lineno="47525">
+<interface name="corenet_udp_sendrecv_milter_port" lineno="47543">
<summary>
Send and receive UDP traffic on the milter port.
</summary>
@@ -39840,7 +39924,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47541">
+<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47559">
<summary>
Do not audit attempts to send and receive
UDP traffic on the milter port.
@@ -39852,7 +39936,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_milter_port" lineno="47556">
+<interface name="corenet_tcp_bind_milter_port" lineno="47574">
<summary>
Bind TCP sockets to the milter port.
</summary>
@@ -39863,7 +39947,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_milter_port" lineno="47576">
+<interface name="corenet_udp_bind_milter_port" lineno="47594">
<summary>
Bind UDP sockets to the milter port.
</summary>
@@ -39874,7 +39958,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_milter_port" lineno="47595">
+<interface name="corenet_tcp_connect_milter_port" lineno="47613">
<summary>
Make a TCP connection to the milter port.
</summary>
@@ -39884,7 +39968,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_milter_client_packets" lineno="47615">
+<interface name="corenet_send_milter_client_packets" lineno="47633">
<summary>
Send milter_client packets.
</summary>
@@ -39895,7 +39979,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47634">
+<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47652">
<summary>
Do not audit attempts to send milter_client packets.
</summary>
@@ -39906,7 +39990,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_milter_client_packets" lineno="47653">
+<interface name="corenet_receive_milter_client_packets" lineno="47671">
<summary>
Receive milter_client packets.
</summary>
@@ -39917,7 +40001,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47672">
+<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47690">
<summary>
Do not audit attempts to receive milter_client packets.
</summary>
@@ -39928,7 +40012,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_milter_client_packets" lineno="47691">
+<interface name="corenet_sendrecv_milter_client_packets" lineno="47709">
<summary>
Send and receive milter_client packets.
</summary>
@@ -39939,7 +40023,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47707">
+<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47725">
<summary>
Do not audit attempts to send and receive milter_client packets.
</summary>
@@ -39950,7 +40034,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_milter_client_packets" lineno="47722">
+<interface name="corenet_relabelto_milter_client_packets" lineno="47740">
<summary>
Relabel packets to milter_client the packet type.
</summary>
@@ -39960,7 +40044,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_milter_server_packets" lineno="47742">
+<interface name="corenet_send_milter_server_packets" lineno="47760">
<summary>
Send milter_server packets.
</summary>
@@ -39971,7 +40055,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47761">
+<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47779">
<summary>
Do not audit attempts to send milter_server packets.
</summary>
@@ -39982,7 +40066,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_milter_server_packets" lineno="47780">
+<interface name="corenet_receive_milter_server_packets" lineno="47798">
<summary>
Receive milter_server packets.
</summary>
@@ -39993,7 +40077,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47799">
+<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47817">
<summary>
Do not audit attempts to receive milter_server packets.
</summary>
@@ -40004,7 +40088,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_milter_server_packets" lineno="47818">
+<interface name="corenet_sendrecv_milter_server_packets" lineno="47836">
<summary>
Send and receive milter_server packets.
</summary>
@@ -40015,7 +40099,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47834">
+<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47852">
<summary>
Do not audit attempts to send and receive milter_server packets.
</summary>
@@ -40026,7 +40110,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_milter_server_packets" lineno="47849">
+<interface name="corenet_relabelto_milter_server_packets" lineno="47867">
<summary>
Relabel packets to milter_server the packet type.
</summary>
@@ -40036,7 +40120,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47871">
+<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47889">
<summary>
Send and receive TCP traffic on the mmcc port.
</summary>
@@ -40047,7 +40131,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mmcc_port" lineno="47886">
+<interface name="corenet_udp_send_mmcc_port" lineno="47904">
<summary>
Send UDP traffic on the mmcc port.
</summary>
@@ -40058,7 +40142,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47901">
+<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47919">
<summary>
Do not audit attempts to send UDP traffic on the mmcc port.
</summary>
@@ -40069,7 +40153,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mmcc_port" lineno="47916">
+<interface name="corenet_udp_receive_mmcc_port" lineno="47934">
<summary>
Receive UDP traffic on the mmcc port.
</summary>
@@ -40080,7 +40164,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47931">
+<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47949">
<summary>
Do not audit attempts to receive UDP traffic on the mmcc port.
</summary>
@@ -40091,7 +40175,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47946">
+<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47964">
<summary>
Send and receive UDP traffic on the mmcc port.
</summary>
@@ -40102,7 +40186,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47962">
+<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47980">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mmcc port.
@@ -40114,7 +40198,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mmcc_port" lineno="47977">
+<interface name="corenet_tcp_bind_mmcc_port" lineno="47995">
<summary>
Bind TCP sockets to the mmcc port.
</summary>
@@ -40125,7 +40209,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mmcc_port" lineno="47997">
+<interface name="corenet_udp_bind_mmcc_port" lineno="48015">
<summary>
Bind UDP sockets to the mmcc port.
</summary>
@@ -40136,7 +40220,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mmcc_port" lineno="48016">
+<interface name="corenet_tcp_connect_mmcc_port" lineno="48034">
<summary>
Make a TCP connection to the mmcc port.
</summary>
@@ -40146,7 +40230,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mmcc_client_packets" lineno="48036">
+<interface name="corenet_send_mmcc_client_packets" lineno="48054">
<summary>
Send mmcc_client packets.
</summary>
@@ -40157,7 +40241,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="48055">
+<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="48073">
<summary>
Do not audit attempts to send mmcc_client packets.
</summary>
@@ -40168,7 +40252,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mmcc_client_packets" lineno="48074">
+<interface name="corenet_receive_mmcc_client_packets" lineno="48092">
<summary>
Receive mmcc_client packets.
</summary>
@@ -40179,7 +40263,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="48093">
+<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="48111">
<summary>
Do not audit attempts to receive mmcc_client packets.
</summary>
@@ -40190,7 +40274,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mmcc_client_packets" lineno="48112">
+<interface name="corenet_sendrecv_mmcc_client_packets" lineno="48130">
<summary>
Send and receive mmcc_client packets.
</summary>
@@ -40201,7 +40285,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48128">
+<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48146">
<summary>
Do not audit attempts to send and receive mmcc_client packets.
</summary>
@@ -40212,7 +40296,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mmcc_client_packets" lineno="48143">
+<interface name="corenet_relabelto_mmcc_client_packets" lineno="48161">
<summary>
Relabel packets to mmcc_client the packet type.
</summary>
@@ -40222,7 +40306,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mmcc_server_packets" lineno="48163">
+<interface name="corenet_send_mmcc_server_packets" lineno="48181">
<summary>
Send mmcc_server packets.
</summary>
@@ -40233,7 +40317,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48182">
+<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48200">
<summary>
Do not audit attempts to send mmcc_server packets.
</summary>
@@ -40244,7 +40328,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mmcc_server_packets" lineno="48201">
+<interface name="corenet_receive_mmcc_server_packets" lineno="48219">
<summary>
Receive mmcc_server packets.
</summary>
@@ -40255,7 +40339,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48220">
+<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48238">
<summary>
Do not audit attempts to receive mmcc_server packets.
</summary>
@@ -40266,7 +40350,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48239">
+<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48257">
<summary>
Send and receive mmcc_server packets.
</summary>
@@ -40277,7 +40361,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48255">
+<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48273">
<summary>
Do not audit attempts to send and receive mmcc_server packets.
</summary>
@@ -40288,7 +40372,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mmcc_server_packets" lineno="48270">
+<interface name="corenet_relabelto_mmcc_server_packets" lineno="48288">
<summary>
Relabel packets to mmcc_server the packet type.
</summary>
@@ -40298,7 +40382,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mon_port" lineno="48292">
+<interface name="corenet_tcp_sendrecv_mon_port" lineno="48310">
<summary>
Send and receive TCP traffic on the mon port.
</summary>
@@ -40309,7 +40393,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mon_port" lineno="48307">
+<interface name="corenet_udp_send_mon_port" lineno="48325">
<summary>
Send UDP traffic on the mon port.
</summary>
@@ -40320,7 +40404,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48322">
+<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48340">
<summary>
Do not audit attempts to send UDP traffic on the mon port.
</summary>
@@ -40331,7 +40415,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mon_port" lineno="48337">
+<interface name="corenet_udp_receive_mon_port" lineno="48355">
<summary>
Receive UDP traffic on the mon port.
</summary>
@@ -40342,7 +40426,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48352">
+<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48370">
<summary>
Do not audit attempts to receive UDP traffic on the mon port.
</summary>
@@ -40353,7 +40437,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mon_port" lineno="48367">
+<interface name="corenet_udp_sendrecv_mon_port" lineno="48385">
<summary>
Send and receive UDP traffic on the mon port.
</summary>
@@ -40364,7 +40448,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48383">
+<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48401">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mon port.
@@ -40376,7 +40460,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mon_port" lineno="48398">
+<interface name="corenet_tcp_bind_mon_port" lineno="48416">
<summary>
Bind TCP sockets to the mon port.
</summary>
@@ -40387,7 +40471,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mon_port" lineno="48418">
+<interface name="corenet_udp_bind_mon_port" lineno="48436">
<summary>
Bind UDP sockets to the mon port.
</summary>
@@ -40398,7 +40482,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mon_port" lineno="48437">
+<interface name="corenet_tcp_connect_mon_port" lineno="48455">
<summary>
Make a TCP connection to the mon port.
</summary>
@@ -40408,7 +40492,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mon_client_packets" lineno="48457">
+<interface name="corenet_send_mon_client_packets" lineno="48475">
<summary>
Send mon_client packets.
</summary>
@@ -40419,7 +40503,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48476">
+<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48494">
<summary>
Do not audit attempts to send mon_client packets.
</summary>
@@ -40430,7 +40514,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mon_client_packets" lineno="48495">
+<interface name="corenet_receive_mon_client_packets" lineno="48513">
<summary>
Receive mon_client packets.
</summary>
@@ -40441,7 +40525,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48514">
+<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48532">
<summary>
Do not audit attempts to receive mon_client packets.
</summary>
@@ -40452,7 +40536,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mon_client_packets" lineno="48533">
+<interface name="corenet_sendrecv_mon_client_packets" lineno="48551">
<summary>
Send and receive mon_client packets.
</summary>
@@ -40463,7 +40547,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48549">
+<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48567">
<summary>
Do not audit attempts to send and receive mon_client packets.
</summary>
@@ -40474,7 +40558,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mon_client_packets" lineno="48564">
+<interface name="corenet_relabelto_mon_client_packets" lineno="48582">
<summary>
Relabel packets to mon_client the packet type.
</summary>
@@ -40484,7 +40568,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mon_server_packets" lineno="48584">
+<interface name="corenet_send_mon_server_packets" lineno="48602">
<summary>
Send mon_server packets.
</summary>
@@ -40495,7 +40579,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48603">
+<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48621">
<summary>
Do not audit attempts to send mon_server packets.
</summary>
@@ -40506,7 +40590,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mon_server_packets" lineno="48622">
+<interface name="corenet_receive_mon_server_packets" lineno="48640">
<summary>
Receive mon_server packets.
</summary>
@@ -40517,7 +40601,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48641">
+<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48659">
<summary>
Do not audit attempts to receive mon_server packets.
</summary>
@@ -40528,7 +40612,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mon_server_packets" lineno="48660">
+<interface name="corenet_sendrecv_mon_server_packets" lineno="48678">
<summary>
Send and receive mon_server packets.
</summary>
@@ -40539,7 +40623,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48676">
+<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48694">
<summary>
Do not audit attempts to send and receive mon_server packets.
</summary>
@@ -40550,7 +40634,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mon_server_packets" lineno="48691">
+<interface name="corenet_relabelto_mon_server_packets" lineno="48709">
<summary>
Relabel packets to mon_server the packet type.
</summary>
@@ -40560,7 +40644,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_monit_port" lineno="48713">
+<interface name="corenet_tcp_sendrecv_monit_port" lineno="48731">
<summary>
Send and receive TCP traffic on the monit port.
</summary>
@@ -40571,7 +40655,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_monit_port" lineno="48728">
+<interface name="corenet_udp_send_monit_port" lineno="48746">
<summary>
Send UDP traffic on the monit port.
</summary>
@@ -40582,7 +40666,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48743">
+<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48761">
<summary>
Do not audit attempts to send UDP traffic on the monit port.
</summary>
@@ -40593,7 +40677,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_monit_port" lineno="48758">
+<interface name="corenet_udp_receive_monit_port" lineno="48776">
<summary>
Receive UDP traffic on the monit port.
</summary>
@@ -40604,7 +40688,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48773">
+<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48791">
<summary>
Do not audit attempts to receive UDP traffic on the monit port.
</summary>
@@ -40615,7 +40699,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_monit_port" lineno="48788">
+<interface name="corenet_udp_sendrecv_monit_port" lineno="48806">
<summary>
Send and receive UDP traffic on the monit port.
</summary>
@@ -40626,7 +40710,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48804">
+<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48822">
<summary>
Do not audit attempts to send and receive
UDP traffic on the monit port.
@@ -40638,7 +40722,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_monit_port" lineno="48819">
+<interface name="corenet_tcp_bind_monit_port" lineno="48837">
<summary>
Bind TCP sockets to the monit port.
</summary>
@@ -40649,7 +40733,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_monit_port" lineno="48839">
+<interface name="corenet_udp_bind_monit_port" lineno="48857">
<summary>
Bind UDP sockets to the monit port.
</summary>
@@ -40660,7 +40744,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_monit_port" lineno="48858">
+<interface name="corenet_tcp_connect_monit_port" lineno="48876">
<summary>
Make a TCP connection to the monit port.
</summary>
@@ -40670,7 +40754,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monit_client_packets" lineno="48878">
+<interface name="corenet_send_monit_client_packets" lineno="48896">
<summary>
Send monit_client packets.
</summary>
@@ -40681,7 +40765,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48897">
+<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48915">
<summary>
Do not audit attempts to send monit_client packets.
</summary>
@@ -40692,7 +40776,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monit_client_packets" lineno="48916">
+<interface name="corenet_receive_monit_client_packets" lineno="48934">
<summary>
Receive monit_client packets.
</summary>
@@ -40703,7 +40787,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48935">
+<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48953">
<summary>
Do not audit attempts to receive monit_client packets.
</summary>
@@ -40714,7 +40798,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monit_client_packets" lineno="48954">
+<interface name="corenet_sendrecv_monit_client_packets" lineno="48972">
<summary>
Send and receive monit_client packets.
</summary>
@@ -40725,7 +40809,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48970">
+<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48988">
<summary>
Do not audit attempts to send and receive monit_client packets.
</summary>
@@ -40736,7 +40820,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monit_client_packets" lineno="48985">
+<interface name="corenet_relabelto_monit_client_packets" lineno="49003">
<summary>
Relabel packets to monit_client the packet type.
</summary>
@@ -40746,7 +40830,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monit_server_packets" lineno="49005">
+<interface name="corenet_send_monit_server_packets" lineno="49023">
<summary>
Send monit_server packets.
</summary>
@@ -40757,7 +40841,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monit_server_packets" lineno="49024">
+<interface name="corenet_dontaudit_send_monit_server_packets" lineno="49042">
<summary>
Do not audit attempts to send monit_server packets.
</summary>
@@ -40768,7 +40852,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monit_server_packets" lineno="49043">
+<interface name="corenet_receive_monit_server_packets" lineno="49061">
<summary>
Receive monit_server packets.
</summary>
@@ -40779,7 +40863,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="49062">
+<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="49080">
<summary>
Do not audit attempts to receive monit_server packets.
</summary>
@@ -40790,7 +40874,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monit_server_packets" lineno="49081">
+<interface name="corenet_sendrecv_monit_server_packets" lineno="49099">
<summary>
Send and receive monit_server packets.
</summary>
@@ -40801,7 +40885,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="49097">
+<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="49115">
<summary>
Do not audit attempts to send and receive monit_server packets.
</summary>
@@ -40812,7 +40896,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monit_server_packets" lineno="49112">
+<interface name="corenet_relabelto_monit_server_packets" lineno="49130">
<summary>
Relabel packets to monit_server the packet type.
</summary>
@@ -40822,7 +40906,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49134">
+<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49152">
<summary>
Send and receive TCP traffic on the monopd port.
</summary>
@@ -40833,7 +40917,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_monopd_port" lineno="49149">
+<interface name="corenet_udp_send_monopd_port" lineno="49167">
<summary>
Send UDP traffic on the monopd port.
</summary>
@@ -40844,7 +40928,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49164">
+<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49182">
<summary>
Do not audit attempts to send UDP traffic on the monopd port.
</summary>
@@ -40855,7 +40939,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_monopd_port" lineno="49179">
+<interface name="corenet_udp_receive_monopd_port" lineno="49197">
<summary>
Receive UDP traffic on the monopd port.
</summary>
@@ -40866,7 +40950,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49194">
+<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49212">
<summary>
Do not audit attempts to receive UDP traffic on the monopd port.
</summary>
@@ -40877,7 +40961,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_monopd_port" lineno="49209">
+<interface name="corenet_udp_sendrecv_monopd_port" lineno="49227">
<summary>
Send and receive UDP traffic on the monopd port.
</summary>
@@ -40888,7 +40972,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49225">
+<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49243">
<summary>
Do not audit attempts to send and receive
UDP traffic on the monopd port.
@@ -40900,7 +40984,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_monopd_port" lineno="49240">
+<interface name="corenet_tcp_bind_monopd_port" lineno="49258">
<summary>
Bind TCP sockets to the monopd port.
</summary>
@@ -40911,7 +40995,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_monopd_port" lineno="49260">
+<interface name="corenet_udp_bind_monopd_port" lineno="49278">
<summary>
Bind UDP sockets to the monopd port.
</summary>
@@ -40922,7 +41006,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_monopd_port" lineno="49279">
+<interface name="corenet_tcp_connect_monopd_port" lineno="49297">
<summary>
Make a TCP connection to the monopd port.
</summary>
@@ -40932,7 +41016,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monopd_client_packets" lineno="49299">
+<interface name="corenet_send_monopd_client_packets" lineno="49317">
<summary>
Send monopd_client packets.
</summary>
@@ -40943,7 +41027,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49318">
+<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49336">
<summary>
Do not audit attempts to send monopd_client packets.
</summary>
@@ -40954,7 +41038,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monopd_client_packets" lineno="49337">
+<interface name="corenet_receive_monopd_client_packets" lineno="49355">
<summary>
Receive monopd_client packets.
</summary>
@@ -40965,7 +41049,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49356">
+<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49374">
<summary>
Do not audit attempts to receive monopd_client packets.
</summary>
@@ -40976,7 +41060,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monopd_client_packets" lineno="49375">
+<interface name="corenet_sendrecv_monopd_client_packets" lineno="49393">
<summary>
Send and receive monopd_client packets.
</summary>
@@ -40987,7 +41071,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49391">
+<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49409">
<summary>
Do not audit attempts to send and receive monopd_client packets.
</summary>
@@ -40998,7 +41082,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monopd_client_packets" lineno="49406">
+<interface name="corenet_relabelto_monopd_client_packets" lineno="49424">
<summary>
Relabel packets to monopd_client the packet type.
</summary>
@@ -41008,7 +41092,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monopd_server_packets" lineno="49426">
+<interface name="corenet_send_monopd_server_packets" lineno="49444">
<summary>
Send monopd_server packets.
</summary>
@@ -41019,7 +41103,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49445">
+<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49463">
<summary>
Do not audit attempts to send monopd_server packets.
</summary>
@@ -41030,7 +41114,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monopd_server_packets" lineno="49464">
+<interface name="corenet_receive_monopd_server_packets" lineno="49482">
<summary>
Receive monopd_server packets.
</summary>
@@ -41041,7 +41125,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49483">
+<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49501">
<summary>
Do not audit attempts to receive monopd_server packets.
</summary>
@@ -41052,7 +41136,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monopd_server_packets" lineno="49502">
+<interface name="corenet_sendrecv_monopd_server_packets" lineno="49520">
<summary>
Send and receive monopd_server packets.
</summary>
@@ -41063,7 +41147,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49518">
+<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49536">
<summary>
Do not audit attempts to send and receive monopd_server packets.
</summary>
@@ -41074,7 +41158,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monopd_server_packets" lineno="49533">
+<interface name="corenet_relabelto_monopd_server_packets" lineno="49551">
<summary>
Relabel packets to monopd_server the packet type.
</summary>
@@ -41084,7 +41168,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49555">
+<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49573">
<summary>
Send and receive TCP traffic on the mountd port.
</summary>
@@ -41095,7 +41179,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mountd_port" lineno="49570">
+<interface name="corenet_udp_send_mountd_port" lineno="49588">
<summary>
Send UDP traffic on the mountd port.
</summary>
@@ -41106,7 +41190,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49585">
+<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49603">
<summary>
Do not audit attempts to send UDP traffic on the mountd port.
</summary>
@@ -41117,7 +41201,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mountd_port" lineno="49600">
+<interface name="corenet_udp_receive_mountd_port" lineno="49618">
<summary>
Receive UDP traffic on the mountd port.
</summary>
@@ -41128,7 +41212,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49615">
+<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49633">
<summary>
Do not audit attempts to receive UDP traffic on the mountd port.
</summary>
@@ -41139,7 +41223,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mountd_port" lineno="49630">
+<interface name="corenet_udp_sendrecv_mountd_port" lineno="49648">
<summary>
Send and receive UDP traffic on the mountd port.
</summary>
@@ -41150,7 +41234,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49646">
+<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49664">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mountd port.
@@ -41162,7 +41246,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mountd_port" lineno="49661">
+<interface name="corenet_tcp_bind_mountd_port" lineno="49679">
<summary>
Bind TCP sockets to the mountd port.
</summary>
@@ -41173,7 +41257,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mountd_port" lineno="49681">
+<interface name="corenet_udp_bind_mountd_port" lineno="49699">
<summary>
Bind UDP sockets to the mountd port.
</summary>
@@ -41184,7 +41268,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mountd_port" lineno="49700">
+<interface name="corenet_tcp_connect_mountd_port" lineno="49718">
<summary>
Make a TCP connection to the mountd port.
</summary>
@@ -41194,7 +41278,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mountd_client_packets" lineno="49720">
+<interface name="corenet_send_mountd_client_packets" lineno="49738">
<summary>
Send mountd_client packets.
</summary>
@@ -41205,7 +41289,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49739">
+<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49757">
<summary>
Do not audit attempts to send mountd_client packets.
</summary>
@@ -41216,7 +41300,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mountd_client_packets" lineno="49758">
+<interface name="corenet_receive_mountd_client_packets" lineno="49776">
<summary>
Receive mountd_client packets.
</summary>
@@ -41227,7 +41311,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49777">
+<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49795">
<summary>
Do not audit attempts to receive mountd_client packets.
</summary>
@@ -41238,7 +41322,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mountd_client_packets" lineno="49796">
+<interface name="corenet_sendrecv_mountd_client_packets" lineno="49814">
<summary>
Send and receive mountd_client packets.
</summary>
@@ -41249,7 +41333,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49812">
+<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49830">
<summary>
Do not audit attempts to send and receive mountd_client packets.
</summary>
@@ -41260,7 +41344,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mountd_client_packets" lineno="49827">
+<interface name="corenet_relabelto_mountd_client_packets" lineno="49845">
<summary>
Relabel packets to mountd_client the packet type.
</summary>
@@ -41270,7 +41354,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mountd_server_packets" lineno="49847">
+<interface name="corenet_send_mountd_server_packets" lineno="49865">
<summary>
Send mountd_server packets.
</summary>
@@ -41281,7 +41365,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49866">
+<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49884">
<summary>
Do not audit attempts to send mountd_server packets.
</summary>
@@ -41292,7 +41376,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mountd_server_packets" lineno="49885">
+<interface name="corenet_receive_mountd_server_packets" lineno="49903">
<summary>
Receive mountd_server packets.
</summary>
@@ -41303,7 +41387,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49904">
+<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49922">
<summary>
Do not audit attempts to receive mountd_server packets.
</summary>
@@ -41314,7 +41398,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mountd_server_packets" lineno="49923">
+<interface name="corenet_sendrecv_mountd_server_packets" lineno="49941">
<summary>
Send and receive mountd_server packets.
</summary>
@@ -41325,7 +41409,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49939">
+<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49957">
<summary>
Do not audit attempts to send and receive mountd_server packets.
</summary>
@@ -41336,7 +41420,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mountd_server_packets" lineno="49954">
+<interface name="corenet_relabelto_mountd_server_packets" lineno="49972">
<summary>
Relabel packets to mountd_server the packet type.
</summary>
@@ -41346,7 +41430,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49976">
+<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49994">
<summary>
Send and receive TCP traffic on the movaz_ssc port.
</summary>
@@ -41357,7 +41441,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_movaz_ssc_port" lineno="49991">
+<interface name="corenet_udp_send_movaz_ssc_port" lineno="50009">
<summary>
Send UDP traffic on the movaz_ssc port.
</summary>
@@ -41368,7 +41452,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="50006">
+<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="50024">
<summary>
Do not audit attempts to send UDP traffic on the movaz_ssc port.
</summary>
@@ -41379,7 +41463,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_movaz_ssc_port" lineno="50021">
+<interface name="corenet_udp_receive_movaz_ssc_port" lineno="50039">
<summary>
Receive UDP traffic on the movaz_ssc port.
</summary>
@@ -41390,7 +41474,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="50036">
+<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="50054">
<summary>
Do not audit attempts to receive UDP traffic on the movaz_ssc port.
</summary>
@@ -41401,7 +41485,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="50051">
+<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="50069">
<summary>
Send and receive UDP traffic on the movaz_ssc port.
</summary>
@@ -41412,7 +41496,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="50067">
+<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="50085">
<summary>
Do not audit attempts to send and receive
UDP traffic on the movaz_ssc port.
@@ -41424,7 +41508,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="50082">
+<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="50100">
<summary>
Bind TCP sockets to the movaz_ssc port.
</summary>
@@ -41435,7 +41519,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_movaz_ssc_port" lineno="50102">
+<interface name="corenet_udp_bind_movaz_ssc_port" lineno="50120">
<summary>
Bind UDP sockets to the movaz_ssc port.
</summary>
@@ -41446,7 +41530,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="50121">
+<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="50139">
<summary>
Make a TCP connection to the movaz_ssc port.
</summary>
@@ -41456,7 +41540,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_movaz_ssc_client_packets" lineno="50141">
+<interface name="corenet_send_movaz_ssc_client_packets" lineno="50159">
<summary>
Send movaz_ssc_client packets.
</summary>
@@ -41467,7 +41551,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50160">
+<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50178">
<summary>
Do not audit attempts to send movaz_ssc_client packets.
</summary>
@@ -41478,7 +41562,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50179">
+<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50197">
<summary>
Receive movaz_ssc_client packets.
</summary>
@@ -41489,7 +41573,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50198">
+<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50216">
<summary>
Do not audit attempts to receive movaz_ssc_client packets.
</summary>
@@ -41500,7 +41584,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50217">
+<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50235">
<summary>
Send and receive movaz_ssc_client packets.
</summary>
@@ -41511,7 +41595,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50233">
+<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50251">
<summary>
Do not audit attempts to send and receive movaz_ssc_client packets.
</summary>
@@ -41522,7 +41606,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50248">
+<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50266">
<summary>
Relabel packets to movaz_ssc_client the packet type.
</summary>
@@ -41532,7 +41616,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_movaz_ssc_server_packets" lineno="50268">
+<interface name="corenet_send_movaz_ssc_server_packets" lineno="50286">
<summary>
Send movaz_ssc_server packets.
</summary>
@@ -41543,7 +41627,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50287">
+<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50305">
<summary>
Do not audit attempts to send movaz_ssc_server packets.
</summary>
@@ -41554,7 +41638,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50306">
+<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50324">
<summary>
Receive movaz_ssc_server packets.
</summary>
@@ -41565,7 +41649,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50325">
+<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50343">
<summary>
Do not audit attempts to receive movaz_ssc_server packets.
</summary>
@@ -41576,7 +41660,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50344">
+<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50362">
<summary>
Send and receive movaz_ssc_server packets.
</summary>
@@ -41587,7 +41671,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50360">
+<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50378">
<summary>
Do not audit attempts to send and receive movaz_ssc_server packets.
</summary>
@@ -41598,7 +41682,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50375">
+<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50393">
<summary>
Relabel packets to movaz_ssc_server the packet type.
</summary>
@@ -41608,7 +41692,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50397">
+<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50415">
<summary>
Send and receive TCP traffic on the mpd port.
</summary>
@@ -41619,7 +41703,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mpd_port" lineno="50412">
+<interface name="corenet_udp_send_mpd_port" lineno="50430">
<summary>
Send UDP traffic on the mpd port.
</summary>
@@ -41630,7 +41714,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50427">
+<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50445">
<summary>
Do not audit attempts to send UDP traffic on the mpd port.
</summary>
@@ -41641,7 +41725,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mpd_port" lineno="50442">
+<interface name="corenet_udp_receive_mpd_port" lineno="50460">
<summary>
Receive UDP traffic on the mpd port.
</summary>
@@ -41652,7 +41736,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50457">
+<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50475">
<summary>
Do not audit attempts to receive UDP traffic on the mpd port.
</summary>
@@ -41663,7 +41747,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mpd_port" lineno="50472">
+<interface name="corenet_udp_sendrecv_mpd_port" lineno="50490">
<summary>
Send and receive UDP traffic on the mpd port.
</summary>
@@ -41674,7 +41758,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50488">
+<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50506">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mpd port.
@@ -41686,7 +41770,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mpd_port" lineno="50503">
+<interface name="corenet_tcp_bind_mpd_port" lineno="50521">
<summary>
Bind TCP sockets to the mpd port.
</summary>
@@ -41697,7 +41781,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mpd_port" lineno="50523">
+<interface name="corenet_udp_bind_mpd_port" lineno="50541">
<summary>
Bind UDP sockets to the mpd port.
</summary>
@@ -41708,7 +41792,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mpd_port" lineno="50542">
+<interface name="corenet_tcp_connect_mpd_port" lineno="50560">
<summary>
Make a TCP connection to the mpd port.
</summary>
@@ -41718,7 +41802,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mpd_client_packets" lineno="50562">
+<interface name="corenet_send_mpd_client_packets" lineno="50580">
<summary>
Send mpd_client packets.
</summary>
@@ -41729,7 +41813,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50581">
+<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50599">
<summary>
Do not audit attempts to send mpd_client packets.
</summary>
@@ -41740,7 +41824,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mpd_client_packets" lineno="50600">
+<interface name="corenet_receive_mpd_client_packets" lineno="50618">
<summary>
Receive mpd_client packets.
</summary>
@@ -41751,7 +41835,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50619">
+<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50637">
<summary>
Do not audit attempts to receive mpd_client packets.
</summary>
@@ -41762,7 +41846,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mpd_client_packets" lineno="50638">
+<interface name="corenet_sendrecv_mpd_client_packets" lineno="50656">
<summary>
Send and receive mpd_client packets.
</summary>
@@ -41773,7 +41857,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50654">
+<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50672">
<summary>
Do not audit attempts to send and receive mpd_client packets.
</summary>
@@ -41784,7 +41868,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mpd_client_packets" lineno="50669">
+<interface name="corenet_relabelto_mpd_client_packets" lineno="50687">
<summary>
Relabel packets to mpd_client the packet type.
</summary>
@@ -41794,7 +41878,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mpd_server_packets" lineno="50689">
+<interface name="corenet_send_mpd_server_packets" lineno="50707">
<summary>
Send mpd_server packets.
</summary>
@@ -41805,7 +41889,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50708">
+<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50726">
<summary>
Do not audit attempts to send mpd_server packets.
</summary>
@@ -41816,7 +41900,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mpd_server_packets" lineno="50727">
+<interface name="corenet_receive_mpd_server_packets" lineno="50745">
<summary>
Receive mpd_server packets.
</summary>
@@ -41827,7 +41911,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50746">
+<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50764">
<summary>
Do not audit attempts to receive mpd_server packets.
</summary>
@@ -41838,7 +41922,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mpd_server_packets" lineno="50765">
+<interface name="corenet_sendrecv_mpd_server_packets" lineno="50783">
<summary>
Send and receive mpd_server packets.
</summary>
@@ -41849,7 +41933,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50781">
+<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50799">
<summary>
Do not audit attempts to send and receive mpd_server packets.
</summary>
@@ -41860,7 +41944,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mpd_server_packets" lineno="50796">
+<interface name="corenet_relabelto_mpd_server_packets" lineno="50814">
<summary>
Relabel packets to mpd_server the packet type.
</summary>
@@ -41870,7 +41954,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50818">
+<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50836">
<summary>
Send and receive TCP traffic on the msgsrvr port.
</summary>
@@ -41881,7 +41965,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_msgsrvr_port" lineno="50833">
+<interface name="corenet_udp_send_msgsrvr_port" lineno="50851">
<summary>
Send UDP traffic on the msgsrvr port.
</summary>
@@ -41892,7 +41976,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50848">
+<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50866">
<summary>
Do not audit attempts to send UDP traffic on the msgsrvr port.
</summary>
@@ -41903,7 +41987,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_msgsrvr_port" lineno="50863">
+<interface name="corenet_udp_receive_msgsrvr_port" lineno="50881">
<summary>
Receive UDP traffic on the msgsrvr port.
</summary>
@@ -41914,7 +41998,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50878">
+<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50896">
<summary>
Do not audit attempts to receive UDP traffic on the msgsrvr port.
</summary>
@@ -41925,7 +42009,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50893">
+<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50911">
<summary>
Send and receive UDP traffic on the msgsrvr port.
</summary>
@@ -41936,7 +42020,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50909">
+<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50927">
<summary>
Do not audit attempts to send and receive
UDP traffic on the msgsrvr port.
@@ -41948,7 +42032,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50924">
+<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50942">
<summary>
Bind TCP sockets to the msgsrvr port.
</summary>
@@ -41959,7 +42043,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_msgsrvr_port" lineno="50944">
+<interface name="corenet_udp_bind_msgsrvr_port" lineno="50962">
<summary>
Bind UDP sockets to the msgsrvr port.
</summary>
@@ -41970,7 +42054,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50963">
+<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50981">
<summary>
Make a TCP connection to the msgsrvr port.
</summary>
@@ -41980,7 +42064,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msgsrvr_client_packets" lineno="50983">
+<interface name="corenet_send_msgsrvr_client_packets" lineno="51001">
<summary>
Send msgsrvr_client packets.
</summary>
@@ -41991,7 +42075,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="51002">
+<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="51020">
<summary>
Do not audit attempts to send msgsrvr_client packets.
</summary>
@@ -42002,7 +42086,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msgsrvr_client_packets" lineno="51021">
+<interface name="corenet_receive_msgsrvr_client_packets" lineno="51039">
<summary>
Receive msgsrvr_client packets.
</summary>
@@ -42013,7 +42097,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="51040">
+<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="51058">
<summary>
Do not audit attempts to receive msgsrvr_client packets.
</summary>
@@ -42024,7 +42108,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="51059">
+<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="51077">
<summary>
Send and receive msgsrvr_client packets.
</summary>
@@ -42035,7 +42119,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="51075">
+<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="51093">
<summary>
Do not audit attempts to send and receive msgsrvr_client packets.
</summary>
@@ -42046,7 +42130,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="51090">
+<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="51108">
<summary>
Relabel packets to msgsrvr_client the packet type.
</summary>
@@ -42056,7 +42140,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msgsrvr_server_packets" lineno="51110">
+<interface name="corenet_send_msgsrvr_server_packets" lineno="51128">
<summary>
Send msgsrvr_server packets.
</summary>
@@ -42067,7 +42151,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51129">
+<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51147">
<summary>
Do not audit attempts to send msgsrvr_server packets.
</summary>
@@ -42078,7 +42162,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msgsrvr_server_packets" lineno="51148">
+<interface name="corenet_receive_msgsrvr_server_packets" lineno="51166">
<summary>
Receive msgsrvr_server packets.
</summary>
@@ -42089,7 +42173,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51167">
+<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51185">
<summary>
Do not audit attempts to receive msgsrvr_server packets.
</summary>
@@ -42100,7 +42184,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51186">
+<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51204">
<summary>
Send and receive msgsrvr_server packets.
</summary>
@@ -42111,7 +42195,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51202">
+<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51220">
<summary>
Do not audit attempts to send and receive msgsrvr_server packets.
</summary>
@@ -42122,7 +42206,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51217">
+<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51235">
<summary>
Relabel packets to msgsrvr_server the packet type.
</summary>
@@ -42132,7 +42216,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51239">
+<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51257">
<summary>
Send and receive TCP traffic on the msnp port.
</summary>
@@ -42143,7 +42227,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_msnp_port" lineno="51254">
+<interface name="corenet_udp_send_msnp_port" lineno="51272">
<summary>
Send UDP traffic on the msnp port.
</summary>
@@ -42154,7 +42238,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51269">
+<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51287">
<summary>
Do not audit attempts to send UDP traffic on the msnp port.
</summary>
@@ -42165,7 +42249,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_msnp_port" lineno="51284">
+<interface name="corenet_udp_receive_msnp_port" lineno="51302">
<summary>
Receive UDP traffic on the msnp port.
</summary>
@@ -42176,7 +42260,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51299">
+<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51317">
<summary>
Do not audit attempts to receive UDP traffic on the msnp port.
</summary>
@@ -42187,7 +42271,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_msnp_port" lineno="51314">
+<interface name="corenet_udp_sendrecv_msnp_port" lineno="51332">
<summary>
Send and receive UDP traffic on the msnp port.
</summary>
@@ -42198,7 +42282,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51330">
+<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51348">
<summary>
Do not audit attempts to send and receive
UDP traffic on the msnp port.
@@ -42210,7 +42294,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_msnp_port" lineno="51345">
+<interface name="corenet_tcp_bind_msnp_port" lineno="51363">
<summary>
Bind TCP sockets to the msnp port.
</summary>
@@ -42221,7 +42305,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_msnp_port" lineno="51365">
+<interface name="corenet_udp_bind_msnp_port" lineno="51383">
<summary>
Bind UDP sockets to the msnp port.
</summary>
@@ -42232,7 +42316,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_msnp_port" lineno="51384">
+<interface name="corenet_tcp_connect_msnp_port" lineno="51402">
<summary>
Make a TCP connection to the msnp port.
</summary>
@@ -42242,7 +42326,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msnp_client_packets" lineno="51404">
+<interface name="corenet_send_msnp_client_packets" lineno="51422">
<summary>
Send msnp_client packets.
</summary>
@@ -42253,7 +42337,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51423">
+<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51441">
<summary>
Do not audit attempts to send msnp_client packets.
</summary>
@@ -42264,7 +42348,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msnp_client_packets" lineno="51442">
+<interface name="corenet_receive_msnp_client_packets" lineno="51460">
<summary>
Receive msnp_client packets.
</summary>
@@ -42275,7 +42359,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51461">
+<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51479">
<summary>
Do not audit attempts to receive msnp_client packets.
</summary>
@@ -42286,7 +42370,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msnp_client_packets" lineno="51480">
+<interface name="corenet_sendrecv_msnp_client_packets" lineno="51498">
<summary>
Send and receive msnp_client packets.
</summary>
@@ -42297,7 +42381,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51496">
+<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51514">
<summary>
Do not audit attempts to send and receive msnp_client packets.
</summary>
@@ -42308,7 +42392,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msnp_client_packets" lineno="51511">
+<interface name="corenet_relabelto_msnp_client_packets" lineno="51529">
<summary>
Relabel packets to msnp_client the packet type.
</summary>
@@ -42318,7 +42402,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msnp_server_packets" lineno="51531">
+<interface name="corenet_send_msnp_server_packets" lineno="51549">
<summary>
Send msnp_server packets.
</summary>
@@ -42329,7 +42413,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51550">
+<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51568">
<summary>
Do not audit attempts to send msnp_server packets.
</summary>
@@ -42340,7 +42424,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msnp_server_packets" lineno="51569">
+<interface name="corenet_receive_msnp_server_packets" lineno="51587">
<summary>
Receive msnp_server packets.
</summary>
@@ -42351,7 +42435,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51588">
+<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51606">
<summary>
Do not audit attempts to receive msnp_server packets.
</summary>
@@ -42362,7 +42446,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msnp_server_packets" lineno="51607">
+<interface name="corenet_sendrecv_msnp_server_packets" lineno="51625">
<summary>
Send and receive msnp_server packets.
</summary>
@@ -42373,7 +42457,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51623">
+<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51641">
<summary>
Do not audit attempts to send and receive msnp_server packets.
</summary>
@@ -42384,7 +42468,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msnp_server_packets" lineno="51638">
+<interface name="corenet_relabelto_msnp_server_packets" lineno="51656">
<summary>
Relabel packets to msnp_server the packet type.
</summary>
@@ -42394,7 +42478,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51660">
+<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51678">
<summary>
Send and receive TCP traffic on the mssql port.
</summary>
@@ -42405,7 +42489,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mssql_port" lineno="51675">
+<interface name="corenet_udp_send_mssql_port" lineno="51693">
<summary>
Send UDP traffic on the mssql port.
</summary>
@@ -42416,7 +42500,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51690">
+<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51708">
<summary>
Do not audit attempts to send UDP traffic on the mssql port.
</summary>
@@ -42427,7 +42511,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mssql_port" lineno="51705">
+<interface name="corenet_udp_receive_mssql_port" lineno="51723">
<summary>
Receive UDP traffic on the mssql port.
</summary>
@@ -42438,7 +42522,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51720">
+<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51738">
<summary>
Do not audit attempts to receive UDP traffic on the mssql port.
</summary>
@@ -42449,7 +42533,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mssql_port" lineno="51735">
+<interface name="corenet_udp_sendrecv_mssql_port" lineno="51753">
<summary>
Send and receive UDP traffic on the mssql port.
</summary>
@@ -42460,7 +42544,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51751">
+<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51769">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mssql port.
@@ -42472,7 +42556,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mssql_port" lineno="51766">
+<interface name="corenet_tcp_bind_mssql_port" lineno="51784">
<summary>
Bind TCP sockets to the mssql port.
</summary>
@@ -42483,7 +42567,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mssql_port" lineno="51786">
+<interface name="corenet_udp_bind_mssql_port" lineno="51804">
<summary>
Bind UDP sockets to the mssql port.
</summary>
@@ -42494,7 +42578,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mssql_port" lineno="51805">
+<interface name="corenet_tcp_connect_mssql_port" lineno="51823">
<summary>
Make a TCP connection to the mssql port.
</summary>
@@ -42504,7 +42588,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mssql_client_packets" lineno="51825">
+<interface name="corenet_send_mssql_client_packets" lineno="51843">
<summary>
Send mssql_client packets.
</summary>
@@ -42515,7 +42599,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51844">
+<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51862">
<summary>
Do not audit attempts to send mssql_client packets.
</summary>
@@ -42526,7 +42610,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mssql_client_packets" lineno="51863">
+<interface name="corenet_receive_mssql_client_packets" lineno="51881">
<summary>
Receive mssql_client packets.
</summary>
@@ -42537,7 +42621,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51882">
+<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51900">
<summary>
Do not audit attempts to receive mssql_client packets.
</summary>
@@ -42548,7 +42632,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mssql_client_packets" lineno="51901">
+<interface name="corenet_sendrecv_mssql_client_packets" lineno="51919">
<summary>
Send and receive mssql_client packets.
</summary>
@@ -42559,7 +42643,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51917">
+<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51935">
<summary>
Do not audit attempts to send and receive mssql_client packets.
</summary>
@@ -42570,7 +42654,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mssql_client_packets" lineno="51932">
+<interface name="corenet_relabelto_mssql_client_packets" lineno="51950">
<summary>
Relabel packets to mssql_client the packet type.
</summary>
@@ -42580,7 +42664,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mssql_server_packets" lineno="51952">
+<interface name="corenet_send_mssql_server_packets" lineno="51970">
<summary>
Send mssql_server packets.
</summary>
@@ -42591,7 +42675,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51971">
+<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51989">
<summary>
Do not audit attempts to send mssql_server packets.
</summary>
@@ -42602,7 +42686,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mssql_server_packets" lineno="51990">
+<interface name="corenet_receive_mssql_server_packets" lineno="52008">
<summary>
Receive mssql_server packets.
</summary>
@@ -42613,7 +42697,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="52009">
+<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="52027">
<summary>
Do not audit attempts to receive mssql_server packets.
</summary>
@@ -42624,7 +42708,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mssql_server_packets" lineno="52028">
+<interface name="corenet_sendrecv_mssql_server_packets" lineno="52046">
<summary>
Send and receive mssql_server packets.
</summary>
@@ -42635,7 +42719,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="52044">
+<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="52062">
<summary>
Do not audit attempts to send and receive mssql_server packets.
</summary>
@@ -42646,7 +42730,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mssql_server_packets" lineno="52059">
+<interface name="corenet_relabelto_mssql_server_packets" lineno="52077">
<summary>
Relabel packets to mssql_server the packet type.
</summary>
@@ -42656,7 +42740,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="52081">
+<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="52099">
<summary>
Send and receive TCP traffic on the ms_streaming port.
</summary>
@@ -42667,7 +42751,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ms_streaming_port" lineno="52096">
+<interface name="corenet_udp_send_ms_streaming_port" lineno="52114">
<summary>
Send UDP traffic on the ms_streaming port.
</summary>
@@ -42678,7 +42762,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="52111">
+<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="52129">
<summary>
Do not audit attempts to send UDP traffic on the ms_streaming port.
</summary>
@@ -42689,7 +42773,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ms_streaming_port" lineno="52126">
+<interface name="corenet_udp_receive_ms_streaming_port" lineno="52144">
<summary>
Receive UDP traffic on the ms_streaming port.
</summary>
@@ -42700,7 +42784,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52141">
+<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52159">
<summary>
Do not audit attempts to receive UDP traffic on the ms_streaming port.
</summary>
@@ -42711,7 +42795,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52156">
+<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52174">
<summary>
Send and receive UDP traffic on the ms_streaming port.
</summary>
@@ -42722,7 +42806,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52172">
+<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52190">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ms_streaming port.
@@ -42734,7 +42818,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52187">
+<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52205">
<summary>
Bind TCP sockets to the ms_streaming port.
</summary>
@@ -42745,7 +42829,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ms_streaming_port" lineno="52207">
+<interface name="corenet_udp_bind_ms_streaming_port" lineno="52225">
<summary>
Bind UDP sockets to the ms_streaming port.
</summary>
@@ -42756,7 +42840,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52226">
+<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52244">
<summary>
Make a TCP connection to the ms_streaming port.
</summary>
@@ -42766,7 +42850,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ms_streaming_client_packets" lineno="52246">
+<interface name="corenet_send_ms_streaming_client_packets" lineno="52264">
<summary>
Send ms_streaming_client packets.
</summary>
@@ -42777,7 +42861,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52265">
+<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52283">
<summary>
Do not audit attempts to send ms_streaming_client packets.
</summary>
@@ -42788,7 +42872,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ms_streaming_client_packets" lineno="52284">
+<interface name="corenet_receive_ms_streaming_client_packets" lineno="52302">
<summary>
Receive ms_streaming_client packets.
</summary>
@@ -42799,7 +42883,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52303">
+<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52321">
<summary>
Do not audit attempts to receive ms_streaming_client packets.
</summary>
@@ -42810,7 +42894,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52322">
+<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52340">
<summary>
Send and receive ms_streaming_client packets.
</summary>
@@ -42821,7 +42905,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52338">
+<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52356">
<summary>
Do not audit attempts to send and receive ms_streaming_client packets.
</summary>
@@ -42832,7 +42916,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52353">
+<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52371">
<summary>
Relabel packets to ms_streaming_client the packet type.
</summary>
@@ -42842,7 +42926,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ms_streaming_server_packets" lineno="52373">
+<interface name="corenet_send_ms_streaming_server_packets" lineno="52391">
<summary>
Send ms_streaming_server packets.
</summary>
@@ -42853,7 +42937,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52392">
+<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52410">
<summary>
Do not audit attempts to send ms_streaming_server packets.
</summary>
@@ -42864,7 +42948,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ms_streaming_server_packets" lineno="52411">
+<interface name="corenet_receive_ms_streaming_server_packets" lineno="52429">
<summary>
Receive ms_streaming_server packets.
</summary>
@@ -42875,7 +42959,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52430">
+<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52448">
<summary>
Do not audit attempts to receive ms_streaming_server packets.
</summary>
@@ -42886,7 +42970,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52449">
+<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52467">
<summary>
Send and receive ms_streaming_server packets.
</summary>
@@ -42897,7 +42981,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52465">
+<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52483">
<summary>
Do not audit attempts to send and receive ms_streaming_server packets.
</summary>
@@ -42908,7 +42992,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52480">
+<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52498">
<summary>
Relabel packets to ms_streaming_server the packet type.
</summary>
@@ -42918,7 +43002,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_munin_port" lineno="52502">
+<interface name="corenet_tcp_sendrecv_munin_port" lineno="52520">
<summary>
Send and receive TCP traffic on the munin port.
</summary>
@@ -42929,7 +43013,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_munin_port" lineno="52517">
+<interface name="corenet_udp_send_munin_port" lineno="52535">
<summary>
Send UDP traffic on the munin port.
</summary>
@@ -42940,7 +43024,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52532">
+<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52550">
<summary>
Do not audit attempts to send UDP traffic on the munin port.
</summary>
@@ -42951,7 +43035,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_munin_port" lineno="52547">
+<interface name="corenet_udp_receive_munin_port" lineno="52565">
<summary>
Receive UDP traffic on the munin port.
</summary>
@@ -42962,7 +43046,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52562">
+<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52580">
<summary>
Do not audit attempts to receive UDP traffic on the munin port.
</summary>
@@ -42973,7 +43057,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_munin_port" lineno="52577">
+<interface name="corenet_udp_sendrecv_munin_port" lineno="52595">
<summary>
Send and receive UDP traffic on the munin port.
</summary>
@@ -42984,7 +43068,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52593">
+<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52611">
<summary>
Do not audit attempts to send and receive
UDP traffic on the munin port.
@@ -42996,7 +43080,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_munin_port" lineno="52608">
+<interface name="corenet_tcp_bind_munin_port" lineno="52626">
<summary>
Bind TCP sockets to the munin port.
</summary>
@@ -43007,7 +43091,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_munin_port" lineno="52628">
+<interface name="corenet_udp_bind_munin_port" lineno="52646">
<summary>
Bind UDP sockets to the munin port.
</summary>
@@ -43018,7 +43102,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_munin_port" lineno="52647">
+<interface name="corenet_tcp_connect_munin_port" lineno="52665">
<summary>
Make a TCP connection to the munin port.
</summary>
@@ -43028,7 +43112,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_munin_client_packets" lineno="52667">
+<interface name="corenet_send_munin_client_packets" lineno="52685">
<summary>
Send munin_client packets.
</summary>
@@ -43039,7 +43123,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52686">
+<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52704">
<summary>
Do not audit attempts to send munin_client packets.
</summary>
@@ -43050,7 +43134,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_munin_client_packets" lineno="52705">
+<interface name="corenet_receive_munin_client_packets" lineno="52723">
<summary>
Receive munin_client packets.
</summary>
@@ -43061,7 +43145,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52724">
+<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52742">
<summary>
Do not audit attempts to receive munin_client packets.
</summary>
@@ -43072,7 +43156,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_munin_client_packets" lineno="52743">
+<interface name="corenet_sendrecv_munin_client_packets" lineno="52761">
<summary>
Send and receive munin_client packets.
</summary>
@@ -43083,7 +43167,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52759">
+<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52777">
<summary>
Do not audit attempts to send and receive munin_client packets.
</summary>
@@ -43094,7 +43178,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_munin_client_packets" lineno="52774">
+<interface name="corenet_relabelto_munin_client_packets" lineno="52792">
<summary>
Relabel packets to munin_client the packet type.
</summary>
@@ -43104,7 +43188,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_munin_server_packets" lineno="52794">
+<interface name="corenet_send_munin_server_packets" lineno="52812">
<summary>
Send munin_server packets.
</summary>
@@ -43115,7 +43199,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52813">
+<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52831">
<summary>
Do not audit attempts to send munin_server packets.
</summary>
@@ -43126,7 +43210,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_munin_server_packets" lineno="52832">
+<interface name="corenet_receive_munin_server_packets" lineno="52850">
<summary>
Receive munin_server packets.
</summary>
@@ -43137,7 +43221,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52851">
+<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52869">
<summary>
Do not audit attempts to receive munin_server packets.
</summary>
@@ -43148,7 +43232,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_munin_server_packets" lineno="52870">
+<interface name="corenet_sendrecv_munin_server_packets" lineno="52888">
<summary>
Send and receive munin_server packets.
</summary>
@@ -43159,7 +43243,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52886">
+<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52904">
<summary>
Do not audit attempts to send and receive munin_server packets.
</summary>
@@ -43170,7 +43254,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_munin_server_packets" lineno="52901">
+<interface name="corenet_relabelto_munin_server_packets" lineno="52919">
<summary>
Relabel packets to munin_server the packet type.
</summary>
@@ -43180,7 +43264,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52923">
+<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52941">
<summary>
Send and receive TCP traffic on the mxi port.
</summary>
@@ -43191,7 +43275,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mxi_port" lineno="52938">
+<interface name="corenet_udp_send_mxi_port" lineno="52956">
<summary>
Send UDP traffic on the mxi port.
</summary>
@@ -43202,7 +43286,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52953">
+<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52971">
<summary>
Do not audit attempts to send UDP traffic on the mxi port.
</summary>
@@ -43213,7 +43297,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mxi_port" lineno="52968">
+<interface name="corenet_udp_receive_mxi_port" lineno="52986">
<summary>
Receive UDP traffic on the mxi port.
</summary>
@@ -43224,7 +43308,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="52983">
+<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="53001">
<summary>
Do not audit attempts to receive UDP traffic on the mxi port.
</summary>
@@ -43235,7 +43319,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mxi_port" lineno="52998">
+<interface name="corenet_udp_sendrecv_mxi_port" lineno="53016">
<summary>
Send and receive UDP traffic on the mxi port.
</summary>
@@ -43246,7 +43330,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="53014">
+<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="53032">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mxi port.
@@ -43258,7 +43342,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mxi_port" lineno="53029">
+<interface name="corenet_tcp_bind_mxi_port" lineno="53047">
<summary>
Bind TCP sockets to the mxi port.
</summary>
@@ -43269,7 +43353,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mxi_port" lineno="53049">
+<interface name="corenet_udp_bind_mxi_port" lineno="53067">
<summary>
Bind UDP sockets to the mxi port.
</summary>
@@ -43280,7 +43364,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mxi_port" lineno="53068">
+<interface name="corenet_tcp_connect_mxi_port" lineno="53086">
<summary>
Make a TCP connection to the mxi port.
</summary>
@@ -43290,7 +43374,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mxi_client_packets" lineno="53088">
+<interface name="corenet_send_mxi_client_packets" lineno="53106">
<summary>
Send mxi_client packets.
</summary>
@@ -43301,7 +43385,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="53107">
+<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="53125">
<summary>
Do not audit attempts to send mxi_client packets.
</summary>
@@ -43312,7 +43396,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mxi_client_packets" lineno="53126">
+<interface name="corenet_receive_mxi_client_packets" lineno="53144">
<summary>
Receive mxi_client packets.
</summary>
@@ -43323,7 +43407,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53145">
+<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53163">
<summary>
Do not audit attempts to receive mxi_client packets.
</summary>
@@ -43334,7 +43418,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mxi_client_packets" lineno="53164">
+<interface name="corenet_sendrecv_mxi_client_packets" lineno="53182">
<summary>
Send and receive mxi_client packets.
</summary>
@@ -43345,7 +43429,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53180">
+<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53198">
<summary>
Do not audit attempts to send and receive mxi_client packets.
</summary>
@@ -43356,7 +43440,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mxi_client_packets" lineno="53195">
+<interface name="corenet_relabelto_mxi_client_packets" lineno="53213">
<summary>
Relabel packets to mxi_client the packet type.
</summary>
@@ -43366,7 +43450,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mxi_server_packets" lineno="53215">
+<interface name="corenet_send_mxi_server_packets" lineno="53233">
<summary>
Send mxi_server packets.
</summary>
@@ -43377,7 +43461,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53234">
+<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53252">
<summary>
Do not audit attempts to send mxi_server packets.
</summary>
@@ -43388,7 +43472,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mxi_server_packets" lineno="53253">
+<interface name="corenet_receive_mxi_server_packets" lineno="53271">
<summary>
Receive mxi_server packets.
</summary>
@@ -43399,7 +43483,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53272">
+<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53290">
<summary>
Do not audit attempts to receive mxi_server packets.
</summary>
@@ -43410,7 +43494,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mxi_server_packets" lineno="53291">
+<interface name="corenet_sendrecv_mxi_server_packets" lineno="53309">
<summary>
Send and receive mxi_server packets.
</summary>
@@ -43421,7 +43505,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53307">
+<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53325">
<summary>
Do not audit attempts to send and receive mxi_server packets.
</summary>
@@ -43432,7 +43516,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mxi_server_packets" lineno="53322">
+<interface name="corenet_relabelto_mxi_server_packets" lineno="53340">
<summary>
Relabel packets to mxi_server the packet type.
</summary>
@@ -43442,7 +43526,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53344">
+<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53362">
<summary>
Send and receive TCP traffic on the mysqld port.
</summary>
@@ -43453,7 +43537,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mysqld_port" lineno="53359">
+<interface name="corenet_udp_send_mysqld_port" lineno="53377">
<summary>
Send UDP traffic on the mysqld port.
</summary>
@@ -43464,7 +43548,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53374">
+<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53392">
<summary>
Do not audit attempts to send UDP traffic on the mysqld port.
</summary>
@@ -43475,7 +43559,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mysqld_port" lineno="53389">
+<interface name="corenet_udp_receive_mysqld_port" lineno="53407">
<summary>
Receive UDP traffic on the mysqld port.
</summary>
@@ -43486,7 +43570,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53404">
+<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53422">
<summary>
Do not audit attempts to receive UDP traffic on the mysqld port.
</summary>
@@ -43497,7 +43581,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53419">
+<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53437">
<summary>
Send and receive UDP traffic on the mysqld port.
</summary>
@@ -43508,7 +43592,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53435">
+<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53453">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mysqld port.
@@ -43520,7 +43604,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mysqld_port" lineno="53450">
+<interface name="corenet_tcp_bind_mysqld_port" lineno="53468">
<summary>
Bind TCP sockets to the mysqld port.
</summary>
@@ -43531,7 +43615,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mysqld_port" lineno="53470">
+<interface name="corenet_udp_bind_mysqld_port" lineno="53488">
<summary>
Bind UDP sockets to the mysqld port.
</summary>
@@ -43542,7 +43626,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mysqld_port" lineno="53489">
+<interface name="corenet_tcp_connect_mysqld_port" lineno="53507">
<summary>
Make a TCP connection to the mysqld port.
</summary>
@@ -43552,7 +43636,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqld_client_packets" lineno="53509">
+<interface name="corenet_send_mysqld_client_packets" lineno="53527">
<summary>
Send mysqld_client packets.
</summary>
@@ -43563,7 +43647,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53528">
+<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53546">
<summary>
Do not audit attempts to send mysqld_client packets.
</summary>
@@ -43574,7 +43658,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqld_client_packets" lineno="53547">
+<interface name="corenet_receive_mysqld_client_packets" lineno="53565">
<summary>
Receive mysqld_client packets.
</summary>
@@ -43585,7 +43669,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53566">
+<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53584">
<summary>
Do not audit attempts to receive mysqld_client packets.
</summary>
@@ -43596,7 +43680,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53585">
+<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53603">
<summary>
Send and receive mysqld_client packets.
</summary>
@@ -43607,7 +43691,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53601">
+<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53619">
<summary>
Do not audit attempts to send and receive mysqld_client packets.
</summary>
@@ -43618,7 +43702,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqld_client_packets" lineno="53616">
+<interface name="corenet_relabelto_mysqld_client_packets" lineno="53634">
<summary>
Relabel packets to mysqld_client the packet type.
</summary>
@@ -43628,7 +43712,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqld_server_packets" lineno="53636">
+<interface name="corenet_send_mysqld_server_packets" lineno="53654">
<summary>
Send mysqld_server packets.
</summary>
@@ -43639,7 +43723,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53655">
+<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53673">
<summary>
Do not audit attempts to send mysqld_server packets.
</summary>
@@ -43650,7 +43734,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqld_server_packets" lineno="53674">
+<interface name="corenet_receive_mysqld_server_packets" lineno="53692">
<summary>
Receive mysqld_server packets.
</summary>
@@ -43661,7 +43745,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53693">
+<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53711">
<summary>
Do not audit attempts to receive mysqld_server packets.
</summary>
@@ -43672,7 +43756,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53712">
+<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53730">
<summary>
Send and receive mysqld_server packets.
</summary>
@@ -43683,7 +43767,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53728">
+<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53746">
<summary>
Do not audit attempts to send and receive mysqld_server packets.
</summary>
@@ -43694,7 +43778,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqld_server_packets" lineno="53743">
+<interface name="corenet_relabelto_mysqld_server_packets" lineno="53761">
<summary>
Relabel packets to mysqld_server the packet type.
</summary>
@@ -43704,7 +43788,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53765">
+<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53783">
<summary>
Send and receive TCP traffic on the mysqlmanagerd port.
</summary>
@@ -43715,7 +43799,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53780">
+<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53798">
<summary>
Send UDP traffic on the mysqlmanagerd port.
</summary>
@@ -43726,7 +43810,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53795">
+<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53813">
<summary>
Do not audit attempts to send UDP traffic on the mysqlmanagerd port.
</summary>
@@ -43737,7 +43821,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53810">
+<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53828">
<summary>
Receive UDP traffic on the mysqlmanagerd port.
</summary>
@@ -43748,7 +43832,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53825">
+<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53843">
<summary>
Do not audit attempts to receive UDP traffic on the mysqlmanagerd port.
</summary>
@@ -43759,7 +43843,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53840">
+<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53858">
<summary>
Send and receive UDP traffic on the mysqlmanagerd port.
</summary>
@@ -43770,7 +43854,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53856">
+<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53874">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mysqlmanagerd port.
@@ -43782,7 +43866,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53871">
+<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53889">
<summary>
Bind TCP sockets to the mysqlmanagerd port.
</summary>
@@ -43793,7 +43877,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53891">
+<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53909">
<summary>
Bind UDP sockets to the mysqlmanagerd port.
</summary>
@@ -43804,7 +43888,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53910">
+<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53928">
<summary>
Make a TCP connection to the mysqlmanagerd port.
</summary>
@@ -43814,7 +43898,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53930">
+<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53948">
<summary>
Send mysqlmanagerd_client packets.
</summary>
@@ -43825,7 +43909,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53949">
+<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53967">
<summary>
Do not audit attempts to send mysqlmanagerd_client packets.
</summary>
@@ -43836,7 +43920,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53968">
+<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53986">
<summary>
Receive mysqlmanagerd_client packets.
</summary>
@@ -43847,7 +43931,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="53987">
+<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="54005">
<summary>
Do not audit attempts to receive mysqlmanagerd_client packets.
</summary>
@@ -43858,7 +43942,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="54006">
+<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="54024">
<summary>
Send and receive mysqlmanagerd_client packets.
</summary>
@@ -43869,7 +43953,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="54022">
+<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="54040">
<summary>
Do not audit attempts to send and receive mysqlmanagerd_client packets.
</summary>
@@ -43880,7 +43964,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="54037">
+<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="54055">
<summary>
Relabel packets to mysqlmanagerd_client the packet type.
</summary>
@@ -43890,7 +43974,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="54057">
+<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="54075">
<summary>
Send mysqlmanagerd_server packets.
</summary>
@@ -43901,7 +43985,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="54076">
+<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="54094">
<summary>
Do not audit attempts to send mysqlmanagerd_server packets.
</summary>
@@ -43912,7 +43996,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="54095">
+<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="54113">
<summary>
Receive mysqlmanagerd_server packets.
</summary>
@@ -43923,7 +44007,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="54114">
+<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="54132">
<summary>
Do not audit attempts to receive mysqlmanagerd_server packets.
</summary>
@@ -43934,7 +44018,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54133">
+<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54151">
<summary>
Send and receive mysqlmanagerd_server packets.
</summary>
@@ -43945,7 +44029,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54149">
+<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54167">
<summary>
Do not audit attempts to send and receive mysqlmanagerd_server packets.
</summary>
@@ -43956,7 +44040,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54164">
+<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54182">
<summary>
Relabel packets to mysqlmanagerd_server the packet type.
</summary>
@@ -43966,7 +44050,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54186">
+<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54204">
<summary>
Send and receive TCP traffic on the nessus port.
</summary>
@@ -43977,7 +44061,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_nessus_port" lineno="54201">
+<interface name="corenet_udp_send_nessus_port" lineno="54219">
<summary>
Send UDP traffic on the nessus port.
</summary>
@@ -43988,7 +44072,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54216">
+<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54234">
<summary>
Do not audit attempts to send UDP traffic on the nessus port.
</summary>
@@ -43999,7 +44083,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_nessus_port" lineno="54231">
+<interface name="corenet_udp_receive_nessus_port" lineno="54249">
<summary>
Receive UDP traffic on the nessus port.
</summary>
@@ -44010,7 +44094,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54246">
+<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54264">
<summary>
Do not audit attempts to receive UDP traffic on the nessus port.
</summary>
@@ -44021,7 +44105,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_nessus_port" lineno="54261">
+<interface name="corenet_udp_sendrecv_nessus_port" lineno="54279">
<summary>
Send and receive UDP traffic on the nessus port.
</summary>
@@ -44032,7 +44116,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54277">
+<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54295">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nessus port.
@@ -44044,7 +44128,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_nessus_port" lineno="54292">
+<interface name="corenet_tcp_bind_nessus_port" lineno="54310">
<summary>
Bind TCP sockets to the nessus port.
</summary>
@@ -44055,7 +44139,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nessus_port" lineno="54312">
+<interface name="corenet_udp_bind_nessus_port" lineno="54330">
<summary>
Bind UDP sockets to the nessus port.
</summary>
@@ -44066,7 +44150,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nessus_port" lineno="54331">
+<interface name="corenet_tcp_connect_nessus_port" lineno="54349">
<summary>
Make a TCP connection to the nessus port.
</summary>
@@ -44076,7 +44160,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nessus_client_packets" lineno="54351">
+<interface name="corenet_send_nessus_client_packets" lineno="54369">
<summary>
Send nessus_client packets.
</summary>
@@ -44087,7 +44171,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54370">
+<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54388">
<summary>
Do not audit attempts to send nessus_client packets.
</summary>
@@ -44098,7 +44182,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nessus_client_packets" lineno="54389">
+<interface name="corenet_receive_nessus_client_packets" lineno="54407">
<summary>
Receive nessus_client packets.
</summary>
@@ -44109,7 +44193,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54408">
+<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54426">
<summary>
Do not audit attempts to receive nessus_client packets.
</summary>
@@ -44120,7 +44204,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nessus_client_packets" lineno="54427">
+<interface name="corenet_sendrecv_nessus_client_packets" lineno="54445">
<summary>
Send and receive nessus_client packets.
</summary>
@@ -44131,7 +44215,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54443">
+<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54461">
<summary>
Do not audit attempts to send and receive nessus_client packets.
</summary>
@@ -44142,7 +44226,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nessus_client_packets" lineno="54458">
+<interface name="corenet_relabelto_nessus_client_packets" lineno="54476">
<summary>
Relabel packets to nessus_client the packet type.
</summary>
@@ -44152,7 +44236,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nessus_server_packets" lineno="54478">
+<interface name="corenet_send_nessus_server_packets" lineno="54496">
<summary>
Send nessus_server packets.
</summary>
@@ -44163,7 +44247,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54497">
+<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54515">
<summary>
Do not audit attempts to send nessus_server packets.
</summary>
@@ -44174,7 +44258,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nessus_server_packets" lineno="54516">
+<interface name="corenet_receive_nessus_server_packets" lineno="54534">
<summary>
Receive nessus_server packets.
</summary>
@@ -44185,7 +44269,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54535">
+<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54553">
<summary>
Do not audit attempts to receive nessus_server packets.
</summary>
@@ -44196,7 +44280,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nessus_server_packets" lineno="54554">
+<interface name="corenet_sendrecv_nessus_server_packets" lineno="54572">
<summary>
Send and receive nessus_server packets.
</summary>
@@ -44207,7 +44291,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54570">
+<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54588">
<summary>
Do not audit attempts to send and receive nessus_server packets.
</summary>
@@ -44218,7 +44302,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nessus_server_packets" lineno="54585">
+<interface name="corenet_relabelto_nessus_server_packets" lineno="54603">
<summary>
Relabel packets to nessus_server the packet type.
</summary>
@@ -44228,7 +44312,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_netport_port" lineno="54607">
+<interface name="corenet_tcp_sendrecv_netport_port" lineno="54625">
<summary>
Send and receive TCP traffic on the netport port.
</summary>
@@ -44239,7 +44323,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_netport_port" lineno="54622">
+<interface name="corenet_udp_send_netport_port" lineno="54640">
<summary>
Send UDP traffic on the netport port.
</summary>
@@ -44250,7 +44334,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54637">
+<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54655">
<summary>
Do not audit attempts to send UDP traffic on the netport port.
</summary>
@@ -44261,7 +44345,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_netport_port" lineno="54652">
+<interface name="corenet_udp_receive_netport_port" lineno="54670">
<summary>
Receive UDP traffic on the netport port.
</summary>
@@ -44272,7 +44356,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54667">
+<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54685">
<summary>
Do not audit attempts to receive UDP traffic on the netport port.
</summary>
@@ -44283,7 +44367,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_netport_port" lineno="54682">
+<interface name="corenet_udp_sendrecv_netport_port" lineno="54700">
<summary>
Send and receive UDP traffic on the netport port.
</summary>
@@ -44294,7 +44378,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54698">
+<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54716">
<summary>
Do not audit attempts to send and receive
UDP traffic on the netport port.
@@ -44306,7 +44390,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_netport_port" lineno="54713">
+<interface name="corenet_tcp_bind_netport_port" lineno="54731">
<summary>
Bind TCP sockets to the netport port.
</summary>
@@ -44317,7 +44401,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_netport_port" lineno="54733">
+<interface name="corenet_udp_bind_netport_port" lineno="54751">
<summary>
Bind UDP sockets to the netport port.
</summary>
@@ -44328,7 +44412,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_netport_port" lineno="54752">
+<interface name="corenet_tcp_connect_netport_port" lineno="54770">
<summary>
Make a TCP connection to the netport port.
</summary>
@@ -44338,7 +44422,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netport_client_packets" lineno="54772">
+<interface name="corenet_send_netport_client_packets" lineno="54790">
<summary>
Send netport_client packets.
</summary>
@@ -44349,7 +44433,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54791">
+<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54809">
<summary>
Do not audit attempts to send netport_client packets.
</summary>
@@ -44360,7 +44444,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netport_client_packets" lineno="54810">
+<interface name="corenet_receive_netport_client_packets" lineno="54828">
<summary>
Receive netport_client packets.
</summary>
@@ -44371,7 +44455,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54829">
+<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54847">
<summary>
Do not audit attempts to receive netport_client packets.
</summary>
@@ -44382,7 +44466,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netport_client_packets" lineno="54848">
+<interface name="corenet_sendrecv_netport_client_packets" lineno="54866">
<summary>
Send and receive netport_client packets.
</summary>
@@ -44393,7 +44477,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54864">
+<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54882">
<summary>
Do not audit attempts to send and receive netport_client packets.
</summary>
@@ -44404,7 +44488,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netport_client_packets" lineno="54879">
+<interface name="corenet_relabelto_netport_client_packets" lineno="54897">
<summary>
Relabel packets to netport_client the packet type.
</summary>
@@ -44414,7 +44498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netport_server_packets" lineno="54899">
+<interface name="corenet_send_netport_server_packets" lineno="54917">
<summary>
Send netport_server packets.
</summary>
@@ -44425,7 +44509,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54918">
+<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54936">
<summary>
Do not audit attempts to send netport_server packets.
</summary>
@@ -44436,7 +44520,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netport_server_packets" lineno="54937">
+<interface name="corenet_receive_netport_server_packets" lineno="54955">
<summary>
Receive netport_server packets.
</summary>
@@ -44447,7 +44531,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54956">
+<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54974">
<summary>
Do not audit attempts to receive netport_server packets.
</summary>
@@ -44458,7 +44542,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netport_server_packets" lineno="54975">
+<interface name="corenet_sendrecv_netport_server_packets" lineno="54993">
<summary>
Send and receive netport_server packets.
</summary>
@@ -44469,7 +44553,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="54991">
+<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="55009">
<summary>
Do not audit attempts to send and receive netport_server packets.
</summary>
@@ -44480,7 +44564,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netport_server_packets" lineno="55006">
+<interface name="corenet_relabelto_netport_server_packets" lineno="55024">
<summary>
Relabel packets to netport_server the packet type.
</summary>
@@ -44490,7 +44574,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="55028">
+<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="55046">
<summary>
Send and receive TCP traffic on the netsupport port.
</summary>
@@ -44501,7 +44585,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_netsupport_port" lineno="55043">
+<interface name="corenet_udp_send_netsupport_port" lineno="55061">
<summary>
Send UDP traffic on the netsupport port.
</summary>
@@ -44512,7 +44596,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="55058">
+<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="55076">
<summary>
Do not audit attempts to send UDP traffic on the netsupport port.
</summary>
@@ -44523,7 +44607,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_netsupport_port" lineno="55073">
+<interface name="corenet_udp_receive_netsupport_port" lineno="55091">
<summary>
Receive UDP traffic on the netsupport port.
</summary>
@@ -44534,7 +44618,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="55088">
+<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="55106">
<summary>
Do not audit attempts to receive UDP traffic on the netsupport port.
</summary>
@@ -44545,7 +44629,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_netsupport_port" lineno="55103">
+<interface name="corenet_udp_sendrecv_netsupport_port" lineno="55121">
<summary>
Send and receive UDP traffic on the netsupport port.
</summary>
@@ -44556,7 +44640,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="55119">
+<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="55137">
<summary>
Do not audit attempts to send and receive
UDP traffic on the netsupport port.
@@ -44568,7 +44652,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_netsupport_port" lineno="55134">
+<interface name="corenet_tcp_bind_netsupport_port" lineno="55152">
<summary>
Bind TCP sockets to the netsupport port.
</summary>
@@ -44579,7 +44663,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_netsupport_port" lineno="55154">
+<interface name="corenet_udp_bind_netsupport_port" lineno="55172">
<summary>
Bind UDP sockets to the netsupport port.
</summary>
@@ -44590,7 +44674,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_netsupport_port" lineno="55173">
+<interface name="corenet_tcp_connect_netsupport_port" lineno="55191">
<summary>
Make a TCP connection to the netsupport port.
</summary>
@@ -44600,7 +44684,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netsupport_client_packets" lineno="55193">
+<interface name="corenet_send_netsupport_client_packets" lineno="55211">
<summary>
Send netsupport_client packets.
</summary>
@@ -44611,7 +44695,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55212">
+<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55230">
<summary>
Do not audit attempts to send netsupport_client packets.
</summary>
@@ -44622,7 +44706,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netsupport_client_packets" lineno="55231">
+<interface name="corenet_receive_netsupport_client_packets" lineno="55249">
<summary>
Receive netsupport_client packets.
</summary>
@@ -44633,7 +44717,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55250">
+<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55268">
<summary>
Do not audit attempts to receive netsupport_client packets.
</summary>
@@ -44644,7 +44728,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55269">
+<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55287">
<summary>
Send and receive netsupport_client packets.
</summary>
@@ -44655,7 +44739,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55285">
+<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55303">
<summary>
Do not audit attempts to send and receive netsupport_client packets.
</summary>
@@ -44666,7 +44750,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netsupport_client_packets" lineno="55300">
+<interface name="corenet_relabelto_netsupport_client_packets" lineno="55318">
<summary>
Relabel packets to netsupport_client the packet type.
</summary>
@@ -44676,7 +44760,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netsupport_server_packets" lineno="55320">
+<interface name="corenet_send_netsupport_server_packets" lineno="55338">
<summary>
Send netsupport_server packets.
</summary>
@@ -44687,7 +44771,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55339">
+<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55357">
<summary>
Do not audit attempts to send netsupport_server packets.
</summary>
@@ -44698,7 +44782,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netsupport_server_packets" lineno="55358">
+<interface name="corenet_receive_netsupport_server_packets" lineno="55376">
<summary>
Receive netsupport_server packets.
</summary>
@@ -44709,7 +44793,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55377">
+<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55395">
<summary>
Do not audit attempts to receive netsupport_server packets.
</summary>
@@ -44720,7 +44804,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55396">
+<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55414">
<summary>
Send and receive netsupport_server packets.
</summary>
@@ -44731,7 +44815,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55412">
+<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55430">
<summary>
Do not audit attempts to send and receive netsupport_server packets.
</summary>
@@ -44742,7 +44826,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netsupport_server_packets" lineno="55427">
+<interface name="corenet_relabelto_netsupport_server_packets" lineno="55445">
<summary>
Relabel packets to netsupport_server the packet type.
</summary>
@@ -44752,7 +44836,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55449">
+<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55467">
<summary>
Send and receive TCP traffic on the nfs port.
</summary>
@@ -44763,7 +44847,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_nfs_port" lineno="55464">
+<interface name="corenet_udp_send_nfs_port" lineno="55482">
<summary>
Send UDP traffic on the nfs port.
</summary>
@@ -44774,7 +44858,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55479">
+<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55497">
<summary>
Do not audit attempts to send UDP traffic on the nfs port.
</summary>
@@ -44785,7 +44869,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_nfs_port" lineno="55494">
+<interface name="corenet_udp_receive_nfs_port" lineno="55512">
<summary>
Receive UDP traffic on the nfs port.
</summary>
@@ -44796,7 +44880,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55509">
+<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55527">
<summary>
Do not audit attempts to receive UDP traffic on the nfs port.
</summary>
@@ -44807,7 +44891,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_nfs_port" lineno="55524">
+<interface name="corenet_udp_sendrecv_nfs_port" lineno="55542">
<summary>
Send and receive UDP traffic on the nfs port.
</summary>
@@ -44818,7 +44902,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55540">
+<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55558">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nfs port.
@@ -44830,7 +44914,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_nfs_port" lineno="55555">
+<interface name="corenet_tcp_bind_nfs_port" lineno="55573">
<summary>
Bind TCP sockets to the nfs port.
</summary>
@@ -44841,7 +44925,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nfs_port" lineno="55575">
+<interface name="corenet_udp_bind_nfs_port" lineno="55593">
<summary>
Bind UDP sockets to the nfs port.
</summary>
@@ -44852,7 +44936,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nfs_port" lineno="55594">
+<interface name="corenet_tcp_connect_nfs_port" lineno="55612">
<summary>
Make a TCP connection to the nfs port.
</summary>
@@ -44862,7 +44946,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfs_client_packets" lineno="55614">
+<interface name="corenet_send_nfs_client_packets" lineno="55632">
<summary>
Send nfs_client packets.
</summary>
@@ -44873,7 +44957,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55633">
+<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55651">
<summary>
Do not audit attempts to send nfs_client packets.
</summary>
@@ -44884,7 +44968,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfs_client_packets" lineno="55652">
+<interface name="corenet_receive_nfs_client_packets" lineno="55670">
<summary>
Receive nfs_client packets.
</summary>
@@ -44895,7 +44979,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55671">
+<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55689">
<summary>
Do not audit attempts to receive nfs_client packets.
</summary>
@@ -44906,7 +44990,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfs_client_packets" lineno="55690">
+<interface name="corenet_sendrecv_nfs_client_packets" lineno="55708">
<summary>
Send and receive nfs_client packets.
</summary>
@@ -44917,7 +45001,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55706">
+<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55724">
<summary>
Do not audit attempts to send and receive nfs_client packets.
</summary>
@@ -44928,7 +45012,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfs_client_packets" lineno="55721">
+<interface name="corenet_relabelto_nfs_client_packets" lineno="55739">
<summary>
Relabel packets to nfs_client the packet type.
</summary>
@@ -44938,7 +45022,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfs_server_packets" lineno="55741">
+<interface name="corenet_send_nfs_server_packets" lineno="55759">
<summary>
Send nfs_server packets.
</summary>
@@ -44949,7 +45033,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55760">
+<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55778">
<summary>
Do not audit attempts to send nfs_server packets.
</summary>
@@ -44960,7 +45044,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfs_server_packets" lineno="55779">
+<interface name="corenet_receive_nfs_server_packets" lineno="55797">
<summary>
Receive nfs_server packets.
</summary>
@@ -44971,7 +45055,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55798">
+<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55816">
<summary>
Do not audit attempts to receive nfs_server packets.
</summary>
@@ -44982,7 +45066,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfs_server_packets" lineno="55817">
+<interface name="corenet_sendrecv_nfs_server_packets" lineno="55835">
<summary>
Send and receive nfs_server packets.
</summary>
@@ -44993,7 +45077,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55833">
+<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55851">
<summary>
Do not audit attempts to send and receive nfs_server packets.
</summary>
@@ -45004,7 +45088,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfs_server_packets" lineno="55848">
+<interface name="corenet_relabelto_nfs_server_packets" lineno="55866">
<summary>
Relabel packets to nfs_server the packet type.
</summary>
@@ -45014,7 +45098,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55870">
+<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55888">
<summary>
Send and receive TCP traffic on the nfsrdma port.
</summary>
@@ -45025,7 +45109,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_nfsrdma_port" lineno="55885">
+<interface name="corenet_udp_send_nfsrdma_port" lineno="55903">
<summary>
Send UDP traffic on the nfsrdma port.
</summary>
@@ -45036,7 +45120,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55900">
+<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55918">
<summary>
Do not audit attempts to send UDP traffic on the nfsrdma port.
</summary>
@@ -45047,7 +45131,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_nfsrdma_port" lineno="55915">
+<interface name="corenet_udp_receive_nfsrdma_port" lineno="55933">
<summary>
Receive UDP traffic on the nfsrdma port.
</summary>
@@ -45058,7 +45142,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55930">
+<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55948">
<summary>
Do not audit attempts to receive UDP traffic on the nfsrdma port.
</summary>
@@ -45069,7 +45153,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55945">
+<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55963">
<summary>
Send and receive UDP traffic on the nfsrdma port.
</summary>
@@ -45080,7 +45164,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55961">
+<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55979">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nfsrdma port.
@@ -45092,7 +45176,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55976">
+<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55994">
<summary>
Bind TCP sockets to the nfsrdma port.
</summary>
@@ -45103,7 +45187,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nfsrdma_port" lineno="55996">
+<interface name="corenet_udp_bind_nfsrdma_port" lineno="56014">
<summary>
Bind UDP sockets to the nfsrdma port.
</summary>
@@ -45114,7 +45198,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nfsrdma_port" lineno="56015">
+<interface name="corenet_tcp_connect_nfsrdma_port" lineno="56033">
<summary>
Make a TCP connection to the nfsrdma port.
</summary>
@@ -45124,7 +45208,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfsrdma_client_packets" lineno="56035">
+<interface name="corenet_send_nfsrdma_client_packets" lineno="56053">
<summary>
Send nfsrdma_client packets.
</summary>
@@ -45135,7 +45219,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="56054">
+<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="56072">
<summary>
Do not audit attempts to send nfsrdma_client packets.
</summary>
@@ -45146,7 +45230,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfsrdma_client_packets" lineno="56073">
+<interface name="corenet_receive_nfsrdma_client_packets" lineno="56091">
<summary>
Receive nfsrdma_client packets.
</summary>
@@ -45157,7 +45241,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="56092">
+<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="56110">
<summary>
Do not audit attempts to receive nfsrdma_client packets.
</summary>
@@ -45168,7 +45252,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="56111">
+<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="56129">
<summary>
Send and receive nfsrdma_client packets.
</summary>
@@ -45179,7 +45263,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56127">
+<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56145">
<summary>
Do not audit attempts to send and receive nfsrdma_client packets.
</summary>
@@ -45190,7 +45274,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56142">
+<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56160">
<summary>
Relabel packets to nfsrdma_client the packet type.
</summary>
@@ -45200,7 +45284,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfsrdma_server_packets" lineno="56162">
+<interface name="corenet_send_nfsrdma_server_packets" lineno="56180">
<summary>
Send nfsrdma_server packets.
</summary>
@@ -45211,7 +45295,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56181">
+<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56199">
<summary>
Do not audit attempts to send nfsrdma_server packets.
</summary>
@@ -45222,7 +45306,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfsrdma_server_packets" lineno="56200">
+<interface name="corenet_receive_nfsrdma_server_packets" lineno="56218">
<summary>
Receive nfsrdma_server packets.
</summary>
@@ -45233,7 +45317,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56219">
+<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56237">
<summary>
Do not audit attempts to receive nfsrdma_server packets.
</summary>
@@ -45244,7 +45328,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56238">
+<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56256">
<summary>
Send and receive nfsrdma_server packets.
</summary>
@@ -45255,7 +45339,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56254">
+<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56272">
<summary>
Do not audit attempts to send and receive nfsrdma_server packets.
</summary>
@@ -45266,7 +45350,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56269">
+<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56287">
<summary>
Relabel packets to nfsrdma_server the packet type.
</summary>
@@ -45276,7 +45360,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56291">
+<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56309">
<summary>
Send and receive TCP traffic on the nmbd port.
</summary>
@@ -45287,7 +45371,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_nmbd_port" lineno="56306">
+<interface name="corenet_udp_send_nmbd_port" lineno="56324">
<summary>
Send UDP traffic on the nmbd port.
</summary>
@@ -45298,7 +45382,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56321">
+<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56339">
<summary>
Do not audit attempts to send UDP traffic on the nmbd port.
</summary>
@@ -45309,7 +45393,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_nmbd_port" lineno="56336">
+<interface name="corenet_udp_receive_nmbd_port" lineno="56354">
<summary>
Receive UDP traffic on the nmbd port.
</summary>
@@ -45320,7 +45404,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56351">
+<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56369">
<summary>
Do not audit attempts to receive UDP traffic on the nmbd port.
</summary>
@@ -45331,7 +45415,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56366">
+<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56384">
<summary>
Send and receive UDP traffic on the nmbd port.
</summary>
@@ -45342,7 +45426,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56382">
+<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56400">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nmbd port.
@@ -45354,7 +45438,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_nmbd_port" lineno="56397">
+<interface name="corenet_tcp_bind_nmbd_port" lineno="56415">
<summary>
Bind TCP sockets to the nmbd port.
</summary>
@@ -45365,7 +45449,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nmbd_port" lineno="56417">
+<interface name="corenet_udp_bind_nmbd_port" lineno="56435">
<summary>
Bind UDP sockets to the nmbd port.
</summary>
@@ -45376,7 +45460,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nmbd_port" lineno="56436">
+<interface name="corenet_tcp_connect_nmbd_port" lineno="56454">
<summary>
Make a TCP connection to the nmbd port.
</summary>
@@ -45386,7 +45470,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nmbd_client_packets" lineno="56456">
+<interface name="corenet_send_nmbd_client_packets" lineno="56474">
<summary>
Send nmbd_client packets.
</summary>
@@ -45397,7 +45481,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56475">
+<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56493">
<summary>
Do not audit attempts to send nmbd_client packets.
</summary>
@@ -45408,7 +45492,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nmbd_client_packets" lineno="56494">
+<interface name="corenet_receive_nmbd_client_packets" lineno="56512">
<summary>
Receive nmbd_client packets.
</summary>
@@ -45419,7 +45503,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56513">
+<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56531">
<summary>
Do not audit attempts to receive nmbd_client packets.
</summary>
@@ -45430,7 +45514,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56532">
+<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56550">
<summary>
Send and receive nmbd_client packets.
</summary>
@@ -45441,7 +45525,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56548">
+<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56566">
<summary>
Do not audit attempts to send and receive nmbd_client packets.
</summary>
@@ -45452,7 +45536,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nmbd_client_packets" lineno="56563">
+<interface name="corenet_relabelto_nmbd_client_packets" lineno="56581">
<summary>
Relabel packets to nmbd_client the packet type.
</summary>
@@ -45462,7 +45546,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nmbd_server_packets" lineno="56583">
+<interface name="corenet_send_nmbd_server_packets" lineno="56601">
<summary>
Send nmbd_server packets.
</summary>
@@ -45473,7 +45557,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56602">
+<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56620">
<summary>
Do not audit attempts to send nmbd_server packets.
</summary>
@@ -45484,7 +45568,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nmbd_server_packets" lineno="56621">
+<interface name="corenet_receive_nmbd_server_packets" lineno="56639">
<summary>
Receive nmbd_server packets.
</summary>
@@ -45495,7 +45579,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56640">
+<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56658">
<summary>
Do not audit attempts to receive nmbd_server packets.
</summary>
@@ -45506,7 +45590,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56659">
+<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56677">
<summary>
Send and receive nmbd_server packets.
</summary>
@@ -45517,7 +45601,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56675">
+<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56693">
<summary>
Do not audit attempts to send and receive nmbd_server packets.
</summary>
@@ -45528,7 +45612,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nmbd_server_packets" lineno="56690">
+<interface name="corenet_relabelto_nmbd_server_packets" lineno="56708">
<summary>
Relabel packets to nmbd_server the packet type.
</summary>
@@ -45538,7 +45622,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56712">
+<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56730">
<summary>
Send and receive TCP traffic on the ntop port.
</summary>
@@ -45549,7 +45633,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ntop_port" lineno="56727">
+<interface name="corenet_udp_send_ntop_port" lineno="56745">
<summary>
Send UDP traffic on the ntop port.
</summary>
@@ -45560,7 +45644,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56742">
+<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56760">
<summary>
Do not audit attempts to send UDP traffic on the ntop port.
</summary>
@@ -45571,7 +45655,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ntop_port" lineno="56757">
+<interface name="corenet_udp_receive_ntop_port" lineno="56775">
<summary>
Receive UDP traffic on the ntop port.
</summary>
@@ -45582,7 +45666,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56772">
+<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56790">
<summary>
Do not audit attempts to receive UDP traffic on the ntop port.
</summary>
@@ -45593,7 +45677,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ntop_port" lineno="56787">
+<interface name="corenet_udp_sendrecv_ntop_port" lineno="56805">
<summary>
Send and receive UDP traffic on the ntop port.
</summary>
@@ -45604,7 +45688,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56803">
+<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56821">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ntop port.
@@ -45616,7 +45700,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ntop_port" lineno="56818">
+<interface name="corenet_tcp_bind_ntop_port" lineno="56836">
<summary>
Bind TCP sockets to the ntop port.
</summary>
@@ -45627,7 +45711,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ntop_port" lineno="56838">
+<interface name="corenet_udp_bind_ntop_port" lineno="56856">
<summary>
Bind UDP sockets to the ntop port.
</summary>
@@ -45638,7 +45722,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ntop_port" lineno="56857">
+<interface name="corenet_tcp_connect_ntop_port" lineno="56875">
<summary>
Make a TCP connection to the ntop port.
</summary>
@@ -45648,7 +45732,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntop_client_packets" lineno="56877">
+<interface name="corenet_send_ntop_client_packets" lineno="56895">
<summary>
Send ntop_client packets.
</summary>
@@ -45659,7 +45743,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56896">
+<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56914">
<summary>
Do not audit attempts to send ntop_client packets.
</summary>
@@ -45670,7 +45754,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntop_client_packets" lineno="56915">
+<interface name="corenet_receive_ntop_client_packets" lineno="56933">
<summary>
Receive ntop_client packets.
</summary>
@@ -45681,7 +45765,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56934">
+<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56952">
<summary>
Do not audit attempts to receive ntop_client packets.
</summary>
@@ -45692,7 +45776,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntop_client_packets" lineno="56953">
+<interface name="corenet_sendrecv_ntop_client_packets" lineno="56971">
<summary>
Send and receive ntop_client packets.
</summary>
@@ -45703,7 +45787,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56969">
+<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56987">
<summary>
Do not audit attempts to send and receive ntop_client packets.
</summary>
@@ -45714,7 +45798,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntop_client_packets" lineno="56984">
+<interface name="corenet_relabelto_ntop_client_packets" lineno="57002">
<summary>
Relabel packets to ntop_client the packet type.
</summary>
@@ -45724,7 +45808,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntop_server_packets" lineno="57004">
+<interface name="corenet_send_ntop_server_packets" lineno="57022">
<summary>
Send ntop_server packets.
</summary>
@@ -45735,7 +45819,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="57023">
+<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="57041">
<summary>
Do not audit attempts to send ntop_server packets.
</summary>
@@ -45746,7 +45830,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntop_server_packets" lineno="57042">
+<interface name="corenet_receive_ntop_server_packets" lineno="57060">
<summary>
Receive ntop_server packets.
</summary>
@@ -45757,7 +45841,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="57061">
+<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="57079">
<summary>
Do not audit attempts to receive ntop_server packets.
</summary>
@@ -45768,7 +45852,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntop_server_packets" lineno="57080">
+<interface name="corenet_sendrecv_ntop_server_packets" lineno="57098">
<summary>
Send and receive ntop_server packets.
</summary>
@@ -45779,7 +45863,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="57096">
+<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="57114">
<summary>
Do not audit attempts to send and receive ntop_server packets.
</summary>
@@ -45790,7 +45874,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntop_server_packets" lineno="57111">
+<interface name="corenet_relabelto_ntop_server_packets" lineno="57129">
<summary>
Relabel packets to ntop_server the packet type.
</summary>
@@ -45800,7 +45884,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57133">
+<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57151">
<summary>
Send and receive TCP traffic on the ntp port.
</summary>
@@ -45811,7 +45895,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ntp_port" lineno="57148">
+<interface name="corenet_udp_send_ntp_port" lineno="57166">
<summary>
Send UDP traffic on the ntp port.
</summary>
@@ -45822,7 +45906,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57163">
+<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57181">
<summary>
Do not audit attempts to send UDP traffic on the ntp port.
</summary>
@@ -45833,7 +45917,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ntp_port" lineno="57178">
+<interface name="corenet_udp_receive_ntp_port" lineno="57196">
<summary>
Receive UDP traffic on the ntp port.
</summary>
@@ -45844,7 +45928,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57193">
+<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57211">
<summary>
Do not audit attempts to receive UDP traffic on the ntp port.
</summary>
@@ -45855,7 +45939,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ntp_port" lineno="57208">
+<interface name="corenet_udp_sendrecv_ntp_port" lineno="57226">
<summary>
Send and receive UDP traffic on the ntp port.
</summary>
@@ -45866,7 +45950,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57224">
+<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57242">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ntp port.
@@ -45878,7 +45962,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ntp_port" lineno="57239">
+<interface name="corenet_tcp_bind_ntp_port" lineno="57257">
<summary>
Bind TCP sockets to the ntp port.
</summary>
@@ -45889,7 +45973,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ntp_port" lineno="57259">
+<interface name="corenet_udp_bind_ntp_port" lineno="57277">
<summary>
Bind UDP sockets to the ntp port.
</summary>
@@ -45900,7 +45984,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ntp_port" lineno="57278">
+<interface name="corenet_tcp_connect_ntp_port" lineno="57296">
<summary>
Make a TCP connection to the ntp port.
</summary>
@@ -45910,7 +45994,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntp_client_packets" lineno="57298">
+<interface name="corenet_send_ntp_client_packets" lineno="57316">
<summary>
Send ntp_client packets.
</summary>
@@ -45921,7 +46005,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57317">
+<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57335">
<summary>
Do not audit attempts to send ntp_client packets.
</summary>
@@ -45932,7 +46016,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntp_client_packets" lineno="57336">
+<interface name="corenet_receive_ntp_client_packets" lineno="57354">
<summary>
Receive ntp_client packets.
</summary>
@@ -45943,7 +46027,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57355">
+<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57373">
<summary>
Do not audit attempts to receive ntp_client packets.
</summary>
@@ -45954,7 +46038,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntp_client_packets" lineno="57374">
+<interface name="corenet_sendrecv_ntp_client_packets" lineno="57392">
<summary>
Send and receive ntp_client packets.
</summary>
@@ -45965,7 +46049,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57390">
+<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57408">
<summary>
Do not audit attempts to send and receive ntp_client packets.
</summary>
@@ -45976,7 +46060,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntp_client_packets" lineno="57405">
+<interface name="corenet_relabelto_ntp_client_packets" lineno="57423">
<summary>
Relabel packets to ntp_client the packet type.
</summary>
@@ -45986,7 +46070,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntp_server_packets" lineno="57425">
+<interface name="corenet_send_ntp_server_packets" lineno="57443">
<summary>
Send ntp_server packets.
</summary>
@@ -45997,7 +46081,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57444">
+<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57462">
<summary>
Do not audit attempts to send ntp_server packets.
</summary>
@@ -46008,7 +46092,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntp_server_packets" lineno="57463">
+<interface name="corenet_receive_ntp_server_packets" lineno="57481">
<summary>
Receive ntp_server packets.
</summary>
@@ -46019,7 +46103,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57482">
+<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57500">
<summary>
Do not audit attempts to receive ntp_server packets.
</summary>
@@ -46030,7 +46114,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntp_server_packets" lineno="57501">
+<interface name="corenet_sendrecv_ntp_server_packets" lineno="57519">
<summary>
Send and receive ntp_server packets.
</summary>
@@ -46041,7 +46125,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57517">
+<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57535">
<summary>
Do not audit attempts to send and receive ntp_server packets.
</summary>
@@ -46052,7 +46136,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntp_server_packets" lineno="57532">
+<interface name="corenet_relabelto_ntp_server_packets" lineno="57550">
<summary>
Relabel packets to ntp_server the packet type.
</summary>
@@ -46062,7 +46146,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ntske_port" lineno="57554">
+<interface name="corenet_tcp_sendrecv_ntske_port" lineno="57572">
<summary>
Send and receive TCP traffic on the ntske port.
</summary>
@@ -46073,7 +46157,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ntske_port" lineno="57569">
+<interface name="corenet_udp_send_ntske_port" lineno="57587">
<summary>
Send UDP traffic on the ntske port.
</summary>
@@ -46084,7 +46168,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ntske_port" lineno="57584">
+<interface name="corenet_dontaudit_udp_send_ntske_port" lineno="57602">
<summary>
Do not audit attempts to send UDP traffic on the ntske port.
</summary>
@@ -46095,7 +46179,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ntske_port" lineno="57599">
+<interface name="corenet_udp_receive_ntske_port" lineno="57617">
<summary>
Receive UDP traffic on the ntske port.
</summary>
@@ -46106,7 +46190,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ntske_port" lineno="57614">
+<interface name="corenet_dontaudit_udp_receive_ntske_port" lineno="57632">
<summary>
Do not audit attempts to receive UDP traffic on the ntske port.
</summary>
@@ -46117,7 +46201,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ntske_port" lineno="57629">
+<interface name="corenet_udp_sendrecv_ntske_port" lineno="57647">
<summary>
Send and receive UDP traffic on the ntske port.
</summary>
@@ -46128,7 +46212,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntske_port" lineno="57645">
+<interface name="corenet_dontaudit_udp_sendrecv_ntske_port" lineno="57663">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ntske port.
@@ -46140,7 +46224,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ntske_port" lineno="57660">
+<interface name="corenet_tcp_bind_ntske_port" lineno="57678">
<summary>
Bind TCP sockets to the ntske port.
</summary>
@@ -46151,7 +46235,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ntske_port" lineno="57680">
+<interface name="corenet_udp_bind_ntske_port" lineno="57698">
<summary>
Bind UDP sockets to the ntske port.
</summary>
@@ -46162,7 +46246,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ntske_port" lineno="57699">
+<interface name="corenet_tcp_connect_ntske_port" lineno="57717">
<summary>
Make a TCP connection to the ntske port.
</summary>
@@ -46172,7 +46256,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntske_client_packets" lineno="57719">
+<interface name="corenet_send_ntske_client_packets" lineno="57737">
<summary>
Send ntske_client packets.
</summary>
@@ -46183,7 +46267,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="57738">
+<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="57756">
<summary>
Do not audit attempts to send ntske_client packets.
</summary>
@@ -46194,7 +46278,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntske_client_packets" lineno="57757">
+<interface name="corenet_receive_ntske_client_packets" lineno="57775">
<summary>
Receive ntske_client packets.
</summary>
@@ -46205,7 +46289,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="57776">
+<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="57794">
<summary>
Do not audit attempts to receive ntske_client packets.
</summary>
@@ -46216,7 +46300,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntske_client_packets" lineno="57795">
+<interface name="corenet_sendrecv_ntske_client_packets" lineno="57813">
<summary>
Send and receive ntske_client packets.
</summary>
@@ -46227,7 +46311,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="57811">
+<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="57829">
<summary>
Do not audit attempts to send and receive ntske_client packets.
</summary>
@@ -46238,7 +46322,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntske_client_packets" lineno="57826">
+<interface name="corenet_relabelto_ntske_client_packets" lineno="57844">
<summary>
Relabel packets to ntske_client the packet type.
</summary>
@@ -46248,7 +46332,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntske_server_packets" lineno="57846">
+<interface name="corenet_send_ntske_server_packets" lineno="57864">
<summary>
Send ntske_server packets.
</summary>
@@ -46259,7 +46343,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="57865">
+<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="57883">
<summary>
Do not audit attempts to send ntske_server packets.
</summary>
@@ -46270,7 +46354,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntske_server_packets" lineno="57884">
+<interface name="corenet_receive_ntske_server_packets" lineno="57902">
<summary>
Receive ntske_server packets.
</summary>
@@ -46281,7 +46365,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="57903">
+<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="57921">
<summary>
Do not audit attempts to receive ntske_server packets.
</summary>
@@ -46292,7 +46376,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntske_server_packets" lineno="57922">
+<interface name="corenet_sendrecv_ntske_server_packets" lineno="57940">
<summary>
Send and receive ntske_server packets.
</summary>
@@ -46303,7 +46387,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="57938">
+<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="57956">
<summary>
Do not audit attempts to send and receive ntske_server packets.
</summary>
@@ -46314,7 +46398,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntske_server_packets" lineno="57953">
+<interface name="corenet_relabelto_ntske_server_packets" lineno="57971">
<summary>
Relabel packets to ntske_server the packet type.
</summary>
@@ -46324,7 +46408,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57975">
+<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57993">
<summary>
Send and receive TCP traffic on the oa_system port.
</summary>
@@ -46335,7 +46419,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_oa_system_port" lineno="57990">
+<interface name="corenet_udp_send_oa_system_port" lineno="58008">
<summary>
Send UDP traffic on the oa_system port.
</summary>
@@ -46346,7 +46430,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="58005">
+<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="58023">
<summary>
Do not audit attempts to send UDP traffic on the oa_system port.
</summary>
@@ -46357,7 +46441,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_oa_system_port" lineno="58020">
+<interface name="corenet_udp_receive_oa_system_port" lineno="58038">
<summary>
Receive UDP traffic on the oa_system port.
</summary>
@@ -46368,7 +46452,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="58035">
+<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="58053">
<summary>
Do not audit attempts to receive UDP traffic on the oa_system port.
</summary>
@@ -46379,7 +46463,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_oa_system_port" lineno="58050">
+<interface name="corenet_udp_sendrecv_oa_system_port" lineno="58068">
<summary>
Send and receive UDP traffic on the oa_system port.
</summary>
@@ -46390,7 +46474,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="58066">
+<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="58084">
<summary>
Do not audit attempts to send and receive
UDP traffic on the oa_system port.
@@ -46402,7 +46486,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_oa_system_port" lineno="58081">
+<interface name="corenet_tcp_bind_oa_system_port" lineno="58099">
<summary>
Bind TCP sockets to the oa_system port.
</summary>
@@ -46413,7 +46497,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_oa_system_port" lineno="58101">
+<interface name="corenet_udp_bind_oa_system_port" lineno="58119">
<summary>
Bind UDP sockets to the oa_system port.
</summary>
@@ -46424,7 +46508,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_oa_system_port" lineno="58120">
+<interface name="corenet_tcp_connect_oa_system_port" lineno="58138">
<summary>
Make a TCP connection to the oa_system port.
</summary>
@@ -46434,7 +46518,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oa_system_client_packets" lineno="58140">
+<interface name="corenet_send_oa_system_client_packets" lineno="58158">
<summary>
Send oa_system_client packets.
</summary>
@@ -46445,7 +46529,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="58159">
+<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="58177">
<summary>
Do not audit attempts to send oa_system_client packets.
</summary>
@@ -46456,7 +46540,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oa_system_client_packets" lineno="58178">
+<interface name="corenet_receive_oa_system_client_packets" lineno="58196">
<summary>
Receive oa_system_client packets.
</summary>
@@ -46467,7 +46551,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="58197">
+<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="58215">
<summary>
Do not audit attempts to receive oa_system_client packets.
</summary>
@@ -46478,7 +46562,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oa_system_client_packets" lineno="58216">
+<interface name="corenet_sendrecv_oa_system_client_packets" lineno="58234">
<summary>
Send and receive oa_system_client packets.
</summary>
@@ -46489,7 +46573,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="58232">
+<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="58250">
<summary>
Do not audit attempts to send and receive oa_system_client packets.
</summary>
@@ -46500,7 +46584,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oa_system_client_packets" lineno="58247">
+<interface name="corenet_relabelto_oa_system_client_packets" lineno="58265">
<summary>
Relabel packets to oa_system_client the packet type.
</summary>
@@ -46510,7 +46594,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oa_system_server_packets" lineno="58267">
+<interface name="corenet_send_oa_system_server_packets" lineno="58285">
<summary>
Send oa_system_server packets.
</summary>
@@ -46521,7 +46605,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="58286">
+<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="58304">
<summary>
Do not audit attempts to send oa_system_server packets.
</summary>
@@ -46532,7 +46616,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oa_system_server_packets" lineno="58305">
+<interface name="corenet_receive_oa_system_server_packets" lineno="58323">
<summary>
Receive oa_system_server packets.
</summary>
@@ -46543,7 +46627,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="58324">
+<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="58342">
<summary>
Do not audit attempts to receive oa_system_server packets.
</summary>
@@ -46554,7 +46638,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oa_system_server_packets" lineno="58343">
+<interface name="corenet_sendrecv_oa_system_server_packets" lineno="58361">
<summary>
Send and receive oa_system_server packets.
</summary>
@@ -46565,7 +46649,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="58359">
+<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="58377">
<summary>
Do not audit attempts to send and receive oa_system_server packets.
</summary>
@@ -46576,7 +46660,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oa_system_server_packets" lineno="58374">
+<interface name="corenet_relabelto_oa_system_server_packets" lineno="58392">
<summary>
Relabel packets to oa_system_server the packet type.
</summary>
@@ -46586,7 +46670,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="58396">
+<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="58414">
<summary>
Send and receive TCP traffic on the oracledb port.
</summary>
@@ -46597,7 +46681,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_oracledb_port" lineno="58411">
+<interface name="corenet_udp_send_oracledb_port" lineno="58429">
<summary>
Send UDP traffic on the oracledb port.
</summary>
@@ -46608,7 +46692,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58426">
+<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58444">
<summary>
Do not audit attempts to send UDP traffic on the oracledb port.
</summary>
@@ -46619,7 +46703,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_oracledb_port" lineno="58441">
+<interface name="corenet_udp_receive_oracledb_port" lineno="58459">
<summary>
Receive UDP traffic on the oracledb port.
</summary>
@@ -46630,7 +46714,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58456">
+<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58474">
<summary>
Do not audit attempts to receive UDP traffic on the oracledb port.
</summary>
@@ -46641,7 +46725,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58471">
+<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58489">
<summary>
Send and receive UDP traffic on the oracledb port.
</summary>
@@ -46652,7 +46736,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58487">
+<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58505">
<summary>
Do not audit attempts to send and receive
UDP traffic on the oracledb port.
@@ -46664,7 +46748,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_oracledb_port" lineno="58502">
+<interface name="corenet_tcp_bind_oracledb_port" lineno="58520">
<summary>
Bind TCP sockets to the oracledb port.
</summary>
@@ -46675,7 +46759,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_oracledb_port" lineno="58522">
+<interface name="corenet_udp_bind_oracledb_port" lineno="58540">
<summary>
Bind UDP sockets to the oracledb port.
</summary>
@@ -46686,7 +46770,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_oracledb_port" lineno="58541">
+<interface name="corenet_tcp_connect_oracledb_port" lineno="58559">
<summary>
Make a TCP connection to the oracledb port.
</summary>
@@ -46696,7 +46780,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oracledb_client_packets" lineno="58561">
+<interface name="corenet_send_oracledb_client_packets" lineno="58579">
<summary>
Send oracledb_client packets.
</summary>
@@ -46707,7 +46791,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58580">
+<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58598">
<summary>
Do not audit attempts to send oracledb_client packets.
</summary>
@@ -46718,7 +46802,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oracledb_client_packets" lineno="58599">
+<interface name="corenet_receive_oracledb_client_packets" lineno="58617">
<summary>
Receive oracledb_client packets.
</summary>
@@ -46729,7 +46813,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58618">
+<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58636">
<summary>
Do not audit attempts to receive oracledb_client packets.
</summary>
@@ -46740,7 +46824,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58637">
+<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58655">
<summary>
Send and receive oracledb_client packets.
</summary>
@@ -46751,7 +46835,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58653">
+<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58671">
<summary>
Do not audit attempts to send and receive oracledb_client packets.
</summary>
@@ -46762,7 +46846,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oracledb_client_packets" lineno="58668">
+<interface name="corenet_relabelto_oracledb_client_packets" lineno="58686">
<summary>
Relabel packets to oracledb_client the packet type.
</summary>
@@ -46772,7 +46856,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oracledb_server_packets" lineno="58688">
+<interface name="corenet_send_oracledb_server_packets" lineno="58706">
<summary>
Send oracledb_server packets.
</summary>
@@ -46783,7 +46867,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58707">
+<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58725">
<summary>
Do not audit attempts to send oracledb_server packets.
</summary>
@@ -46794,7 +46878,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oracledb_server_packets" lineno="58726">
+<interface name="corenet_receive_oracledb_server_packets" lineno="58744">
<summary>
Receive oracledb_server packets.
</summary>
@@ -46805,7 +46889,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58745">
+<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58763">
<summary>
Do not audit attempts to receive oracledb_server packets.
</summary>
@@ -46816,7 +46900,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58764">
+<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58782">
<summary>
Send and receive oracledb_server packets.
</summary>
@@ -46827,7 +46911,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58780">
+<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58798">
<summary>
Do not audit attempts to send and receive oracledb_server packets.
</summary>
@@ -46838,7 +46922,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oracledb_server_packets" lineno="58795">
+<interface name="corenet_relabelto_oracledb_server_packets" lineno="58813">
<summary>
Relabel packets to oracledb_server the packet type.
</summary>
@@ -46848,7 +46932,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58817">
+<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58835">
<summary>
Send and receive TCP traffic on the ocsp port.
</summary>
@@ -46859,7 +46943,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ocsp_port" lineno="58832">
+<interface name="corenet_udp_send_ocsp_port" lineno="58850">
<summary>
Send UDP traffic on the ocsp port.
</summary>
@@ -46870,7 +46954,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58847">
+<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58865">
<summary>
Do not audit attempts to send UDP traffic on the ocsp port.
</summary>
@@ -46881,7 +46965,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ocsp_port" lineno="58862">
+<interface name="corenet_udp_receive_ocsp_port" lineno="58880">
<summary>
Receive UDP traffic on the ocsp port.
</summary>
@@ -46892,7 +46976,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58877">
+<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58895">
<summary>
Do not audit attempts to receive UDP traffic on the ocsp port.
</summary>
@@ -46903,7 +46987,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58892">
+<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58910">
<summary>
Send and receive UDP traffic on the ocsp port.
</summary>
@@ -46914,7 +46998,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58908">
+<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58926">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ocsp port.
@@ -46926,7 +47010,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ocsp_port" lineno="58923">
+<interface name="corenet_tcp_bind_ocsp_port" lineno="58941">
<summary>
Bind TCP sockets to the ocsp port.
</summary>
@@ -46937,7 +47021,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ocsp_port" lineno="58943">
+<interface name="corenet_udp_bind_ocsp_port" lineno="58961">
<summary>
Bind UDP sockets to the ocsp port.
</summary>
@@ -46948,7 +47032,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ocsp_port" lineno="58962">
+<interface name="corenet_tcp_connect_ocsp_port" lineno="58980">
<summary>
Make a TCP connection to the ocsp port.
</summary>
@@ -46958,7 +47042,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ocsp_client_packets" lineno="58982">
+<interface name="corenet_send_ocsp_client_packets" lineno="59000">
<summary>
Send ocsp_client packets.
</summary>
@@ -46969,7 +47053,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="59001">
+<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="59019">
<summary>
Do not audit attempts to send ocsp_client packets.
</summary>
@@ -46980,7 +47064,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ocsp_client_packets" lineno="59020">
+<interface name="corenet_receive_ocsp_client_packets" lineno="59038">
<summary>
Receive ocsp_client packets.
</summary>
@@ -46991,7 +47075,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="59039">
+<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="59057">
<summary>
Do not audit attempts to receive ocsp_client packets.
</summary>
@@ -47002,7 +47086,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ocsp_client_packets" lineno="59058">
+<interface name="corenet_sendrecv_ocsp_client_packets" lineno="59076">
<summary>
Send and receive ocsp_client packets.
</summary>
@@ -47013,7 +47097,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="59074">
+<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="59092">
<summary>
Do not audit attempts to send and receive ocsp_client packets.
</summary>
@@ -47024,7 +47108,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ocsp_client_packets" lineno="59089">
+<interface name="corenet_relabelto_ocsp_client_packets" lineno="59107">
<summary>
Relabel packets to ocsp_client the packet type.
</summary>
@@ -47034,7 +47118,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ocsp_server_packets" lineno="59109">
+<interface name="corenet_send_ocsp_server_packets" lineno="59127">
<summary>
Send ocsp_server packets.
</summary>
@@ -47045,7 +47129,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="59128">
+<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="59146">
<summary>
Do not audit attempts to send ocsp_server packets.
</summary>
@@ -47056,7 +47140,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ocsp_server_packets" lineno="59147">
+<interface name="corenet_receive_ocsp_server_packets" lineno="59165">
<summary>
Receive ocsp_server packets.
</summary>
@@ -47067,7 +47151,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="59166">
+<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="59184">
<summary>
Do not audit attempts to receive ocsp_server packets.
</summary>
@@ -47078,7 +47162,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ocsp_server_packets" lineno="59185">
+<interface name="corenet_sendrecv_ocsp_server_packets" lineno="59203">
<summary>
Send and receive ocsp_server packets.
</summary>
@@ -47089,7 +47173,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="59201">
+<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="59219">
<summary>
Do not audit attempts to send and receive ocsp_server packets.
</summary>
@@ -47100,7 +47184,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ocsp_server_packets" lineno="59216">
+<interface name="corenet_relabelto_ocsp_server_packets" lineno="59234">
<summary>
Relabel packets to ocsp_server the packet type.
</summary>
@@ -47110,7 +47194,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="59238">
+<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="59256">
<summary>
Send and receive TCP traffic on the openhpid port.
</summary>
@@ -47121,7 +47205,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_openhpid_port" lineno="59253">
+<interface name="corenet_udp_send_openhpid_port" lineno="59271">
<summary>
Send UDP traffic on the openhpid port.
</summary>
@@ -47132,7 +47216,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="59268">
+<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="59286">
<summary>
Do not audit attempts to send UDP traffic on the openhpid port.
</summary>
@@ -47143,7 +47227,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_openhpid_port" lineno="59283">
+<interface name="corenet_udp_receive_openhpid_port" lineno="59301">
<summary>
Receive UDP traffic on the openhpid port.
</summary>
@@ -47154,7 +47238,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="59298">
+<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="59316">
<summary>
Do not audit attempts to receive UDP traffic on the openhpid port.
</summary>
@@ -47165,7 +47249,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_openhpid_port" lineno="59313">
+<interface name="corenet_udp_sendrecv_openhpid_port" lineno="59331">
<summary>
Send and receive UDP traffic on the openhpid port.
</summary>
@@ -47176,7 +47260,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="59329">
+<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="59347">
<summary>
Do not audit attempts to send and receive
UDP traffic on the openhpid port.
@@ -47188,7 +47272,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_openhpid_port" lineno="59344">
+<interface name="corenet_tcp_bind_openhpid_port" lineno="59362">
<summary>
Bind TCP sockets to the openhpid port.
</summary>
@@ -47199,7 +47283,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_openhpid_port" lineno="59364">
+<interface name="corenet_udp_bind_openhpid_port" lineno="59382">
<summary>
Bind UDP sockets to the openhpid port.
</summary>
@@ -47210,7 +47294,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_openhpid_port" lineno="59383">
+<interface name="corenet_tcp_connect_openhpid_port" lineno="59401">
<summary>
Make a TCP connection to the openhpid port.
</summary>
@@ -47220,7 +47304,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openhpid_client_packets" lineno="59403">
+<interface name="corenet_send_openhpid_client_packets" lineno="59421">
<summary>
Send openhpid_client packets.
</summary>
@@ -47231,7 +47315,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59422">
+<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59440">
<summary>
Do not audit attempts to send openhpid_client packets.
</summary>
@@ -47242,7 +47326,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openhpid_client_packets" lineno="59441">
+<interface name="corenet_receive_openhpid_client_packets" lineno="59459">
<summary>
Receive openhpid_client packets.
</summary>
@@ -47253,7 +47337,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59460">
+<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59478">
<summary>
Do not audit attempts to receive openhpid_client packets.
</summary>
@@ -47264,7 +47348,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59479">
+<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59497">
<summary>
Send and receive openhpid_client packets.
</summary>
@@ -47275,7 +47359,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59495">
+<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59513">
<summary>
Do not audit attempts to send and receive openhpid_client packets.
</summary>
@@ -47286,7 +47370,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openhpid_client_packets" lineno="59510">
+<interface name="corenet_relabelto_openhpid_client_packets" lineno="59528">
<summary>
Relabel packets to openhpid_client the packet type.
</summary>
@@ -47296,7 +47380,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openhpid_server_packets" lineno="59530">
+<interface name="corenet_send_openhpid_server_packets" lineno="59548">
<summary>
Send openhpid_server packets.
</summary>
@@ -47307,7 +47391,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59549">
+<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59567">
<summary>
Do not audit attempts to send openhpid_server packets.
</summary>
@@ -47318,7 +47402,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openhpid_server_packets" lineno="59568">
+<interface name="corenet_receive_openhpid_server_packets" lineno="59586">
<summary>
Receive openhpid_server packets.
</summary>
@@ -47329,7 +47413,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59587">
+<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59605">
<summary>
Do not audit attempts to receive openhpid_server packets.
</summary>
@@ -47340,7 +47424,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59606">
+<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59624">
<summary>
Send and receive openhpid_server packets.
</summary>
@@ -47351,7 +47435,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59622">
+<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59640">
<summary>
Do not audit attempts to send and receive openhpid_server packets.
</summary>
@@ -47362,7 +47446,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openhpid_server_packets" lineno="59637">
+<interface name="corenet_relabelto_openhpid_server_packets" lineno="59655">
<summary>
Relabel packets to openhpid_server the packet type.
</summary>
@@ -47372,7 +47456,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59659">
+<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59677">
<summary>
Send and receive TCP traffic on the openvpn port.
</summary>
@@ -47383,7 +47467,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_openvpn_port" lineno="59674">
+<interface name="corenet_udp_send_openvpn_port" lineno="59692">
<summary>
Send UDP traffic on the openvpn port.
</summary>
@@ -47394,7 +47478,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59689">
+<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59707">
<summary>
Do not audit attempts to send UDP traffic on the openvpn port.
</summary>
@@ -47405,7 +47489,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_openvpn_port" lineno="59704">
+<interface name="corenet_udp_receive_openvpn_port" lineno="59722">
<summary>
Receive UDP traffic on the openvpn port.
</summary>
@@ -47416,7 +47500,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59719">
+<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59737">
<summary>
Do not audit attempts to receive UDP traffic on the openvpn port.
</summary>
@@ -47427,7 +47511,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59734">
+<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59752">
<summary>
Send and receive UDP traffic on the openvpn port.
</summary>
@@ -47438,7 +47522,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59750">
+<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59768">
<summary>
Do not audit attempts to send and receive
UDP traffic on the openvpn port.
@@ -47450,7 +47534,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_openvpn_port" lineno="59765">
+<interface name="corenet_tcp_bind_openvpn_port" lineno="59783">
<summary>
Bind TCP sockets to the openvpn port.
</summary>
@@ -47461,7 +47545,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_openvpn_port" lineno="59785">
+<interface name="corenet_udp_bind_openvpn_port" lineno="59803">
<summary>
Bind UDP sockets to the openvpn port.
</summary>
@@ -47472,7 +47556,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_openvpn_port" lineno="59804">
+<interface name="corenet_tcp_connect_openvpn_port" lineno="59822">
<summary>
Make a TCP connection to the openvpn port.
</summary>
@@ -47482,7 +47566,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openvpn_client_packets" lineno="59824">
+<interface name="corenet_send_openvpn_client_packets" lineno="59842">
<summary>
Send openvpn_client packets.
</summary>
@@ -47493,7 +47577,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59843">
+<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59861">
<summary>
Do not audit attempts to send openvpn_client packets.
</summary>
@@ -47504,7 +47588,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openvpn_client_packets" lineno="59862">
+<interface name="corenet_receive_openvpn_client_packets" lineno="59880">
<summary>
Receive openvpn_client packets.
</summary>
@@ -47515,7 +47599,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59881">
+<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59899">
<summary>
Do not audit attempts to receive openvpn_client packets.
</summary>
@@ -47526,7 +47610,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59900">
+<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59918">
<summary>
Send and receive openvpn_client packets.
</summary>
@@ -47537,7 +47621,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59916">
+<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59934">
<summary>
Do not audit attempts to send and receive openvpn_client packets.
</summary>
@@ -47548,7 +47632,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openvpn_client_packets" lineno="59931">
+<interface name="corenet_relabelto_openvpn_client_packets" lineno="59949">
<summary>
Relabel packets to openvpn_client the packet type.
</summary>
@@ -47558,7 +47642,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openvpn_server_packets" lineno="59951">
+<interface name="corenet_send_openvpn_server_packets" lineno="59969">
<summary>
Send openvpn_server packets.
</summary>
@@ -47569,7 +47653,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59970">
+<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59988">
<summary>
Do not audit attempts to send openvpn_server packets.
</summary>
@@ -47580,7 +47664,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openvpn_server_packets" lineno="59989">
+<interface name="corenet_receive_openvpn_server_packets" lineno="60007">
<summary>
Receive openvpn_server packets.
</summary>
@@ -47591,7 +47675,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="60008">
+<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="60026">
<summary>
Do not audit attempts to receive openvpn_server packets.
</summary>
@@ -47602,7 +47686,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openvpn_server_packets" lineno="60027">
+<interface name="corenet_sendrecv_openvpn_server_packets" lineno="60045">
<summary>
Send and receive openvpn_server packets.
</summary>
@@ -47613,7 +47697,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="60043">
+<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="60061">
<summary>
Do not audit attempts to send and receive openvpn_server packets.
</summary>
@@ -47624,7 +47708,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openvpn_server_packets" lineno="60058">
+<interface name="corenet_relabelto_openvpn_server_packets" lineno="60076">
<summary>
Relabel packets to openvpn_server the packet type.
</summary>
@@ -47634,7 +47718,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pdps_port" lineno="60080">
+<interface name="corenet_tcp_sendrecv_pdps_port" lineno="60098">
<summary>
Send and receive TCP traffic on the pdps port.
</summary>
@@ -47645,7 +47729,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pdps_port" lineno="60095">
+<interface name="corenet_udp_send_pdps_port" lineno="60113">
<summary>
Send UDP traffic on the pdps port.
</summary>
@@ -47656,7 +47740,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="60110">
+<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="60128">
<summary>
Do not audit attempts to send UDP traffic on the pdps port.
</summary>
@@ -47667,7 +47751,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pdps_port" lineno="60125">
+<interface name="corenet_udp_receive_pdps_port" lineno="60143">
<summary>
Receive UDP traffic on the pdps port.
</summary>
@@ -47678,7 +47762,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="60140">
+<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="60158">
<summary>
Do not audit attempts to receive UDP traffic on the pdps port.
</summary>
@@ -47689,7 +47773,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pdps_port" lineno="60155">
+<interface name="corenet_udp_sendrecv_pdps_port" lineno="60173">
<summary>
Send and receive UDP traffic on the pdps port.
</summary>
@@ -47700,7 +47784,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="60171">
+<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="60189">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pdps port.
@@ -47712,7 +47796,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pdps_port" lineno="60186">
+<interface name="corenet_tcp_bind_pdps_port" lineno="60204">
<summary>
Bind TCP sockets to the pdps port.
</summary>
@@ -47723,7 +47807,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pdps_port" lineno="60206">
+<interface name="corenet_udp_bind_pdps_port" lineno="60224">
<summary>
Bind UDP sockets to the pdps port.
</summary>
@@ -47734,7 +47818,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pdps_port" lineno="60225">
+<interface name="corenet_tcp_connect_pdps_port" lineno="60243">
<summary>
Make a TCP connection to the pdps port.
</summary>
@@ -47744,7 +47828,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pdps_client_packets" lineno="60245">
+<interface name="corenet_send_pdps_client_packets" lineno="60263">
<summary>
Send pdps_client packets.
</summary>
@@ -47755,7 +47839,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="60264">
+<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="60282">
<summary>
Do not audit attempts to send pdps_client packets.
</summary>
@@ -47766,7 +47850,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pdps_client_packets" lineno="60283">
+<interface name="corenet_receive_pdps_client_packets" lineno="60301">
<summary>
Receive pdps_client packets.
</summary>
@@ -47777,7 +47861,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="60302">
+<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="60320">
<summary>
Do not audit attempts to receive pdps_client packets.
</summary>
@@ -47788,7 +47872,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pdps_client_packets" lineno="60321">
+<interface name="corenet_sendrecv_pdps_client_packets" lineno="60339">
<summary>
Send and receive pdps_client packets.
</summary>
@@ -47799,7 +47883,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="60337">
+<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="60355">
<summary>
Do not audit attempts to send and receive pdps_client packets.
</summary>
@@ -47810,7 +47894,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pdps_client_packets" lineno="60352">
+<interface name="corenet_relabelto_pdps_client_packets" lineno="60370">
<summary>
Relabel packets to pdps_client the packet type.
</summary>
@@ -47820,7 +47904,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pdps_server_packets" lineno="60372">
+<interface name="corenet_send_pdps_server_packets" lineno="60390">
<summary>
Send pdps_server packets.
</summary>
@@ -47831,7 +47915,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="60391">
+<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="60409">
<summary>
Do not audit attempts to send pdps_server packets.
</summary>
@@ -47842,7 +47926,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pdps_server_packets" lineno="60410">
+<interface name="corenet_receive_pdps_server_packets" lineno="60428">
<summary>
Receive pdps_server packets.
</summary>
@@ -47853,7 +47937,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60429">
+<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60447">
<summary>
Do not audit attempts to receive pdps_server packets.
</summary>
@@ -47864,7 +47948,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pdps_server_packets" lineno="60448">
+<interface name="corenet_sendrecv_pdps_server_packets" lineno="60466">
<summary>
Send and receive pdps_server packets.
</summary>
@@ -47875,7 +47959,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60464">
+<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60482">
<summary>
Do not audit attempts to send and receive pdps_server packets.
</summary>
@@ -47886,7 +47970,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pdps_server_packets" lineno="60479">
+<interface name="corenet_relabelto_pdps_server_packets" lineno="60497">
<summary>
Relabel packets to pdps_server the packet type.
</summary>
@@ -47896,7 +47980,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60501">
+<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60519">
<summary>
Send and receive TCP traffic on the pegasus_http port.
</summary>
@@ -47907,7 +47991,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pegasus_http_port" lineno="60516">
+<interface name="corenet_udp_send_pegasus_http_port" lineno="60534">
<summary>
Send UDP traffic on the pegasus_http port.
</summary>
@@ -47918,7 +48002,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60531">
+<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60549">
<summary>
Do not audit attempts to send UDP traffic on the pegasus_http port.
</summary>
@@ -47929,7 +48013,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pegasus_http_port" lineno="60546">
+<interface name="corenet_udp_receive_pegasus_http_port" lineno="60564">
<summary>
Receive UDP traffic on the pegasus_http port.
</summary>
@@ -47940,7 +48024,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60561">
+<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60579">
<summary>
Do not audit attempts to receive UDP traffic on the pegasus_http port.
</summary>
@@ -47951,7 +48035,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60576">
+<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60594">
<summary>
Send and receive UDP traffic on the pegasus_http port.
</summary>
@@ -47962,7 +48046,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60592">
+<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60610">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pegasus_http port.
@@ -47974,7 +48058,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60607">
+<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60625">
<summary>
Bind TCP sockets to the pegasus_http port.
</summary>
@@ -47985,7 +48069,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pegasus_http_port" lineno="60627">
+<interface name="corenet_udp_bind_pegasus_http_port" lineno="60645">
<summary>
Bind UDP sockets to the pegasus_http port.
</summary>
@@ -47996,7 +48080,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60646">
+<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60664">
<summary>
Make a TCP connection to the pegasus_http port.
</summary>
@@ -48006,7 +48090,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_http_client_packets" lineno="60666">
+<interface name="corenet_send_pegasus_http_client_packets" lineno="60684">
<summary>
Send pegasus_http_client packets.
</summary>
@@ -48017,7 +48101,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60685">
+<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60703">
<summary>
Do not audit attempts to send pegasus_http_client packets.
</summary>
@@ -48028,7 +48112,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_http_client_packets" lineno="60704">
+<interface name="corenet_receive_pegasus_http_client_packets" lineno="60722">
<summary>
Receive pegasus_http_client packets.
</summary>
@@ -48039,7 +48123,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60723">
+<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60741">
<summary>
Do not audit attempts to receive pegasus_http_client packets.
</summary>
@@ -48050,7 +48134,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60742">
+<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60760">
<summary>
Send and receive pegasus_http_client packets.
</summary>
@@ -48061,7 +48145,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60758">
+<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60776">
<summary>
Do not audit attempts to send and receive pegasus_http_client packets.
</summary>
@@ -48072,7 +48156,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60773">
+<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60791">
<summary>
Relabel packets to pegasus_http_client the packet type.
</summary>
@@ -48082,7 +48166,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_http_server_packets" lineno="60793">
+<interface name="corenet_send_pegasus_http_server_packets" lineno="60811">
<summary>
Send pegasus_http_server packets.
</summary>
@@ -48093,7 +48177,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60812">
+<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60830">
<summary>
Do not audit attempts to send pegasus_http_server packets.
</summary>
@@ -48104,7 +48188,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_http_server_packets" lineno="60831">
+<interface name="corenet_receive_pegasus_http_server_packets" lineno="60849">
<summary>
Receive pegasus_http_server packets.
</summary>
@@ -48115,7 +48199,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60850">
+<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60868">
<summary>
Do not audit attempts to receive pegasus_http_server packets.
</summary>
@@ -48126,7 +48210,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60869">
+<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60887">
<summary>
Send and receive pegasus_http_server packets.
</summary>
@@ -48137,7 +48221,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60885">
+<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60903">
<summary>
Do not audit attempts to send and receive pegasus_http_server packets.
</summary>
@@ -48148,7 +48232,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60900">
+<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60918">
<summary>
Relabel packets to pegasus_http_server the packet type.
</summary>
@@ -48158,7 +48242,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60922">
+<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60940">
<summary>
Send and receive TCP traffic on the pegasus_https port.
</summary>
@@ -48169,7 +48253,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pegasus_https_port" lineno="60937">
+<interface name="corenet_udp_send_pegasus_https_port" lineno="60955">
<summary>
Send UDP traffic on the pegasus_https port.
</summary>
@@ -48180,7 +48264,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60952">
+<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60970">
<summary>
Do not audit attempts to send UDP traffic on the pegasus_https port.
</summary>
@@ -48191,7 +48275,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pegasus_https_port" lineno="60967">
+<interface name="corenet_udp_receive_pegasus_https_port" lineno="60985">
<summary>
Receive UDP traffic on the pegasus_https port.
</summary>
@@ -48202,7 +48286,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="60982">
+<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="61000">
<summary>
Do not audit attempts to receive UDP traffic on the pegasus_https port.
</summary>
@@ -48213,7 +48297,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="60997">
+<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="61015">
<summary>
Send and receive UDP traffic on the pegasus_https port.
</summary>
@@ -48224,7 +48308,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="61013">
+<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="61031">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pegasus_https port.
@@ -48236,7 +48320,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pegasus_https_port" lineno="61028">
+<interface name="corenet_tcp_bind_pegasus_https_port" lineno="61046">
<summary>
Bind TCP sockets to the pegasus_https port.
</summary>
@@ -48247,7 +48331,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pegasus_https_port" lineno="61048">
+<interface name="corenet_udp_bind_pegasus_https_port" lineno="61066">
<summary>
Bind UDP sockets to the pegasus_https port.
</summary>
@@ -48258,7 +48342,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pegasus_https_port" lineno="61067">
+<interface name="corenet_tcp_connect_pegasus_https_port" lineno="61085">
<summary>
Make a TCP connection to the pegasus_https port.
</summary>
@@ -48268,7 +48352,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_https_client_packets" lineno="61087">
+<interface name="corenet_send_pegasus_https_client_packets" lineno="61105">
<summary>
Send pegasus_https_client packets.
</summary>
@@ -48279,7 +48363,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="61106">
+<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="61124">
<summary>
Do not audit attempts to send pegasus_https_client packets.
</summary>
@@ -48290,7 +48374,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_https_client_packets" lineno="61125">
+<interface name="corenet_receive_pegasus_https_client_packets" lineno="61143">
<summary>
Receive pegasus_https_client packets.
</summary>
@@ -48301,7 +48385,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="61144">
+<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="61162">
<summary>
Do not audit attempts to receive pegasus_https_client packets.
</summary>
@@ -48312,7 +48396,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="61163">
+<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="61181">
<summary>
Send and receive pegasus_https_client packets.
</summary>
@@ -48323,7 +48407,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="61179">
+<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="61197">
<summary>
Do not audit attempts to send and receive pegasus_https_client packets.
</summary>
@@ -48334,7 +48418,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="61194">
+<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="61212">
<summary>
Relabel packets to pegasus_https_client the packet type.
</summary>
@@ -48344,7 +48428,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_https_server_packets" lineno="61214">
+<interface name="corenet_send_pegasus_https_server_packets" lineno="61232">
<summary>
Send pegasus_https_server packets.
</summary>
@@ -48355,7 +48439,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="61233">
+<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="61251">
<summary>
Do not audit attempts to send pegasus_https_server packets.
</summary>
@@ -48366,7 +48450,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_https_server_packets" lineno="61252">
+<interface name="corenet_receive_pegasus_https_server_packets" lineno="61270">
<summary>
Receive pegasus_https_server packets.
</summary>
@@ -48377,7 +48461,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="61271">
+<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="61289">
<summary>
Do not audit attempts to receive pegasus_https_server packets.
</summary>
@@ -48388,7 +48472,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="61290">
+<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="61308">
<summary>
Send and receive pegasus_https_server packets.
</summary>
@@ -48399,7 +48483,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="61306">
+<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="61324">
<summary>
Do not audit attempts to send and receive pegasus_https_server packets.
</summary>
@@ -48410,7 +48494,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="61321">
+<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="61339">
<summary>
Relabel packets to pegasus_https_server the packet type.
</summary>
@@ -48420,7 +48504,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="61343">
+<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="61361">
<summary>
Send and receive TCP traffic on the pgpkeyserver port.
</summary>
@@ -48431,7 +48515,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pgpkeyserver_port" lineno="61358">
+<interface name="corenet_udp_send_pgpkeyserver_port" lineno="61376">
<summary>
Send UDP traffic on the pgpkeyserver port.
</summary>
@@ -48442,7 +48526,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="61373">
+<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="61391">
<summary>
Do not audit attempts to send UDP traffic on the pgpkeyserver port.
</summary>
@@ -48453,7 +48537,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="61388">
+<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="61406">
<summary>
Receive UDP traffic on the pgpkeyserver port.
</summary>
@@ -48464,7 +48548,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="61403">
+<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="61421">
<summary>
Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
</summary>
@@ -48475,7 +48559,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="61418">
+<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="61436">
<summary>
Send and receive UDP traffic on the pgpkeyserver port.
</summary>
@@ -48486,7 +48570,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61434">
+<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61452">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pgpkeyserver port.
@@ -48498,7 +48582,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61449">
+<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61467">
<summary>
Bind TCP sockets to the pgpkeyserver port.
</summary>
@@ -48509,7 +48593,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61469">
+<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61487">
<summary>
Bind UDP sockets to the pgpkeyserver port.
</summary>
@@ -48520,7 +48604,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61488">
+<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61506">
<summary>
Make a TCP connection to the pgpkeyserver port.
</summary>
@@ -48530,7 +48614,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61508">
+<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61526">
<summary>
Send pgpkeyserver_client packets.
</summary>
@@ -48541,7 +48625,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61527">
+<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61545">
<summary>
Do not audit attempts to send pgpkeyserver_client packets.
</summary>
@@ -48552,7 +48636,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61546">
+<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61564">
<summary>
Receive pgpkeyserver_client packets.
</summary>
@@ -48563,7 +48647,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61565">
+<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61583">
<summary>
Do not audit attempts to receive pgpkeyserver_client packets.
</summary>
@@ -48574,7 +48658,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61584">
+<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61602">
<summary>
Send and receive pgpkeyserver_client packets.
</summary>
@@ -48585,7 +48669,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61600">
+<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61618">
<summary>
Do not audit attempts to send and receive pgpkeyserver_client packets.
</summary>
@@ -48596,7 +48680,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61615">
+<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61633">
<summary>
Relabel packets to pgpkeyserver_client the packet type.
</summary>
@@ -48606,7 +48690,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61635">
+<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61653">
<summary>
Send pgpkeyserver_server packets.
</summary>
@@ -48617,7 +48701,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61654">
+<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61672">
<summary>
Do not audit attempts to send pgpkeyserver_server packets.
</summary>
@@ -48628,7 +48712,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61673">
+<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61691">
<summary>
Receive pgpkeyserver_server packets.
</summary>
@@ -48639,7 +48723,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61692">
+<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61710">
<summary>
Do not audit attempts to receive pgpkeyserver_server packets.
</summary>
@@ -48650,7 +48734,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61711">
+<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61729">
<summary>
Send and receive pgpkeyserver_server packets.
</summary>
@@ -48661,7 +48745,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61727">
+<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61745">
<summary>
Do not audit attempts to send and receive pgpkeyserver_server packets.
</summary>
@@ -48672,7 +48756,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61742">
+<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61760">
<summary>
Relabel packets to pgpkeyserver_server the packet type.
</summary>
@@ -48682,7 +48766,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61764">
+<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61782">
<summary>
Send and receive TCP traffic on the pingd port.
</summary>
@@ -48693,7 +48777,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pingd_port" lineno="61779">
+<interface name="corenet_udp_send_pingd_port" lineno="61797">
<summary>
Send UDP traffic on the pingd port.
</summary>
@@ -48704,7 +48788,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61794">
+<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61812">
<summary>
Do not audit attempts to send UDP traffic on the pingd port.
</summary>
@@ -48715,7 +48799,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pingd_port" lineno="61809">
+<interface name="corenet_udp_receive_pingd_port" lineno="61827">
<summary>
Receive UDP traffic on the pingd port.
</summary>
@@ -48726,7 +48810,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61824">
+<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61842">
<summary>
Do not audit attempts to receive UDP traffic on the pingd port.
</summary>
@@ -48737,7 +48821,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pingd_port" lineno="61839">
+<interface name="corenet_udp_sendrecv_pingd_port" lineno="61857">
<summary>
Send and receive UDP traffic on the pingd port.
</summary>
@@ -48748,7 +48832,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61855">
+<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61873">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pingd port.
@@ -48760,7 +48844,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pingd_port" lineno="61870">
+<interface name="corenet_tcp_bind_pingd_port" lineno="61888">
<summary>
Bind TCP sockets to the pingd port.
</summary>
@@ -48771,7 +48855,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pingd_port" lineno="61890">
+<interface name="corenet_udp_bind_pingd_port" lineno="61908">
<summary>
Bind UDP sockets to the pingd port.
</summary>
@@ -48782,7 +48866,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pingd_port" lineno="61909">
+<interface name="corenet_tcp_connect_pingd_port" lineno="61927">
<summary>
Make a TCP connection to the pingd port.
</summary>
@@ -48792,7 +48876,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pingd_client_packets" lineno="61929">
+<interface name="corenet_send_pingd_client_packets" lineno="61947">
<summary>
Send pingd_client packets.
</summary>
@@ -48803,7 +48887,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61948">
+<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61966">
<summary>
Do not audit attempts to send pingd_client packets.
</summary>
@@ -48814,7 +48898,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pingd_client_packets" lineno="61967">
+<interface name="corenet_receive_pingd_client_packets" lineno="61985">
<summary>
Receive pingd_client packets.
</summary>
@@ -48825,7 +48909,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="61986">
+<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="62004">
<summary>
Do not audit attempts to receive pingd_client packets.
</summary>
@@ -48836,7 +48920,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pingd_client_packets" lineno="62005">
+<interface name="corenet_sendrecv_pingd_client_packets" lineno="62023">
<summary>
Send and receive pingd_client packets.
</summary>
@@ -48847,7 +48931,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="62021">
+<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="62039">
<summary>
Do not audit attempts to send and receive pingd_client packets.
</summary>
@@ -48858,7 +48942,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pingd_client_packets" lineno="62036">
+<interface name="corenet_relabelto_pingd_client_packets" lineno="62054">
<summary>
Relabel packets to pingd_client the packet type.
</summary>
@@ -48868,7 +48952,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pingd_server_packets" lineno="62056">
+<interface name="corenet_send_pingd_server_packets" lineno="62074">
<summary>
Send pingd_server packets.
</summary>
@@ -48879,7 +48963,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="62075">
+<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="62093">
<summary>
Do not audit attempts to send pingd_server packets.
</summary>
@@ -48890,7 +48974,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pingd_server_packets" lineno="62094">
+<interface name="corenet_receive_pingd_server_packets" lineno="62112">
<summary>
Receive pingd_server packets.
</summary>
@@ -48901,7 +48985,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="62113">
+<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="62131">
<summary>
Do not audit attempts to receive pingd_server packets.
</summary>
@@ -48912,7 +48996,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pingd_server_packets" lineno="62132">
+<interface name="corenet_sendrecv_pingd_server_packets" lineno="62150">
<summary>
Send and receive pingd_server packets.
</summary>
@@ -48923,7 +49007,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="62148">
+<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="62166">
<summary>
Do not audit attempts to send and receive pingd_server packets.
</summary>
@@ -48934,7 +49018,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pingd_server_packets" lineno="62163">
+<interface name="corenet_relabelto_pingd_server_packets" lineno="62181">
<summary>
Relabel packets to pingd_server the packet type.
</summary>
@@ -48944,7 +49028,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="62185">
+<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="62203">
<summary>
Send and receive TCP traffic on the pktcable_cops port.
</summary>
@@ -48955,7 +49039,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pktcable_cops_port" lineno="62200">
+<interface name="corenet_udp_send_pktcable_cops_port" lineno="62218">
<summary>
Send UDP traffic on the pktcable_cops port.
</summary>
@@ -48966,7 +49050,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="62215">
+<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="62233">
<summary>
Do not audit attempts to send UDP traffic on the pktcable_cops port.
</summary>
@@ -48977,7 +49061,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pktcable_cops_port" lineno="62230">
+<interface name="corenet_udp_receive_pktcable_cops_port" lineno="62248">
<summary>
Receive UDP traffic on the pktcable_cops port.
</summary>
@@ -48988,7 +49072,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="62245">
+<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="62263">
<summary>
Do not audit attempts to receive UDP traffic on the pktcable_cops port.
</summary>
@@ -48999,7 +49083,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="62260">
+<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="62278">
<summary>
Send and receive UDP traffic on the pktcable_cops port.
</summary>
@@ -49010,7 +49094,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="62276">
+<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="62294">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pktcable_cops port.
@@ -49022,7 +49106,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="62291">
+<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="62309">
<summary>
Bind TCP sockets to the pktcable_cops port.
</summary>
@@ -49033,7 +49117,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pktcable_cops_port" lineno="62311">
+<interface name="corenet_udp_bind_pktcable_cops_port" lineno="62329">
<summary>
Bind UDP sockets to the pktcable_cops port.
</summary>
@@ -49044,7 +49128,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="62330">
+<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="62348">
<summary>
Make a TCP connection to the pktcable_cops port.
</summary>
@@ -49054,7 +49138,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pktcable_cops_client_packets" lineno="62350">
+<interface name="corenet_send_pktcable_cops_client_packets" lineno="62368">
<summary>
Send pktcable_cops_client packets.
</summary>
@@ -49065,7 +49149,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="62369">
+<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="62387">
<summary>
Do not audit attempts to send pktcable_cops_client packets.
</summary>
@@ -49076,7 +49160,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pktcable_cops_client_packets" lineno="62388">
+<interface name="corenet_receive_pktcable_cops_client_packets" lineno="62406">
<summary>
Receive pktcable_cops_client packets.
</summary>
@@ -49087,7 +49171,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="62407">
+<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="62425">
<summary>
Do not audit attempts to receive pktcable_cops_client packets.
</summary>
@@ -49098,7 +49182,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62426">
+<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62444">
<summary>
Send and receive pktcable_cops_client packets.
</summary>
@@ -49109,7 +49193,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62442">
+<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62460">
<summary>
Do not audit attempts to send and receive pktcable_cops_client packets.
</summary>
@@ -49120,7 +49204,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62457">
+<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62475">
<summary>
Relabel packets to pktcable_cops_client the packet type.
</summary>
@@ -49130,7 +49214,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pktcable_cops_server_packets" lineno="62477">
+<interface name="corenet_send_pktcable_cops_server_packets" lineno="62495">
<summary>
Send pktcable_cops_server packets.
</summary>
@@ -49141,7 +49225,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62496">
+<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62514">
<summary>
Do not audit attempts to send pktcable_cops_server packets.
</summary>
@@ -49152,7 +49236,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62515">
+<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62533">
<summary>
Receive pktcable_cops_server packets.
</summary>
@@ -49163,7 +49247,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62534">
+<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62552">
<summary>
Do not audit attempts to receive pktcable_cops_server packets.
</summary>
@@ -49174,7 +49258,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62553">
+<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62571">
<summary>
Send and receive pktcable_cops_server packets.
</summary>
@@ -49185,7 +49269,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62569">
+<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62587">
<summary>
Do not audit attempts to send and receive pktcable_cops_server packets.
</summary>
@@ -49196,7 +49280,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62584">
+<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62602">
<summary>
Relabel packets to pktcable_cops_server the packet type.
</summary>
@@ -49206,7 +49290,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pop_port" lineno="62606">
+<interface name="corenet_tcp_sendrecv_pop_port" lineno="62624">
<summary>
Send and receive TCP traffic on the pop port.
</summary>
@@ -49217,7 +49301,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pop_port" lineno="62621">
+<interface name="corenet_udp_send_pop_port" lineno="62639">
<summary>
Send UDP traffic on the pop port.
</summary>
@@ -49228,7 +49312,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62636">
+<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62654">
<summary>
Do not audit attempts to send UDP traffic on the pop port.
</summary>
@@ -49239,7 +49323,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pop_port" lineno="62651">
+<interface name="corenet_udp_receive_pop_port" lineno="62669">
<summary>
Receive UDP traffic on the pop port.
</summary>
@@ -49250,7 +49334,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62666">
+<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62684">
<summary>
Do not audit attempts to receive UDP traffic on the pop port.
</summary>
@@ -49261,7 +49345,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pop_port" lineno="62681">
+<interface name="corenet_udp_sendrecv_pop_port" lineno="62699">
<summary>
Send and receive UDP traffic on the pop port.
</summary>
@@ -49272,7 +49356,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62697">
+<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62715">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pop port.
@@ -49284,7 +49368,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pop_port" lineno="62712">
+<interface name="corenet_tcp_bind_pop_port" lineno="62730">
<summary>
Bind TCP sockets to the pop port.
</summary>
@@ -49295,7 +49379,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pop_port" lineno="62732">
+<interface name="corenet_udp_bind_pop_port" lineno="62750">
<summary>
Bind UDP sockets to the pop port.
</summary>
@@ -49306,7 +49390,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pop_port" lineno="62751">
+<interface name="corenet_tcp_connect_pop_port" lineno="62769">
<summary>
Make a TCP connection to the pop port.
</summary>
@@ -49316,7 +49400,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pop_client_packets" lineno="62771">
+<interface name="corenet_send_pop_client_packets" lineno="62789">
<summary>
Send pop_client packets.
</summary>
@@ -49327,7 +49411,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62790">
+<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62808">
<summary>
Do not audit attempts to send pop_client packets.
</summary>
@@ -49338,7 +49422,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pop_client_packets" lineno="62809">
+<interface name="corenet_receive_pop_client_packets" lineno="62827">
<summary>
Receive pop_client packets.
</summary>
@@ -49349,7 +49433,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62828">
+<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62846">
<summary>
Do not audit attempts to receive pop_client packets.
</summary>
@@ -49360,7 +49444,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pop_client_packets" lineno="62847">
+<interface name="corenet_sendrecv_pop_client_packets" lineno="62865">
<summary>
Send and receive pop_client packets.
</summary>
@@ -49371,7 +49455,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62863">
+<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62881">
<summary>
Do not audit attempts to send and receive pop_client packets.
</summary>
@@ -49382,7 +49466,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pop_client_packets" lineno="62878">
+<interface name="corenet_relabelto_pop_client_packets" lineno="62896">
<summary>
Relabel packets to pop_client the packet type.
</summary>
@@ -49392,7 +49476,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pop_server_packets" lineno="62898">
+<interface name="corenet_send_pop_server_packets" lineno="62916">
<summary>
Send pop_server packets.
</summary>
@@ -49403,7 +49487,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62917">
+<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62935">
<summary>
Do not audit attempts to send pop_server packets.
</summary>
@@ -49414,7 +49498,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pop_server_packets" lineno="62936">
+<interface name="corenet_receive_pop_server_packets" lineno="62954">
<summary>
Receive pop_server packets.
</summary>
@@ -49425,7 +49509,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62955">
+<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62973">
<summary>
Do not audit attempts to receive pop_server packets.
</summary>
@@ -49436,7 +49520,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pop_server_packets" lineno="62974">
+<interface name="corenet_sendrecv_pop_server_packets" lineno="62992">
<summary>
Send and receive pop_server packets.
</summary>
@@ -49447,7 +49531,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="62990">
+<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="63008">
<summary>
Do not audit attempts to send and receive pop_server packets.
</summary>
@@ -49458,7 +49542,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pop_server_packets" lineno="63005">
+<interface name="corenet_relabelto_pop_server_packets" lineno="63023">
<summary>
Relabel packets to pop_server the packet type.
</summary>
@@ -49468,7 +49552,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_portmap_port" lineno="63027">
+<interface name="corenet_tcp_sendrecv_portmap_port" lineno="63045">
<summary>
Send and receive TCP traffic on the portmap port.
</summary>
@@ -49479,7 +49563,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_portmap_port" lineno="63042">
+<interface name="corenet_udp_send_portmap_port" lineno="63060">
<summary>
Send UDP traffic on the portmap port.
</summary>
@@ -49490,7 +49574,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="63057">
+<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="63075">
<summary>
Do not audit attempts to send UDP traffic on the portmap port.
</summary>
@@ -49501,7 +49585,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_portmap_port" lineno="63072">
+<interface name="corenet_udp_receive_portmap_port" lineno="63090">
<summary>
Receive UDP traffic on the portmap port.
</summary>
@@ -49512,7 +49596,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="63087">
+<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="63105">
<summary>
Do not audit attempts to receive UDP traffic on the portmap port.
</summary>
@@ -49523,7 +49607,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_portmap_port" lineno="63102">
+<interface name="corenet_udp_sendrecv_portmap_port" lineno="63120">
<summary>
Send and receive UDP traffic on the portmap port.
</summary>
@@ -49534,7 +49618,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="63118">
+<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="63136">
<summary>
Do not audit attempts to send and receive
UDP traffic on the portmap port.
@@ -49546,7 +49630,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_portmap_port" lineno="63133">
+<interface name="corenet_tcp_bind_portmap_port" lineno="63151">
<summary>
Bind TCP sockets to the portmap port.
</summary>
@@ -49557,7 +49641,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_portmap_port" lineno="63153">
+<interface name="corenet_udp_bind_portmap_port" lineno="63171">
<summary>
Bind UDP sockets to the portmap port.
</summary>
@@ -49568,7 +49652,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_portmap_port" lineno="63172">
+<interface name="corenet_tcp_connect_portmap_port" lineno="63190">
<summary>
Make a TCP connection to the portmap port.
</summary>
@@ -49578,7 +49662,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_portmap_client_packets" lineno="63192">
+<interface name="corenet_send_portmap_client_packets" lineno="63210">
<summary>
Send portmap_client packets.
</summary>
@@ -49589,7 +49673,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="63211">
+<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="63229">
<summary>
Do not audit attempts to send portmap_client packets.
</summary>
@@ -49600,7 +49684,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_portmap_client_packets" lineno="63230">
+<interface name="corenet_receive_portmap_client_packets" lineno="63248">
<summary>
Receive portmap_client packets.
</summary>
@@ -49611,7 +49695,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="63249">
+<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="63267">
<summary>
Do not audit attempts to receive portmap_client packets.
</summary>
@@ -49622,7 +49706,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_portmap_client_packets" lineno="63268">
+<interface name="corenet_sendrecv_portmap_client_packets" lineno="63286">
<summary>
Send and receive portmap_client packets.
</summary>
@@ -49633,7 +49717,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="63284">
+<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="63302">
<summary>
Do not audit attempts to send and receive portmap_client packets.
</summary>
@@ -49644,7 +49728,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_portmap_client_packets" lineno="63299">
+<interface name="corenet_relabelto_portmap_client_packets" lineno="63317">
<summary>
Relabel packets to portmap_client the packet type.
</summary>
@@ -49654,7 +49738,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_portmap_server_packets" lineno="63319">
+<interface name="corenet_send_portmap_server_packets" lineno="63337">
<summary>
Send portmap_server packets.
</summary>
@@ -49665,7 +49749,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="63338">
+<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="63356">
<summary>
Do not audit attempts to send portmap_server packets.
</summary>
@@ -49676,7 +49760,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_portmap_server_packets" lineno="63357">
+<interface name="corenet_receive_portmap_server_packets" lineno="63375">
<summary>
Receive portmap_server packets.
</summary>
@@ -49687,7 +49771,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="63376">
+<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="63394">
<summary>
Do not audit attempts to receive portmap_server packets.
</summary>
@@ -49698,7 +49782,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_portmap_server_packets" lineno="63395">
+<interface name="corenet_sendrecv_portmap_server_packets" lineno="63413">
<summary>
Send and receive portmap_server packets.
</summary>
@@ -49709,7 +49793,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="63411">
+<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="63429">
<summary>
Do not audit attempts to send and receive portmap_server packets.
</summary>
@@ -49720,7 +49804,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_portmap_server_packets" lineno="63426">
+<interface name="corenet_relabelto_portmap_server_packets" lineno="63444">
<summary>
Relabel packets to portmap_server the packet type.
</summary>
@@ -49730,7 +49814,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63448">
+<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63466">
<summary>
Send and receive TCP traffic on the postfix_policyd port.
</summary>
@@ -49741,7 +49825,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_postfix_policyd_port" lineno="63463">
+<interface name="corenet_udp_send_postfix_policyd_port" lineno="63481">
<summary>
Send UDP traffic on the postfix_policyd port.
</summary>
@@ -49752,7 +49836,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63478">
+<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63496">
<summary>
Do not audit attempts to send UDP traffic on the postfix_policyd port.
</summary>
@@ -49763,7 +49847,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63493">
+<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63511">
<summary>
Receive UDP traffic on the postfix_policyd port.
</summary>
@@ -49774,7 +49858,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63508">
+<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63526">
<summary>
Do not audit attempts to receive UDP traffic on the postfix_policyd port.
</summary>
@@ -49785,7 +49869,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63523">
+<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63541">
<summary>
Send and receive UDP traffic on the postfix_policyd port.
</summary>
@@ -49796,7 +49880,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63539">
+<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63557">
<summary>
Do not audit attempts to send and receive
UDP traffic on the postfix_policyd port.
@@ -49808,7 +49892,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63554">
+<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63572">
<summary>
Bind TCP sockets to the postfix_policyd port.
</summary>
@@ -49819,7 +49903,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63574">
+<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63592">
<summary>
Bind UDP sockets to the postfix_policyd port.
</summary>
@@ -49830,7 +49914,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63593">
+<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63611">
<summary>
Make a TCP connection to the postfix_policyd port.
</summary>
@@ -49840,7 +49924,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postfix_policyd_client_packets" lineno="63613">
+<interface name="corenet_send_postfix_policyd_client_packets" lineno="63631">
<summary>
Send postfix_policyd_client packets.
</summary>
@@ -49851,7 +49935,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63632">
+<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63650">
<summary>
Do not audit attempts to send postfix_policyd_client packets.
</summary>
@@ -49862,7 +49946,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63651">
+<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63669">
<summary>
Receive postfix_policyd_client packets.
</summary>
@@ -49873,7 +49957,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63670">
+<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63688">
<summary>
Do not audit attempts to receive postfix_policyd_client packets.
</summary>
@@ -49884,7 +49968,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63689">
+<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63707">
<summary>
Send and receive postfix_policyd_client packets.
</summary>
@@ -49895,7 +49979,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63705">
+<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63723">
<summary>
Do not audit attempts to send and receive postfix_policyd_client packets.
</summary>
@@ -49906,7 +49990,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63720">
+<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63738">
<summary>
Relabel packets to postfix_policyd_client the packet type.
</summary>
@@ -49916,7 +50000,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postfix_policyd_server_packets" lineno="63740">
+<interface name="corenet_send_postfix_policyd_server_packets" lineno="63758">
<summary>
Send postfix_policyd_server packets.
</summary>
@@ -49927,7 +50011,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63759">
+<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63777">
<summary>
Do not audit attempts to send postfix_policyd_server packets.
</summary>
@@ -49938,7 +50022,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63778">
+<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63796">
<summary>
Receive postfix_policyd_server packets.
</summary>
@@ -49949,7 +50033,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63797">
+<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63815">
<summary>
Do not audit attempts to receive postfix_policyd_server packets.
</summary>
@@ -49960,7 +50044,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63816">
+<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63834">
<summary>
Send and receive postfix_policyd_server packets.
</summary>
@@ -49971,7 +50055,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63832">
+<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63850">
<summary>
Do not audit attempts to send and receive postfix_policyd_server packets.
</summary>
@@ -49982,7 +50066,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63847">
+<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63865">
<summary>
Relabel packets to postfix_policyd_server the packet type.
</summary>
@@ -49992,7 +50076,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63869">
+<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63887">
<summary>
Send and receive TCP traffic on the postgresql port.
</summary>
@@ -50003,7 +50087,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_postgresql_port" lineno="63884">
+<interface name="corenet_udp_send_postgresql_port" lineno="63902">
<summary>
Send UDP traffic on the postgresql port.
</summary>
@@ -50014,7 +50098,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63899">
+<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63917">
<summary>
Do not audit attempts to send UDP traffic on the postgresql port.
</summary>
@@ -50025,7 +50109,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_postgresql_port" lineno="63914">
+<interface name="corenet_udp_receive_postgresql_port" lineno="63932">
<summary>
Receive UDP traffic on the postgresql port.
</summary>
@@ -50036,7 +50120,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63929">
+<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63947">
<summary>
Do not audit attempts to receive UDP traffic on the postgresql port.
</summary>
@@ -50047,7 +50131,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63944">
+<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63962">
<summary>
Send and receive UDP traffic on the postgresql port.
</summary>
@@ -50058,7 +50142,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63960">
+<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63978">
<summary>
Do not audit attempts to send and receive
UDP traffic on the postgresql port.
@@ -50070,7 +50154,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_postgresql_port" lineno="63975">
+<interface name="corenet_tcp_bind_postgresql_port" lineno="63993">
<summary>
Bind TCP sockets to the postgresql port.
</summary>
@@ -50081,7 +50165,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_postgresql_port" lineno="63995">
+<interface name="corenet_udp_bind_postgresql_port" lineno="64013">
<summary>
Bind UDP sockets to the postgresql port.
</summary>
@@ -50092,7 +50176,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_postgresql_port" lineno="64014">
+<interface name="corenet_tcp_connect_postgresql_port" lineno="64032">
<summary>
Make a TCP connection to the postgresql port.
</summary>
@@ -50102,7 +50186,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgresql_client_packets" lineno="64034">
+<interface name="corenet_send_postgresql_client_packets" lineno="64052">
<summary>
Send postgresql_client packets.
</summary>
@@ -50113,7 +50197,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="64053">
+<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="64071">
<summary>
Do not audit attempts to send postgresql_client packets.
</summary>
@@ -50124,7 +50208,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgresql_client_packets" lineno="64072">
+<interface name="corenet_receive_postgresql_client_packets" lineno="64090">
<summary>
Receive postgresql_client packets.
</summary>
@@ -50135,7 +50219,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="64091">
+<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="64109">
<summary>
Do not audit attempts to receive postgresql_client packets.
</summary>
@@ -50146,7 +50230,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgresql_client_packets" lineno="64110">
+<interface name="corenet_sendrecv_postgresql_client_packets" lineno="64128">
<summary>
Send and receive postgresql_client packets.
</summary>
@@ -50157,7 +50241,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="64126">
+<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="64144">
<summary>
Do not audit attempts to send and receive postgresql_client packets.
</summary>
@@ -50168,7 +50252,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgresql_client_packets" lineno="64141">
+<interface name="corenet_relabelto_postgresql_client_packets" lineno="64159">
<summary>
Relabel packets to postgresql_client the packet type.
</summary>
@@ -50178,7 +50262,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgresql_server_packets" lineno="64161">
+<interface name="corenet_send_postgresql_server_packets" lineno="64179">
<summary>
Send postgresql_server packets.
</summary>
@@ -50189,7 +50273,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="64180">
+<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="64198">
<summary>
Do not audit attempts to send postgresql_server packets.
</summary>
@@ -50200,7 +50284,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgresql_server_packets" lineno="64199">
+<interface name="corenet_receive_postgresql_server_packets" lineno="64217">
<summary>
Receive postgresql_server packets.
</summary>
@@ -50211,7 +50295,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="64218">
+<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="64236">
<summary>
Do not audit attempts to receive postgresql_server packets.
</summary>
@@ -50222,7 +50306,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgresql_server_packets" lineno="64237">
+<interface name="corenet_sendrecv_postgresql_server_packets" lineno="64255">
<summary>
Send and receive postgresql_server packets.
</summary>
@@ -50233,7 +50317,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="64253">
+<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="64271">
<summary>
Do not audit attempts to send and receive postgresql_server packets.
</summary>
@@ -50244,7 +50328,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgresql_server_packets" lineno="64268">
+<interface name="corenet_relabelto_postgresql_server_packets" lineno="64286">
<summary>
Relabel packets to postgresql_server the packet type.
</summary>
@@ -50254,7 +50338,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="64290">
+<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="64308">
<summary>
Send and receive TCP traffic on the postgrey port.
</summary>
@@ -50265,7 +50349,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_postgrey_port" lineno="64305">
+<interface name="corenet_udp_send_postgrey_port" lineno="64323">
<summary>
Send UDP traffic on the postgrey port.
</summary>
@@ -50276,7 +50360,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="64320">
+<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="64338">
<summary>
Do not audit attempts to send UDP traffic on the postgrey port.
</summary>
@@ -50287,7 +50371,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_postgrey_port" lineno="64335">
+<interface name="corenet_udp_receive_postgrey_port" lineno="64353">
<summary>
Receive UDP traffic on the postgrey port.
</summary>
@@ -50298,7 +50382,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="64350">
+<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="64368">
<summary>
Do not audit attempts to receive UDP traffic on the postgrey port.
</summary>
@@ -50309,7 +50393,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_postgrey_port" lineno="64365">
+<interface name="corenet_udp_sendrecv_postgrey_port" lineno="64383">
<summary>
Send and receive UDP traffic on the postgrey port.
</summary>
@@ -50320,7 +50404,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="64381">
+<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="64399">
<summary>
Do not audit attempts to send and receive
UDP traffic on the postgrey port.
@@ -50332,7 +50416,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_postgrey_port" lineno="64396">
+<interface name="corenet_tcp_bind_postgrey_port" lineno="64414">
<summary>
Bind TCP sockets to the postgrey port.
</summary>
@@ -50343,7 +50427,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_postgrey_port" lineno="64416">
+<interface name="corenet_udp_bind_postgrey_port" lineno="64434">
<summary>
Bind UDP sockets to the postgrey port.
</summary>
@@ -50354,7 +50438,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_postgrey_port" lineno="64435">
+<interface name="corenet_tcp_connect_postgrey_port" lineno="64453">
<summary>
Make a TCP connection to the postgrey port.
</summary>
@@ -50364,7 +50448,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgrey_client_packets" lineno="64455">
+<interface name="corenet_send_postgrey_client_packets" lineno="64473">
<summary>
Send postgrey_client packets.
</summary>
@@ -50375,7 +50459,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64474">
+<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64492">
<summary>
Do not audit attempts to send postgrey_client packets.
</summary>
@@ -50386,7 +50470,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgrey_client_packets" lineno="64493">
+<interface name="corenet_receive_postgrey_client_packets" lineno="64511">
<summary>
Receive postgrey_client packets.
</summary>
@@ -50397,7 +50481,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64512">
+<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64530">
<summary>
Do not audit attempts to receive postgrey_client packets.
</summary>
@@ -50408,7 +50492,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64531">
+<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64549">
<summary>
Send and receive postgrey_client packets.
</summary>
@@ -50419,7 +50503,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64547">
+<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64565">
<summary>
Do not audit attempts to send and receive postgrey_client packets.
</summary>
@@ -50430,7 +50514,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgrey_client_packets" lineno="64562">
+<interface name="corenet_relabelto_postgrey_client_packets" lineno="64580">
<summary>
Relabel packets to postgrey_client the packet type.
</summary>
@@ -50440,7 +50524,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgrey_server_packets" lineno="64582">
+<interface name="corenet_send_postgrey_server_packets" lineno="64600">
<summary>
Send postgrey_server packets.
</summary>
@@ -50451,7 +50535,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64601">
+<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64619">
<summary>
Do not audit attempts to send postgrey_server packets.
</summary>
@@ -50462,7 +50546,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgrey_server_packets" lineno="64620">
+<interface name="corenet_receive_postgrey_server_packets" lineno="64638">
<summary>
Receive postgrey_server packets.
</summary>
@@ -50473,7 +50557,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64639">
+<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64657">
<summary>
Do not audit attempts to receive postgrey_server packets.
</summary>
@@ -50484,7 +50568,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64658">
+<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64676">
<summary>
Send and receive postgrey_server packets.
</summary>
@@ -50495,7 +50579,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64674">
+<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64692">
<summary>
Do not audit attempts to send and receive postgrey_server packets.
</summary>
@@ -50506,7 +50590,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgrey_server_packets" lineno="64689">
+<interface name="corenet_relabelto_postgrey_server_packets" lineno="64707">
<summary>
Relabel packets to postgrey_server the packet type.
</summary>
@@ -50516,7 +50600,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64711">
+<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64729">
<summary>
Send and receive TCP traffic on the pptp port.
</summary>
@@ -50527,7 +50611,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pptp_port" lineno="64726">
+<interface name="corenet_udp_send_pptp_port" lineno="64744">
<summary>
Send UDP traffic on the pptp port.
</summary>
@@ -50538,7 +50622,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64741">
+<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64759">
<summary>
Do not audit attempts to send UDP traffic on the pptp port.
</summary>
@@ -50549,7 +50633,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pptp_port" lineno="64756">
+<interface name="corenet_udp_receive_pptp_port" lineno="64774">
<summary>
Receive UDP traffic on the pptp port.
</summary>
@@ -50560,7 +50644,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64771">
+<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64789">
<summary>
Do not audit attempts to receive UDP traffic on the pptp port.
</summary>
@@ -50571,7 +50655,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pptp_port" lineno="64786">
+<interface name="corenet_udp_sendrecv_pptp_port" lineno="64804">
<summary>
Send and receive UDP traffic on the pptp port.
</summary>
@@ -50582,7 +50666,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64802">
+<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64820">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pptp port.
@@ -50594,7 +50678,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pptp_port" lineno="64817">
+<interface name="corenet_tcp_bind_pptp_port" lineno="64835">
<summary>
Bind TCP sockets to the pptp port.
</summary>
@@ -50605,7 +50689,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pptp_port" lineno="64837">
+<interface name="corenet_udp_bind_pptp_port" lineno="64855">
<summary>
Bind UDP sockets to the pptp port.
</summary>
@@ -50616,7 +50700,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pptp_port" lineno="64856">
+<interface name="corenet_tcp_connect_pptp_port" lineno="64874">
<summary>
Make a TCP connection to the pptp port.
</summary>
@@ -50626,7 +50710,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pptp_client_packets" lineno="64876">
+<interface name="corenet_send_pptp_client_packets" lineno="64894">
<summary>
Send pptp_client packets.
</summary>
@@ -50637,7 +50721,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64895">
+<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64913">
<summary>
Do not audit attempts to send pptp_client packets.
</summary>
@@ -50648,7 +50732,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pptp_client_packets" lineno="64914">
+<interface name="corenet_receive_pptp_client_packets" lineno="64932">
<summary>
Receive pptp_client packets.
</summary>
@@ -50659,7 +50743,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64933">
+<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64951">
<summary>
Do not audit attempts to receive pptp_client packets.
</summary>
@@ -50670,7 +50754,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pptp_client_packets" lineno="64952">
+<interface name="corenet_sendrecv_pptp_client_packets" lineno="64970">
<summary>
Send and receive pptp_client packets.
</summary>
@@ -50681,7 +50765,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64968">
+<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64986">
<summary>
Do not audit attempts to send and receive pptp_client packets.
</summary>
@@ -50692,7 +50776,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pptp_client_packets" lineno="64983">
+<interface name="corenet_relabelto_pptp_client_packets" lineno="65001">
<summary>
Relabel packets to pptp_client the packet type.
</summary>
@@ -50702,7 +50786,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pptp_server_packets" lineno="65003">
+<interface name="corenet_send_pptp_server_packets" lineno="65021">
<summary>
Send pptp_server packets.
</summary>
@@ -50713,7 +50797,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="65022">
+<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="65040">
<summary>
Do not audit attempts to send pptp_server packets.
</summary>
@@ -50724,7 +50808,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pptp_server_packets" lineno="65041">
+<interface name="corenet_receive_pptp_server_packets" lineno="65059">
<summary>
Receive pptp_server packets.
</summary>
@@ -50735,7 +50819,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="65060">
+<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="65078">
<summary>
Do not audit attempts to receive pptp_server packets.
</summary>
@@ -50746,7 +50830,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pptp_server_packets" lineno="65079">
+<interface name="corenet_sendrecv_pptp_server_packets" lineno="65097">
<summary>
Send and receive pptp_server packets.
</summary>
@@ -50757,7 +50841,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="65095">
+<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="65113">
<summary>
Do not audit attempts to send and receive pptp_server packets.
</summary>
@@ -50768,7 +50852,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pptp_server_packets" lineno="65110">
+<interface name="corenet_relabelto_pptp_server_packets" lineno="65128">
<summary>
Relabel packets to pptp_server the packet type.
</summary>
@@ -50778,7 +50862,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_prelude_port" lineno="65132">
+<interface name="corenet_tcp_sendrecv_prelude_port" lineno="65150">
<summary>
Send and receive TCP traffic on the prelude port.
</summary>
@@ -50789,7 +50873,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_prelude_port" lineno="65147">
+<interface name="corenet_udp_send_prelude_port" lineno="65165">
<summary>
Send UDP traffic on the prelude port.
</summary>
@@ -50800,7 +50884,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="65162">
+<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="65180">
<summary>
Do not audit attempts to send UDP traffic on the prelude port.
</summary>
@@ -50811,7 +50895,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_prelude_port" lineno="65177">
+<interface name="corenet_udp_receive_prelude_port" lineno="65195">
<summary>
Receive UDP traffic on the prelude port.
</summary>
@@ -50822,7 +50906,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="65192">
+<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="65210">
<summary>
Do not audit attempts to receive UDP traffic on the prelude port.
</summary>
@@ -50833,7 +50917,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_prelude_port" lineno="65207">
+<interface name="corenet_udp_sendrecv_prelude_port" lineno="65225">
<summary>
Send and receive UDP traffic on the prelude port.
</summary>
@@ -50844,7 +50928,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="65223">
+<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="65241">
<summary>
Do not audit attempts to send and receive
UDP traffic on the prelude port.
@@ -50856,7 +50940,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_prelude_port" lineno="65238">
+<interface name="corenet_tcp_bind_prelude_port" lineno="65256">
<summary>
Bind TCP sockets to the prelude port.
</summary>
@@ -50867,7 +50951,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_prelude_port" lineno="65258">
+<interface name="corenet_udp_bind_prelude_port" lineno="65276">
<summary>
Bind UDP sockets to the prelude port.
</summary>
@@ -50878,7 +50962,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_prelude_port" lineno="65277">
+<interface name="corenet_tcp_connect_prelude_port" lineno="65295">
<summary>
Make a TCP connection to the prelude port.
</summary>
@@ -50888,7 +50972,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_prelude_client_packets" lineno="65297">
+<interface name="corenet_send_prelude_client_packets" lineno="65315">
<summary>
Send prelude_client packets.
</summary>
@@ -50899,7 +50983,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="65316">
+<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="65334">
<summary>
Do not audit attempts to send prelude_client packets.
</summary>
@@ -50910,7 +50994,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_prelude_client_packets" lineno="65335">
+<interface name="corenet_receive_prelude_client_packets" lineno="65353">
<summary>
Receive prelude_client packets.
</summary>
@@ -50921,7 +51005,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="65354">
+<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="65372">
<summary>
Do not audit attempts to receive prelude_client packets.
</summary>
@@ -50932,7 +51016,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_prelude_client_packets" lineno="65373">
+<interface name="corenet_sendrecv_prelude_client_packets" lineno="65391">
<summary>
Send and receive prelude_client packets.
</summary>
@@ -50943,7 +51027,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="65389">
+<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="65407">
<summary>
Do not audit attempts to send and receive prelude_client packets.
</summary>
@@ -50954,7 +51038,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_prelude_client_packets" lineno="65404">
+<interface name="corenet_relabelto_prelude_client_packets" lineno="65422">
<summary>
Relabel packets to prelude_client the packet type.
</summary>
@@ -50964,7 +51048,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_prelude_server_packets" lineno="65424">
+<interface name="corenet_send_prelude_server_packets" lineno="65442">
<summary>
Send prelude_server packets.
</summary>
@@ -50975,7 +51059,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65443">
+<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65461">
<summary>
Do not audit attempts to send prelude_server packets.
</summary>
@@ -50986,7 +51070,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_prelude_server_packets" lineno="65462">
+<interface name="corenet_receive_prelude_server_packets" lineno="65480">
<summary>
Receive prelude_server packets.
</summary>
@@ -50997,7 +51081,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65481">
+<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65499">
<summary>
Do not audit attempts to receive prelude_server packets.
</summary>
@@ -51008,7 +51092,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_prelude_server_packets" lineno="65500">
+<interface name="corenet_sendrecv_prelude_server_packets" lineno="65518">
<summary>
Send and receive prelude_server packets.
</summary>
@@ -51019,7 +51103,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65516">
+<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65534">
<summary>
Do not audit attempts to send and receive prelude_server packets.
</summary>
@@ -51030,7 +51114,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_prelude_server_packets" lineno="65531">
+<interface name="corenet_relabelto_prelude_server_packets" lineno="65549">
<summary>
Relabel packets to prelude_server the packet type.
</summary>
@@ -51040,7 +51124,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_presence_port" lineno="65553">
+<interface name="corenet_tcp_sendrecv_presence_port" lineno="65571">
<summary>
Send and receive TCP traffic on the presence port.
</summary>
@@ -51051,7 +51135,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_presence_port" lineno="65568">
+<interface name="corenet_udp_send_presence_port" lineno="65586">
<summary>
Send UDP traffic on the presence port.
</summary>
@@ -51062,7 +51146,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65583">
+<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65601">
<summary>
Do not audit attempts to send UDP traffic on the presence port.
</summary>
@@ -51073,7 +51157,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_presence_port" lineno="65598">
+<interface name="corenet_udp_receive_presence_port" lineno="65616">
<summary>
Receive UDP traffic on the presence port.
</summary>
@@ -51084,7 +51168,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65613">
+<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65631">
<summary>
Do not audit attempts to receive UDP traffic on the presence port.
</summary>
@@ -51095,7 +51179,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_presence_port" lineno="65628">
+<interface name="corenet_udp_sendrecv_presence_port" lineno="65646">
<summary>
Send and receive UDP traffic on the presence port.
</summary>
@@ -51106,7 +51190,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65644">
+<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65662">
<summary>
Do not audit attempts to send and receive
UDP traffic on the presence port.
@@ -51118,7 +51202,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_presence_port" lineno="65659">
+<interface name="corenet_tcp_bind_presence_port" lineno="65677">
<summary>
Bind TCP sockets to the presence port.
</summary>
@@ -51129,7 +51213,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_presence_port" lineno="65679">
+<interface name="corenet_udp_bind_presence_port" lineno="65697">
<summary>
Bind UDP sockets to the presence port.
</summary>
@@ -51140,7 +51224,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_presence_port" lineno="65698">
+<interface name="corenet_tcp_connect_presence_port" lineno="65716">
<summary>
Make a TCP connection to the presence port.
</summary>
@@ -51150,7 +51234,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_presence_client_packets" lineno="65718">
+<interface name="corenet_send_presence_client_packets" lineno="65736">
<summary>
Send presence_client packets.
</summary>
@@ -51161,7 +51245,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65737">
+<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65755">
<summary>
Do not audit attempts to send presence_client packets.
</summary>
@@ -51172,7 +51256,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_presence_client_packets" lineno="65756">
+<interface name="corenet_receive_presence_client_packets" lineno="65774">
<summary>
Receive presence_client packets.
</summary>
@@ -51183,7 +51267,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65775">
+<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65793">
<summary>
Do not audit attempts to receive presence_client packets.
</summary>
@@ -51194,7 +51278,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_presence_client_packets" lineno="65794">
+<interface name="corenet_sendrecv_presence_client_packets" lineno="65812">
<summary>
Send and receive presence_client packets.
</summary>
@@ -51205,7 +51289,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65810">
+<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65828">
<summary>
Do not audit attempts to send and receive presence_client packets.
</summary>
@@ -51216,7 +51300,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_presence_client_packets" lineno="65825">
+<interface name="corenet_relabelto_presence_client_packets" lineno="65843">
<summary>
Relabel packets to presence_client the packet type.
</summary>
@@ -51226,7 +51310,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_presence_server_packets" lineno="65845">
+<interface name="corenet_send_presence_server_packets" lineno="65863">
<summary>
Send presence_server packets.
</summary>
@@ -51237,7 +51321,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65864">
+<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65882">
<summary>
Do not audit attempts to send presence_server packets.
</summary>
@@ -51248,7 +51332,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_presence_server_packets" lineno="65883">
+<interface name="corenet_receive_presence_server_packets" lineno="65901">
<summary>
Receive presence_server packets.
</summary>
@@ -51259,7 +51343,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65902">
+<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65920">
<summary>
Do not audit attempts to receive presence_server packets.
</summary>
@@ -51270,7 +51354,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_presence_server_packets" lineno="65921">
+<interface name="corenet_sendrecv_presence_server_packets" lineno="65939">
<summary>
Send and receive presence_server packets.
</summary>
@@ -51281,7 +51365,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65937">
+<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65955">
<summary>
Do not audit attempts to send and receive presence_server packets.
</summary>
@@ -51292,7 +51376,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_presence_server_packets" lineno="65952">
+<interface name="corenet_relabelto_presence_server_packets" lineno="65970">
<summary>
Relabel packets to presence_server the packet type.
</summary>
@@ -51302,7 +51386,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_printer_port" lineno="65974">
+<interface name="corenet_tcp_sendrecv_printer_port" lineno="65992">
<summary>
Send and receive TCP traffic on the printer port.
</summary>
@@ -51313,7 +51397,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_printer_port" lineno="65989">
+<interface name="corenet_udp_send_printer_port" lineno="66007">
<summary>
Send UDP traffic on the printer port.
</summary>
@@ -51324,7 +51408,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_printer_port" lineno="66004">
+<interface name="corenet_dontaudit_udp_send_printer_port" lineno="66022">
<summary>
Do not audit attempts to send UDP traffic on the printer port.
</summary>
@@ -51335,7 +51419,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_printer_port" lineno="66019">
+<interface name="corenet_udp_receive_printer_port" lineno="66037">
<summary>
Receive UDP traffic on the printer port.
</summary>
@@ -51346,7 +51430,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="66034">
+<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="66052">
<summary>
Do not audit attempts to receive UDP traffic on the printer port.
</summary>
@@ -51357,7 +51441,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_printer_port" lineno="66049">
+<interface name="corenet_udp_sendrecv_printer_port" lineno="66067">
<summary>
Send and receive UDP traffic on the printer port.
</summary>
@@ -51368,7 +51452,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="66065">
+<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="66083">
<summary>
Do not audit attempts to send and receive
UDP traffic on the printer port.
@@ -51380,7 +51464,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_printer_port" lineno="66080">
+<interface name="corenet_tcp_bind_printer_port" lineno="66098">
<summary>
Bind TCP sockets to the printer port.
</summary>
@@ -51391,7 +51475,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_printer_port" lineno="66100">
+<interface name="corenet_udp_bind_printer_port" lineno="66118">
<summary>
Bind UDP sockets to the printer port.
</summary>
@@ -51402,7 +51486,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_printer_port" lineno="66119">
+<interface name="corenet_tcp_connect_printer_port" lineno="66137">
<summary>
Make a TCP connection to the printer port.
</summary>
@@ -51412,7 +51496,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_printer_client_packets" lineno="66139">
+<interface name="corenet_send_printer_client_packets" lineno="66157">
<summary>
Send printer_client packets.
</summary>
@@ -51423,7 +51507,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_printer_client_packets" lineno="66158">
+<interface name="corenet_dontaudit_send_printer_client_packets" lineno="66176">
<summary>
Do not audit attempts to send printer_client packets.
</summary>
@@ -51434,7 +51518,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_printer_client_packets" lineno="66177">
+<interface name="corenet_receive_printer_client_packets" lineno="66195">
<summary>
Receive printer_client packets.
</summary>
@@ -51445,7 +51529,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="66196">
+<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="66214">
<summary>
Do not audit attempts to receive printer_client packets.
</summary>
@@ -51456,7 +51540,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_printer_client_packets" lineno="66215">
+<interface name="corenet_sendrecv_printer_client_packets" lineno="66233">
<summary>
Send and receive printer_client packets.
</summary>
@@ -51467,7 +51551,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="66231">
+<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="66249">
<summary>
Do not audit attempts to send and receive printer_client packets.
</summary>
@@ -51478,7 +51562,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_printer_client_packets" lineno="66246">
+<interface name="corenet_relabelto_printer_client_packets" lineno="66264">
<summary>
Relabel packets to printer_client the packet type.
</summary>
@@ -51488,7 +51572,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_printer_server_packets" lineno="66266">
+<interface name="corenet_send_printer_server_packets" lineno="66284">
<summary>
Send printer_server packets.
</summary>
@@ -51499,7 +51583,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_printer_server_packets" lineno="66285">
+<interface name="corenet_dontaudit_send_printer_server_packets" lineno="66303">
<summary>
Do not audit attempts to send printer_server packets.
</summary>
@@ -51510,7 +51594,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_printer_server_packets" lineno="66304">
+<interface name="corenet_receive_printer_server_packets" lineno="66322">
<summary>
Receive printer_server packets.
</summary>
@@ -51521,7 +51605,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="66323">
+<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="66341">
<summary>
Do not audit attempts to receive printer_server packets.
</summary>
@@ -51532,7 +51616,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_printer_server_packets" lineno="66342">
+<interface name="corenet_sendrecv_printer_server_packets" lineno="66360">
<summary>
Send and receive printer_server packets.
</summary>
@@ -51543,7 +51627,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="66358">
+<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="66376">
<summary>
Do not audit attempts to send and receive printer_server packets.
</summary>
@@ -51554,7 +51638,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_printer_server_packets" lineno="66373">
+<interface name="corenet_relabelto_printer_server_packets" lineno="66391">
<summary>
Relabel packets to printer_server the packet type.
</summary>
@@ -51564,7 +51648,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ptal_port" lineno="66395">
+<interface name="corenet_tcp_sendrecv_ptal_port" lineno="66413">
<summary>
Send and receive TCP traffic on the ptal port.
</summary>
@@ -51575,7 +51659,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ptal_port" lineno="66410">
+<interface name="corenet_udp_send_ptal_port" lineno="66428">
<summary>
Send UDP traffic on the ptal port.
</summary>
@@ -51586,7 +51670,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66425">
+<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66443">
<summary>
Do not audit attempts to send UDP traffic on the ptal port.
</summary>
@@ -51597,7 +51681,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ptal_port" lineno="66440">
+<interface name="corenet_udp_receive_ptal_port" lineno="66458">
<summary>
Receive UDP traffic on the ptal port.
</summary>
@@ -51608,7 +51692,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66455">
+<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66473">
<summary>
Do not audit attempts to receive UDP traffic on the ptal port.
</summary>
@@ -51619,7 +51703,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ptal_port" lineno="66470">
+<interface name="corenet_udp_sendrecv_ptal_port" lineno="66488">
<summary>
Send and receive UDP traffic on the ptal port.
</summary>
@@ -51630,7 +51714,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66486">
+<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66504">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ptal port.
@@ -51642,7 +51726,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ptal_port" lineno="66501">
+<interface name="corenet_tcp_bind_ptal_port" lineno="66519">
<summary>
Bind TCP sockets to the ptal port.
</summary>
@@ -51653,7 +51737,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ptal_port" lineno="66521">
+<interface name="corenet_udp_bind_ptal_port" lineno="66539">
<summary>
Bind UDP sockets to the ptal port.
</summary>
@@ -51664,7 +51748,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ptal_port" lineno="66540">
+<interface name="corenet_tcp_connect_ptal_port" lineno="66558">
<summary>
Make a TCP connection to the ptal port.
</summary>
@@ -51674,7 +51758,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ptal_client_packets" lineno="66560">
+<interface name="corenet_send_ptal_client_packets" lineno="66578">
<summary>
Send ptal_client packets.
</summary>
@@ -51685,7 +51769,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66579">
+<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66597">
<summary>
Do not audit attempts to send ptal_client packets.
</summary>
@@ -51696,7 +51780,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ptal_client_packets" lineno="66598">
+<interface name="corenet_receive_ptal_client_packets" lineno="66616">
<summary>
Receive ptal_client packets.
</summary>
@@ -51707,7 +51791,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66617">
+<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66635">
<summary>
Do not audit attempts to receive ptal_client packets.
</summary>
@@ -51718,7 +51802,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ptal_client_packets" lineno="66636">
+<interface name="corenet_sendrecv_ptal_client_packets" lineno="66654">
<summary>
Send and receive ptal_client packets.
</summary>
@@ -51729,7 +51813,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66652">
+<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66670">
<summary>
Do not audit attempts to send and receive ptal_client packets.
</summary>
@@ -51740,7 +51824,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ptal_client_packets" lineno="66667">
+<interface name="corenet_relabelto_ptal_client_packets" lineno="66685">
<summary>
Relabel packets to ptal_client the packet type.
</summary>
@@ -51750,7 +51834,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ptal_server_packets" lineno="66687">
+<interface name="corenet_send_ptal_server_packets" lineno="66705">
<summary>
Send ptal_server packets.
</summary>
@@ -51761,7 +51845,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66706">
+<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66724">
<summary>
Do not audit attempts to send ptal_server packets.
</summary>
@@ -51772,7 +51856,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ptal_server_packets" lineno="66725">
+<interface name="corenet_receive_ptal_server_packets" lineno="66743">
<summary>
Receive ptal_server packets.
</summary>
@@ -51783,7 +51867,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66744">
+<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66762">
<summary>
Do not audit attempts to receive ptal_server packets.
</summary>
@@ -51794,7 +51878,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ptal_server_packets" lineno="66763">
+<interface name="corenet_sendrecv_ptal_server_packets" lineno="66781">
<summary>
Send and receive ptal_server packets.
</summary>
@@ -51805,7 +51889,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66779">
+<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66797">
<summary>
Do not audit attempts to send and receive ptal_server packets.
</summary>
@@ -51816,7 +51900,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ptal_server_packets" lineno="66794">
+<interface name="corenet_relabelto_ptal_server_packets" lineno="66812">
<summary>
Relabel packets to ptal_server the packet type.
</summary>
@@ -51826,7 +51910,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66816">
+<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66834">
<summary>
Send and receive TCP traffic on the pulseaudio port.
</summary>
@@ -51837,7 +51921,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pulseaudio_port" lineno="66831">
+<interface name="corenet_udp_send_pulseaudio_port" lineno="66849">
<summary>
Send UDP traffic on the pulseaudio port.
</summary>
@@ -51848,7 +51932,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66846">
+<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66864">
<summary>
Do not audit attempts to send UDP traffic on the pulseaudio port.
</summary>
@@ -51859,7 +51943,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pulseaudio_port" lineno="66861">
+<interface name="corenet_udp_receive_pulseaudio_port" lineno="66879">
<summary>
Receive UDP traffic on the pulseaudio port.
</summary>
@@ -51870,7 +51954,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66876">
+<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66894">
<summary>
Do not audit attempts to receive UDP traffic on the pulseaudio port.
</summary>
@@ -51881,7 +51965,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66891">
+<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66909">
<summary>
Send and receive UDP traffic on the pulseaudio port.
</summary>
@@ -51892,7 +51976,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66907">
+<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66925">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pulseaudio port.
@@ -51904,7 +51988,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66922">
+<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66940">
<summary>
Bind TCP sockets to the pulseaudio port.
</summary>
@@ -51915,7 +51999,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pulseaudio_port" lineno="66942">
+<interface name="corenet_udp_bind_pulseaudio_port" lineno="66960">
<summary>
Bind UDP sockets to the pulseaudio port.
</summary>
@@ -51926,7 +52010,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66961">
+<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66979">
<summary>
Make a TCP connection to the pulseaudio port.
</summary>
@@ -51936,7 +52020,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pulseaudio_client_packets" lineno="66981">
+<interface name="corenet_send_pulseaudio_client_packets" lineno="66999">
<summary>
Send pulseaudio_client packets.
</summary>
@@ -51947,7 +52031,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="67000">
+<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="67018">
<summary>
Do not audit attempts to send pulseaudio_client packets.
</summary>
@@ -51958,7 +52042,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pulseaudio_client_packets" lineno="67019">
+<interface name="corenet_receive_pulseaudio_client_packets" lineno="67037">
<summary>
Receive pulseaudio_client packets.
</summary>
@@ -51969,7 +52053,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="67038">
+<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="67056">
<summary>
Do not audit attempts to receive pulseaudio_client packets.
</summary>
@@ -51980,7 +52064,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="67057">
+<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="67075">
<summary>
Send and receive pulseaudio_client packets.
</summary>
@@ -51991,7 +52075,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="67073">
+<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="67091">
<summary>
Do not audit attempts to send and receive pulseaudio_client packets.
</summary>
@@ -52002,7 +52086,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="67088">
+<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="67106">
<summary>
Relabel packets to pulseaudio_client the packet type.
</summary>
@@ -52012,7 +52096,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pulseaudio_server_packets" lineno="67108">
+<interface name="corenet_send_pulseaudio_server_packets" lineno="67126">
<summary>
Send pulseaudio_server packets.
</summary>
@@ -52023,7 +52107,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="67127">
+<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="67145">
<summary>
Do not audit attempts to send pulseaudio_server packets.
</summary>
@@ -52034,7 +52118,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pulseaudio_server_packets" lineno="67146">
+<interface name="corenet_receive_pulseaudio_server_packets" lineno="67164">
<summary>
Receive pulseaudio_server packets.
</summary>
@@ -52045,7 +52129,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="67165">
+<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="67183">
<summary>
Do not audit attempts to receive pulseaudio_server packets.
</summary>
@@ -52056,7 +52140,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="67184">
+<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="67202">
<summary>
Send and receive pulseaudio_server packets.
</summary>
@@ -52067,7 +52151,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="67200">
+<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="67218">
<summary>
Do not audit attempts to send and receive pulseaudio_server packets.
</summary>
@@ -52078,7 +52162,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="67215">
+<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="67233">
<summary>
Relabel packets to pulseaudio_server the packet type.
</summary>
@@ -52088,7 +52172,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_puppet_port" lineno="67237">
+<interface name="corenet_tcp_sendrecv_puppet_port" lineno="67255">
<summary>
Send and receive TCP traffic on the puppet port.
</summary>
@@ -52099,7 +52183,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_puppet_port" lineno="67252">
+<interface name="corenet_udp_send_puppet_port" lineno="67270">
<summary>
Send UDP traffic on the puppet port.
</summary>
@@ -52110,7 +52194,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="67267">
+<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="67285">
<summary>
Do not audit attempts to send UDP traffic on the puppet port.
</summary>
@@ -52121,7 +52205,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_puppet_port" lineno="67282">
+<interface name="corenet_udp_receive_puppet_port" lineno="67300">
<summary>
Receive UDP traffic on the puppet port.
</summary>
@@ -52132,7 +52216,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="67297">
+<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="67315">
<summary>
Do not audit attempts to receive UDP traffic on the puppet port.
</summary>
@@ -52143,7 +52227,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_puppet_port" lineno="67312">
+<interface name="corenet_udp_sendrecv_puppet_port" lineno="67330">
<summary>
Send and receive UDP traffic on the puppet port.
</summary>
@@ -52154,7 +52238,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="67328">
+<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="67346">
<summary>
Do not audit attempts to send and receive
UDP traffic on the puppet port.
@@ -52166,7 +52250,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_puppet_port" lineno="67343">
+<interface name="corenet_tcp_bind_puppet_port" lineno="67361">
<summary>
Bind TCP sockets to the puppet port.
</summary>
@@ -52177,7 +52261,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_puppet_port" lineno="67363">
+<interface name="corenet_udp_bind_puppet_port" lineno="67381">
<summary>
Bind UDP sockets to the puppet port.
</summary>
@@ -52188,7 +52272,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_puppet_port" lineno="67382">
+<interface name="corenet_tcp_connect_puppet_port" lineno="67400">
<summary>
Make a TCP connection to the puppet port.
</summary>
@@ -52198,7 +52282,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppet_client_packets" lineno="67402">
+<interface name="corenet_send_puppet_client_packets" lineno="67420">
<summary>
Send puppet_client packets.
</summary>
@@ -52209,7 +52293,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67421">
+<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67439">
<summary>
Do not audit attempts to send puppet_client packets.
</summary>
@@ -52220,7 +52304,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppet_client_packets" lineno="67440">
+<interface name="corenet_receive_puppet_client_packets" lineno="67458">
<summary>
Receive puppet_client packets.
</summary>
@@ -52231,7 +52315,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67459">
+<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67477">
<summary>
Do not audit attempts to receive puppet_client packets.
</summary>
@@ -52242,7 +52326,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppet_client_packets" lineno="67478">
+<interface name="corenet_sendrecv_puppet_client_packets" lineno="67496">
<summary>
Send and receive puppet_client packets.
</summary>
@@ -52253,7 +52337,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67494">
+<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67512">
<summary>
Do not audit attempts to send and receive puppet_client packets.
</summary>
@@ -52264,7 +52348,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppet_client_packets" lineno="67509">
+<interface name="corenet_relabelto_puppet_client_packets" lineno="67527">
<summary>
Relabel packets to puppet_client the packet type.
</summary>
@@ -52274,7 +52358,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppet_server_packets" lineno="67529">
+<interface name="corenet_send_puppet_server_packets" lineno="67547">
<summary>
Send puppet_server packets.
</summary>
@@ -52285,7 +52369,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67548">
+<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67566">
<summary>
Do not audit attempts to send puppet_server packets.
</summary>
@@ -52296,7 +52380,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppet_server_packets" lineno="67567">
+<interface name="corenet_receive_puppet_server_packets" lineno="67585">
<summary>
Receive puppet_server packets.
</summary>
@@ -52307,7 +52391,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67586">
+<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67604">
<summary>
Do not audit attempts to receive puppet_server packets.
</summary>
@@ -52318,7 +52402,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppet_server_packets" lineno="67605">
+<interface name="corenet_sendrecv_puppet_server_packets" lineno="67623">
<summary>
Send and receive puppet_server packets.
</summary>
@@ -52329,7 +52413,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67621">
+<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67639">
<summary>
Do not audit attempts to send and receive puppet_server packets.
</summary>
@@ -52340,7 +52424,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppet_server_packets" lineno="67636">
+<interface name="corenet_relabelto_puppet_server_packets" lineno="67654">
<summary>
Relabel packets to puppet_server the packet type.
</summary>
@@ -52350,7 +52434,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67658">
+<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67676">
<summary>
Send and receive TCP traffic on the puppetclient port.
</summary>
@@ -52361,7 +52445,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_puppetclient_port" lineno="67673">
+<interface name="corenet_udp_send_puppetclient_port" lineno="67691">
<summary>
Send UDP traffic on the puppetclient port.
</summary>
@@ -52372,7 +52456,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67688">
+<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67706">
<summary>
Do not audit attempts to send UDP traffic on the puppetclient port.
</summary>
@@ -52383,7 +52467,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_puppetclient_port" lineno="67703">
+<interface name="corenet_udp_receive_puppetclient_port" lineno="67721">
<summary>
Receive UDP traffic on the puppetclient port.
</summary>
@@ -52394,7 +52478,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67718">
+<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67736">
<summary>
Do not audit attempts to receive UDP traffic on the puppetclient port.
</summary>
@@ -52405,7 +52489,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67733">
+<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67751">
<summary>
Send and receive UDP traffic on the puppetclient port.
</summary>
@@ -52416,7 +52500,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67749">
+<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67767">
<summary>
Do not audit attempts to send and receive
UDP traffic on the puppetclient port.
@@ -52428,7 +52512,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_puppetclient_port" lineno="67764">
+<interface name="corenet_tcp_bind_puppetclient_port" lineno="67782">
<summary>
Bind TCP sockets to the puppetclient port.
</summary>
@@ -52439,7 +52523,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_puppetclient_port" lineno="67784">
+<interface name="corenet_udp_bind_puppetclient_port" lineno="67802">
<summary>
Bind UDP sockets to the puppetclient port.
</summary>
@@ -52450,7 +52534,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_puppetclient_port" lineno="67803">
+<interface name="corenet_tcp_connect_puppetclient_port" lineno="67821">
<summary>
Make a TCP connection to the puppetclient port.
</summary>
@@ -52460,7 +52544,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppetclient_client_packets" lineno="67823">
+<interface name="corenet_send_puppetclient_client_packets" lineno="67841">
<summary>
Send puppetclient_client packets.
</summary>
@@ -52471,7 +52555,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67842">
+<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67860">
<summary>
Do not audit attempts to send puppetclient_client packets.
</summary>
@@ -52482,7 +52566,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppetclient_client_packets" lineno="67861">
+<interface name="corenet_receive_puppetclient_client_packets" lineno="67879">
<summary>
Receive puppetclient_client packets.
</summary>
@@ -52493,7 +52577,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67880">
+<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67898">
<summary>
Do not audit attempts to receive puppetclient_client packets.
</summary>
@@ -52504,7 +52588,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67899">
+<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67917">
<summary>
Send and receive puppetclient_client packets.
</summary>
@@ -52515,7 +52599,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67915">
+<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67933">
<summary>
Do not audit attempts to send and receive puppetclient_client packets.
</summary>
@@ -52526,7 +52610,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67930">
+<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67948">
<summary>
Relabel packets to puppetclient_client the packet type.
</summary>
@@ -52536,7 +52620,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppetclient_server_packets" lineno="67950">
+<interface name="corenet_send_puppetclient_server_packets" lineno="67968">
<summary>
Send puppetclient_server packets.
</summary>
@@ -52547,7 +52631,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67969">
+<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67987">
<summary>
Do not audit attempts to send puppetclient_server packets.
</summary>
@@ -52558,7 +52642,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppetclient_server_packets" lineno="67988">
+<interface name="corenet_receive_puppetclient_server_packets" lineno="68006">
<summary>
Receive puppetclient_server packets.
</summary>
@@ -52569,7 +52653,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="68007">
+<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="68025">
<summary>
Do not audit attempts to receive puppetclient_server packets.
</summary>
@@ -52580,7 +52664,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="68026">
+<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="68044">
<summary>
Send and receive puppetclient_server packets.
</summary>
@@ -52591,7 +52675,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="68042">
+<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="68060">
<summary>
Do not audit attempts to send and receive puppetclient_server packets.
</summary>
@@ -52602,7 +52686,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppetclient_server_packets" lineno="68057">
+<interface name="corenet_relabelto_puppetclient_server_packets" lineno="68075">
<summary>
Relabel packets to puppetclient_server the packet type.
</summary>
@@ -52612,7 +52696,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pxe_port" lineno="68079">
+<interface name="corenet_tcp_sendrecv_pxe_port" lineno="68097">
<summary>
Send and receive TCP traffic on the pxe port.
</summary>
@@ -52623,7 +52707,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pxe_port" lineno="68094">
+<interface name="corenet_udp_send_pxe_port" lineno="68112">
<summary>
Send UDP traffic on the pxe port.
</summary>
@@ -52634,7 +52718,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="68109">
+<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="68127">
<summary>
Do not audit attempts to send UDP traffic on the pxe port.
</summary>
@@ -52645,7 +52729,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pxe_port" lineno="68124">
+<interface name="corenet_udp_receive_pxe_port" lineno="68142">
<summary>
Receive UDP traffic on the pxe port.
</summary>
@@ -52656,7 +52740,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="68139">
+<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="68157">
<summary>
Do not audit attempts to receive UDP traffic on the pxe port.
</summary>
@@ -52667,7 +52751,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pxe_port" lineno="68154">
+<interface name="corenet_udp_sendrecv_pxe_port" lineno="68172">
<summary>
Send and receive UDP traffic on the pxe port.
</summary>
@@ -52678,7 +52762,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="68170">
+<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="68188">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pxe port.
@@ -52690,7 +52774,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pxe_port" lineno="68185">
+<interface name="corenet_tcp_bind_pxe_port" lineno="68203">
<summary>
Bind TCP sockets to the pxe port.
</summary>
@@ -52701,7 +52785,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pxe_port" lineno="68205">
+<interface name="corenet_udp_bind_pxe_port" lineno="68223">
<summary>
Bind UDP sockets to the pxe port.
</summary>
@@ -52712,7 +52796,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pxe_port" lineno="68224">
+<interface name="corenet_tcp_connect_pxe_port" lineno="68242">
<summary>
Make a TCP connection to the pxe port.
</summary>
@@ -52722,7 +52806,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pxe_client_packets" lineno="68244">
+<interface name="corenet_send_pxe_client_packets" lineno="68262">
<summary>
Send pxe_client packets.
</summary>
@@ -52733,7 +52817,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="68263">
+<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="68281">
<summary>
Do not audit attempts to send pxe_client packets.
</summary>
@@ -52744,7 +52828,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pxe_client_packets" lineno="68282">
+<interface name="corenet_receive_pxe_client_packets" lineno="68300">
<summary>
Receive pxe_client packets.
</summary>
@@ -52755,7 +52839,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="68301">
+<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="68319">
<summary>
Do not audit attempts to receive pxe_client packets.
</summary>
@@ -52766,7 +52850,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pxe_client_packets" lineno="68320">
+<interface name="corenet_sendrecv_pxe_client_packets" lineno="68338">
<summary>
Send and receive pxe_client packets.
</summary>
@@ -52777,7 +52861,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="68336">
+<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="68354">
<summary>
Do not audit attempts to send and receive pxe_client packets.
</summary>
@@ -52788,7 +52872,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pxe_client_packets" lineno="68351">
+<interface name="corenet_relabelto_pxe_client_packets" lineno="68369">
<summary>
Relabel packets to pxe_client the packet type.
</summary>
@@ -52798,7 +52882,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pxe_server_packets" lineno="68371">
+<interface name="corenet_send_pxe_server_packets" lineno="68389">
<summary>
Send pxe_server packets.
</summary>
@@ -52809,7 +52893,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="68390">
+<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="68408">
<summary>
Do not audit attempts to send pxe_server packets.
</summary>
@@ -52820,7 +52904,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pxe_server_packets" lineno="68409">
+<interface name="corenet_receive_pxe_server_packets" lineno="68427">
<summary>
Receive pxe_server packets.
</summary>
@@ -52831,7 +52915,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68428">
+<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68446">
<summary>
Do not audit attempts to receive pxe_server packets.
</summary>
@@ -52842,7 +52926,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pxe_server_packets" lineno="68447">
+<interface name="corenet_sendrecv_pxe_server_packets" lineno="68465">
<summary>
Send and receive pxe_server packets.
</summary>
@@ -52853,7 +52937,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68463">
+<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68481">
<summary>
Do not audit attempts to send and receive pxe_server packets.
</summary>
@@ -52864,7 +52948,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pxe_server_packets" lineno="68478">
+<interface name="corenet_relabelto_pxe_server_packets" lineno="68496">
<summary>
Relabel packets to pxe_server the packet type.
</summary>
@@ -52874,7 +52958,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68500">
+<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68518">
<summary>
Send and receive TCP traffic on the pyzor port.
</summary>
@@ -52885,7 +52969,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pyzor_port" lineno="68515">
+<interface name="corenet_udp_send_pyzor_port" lineno="68533">
<summary>
Send UDP traffic on the pyzor port.
</summary>
@@ -52896,7 +52980,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68530">
+<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68548">
<summary>
Do not audit attempts to send UDP traffic on the pyzor port.
</summary>
@@ -52907,7 +52991,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pyzor_port" lineno="68545">
+<interface name="corenet_udp_receive_pyzor_port" lineno="68563">
<summary>
Receive UDP traffic on the pyzor port.
</summary>
@@ -52918,7 +53002,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68560">
+<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68578">
<summary>
Do not audit attempts to receive UDP traffic on the pyzor port.
</summary>
@@ -52929,7 +53013,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68575">
+<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68593">
<summary>
Send and receive UDP traffic on the pyzor port.
</summary>
@@ -52940,7 +53024,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68591">
+<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68609">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pyzor port.
@@ -52952,7 +53036,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pyzor_port" lineno="68606">
+<interface name="corenet_tcp_bind_pyzor_port" lineno="68624">
<summary>
Bind TCP sockets to the pyzor port.
</summary>
@@ -52963,7 +53047,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pyzor_port" lineno="68626">
+<interface name="corenet_udp_bind_pyzor_port" lineno="68644">
<summary>
Bind UDP sockets to the pyzor port.
</summary>
@@ -52974,7 +53058,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pyzor_port" lineno="68645">
+<interface name="corenet_tcp_connect_pyzor_port" lineno="68663">
<summary>
Make a TCP connection to the pyzor port.
</summary>
@@ -52984,7 +53068,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pyzor_client_packets" lineno="68665">
+<interface name="corenet_send_pyzor_client_packets" lineno="68683">
<summary>
Send pyzor_client packets.
</summary>
@@ -52995,7 +53079,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68684">
+<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68702">
<summary>
Do not audit attempts to send pyzor_client packets.
</summary>
@@ -53006,7 +53090,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pyzor_client_packets" lineno="68703">
+<interface name="corenet_receive_pyzor_client_packets" lineno="68721">
<summary>
Receive pyzor_client packets.
</summary>
@@ -53017,7 +53101,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68722">
+<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68740">
<summary>
Do not audit attempts to receive pyzor_client packets.
</summary>
@@ -53028,7 +53112,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68741">
+<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68759">
<summary>
Send and receive pyzor_client packets.
</summary>
@@ -53039,7 +53123,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68757">
+<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68775">
<summary>
Do not audit attempts to send and receive pyzor_client packets.
</summary>
@@ -53050,7 +53134,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pyzor_client_packets" lineno="68772">
+<interface name="corenet_relabelto_pyzor_client_packets" lineno="68790">
<summary>
Relabel packets to pyzor_client the packet type.
</summary>
@@ -53060,7 +53144,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pyzor_server_packets" lineno="68792">
+<interface name="corenet_send_pyzor_server_packets" lineno="68810">
<summary>
Send pyzor_server packets.
</summary>
@@ -53071,7 +53155,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68811">
+<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68829">
<summary>
Do not audit attempts to send pyzor_server packets.
</summary>
@@ -53082,7 +53166,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pyzor_server_packets" lineno="68830">
+<interface name="corenet_receive_pyzor_server_packets" lineno="68848">
<summary>
Receive pyzor_server packets.
</summary>
@@ -53093,7 +53177,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68849">
+<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68867">
<summary>
Do not audit attempts to receive pyzor_server packets.
</summary>
@@ -53104,7 +53188,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68868">
+<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68886">
<summary>
Send and receive pyzor_server packets.
</summary>
@@ -53115,7 +53199,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68884">
+<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68902">
<summary>
Do not audit attempts to send and receive pyzor_server packets.
</summary>
@@ -53126,7 +53210,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pyzor_server_packets" lineno="68899">
+<interface name="corenet_relabelto_pyzor_server_packets" lineno="68917">
<summary>
Relabel packets to pyzor_server the packet type.
</summary>
@@ -53136,7 +53220,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68921">
+<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68939">
<summary>
Send and receive TCP traffic on the radacct port.
</summary>
@@ -53147,7 +53231,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_radacct_port" lineno="68936">
+<interface name="corenet_udp_send_radacct_port" lineno="68954">
<summary>
Send UDP traffic on the radacct port.
</summary>
@@ -53158,7 +53242,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68951">
+<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68969">
<summary>
Do not audit attempts to send UDP traffic on the radacct port.
</summary>
@@ -53169,7 +53253,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_radacct_port" lineno="68966">
+<interface name="corenet_udp_receive_radacct_port" lineno="68984">
<summary>
Receive UDP traffic on the radacct port.
</summary>
@@ -53180,7 +53264,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68981">
+<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68999">
<summary>
Do not audit attempts to receive UDP traffic on the radacct port.
</summary>
@@ -53191,7 +53275,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_radacct_port" lineno="68996">
+<interface name="corenet_udp_sendrecv_radacct_port" lineno="69014">
<summary>
Send and receive UDP traffic on the radacct port.
</summary>
@@ -53202,7 +53286,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="69012">
+<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="69030">
<summary>
Do not audit attempts to send and receive
UDP traffic on the radacct port.
@@ -53214,7 +53298,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_radacct_port" lineno="69027">
+<interface name="corenet_tcp_bind_radacct_port" lineno="69045">
<summary>
Bind TCP sockets to the radacct port.
</summary>
@@ -53225,7 +53309,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_radacct_port" lineno="69047">
+<interface name="corenet_udp_bind_radacct_port" lineno="69065">
<summary>
Bind UDP sockets to the radacct port.
</summary>
@@ -53236,7 +53320,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_radacct_port" lineno="69066">
+<interface name="corenet_tcp_connect_radacct_port" lineno="69084">
<summary>
Make a TCP connection to the radacct port.
</summary>
@@ -53246,7 +53330,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radacct_client_packets" lineno="69086">
+<interface name="corenet_send_radacct_client_packets" lineno="69104">
<summary>
Send radacct_client packets.
</summary>
@@ -53257,7 +53341,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="69105">
+<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="69123">
<summary>
Do not audit attempts to send radacct_client packets.
</summary>
@@ -53268,7 +53352,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radacct_client_packets" lineno="69124">
+<interface name="corenet_receive_radacct_client_packets" lineno="69142">
<summary>
Receive radacct_client packets.
</summary>
@@ -53279,7 +53363,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="69143">
+<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="69161">
<summary>
Do not audit attempts to receive radacct_client packets.
</summary>
@@ -53290,7 +53374,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radacct_client_packets" lineno="69162">
+<interface name="corenet_sendrecv_radacct_client_packets" lineno="69180">
<summary>
Send and receive radacct_client packets.
</summary>
@@ -53301,7 +53385,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="69178">
+<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="69196">
<summary>
Do not audit attempts to send and receive radacct_client packets.
</summary>
@@ -53312,7 +53396,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radacct_client_packets" lineno="69193">
+<interface name="corenet_relabelto_radacct_client_packets" lineno="69211">
<summary>
Relabel packets to radacct_client the packet type.
</summary>
@@ -53322,7 +53406,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radacct_server_packets" lineno="69213">
+<interface name="corenet_send_radacct_server_packets" lineno="69231">
<summary>
Send radacct_server packets.
</summary>
@@ -53333,7 +53417,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="69232">
+<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="69250">
<summary>
Do not audit attempts to send radacct_server packets.
</summary>
@@ -53344,7 +53428,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radacct_server_packets" lineno="69251">
+<interface name="corenet_receive_radacct_server_packets" lineno="69269">
<summary>
Receive radacct_server packets.
</summary>
@@ -53355,7 +53439,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="69270">
+<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="69288">
<summary>
Do not audit attempts to receive radacct_server packets.
</summary>
@@ -53366,7 +53450,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radacct_server_packets" lineno="69289">
+<interface name="corenet_sendrecv_radacct_server_packets" lineno="69307">
<summary>
Send and receive radacct_server packets.
</summary>
@@ -53377,7 +53461,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="69305">
+<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="69323">
<summary>
Do not audit attempts to send and receive radacct_server packets.
</summary>
@@ -53388,7 +53472,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radacct_server_packets" lineno="69320">
+<interface name="corenet_relabelto_radacct_server_packets" lineno="69338">
<summary>
Relabel packets to radacct_server the packet type.
</summary>
@@ -53398,7 +53482,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_radius_port" lineno="69342">
+<interface name="corenet_tcp_sendrecv_radius_port" lineno="69360">
<summary>
Send and receive TCP traffic on the radius port.
</summary>
@@ -53409,7 +53493,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_radius_port" lineno="69357">
+<interface name="corenet_udp_send_radius_port" lineno="69375">
<summary>
Send UDP traffic on the radius port.
</summary>
@@ -53420,7 +53504,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_radius_port" lineno="69372">
+<interface name="corenet_dontaudit_udp_send_radius_port" lineno="69390">
<summary>
Do not audit attempts to send UDP traffic on the radius port.
</summary>
@@ -53431,7 +53515,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_radius_port" lineno="69387">
+<interface name="corenet_udp_receive_radius_port" lineno="69405">
<summary>
Receive UDP traffic on the radius port.
</summary>
@@ -53442,7 +53526,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="69402">
+<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="69420">
<summary>
Do not audit attempts to receive UDP traffic on the radius port.
</summary>
@@ -53453,7 +53537,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_radius_port" lineno="69417">
+<interface name="corenet_udp_sendrecv_radius_port" lineno="69435">
<summary>
Send and receive UDP traffic on the radius port.
</summary>
@@ -53464,7 +53548,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69433">
+<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69451">
<summary>
Do not audit attempts to send and receive
UDP traffic on the radius port.
@@ -53476,7 +53560,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_radius_port" lineno="69448">
+<interface name="corenet_tcp_bind_radius_port" lineno="69466">
<summary>
Bind TCP sockets to the radius port.
</summary>
@@ -53487,7 +53571,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_radius_port" lineno="69468">
+<interface name="corenet_udp_bind_radius_port" lineno="69486">
<summary>
Bind UDP sockets to the radius port.
</summary>
@@ -53498,7 +53582,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_radius_port" lineno="69487">
+<interface name="corenet_tcp_connect_radius_port" lineno="69505">
<summary>
Make a TCP connection to the radius port.
</summary>
@@ -53508,7 +53592,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radius_client_packets" lineno="69507">
+<interface name="corenet_send_radius_client_packets" lineno="69525">
<summary>
Send radius_client packets.
</summary>
@@ -53519,7 +53603,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69526">
+<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69544">
<summary>
Do not audit attempts to send radius_client packets.
</summary>
@@ -53530,7 +53614,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radius_client_packets" lineno="69545">
+<interface name="corenet_receive_radius_client_packets" lineno="69563">
<summary>
Receive radius_client packets.
</summary>
@@ -53541,7 +53625,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69564">
+<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69582">
<summary>
Do not audit attempts to receive radius_client packets.
</summary>
@@ -53552,7 +53636,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radius_client_packets" lineno="69583">
+<interface name="corenet_sendrecv_radius_client_packets" lineno="69601">
<summary>
Send and receive radius_client packets.
</summary>
@@ -53563,7 +53647,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69599">
+<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69617">
<summary>
Do not audit attempts to send and receive radius_client packets.
</summary>
@@ -53574,7 +53658,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radius_client_packets" lineno="69614">
+<interface name="corenet_relabelto_radius_client_packets" lineno="69632">
<summary>
Relabel packets to radius_client the packet type.
</summary>
@@ -53584,7 +53668,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radius_server_packets" lineno="69634">
+<interface name="corenet_send_radius_server_packets" lineno="69652">
<summary>
Send radius_server packets.
</summary>
@@ -53595,7 +53679,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69653">
+<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69671">
<summary>
Do not audit attempts to send radius_server packets.
</summary>
@@ -53606,7 +53690,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radius_server_packets" lineno="69672">
+<interface name="corenet_receive_radius_server_packets" lineno="69690">
<summary>
Receive radius_server packets.
</summary>
@@ -53617,7 +53701,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69691">
+<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69709">
<summary>
Do not audit attempts to receive radius_server packets.
</summary>
@@ -53628,7 +53712,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radius_server_packets" lineno="69710">
+<interface name="corenet_sendrecv_radius_server_packets" lineno="69728">
<summary>
Send and receive radius_server packets.
</summary>
@@ -53639,7 +53723,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69726">
+<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69744">
<summary>
Do not audit attempts to send and receive radius_server packets.
</summary>
@@ -53650,7 +53734,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radius_server_packets" lineno="69741">
+<interface name="corenet_relabelto_radius_server_packets" lineno="69759">
<summary>
Relabel packets to radius_server the packet type.
</summary>
@@ -53660,7 +53744,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69763">
+<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69781">
<summary>
Send and receive TCP traffic on the radsec port.
</summary>
@@ -53671,7 +53755,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_radsec_port" lineno="69778">
+<interface name="corenet_udp_send_radsec_port" lineno="69796">
<summary>
Send UDP traffic on the radsec port.
</summary>
@@ -53682,7 +53766,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69793">
+<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69811">
<summary>
Do not audit attempts to send UDP traffic on the radsec port.
</summary>
@@ -53693,7 +53777,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_radsec_port" lineno="69808">
+<interface name="corenet_udp_receive_radsec_port" lineno="69826">
<summary>
Receive UDP traffic on the radsec port.
</summary>
@@ -53704,7 +53788,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69823">
+<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69841">
<summary>
Do not audit attempts to receive UDP traffic on the radsec port.
</summary>
@@ -53715,7 +53799,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_radsec_port" lineno="69838">
+<interface name="corenet_udp_sendrecv_radsec_port" lineno="69856">
<summary>
Send and receive UDP traffic on the radsec port.
</summary>
@@ -53726,7 +53810,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69854">
+<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69872">
<summary>
Do not audit attempts to send and receive
UDP traffic on the radsec port.
@@ -53738,7 +53822,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_radsec_port" lineno="69869">
+<interface name="corenet_tcp_bind_radsec_port" lineno="69887">
<summary>
Bind TCP sockets to the radsec port.
</summary>
@@ -53749,7 +53833,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_radsec_port" lineno="69889">
+<interface name="corenet_udp_bind_radsec_port" lineno="69907">
<summary>
Bind UDP sockets to the radsec port.
</summary>
@@ -53760,7 +53844,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_radsec_port" lineno="69908">
+<interface name="corenet_tcp_connect_radsec_port" lineno="69926">
<summary>
Make a TCP connection to the radsec port.
</summary>
@@ -53770,7 +53854,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radsec_client_packets" lineno="69928">
+<interface name="corenet_send_radsec_client_packets" lineno="69946">
<summary>
Send radsec_client packets.
</summary>
@@ -53781,7 +53865,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69947">
+<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69965">
<summary>
Do not audit attempts to send radsec_client packets.
</summary>
@@ -53792,7 +53876,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radsec_client_packets" lineno="69966">
+<interface name="corenet_receive_radsec_client_packets" lineno="69984">
<summary>
Receive radsec_client packets.
</summary>
@@ -53803,7 +53887,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="69985">
+<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="70003">
<summary>
Do not audit attempts to receive radsec_client packets.
</summary>
@@ -53814,7 +53898,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radsec_client_packets" lineno="70004">
+<interface name="corenet_sendrecv_radsec_client_packets" lineno="70022">
<summary>
Send and receive radsec_client packets.
</summary>
@@ -53825,7 +53909,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="70020">
+<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="70038">
<summary>
Do not audit attempts to send and receive radsec_client packets.
</summary>
@@ -53836,7 +53920,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radsec_client_packets" lineno="70035">
+<interface name="corenet_relabelto_radsec_client_packets" lineno="70053">
<summary>
Relabel packets to radsec_client the packet type.
</summary>
@@ -53846,7 +53930,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radsec_server_packets" lineno="70055">
+<interface name="corenet_send_radsec_server_packets" lineno="70073">
<summary>
Send radsec_server packets.
</summary>
@@ -53857,7 +53941,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="70074">
+<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="70092">
<summary>
Do not audit attempts to send radsec_server packets.
</summary>
@@ -53868,7 +53952,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radsec_server_packets" lineno="70093">
+<interface name="corenet_receive_radsec_server_packets" lineno="70111">
<summary>
Receive radsec_server packets.
</summary>
@@ -53879,7 +53963,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="70112">
+<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="70130">
<summary>
Do not audit attempts to receive radsec_server packets.
</summary>
@@ -53890,7 +53974,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radsec_server_packets" lineno="70131">
+<interface name="corenet_sendrecv_radsec_server_packets" lineno="70149">
<summary>
Send and receive radsec_server packets.
</summary>
@@ -53901,7 +53985,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="70147">
+<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="70165">
<summary>
Do not audit attempts to send and receive radsec_server packets.
</summary>
@@ -53912,7 +53996,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radsec_server_packets" lineno="70162">
+<interface name="corenet_relabelto_radsec_server_packets" lineno="70180">
<summary>
Relabel packets to radsec_server the packet type.
</summary>
@@ -53922,7 +54006,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_razor_port" lineno="70184">
+<interface name="corenet_tcp_sendrecv_razor_port" lineno="70202">
<summary>
Send and receive TCP traffic on the razor port.
</summary>
@@ -53933,7 +54017,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_razor_port" lineno="70199">
+<interface name="corenet_udp_send_razor_port" lineno="70217">
<summary>
Send UDP traffic on the razor port.
</summary>
@@ -53944,7 +54028,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_razor_port" lineno="70214">
+<interface name="corenet_dontaudit_udp_send_razor_port" lineno="70232">
<summary>
Do not audit attempts to send UDP traffic on the razor port.
</summary>
@@ -53955,7 +54039,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_razor_port" lineno="70229">
+<interface name="corenet_udp_receive_razor_port" lineno="70247">
<summary>
Receive UDP traffic on the razor port.
</summary>
@@ -53966,7 +54050,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="70244">
+<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="70262">
<summary>
Do not audit attempts to receive UDP traffic on the razor port.
</summary>
@@ -53977,7 +54061,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_razor_port" lineno="70259">
+<interface name="corenet_udp_sendrecv_razor_port" lineno="70277">
<summary>
Send and receive UDP traffic on the razor port.
</summary>
@@ -53988,7 +54072,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="70275">
+<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="70293">
<summary>
Do not audit attempts to send and receive
UDP traffic on the razor port.
@@ -54000,7 +54084,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_razor_port" lineno="70290">
+<interface name="corenet_tcp_bind_razor_port" lineno="70308">
<summary>
Bind TCP sockets to the razor port.
</summary>
@@ -54011,7 +54095,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_razor_port" lineno="70310">
+<interface name="corenet_udp_bind_razor_port" lineno="70328">
<summary>
Bind UDP sockets to the razor port.
</summary>
@@ -54022,7 +54106,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_razor_port" lineno="70329">
+<interface name="corenet_tcp_connect_razor_port" lineno="70347">
<summary>
Make a TCP connection to the razor port.
</summary>
@@ -54032,7 +54116,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_razor_client_packets" lineno="70349">
+<interface name="corenet_send_razor_client_packets" lineno="70367">
<summary>
Send razor_client packets.
</summary>
@@ -54043,7 +54127,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_razor_client_packets" lineno="70368">
+<interface name="corenet_dontaudit_send_razor_client_packets" lineno="70386">
<summary>
Do not audit attempts to send razor_client packets.
</summary>
@@ -54054,7 +54138,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_razor_client_packets" lineno="70387">
+<interface name="corenet_receive_razor_client_packets" lineno="70405">
<summary>
Receive razor_client packets.
</summary>
@@ -54065,7 +54149,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="70406">
+<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="70424">
<summary>
Do not audit attempts to receive razor_client packets.
</summary>
@@ -54076,7 +54160,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_razor_client_packets" lineno="70425">
+<interface name="corenet_sendrecv_razor_client_packets" lineno="70443">
<summary>
Send and receive razor_client packets.
</summary>
@@ -54087,7 +54171,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70441">
+<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70459">
<summary>
Do not audit attempts to send and receive razor_client packets.
</summary>
@@ -54098,7 +54182,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_razor_client_packets" lineno="70456">
+<interface name="corenet_relabelto_razor_client_packets" lineno="70474">
<summary>
Relabel packets to razor_client the packet type.
</summary>
@@ -54108,7 +54192,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_razor_server_packets" lineno="70476">
+<interface name="corenet_send_razor_server_packets" lineno="70494">
<summary>
Send razor_server packets.
</summary>
@@ -54119,7 +54203,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70495">
+<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70513">
<summary>
Do not audit attempts to send razor_server packets.
</summary>
@@ -54130,7 +54214,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_razor_server_packets" lineno="70514">
+<interface name="corenet_receive_razor_server_packets" lineno="70532">
<summary>
Receive razor_server packets.
</summary>
@@ -54141,7 +54225,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70533">
+<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70551">
<summary>
Do not audit attempts to receive razor_server packets.
</summary>
@@ -54152,7 +54236,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_razor_server_packets" lineno="70552">
+<interface name="corenet_sendrecv_razor_server_packets" lineno="70570">
<summary>
Send and receive razor_server packets.
</summary>
@@ -54163,7 +54247,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70568">
+<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70586">
<summary>
Do not audit attempts to send and receive razor_server packets.
</summary>
@@ -54174,7 +54258,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_razor_server_packets" lineno="70583">
+<interface name="corenet_relabelto_razor_server_packets" lineno="70601">
<summary>
Relabel packets to razor_server the packet type.
</summary>
@@ -54184,7 +54268,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_redis_port" lineno="70605">
+<interface name="corenet_tcp_sendrecv_redis_port" lineno="70623">
<summary>
Send and receive TCP traffic on the redis port.
</summary>
@@ -54195,7 +54279,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_redis_port" lineno="70620">
+<interface name="corenet_udp_send_redis_port" lineno="70638">
<summary>
Send UDP traffic on the redis port.
</summary>
@@ -54206,7 +54290,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70635">
+<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70653">
<summary>
Do not audit attempts to send UDP traffic on the redis port.
</summary>
@@ -54217,7 +54301,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_redis_port" lineno="70650">
+<interface name="corenet_udp_receive_redis_port" lineno="70668">
<summary>
Receive UDP traffic on the redis port.
</summary>
@@ -54228,7 +54312,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70665">
+<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70683">
<summary>
Do not audit attempts to receive UDP traffic on the redis port.
</summary>
@@ -54239,7 +54323,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_redis_port" lineno="70680">
+<interface name="corenet_udp_sendrecv_redis_port" lineno="70698">
<summary>
Send and receive UDP traffic on the redis port.
</summary>
@@ -54250,7 +54334,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70696">
+<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70714">
<summary>
Do not audit attempts to send and receive
UDP traffic on the redis port.
@@ -54262,7 +54346,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_redis_port" lineno="70711">
+<interface name="corenet_tcp_bind_redis_port" lineno="70729">
<summary>
Bind TCP sockets to the redis port.
</summary>
@@ -54273,7 +54357,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_redis_port" lineno="70731">
+<interface name="corenet_udp_bind_redis_port" lineno="70749">
<summary>
Bind UDP sockets to the redis port.
</summary>
@@ -54284,7 +54368,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_redis_port" lineno="70750">
+<interface name="corenet_tcp_connect_redis_port" lineno="70768">
<summary>
Make a TCP connection to the redis port.
</summary>
@@ -54294,7 +54378,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_redis_client_packets" lineno="70770">
+<interface name="corenet_send_redis_client_packets" lineno="70788">
<summary>
Send redis_client packets.
</summary>
@@ -54305,7 +54389,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70789">
+<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70807">
<summary>
Do not audit attempts to send redis_client packets.
</summary>
@@ -54316,7 +54400,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_redis_client_packets" lineno="70808">
+<interface name="corenet_receive_redis_client_packets" lineno="70826">
<summary>
Receive redis_client packets.
</summary>
@@ -54327,7 +54411,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70827">
+<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70845">
<summary>
Do not audit attempts to receive redis_client packets.
</summary>
@@ -54338,7 +54422,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_redis_client_packets" lineno="70846">
+<interface name="corenet_sendrecv_redis_client_packets" lineno="70864">
<summary>
Send and receive redis_client packets.
</summary>
@@ -54349,7 +54433,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70862">
+<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70880">
<summary>
Do not audit attempts to send and receive redis_client packets.
</summary>
@@ -54360,7 +54444,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_redis_client_packets" lineno="70877">
+<interface name="corenet_relabelto_redis_client_packets" lineno="70895">
<summary>
Relabel packets to redis_client the packet type.
</summary>
@@ -54370,7 +54454,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_redis_server_packets" lineno="70897">
+<interface name="corenet_send_redis_server_packets" lineno="70915">
<summary>
Send redis_server packets.
</summary>
@@ -54381,7 +54465,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70916">
+<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70934">
<summary>
Do not audit attempts to send redis_server packets.
</summary>
@@ -54392,7 +54476,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_redis_server_packets" lineno="70935">
+<interface name="corenet_receive_redis_server_packets" lineno="70953">
<summary>
Receive redis_server packets.
</summary>
@@ -54403,7 +54487,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70954">
+<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70972">
<summary>
Do not audit attempts to receive redis_server packets.
</summary>
@@ -54414,7 +54498,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_redis_server_packets" lineno="70973">
+<interface name="corenet_sendrecv_redis_server_packets" lineno="70991">
<summary>
Send and receive redis_server packets.
</summary>
@@ -54425,7 +54509,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="70989">
+<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="71007">
<summary>
Do not audit attempts to send and receive redis_server packets.
</summary>
@@ -54436,7 +54520,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_redis_server_packets" lineno="71004">
+<interface name="corenet_relabelto_redis_server_packets" lineno="71022">
<summary>
Relabel packets to redis_server the packet type.
</summary>
@@ -54446,7 +54530,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_repository_port" lineno="71026">
+<interface name="corenet_tcp_sendrecv_repository_port" lineno="71044">
<summary>
Send and receive TCP traffic on the repository port.
</summary>
@@ -54457,7 +54541,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_repository_port" lineno="71041">
+<interface name="corenet_udp_send_repository_port" lineno="71059">
<summary>
Send UDP traffic on the repository port.
</summary>
@@ -54468,7 +54552,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_repository_port" lineno="71056">
+<interface name="corenet_dontaudit_udp_send_repository_port" lineno="71074">
<summary>
Do not audit attempts to send UDP traffic on the repository port.
</summary>
@@ -54479,7 +54563,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_repository_port" lineno="71071">
+<interface name="corenet_udp_receive_repository_port" lineno="71089">
<summary>
Receive UDP traffic on the repository port.
</summary>
@@ -54490,7 +54574,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="71086">
+<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="71104">
<summary>
Do not audit attempts to receive UDP traffic on the repository port.
</summary>
@@ -54501,7 +54585,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_repository_port" lineno="71101">
+<interface name="corenet_udp_sendrecv_repository_port" lineno="71119">
<summary>
Send and receive UDP traffic on the repository port.
</summary>
@@ -54512,7 +54596,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="71117">
+<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="71135">
<summary>
Do not audit attempts to send and receive
UDP traffic on the repository port.
@@ -54524,7 +54608,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_repository_port" lineno="71132">
+<interface name="corenet_tcp_bind_repository_port" lineno="71150">
<summary>
Bind TCP sockets to the repository port.
</summary>
@@ -54535,7 +54619,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_repository_port" lineno="71152">
+<interface name="corenet_udp_bind_repository_port" lineno="71170">
<summary>
Bind UDP sockets to the repository port.
</summary>
@@ -54546,7 +54630,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_repository_port" lineno="71171">
+<interface name="corenet_tcp_connect_repository_port" lineno="71189">
<summary>
Make a TCP connection to the repository port.
</summary>
@@ -54556,7 +54640,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_repository_client_packets" lineno="71191">
+<interface name="corenet_send_repository_client_packets" lineno="71209">
<summary>
Send repository_client packets.
</summary>
@@ -54567,7 +54651,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_repository_client_packets" lineno="71210">
+<interface name="corenet_dontaudit_send_repository_client_packets" lineno="71228">
<summary>
Do not audit attempts to send repository_client packets.
</summary>
@@ -54578,7 +54662,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_repository_client_packets" lineno="71229">
+<interface name="corenet_receive_repository_client_packets" lineno="71247">
<summary>
Receive repository_client packets.
</summary>
@@ -54589,7 +54673,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="71248">
+<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="71266">
<summary>
Do not audit attempts to receive repository_client packets.
</summary>
@@ -54600,7 +54684,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_repository_client_packets" lineno="71267">
+<interface name="corenet_sendrecv_repository_client_packets" lineno="71285">
<summary>
Send and receive repository_client packets.
</summary>
@@ -54611,7 +54695,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="71283">
+<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="71301">
<summary>
Do not audit attempts to send and receive repository_client packets.
</summary>
@@ -54622,7 +54706,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_repository_client_packets" lineno="71298">
+<interface name="corenet_relabelto_repository_client_packets" lineno="71316">
<summary>
Relabel packets to repository_client the packet type.
</summary>
@@ -54632,7 +54716,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_repository_server_packets" lineno="71318">
+<interface name="corenet_send_repository_server_packets" lineno="71336">
<summary>
Send repository_server packets.
</summary>
@@ -54643,7 +54727,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_repository_server_packets" lineno="71337">
+<interface name="corenet_dontaudit_send_repository_server_packets" lineno="71355">
<summary>
Do not audit attempts to send repository_server packets.
</summary>
@@ -54654,7 +54738,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_repository_server_packets" lineno="71356">
+<interface name="corenet_receive_repository_server_packets" lineno="71374">
<summary>
Receive repository_server packets.
</summary>
@@ -54665,7 +54749,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="71375">
+<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="71393">
<summary>
Do not audit attempts to receive repository_server packets.
</summary>
@@ -54676,7 +54760,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_repository_server_packets" lineno="71394">
+<interface name="corenet_sendrecv_repository_server_packets" lineno="71412">
<summary>
Send and receive repository_server packets.
</summary>
@@ -54687,7 +54771,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="71410">
+<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="71428">
<summary>
Do not audit attempts to send and receive repository_server packets.
</summary>
@@ -54698,7 +54782,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_repository_server_packets" lineno="71425">
+<interface name="corenet_relabelto_repository_server_packets" lineno="71443">
<summary>
Relabel packets to repository_server the packet type.
</summary>
@@ -54708,7 +54792,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71447">
+<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71465">
<summary>
Send and receive TCP traffic on the ricci port.
</summary>
@@ -54719,7 +54803,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ricci_port" lineno="71462">
+<interface name="corenet_udp_send_ricci_port" lineno="71480">
<summary>
Send UDP traffic on the ricci port.
</summary>
@@ -54730,7 +54814,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71477">
+<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71495">
<summary>
Do not audit attempts to send UDP traffic on the ricci port.
</summary>
@@ -54741,7 +54825,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ricci_port" lineno="71492">
+<interface name="corenet_udp_receive_ricci_port" lineno="71510">
<summary>
Receive UDP traffic on the ricci port.
</summary>
@@ -54752,7 +54836,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71507">
+<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71525">
<summary>
Do not audit attempts to receive UDP traffic on the ricci port.
</summary>
@@ -54763,7 +54847,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ricci_port" lineno="71522">
+<interface name="corenet_udp_sendrecv_ricci_port" lineno="71540">
<summary>
Send and receive UDP traffic on the ricci port.
</summary>
@@ -54774,7 +54858,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71538">
+<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71556">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ricci port.
@@ -54786,7 +54870,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ricci_port" lineno="71553">
+<interface name="corenet_tcp_bind_ricci_port" lineno="71571">
<summary>
Bind TCP sockets to the ricci port.
</summary>
@@ -54797,7 +54881,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ricci_port" lineno="71573">
+<interface name="corenet_udp_bind_ricci_port" lineno="71591">
<summary>
Bind UDP sockets to the ricci port.
</summary>
@@ -54808,7 +54892,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ricci_port" lineno="71592">
+<interface name="corenet_tcp_connect_ricci_port" lineno="71610">
<summary>
Make a TCP connection to the ricci port.
</summary>
@@ -54818,7 +54902,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_client_packets" lineno="71612">
+<interface name="corenet_send_ricci_client_packets" lineno="71630">
<summary>
Send ricci_client packets.
</summary>
@@ -54829,7 +54913,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71631">
+<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71649">
<summary>
Do not audit attempts to send ricci_client packets.
</summary>
@@ -54840,7 +54924,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_client_packets" lineno="71650">
+<interface name="corenet_receive_ricci_client_packets" lineno="71668">
<summary>
Receive ricci_client packets.
</summary>
@@ -54851,7 +54935,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71669">
+<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71687">
<summary>
Do not audit attempts to receive ricci_client packets.
</summary>
@@ -54862,7 +54946,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_client_packets" lineno="71688">
+<interface name="corenet_sendrecv_ricci_client_packets" lineno="71706">
<summary>
Send and receive ricci_client packets.
</summary>
@@ -54873,7 +54957,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71704">
+<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71722">
<summary>
Do not audit attempts to send and receive ricci_client packets.
</summary>
@@ -54884,7 +54968,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_client_packets" lineno="71719">
+<interface name="corenet_relabelto_ricci_client_packets" lineno="71737">
<summary>
Relabel packets to ricci_client the packet type.
</summary>
@@ -54894,7 +54978,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_server_packets" lineno="71739">
+<interface name="corenet_send_ricci_server_packets" lineno="71757">
<summary>
Send ricci_server packets.
</summary>
@@ -54905,7 +54989,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71758">
+<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71776">
<summary>
Do not audit attempts to send ricci_server packets.
</summary>
@@ -54916,7 +55000,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_server_packets" lineno="71777">
+<interface name="corenet_receive_ricci_server_packets" lineno="71795">
<summary>
Receive ricci_server packets.
</summary>
@@ -54927,7 +55011,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71796">
+<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71814">
<summary>
Do not audit attempts to receive ricci_server packets.
</summary>
@@ -54938,7 +55022,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_server_packets" lineno="71815">
+<interface name="corenet_sendrecv_ricci_server_packets" lineno="71833">
<summary>
Send and receive ricci_server packets.
</summary>
@@ -54949,7 +55033,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71831">
+<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71849">
<summary>
Do not audit attempts to send and receive ricci_server packets.
</summary>
@@ -54960,7 +55044,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_server_packets" lineno="71846">
+<interface name="corenet_relabelto_ricci_server_packets" lineno="71864">
<summary>
Relabel packets to ricci_server the packet type.
</summary>
@@ -54970,7 +55054,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71868">
+<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71886">
<summary>
Send and receive TCP traffic on the ricci_modcluster port.
</summary>
@@ -54981,7 +55065,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71883">
+<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71901">
<summary>
Send UDP traffic on the ricci_modcluster port.
</summary>
@@ -54992,7 +55076,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71898">
+<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71916">
<summary>
Do not audit attempts to send UDP traffic on the ricci_modcluster port.
</summary>
@@ -55003,7 +55087,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71913">
+<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71931">
<summary>
Receive UDP traffic on the ricci_modcluster port.
</summary>
@@ -55014,7 +55098,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71928">
+<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71946">
<summary>
Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
</summary>
@@ -55025,7 +55109,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71943">
+<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71961">
<summary>
Send and receive UDP traffic on the ricci_modcluster port.
</summary>
@@ -55036,7 +55120,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71959">
+<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71977">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ricci_modcluster port.
@@ -55048,7 +55132,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71974">
+<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71992">
<summary>
Bind TCP sockets to the ricci_modcluster port.
</summary>
@@ -55059,7 +55143,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="71994">
+<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="72012">
<summary>
Bind UDP sockets to the ricci_modcluster port.
</summary>
@@ -55070,7 +55154,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="72013">
+<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="72031">
<summary>
Make a TCP connection to the ricci_modcluster port.
</summary>
@@ -55080,7 +55164,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_modcluster_client_packets" lineno="72033">
+<interface name="corenet_send_ricci_modcluster_client_packets" lineno="72051">
<summary>
Send ricci_modcluster_client packets.
</summary>
@@ -55091,7 +55175,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="72052">
+<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="72070">
<summary>
Do not audit attempts to send ricci_modcluster_client packets.
</summary>
@@ -55102,7 +55186,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="72071">
+<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="72089">
<summary>
Receive ricci_modcluster_client packets.
</summary>
@@ -55113,7 +55197,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="72090">
+<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="72108">
<summary>
Do not audit attempts to receive ricci_modcluster_client packets.
</summary>
@@ -55124,7 +55208,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="72109">
+<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="72127">
<summary>
Send and receive ricci_modcluster_client packets.
</summary>
@@ -55135,7 +55219,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="72125">
+<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="72143">
<summary>
Do not audit attempts to send and receive ricci_modcluster_client packets.
</summary>
@@ -55146,7 +55230,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="72140">
+<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="72158">
<summary>
Relabel packets to ricci_modcluster_client the packet type.
</summary>
@@ -55156,7 +55240,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_modcluster_server_packets" lineno="72160">
+<interface name="corenet_send_ricci_modcluster_server_packets" lineno="72178">
<summary>
Send ricci_modcluster_server packets.
</summary>
@@ -55167,7 +55251,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="72179">
+<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="72197">
<summary>
Do not audit attempts to send ricci_modcluster_server packets.
</summary>
@@ -55178,7 +55262,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="72198">
+<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="72216">
<summary>
Receive ricci_modcluster_server packets.
</summary>
@@ -55189,7 +55273,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="72217">
+<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="72235">
<summary>
Do not audit attempts to receive ricci_modcluster_server packets.
</summary>
@@ -55200,7 +55284,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="72236">
+<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="72254">
<summary>
Send and receive ricci_modcluster_server packets.
</summary>
@@ -55211,7 +55295,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="72252">
+<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="72270">
<summary>
Do not audit attempts to send and receive ricci_modcluster_server packets.
</summary>
@@ -55222,7 +55306,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="72267">
+<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="72285">
<summary>
Relabel packets to ricci_modcluster_server the packet type.
</summary>
@@ -55232,7 +55316,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="72289">
+<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="72307">
<summary>
Send and receive TCP traffic on the rlogind port.
</summary>
@@ -55243,7 +55327,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rlogind_port" lineno="72304">
+<interface name="corenet_udp_send_rlogind_port" lineno="72322">
<summary>
Send UDP traffic on the rlogind port.
</summary>
@@ -55254,7 +55338,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="72319">
+<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="72337">
<summary>
Do not audit attempts to send UDP traffic on the rlogind port.
</summary>
@@ -55265,7 +55349,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rlogind_port" lineno="72334">
+<interface name="corenet_udp_receive_rlogind_port" lineno="72352">
<summary>
Receive UDP traffic on the rlogind port.
</summary>
@@ -55276,7 +55360,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="72349">
+<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="72367">
<summary>
Do not audit attempts to receive UDP traffic on the rlogind port.
</summary>
@@ -55287,7 +55371,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rlogind_port" lineno="72364">
+<interface name="corenet_udp_sendrecv_rlogind_port" lineno="72382">
<summary>
Send and receive UDP traffic on the rlogind port.
</summary>
@@ -55298,7 +55382,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="72380">
+<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="72398">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rlogind port.
@@ -55310,7 +55394,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rlogind_port" lineno="72395">
+<interface name="corenet_tcp_bind_rlogind_port" lineno="72413">
<summary>
Bind TCP sockets to the rlogind port.
</summary>
@@ -55321,7 +55405,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rlogind_port" lineno="72415">
+<interface name="corenet_udp_bind_rlogind_port" lineno="72433">
<summary>
Bind UDP sockets to the rlogind port.
</summary>
@@ -55332,7 +55416,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rlogind_port" lineno="72434">
+<interface name="corenet_tcp_connect_rlogind_port" lineno="72452">
<summary>
Make a TCP connection to the rlogind port.
</summary>
@@ -55342,7 +55426,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rlogind_client_packets" lineno="72454">
+<interface name="corenet_send_rlogind_client_packets" lineno="72472">
<summary>
Send rlogind_client packets.
</summary>
@@ -55353,7 +55437,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72473">
+<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72491">
<summary>
Do not audit attempts to send rlogind_client packets.
</summary>
@@ -55364,7 +55448,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rlogind_client_packets" lineno="72492">
+<interface name="corenet_receive_rlogind_client_packets" lineno="72510">
<summary>
Receive rlogind_client packets.
</summary>
@@ -55375,7 +55459,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72511">
+<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72529">
<summary>
Do not audit attempts to receive rlogind_client packets.
</summary>
@@ -55386,7 +55470,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72530">
+<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72548">
<summary>
Send and receive rlogind_client packets.
</summary>
@@ -55397,7 +55481,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72546">
+<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72564">
<summary>
Do not audit attempts to send and receive rlogind_client packets.
</summary>
@@ -55408,7 +55492,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rlogind_client_packets" lineno="72561">
+<interface name="corenet_relabelto_rlogind_client_packets" lineno="72579">
<summary>
Relabel packets to rlogind_client the packet type.
</summary>
@@ -55418,7 +55502,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rlogind_server_packets" lineno="72581">
+<interface name="corenet_send_rlogind_server_packets" lineno="72599">
<summary>
Send rlogind_server packets.
</summary>
@@ -55429,7 +55513,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72600">
+<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72618">
<summary>
Do not audit attempts to send rlogind_server packets.
</summary>
@@ -55440,7 +55524,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rlogind_server_packets" lineno="72619">
+<interface name="corenet_receive_rlogind_server_packets" lineno="72637">
<summary>
Receive rlogind_server packets.
</summary>
@@ -55451,7 +55535,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72638">
+<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72656">
<summary>
Do not audit attempts to receive rlogind_server packets.
</summary>
@@ -55462,7 +55546,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72657">
+<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72675">
<summary>
Send and receive rlogind_server packets.
</summary>
@@ -55473,7 +55557,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72673">
+<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72691">
<summary>
Do not audit attempts to send and receive rlogind_server packets.
</summary>
@@ -55484,7 +55568,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rlogind_server_packets" lineno="72688">
+<interface name="corenet_relabelto_rlogind_server_packets" lineno="72706">
<summary>
Relabel packets to rlogind_server the packet type.
</summary>
@@ -55494,7 +55578,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72710">
+<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72728">
<summary>
Send and receive TCP traffic on the rndc port.
</summary>
@@ -55505,7 +55589,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rndc_port" lineno="72725">
+<interface name="corenet_udp_send_rndc_port" lineno="72743">
<summary>
Send UDP traffic on the rndc port.
</summary>
@@ -55516,7 +55600,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72740">
+<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72758">
<summary>
Do not audit attempts to send UDP traffic on the rndc port.
</summary>
@@ -55527,7 +55611,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rndc_port" lineno="72755">
+<interface name="corenet_udp_receive_rndc_port" lineno="72773">
<summary>
Receive UDP traffic on the rndc port.
</summary>
@@ -55538,7 +55622,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72770">
+<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72788">
<summary>
Do not audit attempts to receive UDP traffic on the rndc port.
</summary>
@@ -55549,7 +55633,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rndc_port" lineno="72785">
+<interface name="corenet_udp_sendrecv_rndc_port" lineno="72803">
<summary>
Send and receive UDP traffic on the rndc port.
</summary>
@@ -55560,7 +55644,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72801">
+<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72819">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rndc port.
@@ -55572,7 +55656,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rndc_port" lineno="72816">
+<interface name="corenet_tcp_bind_rndc_port" lineno="72834">
<summary>
Bind TCP sockets to the rndc port.
</summary>
@@ -55583,7 +55667,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rndc_port" lineno="72836">
+<interface name="corenet_udp_bind_rndc_port" lineno="72854">
<summary>
Bind UDP sockets to the rndc port.
</summary>
@@ -55594,7 +55678,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rndc_port" lineno="72855">
+<interface name="corenet_tcp_connect_rndc_port" lineno="72873">
<summary>
Make a TCP connection to the rndc port.
</summary>
@@ -55604,7 +55688,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rndc_client_packets" lineno="72875">
+<interface name="corenet_send_rndc_client_packets" lineno="72893">
<summary>
Send rndc_client packets.
</summary>
@@ -55615,7 +55699,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72894">
+<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72912">
<summary>
Do not audit attempts to send rndc_client packets.
</summary>
@@ -55626,7 +55710,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rndc_client_packets" lineno="72913">
+<interface name="corenet_receive_rndc_client_packets" lineno="72931">
<summary>
Receive rndc_client packets.
</summary>
@@ -55637,7 +55721,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72932">
+<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72950">
<summary>
Do not audit attempts to receive rndc_client packets.
</summary>
@@ -55648,7 +55732,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rndc_client_packets" lineno="72951">
+<interface name="corenet_sendrecv_rndc_client_packets" lineno="72969">
<summary>
Send and receive rndc_client packets.
</summary>
@@ -55659,7 +55743,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72967">
+<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72985">
<summary>
Do not audit attempts to send and receive rndc_client packets.
</summary>
@@ -55670,7 +55754,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rndc_client_packets" lineno="72982">
+<interface name="corenet_relabelto_rndc_client_packets" lineno="73000">
<summary>
Relabel packets to rndc_client the packet type.
</summary>
@@ -55680,7 +55764,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rndc_server_packets" lineno="73002">
+<interface name="corenet_send_rndc_server_packets" lineno="73020">
<summary>
Send rndc_server packets.
</summary>
@@ -55691,7 +55775,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="73021">
+<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="73039">
<summary>
Do not audit attempts to send rndc_server packets.
</summary>
@@ -55702,7 +55786,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rndc_server_packets" lineno="73040">
+<interface name="corenet_receive_rndc_server_packets" lineno="73058">
<summary>
Receive rndc_server packets.
</summary>
@@ -55713,7 +55797,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="73059">
+<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="73077">
<summary>
Do not audit attempts to receive rndc_server packets.
</summary>
@@ -55724,7 +55808,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rndc_server_packets" lineno="73078">
+<interface name="corenet_sendrecv_rndc_server_packets" lineno="73096">
<summary>
Send and receive rndc_server packets.
</summary>
@@ -55735,7 +55819,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="73094">
+<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="73112">
<summary>
Do not audit attempts to send and receive rndc_server packets.
</summary>
@@ -55746,7 +55830,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rndc_server_packets" lineno="73109">
+<interface name="corenet_relabelto_rndc_server_packets" lineno="73127">
<summary>
Relabel packets to rndc_server the packet type.
</summary>
@@ -55756,7 +55840,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_router_port" lineno="73131">
+<interface name="corenet_tcp_sendrecv_router_port" lineno="73149">
<summary>
Send and receive TCP traffic on the router port.
</summary>
@@ -55767,7 +55851,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_router_port" lineno="73146">
+<interface name="corenet_udp_send_router_port" lineno="73164">
<summary>
Send UDP traffic on the router port.
</summary>
@@ -55778,7 +55862,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_router_port" lineno="73161">
+<interface name="corenet_dontaudit_udp_send_router_port" lineno="73179">
<summary>
Do not audit attempts to send UDP traffic on the router port.
</summary>
@@ -55789,7 +55873,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_router_port" lineno="73176">
+<interface name="corenet_udp_receive_router_port" lineno="73194">
<summary>
Receive UDP traffic on the router port.
</summary>
@@ -55800,7 +55884,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_router_port" lineno="73191">
+<interface name="corenet_dontaudit_udp_receive_router_port" lineno="73209">
<summary>
Do not audit attempts to receive UDP traffic on the router port.
</summary>
@@ -55811,7 +55895,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_router_port" lineno="73206">
+<interface name="corenet_udp_sendrecv_router_port" lineno="73224">
<summary>
Send and receive UDP traffic on the router port.
</summary>
@@ -55822,7 +55906,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="73222">
+<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="73240">
<summary>
Do not audit attempts to send and receive
UDP traffic on the router port.
@@ -55834,7 +55918,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_router_port" lineno="73237">
+<interface name="corenet_tcp_bind_router_port" lineno="73255">
<summary>
Bind TCP sockets to the router port.
</summary>
@@ -55845,7 +55929,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_router_port" lineno="73257">
+<interface name="corenet_udp_bind_router_port" lineno="73275">
<summary>
Bind UDP sockets to the router port.
</summary>
@@ -55856,7 +55940,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_router_port" lineno="73276">
+<interface name="corenet_tcp_connect_router_port" lineno="73294">
<summary>
Make a TCP connection to the router port.
</summary>
@@ -55866,7 +55950,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_router_client_packets" lineno="73296">
+<interface name="corenet_send_router_client_packets" lineno="73314">
<summary>
Send router_client packets.
</summary>
@@ -55877,7 +55961,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_router_client_packets" lineno="73315">
+<interface name="corenet_dontaudit_send_router_client_packets" lineno="73333">
<summary>
Do not audit attempts to send router_client packets.
</summary>
@@ -55888,7 +55972,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_router_client_packets" lineno="73334">
+<interface name="corenet_receive_router_client_packets" lineno="73352">
<summary>
Receive router_client packets.
</summary>
@@ -55899,7 +55983,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_router_client_packets" lineno="73353">
+<interface name="corenet_dontaudit_receive_router_client_packets" lineno="73371">
<summary>
Do not audit attempts to receive router_client packets.
</summary>
@@ -55910,7 +55994,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_router_client_packets" lineno="73372">
+<interface name="corenet_sendrecv_router_client_packets" lineno="73390">
<summary>
Send and receive router_client packets.
</summary>
@@ -55921,7 +56005,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="73388">
+<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="73406">
<summary>
Do not audit attempts to send and receive router_client packets.
</summary>
@@ -55932,7 +56016,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_router_client_packets" lineno="73403">
+<interface name="corenet_relabelto_router_client_packets" lineno="73421">
<summary>
Relabel packets to router_client the packet type.
</summary>
@@ -55942,7 +56026,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_router_server_packets" lineno="73423">
+<interface name="corenet_send_router_server_packets" lineno="73441">
<summary>
Send router_server packets.
</summary>
@@ -55953,7 +56037,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_router_server_packets" lineno="73442">
+<interface name="corenet_dontaudit_send_router_server_packets" lineno="73460">
<summary>
Do not audit attempts to send router_server packets.
</summary>
@@ -55964,7 +56048,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_router_server_packets" lineno="73461">
+<interface name="corenet_receive_router_server_packets" lineno="73479">
<summary>
Receive router_server packets.
</summary>
@@ -55975,7 +56059,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73480">
+<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73498">
<summary>
Do not audit attempts to receive router_server packets.
</summary>
@@ -55986,7 +56070,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_router_server_packets" lineno="73499">
+<interface name="corenet_sendrecv_router_server_packets" lineno="73517">
<summary>
Send and receive router_server packets.
</summary>
@@ -55997,7 +56081,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73515">
+<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73533">
<summary>
Do not audit attempts to send and receive router_server packets.
</summary>
@@ -56008,7 +56092,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_router_server_packets" lineno="73530">
+<interface name="corenet_relabelto_router_server_packets" lineno="73548">
<summary>
Relabel packets to router_server the packet type.
</summary>
@@ -56018,7 +56102,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73552">
+<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73570">
<summary>
Send and receive TCP traffic on the rsh port.
</summary>
@@ -56029,7 +56113,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rsh_port" lineno="73567">
+<interface name="corenet_udp_send_rsh_port" lineno="73585">
<summary>
Send UDP traffic on the rsh port.
</summary>
@@ -56040,7 +56124,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73582">
+<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73600">
<summary>
Do not audit attempts to send UDP traffic on the rsh port.
</summary>
@@ -56051,7 +56135,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rsh_port" lineno="73597">
+<interface name="corenet_udp_receive_rsh_port" lineno="73615">
<summary>
Receive UDP traffic on the rsh port.
</summary>
@@ -56062,7 +56146,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73612">
+<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73630">
<summary>
Do not audit attempts to receive UDP traffic on the rsh port.
</summary>
@@ -56073,7 +56157,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rsh_port" lineno="73627">
+<interface name="corenet_udp_sendrecv_rsh_port" lineno="73645">
<summary>
Send and receive UDP traffic on the rsh port.
</summary>
@@ -56084,7 +56168,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73643">
+<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73661">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rsh port.
@@ -56096,7 +56180,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rsh_port" lineno="73658">
+<interface name="corenet_tcp_bind_rsh_port" lineno="73676">
<summary>
Bind TCP sockets to the rsh port.
</summary>
@@ -56107,7 +56191,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rsh_port" lineno="73678">
+<interface name="corenet_udp_bind_rsh_port" lineno="73696">
<summary>
Bind UDP sockets to the rsh port.
</summary>
@@ -56118,7 +56202,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rsh_port" lineno="73697">
+<interface name="corenet_tcp_connect_rsh_port" lineno="73715">
<summary>
Make a TCP connection to the rsh port.
</summary>
@@ -56128,7 +56212,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsh_client_packets" lineno="73717">
+<interface name="corenet_send_rsh_client_packets" lineno="73735">
<summary>
Send rsh_client packets.
</summary>
@@ -56139,7 +56223,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73736">
+<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73754">
<summary>
Do not audit attempts to send rsh_client packets.
</summary>
@@ -56150,7 +56234,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsh_client_packets" lineno="73755">
+<interface name="corenet_receive_rsh_client_packets" lineno="73773">
<summary>
Receive rsh_client packets.
</summary>
@@ -56161,7 +56245,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73774">
+<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73792">
<summary>
Do not audit attempts to receive rsh_client packets.
</summary>
@@ -56172,7 +56256,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsh_client_packets" lineno="73793">
+<interface name="corenet_sendrecv_rsh_client_packets" lineno="73811">
<summary>
Send and receive rsh_client packets.
</summary>
@@ -56183,7 +56267,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73809">
+<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73827">
<summary>
Do not audit attempts to send and receive rsh_client packets.
</summary>
@@ -56194,7 +56278,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsh_client_packets" lineno="73824">
+<interface name="corenet_relabelto_rsh_client_packets" lineno="73842">
<summary>
Relabel packets to rsh_client the packet type.
</summary>
@@ -56204,7 +56288,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsh_server_packets" lineno="73844">
+<interface name="corenet_send_rsh_server_packets" lineno="73862">
<summary>
Send rsh_server packets.
</summary>
@@ -56215,7 +56299,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73863">
+<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73881">
<summary>
Do not audit attempts to send rsh_server packets.
</summary>
@@ -56226,7 +56310,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsh_server_packets" lineno="73882">
+<interface name="corenet_receive_rsh_server_packets" lineno="73900">
<summary>
Receive rsh_server packets.
</summary>
@@ -56237,7 +56321,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73901">
+<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73919">
<summary>
Do not audit attempts to receive rsh_server packets.
</summary>
@@ -56248,7 +56332,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsh_server_packets" lineno="73920">
+<interface name="corenet_sendrecv_rsh_server_packets" lineno="73938">
<summary>
Send and receive rsh_server packets.
</summary>
@@ -56259,7 +56343,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73936">
+<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73954">
<summary>
Do not audit attempts to send and receive rsh_server packets.
</summary>
@@ -56270,7 +56354,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsh_server_packets" lineno="73951">
+<interface name="corenet_relabelto_rsh_server_packets" lineno="73969">
<summary>
Relabel packets to rsh_server the packet type.
</summary>
@@ -56280,7 +56364,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73973">
+<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73991">
<summary>
Send and receive TCP traffic on the rsync port.
</summary>
@@ -56291,7 +56375,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rsync_port" lineno="73988">
+<interface name="corenet_udp_send_rsync_port" lineno="74006">
<summary>
Send UDP traffic on the rsync port.
</summary>
@@ -56302,7 +56386,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="74003">
+<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="74021">
<summary>
Do not audit attempts to send UDP traffic on the rsync port.
</summary>
@@ -56313,7 +56397,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rsync_port" lineno="74018">
+<interface name="corenet_udp_receive_rsync_port" lineno="74036">
<summary>
Receive UDP traffic on the rsync port.
</summary>
@@ -56324,7 +56408,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="74033">
+<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="74051">
<summary>
Do not audit attempts to receive UDP traffic on the rsync port.
</summary>
@@ -56335,7 +56419,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rsync_port" lineno="74048">
+<interface name="corenet_udp_sendrecv_rsync_port" lineno="74066">
<summary>
Send and receive UDP traffic on the rsync port.
</summary>
@@ -56346,7 +56430,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="74064">
+<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="74082">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rsync port.
@@ -56358,7 +56442,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rsync_port" lineno="74079">
+<interface name="corenet_tcp_bind_rsync_port" lineno="74097">
<summary>
Bind TCP sockets to the rsync port.
</summary>
@@ -56369,7 +56453,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rsync_port" lineno="74099">
+<interface name="corenet_udp_bind_rsync_port" lineno="74117">
<summary>
Bind UDP sockets to the rsync port.
</summary>
@@ -56380,7 +56464,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rsync_port" lineno="74118">
+<interface name="corenet_tcp_connect_rsync_port" lineno="74136">
<summary>
Make a TCP connection to the rsync port.
</summary>
@@ -56390,7 +56474,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsync_client_packets" lineno="74138">
+<interface name="corenet_send_rsync_client_packets" lineno="74156">
<summary>
Send rsync_client packets.
</summary>
@@ -56401,7 +56485,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="74157">
+<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="74175">
<summary>
Do not audit attempts to send rsync_client packets.
</summary>
@@ -56412,7 +56496,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsync_client_packets" lineno="74176">
+<interface name="corenet_receive_rsync_client_packets" lineno="74194">
<summary>
Receive rsync_client packets.
</summary>
@@ -56423,7 +56507,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="74195">
+<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="74213">
<summary>
Do not audit attempts to receive rsync_client packets.
</summary>
@@ -56434,7 +56518,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsync_client_packets" lineno="74214">
+<interface name="corenet_sendrecv_rsync_client_packets" lineno="74232">
<summary>
Send and receive rsync_client packets.
</summary>
@@ -56445,7 +56529,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="74230">
+<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="74248">
<summary>
Do not audit attempts to send and receive rsync_client packets.
</summary>
@@ -56456,7 +56540,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsync_client_packets" lineno="74245">
+<interface name="corenet_relabelto_rsync_client_packets" lineno="74263">
<summary>
Relabel packets to rsync_client the packet type.
</summary>
@@ -56466,7 +56550,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsync_server_packets" lineno="74265">
+<interface name="corenet_send_rsync_server_packets" lineno="74283">
<summary>
Send rsync_server packets.
</summary>
@@ -56477,7 +56561,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="74284">
+<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="74302">
<summary>
Do not audit attempts to send rsync_server packets.
</summary>
@@ -56488,7 +56572,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsync_server_packets" lineno="74303">
+<interface name="corenet_receive_rsync_server_packets" lineno="74321">
<summary>
Receive rsync_server packets.
</summary>
@@ -56499,7 +56583,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="74322">
+<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="74340">
<summary>
Do not audit attempts to receive rsync_server packets.
</summary>
@@ -56510,7 +56594,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsync_server_packets" lineno="74341">
+<interface name="corenet_sendrecv_rsync_server_packets" lineno="74359">
<summary>
Send and receive rsync_server packets.
</summary>
@@ -56521,7 +56605,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="74357">
+<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="74375">
<summary>
Do not audit attempts to send and receive rsync_server packets.
</summary>
@@ -56532,7 +56616,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsync_server_packets" lineno="74372">
+<interface name="corenet_relabelto_rsync_server_packets" lineno="74390">
<summary>
Relabel packets to rsync_server the packet type.
</summary>
@@ -56542,7 +56626,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="74394">
+<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="74412">
<summary>
Send and receive TCP traffic on the rtorrent port.
</summary>
@@ -56553,7 +56637,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rtorrent_port" lineno="74409">
+<interface name="corenet_udp_send_rtorrent_port" lineno="74427">
<summary>
Send UDP traffic on the rtorrent port.
</summary>
@@ -56564,7 +56648,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74424">
+<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74442">
<summary>
Do not audit attempts to send UDP traffic on the rtorrent port.
</summary>
@@ -56575,7 +56659,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rtorrent_port" lineno="74439">
+<interface name="corenet_udp_receive_rtorrent_port" lineno="74457">
<summary>
Receive UDP traffic on the rtorrent port.
</summary>
@@ -56586,7 +56670,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74454">
+<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74472">
<summary>
Do not audit attempts to receive UDP traffic on the rtorrent port.
</summary>
@@ -56597,7 +56681,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74469">
+<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74487">
<summary>
Send and receive UDP traffic on the rtorrent port.
</summary>
@@ -56608,7 +56692,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74485">
+<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74503">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rtorrent port.
@@ -56620,7 +56704,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rtorrent_port" lineno="74500">
+<interface name="corenet_tcp_bind_rtorrent_port" lineno="74518">
<summary>
Bind TCP sockets to the rtorrent port.
</summary>
@@ -56631,7 +56715,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rtorrent_port" lineno="74520">
+<interface name="corenet_udp_bind_rtorrent_port" lineno="74538">
<summary>
Bind UDP sockets to the rtorrent port.
</summary>
@@ -56642,7 +56726,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rtorrent_port" lineno="74539">
+<interface name="corenet_tcp_connect_rtorrent_port" lineno="74557">
<summary>
Make a TCP connection to the rtorrent port.
</summary>
@@ -56652,7 +56736,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtorrent_client_packets" lineno="74559">
+<interface name="corenet_send_rtorrent_client_packets" lineno="74577">
<summary>
Send rtorrent_client packets.
</summary>
@@ -56663,7 +56747,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74578">
+<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74596">
<summary>
Do not audit attempts to send rtorrent_client packets.
</summary>
@@ -56674,7 +56758,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtorrent_client_packets" lineno="74597">
+<interface name="corenet_receive_rtorrent_client_packets" lineno="74615">
<summary>
Receive rtorrent_client packets.
</summary>
@@ -56685,7 +56769,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74616">
+<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74634">
<summary>
Do not audit attempts to receive rtorrent_client packets.
</summary>
@@ -56696,7 +56780,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74635">
+<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74653">
<summary>
Send and receive rtorrent_client packets.
</summary>
@@ -56707,7 +56791,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74651">
+<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74669">
<summary>
Do not audit attempts to send and receive rtorrent_client packets.
</summary>
@@ -56718,7 +56802,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74666">
+<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74684">
<summary>
Relabel packets to rtorrent_client the packet type.
</summary>
@@ -56728,7 +56812,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtorrent_server_packets" lineno="74686">
+<interface name="corenet_send_rtorrent_server_packets" lineno="74704">
<summary>
Send rtorrent_server packets.
</summary>
@@ -56739,7 +56823,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74705">
+<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74723">
<summary>
Do not audit attempts to send rtorrent_server packets.
</summary>
@@ -56750,7 +56834,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtorrent_server_packets" lineno="74724">
+<interface name="corenet_receive_rtorrent_server_packets" lineno="74742">
<summary>
Receive rtorrent_server packets.
</summary>
@@ -56761,7 +56845,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74743">
+<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74761">
<summary>
Do not audit attempts to receive rtorrent_server packets.
</summary>
@@ -56772,7 +56856,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74762">
+<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74780">
<summary>
Send and receive rtorrent_server packets.
</summary>
@@ -56783,7 +56867,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74778">
+<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74796">
<summary>
Do not audit attempts to send and receive rtorrent_server packets.
</summary>
@@ -56794,7 +56878,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74793">
+<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74811">
<summary>
Relabel packets to rtorrent_server the packet type.
</summary>
@@ -56804,7 +56888,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74815">
+<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74833">
<summary>
Send and receive TCP traffic on the rtsp port.
</summary>
@@ -56815,7 +56899,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rtsp_port" lineno="74830">
+<interface name="corenet_udp_send_rtsp_port" lineno="74848">
<summary>
Send UDP traffic on the rtsp port.
</summary>
@@ -56826,7 +56910,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74845">
+<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74863">
<summary>
Do not audit attempts to send UDP traffic on the rtsp port.
</summary>
@@ -56837,7 +56921,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rtsp_port" lineno="74860">
+<interface name="corenet_udp_receive_rtsp_port" lineno="74878">
<summary>
Receive UDP traffic on the rtsp port.
</summary>
@@ -56848,7 +56932,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74875">
+<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74893">
<summary>
Do not audit attempts to receive UDP traffic on the rtsp port.
</summary>
@@ -56859,7 +56943,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74890">
+<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74908">
<summary>
Send and receive UDP traffic on the rtsp port.
</summary>
@@ -56870,7 +56954,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74906">
+<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74924">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rtsp port.
@@ -56882,7 +56966,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rtsp_port" lineno="74921">
+<interface name="corenet_tcp_bind_rtsp_port" lineno="74939">
<summary>
Bind TCP sockets to the rtsp port.
</summary>
@@ -56893,7 +56977,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rtsp_port" lineno="74941">
+<interface name="corenet_udp_bind_rtsp_port" lineno="74959">
<summary>
Bind UDP sockets to the rtsp port.
</summary>
@@ -56904,7 +56988,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rtsp_port" lineno="74960">
+<interface name="corenet_tcp_connect_rtsp_port" lineno="74978">
<summary>
Make a TCP connection to the rtsp port.
</summary>
@@ -56914,7 +56998,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtsp_client_packets" lineno="74980">
+<interface name="corenet_send_rtsp_client_packets" lineno="74998">
<summary>
Send rtsp_client packets.
</summary>
@@ -56925,7 +57009,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="74999">
+<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="75017">
<summary>
Do not audit attempts to send rtsp_client packets.
</summary>
@@ -56936,7 +57020,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtsp_client_packets" lineno="75018">
+<interface name="corenet_receive_rtsp_client_packets" lineno="75036">
<summary>
Receive rtsp_client packets.
</summary>
@@ -56947,7 +57031,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="75037">
+<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="75055">
<summary>
Do not audit attempts to receive rtsp_client packets.
</summary>
@@ -56958,7 +57042,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtsp_client_packets" lineno="75056">
+<interface name="corenet_sendrecv_rtsp_client_packets" lineno="75074">
<summary>
Send and receive rtsp_client packets.
</summary>
@@ -56969,7 +57053,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="75072">
+<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="75090">
<summary>
Do not audit attempts to send and receive rtsp_client packets.
</summary>
@@ -56980,7 +57064,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtsp_client_packets" lineno="75087">
+<interface name="corenet_relabelto_rtsp_client_packets" lineno="75105">
<summary>
Relabel packets to rtsp_client the packet type.
</summary>
@@ -56990,7 +57074,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtsp_server_packets" lineno="75107">
+<interface name="corenet_send_rtsp_server_packets" lineno="75125">
<summary>
Send rtsp_server packets.
</summary>
@@ -57001,7 +57085,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="75126">
+<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="75144">
<summary>
Do not audit attempts to send rtsp_server packets.
</summary>
@@ -57012,7 +57096,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtsp_server_packets" lineno="75145">
+<interface name="corenet_receive_rtsp_server_packets" lineno="75163">
<summary>
Receive rtsp_server packets.
</summary>
@@ -57023,7 +57107,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="75164">
+<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="75182">
<summary>
Do not audit attempts to receive rtsp_server packets.
</summary>
@@ -57034,7 +57118,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtsp_server_packets" lineno="75183">
+<interface name="corenet_sendrecv_rtsp_server_packets" lineno="75201">
<summary>
Send and receive rtsp_server packets.
</summary>
@@ -57045,7 +57129,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="75199">
+<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="75217">
<summary>
Do not audit attempts to send and receive rtsp_server packets.
</summary>
@@ -57056,7 +57140,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtsp_server_packets" lineno="75214">
+<interface name="corenet_relabelto_rtsp_server_packets" lineno="75232">
<summary>
Relabel packets to rtsp_server the packet type.
</summary>
@@ -57066,7 +57150,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rwho_port" lineno="75236">
+<interface name="corenet_tcp_sendrecv_rwho_port" lineno="75254">
<summary>
Send and receive TCP traffic on the rwho port.
</summary>
@@ -57077,7 +57161,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rwho_port" lineno="75251">
+<interface name="corenet_udp_send_rwho_port" lineno="75269">
<summary>
Send UDP traffic on the rwho port.
</summary>
@@ -57088,7 +57172,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="75266">
+<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="75284">
<summary>
Do not audit attempts to send UDP traffic on the rwho port.
</summary>
@@ -57099,7 +57183,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rwho_port" lineno="75281">
+<interface name="corenet_udp_receive_rwho_port" lineno="75299">
<summary>
Receive UDP traffic on the rwho port.
</summary>
@@ -57110,7 +57194,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="75296">
+<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="75314">
<summary>
Do not audit attempts to receive UDP traffic on the rwho port.
</summary>
@@ -57121,7 +57205,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rwho_port" lineno="75311">
+<interface name="corenet_udp_sendrecv_rwho_port" lineno="75329">
<summary>
Send and receive UDP traffic on the rwho port.
</summary>
@@ -57132,7 +57216,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="75327">
+<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="75345">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rwho port.
@@ -57144,7 +57228,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rwho_port" lineno="75342">
+<interface name="corenet_tcp_bind_rwho_port" lineno="75360">
<summary>
Bind TCP sockets to the rwho port.
</summary>
@@ -57155,7 +57239,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rwho_port" lineno="75362">
+<interface name="corenet_udp_bind_rwho_port" lineno="75380">
<summary>
Bind UDP sockets to the rwho port.
</summary>
@@ -57166,7 +57250,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rwho_port" lineno="75381">
+<interface name="corenet_tcp_connect_rwho_port" lineno="75399">
<summary>
Make a TCP connection to the rwho port.
</summary>
@@ -57176,7 +57260,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rwho_client_packets" lineno="75401">
+<interface name="corenet_send_rwho_client_packets" lineno="75419">
<summary>
Send rwho_client packets.
</summary>
@@ -57187,7 +57271,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="75420">
+<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="75438">
<summary>
Do not audit attempts to send rwho_client packets.
</summary>
@@ -57198,7 +57282,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rwho_client_packets" lineno="75439">
+<interface name="corenet_receive_rwho_client_packets" lineno="75457">
<summary>
Receive rwho_client packets.
</summary>
@@ -57209,7 +57293,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75458">
+<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75476">
<summary>
Do not audit attempts to receive rwho_client packets.
</summary>
@@ -57220,7 +57304,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rwho_client_packets" lineno="75477">
+<interface name="corenet_sendrecv_rwho_client_packets" lineno="75495">
<summary>
Send and receive rwho_client packets.
</summary>
@@ -57231,7 +57315,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75493">
+<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75511">
<summary>
Do not audit attempts to send and receive rwho_client packets.
</summary>
@@ -57242,7 +57326,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rwho_client_packets" lineno="75508">
+<interface name="corenet_relabelto_rwho_client_packets" lineno="75526">
<summary>
Relabel packets to rwho_client the packet type.
</summary>
@@ -57252,7 +57336,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rwho_server_packets" lineno="75528">
+<interface name="corenet_send_rwho_server_packets" lineno="75546">
<summary>
Send rwho_server packets.
</summary>
@@ -57263,7 +57347,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75547">
+<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75565">
<summary>
Do not audit attempts to send rwho_server packets.
</summary>
@@ -57274,7 +57358,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rwho_server_packets" lineno="75566">
+<interface name="corenet_receive_rwho_server_packets" lineno="75584">
<summary>
Receive rwho_server packets.
</summary>
@@ -57285,7 +57369,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75585">
+<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75603">
<summary>
Do not audit attempts to receive rwho_server packets.
</summary>
@@ -57296,7 +57380,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rwho_server_packets" lineno="75604">
+<interface name="corenet_sendrecv_rwho_server_packets" lineno="75622">
<summary>
Send and receive rwho_server packets.
</summary>
@@ -57307,7 +57391,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75620">
+<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75638">
<summary>
Do not audit attempts to send and receive rwho_server packets.
</summary>
@@ -57318,7 +57402,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rwho_server_packets" lineno="75635">
+<interface name="corenet_relabelto_rwho_server_packets" lineno="75653">
<summary>
Relabel packets to rwho_server the packet type.
</summary>
@@ -57328,7 +57412,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_salt_port" lineno="75657">
+<interface name="corenet_tcp_sendrecv_salt_port" lineno="75675">
<summary>
Send and receive TCP traffic on the salt port.
</summary>
@@ -57339,7 +57423,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_salt_port" lineno="75672">
+<interface name="corenet_udp_send_salt_port" lineno="75690">
<summary>
Send UDP traffic on the salt port.
</summary>
@@ -57350,7 +57434,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75687">
+<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75705">
<summary>
Do not audit attempts to send UDP traffic on the salt port.
</summary>
@@ -57361,7 +57445,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_salt_port" lineno="75702">
+<interface name="corenet_udp_receive_salt_port" lineno="75720">
<summary>
Receive UDP traffic on the salt port.
</summary>
@@ -57372,7 +57456,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75717">
+<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75735">
<summary>
Do not audit attempts to receive UDP traffic on the salt port.
</summary>
@@ -57383,7 +57467,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_salt_port" lineno="75732">
+<interface name="corenet_udp_sendrecv_salt_port" lineno="75750">
<summary>
Send and receive UDP traffic on the salt port.
</summary>
@@ -57394,7 +57478,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75748">
+<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75766">
<summary>
Do not audit attempts to send and receive
UDP traffic on the salt port.
@@ -57406,7 +57490,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_salt_port" lineno="75763">
+<interface name="corenet_tcp_bind_salt_port" lineno="75781">
<summary>
Bind TCP sockets to the salt port.
</summary>
@@ -57417,7 +57501,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_salt_port" lineno="75783">
+<interface name="corenet_udp_bind_salt_port" lineno="75801">
<summary>
Bind UDP sockets to the salt port.
</summary>
@@ -57428,7 +57512,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_salt_port" lineno="75802">
+<interface name="corenet_tcp_connect_salt_port" lineno="75820">
<summary>
Make a TCP connection to the salt port.
</summary>
@@ -57438,7 +57522,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_salt_client_packets" lineno="75822">
+<interface name="corenet_send_salt_client_packets" lineno="75840">
<summary>
Send salt_client packets.
</summary>
@@ -57449,7 +57533,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75841">
+<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75859">
<summary>
Do not audit attempts to send salt_client packets.
</summary>
@@ -57460,7 +57544,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_salt_client_packets" lineno="75860">
+<interface name="corenet_receive_salt_client_packets" lineno="75878">
<summary>
Receive salt_client packets.
</summary>
@@ -57471,7 +57555,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75879">
+<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75897">
<summary>
Do not audit attempts to receive salt_client packets.
</summary>
@@ -57482,7 +57566,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_salt_client_packets" lineno="75898">
+<interface name="corenet_sendrecv_salt_client_packets" lineno="75916">
<summary>
Send and receive salt_client packets.
</summary>
@@ -57493,7 +57577,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75914">
+<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75932">
<summary>
Do not audit attempts to send and receive salt_client packets.
</summary>
@@ -57504,7 +57588,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_salt_client_packets" lineno="75929">
+<interface name="corenet_relabelto_salt_client_packets" lineno="75947">
<summary>
Relabel packets to salt_client the packet type.
</summary>
@@ -57514,7 +57598,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_salt_server_packets" lineno="75949">
+<interface name="corenet_send_salt_server_packets" lineno="75967">
<summary>
Send salt_server packets.
</summary>
@@ -57525,7 +57609,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75968">
+<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75986">
<summary>
Do not audit attempts to send salt_server packets.
</summary>
@@ -57536,7 +57620,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_salt_server_packets" lineno="75987">
+<interface name="corenet_receive_salt_server_packets" lineno="76005">
<summary>
Receive salt_server packets.
</summary>
@@ -57547,7 +57631,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="76006">
+<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="76024">
<summary>
Do not audit attempts to receive salt_server packets.
</summary>
@@ -57558,7 +57642,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_salt_server_packets" lineno="76025">
+<interface name="corenet_sendrecv_salt_server_packets" lineno="76043">
<summary>
Send and receive salt_server packets.
</summary>
@@ -57569,7 +57653,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="76041">
+<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="76059">
<summary>
Do not audit attempts to send and receive salt_server packets.
</summary>
@@ -57580,7 +57664,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_salt_server_packets" lineno="76056">
+<interface name="corenet_relabelto_salt_server_packets" lineno="76074">
<summary>
Relabel packets to salt_server the packet type.
</summary>
@@ -57590,7 +57674,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sap_port" lineno="76078">
+<interface name="corenet_tcp_sendrecv_sap_port" lineno="76096">
<summary>
Send and receive TCP traffic on the sap port.
</summary>
@@ -57601,7 +57685,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_sap_port" lineno="76093">
+<interface name="corenet_udp_send_sap_port" lineno="76111">
<summary>
Send UDP traffic on the sap port.
</summary>
@@ -57612,7 +57696,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_sap_port" lineno="76108">
+<interface name="corenet_dontaudit_udp_send_sap_port" lineno="76126">
<summary>
Do not audit attempts to send UDP traffic on the sap port.
</summary>
@@ -57623,7 +57707,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_sap_port" lineno="76123">
+<interface name="corenet_udp_receive_sap_port" lineno="76141">
<summary>
Receive UDP traffic on the sap port.
</summary>
@@ -57634,7 +57718,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="76138">
+<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="76156">
<summary>
Do not audit attempts to receive UDP traffic on the sap port.
</summary>
@@ -57645,7 +57729,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_sap_port" lineno="76153">
+<interface name="corenet_udp_sendrecv_sap_port" lineno="76171">
<summary>
Send and receive UDP traffic on the sap port.
</summary>
@@ -57656,7 +57740,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="76169">
+<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="76187">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sap port.
@@ -57668,7 +57752,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_sap_port" lineno="76184">
+<interface name="corenet_tcp_bind_sap_port" lineno="76202">
<summary>
Bind TCP sockets to the sap port.
</summary>
@@ -57679,7 +57763,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sap_port" lineno="76204">
+<interface name="corenet_udp_bind_sap_port" lineno="76222">
<summary>
Bind UDP sockets to the sap port.
</summary>
@@ -57690,7 +57774,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sap_port" lineno="76223">
+<interface name="corenet_tcp_connect_sap_port" lineno="76241">
<summary>
Make a TCP connection to the sap port.
</summary>
@@ -57700,7 +57784,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sap_client_packets" lineno="76243">
+<interface name="corenet_send_sap_client_packets" lineno="76261">
<summary>
Send sap_client packets.
</summary>
@@ -57711,7 +57795,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sap_client_packets" lineno="76262">
+<interface name="corenet_dontaudit_send_sap_client_packets" lineno="76280">
<summary>
Do not audit attempts to send sap_client packets.
</summary>
@@ -57722,7 +57806,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sap_client_packets" lineno="76281">
+<interface name="corenet_receive_sap_client_packets" lineno="76299">
<summary>
Receive sap_client packets.
</summary>
@@ -57733,7 +57817,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="76300">
+<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="76318">
<summary>
Do not audit attempts to receive sap_client packets.
</summary>
@@ -57744,7 +57828,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sap_client_packets" lineno="76319">
+<interface name="corenet_sendrecv_sap_client_packets" lineno="76337">
<summary>
Send and receive sap_client packets.
</summary>
@@ -57755,7 +57839,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="76335">
+<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="76353">
<summary>
Do not audit attempts to send and receive sap_client packets.
</summary>
@@ -57766,7 +57850,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sap_client_packets" lineno="76350">
+<interface name="corenet_relabelto_sap_client_packets" lineno="76368">
<summary>
Relabel packets to sap_client the packet type.
</summary>
@@ -57776,7 +57860,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sap_server_packets" lineno="76370">
+<interface name="corenet_send_sap_server_packets" lineno="76388">
<summary>
Send sap_server packets.
</summary>
@@ -57787,7 +57871,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sap_server_packets" lineno="76389">
+<interface name="corenet_dontaudit_send_sap_server_packets" lineno="76407">
<summary>
Do not audit attempts to send sap_server packets.
</summary>
@@ -57798,7 +57882,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sap_server_packets" lineno="76408">
+<interface name="corenet_receive_sap_server_packets" lineno="76426">
<summary>
Receive sap_server packets.
</summary>
@@ -57809,7 +57893,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76427">
+<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76445">
<summary>
Do not audit attempts to receive sap_server packets.
</summary>
@@ -57820,7 +57904,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sap_server_packets" lineno="76446">
+<interface name="corenet_sendrecv_sap_server_packets" lineno="76464">
<summary>
Send and receive sap_server packets.
</summary>
@@ -57831,7 +57915,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76462">
+<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76480">
<summary>
Do not audit attempts to send and receive sap_server packets.
</summary>
@@ -57842,7 +57926,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sap_server_packets" lineno="76477">
+<interface name="corenet_relabelto_sap_server_packets" lineno="76495">
<summary>
Relabel packets to sap_server the packet type.
</summary>
@@ -57852,7 +57936,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76499">
+<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76517">
<summary>
Send and receive TCP traffic on the servistaitsm port.
</summary>
@@ -57863,7 +57947,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_servistaitsm_port" lineno="76514">
+<interface name="corenet_udp_send_servistaitsm_port" lineno="76532">
<summary>
Send UDP traffic on the servistaitsm port.
</summary>
@@ -57874,7 +57958,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76529">
+<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76547">
<summary>
Do not audit attempts to send UDP traffic on the servistaitsm port.
</summary>
@@ -57885,7 +57969,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_servistaitsm_port" lineno="76544">
+<interface name="corenet_udp_receive_servistaitsm_port" lineno="76562">
<summary>
Receive UDP traffic on the servistaitsm port.
</summary>
@@ -57896,7 +57980,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76559">
+<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76577">
<summary>
Do not audit attempts to receive UDP traffic on the servistaitsm port.
</summary>
@@ -57907,7 +57991,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76574">
+<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76592">
<summary>
Send and receive UDP traffic on the servistaitsm port.
</summary>
@@ -57918,7 +58002,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76590">
+<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76608">
<summary>
Do not audit attempts to send and receive
UDP traffic on the servistaitsm port.
@@ -57930,7 +58014,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76605">
+<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76623">
<summary>
Bind TCP sockets to the servistaitsm port.
</summary>
@@ -57941,7 +58025,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_servistaitsm_port" lineno="76625">
+<interface name="corenet_udp_bind_servistaitsm_port" lineno="76643">
<summary>
Bind UDP sockets to the servistaitsm port.
</summary>
@@ -57952,7 +58036,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76644">
+<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76662">
<summary>
Make a TCP connection to the servistaitsm port.
</summary>
@@ -57962,7 +58046,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_servistaitsm_client_packets" lineno="76664">
+<interface name="corenet_send_servistaitsm_client_packets" lineno="76682">
<summary>
Send servistaitsm_client packets.
</summary>
@@ -57973,7 +58057,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76683">
+<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76701">
<summary>
Do not audit attempts to send servistaitsm_client packets.
</summary>
@@ -57984,7 +58068,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_servistaitsm_client_packets" lineno="76702">
+<interface name="corenet_receive_servistaitsm_client_packets" lineno="76720">
<summary>
Receive servistaitsm_client packets.
</summary>
@@ -57995,7 +58079,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76721">
+<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76739">
<summary>
Do not audit attempts to receive servistaitsm_client packets.
</summary>
@@ -58006,7 +58090,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76740">
+<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76758">
<summary>
Send and receive servistaitsm_client packets.
</summary>
@@ -58017,7 +58101,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76756">
+<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76774">
<summary>
Do not audit attempts to send and receive servistaitsm_client packets.
</summary>
@@ -58028,7 +58112,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76771">
+<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76789">
<summary>
Relabel packets to servistaitsm_client the packet type.
</summary>
@@ -58038,7 +58122,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_servistaitsm_server_packets" lineno="76791">
+<interface name="corenet_send_servistaitsm_server_packets" lineno="76809">
<summary>
Send servistaitsm_server packets.
</summary>
@@ -58049,7 +58133,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76810">
+<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76828">
<summary>
Do not audit attempts to send servistaitsm_server packets.
</summary>
@@ -58060,7 +58144,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_servistaitsm_server_packets" lineno="76829">
+<interface name="corenet_receive_servistaitsm_server_packets" lineno="76847">
<summary>
Receive servistaitsm_server packets.
</summary>
@@ -58071,7 +58155,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76848">
+<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76866">
<summary>
Do not audit attempts to receive servistaitsm_server packets.
</summary>
@@ -58082,7 +58166,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76867">
+<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76885">
<summary>
Send and receive servistaitsm_server packets.
</summary>
@@ -58093,7 +58177,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76883">
+<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76901">
<summary>
Do not audit attempts to send and receive servistaitsm_server packets.
</summary>
@@ -58104,7 +58188,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76898">
+<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76916">
<summary>
Relabel packets to servistaitsm_server the packet type.
</summary>
@@ -58114,7 +58198,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76920">
+<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76938">
<summary>
Send and receive TCP traffic on the sieve port.
</summary>
@@ -58125,7 +58209,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_sieve_port" lineno="76935">
+<interface name="corenet_udp_send_sieve_port" lineno="76953">
<summary>
Send UDP traffic on the sieve port.
</summary>
@@ -58136,7 +58220,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76950">
+<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76968">
<summary>
Do not audit attempts to send UDP traffic on the sieve port.
</summary>
@@ -58147,7 +58231,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_sieve_port" lineno="76965">
+<interface name="corenet_udp_receive_sieve_port" lineno="76983">
<summary>
Receive UDP traffic on the sieve port.
</summary>
@@ -58158,7 +58242,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76980">
+<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76998">
<summary>
Do not audit attempts to receive UDP traffic on the sieve port.
</summary>
@@ -58169,7 +58253,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_sieve_port" lineno="76995">
+<interface name="corenet_udp_sendrecv_sieve_port" lineno="77013">
<summary>
Send and receive UDP traffic on the sieve port.
</summary>
@@ -58180,7 +58264,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="77011">
+<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="77029">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sieve port.
@@ -58192,7 +58276,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_sieve_port" lineno="77026">
+<interface name="corenet_tcp_bind_sieve_port" lineno="77044">
<summary>
Bind TCP sockets to the sieve port.
</summary>
@@ -58203,7 +58287,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sieve_port" lineno="77046">
+<interface name="corenet_udp_bind_sieve_port" lineno="77064">
<summary>
Bind UDP sockets to the sieve port.
</summary>
@@ -58214,7 +58298,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sieve_port" lineno="77065">
+<interface name="corenet_tcp_connect_sieve_port" lineno="77083">
<summary>
Make a TCP connection to the sieve port.
</summary>
@@ -58224,7 +58308,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sieve_client_packets" lineno="77085">
+<interface name="corenet_send_sieve_client_packets" lineno="77103">
<summary>
Send sieve_client packets.
</summary>
@@ -58235,7 +58319,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="77104">
+<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="77122">
<summary>
Do not audit attempts to send sieve_client packets.
</summary>
@@ -58246,7 +58330,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sieve_client_packets" lineno="77123">
+<interface name="corenet_receive_sieve_client_packets" lineno="77141">
<summary>
Receive sieve_client packets.
</summary>
@@ -58257,7 +58341,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="77142">
+<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="77160">
<summary>
Do not audit attempts to receive sieve_client packets.
</summary>
@@ -58268,7 +58352,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sieve_client_packets" lineno="77161">
+<interface name="corenet_sendrecv_sieve_client_packets" lineno="77179">
<summary>
Send and receive sieve_client packets.
</summary>
@@ -58279,7 +58363,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="77177">
+<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="77195">
<summary>
Do not audit attempts to send and receive sieve_client packets.
</summary>
@@ -58290,7 +58374,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sieve_client_packets" lineno="77192">
+<interface name="corenet_relabelto_sieve_client_packets" lineno="77210">
<summary>
Relabel packets to sieve_client the packet type.
</summary>
@@ -58300,7 +58384,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sieve_server_packets" lineno="77212">
+<interface name="corenet_send_sieve_server_packets" lineno="77230">
<summary>
Send sieve_server packets.
</summary>
@@ -58311,7 +58395,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="77231">
+<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="77249">
<summary>
Do not audit attempts to send sieve_server packets.
</summary>
@@ -58322,7 +58406,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sieve_server_packets" lineno="77250">
+<interface name="corenet_receive_sieve_server_packets" lineno="77268">
<summary>
Receive sieve_server packets.
</summary>
@@ -58333,7 +58417,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="77269">
+<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="77287">
<summary>
Do not audit attempts to receive sieve_server packets.
</summary>
@@ -58344,7 +58428,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sieve_server_packets" lineno="77288">
+<interface name="corenet_sendrecv_sieve_server_packets" lineno="77306">
<summary>
Send and receive sieve_server packets.
</summary>
@@ -58355,7 +58439,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="77304">
+<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="77322">
<summary>
Do not audit attempts to send and receive sieve_server packets.
</summary>
@@ -58366,7 +58450,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sieve_server_packets" lineno="77319">
+<interface name="corenet_relabelto_sieve_server_packets" lineno="77337">
<summary>
Relabel packets to sieve_server the packet type.
</summary>
@@ -58376,7 +58460,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sip_port" lineno="77341">
+<interface name="corenet_tcp_sendrecv_sip_port" lineno="77359">
<summary>
Send and receive TCP traffic on the sip port.
</summary>
@@ -58387,7 +58471,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_sip_port" lineno="77356">
+<interface name="corenet_udp_send_sip_port" lineno="77374">
<summary>
Send UDP traffic on the sip port.
</summary>
@@ -58398,7 +58482,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_sip_port" lineno="77371">
+<interface name="corenet_dontaudit_udp_send_sip_port" lineno="77389">
<summary>
Do not audit attempts to send UDP traffic on the sip port.
</summary>
@@ -58409,7 +58493,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_sip_port" lineno="77386">
+<interface name="corenet_udp_receive_sip_port" lineno="77404">
<summary>
Receive UDP traffic on the sip port.
</summary>
@@ -58420,7 +58504,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="77401">
+<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="77419">
<summary>
Do not audit attempts to receive UDP traffic on the sip port.
</summary>
@@ -58431,7 +58515,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_sip_port" lineno="77416">
+<interface name="corenet_udp_sendrecv_sip_port" lineno="77434">
<summary>
Send and receive UDP traffic on the sip port.
</summary>
@@ -58442,7 +58526,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77432">
+<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77450">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sip port.
@@ -58454,7 +58538,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_sip_port" lineno="77447">
+<interface name="corenet_tcp_bind_sip_port" lineno="77465">
<summary>
Bind TCP sockets to the sip port.
</summary>
@@ -58465,7 +58549,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sip_port" lineno="77467">
+<interface name="corenet_udp_bind_sip_port" lineno="77485">
<summary>
Bind UDP sockets to the sip port.
</summary>
@@ -58476,7 +58560,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sip_port" lineno="77486">
+<interface name="corenet_tcp_connect_sip_port" lineno="77504">
<summary>
Make a TCP connection to the sip port.
</summary>
@@ -58486,7 +58570,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sip_client_packets" lineno="77506">
+<interface name="corenet_send_sip_client_packets" lineno="77524">
<summary>
Send sip_client packets.
</summary>
@@ -58497,7 +58581,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77525">
+<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77543">
<summary>
Do not audit attempts to send sip_client packets.
</summary>
@@ -58508,7 +58592,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sip_client_packets" lineno="77544">
+<interface name="corenet_receive_sip_client_packets" lineno="77562">
<summary>
Receive sip_client packets.
</summary>
@@ -58519,7 +58603,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77563">
+<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77581">
<summary>
Do not audit attempts to receive sip_client packets.
</summary>
@@ -58530,7 +58614,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sip_client_packets" lineno="77582">
+<interface name="corenet_sendrecv_sip_client_packets" lineno="77600">
<summary>
Send and receive sip_client packets.
</summary>
@@ -58541,7 +58625,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77598">
+<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77616">
<summary>
Do not audit attempts to send and receive sip_client packets.
</summary>
@@ -58552,7 +58636,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sip_client_packets" lineno="77613">
+<interface name="corenet_relabelto_sip_client_packets" lineno="77631">
<summary>
Relabel packets to sip_client the packet type.
</summary>
@@ -58562,7 +58646,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sip_server_packets" lineno="77633">
+<interface name="corenet_send_sip_server_packets" lineno="77651">
<summary>
Send sip_server packets.
</summary>
@@ -58573,7 +58657,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77652">
+<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77670">
<summary>
Do not audit attempts to send sip_server packets.
</summary>
@@ -58584,7 +58668,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sip_server_packets" lineno="77671">
+<interface name="corenet_receive_sip_server_packets" lineno="77689">
<summary>
Receive sip_server packets.
</summary>
@@ -58595,7 +58679,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77690">
+<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77708">
<summary>
Do not audit attempts to receive sip_server packets.
</summary>
@@ -58606,7 +58690,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sip_server_packets" lineno="77709">
+<interface name="corenet_sendrecv_sip_server_packets" lineno="77727">
<summary>
Send and receive sip_server packets.
</summary>
@@ -58617,7 +58701,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77725">
+<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77743">
<summary>
Do not audit attempts to send and receive sip_server packets.
</summary>
@@ -58628,7 +58712,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sip_server_packets" lineno="77740">
+<interface name="corenet_relabelto_sip_server_packets" lineno="77758">
<summary>
Relabel packets to sip_server the packet type.
</summary>
@@ -58638,7 +58722,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77762">
+<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77780">
<summary>
Send and receive TCP traffic on the sixxsconfig port.
</summary>
@@ -58649,7 +58733,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_sixxsconfig_port" lineno="77777">
+<interface name="corenet_udp_send_sixxsconfig_port" lineno="77795">
<summary>
Send UDP traffic on the sixxsconfig port.
</summary>
@@ -58660,7 +58744,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77792">
+<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77810">
<summary>
Do not audit attempts to send UDP traffic on the sixxsconfig port.
</summary>
@@ -58671,7 +58755,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77807">
+<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77825">
<summary>
Receive UDP traffic on the sixxsconfig port.
</summary>
@@ -58682,7 +58766,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77822">
+<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77840">
<summary>
Do not audit attempts to receive UDP traffic on the sixxsconfig port.
</summary>
@@ -58693,7 +58777,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77837">
+<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77855">
<summary>
Send and receive UDP traffic on the sixxsconfig port.
</summary>
@@ -58704,7 +58788,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77853">
+<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77871">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sixxsconfig port.
@@ -58716,7 +58800,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77868">
+<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77886">
<summary>
Bind TCP sockets to the sixxsconfig port.
</summary>
@@ -58727,7 +58811,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77888">
+<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77906">
<summary>
Bind UDP sockets to the sixxsconfig port.
</summary>
@@ -58738,7 +58822,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77907">
+<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77925">
<summary>
Make a TCP connection to the sixxsconfig port.
</summary>
@@ -58748,7 +58832,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sixxsconfig_client_packets" lineno="77927">
+<interface name="corenet_send_sixxsconfig_client_packets" lineno="77945">
<summary>
Send sixxsconfig_client packets.
</summary>
@@ -58759,7 +58843,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77946">
+<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77964">
<summary>
Do not audit attempts to send sixxsconfig_client packets.
</summary>
@@ -58770,7 +58854,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77965">
+<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77983">
<summary>
Receive sixxsconfig_client packets.
</summary>
@@ -58781,7 +58865,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="77984">
+<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="78002">
<summary>
Do not audit attempts to receive sixxsconfig_client packets.
</summary>
@@ -58792,7 +58876,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="78003">
+<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="78021">
<summary>
Send and receive sixxsconfig_client packets.
</summary>
@@ -58803,7 +58887,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="78019">
+<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="78037">
<summary>
Do not audit attempts to send and receive sixxsconfig_client packets.
</summary>
@@ -58814,7 +58898,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="78034">
+<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="78052">
<summary>
Relabel packets to sixxsconfig_client the packet type.
</summary>
@@ -58824,7 +58908,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sixxsconfig_server_packets" lineno="78054">
+<interface name="corenet_send_sixxsconfig_server_packets" lineno="78072">
<summary>
Send sixxsconfig_server packets.
</summary>
@@ -58835,7 +58919,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="78073">
+<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="78091">
<summary>
Do not audit attempts to send sixxsconfig_server packets.
</summary>
@@ -58846,7 +58930,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sixxsconfig_server_packets" lineno="78092">
+<interface name="corenet_receive_sixxsconfig_server_packets" lineno="78110">
<summary>
Receive sixxsconfig_server packets.
</summary>
@@ -58857,7 +58941,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="78111">
+<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="78129">
<summary>
Do not audit attempts to receive sixxsconfig_server packets.
</summary>
@@ -58868,7 +58952,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="78130">
+<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="78148">
<summary>
Send and receive sixxsconfig_server packets.
</summary>
@@ -58879,7 +58963,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="78146">
+<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="78164">
<summary>
Do not audit attempts to send and receive sixxsconfig_server packets.
</summary>
@@ -58890,7 +58974,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="78161">
+<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="78179">
<summary>
Relabel packets to sixxsconfig_server the packet type.
</summary>
@@ -58900,7 +58984,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_smbd_port" lineno="78183">
+<interface name="corenet_tcp_sendrecv_smbd_port" lineno="78201">
<summary>
Send and receive TCP traffic on the smbd port.
</summary>
@@ -58911,7 +58995,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_smbd_port" lineno="78198">
+<interface name="corenet_udp_send_smbd_port" lineno="78216">
<summary>
Send UDP traffic on the smbd port.
</summary>
@@ -58922,7 +59006,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="78213">
+<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="78231">
<summary>
Do not audit attempts to send UDP traffic on the smbd port.
</summary>
@@ -58933,7 +59017,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_smbd_port" lineno="78228">
+<interface name="corenet_udp_receive_smbd_port" lineno="78246">
<summary>
Receive UDP traffic on the smbd port.
</summary>
@@ -58944,7 +59028,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="78243">
+<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="78261">
<summary>
Do not audit attempts to receive UDP traffic on the smbd port.
</summary>
@@ -58955,7 +59039,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_smbd_port" lineno="78258">
+<interface name="corenet_udp_sendrecv_smbd_port" lineno="78276">
<summary>
Send and receive UDP traffic on the smbd port.
</summary>
@@ -58966,7 +59050,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="78274">
+<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="78292">
<summary>
Do not audit attempts to send and receive
UDP traffic on the smbd port.
@@ -58978,7 +59062,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_smbd_port" lineno="78289">
+<interface name="corenet_tcp_bind_smbd_port" lineno="78307">
<summary>
Bind TCP sockets to the smbd port.
</summary>
@@ -58989,7 +59073,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_smbd_port" lineno="78309">
+<interface name="corenet_udp_bind_smbd_port" lineno="78327">
<summary>
Bind UDP sockets to the smbd port.
</summary>
@@ -59000,7 +59084,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_smbd_port" lineno="78328">
+<interface name="corenet_tcp_connect_smbd_port" lineno="78346">
<summary>
Make a TCP connection to the smbd port.
</summary>
@@ -59010,7 +59094,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smbd_client_packets" lineno="78348">
+<interface name="corenet_send_smbd_client_packets" lineno="78366">
<summary>
Send smbd_client packets.
</summary>
@@ -59021,7 +59105,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="78367">
+<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="78385">
<summary>
Do not audit attempts to send smbd_client packets.
</summary>
@@ -59032,7 +59116,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smbd_client_packets" lineno="78386">
+<interface name="corenet_receive_smbd_client_packets" lineno="78404">
<summary>
Receive smbd_client packets.
</summary>
@@ -59043,7 +59127,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="78405">
+<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="78423">
<summary>
Do not audit attempts to receive smbd_client packets.
</summary>
@@ -59054,7 +59138,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smbd_client_packets" lineno="78424">
+<interface name="corenet_sendrecv_smbd_client_packets" lineno="78442">
<summary>
Send and receive smbd_client packets.
</summary>
@@ -59065,7 +59149,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78440">
+<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78458">
<summary>
Do not audit attempts to send and receive smbd_client packets.
</summary>
@@ -59076,7 +59160,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smbd_client_packets" lineno="78455">
+<interface name="corenet_relabelto_smbd_client_packets" lineno="78473">
<summary>
Relabel packets to smbd_client the packet type.
</summary>
@@ -59086,7 +59170,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smbd_server_packets" lineno="78475">
+<interface name="corenet_send_smbd_server_packets" lineno="78493">
<summary>
Send smbd_server packets.
</summary>
@@ -59097,7 +59181,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78494">
+<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78512">
<summary>
Do not audit attempts to send smbd_server packets.
</summary>
@@ -59108,7 +59192,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smbd_server_packets" lineno="78513">
+<interface name="corenet_receive_smbd_server_packets" lineno="78531">
<summary>
Receive smbd_server packets.
</summary>
@@ -59119,7 +59203,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78532">
+<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78550">
<summary>
Do not audit attempts to receive smbd_server packets.
</summary>
@@ -59130,7 +59214,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smbd_server_packets" lineno="78551">
+<interface name="corenet_sendrecv_smbd_server_packets" lineno="78569">
<summary>
Send and receive smbd_server packets.
</summary>
@@ -59141,7 +59225,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78567">
+<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78585">
<summary>
Do not audit attempts to send and receive smbd_server packets.
</summary>
@@ -59152,7 +59236,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smbd_server_packets" lineno="78582">
+<interface name="corenet_relabelto_smbd_server_packets" lineno="78600">
<summary>
Relabel packets to smbd_server the packet type.
</summary>
@@ -59162,7 +59246,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78604">
+<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78622">
<summary>
Send and receive TCP traffic on the smtp port.
</summary>
@@ -59173,7 +59257,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_smtp_port" lineno="78619">
+<interface name="corenet_udp_send_smtp_port" lineno="78637">
<summary>
Send UDP traffic on the smtp port.
</summary>
@@ -59184,7 +59268,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78634">
+<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78652">
<summary>
Do not audit attempts to send UDP traffic on the smtp port.
</summary>
@@ -59195,7 +59279,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_smtp_port" lineno="78649">
+<interface name="corenet_udp_receive_smtp_port" lineno="78667">
<summary>
Receive UDP traffic on the smtp port.
</summary>
@@ -59206,7 +59290,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78664">
+<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78682">
<summary>
Do not audit attempts to receive UDP traffic on the smtp port.
</summary>
@@ -59217,7 +59301,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_smtp_port" lineno="78679">
+<interface name="corenet_udp_sendrecv_smtp_port" lineno="78697">
<summary>
Send and receive UDP traffic on the smtp port.
</summary>
@@ -59228,7 +59312,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78695">
+<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78713">
<summary>
Do not audit attempts to send and receive
UDP traffic on the smtp port.
@@ -59240,7 +59324,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_smtp_port" lineno="78710">
+<interface name="corenet_tcp_bind_smtp_port" lineno="78728">
<summary>
Bind TCP sockets to the smtp port.
</summary>
@@ -59251,7 +59335,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_smtp_port" lineno="78730">
+<interface name="corenet_udp_bind_smtp_port" lineno="78748">
<summary>
Bind UDP sockets to the smtp port.
</summary>
@@ -59262,7 +59346,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_smtp_port" lineno="78749">
+<interface name="corenet_tcp_connect_smtp_port" lineno="78767">
<summary>
Make a TCP connection to the smtp port.
</summary>
@@ -59272,7 +59356,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smtp_client_packets" lineno="78769">
+<interface name="corenet_send_smtp_client_packets" lineno="78787">
<summary>
Send smtp_client packets.
</summary>
@@ -59283,7 +59367,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78788">
+<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78806">
<summary>
Do not audit attempts to send smtp_client packets.
</summary>
@@ -59294,7 +59378,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smtp_client_packets" lineno="78807">
+<interface name="corenet_receive_smtp_client_packets" lineno="78825">
<summary>
Receive smtp_client packets.
</summary>
@@ -59305,7 +59389,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78826">
+<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78844">
<summary>
Do not audit attempts to receive smtp_client packets.
</summary>
@@ -59316,7 +59400,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smtp_client_packets" lineno="78845">
+<interface name="corenet_sendrecv_smtp_client_packets" lineno="78863">
<summary>
Send and receive smtp_client packets.
</summary>
@@ -59327,7 +59411,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78861">
+<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78879">
<summary>
Do not audit attempts to send and receive smtp_client packets.
</summary>
@@ -59338,7 +59422,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smtp_client_packets" lineno="78876">
+<interface name="corenet_relabelto_smtp_client_packets" lineno="78894">
<summary>
Relabel packets to smtp_client the packet type.
</summary>
@@ -59348,7 +59432,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smtp_server_packets" lineno="78896">
+<interface name="corenet_send_smtp_server_packets" lineno="78914">
<summary>
Send smtp_server packets.
</summary>
@@ -59359,7 +59443,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78915">
+<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78933">
<summary>
Do not audit attempts to send smtp_server packets.
</summary>
@@ -59370,7 +59454,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smtp_server_packets" lineno="78934">
+<interface name="corenet_receive_smtp_server_packets" lineno="78952">
<summary>
Receive smtp_server packets.
</summary>
@@ -59381,7 +59465,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78953">
+<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78971">
<summary>
Do not audit attempts to receive smtp_server packets.
</summary>
@@ -59392,7 +59476,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smtp_server_packets" lineno="78972">
+<interface name="corenet_sendrecv_smtp_server_packets" lineno="78990">
<summary>
Send and receive smtp_server packets.
</summary>
@@ -59403,7 +59487,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="78988">
+<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="79006">
<summary>
Do not audit attempts to send and receive smtp_server packets.
</summary>
@@ -59414,7 +59498,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smtp_server_packets" lineno="79003">
+<interface name="corenet_relabelto_smtp_server_packets" lineno="79021">
<summary>
Relabel packets to smtp_server the packet type.
</summary>
@@ -59424,7 +59508,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_snmp_port" lineno="79025">
+<interface name="corenet_tcp_sendrecv_snmp_port" lineno="79043">
<summary>
Send and receive TCP traffic on the snmp port.
</summary>
@@ -59435,7 +59519,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_snmp_port" lineno="79040">
+<interface name="corenet_udp_send_snmp_port" lineno="79058">
<summary>
Send UDP traffic on the snmp port.
</summary>
@@ -59446,7 +59530,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="79055">
+<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="79073">
<summary>
Do not audit attempts to send UDP traffic on the snmp port.
</summary>
@@ -59457,7 +59541,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_snmp_port" lineno="79070">
+<interface name="corenet_udp_receive_snmp_port" lineno="79088">
<summary>
Receive UDP traffic on the snmp port.
</summary>
@@ -59468,7 +59552,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="79085">
+<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="79103">
<summary>
Do not audit attempts to receive UDP traffic on the snmp port.
</summary>
@@ -59479,7 +59563,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_snmp_port" lineno="79100">
+<interface name="corenet_udp_sendrecv_snmp_port" lineno="79118">
<summary>
Send and receive UDP traffic on the snmp port.
</summary>
@@ -59490,7 +59574,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="79116">
+<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="79134">
<summary>
Do not audit attempts to send and receive
UDP traffic on the snmp port.
@@ -59502,7 +59586,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_snmp_port" lineno="79131">
+<interface name="corenet_tcp_bind_snmp_port" lineno="79149">
<summary>
Bind TCP sockets to the snmp port.
</summary>
@@ -59513,7 +59597,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_snmp_port" lineno="79151">
+<interface name="corenet_udp_bind_snmp_port" lineno="79169">
<summary>
Bind UDP sockets to the snmp port.
</summary>
@@ -59524,7 +59608,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_snmp_port" lineno="79170">
+<interface name="corenet_tcp_connect_snmp_port" lineno="79188">
<summary>
Make a TCP connection to the snmp port.
</summary>
@@ -59534,7 +59618,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_snmp_client_packets" lineno="79190">
+<interface name="corenet_send_snmp_client_packets" lineno="79208">
<summary>
Send snmp_client packets.
</summary>
@@ -59545,7 +59629,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="79209">
+<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="79227">
<summary>
Do not audit attempts to send snmp_client packets.
</summary>
@@ -59556,7 +59640,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_snmp_client_packets" lineno="79228">
+<interface name="corenet_receive_snmp_client_packets" lineno="79246">
<summary>
Receive snmp_client packets.
</summary>
@@ -59567,7 +59651,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="79247">
+<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="79265">
<summary>
Do not audit attempts to receive snmp_client packets.
</summary>
@@ -59578,7 +59662,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_snmp_client_packets" lineno="79266">
+<interface name="corenet_sendrecv_snmp_client_packets" lineno="79284">
<summary>
Send and receive snmp_client packets.
</summary>
@@ -59589,7 +59673,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="79282">
+<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="79300">
<summary>
Do not audit attempts to send and receive snmp_client packets.
</summary>
@@ -59600,7 +59684,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_snmp_client_packets" lineno="79297">
+<interface name="corenet_relabelto_snmp_client_packets" lineno="79315">
<summary>
Relabel packets to snmp_client the packet type.
</summary>
@@ -59610,7 +59694,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_snmp_server_packets" lineno="79317">
+<interface name="corenet_send_snmp_server_packets" lineno="79335">
<summary>
Send snmp_server packets.
</summary>
@@ -59621,7 +59705,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="79336">
+<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="79354">
<summary>
Do not audit attempts to send snmp_server packets.
</summary>
@@ -59632,7 +59716,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_snmp_server_packets" lineno="79355">
+<interface name="corenet_receive_snmp_server_packets" lineno="79373">
<summary>
Receive snmp_server packets.
</summary>
@@ -59643,7 +59727,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="79374">
+<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="79392">
<summary>
Do not audit attempts to receive snmp_server packets.
</summary>
@@ -59654,7 +59738,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_snmp_server_packets" lineno="79393">
+<interface name="corenet_sendrecv_snmp_server_packets" lineno="79411">
<summary>
Send and receive snmp_server packets.
</summary>
@@ -59665,7 +59749,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="79409">
+<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="79427">
<summary>
Do not audit attempts to send and receive snmp_server packets.
</summary>
@@ -59676,7 +59760,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_snmp_server_packets" lineno="79424">
+<interface name="corenet_relabelto_snmp_server_packets" lineno="79442">
<summary>
Relabel packets to snmp_server the packet type.
</summary>
@@ -59686,7 +59770,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_socks_port" lineno="79446">
+<interface name="corenet_tcp_sendrecv_socks_port" lineno="79464">
<summary>
Send and receive TCP traffic on the socks port.
</summary>
@@ -59697,7 +59781,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_socks_port" lineno="79461">
+<interface name="corenet_udp_send_socks_port" lineno="79479">
<summary>
Send UDP traffic on the socks port.
</summary>
@@ -59708,7 +59792,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79476">
+<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79494">
<summary>
Do not audit attempts to send UDP traffic on the socks port.
</summary>
@@ -59719,7 +59803,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_socks_port" lineno="79491">
+<interface name="corenet_udp_receive_socks_port" lineno="79509">
<summary>
Receive UDP traffic on the socks port.
</summary>
@@ -59730,7 +59814,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79506">
+<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79524">
<summary>
Do not audit attempts to receive UDP traffic on the socks port.
</summary>
@@ -59741,7 +59825,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_socks_port" lineno="79521">
+<interface name="corenet_udp_sendrecv_socks_port" lineno="79539">
<summary>
Send and receive UDP traffic on the socks port.
</summary>
@@ -59752,7 +59836,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79537">
+<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79555">
<summary>
Do not audit attempts to send and receive
UDP traffic on the socks port.
@@ -59764,7 +59848,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_socks_port" lineno="79552">
+<interface name="corenet_tcp_bind_socks_port" lineno="79570">
<summary>
Bind TCP sockets to the socks port.
</summary>
@@ -59775,7 +59859,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_socks_port" lineno="79572">
+<interface name="corenet_udp_bind_socks_port" lineno="79590">
<summary>
Bind UDP sockets to the socks port.
</summary>
@@ -59786,7 +59870,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_socks_port" lineno="79591">
+<interface name="corenet_tcp_connect_socks_port" lineno="79609">
<summary>
Make a TCP connection to the socks port.
</summary>
@@ -59796,7 +59880,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_socks_client_packets" lineno="79611">
+<interface name="corenet_send_socks_client_packets" lineno="79629">
<summary>
Send socks_client packets.
</summary>
@@ -59807,7 +59891,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79630">
+<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79648">
<summary>
Do not audit attempts to send socks_client packets.
</summary>
@@ -59818,7 +59902,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_socks_client_packets" lineno="79649">
+<interface name="corenet_receive_socks_client_packets" lineno="79667">
<summary>
Receive socks_client packets.
</summary>
@@ -59829,7 +59913,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79668">
+<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79686">
<summary>
Do not audit attempts to receive socks_client packets.
</summary>
@@ -59840,7 +59924,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_socks_client_packets" lineno="79687">
+<interface name="corenet_sendrecv_socks_client_packets" lineno="79705">
<summary>
Send and receive socks_client packets.
</summary>
@@ -59851,7 +59935,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79703">
+<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79721">
<summary>
Do not audit attempts to send and receive socks_client packets.
</summary>
@@ -59862,7 +59946,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_socks_client_packets" lineno="79718">
+<interface name="corenet_relabelto_socks_client_packets" lineno="79736">
<summary>
Relabel packets to socks_client the packet type.
</summary>
@@ -59872,7 +59956,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_socks_server_packets" lineno="79738">
+<interface name="corenet_send_socks_server_packets" lineno="79756">
<summary>
Send socks_server packets.
</summary>
@@ -59883,7 +59967,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79757">
+<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79775">
<summary>
Do not audit attempts to send socks_server packets.
</summary>
@@ -59894,7 +59978,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_socks_server_packets" lineno="79776">
+<interface name="corenet_receive_socks_server_packets" lineno="79794">
<summary>
Receive socks_server packets.
</summary>
@@ -59905,7 +59989,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79795">
+<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79813">
<summary>
Do not audit attempts to receive socks_server packets.
</summary>
@@ -59916,7 +60000,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_socks_server_packets" lineno="79814">
+<interface name="corenet_sendrecv_socks_server_packets" lineno="79832">
<summary>
Send and receive socks_server packets.
</summary>
@@ -59927,7 +60011,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79830">
+<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79848">
<summary>
Do not audit attempts to send and receive socks_server packets.
</summary>
@@ -59938,7 +60022,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_socks_server_packets" lineno="79845">
+<interface name="corenet_relabelto_socks_server_packets" lineno="79863">
<summary>
Relabel packets to socks_server the packet type.
</summary>
@@ -59948,7 +60032,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79867">
+<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79885">
<summary>
Send and receive TCP traffic on the soundd port.
</summary>
@@ -59959,7 +60043,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_soundd_port" lineno="79882">
+<interface name="corenet_udp_send_soundd_port" lineno="79900">
<summary>
Send UDP traffic on the soundd port.
</summary>
@@ -59970,7 +60054,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79897">
+<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79915">
<summary>
Do not audit attempts to send UDP traffic on the soundd port.
</summary>
@@ -59981,7 +60065,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_soundd_port" lineno="79912">
+<interface name="corenet_udp_receive_soundd_port" lineno="79930">
<summary>
Receive UDP traffic on the soundd port.
</summary>
@@ -59992,7 +60076,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79927">
+<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79945">
<summary>
Do not audit attempts to receive UDP traffic on the soundd port.
</summary>
@@ -60003,7 +60087,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_soundd_port" lineno="79942">
+<interface name="corenet_udp_sendrecv_soundd_port" lineno="79960">
<summary>
Send and receive UDP traffic on the soundd port.
</summary>
@@ -60014,7 +60098,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79958">
+<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79976">
<summary>
Do not audit attempts to send and receive
UDP traffic on the soundd port.
@@ -60026,7 +60110,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_soundd_port" lineno="79973">
+<interface name="corenet_tcp_bind_soundd_port" lineno="79991">
<summary>
Bind TCP sockets to the soundd port.
</summary>
@@ -60037,7 +60121,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_soundd_port" lineno="79993">
+<interface name="corenet_udp_bind_soundd_port" lineno="80011">
<summary>
Bind UDP sockets to the soundd port.
</summary>
@@ -60048,7 +60132,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_soundd_port" lineno="80012">
+<interface name="corenet_tcp_connect_soundd_port" lineno="80030">
<summary>
Make a TCP connection to the soundd port.
</summary>
@@ -60058,7 +60142,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_soundd_client_packets" lineno="80032">
+<interface name="corenet_send_soundd_client_packets" lineno="80050">
<summary>
Send soundd_client packets.
</summary>
@@ -60069,7 +60153,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="80051">
+<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="80069">
<summary>
Do not audit attempts to send soundd_client packets.
</summary>
@@ -60080,7 +60164,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_soundd_client_packets" lineno="80070">
+<interface name="corenet_receive_soundd_client_packets" lineno="80088">
<summary>
Receive soundd_client packets.
</summary>
@@ -60091,7 +60175,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="80089">
+<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="80107">
<summary>
Do not audit attempts to receive soundd_client packets.
</summary>
@@ -60102,7 +60186,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_soundd_client_packets" lineno="80108">
+<interface name="corenet_sendrecv_soundd_client_packets" lineno="80126">
<summary>
Send and receive soundd_client packets.
</summary>
@@ -60113,7 +60197,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="80124">
+<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="80142">
<summary>
Do not audit attempts to send and receive soundd_client packets.
</summary>
@@ -60124,7 +60208,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_soundd_client_packets" lineno="80139">
+<interface name="corenet_relabelto_soundd_client_packets" lineno="80157">
<summary>
Relabel packets to soundd_client the packet type.
</summary>
@@ -60134,7 +60218,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_soundd_server_packets" lineno="80159">
+<interface name="corenet_send_soundd_server_packets" lineno="80177">
<summary>
Send soundd_server packets.
</summary>
@@ -60145,7 +60229,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="80178">
+<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="80196">
<summary>
Do not audit attempts to send soundd_server packets.
</summary>
@@ -60156,7 +60240,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_soundd_server_packets" lineno="80197">
+<interface name="corenet_receive_soundd_server_packets" lineno="80215">
<summary>
Receive soundd_server packets.
</summary>
@@ -60167,7 +60251,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="80216">
+<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="80234">
<summary>
Do not audit attempts to receive soundd_server packets.
</summary>
@@ -60178,7 +60262,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_soundd_server_packets" lineno="80235">
+<interface name="corenet_sendrecv_soundd_server_packets" lineno="80253">
<summary>
Send and receive soundd_server packets.
</summary>
@@ -60189,7 +60273,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="80251">
+<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="80269">
<summary>
Do not audit attempts to send and receive soundd_server packets.
</summary>
@@ -60200,7 +60284,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_soundd_server_packets" lineno="80266">
+<interface name="corenet_relabelto_soundd_server_packets" lineno="80284">
<summary>
Relabel packets to soundd_server the packet type.
</summary>
@@ -60210,7 +60294,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_spamd_port" lineno="80288">
+<interface name="corenet_tcp_sendrecv_spamd_port" lineno="80306">
<summary>
Send and receive TCP traffic on the spamd port.
</summary>
@@ -60221,7 +60305,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_spamd_port" lineno="80303">
+<interface name="corenet_udp_send_spamd_port" lineno="80321">
<summary>
Send UDP traffic on the spamd port.
</summary>
@@ -60232,7 +60316,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="80318">
+<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="80336">
<summary>
Do not audit attempts to send UDP traffic on the spamd port.
</summary>
@@ -60243,7 +60327,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_spamd_port" lineno="80333">
+<interface name="corenet_udp_receive_spamd_port" lineno="80351">
<summary>
Receive UDP traffic on the spamd port.
</summary>
@@ -60254,7 +60338,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="80348">
+<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="80366">
<summary>
Do not audit attempts to receive UDP traffic on the spamd port.
</summary>
@@ -60265,7 +60349,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_spamd_port" lineno="80363">
+<interface name="corenet_udp_sendrecv_spamd_port" lineno="80381">
<summary>
Send and receive UDP traffic on the spamd port.
</summary>
@@ -60276,7 +60360,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="80379">
+<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="80397">
<summary>
Do not audit attempts to send and receive
UDP traffic on the spamd port.
@@ -60288,7 +60372,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_spamd_port" lineno="80394">
+<interface name="corenet_tcp_bind_spamd_port" lineno="80412">
<summary>
Bind TCP sockets to the spamd port.
</summary>
@@ -60299,7 +60383,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_spamd_port" lineno="80414">
+<interface name="corenet_udp_bind_spamd_port" lineno="80432">
<summary>
Bind UDP sockets to the spamd port.
</summary>
@@ -60310,7 +60394,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_spamd_port" lineno="80433">
+<interface name="corenet_tcp_connect_spamd_port" lineno="80451">
<summary>
Make a TCP connection to the spamd port.
</summary>
@@ -60320,7 +60404,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_spamd_client_packets" lineno="80453">
+<interface name="corenet_send_spamd_client_packets" lineno="80471">
<summary>
Send spamd_client packets.
</summary>
@@ -60331,7 +60415,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80472">
+<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80490">
<summary>
Do not audit attempts to send spamd_client packets.
</summary>
@@ -60342,7 +60426,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_spamd_client_packets" lineno="80491">
+<interface name="corenet_receive_spamd_client_packets" lineno="80509">
<summary>
Receive spamd_client packets.
</summary>
@@ -60353,7 +60437,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80510">
+<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80528">
<summary>
Do not audit attempts to receive spamd_client packets.
</summary>
@@ -60364,7 +60448,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_spamd_client_packets" lineno="80529">
+<interface name="corenet_sendrecv_spamd_client_packets" lineno="80547">
<summary>
Send and receive spamd_client packets.
</summary>
@@ -60375,7 +60459,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80545">
+<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80563">
<summary>
Do not audit attempts to send and receive spamd_client packets.
</summary>
@@ -60386,7 +60470,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_spamd_client_packets" lineno="80560">
+<interface name="corenet_relabelto_spamd_client_packets" lineno="80578">
<summary>
Relabel packets to spamd_client the packet type.
</summary>
@@ -60396,7 +60480,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_spamd_server_packets" lineno="80580">
+<interface name="corenet_send_spamd_server_packets" lineno="80598">
<summary>
Send spamd_server packets.
</summary>
@@ -60407,7 +60491,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80599">
+<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80617">
<summary>
Do not audit attempts to send spamd_server packets.
</summary>
@@ -60418,7 +60502,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_spamd_server_packets" lineno="80618">
+<interface name="corenet_receive_spamd_server_packets" lineno="80636">
<summary>
Receive spamd_server packets.
</summary>
@@ -60429,7 +60513,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80637">
+<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80655">
<summary>
Do not audit attempts to receive spamd_server packets.
</summary>
@@ -60440,7 +60524,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_spamd_server_packets" lineno="80656">
+<interface name="corenet_sendrecv_spamd_server_packets" lineno="80674">
<summary>
Send and receive spamd_server packets.
</summary>
@@ -60451,7 +60535,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80672">
+<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80690">
<summary>
Do not audit attempts to send and receive spamd_server packets.
</summary>
@@ -60462,7 +60546,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_spamd_server_packets" lineno="80687">
+<interface name="corenet_relabelto_spamd_server_packets" lineno="80705">
<summary>
Relabel packets to spamd_server the packet type.
</summary>
@@ -60472,7 +60556,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_speech_port" lineno="80709">
+<interface name="corenet_tcp_sendrecv_speech_port" lineno="80727">
<summary>
Send and receive TCP traffic on the speech port.
</summary>
@@ -60483,7 +60567,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_speech_port" lineno="80724">
+<interface name="corenet_udp_send_speech_port" lineno="80742">
<summary>
Send UDP traffic on the speech port.
</summary>
@@ -60494,7 +60578,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80739">
+<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80757">
<summary>
Do not audit attempts to send UDP traffic on the speech port.
</summary>
@@ -60505,7 +60589,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_speech_port" lineno="80754">
+<interface name="corenet_udp_receive_speech_port" lineno="80772">
<summary>
Receive UDP traffic on the speech port.
</summary>
@@ -60516,7 +60600,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80769">
+<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80787">
<summary>
Do not audit attempts to receive UDP traffic on the speech port.
</summary>
@@ -60527,7 +60611,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_speech_port" lineno="80784">
+<interface name="corenet_udp_sendrecv_speech_port" lineno="80802">
<summary>
Send and receive UDP traffic on the speech port.
</summary>
@@ -60538,7 +60622,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80800">
+<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80818">
<summary>
Do not audit attempts to send and receive
UDP traffic on the speech port.
@@ -60550,7 +60634,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_speech_port" lineno="80815">
+<interface name="corenet_tcp_bind_speech_port" lineno="80833">
<summary>
Bind TCP sockets to the speech port.
</summary>
@@ -60561,7 +60645,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_speech_port" lineno="80835">
+<interface name="corenet_udp_bind_speech_port" lineno="80853">
<summary>
Bind UDP sockets to the speech port.
</summary>
@@ -60572,7 +60656,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_speech_port" lineno="80854">
+<interface name="corenet_tcp_connect_speech_port" lineno="80872">
<summary>
Make a TCP connection to the speech port.
</summary>
@@ -60582,7 +60666,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_speech_client_packets" lineno="80874">
+<interface name="corenet_send_speech_client_packets" lineno="80892">
<summary>
Send speech_client packets.
</summary>
@@ -60593,7 +60677,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80893">
+<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80911">
<summary>
Do not audit attempts to send speech_client packets.
</summary>
@@ -60604,7 +60688,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_speech_client_packets" lineno="80912">
+<interface name="corenet_receive_speech_client_packets" lineno="80930">
<summary>
Receive speech_client packets.
</summary>
@@ -60615,7 +60699,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80931">
+<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80949">
<summary>
Do not audit attempts to receive speech_client packets.
</summary>
@@ -60626,7 +60710,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_speech_client_packets" lineno="80950">
+<interface name="corenet_sendrecv_speech_client_packets" lineno="80968">
<summary>
Send and receive speech_client packets.
</summary>
@@ -60637,7 +60721,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80966">
+<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80984">
<summary>
Do not audit attempts to send and receive speech_client packets.
</summary>
@@ -60648,7 +60732,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_speech_client_packets" lineno="80981">
+<interface name="corenet_relabelto_speech_client_packets" lineno="80999">
<summary>
Relabel packets to speech_client the packet type.
</summary>
@@ -60658,7 +60742,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_speech_server_packets" lineno="81001">
+<interface name="corenet_send_speech_server_packets" lineno="81019">
<summary>
Send speech_server packets.
</summary>
@@ -60669,7 +60753,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_speech_server_packets" lineno="81020">
+<interface name="corenet_dontaudit_send_speech_server_packets" lineno="81038">
<summary>
Do not audit attempts to send speech_server packets.
</summary>
@@ -60680,7 +60764,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_speech_server_packets" lineno="81039">
+<interface name="corenet_receive_speech_server_packets" lineno="81057">
<summary>
Receive speech_server packets.
</summary>
@@ -60691,7 +60775,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="81058">
+<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="81076">
<summary>
Do not audit attempts to receive speech_server packets.
</summary>
@@ -60702,7 +60786,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_speech_server_packets" lineno="81077">
+<interface name="corenet_sendrecv_speech_server_packets" lineno="81095">
<summary>
Send and receive speech_server packets.
</summary>
@@ -60713,7 +60797,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="81093">
+<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="81111">
<summary>
Do not audit attempts to send and receive speech_server packets.
</summary>
@@ -60724,7 +60808,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_speech_server_packets" lineno="81108">
+<interface name="corenet_relabelto_speech_server_packets" lineno="81126">
<summary>
Relabel packets to speech_server the packet type.
</summary>
@@ -60734,7 +60818,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_squid_port" lineno="81130">
+<interface name="corenet_tcp_sendrecv_squid_port" lineno="81148">
<summary>
Send and receive TCP traffic on the squid port.
</summary>
@@ -60745,7 +60829,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_squid_port" lineno="81145">
+<interface name="corenet_udp_send_squid_port" lineno="81163">
<summary>
Send UDP traffic on the squid port.
</summary>
@@ -60756,7 +60840,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_squid_port" lineno="81160">
+<interface name="corenet_dontaudit_udp_send_squid_port" lineno="81178">
<summary>
Do not audit attempts to send UDP traffic on the squid port.
</summary>
@@ -60767,7 +60851,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_squid_port" lineno="81175">
+<interface name="corenet_udp_receive_squid_port" lineno="81193">
<summary>
Receive UDP traffic on the squid port.
</summary>
@@ -60778,7 +60862,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="81190">
+<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="81208">
<summary>
Do not audit attempts to receive UDP traffic on the squid port.
</summary>
@@ -60789,7 +60873,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_squid_port" lineno="81205">
+<interface name="corenet_udp_sendrecv_squid_port" lineno="81223">
<summary>
Send and receive UDP traffic on the squid port.
</summary>
@@ -60800,7 +60884,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="81221">
+<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="81239">
<summary>
Do not audit attempts to send and receive
UDP traffic on the squid port.
@@ -60812,7 +60896,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_squid_port" lineno="81236">
+<interface name="corenet_tcp_bind_squid_port" lineno="81254">
<summary>
Bind TCP sockets to the squid port.
</summary>
@@ -60823,7 +60907,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_squid_port" lineno="81256">
+<interface name="corenet_udp_bind_squid_port" lineno="81274">
<summary>
Bind UDP sockets to the squid port.
</summary>
@@ -60834,7 +60918,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_squid_port" lineno="81275">
+<interface name="corenet_tcp_connect_squid_port" lineno="81293">
<summary>
Make a TCP connection to the squid port.
</summary>
@@ -60844,7 +60928,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_squid_client_packets" lineno="81295">
+<interface name="corenet_send_squid_client_packets" lineno="81313">
<summary>
Send squid_client packets.
</summary>
@@ -60855,7 +60939,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_squid_client_packets" lineno="81314">
+<interface name="corenet_dontaudit_send_squid_client_packets" lineno="81332">
<summary>
Do not audit attempts to send squid_client packets.
</summary>
@@ -60866,7 +60950,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_squid_client_packets" lineno="81333">
+<interface name="corenet_receive_squid_client_packets" lineno="81351">
<summary>
Receive squid_client packets.
</summary>
@@ -60877,7 +60961,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="81352">
+<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="81370">
<summary>
Do not audit attempts to receive squid_client packets.
</summary>
@@ -60888,7 +60972,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_squid_client_packets" lineno="81371">
+<interface name="corenet_sendrecv_squid_client_packets" lineno="81389">
<summary>
Send and receive squid_client packets.
</summary>
@@ -60899,7 +60983,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="81387">
+<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="81405">
<summary>
Do not audit attempts to send and receive squid_client packets.
</summary>
@@ -60910,7 +60994,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_squid_client_packets" lineno="81402">
+<interface name="corenet_relabelto_squid_client_packets" lineno="81420">
<summary>
Relabel packets to squid_client the packet type.
</summary>
@@ -60920,7 +61004,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_squid_server_packets" lineno="81422">
+<interface name="corenet_send_squid_server_packets" lineno="81440">
<summary>
Send squid_server packets.
</summary>
@@ -60931,7 +61015,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81441">
+<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81459">
<summary>
Do not audit attempts to send squid_server packets.
</summary>
@@ -60942,7 +61026,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_squid_server_packets" lineno="81460">
+<interface name="corenet_receive_squid_server_packets" lineno="81478">
<summary>
Receive squid_server packets.
</summary>
@@ -60953,7 +61037,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81479">
+<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81497">
<summary>
Do not audit attempts to receive squid_server packets.
</summary>
@@ -60964,7 +61048,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_squid_server_packets" lineno="81498">
+<interface name="corenet_sendrecv_squid_server_packets" lineno="81516">
<summary>
Send and receive squid_server packets.
</summary>
@@ -60975,7 +61059,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81514">
+<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81532">
<summary>
Do not audit attempts to send and receive squid_server packets.
</summary>
@@ -60986,7 +61070,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_squid_server_packets" lineno="81529">
+<interface name="corenet_relabelto_squid_server_packets" lineno="81547">
<summary>
Relabel packets to squid_server the packet type.
</summary>
@@ -60996,7 +61080,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81551">
+<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81569">
<summary>
Send and receive TCP traffic on the ssdp port.
</summary>
@@ -61007,7 +61091,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ssdp_port" lineno="81566">
+<interface name="corenet_udp_send_ssdp_port" lineno="81584">
<summary>
Send UDP traffic on the ssdp port.
</summary>
@@ -61018,7 +61102,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81581">
+<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81599">
<summary>
Do not audit attempts to send UDP traffic on the ssdp port.
</summary>
@@ -61029,7 +61113,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ssdp_port" lineno="81596">
+<interface name="corenet_udp_receive_ssdp_port" lineno="81614">
<summary>
Receive UDP traffic on the ssdp port.
</summary>
@@ -61040,7 +61124,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81611">
+<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81629">
<summary>
Do not audit attempts to receive UDP traffic on the ssdp port.
</summary>
@@ -61051,7 +61135,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81626">
+<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81644">
<summary>
Send and receive UDP traffic on the ssdp port.
</summary>
@@ -61062,7 +61146,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81642">
+<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81660">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ssdp port.
@@ -61074,7 +61158,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ssdp_port" lineno="81657">
+<interface name="corenet_tcp_bind_ssdp_port" lineno="81675">
<summary>
Bind TCP sockets to the ssdp port.
</summary>
@@ -61085,7 +61169,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ssdp_port" lineno="81677">
+<interface name="corenet_udp_bind_ssdp_port" lineno="81695">
<summary>
Bind UDP sockets to the ssdp port.
</summary>
@@ -61096,7 +61180,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ssdp_port" lineno="81696">
+<interface name="corenet_tcp_connect_ssdp_port" lineno="81714">
<summary>
Make a TCP connection to the ssdp port.
</summary>
@@ -61106,7 +61190,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssdp_client_packets" lineno="81716">
+<interface name="corenet_send_ssdp_client_packets" lineno="81734">
<summary>
Send ssdp_client packets.
</summary>
@@ -61117,7 +61201,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81735">
+<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81753">
<summary>
Do not audit attempts to send ssdp_client packets.
</summary>
@@ -61128,7 +61212,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssdp_client_packets" lineno="81754">
+<interface name="corenet_receive_ssdp_client_packets" lineno="81772">
<summary>
Receive ssdp_client packets.
</summary>
@@ -61139,7 +61223,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81773">
+<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81791">
<summary>
Do not audit attempts to receive ssdp_client packets.
</summary>
@@ -61150,7 +61234,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81792">
+<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81810">
<summary>
Send and receive ssdp_client packets.
</summary>
@@ -61161,7 +61245,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81808">
+<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81826">
<summary>
Do not audit attempts to send and receive ssdp_client packets.
</summary>
@@ -61172,7 +61256,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssdp_client_packets" lineno="81823">
+<interface name="corenet_relabelto_ssdp_client_packets" lineno="81841">
<summary>
Relabel packets to ssdp_client the packet type.
</summary>
@@ -61182,7 +61266,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssdp_server_packets" lineno="81843">
+<interface name="corenet_send_ssdp_server_packets" lineno="81861">
<summary>
Send ssdp_server packets.
</summary>
@@ -61193,7 +61277,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81862">
+<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81880">
<summary>
Do not audit attempts to send ssdp_server packets.
</summary>
@@ -61204,7 +61288,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssdp_server_packets" lineno="81881">
+<interface name="corenet_receive_ssdp_server_packets" lineno="81899">
<summary>
Receive ssdp_server packets.
</summary>
@@ -61215,7 +61299,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81900">
+<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81918">
<summary>
Do not audit attempts to receive ssdp_server packets.
</summary>
@@ -61226,7 +61310,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81919">
+<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81937">
<summary>
Send and receive ssdp_server packets.
</summary>
@@ -61237,7 +61321,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81935">
+<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81953">
<summary>
Do not audit attempts to send and receive ssdp_server packets.
</summary>
@@ -61248,7 +61332,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssdp_server_packets" lineno="81950">
+<interface name="corenet_relabelto_ssdp_server_packets" lineno="81968">
<summary>
Relabel packets to ssdp_server the packet type.
</summary>
@@ -61258,7 +61342,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81972">
+<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81990">
<summary>
Send and receive TCP traffic on the ssh port.
</summary>
@@ -61269,7 +61353,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ssh_port" lineno="81987">
+<interface name="corenet_udp_send_ssh_port" lineno="82005">
<summary>
Send UDP traffic on the ssh port.
</summary>
@@ -61280,7 +61364,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="82002">
+<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="82020">
<summary>
Do not audit attempts to send UDP traffic on the ssh port.
</summary>
@@ -61291,7 +61375,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ssh_port" lineno="82017">
+<interface name="corenet_udp_receive_ssh_port" lineno="82035">
<summary>
Receive UDP traffic on the ssh port.
</summary>
@@ -61302,7 +61386,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="82032">
+<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="82050">
<summary>
Do not audit attempts to receive UDP traffic on the ssh port.
</summary>
@@ -61313,7 +61397,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ssh_port" lineno="82047">
+<interface name="corenet_udp_sendrecv_ssh_port" lineno="82065">
<summary>
Send and receive UDP traffic on the ssh port.
</summary>
@@ -61324,7 +61408,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="82063">
+<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="82081">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ssh port.
@@ -61336,7 +61420,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ssh_port" lineno="82078">
+<interface name="corenet_tcp_bind_ssh_port" lineno="82096">
<summary>
Bind TCP sockets to the ssh port.
</summary>
@@ -61347,7 +61431,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ssh_port" lineno="82098">
+<interface name="corenet_udp_bind_ssh_port" lineno="82116">
<summary>
Bind UDP sockets to the ssh port.
</summary>
@@ -61358,7 +61442,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ssh_port" lineno="82117">
+<interface name="corenet_tcp_connect_ssh_port" lineno="82135">
<summary>
Make a TCP connection to the ssh port.
</summary>
@@ -61368,7 +61452,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssh_client_packets" lineno="82137">
+<interface name="corenet_send_ssh_client_packets" lineno="82155">
<summary>
Send ssh_client packets.
</summary>
@@ -61379,7 +61463,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="82156">
+<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="82174">
<summary>
Do not audit attempts to send ssh_client packets.
</summary>
@@ -61390,7 +61474,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssh_client_packets" lineno="82175">
+<interface name="corenet_receive_ssh_client_packets" lineno="82193">
<summary>
Receive ssh_client packets.
</summary>
@@ -61401,7 +61485,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="82194">
+<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="82212">
<summary>
Do not audit attempts to receive ssh_client packets.
</summary>
@@ -61412,7 +61496,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssh_client_packets" lineno="82213">
+<interface name="corenet_sendrecv_ssh_client_packets" lineno="82231">
<summary>
Send and receive ssh_client packets.
</summary>
@@ -61423,7 +61507,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="82229">
+<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="82247">
<summary>
Do not audit attempts to send and receive ssh_client packets.
</summary>
@@ -61434,7 +61518,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssh_client_packets" lineno="82244">
+<interface name="corenet_relabelto_ssh_client_packets" lineno="82262">
<summary>
Relabel packets to ssh_client the packet type.
</summary>
@@ -61444,7 +61528,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssh_server_packets" lineno="82264">
+<interface name="corenet_send_ssh_server_packets" lineno="82282">
<summary>
Send ssh_server packets.
</summary>
@@ -61455,7 +61539,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="82283">
+<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="82301">
<summary>
Do not audit attempts to send ssh_server packets.
</summary>
@@ -61466,7 +61550,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssh_server_packets" lineno="82302">
+<interface name="corenet_receive_ssh_server_packets" lineno="82320">
<summary>
Receive ssh_server packets.
</summary>
@@ -61477,7 +61561,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="82321">
+<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="82339">
<summary>
Do not audit attempts to receive ssh_server packets.
</summary>
@@ -61488,7 +61572,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssh_server_packets" lineno="82340">
+<interface name="corenet_sendrecv_ssh_server_packets" lineno="82358">
<summary>
Send and receive ssh_server packets.
</summary>
@@ -61499,7 +61583,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="82356">
+<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="82374">
<summary>
Do not audit attempts to send and receive ssh_server packets.
</summary>
@@ -61510,7 +61594,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssh_server_packets" lineno="82371">
+<interface name="corenet_relabelto_ssh_server_packets" lineno="82389">
<summary>
Relabel packets to ssh_server the packet type.
</summary>
@@ -61520,7 +61604,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="82393">
+<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="82411">
<summary>
Send and receive TCP traffic on the stunnel port.
</summary>
@@ -61531,7 +61615,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_stunnel_port" lineno="82408">
+<interface name="corenet_udp_send_stunnel_port" lineno="82426">
<summary>
Send UDP traffic on the stunnel port.
</summary>
@@ -61542,7 +61626,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82423">
+<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82441">
<summary>
Do not audit attempts to send UDP traffic on the stunnel port.
</summary>
@@ -61553,7 +61637,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_stunnel_port" lineno="82438">
+<interface name="corenet_udp_receive_stunnel_port" lineno="82456">
<summary>
Receive UDP traffic on the stunnel port.
</summary>
@@ -61564,7 +61648,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82453">
+<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82471">
<summary>
Do not audit attempts to receive UDP traffic on the stunnel port.
</summary>
@@ -61575,7 +61659,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82468">
+<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82486">
<summary>
Send and receive UDP traffic on the stunnel port.
</summary>
@@ -61586,7 +61670,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82484">
+<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82502">
<summary>
Do not audit attempts to send and receive
UDP traffic on the stunnel port.
@@ -61598,7 +61682,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_stunnel_port" lineno="82499">
+<interface name="corenet_tcp_bind_stunnel_port" lineno="82517">
<summary>
Bind TCP sockets to the stunnel port.
</summary>
@@ -61609,7 +61693,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_stunnel_port" lineno="82519">
+<interface name="corenet_udp_bind_stunnel_port" lineno="82537">
<summary>
Bind UDP sockets to the stunnel port.
</summary>
@@ -61620,7 +61704,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_stunnel_port" lineno="82538">
+<interface name="corenet_tcp_connect_stunnel_port" lineno="82556">
<summary>
Make a TCP connection to the stunnel port.
</summary>
@@ -61630,7 +61714,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_stunnel_client_packets" lineno="82558">
+<interface name="corenet_send_stunnel_client_packets" lineno="82576">
<summary>
Send stunnel_client packets.
</summary>
@@ -61641,7 +61725,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82577">
+<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82595">
<summary>
Do not audit attempts to send stunnel_client packets.
</summary>
@@ -61652,7 +61736,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_stunnel_client_packets" lineno="82596">
+<interface name="corenet_receive_stunnel_client_packets" lineno="82614">
<summary>
Receive stunnel_client packets.
</summary>
@@ -61663,7 +61747,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82615">
+<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82633">
<summary>
Do not audit attempts to receive stunnel_client packets.
</summary>
@@ -61674,7 +61758,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82634">
+<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82652">
<summary>
Send and receive stunnel_client packets.
</summary>
@@ -61685,7 +61769,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82650">
+<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82668">
<summary>
Do not audit attempts to send and receive stunnel_client packets.
</summary>
@@ -61696,7 +61780,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_stunnel_client_packets" lineno="82665">
+<interface name="corenet_relabelto_stunnel_client_packets" lineno="82683">
<summary>
Relabel packets to stunnel_client the packet type.
</summary>
@@ -61706,7 +61790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_stunnel_server_packets" lineno="82685">
+<interface name="corenet_send_stunnel_server_packets" lineno="82703">
<summary>
Send stunnel_server packets.
</summary>
@@ -61717,7 +61801,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82704">
+<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82722">
<summary>
Do not audit attempts to send stunnel_server packets.
</summary>
@@ -61728,7 +61812,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_stunnel_server_packets" lineno="82723">
+<interface name="corenet_receive_stunnel_server_packets" lineno="82741">
<summary>
Receive stunnel_server packets.
</summary>
@@ -61739,7 +61823,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82742">
+<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82760">
<summary>
Do not audit attempts to receive stunnel_server packets.
</summary>
@@ -61750,7 +61834,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82761">
+<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82779">
<summary>
Send and receive stunnel_server packets.
</summary>
@@ -61761,7 +61845,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82777">
+<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82795">
<summary>
Do not audit attempts to send and receive stunnel_server packets.
</summary>
@@ -61772,7 +61856,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_stunnel_server_packets" lineno="82792">
+<interface name="corenet_relabelto_stunnel_server_packets" lineno="82810">
<summary>
Relabel packets to stunnel_server the packet type.
</summary>
@@ -61782,7 +61866,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_svn_port" lineno="82814">
+<interface name="corenet_tcp_sendrecv_svn_port" lineno="82832">
<summary>
Send and receive TCP traffic on the svn port.
</summary>
@@ -61793,7 +61877,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_svn_port" lineno="82829">
+<interface name="corenet_udp_send_svn_port" lineno="82847">
<summary>
Send UDP traffic on the svn port.
</summary>
@@ -61804,7 +61888,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82844">
+<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82862">
<summary>
Do not audit attempts to send UDP traffic on the svn port.
</summary>
@@ -61815,7 +61899,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_svn_port" lineno="82859">
+<interface name="corenet_udp_receive_svn_port" lineno="82877">
<summary>
Receive UDP traffic on the svn port.
</summary>
@@ -61826,7 +61910,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82874">
+<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82892">
<summary>
Do not audit attempts to receive UDP traffic on the svn port.
</summary>
@@ -61837,7 +61921,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_svn_port" lineno="82889">
+<interface name="corenet_udp_sendrecv_svn_port" lineno="82907">
<summary>
Send and receive UDP traffic on the svn port.
</summary>
@@ -61848,7 +61932,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82905">
+<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82923">
<summary>
Do not audit attempts to send and receive
UDP traffic on the svn port.
@@ -61860,7 +61944,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_svn_port" lineno="82920">
+<interface name="corenet_tcp_bind_svn_port" lineno="82938">
<summary>
Bind TCP sockets to the svn port.
</summary>
@@ -61871,7 +61955,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_svn_port" lineno="82940">
+<interface name="corenet_udp_bind_svn_port" lineno="82958">
<summary>
Bind UDP sockets to the svn port.
</summary>
@@ -61882,7 +61966,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_svn_port" lineno="82959">
+<interface name="corenet_tcp_connect_svn_port" lineno="82977">
<summary>
Make a TCP connection to the svn port.
</summary>
@@ -61892,7 +61976,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svn_client_packets" lineno="82979">
+<interface name="corenet_send_svn_client_packets" lineno="82997">
<summary>
Send svn_client packets.
</summary>
@@ -61903,7 +61987,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svn_client_packets" lineno="82998">
+<interface name="corenet_dontaudit_send_svn_client_packets" lineno="83016">
<summary>
Do not audit attempts to send svn_client packets.
</summary>
@@ -61914,7 +61998,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svn_client_packets" lineno="83017">
+<interface name="corenet_receive_svn_client_packets" lineno="83035">
<summary>
Receive svn_client packets.
</summary>
@@ -61925,7 +62009,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="83036">
+<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="83054">
<summary>
Do not audit attempts to receive svn_client packets.
</summary>
@@ -61936,7 +62020,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svn_client_packets" lineno="83055">
+<interface name="corenet_sendrecv_svn_client_packets" lineno="83073">
<summary>
Send and receive svn_client packets.
</summary>
@@ -61947,7 +62031,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="83071">
+<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="83089">
<summary>
Do not audit attempts to send and receive svn_client packets.
</summary>
@@ -61958,7 +62042,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svn_client_packets" lineno="83086">
+<interface name="corenet_relabelto_svn_client_packets" lineno="83104">
<summary>
Relabel packets to svn_client the packet type.
</summary>
@@ -61968,7 +62052,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svn_server_packets" lineno="83106">
+<interface name="corenet_send_svn_server_packets" lineno="83124">
<summary>
Send svn_server packets.
</summary>
@@ -61979,7 +62063,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svn_server_packets" lineno="83125">
+<interface name="corenet_dontaudit_send_svn_server_packets" lineno="83143">
<summary>
Do not audit attempts to send svn_server packets.
</summary>
@@ -61990,7 +62074,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svn_server_packets" lineno="83144">
+<interface name="corenet_receive_svn_server_packets" lineno="83162">
<summary>
Receive svn_server packets.
</summary>
@@ -62001,7 +62085,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="83163">
+<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="83181">
<summary>
Do not audit attempts to receive svn_server packets.
</summary>
@@ -62012,7 +62096,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svn_server_packets" lineno="83182">
+<interface name="corenet_sendrecv_svn_server_packets" lineno="83200">
<summary>
Send and receive svn_server packets.
</summary>
@@ -62023,7 +62107,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="83198">
+<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="83216">
<summary>
Do not audit attempts to send and receive svn_server packets.
</summary>
@@ -62034,7 +62118,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svn_server_packets" lineno="83213">
+<interface name="corenet_relabelto_svn_server_packets" lineno="83231">
<summary>
Relabel packets to svn_server the packet type.
</summary>
@@ -62044,7 +62128,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="83235">
+<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="83253">
<summary>
Send and receive TCP traffic on the svrloc port.
</summary>
@@ -62055,7 +62139,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_svrloc_port" lineno="83250">
+<interface name="corenet_udp_send_svrloc_port" lineno="83268">
<summary>
Send UDP traffic on the svrloc port.
</summary>
@@ -62066,7 +62150,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="83265">
+<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="83283">
<summary>
Do not audit attempts to send UDP traffic on the svrloc port.
</summary>
@@ -62077,7 +62161,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_svrloc_port" lineno="83280">
+<interface name="corenet_udp_receive_svrloc_port" lineno="83298">
<summary>
Receive UDP traffic on the svrloc port.
</summary>
@@ -62088,7 +62172,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="83295">
+<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="83313">
<summary>
Do not audit attempts to receive UDP traffic on the svrloc port.
</summary>
@@ -62099,7 +62183,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_svrloc_port" lineno="83310">
+<interface name="corenet_udp_sendrecv_svrloc_port" lineno="83328">
<summary>
Send and receive UDP traffic on the svrloc port.
</summary>
@@ -62110,7 +62194,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="83326">
+<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="83344">
<summary>
Do not audit attempts to send and receive
UDP traffic on the svrloc port.
@@ -62122,7 +62206,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_svrloc_port" lineno="83341">
+<interface name="corenet_tcp_bind_svrloc_port" lineno="83359">
<summary>
Bind TCP sockets to the svrloc port.
</summary>
@@ -62133,7 +62217,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_svrloc_port" lineno="83361">
+<interface name="corenet_udp_bind_svrloc_port" lineno="83379">
<summary>
Bind UDP sockets to the svrloc port.
</summary>
@@ -62144,7 +62228,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_svrloc_port" lineno="83380">
+<interface name="corenet_tcp_connect_svrloc_port" lineno="83398">
<summary>
Make a TCP connection to the svrloc port.
</summary>
@@ -62154,7 +62238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svrloc_client_packets" lineno="83400">
+<interface name="corenet_send_svrloc_client_packets" lineno="83418">
<summary>
Send svrloc_client packets.
</summary>
@@ -62165,7 +62249,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="83419">
+<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="83437">
<summary>
Do not audit attempts to send svrloc_client packets.
</summary>
@@ -62176,7 +62260,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svrloc_client_packets" lineno="83438">
+<interface name="corenet_receive_svrloc_client_packets" lineno="83456">
<summary>
Receive svrloc_client packets.
</summary>
@@ -62187,7 +62271,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83457">
+<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83475">
<summary>
Do not audit attempts to receive svrloc_client packets.
</summary>
@@ -62198,7 +62282,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83476">
+<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83494">
<summary>
Send and receive svrloc_client packets.
</summary>
@@ -62209,7 +62293,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83492">
+<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83510">
<summary>
Do not audit attempts to send and receive svrloc_client packets.
</summary>
@@ -62220,7 +62304,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svrloc_client_packets" lineno="83507">
+<interface name="corenet_relabelto_svrloc_client_packets" lineno="83525">
<summary>
Relabel packets to svrloc_client the packet type.
</summary>
@@ -62230,7 +62314,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svrloc_server_packets" lineno="83527">
+<interface name="corenet_send_svrloc_server_packets" lineno="83545">
<summary>
Send svrloc_server packets.
</summary>
@@ -62241,7 +62325,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83546">
+<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83564">
<summary>
Do not audit attempts to send svrloc_server packets.
</summary>
@@ -62252,7 +62336,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svrloc_server_packets" lineno="83565">
+<interface name="corenet_receive_svrloc_server_packets" lineno="83583">
<summary>
Receive svrloc_server packets.
</summary>
@@ -62263,7 +62347,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83584">
+<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83602">
<summary>
Do not audit attempts to receive svrloc_server packets.
</summary>
@@ -62274,7 +62358,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83603">
+<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83621">
<summary>
Send and receive svrloc_server packets.
</summary>
@@ -62285,7 +62369,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83619">
+<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83637">
<summary>
Do not audit attempts to send and receive svrloc_server packets.
</summary>
@@ -62296,7 +62380,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svrloc_server_packets" lineno="83634">
+<interface name="corenet_relabelto_svrloc_server_packets" lineno="83652">
<summary>
Relabel packets to svrloc_server the packet type.
</summary>
@@ -62306,7 +62390,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_swat_port" lineno="83656">
+<interface name="corenet_tcp_sendrecv_swat_port" lineno="83674">
<summary>
Send and receive TCP traffic on the swat port.
</summary>
@@ -62317,7 +62401,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_swat_port" lineno="83671">
+<interface name="corenet_udp_send_swat_port" lineno="83689">
<summary>
Send UDP traffic on the swat port.
</summary>
@@ -62328,7 +62412,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83686">
+<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83704">
<summary>
Do not audit attempts to send UDP traffic on the swat port.
</summary>
@@ -62339,7 +62423,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_swat_port" lineno="83701">
+<interface name="corenet_udp_receive_swat_port" lineno="83719">
<summary>
Receive UDP traffic on the swat port.
</summary>
@@ -62350,7 +62434,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83716">
+<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83734">
<summary>
Do not audit attempts to receive UDP traffic on the swat port.
</summary>
@@ -62361,7 +62445,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_swat_port" lineno="83731">
+<interface name="corenet_udp_sendrecv_swat_port" lineno="83749">
<summary>
Send and receive UDP traffic on the swat port.
</summary>
@@ -62372,7 +62456,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83747">
+<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83765">
<summary>
Do not audit attempts to send and receive
UDP traffic on the swat port.
@@ -62384,7 +62468,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_swat_port" lineno="83762">
+<interface name="corenet_tcp_bind_swat_port" lineno="83780">
<summary>
Bind TCP sockets to the swat port.
</summary>
@@ -62395,7 +62479,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_swat_port" lineno="83782">
+<interface name="corenet_udp_bind_swat_port" lineno="83800">
<summary>
Bind UDP sockets to the swat port.
</summary>
@@ -62406,7 +62490,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_swat_port" lineno="83801">
+<interface name="corenet_tcp_connect_swat_port" lineno="83819">
<summary>
Make a TCP connection to the swat port.
</summary>
@@ -62416,7 +62500,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_swat_client_packets" lineno="83821">
+<interface name="corenet_send_swat_client_packets" lineno="83839">
<summary>
Send swat_client packets.
</summary>
@@ -62427,7 +62511,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83840">
+<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83858">
<summary>
Do not audit attempts to send swat_client packets.
</summary>
@@ -62438,7 +62522,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_swat_client_packets" lineno="83859">
+<interface name="corenet_receive_swat_client_packets" lineno="83877">
<summary>
Receive swat_client packets.
</summary>
@@ -62449,7 +62533,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83878">
+<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83896">
<summary>
Do not audit attempts to receive swat_client packets.
</summary>
@@ -62460,7 +62544,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_swat_client_packets" lineno="83897">
+<interface name="corenet_sendrecv_swat_client_packets" lineno="83915">
<summary>
Send and receive swat_client packets.
</summary>
@@ -62471,7 +62555,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83913">
+<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83931">
<summary>
Do not audit attempts to send and receive swat_client packets.
</summary>
@@ -62482,7 +62566,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_swat_client_packets" lineno="83928">
+<interface name="corenet_relabelto_swat_client_packets" lineno="83946">
<summary>
Relabel packets to swat_client the packet type.
</summary>
@@ -62492,7 +62576,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_swat_server_packets" lineno="83948">
+<interface name="corenet_send_swat_server_packets" lineno="83966">
<summary>
Send swat_server packets.
</summary>
@@ -62503,7 +62587,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83967">
+<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83985">
<summary>
Do not audit attempts to send swat_server packets.
</summary>
@@ -62514,7 +62598,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_swat_server_packets" lineno="83986">
+<interface name="corenet_receive_swat_server_packets" lineno="84004">
<summary>
Receive swat_server packets.
</summary>
@@ -62525,7 +62609,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="84005">
+<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="84023">
<summary>
Do not audit attempts to receive swat_server packets.
</summary>
@@ -62536,7 +62620,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_swat_server_packets" lineno="84024">
+<interface name="corenet_sendrecv_swat_server_packets" lineno="84042">
<summary>
Send and receive swat_server packets.
</summary>
@@ -62547,7 +62631,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="84040">
+<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="84058">
<summary>
Do not audit attempts to send and receive swat_server packets.
</summary>
@@ -62558,7 +62642,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_swat_server_packets" lineno="84055">
+<interface name="corenet_relabelto_swat_server_packets" lineno="84073">
<summary>
Relabel packets to swat_server the packet type.
</summary>
@@ -62568,7 +62652,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="84077">
+<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="84095">
<summary>
Send and receive TCP traffic on the syncthing port.
</summary>
@@ -62579,7 +62663,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_syncthing_port" lineno="84092">
+<interface name="corenet_udp_send_syncthing_port" lineno="84110">
<summary>
Send UDP traffic on the syncthing port.
</summary>
@@ -62590,7 +62674,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="84107">
+<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="84125">
<summary>
Do not audit attempts to send UDP traffic on the syncthing port.
</summary>
@@ -62601,7 +62685,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_syncthing_port" lineno="84122">
+<interface name="corenet_udp_receive_syncthing_port" lineno="84140">
<summary>
Receive UDP traffic on the syncthing port.
</summary>
@@ -62612,7 +62696,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="84137">
+<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="84155">
<summary>
Do not audit attempts to receive UDP traffic on the syncthing port.
</summary>
@@ -62623,7 +62707,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_syncthing_port" lineno="84152">
+<interface name="corenet_udp_sendrecv_syncthing_port" lineno="84170">
<summary>
Send and receive UDP traffic on the syncthing port.
</summary>
@@ -62634,7 +62718,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="84168">
+<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="84186">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syncthing port.
@@ -62646,7 +62730,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_syncthing_port" lineno="84183">
+<interface name="corenet_tcp_bind_syncthing_port" lineno="84201">
<summary>
Bind TCP sockets to the syncthing port.
</summary>
@@ -62657,7 +62741,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syncthing_port" lineno="84203">
+<interface name="corenet_udp_bind_syncthing_port" lineno="84221">
<summary>
Bind UDP sockets to the syncthing port.
</summary>
@@ -62668,7 +62752,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syncthing_port" lineno="84222">
+<interface name="corenet_tcp_connect_syncthing_port" lineno="84240">
<summary>
Make a TCP connection to the syncthing port.
</summary>
@@ -62678,7 +62762,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_client_packets" lineno="84242">
+<interface name="corenet_send_syncthing_client_packets" lineno="84260">
<summary>
Send syncthing_client packets.
</summary>
@@ -62689,7 +62773,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="84261">
+<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="84279">
<summary>
Do not audit attempts to send syncthing_client packets.
</summary>
@@ -62700,7 +62784,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_client_packets" lineno="84280">
+<interface name="corenet_receive_syncthing_client_packets" lineno="84298">
<summary>
Receive syncthing_client packets.
</summary>
@@ -62711,7 +62795,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="84299">
+<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="84317">
<summary>
Do not audit attempts to receive syncthing_client packets.
</summary>
@@ -62722,7 +62806,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_client_packets" lineno="84318">
+<interface name="corenet_sendrecv_syncthing_client_packets" lineno="84336">
<summary>
Send and receive syncthing_client packets.
</summary>
@@ -62733,7 +62817,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="84334">
+<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="84352">
<summary>
Do not audit attempts to send and receive syncthing_client packets.
</summary>
@@ -62744,7 +62828,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_client_packets" lineno="84349">
+<interface name="corenet_relabelto_syncthing_client_packets" lineno="84367">
<summary>
Relabel packets to syncthing_client the packet type.
</summary>
@@ -62754,7 +62838,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_server_packets" lineno="84369">
+<interface name="corenet_send_syncthing_server_packets" lineno="84387">
<summary>
Send syncthing_server packets.
</summary>
@@ -62765,7 +62849,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="84388">
+<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="84406">
<summary>
Do not audit attempts to send syncthing_server packets.
</summary>
@@ -62776,7 +62860,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_server_packets" lineno="84407">
+<interface name="corenet_receive_syncthing_server_packets" lineno="84425">
<summary>
Receive syncthing_server packets.
</summary>
@@ -62787,7 +62871,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84426">
+<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84444">
<summary>
Do not audit attempts to receive syncthing_server packets.
</summary>
@@ -62798,7 +62882,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84445">
+<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84463">
<summary>
Send and receive syncthing_server packets.
</summary>
@@ -62809,7 +62893,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84461">
+<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84479">
<summary>
Do not audit attempts to send and receive syncthing_server packets.
</summary>
@@ -62820,7 +62904,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_server_packets" lineno="84476">
+<interface name="corenet_relabelto_syncthing_server_packets" lineno="84494">
<summary>
Relabel packets to syncthing_server the packet type.
</summary>
@@ -62830,7 +62914,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84498">
+<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84516">
<summary>
Send and receive TCP traffic on the syncthing_admin port.
</summary>
@@ -62841,7 +62925,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_syncthing_admin_port" lineno="84513">
+<interface name="corenet_udp_send_syncthing_admin_port" lineno="84531">
<summary>
Send UDP traffic on the syncthing_admin port.
</summary>
@@ -62852,7 +62936,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84528">
+<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84546">
<summary>
Do not audit attempts to send UDP traffic on the syncthing_admin port.
</summary>
@@ -62863,7 +62947,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84543">
+<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84561">
<summary>
Receive UDP traffic on the syncthing_admin port.
</summary>
@@ -62874,7 +62958,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84558">
+<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84576">
<summary>
Do not audit attempts to receive UDP traffic on the syncthing_admin port.
</summary>
@@ -62885,7 +62969,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84573">
+<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84591">
<summary>
Send and receive UDP traffic on the syncthing_admin port.
</summary>
@@ -62896,7 +62980,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84589">
+<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84607">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syncthing_admin port.
@@ -62908,7 +62992,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84604">
+<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84622">
<summary>
Bind TCP sockets to the syncthing_admin port.
</summary>
@@ -62919,7 +63003,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84624">
+<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84642">
<summary>
Bind UDP sockets to the syncthing_admin port.
</summary>
@@ -62930,7 +63014,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84643">
+<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84661">
<summary>
Make a TCP connection to the syncthing_admin port.
</summary>
@@ -62940,7 +63024,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_admin_client_packets" lineno="84663">
+<interface name="corenet_send_syncthing_admin_client_packets" lineno="84681">
<summary>
Send syncthing_admin_client packets.
</summary>
@@ -62951,7 +63035,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84682">
+<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84700">
<summary>
Do not audit attempts to send syncthing_admin_client packets.
</summary>
@@ -62962,7 +63046,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84701">
+<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84719">
<summary>
Receive syncthing_admin_client packets.
</summary>
@@ -62973,7 +63057,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84720">
+<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84738">
<summary>
Do not audit attempts to receive syncthing_admin_client packets.
</summary>
@@ -62984,7 +63068,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84739">
+<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84757">
<summary>
Send and receive syncthing_admin_client packets.
</summary>
@@ -62995,7 +63079,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84755">
+<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84773">
<summary>
Do not audit attempts to send and receive syncthing_admin_client packets.
</summary>
@@ -63006,7 +63090,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84770">
+<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84788">
<summary>
Relabel packets to syncthing_admin_client the packet type.
</summary>
@@ -63016,7 +63100,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_admin_server_packets" lineno="84790">
+<interface name="corenet_send_syncthing_admin_server_packets" lineno="84808">
<summary>
Send syncthing_admin_server packets.
</summary>
@@ -63027,7 +63111,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84809">
+<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84827">
<summary>
Do not audit attempts to send syncthing_admin_server packets.
</summary>
@@ -63038,7 +63122,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84828">
+<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84846">
<summary>
Receive syncthing_admin_server packets.
</summary>
@@ -63049,7 +63133,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84847">
+<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84865">
<summary>
Do not audit attempts to receive syncthing_admin_server packets.
</summary>
@@ -63060,7 +63144,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84866">
+<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84884">
<summary>
Send and receive syncthing_admin_server packets.
</summary>
@@ -63071,7 +63155,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84882">
+<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84900">
<summary>
Do not audit attempts to send and receive syncthing_admin_server packets.
</summary>
@@ -63082,7 +63166,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84897">
+<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84915">
<summary>
Relabel packets to syncthing_admin_server the packet type.
</summary>
@@ -63092,7 +63176,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84919">
+<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84937">
<summary>
Send and receive TCP traffic on the syncthing_discovery port.
</summary>
@@ -63103,7 +63187,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84934">
+<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84952">
<summary>
Send UDP traffic on the syncthing_discovery port.
</summary>
@@ -63114,7 +63198,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84949">
+<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84967">
<summary>
Do not audit attempts to send UDP traffic on the syncthing_discovery port.
</summary>
@@ -63125,7 +63209,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84964">
+<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84982">
<summary>
Receive UDP traffic on the syncthing_discovery port.
</summary>
@@ -63136,7 +63220,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84979">
+<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84997">
<summary>
Do not audit attempts to receive UDP traffic on the syncthing_discovery port.
</summary>
@@ -63147,7 +63231,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="84994">
+<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="85012">
<summary>
Send and receive UDP traffic on the syncthing_discovery port.
</summary>
@@ -63158,7 +63242,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="85010">
+<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="85028">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syncthing_discovery port.
@@ -63170,7 +63254,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="85025">
+<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="85043">
<summary>
Bind TCP sockets to the syncthing_discovery port.
</summary>
@@ -63181,7 +63265,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="85045">
+<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="85063">
<summary>
Bind UDP sockets to the syncthing_discovery port.
</summary>
@@ -63192,7 +63276,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="85064">
+<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="85082">
<summary>
Make a TCP connection to the syncthing_discovery port.
</summary>
@@ -63202,7 +63286,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_discovery_client_packets" lineno="85084">
+<interface name="corenet_send_syncthing_discovery_client_packets" lineno="85102">
<summary>
Send syncthing_discovery_client packets.
</summary>
@@ -63213,7 +63297,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="85103">
+<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="85121">
<summary>
Do not audit attempts to send syncthing_discovery_client packets.
</summary>
@@ -63224,7 +63308,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="85122">
+<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="85140">
<summary>
Receive syncthing_discovery_client packets.
</summary>
@@ -63235,7 +63319,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="85141">
+<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="85159">
<summary>
Do not audit attempts to receive syncthing_discovery_client packets.
</summary>
@@ -63246,7 +63330,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="85160">
+<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="85178">
<summary>
Send and receive syncthing_discovery_client packets.
</summary>
@@ -63257,7 +63341,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="85176">
+<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="85194">
<summary>
Do not audit attempts to send and receive syncthing_discovery_client packets.
</summary>
@@ -63268,7 +63352,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="85191">
+<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="85209">
<summary>
Relabel packets to syncthing_discovery_client the packet type.
</summary>
@@ -63278,7 +63362,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_discovery_server_packets" lineno="85211">
+<interface name="corenet_send_syncthing_discovery_server_packets" lineno="85229">
<summary>
Send syncthing_discovery_server packets.
</summary>
@@ -63289,7 +63373,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="85230">
+<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="85248">
<summary>
Do not audit attempts to send syncthing_discovery_server packets.
</summary>
@@ -63300,7 +63384,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="85249">
+<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="85267">
<summary>
Receive syncthing_discovery_server packets.
</summary>
@@ -63311,7 +63395,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="85268">
+<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="85286">
<summary>
Do not audit attempts to receive syncthing_discovery_server packets.
</summary>
@@ -63322,7 +63406,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="85287">
+<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="85305">
<summary>
Send and receive syncthing_discovery_server packets.
</summary>
@@ -63333,7 +63417,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="85303">
+<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="85321">
<summary>
Do not audit attempts to send and receive syncthing_discovery_server packets.
</summary>
@@ -63344,7 +63428,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="85318">
+<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="85336">
<summary>
Relabel packets to syncthing_discovery_server the packet type.
</summary>
@@ -63354,7 +63438,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="85340">
+<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="85358">
<summary>
Send and receive TCP traffic on the sype_transport port.
</summary>
@@ -63365,7 +63449,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_sype_transport_port" lineno="85355">
+<interface name="corenet_udp_send_sype_transport_port" lineno="85373">
<summary>
Send UDP traffic on the sype_transport port.
</summary>
@@ -63376,7 +63460,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="85370">
+<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="85388">
<summary>
Do not audit attempts to send UDP traffic on the sype_transport port.
</summary>
@@ -63387,7 +63471,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_sype_transport_port" lineno="85385">
+<interface name="corenet_udp_receive_sype_transport_port" lineno="85403">
<summary>
Receive UDP traffic on the sype_transport port.
</summary>
@@ -63398,7 +63482,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="85400">
+<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="85418">
<summary>
Do not audit attempts to receive UDP traffic on the sype_transport port.
</summary>
@@ -63409,7 +63493,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="85415">
+<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="85433">
<summary>
Send and receive UDP traffic on the sype_transport port.
</summary>
@@ -63420,7 +63504,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85431">
+<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85449">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sype_transport port.
@@ -63432,7 +63516,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_sype_transport_port" lineno="85446">
+<interface name="corenet_tcp_bind_sype_transport_port" lineno="85464">
<summary>
Bind TCP sockets to the sype_transport port.
</summary>
@@ -63443,7 +63527,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sype_transport_port" lineno="85466">
+<interface name="corenet_udp_bind_sype_transport_port" lineno="85484">
<summary>
Bind UDP sockets to the sype_transport port.
</summary>
@@ -63454,7 +63538,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sype_transport_port" lineno="85485">
+<interface name="corenet_tcp_connect_sype_transport_port" lineno="85503">
<summary>
Make a TCP connection to the sype_transport port.
</summary>
@@ -63464,7 +63548,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sype_transport_client_packets" lineno="85505">
+<interface name="corenet_send_sype_transport_client_packets" lineno="85523">
<summary>
Send sype_transport_client packets.
</summary>
@@ -63475,7 +63559,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85524">
+<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85542">
<summary>
Do not audit attempts to send sype_transport_client packets.
</summary>
@@ -63486,7 +63570,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sype_transport_client_packets" lineno="85543">
+<interface name="corenet_receive_sype_transport_client_packets" lineno="85561">
<summary>
Receive sype_transport_client packets.
</summary>
@@ -63497,7 +63581,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85562">
+<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85580">
<summary>
Do not audit attempts to receive sype_transport_client packets.
</summary>
@@ -63508,7 +63592,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85581">
+<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85599">
<summary>
Send and receive sype_transport_client packets.
</summary>
@@ -63519,7 +63603,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85597">
+<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85615">
<summary>
Do not audit attempts to send and receive sype_transport_client packets.
</summary>
@@ -63530,7 +63614,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85612">
+<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85630">
<summary>
Relabel packets to sype_transport_client the packet type.
</summary>
@@ -63540,7 +63624,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sype_transport_server_packets" lineno="85632">
+<interface name="corenet_send_sype_transport_server_packets" lineno="85650">
<summary>
Send sype_transport_server packets.
</summary>
@@ -63551,7 +63635,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85651">
+<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85669">
<summary>
Do not audit attempts to send sype_transport_server packets.
</summary>
@@ -63562,7 +63646,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sype_transport_server_packets" lineno="85670">
+<interface name="corenet_receive_sype_transport_server_packets" lineno="85688">
<summary>
Receive sype_transport_server packets.
</summary>
@@ -63573,7 +63657,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85689">
+<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85707">
<summary>
Do not audit attempts to receive sype_transport_server packets.
</summary>
@@ -63584,7 +63668,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85708">
+<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85726">
<summary>
Send and receive sype_transport_server packets.
</summary>
@@ -63595,7 +63679,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85724">
+<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85742">
<summary>
Do not audit attempts to send and receive sype_transport_server packets.
</summary>
@@ -63606,7 +63690,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85739">
+<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85757">
<summary>
Relabel packets to sype_transport_server the packet type.
</summary>
@@ -63616,7 +63700,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85761">
+<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85779">
<summary>
Send and receive TCP traffic on the syslogd port.
</summary>
@@ -63627,7 +63711,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_syslogd_port" lineno="85776">
+<interface name="corenet_udp_send_syslogd_port" lineno="85794">
<summary>
Send UDP traffic on the syslogd port.
</summary>
@@ -63638,7 +63722,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85791">
+<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85809">
<summary>
Do not audit attempts to send UDP traffic on the syslogd port.
</summary>
@@ -63649,7 +63733,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_syslogd_port" lineno="85806">
+<interface name="corenet_udp_receive_syslogd_port" lineno="85824">
<summary>
Receive UDP traffic on the syslogd port.
</summary>
@@ -63660,7 +63744,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85821">
+<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85839">
<summary>
Do not audit attempts to receive UDP traffic on the syslogd port.
</summary>
@@ -63671,7 +63755,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85836">
+<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85854">
<summary>
Send and receive UDP traffic on the syslogd port.
</summary>
@@ -63682,7 +63766,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85852">
+<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85870">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syslogd port.
@@ -63694,7 +63778,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_syslogd_port" lineno="85867">
+<interface name="corenet_tcp_bind_syslogd_port" lineno="85885">
<summary>
Bind TCP sockets to the syslogd port.
</summary>
@@ -63705,7 +63789,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syslogd_port" lineno="85887">
+<interface name="corenet_udp_bind_syslogd_port" lineno="85905">
<summary>
Bind UDP sockets to the syslogd port.
</summary>
@@ -63716,7 +63800,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syslogd_port" lineno="85906">
+<interface name="corenet_tcp_connect_syslogd_port" lineno="85924">
<summary>
Make a TCP connection to the syslogd port.
</summary>
@@ -63726,7 +63810,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslogd_client_packets" lineno="85926">
+<interface name="corenet_send_syslogd_client_packets" lineno="85944">
<summary>
Send syslogd_client packets.
</summary>
@@ -63737,7 +63821,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85945">
+<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85963">
<summary>
Do not audit attempts to send syslogd_client packets.
</summary>
@@ -63748,7 +63832,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslogd_client_packets" lineno="85964">
+<interface name="corenet_receive_syslogd_client_packets" lineno="85982">
<summary>
Receive syslogd_client packets.
</summary>
@@ -63759,7 +63843,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="85983">
+<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="86001">
<summary>
Do not audit attempts to receive syslogd_client packets.
</summary>
@@ -63770,7 +63854,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslogd_client_packets" lineno="86002">
+<interface name="corenet_sendrecv_syslogd_client_packets" lineno="86020">
<summary>
Send and receive syslogd_client packets.
</summary>
@@ -63781,7 +63865,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="86018">
+<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="86036">
<summary>
Do not audit attempts to send and receive syslogd_client packets.
</summary>
@@ -63792,7 +63876,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslogd_client_packets" lineno="86033">
+<interface name="corenet_relabelto_syslogd_client_packets" lineno="86051">
<summary>
Relabel packets to syslogd_client the packet type.
</summary>
@@ -63802,7 +63886,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslogd_server_packets" lineno="86053">
+<interface name="corenet_send_syslogd_server_packets" lineno="86071">
<summary>
Send syslogd_server packets.
</summary>
@@ -63813,7 +63897,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="86072">
+<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="86090">
<summary>
Do not audit attempts to send syslogd_server packets.
</summary>
@@ -63824,7 +63908,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslogd_server_packets" lineno="86091">
+<interface name="corenet_receive_syslogd_server_packets" lineno="86109">
<summary>
Receive syslogd_server packets.
</summary>
@@ -63835,7 +63919,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="86110">
+<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="86128">
<summary>
Do not audit attempts to receive syslogd_server packets.
</summary>
@@ -63846,7 +63930,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslogd_server_packets" lineno="86129">
+<interface name="corenet_sendrecv_syslogd_server_packets" lineno="86147">
<summary>
Send and receive syslogd_server packets.
</summary>
@@ -63857,7 +63941,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="86145">
+<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="86163">
<summary>
Do not audit attempts to send and receive syslogd_server packets.
</summary>
@@ -63868,7 +63952,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslogd_server_packets" lineno="86160">
+<interface name="corenet_relabelto_syslogd_server_packets" lineno="86178">
<summary>
Relabel packets to syslogd_server the packet type.
</summary>
@@ -63878,7 +63962,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="86182">
+<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="86200">
<summary>
Send and receive TCP traffic on the syslog_tls port.
</summary>
@@ -63889,7 +63973,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_syslog_tls_port" lineno="86197">
+<interface name="corenet_udp_send_syslog_tls_port" lineno="86215">
<summary>
Send UDP traffic on the syslog_tls port.
</summary>
@@ -63900,7 +63984,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="86212">
+<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="86230">
<summary>
Do not audit attempts to send UDP traffic on the syslog_tls port.
</summary>
@@ -63911,7 +63995,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_syslog_tls_port" lineno="86227">
+<interface name="corenet_udp_receive_syslog_tls_port" lineno="86245">
<summary>
Receive UDP traffic on the syslog_tls port.
</summary>
@@ -63922,7 +64006,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="86242">
+<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="86260">
<summary>
Do not audit attempts to receive UDP traffic on the syslog_tls port.
</summary>
@@ -63933,7 +64017,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="86257">
+<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="86275">
<summary>
Send and receive UDP traffic on the syslog_tls port.
</summary>
@@ -63944,7 +64028,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="86273">
+<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="86291">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syslog_tls port.
@@ -63956,7 +64040,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_syslog_tls_port" lineno="86288">
+<interface name="corenet_tcp_bind_syslog_tls_port" lineno="86306">
<summary>
Bind TCP sockets to the syslog_tls port.
</summary>
@@ -63967,7 +64051,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syslog_tls_port" lineno="86308">
+<interface name="corenet_udp_bind_syslog_tls_port" lineno="86326">
<summary>
Bind UDP sockets to the syslog_tls port.
</summary>
@@ -63978,7 +64062,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syslog_tls_port" lineno="86327">
+<interface name="corenet_tcp_connect_syslog_tls_port" lineno="86345">
<summary>
Make a TCP connection to the syslog_tls port.
</summary>
@@ -63988,7 +64072,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslog_tls_client_packets" lineno="86347">
+<interface name="corenet_send_syslog_tls_client_packets" lineno="86365">
<summary>
Send syslog_tls_client packets.
</summary>
@@ -63999,7 +64083,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="86366">
+<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="86384">
<summary>
Do not audit attempts to send syslog_tls_client packets.
</summary>
@@ -64010,7 +64094,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslog_tls_client_packets" lineno="86385">
+<interface name="corenet_receive_syslog_tls_client_packets" lineno="86403">
<summary>
Receive syslog_tls_client packets.
</summary>
@@ -64021,7 +64105,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="86404">
+<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="86422">
<summary>
Do not audit attempts to receive syslog_tls_client packets.
</summary>
@@ -64032,7 +64116,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86423">
+<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86441">
<summary>
Send and receive syslog_tls_client packets.
</summary>
@@ -64043,7 +64127,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86439">
+<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86457">
<summary>
Do not audit attempts to send and receive syslog_tls_client packets.
</summary>
@@ -64054,7 +64138,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86454">
+<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86472">
<summary>
Relabel packets to syslog_tls_client the packet type.
</summary>
@@ -64064,7 +64148,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslog_tls_server_packets" lineno="86474">
+<interface name="corenet_send_syslog_tls_server_packets" lineno="86492">
<summary>
Send syslog_tls_server packets.
</summary>
@@ -64075,7 +64159,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86493">
+<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86511">
<summary>
Do not audit attempts to send syslog_tls_server packets.
</summary>
@@ -64086,7 +64170,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslog_tls_server_packets" lineno="86512">
+<interface name="corenet_receive_syslog_tls_server_packets" lineno="86530">
<summary>
Receive syslog_tls_server packets.
</summary>
@@ -64097,7 +64181,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86531">
+<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86549">
<summary>
Do not audit attempts to receive syslog_tls_server packets.
</summary>
@@ -64108,7 +64192,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86550">
+<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86568">
<summary>
Send and receive syslog_tls_server packets.
</summary>
@@ -64119,7 +64203,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86566">
+<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86584">
<summary>
Do not audit attempts to send and receive syslog_tls_server packets.
</summary>
@@ -64130,7 +64214,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86581">
+<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86599">
<summary>
Relabel packets to syslog_tls_server the packet type.
</summary>
@@ -64140,7 +64224,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86603">
+<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86621">
<summary>
Send and receive TCP traffic on the tcs port.
</summary>
@@ -64151,7 +64235,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_tcs_port" lineno="86618">
+<interface name="corenet_udp_send_tcs_port" lineno="86636">
<summary>
Send UDP traffic on the tcs port.
</summary>
@@ -64162,7 +64246,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86633">
+<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86651">
<summary>
Do not audit attempts to send UDP traffic on the tcs port.
</summary>
@@ -64173,7 +64257,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_tcs_port" lineno="86648">
+<interface name="corenet_udp_receive_tcs_port" lineno="86666">
<summary>
Receive UDP traffic on the tcs port.
</summary>
@@ -64184,7 +64268,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86663">
+<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86681">
<summary>
Do not audit attempts to receive UDP traffic on the tcs port.
</summary>
@@ -64195,7 +64279,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_tcs_port" lineno="86678">
+<interface name="corenet_udp_sendrecv_tcs_port" lineno="86696">
<summary>
Send and receive UDP traffic on the tcs port.
</summary>
@@ -64206,7 +64290,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86694">
+<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86712">
<summary>
Do not audit attempts to send and receive
UDP traffic on the tcs port.
@@ -64218,7 +64302,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_tcs_port" lineno="86709">
+<interface name="corenet_tcp_bind_tcs_port" lineno="86727">
<summary>
Bind TCP sockets to the tcs port.
</summary>
@@ -64229,7 +64313,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_tcs_port" lineno="86729">
+<interface name="corenet_udp_bind_tcs_port" lineno="86747">
<summary>
Bind UDP sockets to the tcs port.
</summary>
@@ -64240,7 +64324,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_tcs_port" lineno="86748">
+<interface name="corenet_tcp_connect_tcs_port" lineno="86766">
<summary>
Make a TCP connection to the tcs port.
</summary>
@@ -64250,7 +64334,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tcs_client_packets" lineno="86768">
+<interface name="corenet_send_tcs_client_packets" lineno="86786">
<summary>
Send tcs_client packets.
</summary>
@@ -64261,7 +64345,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86787">
+<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86805">
<summary>
Do not audit attempts to send tcs_client packets.
</summary>
@@ -64272,7 +64356,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tcs_client_packets" lineno="86806">
+<interface name="corenet_receive_tcs_client_packets" lineno="86824">
<summary>
Receive tcs_client packets.
</summary>
@@ -64283,7 +64367,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86825">
+<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86843">
<summary>
Do not audit attempts to receive tcs_client packets.
</summary>
@@ -64294,7 +64378,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tcs_client_packets" lineno="86844">
+<interface name="corenet_sendrecv_tcs_client_packets" lineno="86862">
<summary>
Send and receive tcs_client packets.
</summary>
@@ -64305,7 +64389,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86860">
+<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86878">
<summary>
Do not audit attempts to send and receive tcs_client packets.
</summary>
@@ -64316,7 +64400,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tcs_client_packets" lineno="86875">
+<interface name="corenet_relabelto_tcs_client_packets" lineno="86893">
<summary>
Relabel packets to tcs_client the packet type.
</summary>
@@ -64326,7 +64410,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tcs_server_packets" lineno="86895">
+<interface name="corenet_send_tcs_server_packets" lineno="86913">
<summary>
Send tcs_server packets.
</summary>
@@ -64337,7 +64421,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86914">
+<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86932">
<summary>
Do not audit attempts to send tcs_server packets.
</summary>
@@ -64348,7 +64432,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tcs_server_packets" lineno="86933">
+<interface name="corenet_receive_tcs_server_packets" lineno="86951">
<summary>
Receive tcs_server packets.
</summary>
@@ -64359,7 +64443,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86952">
+<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86970">
<summary>
Do not audit attempts to receive tcs_server packets.
</summary>
@@ -64370,7 +64454,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tcs_server_packets" lineno="86971">
+<interface name="corenet_sendrecv_tcs_server_packets" lineno="86989">
<summary>
Send and receive tcs_server packets.
</summary>
@@ -64381,7 +64465,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="86987">
+<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="87005">
<summary>
Do not audit attempts to send and receive tcs_server packets.
</summary>
@@ -64392,7 +64476,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tcs_server_packets" lineno="87002">
+<interface name="corenet_relabelto_tcs_server_packets" lineno="87020">
<summary>
Relabel packets to tcs_server the packet type.
</summary>
@@ -64402,7 +64486,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="87024">
+<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="87042">
<summary>
Send and receive TCP traffic on the telnetd port.
</summary>
@@ -64413,7 +64497,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_telnetd_port" lineno="87039">
+<interface name="corenet_udp_send_telnetd_port" lineno="87057">
<summary>
Send UDP traffic on the telnetd port.
</summary>
@@ -64424,7 +64508,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="87054">
+<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="87072">
<summary>
Do not audit attempts to send UDP traffic on the telnetd port.
</summary>
@@ -64435,7 +64519,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_telnetd_port" lineno="87069">
+<interface name="corenet_udp_receive_telnetd_port" lineno="87087">
<summary>
Receive UDP traffic on the telnetd port.
</summary>
@@ -64446,7 +64530,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="87084">
+<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="87102">
<summary>
Do not audit attempts to receive UDP traffic on the telnetd port.
</summary>
@@ -64457,7 +64541,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_telnetd_port" lineno="87099">
+<interface name="corenet_udp_sendrecv_telnetd_port" lineno="87117">
<summary>
Send and receive UDP traffic on the telnetd port.
</summary>
@@ -64468,7 +64552,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="87115">
+<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="87133">
<summary>
Do not audit attempts to send and receive
UDP traffic on the telnetd port.
@@ -64480,7 +64564,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_telnetd_port" lineno="87130">
+<interface name="corenet_tcp_bind_telnetd_port" lineno="87148">
<summary>
Bind TCP sockets to the telnetd port.
</summary>
@@ -64491,7 +64575,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_telnetd_port" lineno="87150">
+<interface name="corenet_udp_bind_telnetd_port" lineno="87168">
<summary>
Bind UDP sockets to the telnetd port.
</summary>
@@ -64502,7 +64586,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_telnetd_port" lineno="87169">
+<interface name="corenet_tcp_connect_telnetd_port" lineno="87187">
<summary>
Make a TCP connection to the telnetd port.
</summary>
@@ -64512,7 +64596,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_telnetd_client_packets" lineno="87189">
+<interface name="corenet_send_telnetd_client_packets" lineno="87207">
<summary>
Send telnetd_client packets.
</summary>
@@ -64523,7 +64607,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="87208">
+<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="87226">
<summary>
Do not audit attempts to send telnetd_client packets.
</summary>
@@ -64534,7 +64618,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_telnetd_client_packets" lineno="87227">
+<interface name="corenet_receive_telnetd_client_packets" lineno="87245">
<summary>
Receive telnetd_client packets.
</summary>
@@ -64545,7 +64629,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="87246">
+<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="87264">
<summary>
Do not audit attempts to receive telnetd_client packets.
</summary>
@@ -64556,7 +64640,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_telnetd_client_packets" lineno="87265">
+<interface name="corenet_sendrecv_telnetd_client_packets" lineno="87283">
<summary>
Send and receive telnetd_client packets.
</summary>
@@ -64567,7 +64651,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="87281">
+<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="87299">
<summary>
Do not audit attempts to send and receive telnetd_client packets.
</summary>
@@ -64578,7 +64662,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_telnetd_client_packets" lineno="87296">
+<interface name="corenet_relabelto_telnetd_client_packets" lineno="87314">
<summary>
Relabel packets to telnetd_client the packet type.
</summary>
@@ -64588,7 +64672,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_telnetd_server_packets" lineno="87316">
+<interface name="corenet_send_telnetd_server_packets" lineno="87334">
<summary>
Send telnetd_server packets.
</summary>
@@ -64599,7 +64683,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="87335">
+<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="87353">
<summary>
Do not audit attempts to send telnetd_server packets.
</summary>
@@ -64610,7 +64694,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_telnetd_server_packets" lineno="87354">
+<interface name="corenet_receive_telnetd_server_packets" lineno="87372">
<summary>
Receive telnetd_server packets.
</summary>
@@ -64621,7 +64705,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="87373">
+<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="87391">
<summary>
Do not audit attempts to receive telnetd_server packets.
</summary>
@@ -64632,7 +64716,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_telnetd_server_packets" lineno="87392">
+<interface name="corenet_sendrecv_telnetd_server_packets" lineno="87410">
<summary>
Send and receive telnetd_server packets.
</summary>
@@ -64643,7 +64727,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="87408">
+<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="87426">
<summary>
Do not audit attempts to send and receive telnetd_server packets.
</summary>
@@ -64654,7 +64738,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_telnetd_server_packets" lineno="87423">
+<interface name="corenet_relabelto_telnetd_server_packets" lineno="87441">
<summary>
Relabel packets to telnetd_server the packet type.
</summary>
@@ -64664,7 +64748,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87445">
+<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87463">
<summary>
Send and receive TCP traffic on the tftp port.
</summary>
@@ -64675,7 +64759,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_tftp_port" lineno="87460">
+<interface name="corenet_udp_send_tftp_port" lineno="87478">
<summary>
Send UDP traffic on the tftp port.
</summary>
@@ -64686,7 +64770,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87475">
+<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87493">
<summary>
Do not audit attempts to send UDP traffic on the tftp port.
</summary>
@@ -64697,7 +64781,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_tftp_port" lineno="87490">
+<interface name="corenet_udp_receive_tftp_port" lineno="87508">
<summary>
Receive UDP traffic on the tftp port.
</summary>
@@ -64708,7 +64792,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87505">
+<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87523">
<summary>
Do not audit attempts to receive UDP traffic on the tftp port.
</summary>
@@ -64719,7 +64803,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_tftp_port" lineno="87520">
+<interface name="corenet_udp_sendrecv_tftp_port" lineno="87538">
<summary>
Send and receive UDP traffic on the tftp port.
</summary>
@@ -64730,7 +64814,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87536">
+<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87554">
<summary>
Do not audit attempts to send and receive
UDP traffic on the tftp port.
@@ -64742,7 +64826,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_tftp_port" lineno="87551">
+<interface name="corenet_tcp_bind_tftp_port" lineno="87569">
<summary>
Bind TCP sockets to the tftp port.
</summary>
@@ -64753,7 +64837,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_tftp_port" lineno="87571">
+<interface name="corenet_udp_bind_tftp_port" lineno="87589">
<summary>
Bind UDP sockets to the tftp port.
</summary>
@@ -64764,7 +64848,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_tftp_port" lineno="87590">
+<interface name="corenet_tcp_connect_tftp_port" lineno="87608">
<summary>
Make a TCP connection to the tftp port.
</summary>
@@ -64774,7 +64858,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tftp_client_packets" lineno="87610">
+<interface name="corenet_send_tftp_client_packets" lineno="87628">
<summary>
Send tftp_client packets.
</summary>
@@ -64785,7 +64869,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87629">
+<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87647">
<summary>
Do not audit attempts to send tftp_client packets.
</summary>
@@ -64796,7 +64880,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tftp_client_packets" lineno="87648">
+<interface name="corenet_receive_tftp_client_packets" lineno="87666">
<summary>
Receive tftp_client packets.
</summary>
@@ -64807,7 +64891,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87667">
+<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87685">
<summary>
Do not audit attempts to receive tftp_client packets.
</summary>
@@ -64818,7 +64902,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tftp_client_packets" lineno="87686">
+<interface name="corenet_sendrecv_tftp_client_packets" lineno="87704">
<summary>
Send and receive tftp_client packets.
</summary>
@@ -64829,7 +64913,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87702">
+<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87720">
<summary>
Do not audit attempts to send and receive tftp_client packets.
</summary>
@@ -64840,7 +64924,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tftp_client_packets" lineno="87717">
+<interface name="corenet_relabelto_tftp_client_packets" lineno="87735">
<summary>
Relabel packets to tftp_client the packet type.
</summary>
@@ -64850,7 +64934,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tftp_server_packets" lineno="87737">
+<interface name="corenet_send_tftp_server_packets" lineno="87755">
<summary>
Send tftp_server packets.
</summary>
@@ -64861,7 +64945,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87756">
+<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87774">
<summary>
Do not audit attempts to send tftp_server packets.
</summary>
@@ -64872,7 +64956,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tftp_server_packets" lineno="87775">
+<interface name="corenet_receive_tftp_server_packets" lineno="87793">
<summary>
Receive tftp_server packets.
</summary>
@@ -64883,7 +64967,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87794">
+<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87812">
<summary>
Do not audit attempts to receive tftp_server packets.
</summary>
@@ -64894,7 +64978,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tftp_server_packets" lineno="87813">
+<interface name="corenet_sendrecv_tftp_server_packets" lineno="87831">
<summary>
Send and receive tftp_server packets.
</summary>
@@ -64905,7 +64989,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87829">
+<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87847">
<summary>
Do not audit attempts to send and receive tftp_server packets.
</summary>
@@ -64916,7 +65000,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tftp_server_packets" lineno="87844">
+<interface name="corenet_relabelto_tftp_server_packets" lineno="87862">
<summary>
Relabel packets to tftp_server the packet type.
</summary>
@@ -64926,7 +65010,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_tor_port" lineno="87866">
+<interface name="corenet_tcp_sendrecv_tor_port" lineno="87884">
<summary>
Send and receive TCP traffic on the tor port.
</summary>
@@ -64937,7 +65021,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_tor_port" lineno="87881">
+<interface name="corenet_udp_send_tor_port" lineno="87899">
<summary>
Send UDP traffic on the tor port.
</summary>
@@ -64948,7 +65032,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87896">
+<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87914">
<summary>
Do not audit attempts to send UDP traffic on the tor port.
</summary>
@@ -64959,7 +65043,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_tor_port" lineno="87911">
+<interface name="corenet_udp_receive_tor_port" lineno="87929">
<summary>
Receive UDP traffic on the tor port.
</summary>
@@ -64970,7 +65054,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87926">
+<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87944">
<summary>
Do not audit attempts to receive UDP traffic on the tor port.
</summary>
@@ -64981,7 +65065,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_tor_port" lineno="87941">
+<interface name="corenet_udp_sendrecv_tor_port" lineno="87959">
<summary>
Send and receive UDP traffic on the tor port.
</summary>
@@ -64992,7 +65076,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87957">
+<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87975">
<summary>
Do not audit attempts to send and receive
UDP traffic on the tor port.
@@ -65004,7 +65088,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_tor_port" lineno="87972">
+<interface name="corenet_tcp_bind_tor_port" lineno="87990">
<summary>
Bind TCP sockets to the tor port.
</summary>
@@ -65015,7 +65099,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_tor_port" lineno="87992">
+<interface name="corenet_udp_bind_tor_port" lineno="88010">
<summary>
Bind UDP sockets to the tor port.
</summary>
@@ -65026,7 +65110,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_tor_port" lineno="88011">
+<interface name="corenet_tcp_connect_tor_port" lineno="88029">
<summary>
Make a TCP connection to the tor port.
</summary>
@@ -65036,7 +65120,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tor_client_packets" lineno="88031">
+<interface name="corenet_send_tor_client_packets" lineno="88049">
<summary>
Send tor_client packets.
</summary>
@@ -65047,7 +65131,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tor_client_packets" lineno="88050">
+<interface name="corenet_dontaudit_send_tor_client_packets" lineno="88068">
<summary>
Do not audit attempts to send tor_client packets.
</summary>
@@ -65058,7 +65142,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tor_client_packets" lineno="88069">
+<interface name="corenet_receive_tor_client_packets" lineno="88087">
<summary>
Receive tor_client packets.
</summary>
@@ -65069,7 +65153,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="88088">
+<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="88106">
<summary>
Do not audit attempts to receive tor_client packets.
</summary>
@@ -65080,7 +65164,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tor_client_packets" lineno="88107">
+<interface name="corenet_sendrecv_tor_client_packets" lineno="88125">
<summary>
Send and receive tor_client packets.
</summary>
@@ -65091,7 +65175,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="88123">
+<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="88141">
<summary>
Do not audit attempts to send and receive tor_client packets.
</summary>
@@ -65102,7 +65186,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tor_client_packets" lineno="88138">
+<interface name="corenet_relabelto_tor_client_packets" lineno="88156">
<summary>
Relabel packets to tor_client the packet type.
</summary>
@@ -65112,7 +65196,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tor_server_packets" lineno="88158">
+<interface name="corenet_send_tor_server_packets" lineno="88176">
<summary>
Send tor_server packets.
</summary>
@@ -65123,7 +65207,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tor_server_packets" lineno="88177">
+<interface name="corenet_dontaudit_send_tor_server_packets" lineno="88195">
<summary>
Do not audit attempts to send tor_server packets.
</summary>
@@ -65134,7 +65218,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tor_server_packets" lineno="88196">
+<interface name="corenet_receive_tor_server_packets" lineno="88214">
<summary>
Receive tor_server packets.
</summary>
@@ -65145,7 +65229,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="88215">
+<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="88233">
<summary>
Do not audit attempts to receive tor_server packets.
</summary>
@@ -65156,7 +65240,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tor_server_packets" lineno="88234">
+<interface name="corenet_sendrecv_tor_server_packets" lineno="88252">
<summary>
Send and receive tor_server packets.
</summary>
@@ -65167,7 +65251,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="88250">
+<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="88268">
<summary>
Do not audit attempts to send and receive tor_server packets.
</summary>
@@ -65178,7 +65262,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tor_server_packets" lineno="88265">
+<interface name="corenet_relabelto_tor_server_packets" lineno="88283">
<summary>
Relabel packets to tor_server the packet type.
</summary>
@@ -65188,7 +65272,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="88287">
+<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="88305">
<summary>
Send and receive TCP traffic on the traceroute port.
</summary>
@@ -65199,7 +65283,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_traceroute_port" lineno="88302">
+<interface name="corenet_udp_send_traceroute_port" lineno="88320">
<summary>
Send UDP traffic on the traceroute port.
</summary>
@@ -65210,7 +65294,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="88317">
+<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="88335">
<summary>
Do not audit attempts to send UDP traffic on the traceroute port.
</summary>
@@ -65221,7 +65305,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_traceroute_port" lineno="88332">
+<interface name="corenet_udp_receive_traceroute_port" lineno="88350">
<summary>
Receive UDP traffic on the traceroute port.
</summary>
@@ -65232,7 +65316,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="88347">
+<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="88365">
<summary>
Do not audit attempts to receive UDP traffic on the traceroute port.
</summary>
@@ -65243,7 +65327,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_traceroute_port" lineno="88362">
+<interface name="corenet_udp_sendrecv_traceroute_port" lineno="88380">
<summary>
Send and receive UDP traffic on the traceroute port.
</summary>
@@ -65254,7 +65338,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="88378">
+<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="88396">
<summary>
Do not audit attempts to send and receive
UDP traffic on the traceroute port.
@@ -65266,7 +65350,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_traceroute_port" lineno="88393">
+<interface name="corenet_tcp_bind_traceroute_port" lineno="88411">
<summary>
Bind TCP sockets to the traceroute port.
</summary>
@@ -65277,7 +65361,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_traceroute_port" lineno="88413">
+<interface name="corenet_udp_bind_traceroute_port" lineno="88431">
<summary>
Bind UDP sockets to the traceroute port.
</summary>
@@ -65288,7 +65372,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_traceroute_port" lineno="88432">
+<interface name="corenet_tcp_connect_traceroute_port" lineno="88450">
<summary>
Make a TCP connection to the traceroute port.
</summary>
@@ -65298,7 +65382,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_traceroute_client_packets" lineno="88452">
+<interface name="corenet_send_traceroute_client_packets" lineno="88470">
<summary>
Send traceroute_client packets.
</summary>
@@ -65309,7 +65393,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88471">
+<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88489">
<summary>
Do not audit attempts to send traceroute_client packets.
</summary>
@@ -65320,7 +65404,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_traceroute_client_packets" lineno="88490">
+<interface name="corenet_receive_traceroute_client_packets" lineno="88508">
<summary>
Receive traceroute_client packets.
</summary>
@@ -65331,7 +65415,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88509">
+<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88527">
<summary>
Do not audit attempts to receive traceroute_client packets.
</summary>
@@ -65342,7 +65426,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88528">
+<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88546">
<summary>
Send and receive traceroute_client packets.
</summary>
@@ -65353,7 +65437,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88544">
+<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88562">
<summary>
Do not audit attempts to send and receive traceroute_client packets.
</summary>
@@ -65364,7 +65448,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_traceroute_client_packets" lineno="88559">
+<interface name="corenet_relabelto_traceroute_client_packets" lineno="88577">
<summary>
Relabel packets to traceroute_client the packet type.
</summary>
@@ -65374,7 +65458,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_traceroute_server_packets" lineno="88579">
+<interface name="corenet_send_traceroute_server_packets" lineno="88597">
<summary>
Send traceroute_server packets.
</summary>
@@ -65385,7 +65469,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88598">
+<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88616">
<summary>
Do not audit attempts to send traceroute_server packets.
</summary>
@@ -65396,7 +65480,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_traceroute_server_packets" lineno="88617">
+<interface name="corenet_receive_traceroute_server_packets" lineno="88635">
<summary>
Receive traceroute_server packets.
</summary>
@@ -65407,7 +65491,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88636">
+<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88654">
<summary>
Do not audit attempts to receive traceroute_server packets.
</summary>
@@ -65418,7 +65502,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88655">
+<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88673">
<summary>
Send and receive traceroute_server packets.
</summary>
@@ -65429,7 +65513,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88671">
+<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88689">
<summary>
Do not audit attempts to send and receive traceroute_server packets.
</summary>
@@ -65440,7 +65524,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_traceroute_server_packets" lineno="88686">
+<interface name="corenet_relabelto_traceroute_server_packets" lineno="88704">
<summary>
Relabel packets to traceroute_server the packet type.
</summary>
@@ -65450,7 +65534,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88708">
+<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88726">
<summary>
Send and receive TCP traffic on the transproxy port.
</summary>
@@ -65461,7 +65545,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_transproxy_port" lineno="88723">
+<interface name="corenet_udp_send_transproxy_port" lineno="88741">
<summary>
Send UDP traffic on the transproxy port.
</summary>
@@ -65472,7 +65556,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88738">
+<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88756">
<summary>
Do not audit attempts to send UDP traffic on the transproxy port.
</summary>
@@ -65483,7 +65567,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_transproxy_port" lineno="88753">
+<interface name="corenet_udp_receive_transproxy_port" lineno="88771">
<summary>
Receive UDP traffic on the transproxy port.
</summary>
@@ -65494,7 +65578,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88768">
+<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88786">
<summary>
Do not audit attempts to receive UDP traffic on the transproxy port.
</summary>
@@ -65505,7 +65589,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88783">
+<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88801">
<summary>
Send and receive UDP traffic on the transproxy port.
</summary>
@@ -65516,7 +65600,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88799">
+<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88817">
<summary>
Do not audit attempts to send and receive
UDP traffic on the transproxy port.
@@ -65528,7 +65612,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_transproxy_port" lineno="88814">
+<interface name="corenet_tcp_bind_transproxy_port" lineno="88832">
<summary>
Bind TCP sockets to the transproxy port.
</summary>
@@ -65539,7 +65623,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_transproxy_port" lineno="88834">
+<interface name="corenet_udp_bind_transproxy_port" lineno="88852">
<summary>
Bind UDP sockets to the transproxy port.
</summary>
@@ -65550,7 +65634,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_transproxy_port" lineno="88853">
+<interface name="corenet_tcp_connect_transproxy_port" lineno="88871">
<summary>
Make a TCP connection to the transproxy port.
</summary>
@@ -65560,7 +65644,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_transproxy_client_packets" lineno="88873">
+<interface name="corenet_send_transproxy_client_packets" lineno="88891">
<summary>
Send transproxy_client packets.
</summary>
@@ -65571,7 +65655,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88892">
+<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88910">
<summary>
Do not audit attempts to send transproxy_client packets.
</summary>
@@ -65582,7 +65666,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_transproxy_client_packets" lineno="88911">
+<interface name="corenet_receive_transproxy_client_packets" lineno="88929">
<summary>
Receive transproxy_client packets.
</summary>
@@ -65593,7 +65677,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88930">
+<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88948">
<summary>
Do not audit attempts to receive transproxy_client packets.
</summary>
@@ -65604,7 +65688,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88949">
+<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88967">
<summary>
Send and receive transproxy_client packets.
</summary>
@@ -65615,7 +65699,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88965">
+<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88983">
<summary>
Do not audit attempts to send and receive transproxy_client packets.
</summary>
@@ -65626,7 +65710,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_transproxy_client_packets" lineno="88980">
+<interface name="corenet_relabelto_transproxy_client_packets" lineno="88998">
<summary>
Relabel packets to transproxy_client the packet type.
</summary>
@@ -65636,7 +65720,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_transproxy_server_packets" lineno="89000">
+<interface name="corenet_send_transproxy_server_packets" lineno="89018">
<summary>
Send transproxy_server packets.
</summary>
@@ -65647,7 +65731,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="89019">
+<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="89037">
<summary>
Do not audit attempts to send transproxy_server packets.
</summary>
@@ -65658,7 +65742,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_transproxy_server_packets" lineno="89038">
+<interface name="corenet_receive_transproxy_server_packets" lineno="89056">
<summary>
Receive transproxy_server packets.
</summary>
@@ -65669,7 +65753,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="89057">
+<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="89075">
<summary>
Do not audit attempts to receive transproxy_server packets.
</summary>
@@ -65680,7 +65764,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_transproxy_server_packets" lineno="89076">
+<interface name="corenet_sendrecv_transproxy_server_packets" lineno="89094">
<summary>
Send and receive transproxy_server packets.
</summary>
@@ -65691,7 +65775,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="89092">
+<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="89110">
<summary>
Do not audit attempts to send and receive transproxy_server packets.
</summary>
@@ -65702,7 +65786,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_transproxy_server_packets" lineno="89107">
+<interface name="corenet_relabelto_transproxy_server_packets" lineno="89125">
<summary>
Relabel packets to transproxy_server the packet type.
</summary>
@@ -65712,7 +65796,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="89129">
+<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="89147">
<summary>
Send and receive TCP traffic on the trisoap port.
</summary>
@@ -65723,7 +65807,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_trisoap_port" lineno="89144">
+<interface name="corenet_udp_send_trisoap_port" lineno="89162">
<summary>
Send UDP traffic on the trisoap port.
</summary>
@@ -65734,7 +65818,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="89159">
+<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="89177">
<summary>
Do not audit attempts to send UDP traffic on the trisoap port.
</summary>
@@ -65745,7 +65829,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_trisoap_port" lineno="89174">
+<interface name="corenet_udp_receive_trisoap_port" lineno="89192">
<summary>
Receive UDP traffic on the trisoap port.
</summary>
@@ -65756,7 +65840,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="89189">
+<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="89207">
<summary>
Do not audit attempts to receive UDP traffic on the trisoap port.
</summary>
@@ -65767,7 +65851,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_trisoap_port" lineno="89204">
+<interface name="corenet_udp_sendrecv_trisoap_port" lineno="89222">
<summary>
Send and receive UDP traffic on the trisoap port.
</summary>
@@ -65778,7 +65862,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="89220">
+<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="89238">
<summary>
Do not audit attempts to send and receive
UDP traffic on the trisoap port.
@@ -65790,7 +65874,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_trisoap_port" lineno="89235">
+<interface name="corenet_tcp_bind_trisoap_port" lineno="89253">
<summary>
Bind TCP sockets to the trisoap port.
</summary>
@@ -65801,7 +65885,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_trisoap_port" lineno="89255">
+<interface name="corenet_udp_bind_trisoap_port" lineno="89273">
<summary>
Bind UDP sockets to the trisoap port.
</summary>
@@ -65812,7 +65896,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_trisoap_port" lineno="89274">
+<interface name="corenet_tcp_connect_trisoap_port" lineno="89292">
<summary>
Make a TCP connection to the trisoap port.
</summary>
@@ -65822,7 +65906,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trisoap_client_packets" lineno="89294">
+<interface name="corenet_send_trisoap_client_packets" lineno="89312">
<summary>
Send trisoap_client packets.
</summary>
@@ -65833,7 +65917,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="89313">
+<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="89331">
<summary>
Do not audit attempts to send trisoap_client packets.
</summary>
@@ -65844,7 +65928,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trisoap_client_packets" lineno="89332">
+<interface name="corenet_receive_trisoap_client_packets" lineno="89350">
<summary>
Receive trisoap_client packets.
</summary>
@@ -65855,7 +65939,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="89351">
+<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="89369">
<summary>
Do not audit attempts to receive trisoap_client packets.
</summary>
@@ -65866,7 +65950,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trisoap_client_packets" lineno="89370">
+<interface name="corenet_sendrecv_trisoap_client_packets" lineno="89388">
<summary>
Send and receive trisoap_client packets.
</summary>
@@ -65877,7 +65961,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="89386">
+<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="89404">
<summary>
Do not audit attempts to send and receive trisoap_client packets.
</summary>
@@ -65888,7 +65972,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trisoap_client_packets" lineno="89401">
+<interface name="corenet_relabelto_trisoap_client_packets" lineno="89419">
<summary>
Relabel packets to trisoap_client the packet type.
</summary>
@@ -65898,7 +65982,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trisoap_server_packets" lineno="89421">
+<interface name="corenet_send_trisoap_server_packets" lineno="89439">
<summary>
Send trisoap_server packets.
</summary>
@@ -65909,7 +65993,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89440">
+<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89458">
<summary>
Do not audit attempts to send trisoap_server packets.
</summary>
@@ -65920,7 +66004,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trisoap_server_packets" lineno="89459">
+<interface name="corenet_receive_trisoap_server_packets" lineno="89477">
<summary>
Receive trisoap_server packets.
</summary>
@@ -65931,7 +66015,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89478">
+<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89496">
<summary>
Do not audit attempts to receive trisoap_server packets.
</summary>
@@ -65942,7 +66026,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89497">
+<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89515">
<summary>
Send and receive trisoap_server packets.
</summary>
@@ -65953,7 +66037,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89513">
+<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89531">
<summary>
Do not audit attempts to send and receive trisoap_server packets.
</summary>
@@ -65964,7 +66048,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trisoap_server_packets" lineno="89528">
+<interface name="corenet_relabelto_trisoap_server_packets" lineno="89546">
<summary>
Relabel packets to trisoap_server the packet type.
</summary>
@@ -65974,7 +66058,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89550">
+<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89568">
<summary>
Send and receive TCP traffic on the trivnet1 port.
</summary>
@@ -65985,7 +66069,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_trivnet1_port" lineno="89565">
+<interface name="corenet_udp_send_trivnet1_port" lineno="89583">
<summary>
Send UDP traffic on the trivnet1 port.
</summary>
@@ -65996,7 +66080,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89580">
+<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89598">
<summary>
Do not audit attempts to send UDP traffic on the trivnet1 port.
</summary>
@@ -66007,7 +66091,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_trivnet1_port" lineno="89595">
+<interface name="corenet_udp_receive_trivnet1_port" lineno="89613">
<summary>
Receive UDP traffic on the trivnet1 port.
</summary>
@@ -66018,7 +66102,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89610">
+<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89628">
<summary>
Do not audit attempts to receive UDP traffic on the trivnet1 port.
</summary>
@@ -66029,7 +66113,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89625">
+<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89643">
<summary>
Send and receive UDP traffic on the trivnet1 port.
</summary>
@@ -66040,7 +66124,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89641">
+<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89659">
<summary>
Do not audit attempts to send and receive
UDP traffic on the trivnet1 port.
@@ -66052,7 +66136,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_trivnet1_port" lineno="89656">
+<interface name="corenet_tcp_bind_trivnet1_port" lineno="89674">
<summary>
Bind TCP sockets to the trivnet1 port.
</summary>
@@ -66063,7 +66147,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_trivnet1_port" lineno="89676">
+<interface name="corenet_udp_bind_trivnet1_port" lineno="89694">
<summary>
Bind UDP sockets to the trivnet1 port.
</summary>
@@ -66074,7 +66158,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_trivnet1_port" lineno="89695">
+<interface name="corenet_tcp_connect_trivnet1_port" lineno="89713">
<summary>
Make a TCP connection to the trivnet1 port.
</summary>
@@ -66084,7 +66168,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trivnet1_client_packets" lineno="89715">
+<interface name="corenet_send_trivnet1_client_packets" lineno="89733">
<summary>
Send trivnet1_client packets.
</summary>
@@ -66095,7 +66179,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89734">
+<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89752">
<summary>
Do not audit attempts to send trivnet1_client packets.
</summary>
@@ -66106,7 +66190,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trivnet1_client_packets" lineno="89753">
+<interface name="corenet_receive_trivnet1_client_packets" lineno="89771">
<summary>
Receive trivnet1_client packets.
</summary>
@@ -66117,7 +66201,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89772">
+<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89790">
<summary>
Do not audit attempts to receive trivnet1_client packets.
</summary>
@@ -66128,7 +66212,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89791">
+<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89809">
<summary>
Send and receive trivnet1_client packets.
</summary>
@@ -66139,7 +66223,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89807">
+<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89825">
<summary>
Do not audit attempts to send and receive trivnet1_client packets.
</summary>
@@ -66150,7 +66234,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89822">
+<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89840">
<summary>
Relabel packets to trivnet1_client the packet type.
</summary>
@@ -66160,7 +66244,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trivnet1_server_packets" lineno="89842">
+<interface name="corenet_send_trivnet1_server_packets" lineno="89860">
<summary>
Send trivnet1_server packets.
</summary>
@@ -66171,7 +66255,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89861">
+<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89879">
<summary>
Do not audit attempts to send trivnet1_server packets.
</summary>
@@ -66182,7 +66266,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trivnet1_server_packets" lineno="89880">
+<interface name="corenet_receive_trivnet1_server_packets" lineno="89898">
<summary>
Receive trivnet1_server packets.
</summary>
@@ -66193,7 +66277,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89899">
+<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89917">
<summary>
Do not audit attempts to receive trivnet1_server packets.
</summary>
@@ -66204,7 +66288,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89918">
+<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89936">
<summary>
Send and receive trivnet1_server packets.
</summary>
@@ -66215,7 +66299,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89934">
+<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89952">
<summary>
Do not audit attempts to send and receive trivnet1_server packets.
</summary>
@@ -66226,7 +66310,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89949">
+<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89967">
<summary>
Relabel packets to trivnet1_server the packet type.
</summary>
@@ -66236,7 +66320,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ups_port" lineno="89971">
+<interface name="corenet_tcp_sendrecv_ups_port" lineno="89989">
<summary>
Send and receive TCP traffic on the ups port.
</summary>
@@ -66247,7 +66331,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ups_port" lineno="89986">
+<interface name="corenet_udp_send_ups_port" lineno="90004">
<summary>
Send UDP traffic on the ups port.
</summary>
@@ -66258,7 +66342,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ups_port" lineno="90001">
+<interface name="corenet_dontaudit_udp_send_ups_port" lineno="90019">
<summary>
Do not audit attempts to send UDP traffic on the ups port.
</summary>
@@ -66269,7 +66353,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ups_port" lineno="90016">
+<interface name="corenet_udp_receive_ups_port" lineno="90034">
<summary>
Receive UDP traffic on the ups port.
</summary>
@@ -66280,7 +66364,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="90031">
+<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="90049">
<summary>
Do not audit attempts to receive UDP traffic on the ups port.
</summary>
@@ -66291,7 +66375,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ups_port" lineno="90046">
+<interface name="corenet_udp_sendrecv_ups_port" lineno="90064">
<summary>
Send and receive UDP traffic on the ups port.
</summary>
@@ -66302,7 +66386,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="90062">
+<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="90080">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ups port.
@@ -66314,7 +66398,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ups_port" lineno="90077">
+<interface name="corenet_tcp_bind_ups_port" lineno="90095">
<summary>
Bind TCP sockets to the ups port.
</summary>
@@ -66325,7 +66409,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ups_port" lineno="90097">
+<interface name="corenet_udp_bind_ups_port" lineno="90115">
<summary>
Bind UDP sockets to the ups port.
</summary>
@@ -66336,7 +66420,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ups_port" lineno="90116">
+<interface name="corenet_tcp_connect_ups_port" lineno="90134">
<summary>
Make a TCP connection to the ups port.
</summary>
@@ -66346,7 +66430,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ups_client_packets" lineno="90136">
+<interface name="corenet_send_ups_client_packets" lineno="90154">
<summary>
Send ups_client packets.
</summary>
@@ -66357,7 +66441,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ups_client_packets" lineno="90155">
+<interface name="corenet_dontaudit_send_ups_client_packets" lineno="90173">
<summary>
Do not audit attempts to send ups_client packets.
</summary>
@@ -66368,7 +66452,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ups_client_packets" lineno="90174">
+<interface name="corenet_receive_ups_client_packets" lineno="90192">
<summary>
Receive ups_client packets.
</summary>
@@ -66379,7 +66463,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="90193">
+<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="90211">
<summary>
Do not audit attempts to receive ups_client packets.
</summary>
@@ -66390,7 +66474,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ups_client_packets" lineno="90212">
+<interface name="corenet_sendrecv_ups_client_packets" lineno="90230">
<summary>
Send and receive ups_client packets.
</summary>
@@ -66401,7 +66485,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="90228">
+<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="90246">
<summary>
Do not audit attempts to send and receive ups_client packets.
</summary>
@@ -66412,7 +66496,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ups_client_packets" lineno="90243">
+<interface name="corenet_relabelto_ups_client_packets" lineno="90261">
<summary>
Relabel packets to ups_client the packet type.
</summary>
@@ -66422,7 +66506,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ups_server_packets" lineno="90263">
+<interface name="corenet_send_ups_server_packets" lineno="90281">
<summary>
Send ups_server packets.
</summary>
@@ -66433,7 +66517,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ups_server_packets" lineno="90282">
+<interface name="corenet_dontaudit_send_ups_server_packets" lineno="90300">
<summary>
Do not audit attempts to send ups_server packets.
</summary>
@@ -66444,7 +66528,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ups_server_packets" lineno="90301">
+<interface name="corenet_receive_ups_server_packets" lineno="90319">
<summary>
Receive ups_server packets.
</summary>
@@ -66455,7 +66539,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="90320">
+<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="90338">
<summary>
Do not audit attempts to receive ups_server packets.
</summary>
@@ -66466,7 +66550,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ups_server_packets" lineno="90339">
+<interface name="corenet_sendrecv_ups_server_packets" lineno="90357">
<summary>
Send and receive ups_server packets.
</summary>
@@ -66477,7 +66561,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="90355">
+<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="90373">
<summary>
Do not audit attempts to send and receive ups_server packets.
</summary>
@@ -66488,7 +66572,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ups_server_packets" lineno="90370">
+<interface name="corenet_relabelto_ups_server_packets" lineno="90388">
<summary>
Relabel packets to ups_server the packet type.
</summary>
@@ -66498,7 +66582,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="90392">
+<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="90410">
<summary>
Send and receive TCP traffic on the utcpserver port.
</summary>
@@ -66509,7 +66593,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_utcpserver_port" lineno="90407">
+<interface name="corenet_udp_send_utcpserver_port" lineno="90425">
<summary>
Send UDP traffic on the utcpserver port.
</summary>
@@ -66520,7 +66604,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90422">
+<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90440">
<summary>
Do not audit attempts to send UDP traffic on the utcpserver port.
</summary>
@@ -66531,7 +66615,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_utcpserver_port" lineno="90437">
+<interface name="corenet_udp_receive_utcpserver_port" lineno="90455">
<summary>
Receive UDP traffic on the utcpserver port.
</summary>
@@ -66542,7 +66626,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90452">
+<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90470">
<summary>
Do not audit attempts to receive UDP traffic on the utcpserver port.
</summary>
@@ -66553,7 +66637,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90467">
+<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90485">
<summary>
Send and receive UDP traffic on the utcpserver port.
</summary>
@@ -66564,7 +66648,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90483">
+<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90501">
<summary>
Do not audit attempts to send and receive
UDP traffic on the utcpserver port.
@@ -66576,7 +66660,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_utcpserver_port" lineno="90498">
+<interface name="corenet_tcp_bind_utcpserver_port" lineno="90516">
<summary>
Bind TCP sockets to the utcpserver port.
</summary>
@@ -66587,7 +66671,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_utcpserver_port" lineno="90518">
+<interface name="corenet_udp_bind_utcpserver_port" lineno="90536">
<summary>
Bind UDP sockets to the utcpserver port.
</summary>
@@ -66598,7 +66682,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_utcpserver_port" lineno="90537">
+<interface name="corenet_tcp_connect_utcpserver_port" lineno="90555">
<summary>
Make a TCP connection to the utcpserver port.
</summary>
@@ -66608,7 +66692,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_utcpserver_client_packets" lineno="90557">
+<interface name="corenet_send_utcpserver_client_packets" lineno="90575">
<summary>
Send utcpserver_client packets.
</summary>
@@ -66619,7 +66703,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90576">
+<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90594">
<summary>
Do not audit attempts to send utcpserver_client packets.
</summary>
@@ -66630,7 +66714,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_utcpserver_client_packets" lineno="90595">
+<interface name="corenet_receive_utcpserver_client_packets" lineno="90613">
<summary>
Receive utcpserver_client packets.
</summary>
@@ -66641,7 +66725,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90614">
+<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90632">
<summary>
Do not audit attempts to receive utcpserver_client packets.
</summary>
@@ -66652,7 +66736,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90633">
+<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90651">
<summary>
Send and receive utcpserver_client packets.
</summary>
@@ -66663,7 +66747,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90649">
+<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90667">
<summary>
Do not audit attempts to send and receive utcpserver_client packets.
</summary>
@@ -66674,7 +66758,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90664">
+<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90682">
<summary>
Relabel packets to utcpserver_client the packet type.
</summary>
@@ -66684,7 +66768,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_utcpserver_server_packets" lineno="90684">
+<interface name="corenet_send_utcpserver_server_packets" lineno="90702">
<summary>
Send utcpserver_server packets.
</summary>
@@ -66695,7 +66779,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90703">
+<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90721">
<summary>
Do not audit attempts to send utcpserver_server packets.
</summary>
@@ -66706,7 +66790,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_utcpserver_server_packets" lineno="90722">
+<interface name="corenet_receive_utcpserver_server_packets" lineno="90740">
<summary>
Receive utcpserver_server packets.
</summary>
@@ -66717,7 +66801,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90741">
+<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90759">
<summary>
Do not audit attempts to receive utcpserver_server packets.
</summary>
@@ -66728,7 +66812,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90760">
+<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90778">
<summary>
Send and receive utcpserver_server packets.
</summary>
@@ -66739,7 +66823,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90776">
+<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90794">
<summary>
Do not audit attempts to send and receive utcpserver_server packets.
</summary>
@@ -66750,7 +66834,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90791">
+<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90809">
<summary>
Relabel packets to utcpserver_server the packet type.
</summary>
@@ -66760,7 +66844,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90813">
+<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90831">
<summary>
Send and receive TCP traffic on the uucpd port.
</summary>
@@ -66771,7 +66855,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_uucpd_port" lineno="90828">
+<interface name="corenet_udp_send_uucpd_port" lineno="90846">
<summary>
Send UDP traffic on the uucpd port.
</summary>
@@ -66782,7 +66866,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90843">
+<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90861">
<summary>
Do not audit attempts to send UDP traffic on the uucpd port.
</summary>
@@ -66793,7 +66877,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_uucpd_port" lineno="90858">
+<interface name="corenet_udp_receive_uucpd_port" lineno="90876">
<summary>
Receive UDP traffic on the uucpd port.
</summary>
@@ -66804,7 +66888,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90873">
+<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90891">
<summary>
Do not audit attempts to receive UDP traffic on the uucpd port.
</summary>
@@ -66815,7 +66899,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90888">
+<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90906">
<summary>
Send and receive UDP traffic on the uucpd port.
</summary>
@@ -66826,7 +66910,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90904">
+<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90922">
<summary>
Do not audit attempts to send and receive
UDP traffic on the uucpd port.
@@ -66838,7 +66922,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_uucpd_port" lineno="90919">
+<interface name="corenet_tcp_bind_uucpd_port" lineno="90937">
<summary>
Bind TCP sockets to the uucpd port.
</summary>
@@ -66849,7 +66933,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_uucpd_port" lineno="90939">
+<interface name="corenet_udp_bind_uucpd_port" lineno="90957">
<summary>
Bind UDP sockets to the uucpd port.
</summary>
@@ -66860,7 +66944,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_uucpd_port" lineno="90958">
+<interface name="corenet_tcp_connect_uucpd_port" lineno="90976">
<summary>
Make a TCP connection to the uucpd port.
</summary>
@@ -66870,7 +66954,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_uucpd_client_packets" lineno="90978">
+<interface name="corenet_send_uucpd_client_packets" lineno="90996">
<summary>
Send uucpd_client packets.
</summary>
@@ -66881,7 +66965,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="90997">
+<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="91015">
<summary>
Do not audit attempts to send uucpd_client packets.
</summary>
@@ -66892,7 +66976,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_uucpd_client_packets" lineno="91016">
+<interface name="corenet_receive_uucpd_client_packets" lineno="91034">
<summary>
Receive uucpd_client packets.
</summary>
@@ -66903,7 +66987,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="91035">
+<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="91053">
<summary>
Do not audit attempts to receive uucpd_client packets.
</summary>
@@ -66914,7 +66998,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_uucpd_client_packets" lineno="91054">
+<interface name="corenet_sendrecv_uucpd_client_packets" lineno="91072">
<summary>
Send and receive uucpd_client packets.
</summary>
@@ -66925,7 +67009,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="91070">
+<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="91088">
<summary>
Do not audit attempts to send and receive uucpd_client packets.
</summary>
@@ -66936,7 +67020,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_uucpd_client_packets" lineno="91085">
+<interface name="corenet_relabelto_uucpd_client_packets" lineno="91103">
<summary>
Relabel packets to uucpd_client the packet type.
</summary>
@@ -66946,7 +67030,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_uucpd_server_packets" lineno="91105">
+<interface name="corenet_send_uucpd_server_packets" lineno="91123">
<summary>
Send uucpd_server packets.
</summary>
@@ -66957,7 +67041,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="91124">
+<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="91142">
<summary>
Do not audit attempts to send uucpd_server packets.
</summary>
@@ -66968,7 +67052,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_uucpd_server_packets" lineno="91143">
+<interface name="corenet_receive_uucpd_server_packets" lineno="91161">
<summary>
Receive uucpd_server packets.
</summary>
@@ -66979,7 +67063,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="91162">
+<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="91180">
<summary>
Do not audit attempts to receive uucpd_server packets.
</summary>
@@ -66990,7 +67074,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_uucpd_server_packets" lineno="91181">
+<interface name="corenet_sendrecv_uucpd_server_packets" lineno="91199">
<summary>
Send and receive uucpd_server packets.
</summary>
@@ -67001,7 +67085,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="91197">
+<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="91215">
<summary>
Do not audit attempts to send and receive uucpd_server packets.
</summary>
@@ -67012,7 +67096,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_uucpd_server_packets" lineno="91212">
+<interface name="corenet_relabelto_uucpd_server_packets" lineno="91230">
<summary>
Relabel packets to uucpd_server the packet type.
</summary>
@@ -67022,7 +67106,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="91234">
+<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="91252">
<summary>
Send and receive TCP traffic on the varnishd port.
</summary>
@@ -67033,7 +67117,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_varnishd_port" lineno="91249">
+<interface name="corenet_udp_send_varnishd_port" lineno="91267">
<summary>
Send UDP traffic on the varnishd port.
</summary>
@@ -67044,7 +67128,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="91264">
+<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="91282">
<summary>
Do not audit attempts to send UDP traffic on the varnishd port.
</summary>
@@ -67055,7 +67139,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_varnishd_port" lineno="91279">
+<interface name="corenet_udp_receive_varnishd_port" lineno="91297">
<summary>
Receive UDP traffic on the varnishd port.
</summary>
@@ -67066,7 +67150,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="91294">
+<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="91312">
<summary>
Do not audit attempts to receive UDP traffic on the varnishd port.
</summary>
@@ -67077,7 +67161,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_varnishd_port" lineno="91309">
+<interface name="corenet_udp_sendrecv_varnishd_port" lineno="91327">
<summary>
Send and receive UDP traffic on the varnishd port.
</summary>
@@ -67088,7 +67172,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="91325">
+<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="91343">
<summary>
Do not audit attempts to send and receive
UDP traffic on the varnishd port.
@@ -67100,7 +67184,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_varnishd_port" lineno="91340">
+<interface name="corenet_tcp_bind_varnishd_port" lineno="91358">
<summary>
Bind TCP sockets to the varnishd port.
</summary>
@@ -67111,7 +67195,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_varnishd_port" lineno="91360">
+<interface name="corenet_udp_bind_varnishd_port" lineno="91378">
<summary>
Bind UDP sockets to the varnishd port.
</summary>
@@ -67122,7 +67206,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_varnishd_port" lineno="91379">
+<interface name="corenet_tcp_connect_varnishd_port" lineno="91397">
<summary>
Make a TCP connection to the varnishd port.
</summary>
@@ -67132,7 +67216,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_varnishd_client_packets" lineno="91399">
+<interface name="corenet_send_varnishd_client_packets" lineno="91417">
<summary>
Send varnishd_client packets.
</summary>
@@ -67143,7 +67227,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="91418">
+<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="91436">
<summary>
Do not audit attempts to send varnishd_client packets.
</summary>
@@ -67154,7 +67238,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_varnishd_client_packets" lineno="91437">
+<interface name="corenet_receive_varnishd_client_packets" lineno="91455">
<summary>
Receive varnishd_client packets.
</summary>
@@ -67165,7 +67249,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91456">
+<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91474">
<summary>
Do not audit attempts to receive varnishd_client packets.
</summary>
@@ -67176,7 +67260,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91475">
+<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91493">
<summary>
Send and receive varnishd_client packets.
</summary>
@@ -67187,7 +67271,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91491">
+<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91509">
<summary>
Do not audit attempts to send and receive varnishd_client packets.
</summary>
@@ -67198,7 +67282,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_varnishd_client_packets" lineno="91506">
+<interface name="corenet_relabelto_varnishd_client_packets" lineno="91524">
<summary>
Relabel packets to varnishd_client the packet type.
</summary>
@@ -67208,7 +67292,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_varnishd_server_packets" lineno="91526">
+<interface name="corenet_send_varnishd_server_packets" lineno="91544">
<summary>
Send varnishd_server packets.
</summary>
@@ -67219,7 +67303,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91545">
+<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91563">
<summary>
Do not audit attempts to send varnishd_server packets.
</summary>
@@ -67230,7 +67314,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_varnishd_server_packets" lineno="91564">
+<interface name="corenet_receive_varnishd_server_packets" lineno="91582">
<summary>
Receive varnishd_server packets.
</summary>
@@ -67241,7 +67325,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91583">
+<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91601">
<summary>
Do not audit attempts to receive varnishd_server packets.
</summary>
@@ -67252,7 +67336,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91602">
+<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91620">
<summary>
Send and receive varnishd_server packets.
</summary>
@@ -67263,7 +67347,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91618">
+<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91636">
<summary>
Do not audit attempts to send and receive varnishd_server packets.
</summary>
@@ -67274,7 +67358,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_varnishd_server_packets" lineno="91633">
+<interface name="corenet_relabelto_varnishd_server_packets" lineno="91651">
<summary>
Relabel packets to varnishd_server the packet type.
</summary>
@@ -67284,7 +67368,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_virt_port" lineno="91655">
+<interface name="corenet_tcp_sendrecv_virt_port" lineno="91673">
<summary>
Send and receive TCP traffic on the virt port.
</summary>
@@ -67295,7 +67379,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_virt_port" lineno="91670">
+<interface name="corenet_udp_send_virt_port" lineno="91688">
<summary>
Send UDP traffic on the virt port.
</summary>
@@ -67306,7 +67390,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91685">
+<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91703">
<summary>
Do not audit attempts to send UDP traffic on the virt port.
</summary>
@@ -67317,7 +67401,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_virt_port" lineno="91700">
+<interface name="corenet_udp_receive_virt_port" lineno="91718">
<summary>
Receive UDP traffic on the virt port.
</summary>
@@ -67328,7 +67412,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91715">
+<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91733">
<summary>
Do not audit attempts to receive UDP traffic on the virt port.
</summary>
@@ -67339,7 +67423,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_virt_port" lineno="91730">
+<interface name="corenet_udp_sendrecv_virt_port" lineno="91748">
<summary>
Send and receive UDP traffic on the virt port.
</summary>
@@ -67350,7 +67434,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91746">
+<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91764">
<summary>
Do not audit attempts to send and receive
UDP traffic on the virt port.
@@ -67362,7 +67446,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_virt_port" lineno="91761">
+<interface name="corenet_tcp_bind_virt_port" lineno="91779">
<summary>
Bind TCP sockets to the virt port.
</summary>
@@ -67373,7 +67457,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_virt_port" lineno="91781">
+<interface name="corenet_udp_bind_virt_port" lineno="91799">
<summary>
Bind UDP sockets to the virt port.
</summary>
@@ -67384,7 +67468,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_virt_port" lineno="91800">
+<interface name="corenet_tcp_connect_virt_port" lineno="91818">
<summary>
Make a TCP connection to the virt port.
</summary>
@@ -67394,7 +67478,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_client_packets" lineno="91820">
+<interface name="corenet_send_virt_client_packets" lineno="91838">
<summary>
Send virt_client packets.
</summary>
@@ -67405,7 +67489,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91839">
+<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91857">
<summary>
Do not audit attempts to send virt_client packets.
</summary>
@@ -67416,7 +67500,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_client_packets" lineno="91858">
+<interface name="corenet_receive_virt_client_packets" lineno="91876">
<summary>
Receive virt_client packets.
</summary>
@@ -67427,7 +67511,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91877">
+<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91895">
<summary>
Do not audit attempts to receive virt_client packets.
</summary>
@@ -67438,7 +67522,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_client_packets" lineno="91896">
+<interface name="corenet_sendrecv_virt_client_packets" lineno="91914">
<summary>
Send and receive virt_client packets.
</summary>
@@ -67449,7 +67533,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91912">
+<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91930">
<summary>
Do not audit attempts to send and receive virt_client packets.
</summary>
@@ -67460,7 +67544,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_client_packets" lineno="91927">
+<interface name="corenet_relabelto_virt_client_packets" lineno="91945">
<summary>
Relabel packets to virt_client the packet type.
</summary>
@@ -67470,7 +67554,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_server_packets" lineno="91947">
+<interface name="corenet_send_virt_server_packets" lineno="91965">
<summary>
Send virt_server packets.
</summary>
@@ -67481,7 +67565,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91966">
+<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91984">
<summary>
Do not audit attempts to send virt_server packets.
</summary>
@@ -67492,7 +67576,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_server_packets" lineno="91985">
+<interface name="corenet_receive_virt_server_packets" lineno="92003">
<summary>
Receive virt_server packets.
</summary>
@@ -67503,7 +67587,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="92004">
+<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="92022">
<summary>
Do not audit attempts to receive virt_server packets.
</summary>
@@ -67514,7 +67598,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_server_packets" lineno="92023">
+<interface name="corenet_sendrecv_virt_server_packets" lineno="92041">
<summary>
Send and receive virt_server packets.
</summary>
@@ -67525,7 +67609,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="92039">
+<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="92057">
<summary>
Do not audit attempts to send and receive virt_server packets.
</summary>
@@ -67536,7 +67620,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_server_packets" lineno="92054">
+<interface name="corenet_relabelto_virt_server_packets" lineno="92072">
<summary>
Relabel packets to virt_server the packet type.
</summary>
@@ -67546,7 +67630,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="92076">
+<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="92094">
<summary>
Send and receive TCP traffic on the virtual_places port.
</summary>
@@ -67557,7 +67641,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_virtual_places_port" lineno="92091">
+<interface name="corenet_udp_send_virtual_places_port" lineno="92109">
<summary>
Send UDP traffic on the virtual_places port.
</summary>
@@ -67568,7 +67652,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="92106">
+<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="92124">
<summary>
Do not audit attempts to send UDP traffic on the virtual_places port.
</summary>
@@ -67579,7 +67663,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_virtual_places_port" lineno="92121">
+<interface name="corenet_udp_receive_virtual_places_port" lineno="92139">
<summary>
Receive UDP traffic on the virtual_places port.
</summary>
@@ -67590,7 +67674,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="92136">
+<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="92154">
<summary>
Do not audit attempts to receive UDP traffic on the virtual_places port.
</summary>
@@ -67601,7 +67685,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="92151">
+<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="92169">
<summary>
Send and receive UDP traffic on the virtual_places port.
</summary>
@@ -67612,7 +67696,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="92167">
+<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="92185">
<summary>
Do not audit attempts to send and receive
UDP traffic on the virtual_places port.
@@ -67624,7 +67708,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_virtual_places_port" lineno="92182">
+<interface name="corenet_tcp_bind_virtual_places_port" lineno="92200">
<summary>
Bind TCP sockets to the virtual_places port.
</summary>
@@ -67635,7 +67719,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_virtual_places_port" lineno="92202">
+<interface name="corenet_udp_bind_virtual_places_port" lineno="92220">
<summary>
Bind UDP sockets to the virtual_places port.
</summary>
@@ -67646,7 +67730,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_virtual_places_port" lineno="92221">
+<interface name="corenet_tcp_connect_virtual_places_port" lineno="92239">
<summary>
Make a TCP connection to the virtual_places port.
</summary>
@@ -67656,7 +67740,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virtual_places_client_packets" lineno="92241">
+<interface name="corenet_send_virtual_places_client_packets" lineno="92259">
<summary>
Send virtual_places_client packets.
</summary>
@@ -67667,7 +67751,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="92260">
+<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="92278">
<summary>
Do not audit attempts to send virtual_places_client packets.
</summary>
@@ -67678,7 +67762,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virtual_places_client_packets" lineno="92279">
+<interface name="corenet_receive_virtual_places_client_packets" lineno="92297">
<summary>
Receive virtual_places_client packets.
</summary>
@@ -67689,7 +67773,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="92298">
+<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="92316">
<summary>
Do not audit attempts to receive virtual_places_client packets.
</summary>
@@ -67700,7 +67784,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="92317">
+<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="92335">
<summary>
Send and receive virtual_places_client packets.
</summary>
@@ -67711,7 +67795,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="92333">
+<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="92351">
<summary>
Do not audit attempts to send and receive virtual_places_client packets.
</summary>
@@ -67722,7 +67806,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virtual_places_client_packets" lineno="92348">
+<interface name="corenet_relabelto_virtual_places_client_packets" lineno="92366">
<summary>
Relabel packets to virtual_places_client the packet type.
</summary>
@@ -67732,7 +67816,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virtual_places_server_packets" lineno="92368">
+<interface name="corenet_send_virtual_places_server_packets" lineno="92386">
<summary>
Send virtual_places_server packets.
</summary>
@@ -67743,7 +67827,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="92387">
+<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="92405">
<summary>
Do not audit attempts to send virtual_places_server packets.
</summary>
@@ -67754,7 +67838,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virtual_places_server_packets" lineno="92406">
+<interface name="corenet_receive_virtual_places_server_packets" lineno="92424">
<summary>
Receive virtual_places_server packets.
</summary>
@@ -67765,7 +67849,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92425">
+<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92443">
<summary>
Do not audit attempts to receive virtual_places_server packets.
</summary>
@@ -67776,7 +67860,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92444">
+<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92462">
<summary>
Send and receive virtual_places_server packets.
</summary>
@@ -67787,7 +67871,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92460">
+<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92478">
<summary>
Do not audit attempts to send and receive virtual_places_server packets.
</summary>
@@ -67798,7 +67882,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92475">
+<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92493">
<summary>
Relabel packets to virtual_places_server the packet type.
</summary>
@@ -67808,7 +67892,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92497">
+<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92515">
<summary>
Send and receive TCP traffic on the virt_migration port.
</summary>
@@ -67819,7 +67903,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_virt_migration_port" lineno="92512">
+<interface name="corenet_udp_send_virt_migration_port" lineno="92530">
<summary>
Send UDP traffic on the virt_migration port.
</summary>
@@ -67830,7 +67914,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92527">
+<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92545">
<summary>
Do not audit attempts to send UDP traffic on the virt_migration port.
</summary>
@@ -67841,7 +67925,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_virt_migration_port" lineno="92542">
+<interface name="corenet_udp_receive_virt_migration_port" lineno="92560">
<summary>
Receive UDP traffic on the virt_migration port.
</summary>
@@ -67852,7 +67936,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92557">
+<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92575">
<summary>
Do not audit attempts to receive UDP traffic on the virt_migration port.
</summary>
@@ -67863,7 +67947,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92572">
+<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92590">
<summary>
Send and receive UDP traffic on the virt_migration port.
</summary>
@@ -67874,7 +67958,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92588">
+<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92606">
<summary>
Do not audit attempts to send and receive
UDP traffic on the virt_migration port.
@@ -67886,7 +67970,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_virt_migration_port" lineno="92603">
+<interface name="corenet_tcp_bind_virt_migration_port" lineno="92621">
<summary>
Bind TCP sockets to the virt_migration port.
</summary>
@@ -67897,7 +67981,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_virt_migration_port" lineno="92623">
+<interface name="corenet_udp_bind_virt_migration_port" lineno="92641">
<summary>
Bind UDP sockets to the virt_migration port.
</summary>
@@ -67908,7 +67992,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_virt_migration_port" lineno="92642">
+<interface name="corenet_tcp_connect_virt_migration_port" lineno="92660">
<summary>
Make a TCP connection to the virt_migration port.
</summary>
@@ -67918,7 +68002,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_migration_client_packets" lineno="92662">
+<interface name="corenet_send_virt_migration_client_packets" lineno="92680">
<summary>
Send virt_migration_client packets.
</summary>
@@ -67929,7 +68013,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92681">
+<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92699">
<summary>
Do not audit attempts to send virt_migration_client packets.
</summary>
@@ -67940,7 +68024,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_migration_client_packets" lineno="92700">
+<interface name="corenet_receive_virt_migration_client_packets" lineno="92718">
<summary>
Receive virt_migration_client packets.
</summary>
@@ -67951,7 +68035,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92719">
+<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92737">
<summary>
Do not audit attempts to receive virt_migration_client packets.
</summary>
@@ -67962,7 +68046,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92738">
+<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92756">
<summary>
Send and receive virt_migration_client packets.
</summary>
@@ -67973,7 +68057,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92754">
+<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92772">
<summary>
Do not audit attempts to send and receive virt_migration_client packets.
</summary>
@@ -67984,7 +68068,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92769">
+<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92787">
<summary>
Relabel packets to virt_migration_client the packet type.
</summary>
@@ -67994,7 +68078,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_migration_server_packets" lineno="92789">
+<interface name="corenet_send_virt_migration_server_packets" lineno="92807">
<summary>
Send virt_migration_server packets.
</summary>
@@ -68005,7 +68089,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92808">
+<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92826">
<summary>
Do not audit attempts to send virt_migration_server packets.
</summary>
@@ -68016,7 +68100,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_migration_server_packets" lineno="92827">
+<interface name="corenet_receive_virt_migration_server_packets" lineno="92845">
<summary>
Receive virt_migration_server packets.
</summary>
@@ -68027,7 +68111,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92846">
+<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92864">
<summary>
Do not audit attempts to receive virt_migration_server packets.
</summary>
@@ -68038,7 +68122,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92865">
+<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92883">
<summary>
Send and receive virt_migration_server packets.
</summary>
@@ -68049,7 +68133,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92881">
+<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92899">
<summary>
Do not audit attempts to send and receive virt_migration_server packets.
</summary>
@@ -68060,7 +68144,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92896">
+<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92914">
<summary>
Relabel packets to virt_migration_server the packet type.
</summary>
@@ -68070,7 +68154,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92918">
+<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92936">
<summary>
Send and receive TCP traffic on the vnc port.
</summary>
@@ -68081,7 +68165,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_vnc_port" lineno="92933">
+<interface name="corenet_udp_send_vnc_port" lineno="92951">
<summary>
Send UDP traffic on the vnc port.
</summary>
@@ -68092,7 +68176,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92948">
+<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92966">
<summary>
Do not audit attempts to send UDP traffic on the vnc port.
</summary>
@@ -68103,7 +68187,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_vnc_port" lineno="92963">
+<interface name="corenet_udp_receive_vnc_port" lineno="92981">
<summary>
Receive UDP traffic on the vnc port.
</summary>
@@ -68114,7 +68198,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92978">
+<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92996">
<summary>
Do not audit attempts to receive UDP traffic on the vnc port.
</summary>
@@ -68125,7 +68209,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_vnc_port" lineno="92993">
+<interface name="corenet_udp_sendrecv_vnc_port" lineno="93011">
<summary>
Send and receive UDP traffic on the vnc port.
</summary>
@@ -68136,7 +68220,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="93009">
+<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="93027">
<summary>
Do not audit attempts to send and receive
UDP traffic on the vnc port.
@@ -68148,7 +68232,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_vnc_port" lineno="93024">
+<interface name="corenet_tcp_bind_vnc_port" lineno="93042">
<summary>
Bind TCP sockets to the vnc port.
</summary>
@@ -68159,7 +68243,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_vnc_port" lineno="93044">
+<interface name="corenet_udp_bind_vnc_port" lineno="93062">
<summary>
Bind UDP sockets to the vnc port.
</summary>
@@ -68170,7 +68254,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_vnc_port" lineno="93063">
+<interface name="corenet_tcp_connect_vnc_port" lineno="93081">
<summary>
Make a TCP connection to the vnc port.
</summary>
@@ -68180,7 +68264,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_vnc_client_packets" lineno="93083">
+<interface name="corenet_send_vnc_client_packets" lineno="93101">
<summary>
Send vnc_client packets.
</summary>
@@ -68191,7 +68275,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="93102">
+<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="93120">
<summary>
Do not audit attempts to send vnc_client packets.
</summary>
@@ -68202,7 +68286,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_vnc_client_packets" lineno="93121">
+<interface name="corenet_receive_vnc_client_packets" lineno="93139">
<summary>
Receive vnc_client packets.
</summary>
@@ -68213,7 +68297,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="93140">
+<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="93158">
<summary>
Do not audit attempts to receive vnc_client packets.
</summary>
@@ -68224,7 +68308,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_vnc_client_packets" lineno="93159">
+<interface name="corenet_sendrecv_vnc_client_packets" lineno="93177">
<summary>
Send and receive vnc_client packets.
</summary>
@@ -68235,7 +68319,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="93175">
+<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="93193">
<summary>
Do not audit attempts to send and receive vnc_client packets.
</summary>
@@ -68246,7 +68330,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_vnc_client_packets" lineno="93190">
+<interface name="corenet_relabelto_vnc_client_packets" lineno="93208">
<summary>
Relabel packets to vnc_client the packet type.
</summary>
@@ -68256,7 +68340,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_vnc_server_packets" lineno="93210">
+<interface name="corenet_send_vnc_server_packets" lineno="93228">
<summary>
Send vnc_server packets.
</summary>
@@ -68267,7 +68351,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="93229">
+<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="93247">
<summary>
Do not audit attempts to send vnc_server packets.
</summary>
@@ -68278,7 +68362,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_vnc_server_packets" lineno="93248">
+<interface name="corenet_receive_vnc_server_packets" lineno="93266">
<summary>
Receive vnc_server packets.
</summary>
@@ -68289,7 +68373,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="93267">
+<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="93285">
<summary>
Do not audit attempts to receive vnc_server packets.
</summary>
@@ -68300,7 +68384,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_vnc_server_packets" lineno="93286">
+<interface name="corenet_sendrecv_vnc_server_packets" lineno="93304">
<summary>
Send and receive vnc_server packets.
</summary>
@@ -68311,7 +68395,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="93302">
+<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="93320">
<summary>
Do not audit attempts to send and receive vnc_server packets.
</summary>
@@ -68322,7 +68406,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_vnc_server_packets" lineno="93317">
+<interface name="corenet_relabelto_vnc_server_packets" lineno="93335">
<summary>
Relabel packets to vnc_server the packet type.
</summary>
@@ -68332,7 +68416,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_wccp_port" lineno="93339">
+<interface name="corenet_tcp_sendrecv_wccp_port" lineno="93357">
<summary>
Send and receive TCP traffic on the wccp port.
</summary>
@@ -68343,7 +68427,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_wccp_port" lineno="93354">
+<interface name="corenet_udp_send_wccp_port" lineno="93372">
<summary>
Send UDP traffic on the wccp port.
</summary>
@@ -68354,7 +68438,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="93369">
+<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="93387">
<summary>
Do not audit attempts to send UDP traffic on the wccp port.
</summary>
@@ -68365,7 +68449,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_wccp_port" lineno="93384">
+<interface name="corenet_udp_receive_wccp_port" lineno="93402">
<summary>
Receive UDP traffic on the wccp port.
</summary>
@@ -68376,7 +68460,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="93399">
+<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="93417">
<summary>
Do not audit attempts to receive UDP traffic on the wccp port.
</summary>
@@ -68387,7 +68471,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_wccp_port" lineno="93414">
+<interface name="corenet_udp_sendrecv_wccp_port" lineno="93432">
<summary>
Send and receive UDP traffic on the wccp port.
</summary>
@@ -68398,7 +68482,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93430">
+<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93448">
<summary>
Do not audit attempts to send and receive
UDP traffic on the wccp port.
@@ -68410,7 +68494,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_wccp_port" lineno="93445">
+<interface name="corenet_tcp_bind_wccp_port" lineno="93463">
<summary>
Bind TCP sockets to the wccp port.
</summary>
@@ -68421,7 +68505,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_wccp_port" lineno="93465">
+<interface name="corenet_udp_bind_wccp_port" lineno="93483">
<summary>
Bind UDP sockets to the wccp port.
</summary>
@@ -68432,7 +68516,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_wccp_port" lineno="93484">
+<interface name="corenet_tcp_connect_wccp_port" lineno="93502">
<summary>
Make a TCP connection to the wccp port.
</summary>
@@ -68442,7 +68526,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wccp_client_packets" lineno="93504">
+<interface name="corenet_send_wccp_client_packets" lineno="93522">
<summary>
Send wccp_client packets.
</summary>
@@ -68453,7 +68537,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93523">
+<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93541">
<summary>
Do not audit attempts to send wccp_client packets.
</summary>
@@ -68464,7 +68548,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wccp_client_packets" lineno="93542">
+<interface name="corenet_receive_wccp_client_packets" lineno="93560">
<summary>
Receive wccp_client packets.
</summary>
@@ -68475,7 +68559,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93561">
+<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93579">
<summary>
Do not audit attempts to receive wccp_client packets.
</summary>
@@ -68486,7 +68570,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wccp_client_packets" lineno="93580">
+<interface name="corenet_sendrecv_wccp_client_packets" lineno="93598">
<summary>
Send and receive wccp_client packets.
</summary>
@@ -68497,7 +68581,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93596">
+<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93614">
<summary>
Do not audit attempts to send and receive wccp_client packets.
</summary>
@@ -68508,7 +68592,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wccp_client_packets" lineno="93611">
+<interface name="corenet_relabelto_wccp_client_packets" lineno="93629">
<summary>
Relabel packets to wccp_client the packet type.
</summary>
@@ -68518,7 +68602,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wccp_server_packets" lineno="93631">
+<interface name="corenet_send_wccp_server_packets" lineno="93649">
<summary>
Send wccp_server packets.
</summary>
@@ -68529,7 +68613,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93650">
+<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93668">
<summary>
Do not audit attempts to send wccp_server packets.
</summary>
@@ -68540,7 +68624,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wccp_server_packets" lineno="93669">
+<interface name="corenet_receive_wccp_server_packets" lineno="93687">
<summary>
Receive wccp_server packets.
</summary>
@@ -68551,7 +68635,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93688">
+<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93706">
<summary>
Do not audit attempts to receive wccp_server packets.
</summary>
@@ -68562,7 +68646,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wccp_server_packets" lineno="93707">
+<interface name="corenet_sendrecv_wccp_server_packets" lineno="93725">
<summary>
Send and receive wccp_server packets.
</summary>
@@ -68573,7 +68657,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93723">
+<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93741">
<summary>
Do not audit attempts to send and receive wccp_server packets.
</summary>
@@ -68584,7 +68668,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wccp_server_packets" lineno="93738">
+<interface name="corenet_relabelto_wccp_server_packets" lineno="93756">
<summary>
Relabel packets to wccp_server the packet type.
</summary>
@@ -68594,7 +68678,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_websm_port" lineno="93760">
+<interface name="corenet_tcp_sendrecv_websm_port" lineno="93778">
<summary>
Send and receive TCP traffic on the websm port.
</summary>
@@ -68605,7 +68689,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_websm_port" lineno="93775">
+<interface name="corenet_udp_send_websm_port" lineno="93793">
<summary>
Send UDP traffic on the websm port.
</summary>
@@ -68616,7 +68700,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93790">
+<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93808">
<summary>
Do not audit attempts to send UDP traffic on the websm port.
</summary>
@@ -68627,7 +68711,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_websm_port" lineno="93805">
+<interface name="corenet_udp_receive_websm_port" lineno="93823">
<summary>
Receive UDP traffic on the websm port.
</summary>
@@ -68638,7 +68722,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93820">
+<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93838">
<summary>
Do not audit attempts to receive UDP traffic on the websm port.
</summary>
@@ -68649,7 +68733,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_websm_port" lineno="93835">
+<interface name="corenet_udp_sendrecv_websm_port" lineno="93853">
<summary>
Send and receive UDP traffic on the websm port.
</summary>
@@ -68660,7 +68744,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93851">
+<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93869">
<summary>
Do not audit attempts to send and receive
UDP traffic on the websm port.
@@ -68672,7 +68756,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_websm_port" lineno="93866">
+<interface name="corenet_tcp_bind_websm_port" lineno="93884">
<summary>
Bind TCP sockets to the websm port.
</summary>
@@ -68683,7 +68767,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_websm_port" lineno="93886">
+<interface name="corenet_udp_bind_websm_port" lineno="93904">
<summary>
Bind UDP sockets to the websm port.
</summary>
@@ -68694,7 +68778,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_websm_port" lineno="93905">
+<interface name="corenet_tcp_connect_websm_port" lineno="93923">
<summary>
Make a TCP connection to the websm port.
</summary>
@@ -68704,7 +68788,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_websm_client_packets" lineno="93925">
+<interface name="corenet_send_websm_client_packets" lineno="93943">
<summary>
Send websm_client packets.
</summary>
@@ -68715,7 +68799,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93944">
+<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93962">
<summary>
Do not audit attempts to send websm_client packets.
</summary>
@@ -68726,7 +68810,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_websm_client_packets" lineno="93963">
+<interface name="corenet_receive_websm_client_packets" lineno="93981">
<summary>
Receive websm_client packets.
</summary>
@@ -68737,7 +68821,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="93982">
+<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="94000">
<summary>
Do not audit attempts to receive websm_client packets.
</summary>
@@ -68748,7 +68832,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_websm_client_packets" lineno="94001">
+<interface name="corenet_sendrecv_websm_client_packets" lineno="94019">
<summary>
Send and receive websm_client packets.
</summary>
@@ -68759,7 +68843,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="94017">
+<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="94035">
<summary>
Do not audit attempts to send and receive websm_client packets.
</summary>
@@ -68770,7 +68854,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_websm_client_packets" lineno="94032">
+<interface name="corenet_relabelto_websm_client_packets" lineno="94050">
<summary>
Relabel packets to websm_client the packet type.
</summary>
@@ -68780,7 +68864,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_websm_server_packets" lineno="94052">
+<interface name="corenet_send_websm_server_packets" lineno="94070">
<summary>
Send websm_server packets.
</summary>
@@ -68791,7 +68875,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_websm_server_packets" lineno="94071">
+<interface name="corenet_dontaudit_send_websm_server_packets" lineno="94089">
<summary>
Do not audit attempts to send websm_server packets.
</summary>
@@ -68802,7 +68886,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_websm_server_packets" lineno="94090">
+<interface name="corenet_receive_websm_server_packets" lineno="94108">
<summary>
Receive websm_server packets.
</summary>
@@ -68813,7 +68897,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="94109">
+<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="94127">
<summary>
Do not audit attempts to receive websm_server packets.
</summary>
@@ -68824,7 +68908,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_websm_server_packets" lineno="94128">
+<interface name="corenet_sendrecv_websm_server_packets" lineno="94146">
<summary>
Send and receive websm_server packets.
</summary>
@@ -68835,7 +68919,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="94144">
+<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="94162">
<summary>
Do not audit attempts to send and receive websm_server packets.
</summary>
@@ -68846,7 +68930,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_websm_server_packets" lineno="94159">
+<interface name="corenet_relabelto_websm_server_packets" lineno="94177">
<summary>
Relabel packets to websm_server the packet type.
</summary>
@@ -68856,7 +68940,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_whois_port" lineno="94181">
+<interface name="corenet_tcp_sendrecv_whois_port" lineno="94199">
<summary>
Send and receive TCP traffic on the whois port.
</summary>
@@ -68867,7 +68951,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_whois_port" lineno="94196">
+<interface name="corenet_udp_send_whois_port" lineno="94214">
<summary>
Send UDP traffic on the whois port.
</summary>
@@ -68878,7 +68962,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_whois_port" lineno="94211">
+<interface name="corenet_dontaudit_udp_send_whois_port" lineno="94229">
<summary>
Do not audit attempts to send UDP traffic on the whois port.
</summary>
@@ -68889,7 +68973,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_whois_port" lineno="94226">
+<interface name="corenet_udp_receive_whois_port" lineno="94244">
<summary>
Receive UDP traffic on the whois port.
</summary>
@@ -68900,7 +68984,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="94241">
+<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="94259">
<summary>
Do not audit attempts to receive UDP traffic on the whois port.
</summary>
@@ -68911,7 +68995,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_whois_port" lineno="94256">
+<interface name="corenet_udp_sendrecv_whois_port" lineno="94274">
<summary>
Send and receive UDP traffic on the whois port.
</summary>
@@ -68922,7 +69006,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="94272">
+<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="94290">
<summary>
Do not audit attempts to send and receive
UDP traffic on the whois port.
@@ -68934,7 +69018,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_whois_port" lineno="94287">
+<interface name="corenet_tcp_bind_whois_port" lineno="94305">
<summary>
Bind TCP sockets to the whois port.
</summary>
@@ -68945,7 +69029,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_whois_port" lineno="94307">
+<interface name="corenet_udp_bind_whois_port" lineno="94325">
<summary>
Bind UDP sockets to the whois port.
</summary>
@@ -68956,7 +69040,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_whois_port" lineno="94326">
+<interface name="corenet_tcp_connect_whois_port" lineno="94344">
<summary>
Make a TCP connection to the whois port.
</summary>
@@ -68966,7 +69050,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_whois_client_packets" lineno="94346">
+<interface name="corenet_send_whois_client_packets" lineno="94364">
<summary>
Send whois_client packets.
</summary>
@@ -68977,7 +69061,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_whois_client_packets" lineno="94365">
+<interface name="corenet_dontaudit_send_whois_client_packets" lineno="94383">
<summary>
Do not audit attempts to send whois_client packets.
</summary>
@@ -68988,7 +69072,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_whois_client_packets" lineno="94384">
+<interface name="corenet_receive_whois_client_packets" lineno="94402">
<summary>
Receive whois_client packets.
</summary>
@@ -68999,7 +69083,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="94403">
+<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="94421">
<summary>
Do not audit attempts to receive whois_client packets.
</summary>
@@ -69010,7 +69094,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_whois_client_packets" lineno="94422">
+<interface name="corenet_sendrecv_whois_client_packets" lineno="94440">
<summary>
Send and receive whois_client packets.
</summary>
@@ -69021,7 +69105,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94438">
+<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94456">
<summary>
Do not audit attempts to send and receive whois_client packets.
</summary>
@@ -69032,7 +69116,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_whois_client_packets" lineno="94453">
+<interface name="corenet_relabelto_whois_client_packets" lineno="94471">
<summary>
Relabel packets to whois_client the packet type.
</summary>
@@ -69042,7 +69126,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_whois_server_packets" lineno="94473">
+<interface name="corenet_send_whois_server_packets" lineno="94491">
<summary>
Send whois_server packets.
</summary>
@@ -69053,7 +69137,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94492">
+<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94510">
<summary>
Do not audit attempts to send whois_server packets.
</summary>
@@ -69064,7 +69148,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_whois_server_packets" lineno="94511">
+<interface name="corenet_receive_whois_server_packets" lineno="94529">
<summary>
Receive whois_server packets.
</summary>
@@ -69075,7 +69159,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94530">
+<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94548">
<summary>
Do not audit attempts to receive whois_server packets.
</summary>
@@ -69086,7 +69170,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_whois_server_packets" lineno="94549">
+<interface name="corenet_sendrecv_whois_server_packets" lineno="94567">
<summary>
Send and receive whois_server packets.
</summary>
@@ -69097,7 +69181,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94565">
+<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94583">
<summary>
Do not audit attempts to send and receive whois_server packets.
</summary>
@@ -69108,7 +69192,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_whois_server_packets" lineno="94580">
+<interface name="corenet_relabelto_whois_server_packets" lineno="94598">
<summary>
Relabel packets to whois_server the packet type.
</summary>
@@ -69118,7 +69202,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94602">
+<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94620">
<summary>
Send and receive TCP traffic on the winshadow port.
</summary>
@@ -69129,7 +69213,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_winshadow_port" lineno="94617">
+<interface name="corenet_udp_send_winshadow_port" lineno="94635">
<summary>
Send UDP traffic on the winshadow port.
</summary>
@@ -69140,7 +69224,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94632">
+<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94650">
<summary>
Do not audit attempts to send UDP traffic on the winshadow port.
</summary>
@@ -69151,7 +69235,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_winshadow_port" lineno="94647">
+<interface name="corenet_udp_receive_winshadow_port" lineno="94665">
<summary>
Receive UDP traffic on the winshadow port.
</summary>
@@ -69162,7 +69246,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94662">
+<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94680">
<summary>
Do not audit attempts to receive UDP traffic on the winshadow port.
</summary>
@@ -69173,7 +69257,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94677">
+<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94695">
<summary>
Send and receive UDP traffic on the winshadow port.
</summary>
@@ -69184,7 +69268,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94693">
+<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94711">
<summary>
Do not audit attempts to send and receive
UDP traffic on the winshadow port.
@@ -69196,7 +69280,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_winshadow_port" lineno="94708">
+<interface name="corenet_tcp_bind_winshadow_port" lineno="94726">
<summary>
Bind TCP sockets to the winshadow port.
</summary>
@@ -69207,7 +69291,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_winshadow_port" lineno="94728">
+<interface name="corenet_udp_bind_winshadow_port" lineno="94746">
<summary>
Bind UDP sockets to the winshadow port.
</summary>
@@ -69218,7 +69302,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_winshadow_port" lineno="94747">
+<interface name="corenet_tcp_connect_winshadow_port" lineno="94765">
<summary>
Make a TCP connection to the winshadow port.
</summary>
@@ -69228,7 +69312,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_winshadow_client_packets" lineno="94767">
+<interface name="corenet_send_winshadow_client_packets" lineno="94785">
<summary>
Send winshadow_client packets.
</summary>
@@ -69239,7 +69323,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94786">
+<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94804">
<summary>
Do not audit attempts to send winshadow_client packets.
</summary>
@@ -69250,7 +69334,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_winshadow_client_packets" lineno="94805">
+<interface name="corenet_receive_winshadow_client_packets" lineno="94823">
<summary>
Receive winshadow_client packets.
</summary>
@@ -69261,7 +69345,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94824">
+<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94842">
<summary>
Do not audit attempts to receive winshadow_client packets.
</summary>
@@ -69272,7 +69356,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94843">
+<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94861">
<summary>
Send and receive winshadow_client packets.
</summary>
@@ -69283,7 +69367,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94859">
+<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94877">
<summary>
Do not audit attempts to send and receive winshadow_client packets.
</summary>
@@ -69294,7 +69378,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_winshadow_client_packets" lineno="94874">
+<interface name="corenet_relabelto_winshadow_client_packets" lineno="94892">
<summary>
Relabel packets to winshadow_client the packet type.
</summary>
@@ -69304,7 +69388,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_winshadow_server_packets" lineno="94894">
+<interface name="corenet_send_winshadow_server_packets" lineno="94912">
<summary>
Send winshadow_server packets.
</summary>
@@ -69315,7 +69399,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94913">
+<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94931">
<summary>
Do not audit attempts to send winshadow_server packets.
</summary>
@@ -69326,7 +69410,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_winshadow_server_packets" lineno="94932">
+<interface name="corenet_receive_winshadow_server_packets" lineno="94950">
<summary>
Receive winshadow_server packets.
</summary>
@@ -69337,7 +69421,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94951">
+<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94969">
<summary>
Do not audit attempts to receive winshadow_server packets.
</summary>
@@ -69348,7 +69432,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94970">
+<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94988">
<summary>
Send and receive winshadow_server packets.
</summary>
@@ -69359,7 +69443,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="94986">
+<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="95004">
<summary>
Do not audit attempts to send and receive winshadow_server packets.
</summary>
@@ -69370,7 +69454,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_winshadow_server_packets" lineno="95001">
+<interface name="corenet_relabelto_winshadow_server_packets" lineno="95019">
<summary>
Relabel packets to winshadow_server the packet type.
</summary>
@@ -69380,7 +69464,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="95023">
+<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="95041">
<summary>
Send and receive TCP traffic on the wsdapi port.
</summary>
@@ -69391,7 +69475,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_wsdapi_port" lineno="95038">
+<interface name="corenet_udp_send_wsdapi_port" lineno="95056">
<summary>
Send UDP traffic on the wsdapi port.
</summary>
@@ -69402,7 +69486,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="95053">
+<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="95071">
<summary>
Do not audit attempts to send UDP traffic on the wsdapi port.
</summary>
@@ -69413,7 +69497,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_wsdapi_port" lineno="95068">
+<interface name="corenet_udp_receive_wsdapi_port" lineno="95086">
<summary>
Receive UDP traffic on the wsdapi port.
</summary>
@@ -69424,7 +69508,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="95083">
+<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="95101">
<summary>
Do not audit attempts to receive UDP traffic on the wsdapi port.
</summary>
@@ -69435,7 +69519,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="95098">
+<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="95116">
<summary>
Send and receive UDP traffic on the wsdapi port.
</summary>
@@ -69446,7 +69530,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="95114">
+<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="95132">
<summary>
Do not audit attempts to send and receive
UDP traffic on the wsdapi port.
@@ -69458,7 +69542,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_wsdapi_port" lineno="95129">
+<interface name="corenet_tcp_bind_wsdapi_port" lineno="95147">
<summary>
Bind TCP sockets to the wsdapi port.
</summary>
@@ -69469,7 +69553,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_wsdapi_port" lineno="95149">
+<interface name="corenet_udp_bind_wsdapi_port" lineno="95167">
<summary>
Bind UDP sockets to the wsdapi port.
</summary>
@@ -69480,7 +69564,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_wsdapi_port" lineno="95168">
+<interface name="corenet_tcp_connect_wsdapi_port" lineno="95186">
<summary>
Make a TCP connection to the wsdapi port.
</summary>
@@ -69490,7 +69574,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsdapi_client_packets" lineno="95188">
+<interface name="corenet_send_wsdapi_client_packets" lineno="95206">
<summary>
Send wsdapi_client packets.
</summary>
@@ -69501,7 +69585,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="95207">
+<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="95225">
<summary>
Do not audit attempts to send wsdapi_client packets.
</summary>
@@ -69512,7 +69596,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsdapi_client_packets" lineno="95226">
+<interface name="corenet_receive_wsdapi_client_packets" lineno="95244">
<summary>
Receive wsdapi_client packets.
</summary>
@@ -69523,7 +69607,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="95245">
+<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="95263">
<summary>
Do not audit attempts to receive wsdapi_client packets.
</summary>
@@ -69534,7 +69618,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="95264">
+<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="95282">
<summary>
Send and receive wsdapi_client packets.
</summary>
@@ -69545,7 +69629,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="95280">
+<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="95298">
<summary>
Do not audit attempts to send and receive wsdapi_client packets.
</summary>
@@ -69556,7 +69640,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsdapi_client_packets" lineno="95295">
+<interface name="corenet_relabelto_wsdapi_client_packets" lineno="95313">
<summary>
Relabel packets to wsdapi_client the packet type.
</summary>
@@ -69566,7 +69650,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsdapi_server_packets" lineno="95315">
+<interface name="corenet_send_wsdapi_server_packets" lineno="95333">
<summary>
Send wsdapi_server packets.
</summary>
@@ -69577,7 +69661,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="95334">
+<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="95352">
<summary>
Do not audit attempts to send wsdapi_server packets.
</summary>
@@ -69588,7 +69672,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsdapi_server_packets" lineno="95353">
+<interface name="corenet_receive_wsdapi_server_packets" lineno="95371">
<summary>
Receive wsdapi_server packets.
</summary>
@@ -69599,7 +69683,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="95372">
+<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="95390">
<summary>
Do not audit attempts to receive wsdapi_server packets.
</summary>
@@ -69610,7 +69694,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="95391">
+<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="95409">
<summary>
Send and receive wsdapi_server packets.
</summary>
@@ -69621,7 +69705,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="95407">
+<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="95425">
<summary>
Do not audit attempts to send and receive wsdapi_server packets.
</summary>
@@ -69632,7 +69716,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95422">
+<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95440">
<summary>
Relabel packets to wsdapi_server the packet type.
</summary>
@@ -69642,7 +69726,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95444">
+<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95462">
<summary>
Send and receive TCP traffic on the wsicopy port.
</summary>
@@ -69653,7 +69737,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_wsicopy_port" lineno="95459">
+<interface name="corenet_udp_send_wsicopy_port" lineno="95477">
<summary>
Send UDP traffic on the wsicopy port.
</summary>
@@ -69664,7 +69748,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95474">
+<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95492">
<summary>
Do not audit attempts to send UDP traffic on the wsicopy port.
</summary>
@@ -69675,7 +69759,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_wsicopy_port" lineno="95489">
+<interface name="corenet_udp_receive_wsicopy_port" lineno="95507">
<summary>
Receive UDP traffic on the wsicopy port.
</summary>
@@ -69686,7 +69770,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95504">
+<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95522">
<summary>
Do not audit attempts to receive UDP traffic on the wsicopy port.
</summary>
@@ -69697,7 +69781,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95519">
+<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95537">
<summary>
Send and receive UDP traffic on the wsicopy port.
</summary>
@@ -69708,7 +69792,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95535">
+<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95553">
<summary>
Do not audit attempts to send and receive
UDP traffic on the wsicopy port.
@@ -69720,7 +69804,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_wsicopy_port" lineno="95550">
+<interface name="corenet_tcp_bind_wsicopy_port" lineno="95568">
<summary>
Bind TCP sockets to the wsicopy port.
</summary>
@@ -69731,7 +69815,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_wsicopy_port" lineno="95570">
+<interface name="corenet_udp_bind_wsicopy_port" lineno="95588">
<summary>
Bind UDP sockets to the wsicopy port.
</summary>
@@ -69742,7 +69826,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_wsicopy_port" lineno="95589">
+<interface name="corenet_tcp_connect_wsicopy_port" lineno="95607">
<summary>
Make a TCP connection to the wsicopy port.
</summary>
@@ -69752,7 +69836,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsicopy_client_packets" lineno="95609">
+<interface name="corenet_send_wsicopy_client_packets" lineno="95627">
<summary>
Send wsicopy_client packets.
</summary>
@@ -69763,7 +69847,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95628">
+<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95646">
<summary>
Do not audit attempts to send wsicopy_client packets.
</summary>
@@ -69774,7 +69858,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsicopy_client_packets" lineno="95647">
+<interface name="corenet_receive_wsicopy_client_packets" lineno="95665">
<summary>
Receive wsicopy_client packets.
</summary>
@@ -69785,7 +69869,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95666">
+<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95684">
<summary>
Do not audit attempts to receive wsicopy_client packets.
</summary>
@@ -69796,7 +69880,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95685">
+<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95703">
<summary>
Send and receive wsicopy_client packets.
</summary>
@@ -69807,7 +69891,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95701">
+<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95719">
<summary>
Do not audit attempts to send and receive wsicopy_client packets.
</summary>
@@ -69818,7 +69902,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95716">
+<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95734">
<summary>
Relabel packets to wsicopy_client the packet type.
</summary>
@@ -69828,7 +69912,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsicopy_server_packets" lineno="95736">
+<interface name="corenet_send_wsicopy_server_packets" lineno="95754">
<summary>
Send wsicopy_server packets.
</summary>
@@ -69839,7 +69923,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95755">
+<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95773">
<summary>
Do not audit attempts to send wsicopy_server packets.
</summary>
@@ -69850,7 +69934,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsicopy_server_packets" lineno="95774">
+<interface name="corenet_receive_wsicopy_server_packets" lineno="95792">
<summary>
Receive wsicopy_server packets.
</summary>
@@ -69861,7 +69945,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95793">
+<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95811">
<summary>
Do not audit attempts to receive wsicopy_server packets.
</summary>
@@ -69872,7 +69956,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95812">
+<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95830">
<summary>
Send and receive wsicopy_server packets.
</summary>
@@ -69883,7 +69967,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95828">
+<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95846">
<summary>
Do not audit attempts to send and receive wsicopy_server packets.
</summary>
@@ -69894,7 +69978,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95843">
+<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95861">
<summary>
Relabel packets to wsicopy_server the packet type.
</summary>
@@ -69904,7 +69988,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95865">
+<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95883">
<summary>
Send and receive TCP traffic on the xdmcp port.
</summary>
@@ -69915,7 +69999,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_xdmcp_port" lineno="95880">
+<interface name="corenet_udp_send_xdmcp_port" lineno="95898">
<summary>
Send UDP traffic on the xdmcp port.
</summary>
@@ -69926,7 +70010,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95895">
+<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95913">
<summary>
Do not audit attempts to send UDP traffic on the xdmcp port.
</summary>
@@ -69937,7 +70021,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_xdmcp_port" lineno="95910">
+<interface name="corenet_udp_receive_xdmcp_port" lineno="95928">
<summary>
Receive UDP traffic on the xdmcp port.
</summary>
@@ -69948,7 +70032,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95925">
+<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95943">
<summary>
Do not audit attempts to receive UDP traffic on the xdmcp port.
</summary>
@@ -69959,7 +70043,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95940">
+<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95958">
<summary>
Send and receive UDP traffic on the xdmcp port.
</summary>
@@ -69970,7 +70054,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95956">
+<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95974">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xdmcp port.
@@ -69982,7 +70066,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_xdmcp_port" lineno="95971">
+<interface name="corenet_tcp_bind_xdmcp_port" lineno="95989">
<summary>
Bind TCP sockets to the xdmcp port.
</summary>
@@ -69993,7 +70077,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xdmcp_port" lineno="95991">
+<interface name="corenet_udp_bind_xdmcp_port" lineno="96009">
<summary>
Bind UDP sockets to the xdmcp port.
</summary>
@@ -70004,7 +70088,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xdmcp_port" lineno="96010">
+<interface name="corenet_tcp_connect_xdmcp_port" lineno="96028">
<summary>
Make a TCP connection to the xdmcp port.
</summary>
@@ -70014,7 +70098,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xdmcp_client_packets" lineno="96030">
+<interface name="corenet_send_xdmcp_client_packets" lineno="96048">
<summary>
Send xdmcp_client packets.
</summary>
@@ -70025,7 +70109,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="96049">
+<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="96067">
<summary>
Do not audit attempts to send xdmcp_client packets.
</summary>
@@ -70036,7 +70120,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xdmcp_client_packets" lineno="96068">
+<interface name="corenet_receive_xdmcp_client_packets" lineno="96086">
<summary>
Receive xdmcp_client packets.
</summary>
@@ -70047,7 +70131,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="96087">
+<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="96105">
<summary>
Do not audit attempts to receive xdmcp_client packets.
</summary>
@@ -70058,7 +70142,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="96106">
+<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="96124">
<summary>
Send and receive xdmcp_client packets.
</summary>
@@ -70069,7 +70153,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="96122">
+<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="96140">
<summary>
Do not audit attempts to send and receive xdmcp_client packets.
</summary>
@@ -70080,7 +70164,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xdmcp_client_packets" lineno="96137">
+<interface name="corenet_relabelto_xdmcp_client_packets" lineno="96155">
<summary>
Relabel packets to xdmcp_client the packet type.
</summary>
@@ -70090,7 +70174,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xdmcp_server_packets" lineno="96157">
+<interface name="corenet_send_xdmcp_server_packets" lineno="96175">
<summary>
Send xdmcp_server packets.
</summary>
@@ -70101,7 +70185,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="96176">
+<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="96194">
<summary>
Do not audit attempts to send xdmcp_server packets.
</summary>
@@ -70112,7 +70196,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xdmcp_server_packets" lineno="96195">
+<interface name="corenet_receive_xdmcp_server_packets" lineno="96213">
<summary>
Receive xdmcp_server packets.
</summary>
@@ -70123,7 +70207,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="96214">
+<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="96232">
<summary>
Do not audit attempts to receive xdmcp_server packets.
</summary>
@@ -70134,7 +70218,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="96233">
+<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="96251">
<summary>
Send and receive xdmcp_server packets.
</summary>
@@ -70145,7 +70229,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="96249">
+<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="96267">
<summary>
Do not audit attempts to send and receive xdmcp_server packets.
</summary>
@@ -70156,7 +70240,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xdmcp_server_packets" lineno="96264">
+<interface name="corenet_relabelto_xdmcp_server_packets" lineno="96282">
<summary>
Relabel packets to xdmcp_server the packet type.
</summary>
@@ -70166,7 +70250,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xen_port" lineno="96286">
+<interface name="corenet_tcp_sendrecv_xen_port" lineno="96304">
<summary>
Send and receive TCP traffic on the xen port.
</summary>
@@ -70177,7 +70261,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_xen_port" lineno="96301">
+<interface name="corenet_udp_send_xen_port" lineno="96319">
<summary>
Send UDP traffic on the xen port.
</summary>
@@ -70188,7 +70272,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_xen_port" lineno="96316">
+<interface name="corenet_dontaudit_udp_send_xen_port" lineno="96334">
<summary>
Do not audit attempts to send UDP traffic on the xen port.
</summary>
@@ -70199,7 +70283,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_xen_port" lineno="96331">
+<interface name="corenet_udp_receive_xen_port" lineno="96349">
<summary>
Receive UDP traffic on the xen port.
</summary>
@@ -70210,7 +70294,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="96346">
+<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="96364">
<summary>
Do not audit attempts to receive UDP traffic on the xen port.
</summary>
@@ -70221,7 +70305,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_xen_port" lineno="96361">
+<interface name="corenet_udp_sendrecv_xen_port" lineno="96379">
<summary>
Send and receive UDP traffic on the xen port.
</summary>
@@ -70232,7 +70316,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="96377">
+<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="96395">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xen port.
@@ -70244,7 +70328,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_xen_port" lineno="96392">
+<interface name="corenet_tcp_bind_xen_port" lineno="96410">
<summary>
Bind TCP sockets to the xen port.
</summary>
@@ -70255,7 +70339,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xen_port" lineno="96412">
+<interface name="corenet_udp_bind_xen_port" lineno="96430">
<summary>
Bind UDP sockets to the xen port.
</summary>
@@ -70266,7 +70350,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xen_port" lineno="96431">
+<interface name="corenet_tcp_connect_xen_port" lineno="96449">
<summary>
Make a TCP connection to the xen port.
</summary>
@@ -70276,7 +70360,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xen_client_packets" lineno="96451">
+<interface name="corenet_send_xen_client_packets" lineno="96469">
<summary>
Send xen_client packets.
</summary>
@@ -70287,7 +70371,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96470">
+<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96488">
<summary>
Do not audit attempts to send xen_client packets.
</summary>
@@ -70298,7 +70382,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xen_client_packets" lineno="96489">
+<interface name="corenet_receive_xen_client_packets" lineno="96507">
<summary>
Receive xen_client packets.
</summary>
@@ -70309,7 +70393,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96508">
+<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96526">
<summary>
Do not audit attempts to receive xen_client packets.
</summary>
@@ -70320,7 +70404,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xen_client_packets" lineno="96527">
+<interface name="corenet_sendrecv_xen_client_packets" lineno="96545">
<summary>
Send and receive xen_client packets.
</summary>
@@ -70331,7 +70415,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96543">
+<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96561">
<summary>
Do not audit attempts to send and receive xen_client packets.
</summary>
@@ -70342,7 +70426,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xen_client_packets" lineno="96558">
+<interface name="corenet_relabelto_xen_client_packets" lineno="96576">
<summary>
Relabel packets to xen_client the packet type.
</summary>
@@ -70352,7 +70436,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xen_server_packets" lineno="96578">
+<interface name="corenet_send_xen_server_packets" lineno="96596">
<summary>
Send xen_server packets.
</summary>
@@ -70363,7 +70447,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96597">
+<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96615">
<summary>
Do not audit attempts to send xen_server packets.
</summary>
@@ -70374,7 +70458,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xen_server_packets" lineno="96616">
+<interface name="corenet_receive_xen_server_packets" lineno="96634">
<summary>
Receive xen_server packets.
</summary>
@@ -70385,7 +70469,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96635">
+<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96653">
<summary>
Do not audit attempts to receive xen_server packets.
</summary>
@@ -70396,7 +70480,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xen_server_packets" lineno="96654">
+<interface name="corenet_sendrecv_xen_server_packets" lineno="96672">
<summary>
Send and receive xen_server packets.
</summary>
@@ -70407,7 +70491,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96670">
+<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96688">
<summary>
Do not audit attempts to send and receive xen_server packets.
</summary>
@@ -70418,7 +70502,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xen_server_packets" lineno="96685">
+<interface name="corenet_relabelto_xen_server_packets" lineno="96703">
<summary>
Relabel packets to xen_server the packet type.
</summary>
@@ -70428,7 +70512,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96707">
+<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96725">
<summary>
Send and receive TCP traffic on the xfs port.
</summary>
@@ -70439,7 +70523,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_xfs_port" lineno="96722">
+<interface name="corenet_udp_send_xfs_port" lineno="96740">
<summary>
Send UDP traffic on the xfs port.
</summary>
@@ -70450,7 +70534,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96737">
+<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96755">
<summary>
Do not audit attempts to send UDP traffic on the xfs port.
</summary>
@@ -70461,7 +70545,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_xfs_port" lineno="96752">
+<interface name="corenet_udp_receive_xfs_port" lineno="96770">
<summary>
Receive UDP traffic on the xfs port.
</summary>
@@ -70472,7 +70556,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96767">
+<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96785">
<summary>
Do not audit attempts to receive UDP traffic on the xfs port.
</summary>
@@ -70483,7 +70567,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_xfs_port" lineno="96782">
+<interface name="corenet_udp_sendrecv_xfs_port" lineno="96800">
<summary>
Send and receive UDP traffic on the xfs port.
</summary>
@@ -70494,7 +70578,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96798">
+<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96816">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xfs port.
@@ -70506,7 +70590,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_xfs_port" lineno="96813">
+<interface name="corenet_tcp_bind_xfs_port" lineno="96831">
<summary>
Bind TCP sockets to the xfs port.
</summary>
@@ -70517,7 +70601,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xfs_port" lineno="96833">
+<interface name="corenet_udp_bind_xfs_port" lineno="96851">
<summary>
Bind UDP sockets to the xfs port.
</summary>
@@ -70528,7 +70612,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xfs_port" lineno="96852">
+<interface name="corenet_tcp_connect_xfs_port" lineno="96870">
<summary>
Make a TCP connection to the xfs port.
</summary>
@@ -70538,7 +70622,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xfs_client_packets" lineno="96872">
+<interface name="corenet_send_xfs_client_packets" lineno="96890">
<summary>
Send xfs_client packets.
</summary>
@@ -70549,7 +70633,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96891">
+<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96909">
<summary>
Do not audit attempts to send xfs_client packets.
</summary>
@@ -70560,7 +70644,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xfs_client_packets" lineno="96910">
+<interface name="corenet_receive_xfs_client_packets" lineno="96928">
<summary>
Receive xfs_client packets.
</summary>
@@ -70571,7 +70655,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96929">
+<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96947">
<summary>
Do not audit attempts to receive xfs_client packets.
</summary>
@@ -70582,7 +70666,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xfs_client_packets" lineno="96948">
+<interface name="corenet_sendrecv_xfs_client_packets" lineno="96966">
<summary>
Send and receive xfs_client packets.
</summary>
@@ -70593,7 +70677,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96964">
+<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96982">
<summary>
Do not audit attempts to send and receive xfs_client packets.
</summary>
@@ -70604,7 +70688,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xfs_client_packets" lineno="96979">
+<interface name="corenet_relabelto_xfs_client_packets" lineno="96997">
<summary>
Relabel packets to xfs_client the packet type.
</summary>
@@ -70614,7 +70698,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xfs_server_packets" lineno="96999">
+<interface name="corenet_send_xfs_server_packets" lineno="97017">
<summary>
Send xfs_server packets.
</summary>
@@ -70625,7 +70709,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="97018">
+<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="97036">
<summary>
Do not audit attempts to send xfs_server packets.
</summary>
@@ -70636,7 +70720,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xfs_server_packets" lineno="97037">
+<interface name="corenet_receive_xfs_server_packets" lineno="97055">
<summary>
Receive xfs_server packets.
</summary>
@@ -70647,7 +70731,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="97056">
+<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="97074">
<summary>
Do not audit attempts to receive xfs_server packets.
</summary>
@@ -70658,7 +70742,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xfs_server_packets" lineno="97075">
+<interface name="corenet_sendrecv_xfs_server_packets" lineno="97093">
<summary>
Send and receive xfs_server packets.
</summary>
@@ -70669,7 +70753,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="97091">
+<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="97109">
<summary>
Do not audit attempts to send and receive xfs_server packets.
</summary>
@@ -70680,7 +70764,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xfs_server_packets" lineno="97106">
+<interface name="corenet_relabelto_xfs_server_packets" lineno="97124">
<summary>
Relabel packets to xfs_server the packet type.
</summary>
@@ -70690,7 +70774,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xserver_port" lineno="97128">
+<interface name="corenet_tcp_sendrecv_xserver_port" lineno="97146">
<summary>
Send and receive TCP traffic on the xserver port.
</summary>
@@ -70701,7 +70785,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_xserver_port" lineno="97143">
+<interface name="corenet_udp_send_xserver_port" lineno="97161">
<summary>
Send UDP traffic on the xserver port.
</summary>
@@ -70712,7 +70796,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="97158">
+<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="97176">
<summary>
Do not audit attempts to send UDP traffic on the xserver port.
</summary>
@@ -70723,7 +70807,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_xserver_port" lineno="97173">
+<interface name="corenet_udp_receive_xserver_port" lineno="97191">
<summary>
Receive UDP traffic on the xserver port.
</summary>
@@ -70734,7 +70818,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="97188">
+<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="97206">
<summary>
Do not audit attempts to receive UDP traffic on the xserver port.
</summary>
@@ -70745,7 +70829,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_xserver_port" lineno="97203">
+<interface name="corenet_udp_sendrecv_xserver_port" lineno="97221">
<summary>
Send and receive UDP traffic on the xserver port.
</summary>
@@ -70756,7 +70840,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="97219">
+<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="97237">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xserver port.
@@ -70768,7 +70852,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_xserver_port" lineno="97234">
+<interface name="corenet_tcp_bind_xserver_port" lineno="97252">
<summary>
Bind TCP sockets to the xserver port.
</summary>
@@ -70779,7 +70863,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xserver_port" lineno="97254">
+<interface name="corenet_udp_bind_xserver_port" lineno="97272">
<summary>
Bind UDP sockets to the xserver port.
</summary>
@@ -70790,7 +70874,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xserver_port" lineno="97273">
+<interface name="corenet_tcp_connect_xserver_port" lineno="97291">
<summary>
Make a TCP connection to the xserver port.
</summary>
@@ -70800,7 +70884,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xserver_client_packets" lineno="97293">
+<interface name="corenet_send_xserver_client_packets" lineno="97311">
<summary>
Send xserver_client packets.
</summary>
@@ -70811,7 +70895,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="97312">
+<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="97330">
<summary>
Do not audit attempts to send xserver_client packets.
</summary>
@@ -70822,7 +70906,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xserver_client_packets" lineno="97331">
+<interface name="corenet_receive_xserver_client_packets" lineno="97349">
<summary>
Receive xserver_client packets.
</summary>
@@ -70833,7 +70917,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="97350">
+<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="97368">
<summary>
Do not audit attempts to receive xserver_client packets.
</summary>
@@ -70844,7 +70928,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xserver_client_packets" lineno="97369">
+<interface name="corenet_sendrecv_xserver_client_packets" lineno="97387">
<summary>
Send and receive xserver_client packets.
</summary>
@@ -70855,7 +70939,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="97385">
+<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="97403">
<summary>
Do not audit attempts to send and receive xserver_client packets.
</summary>
@@ -70866,7 +70950,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xserver_client_packets" lineno="97400">
+<interface name="corenet_relabelto_xserver_client_packets" lineno="97418">
<summary>
Relabel packets to xserver_client the packet type.
</summary>
@@ -70876,7 +70960,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xserver_server_packets" lineno="97420">
+<interface name="corenet_send_xserver_server_packets" lineno="97438">
<summary>
Send xserver_server packets.
</summary>
@@ -70887,7 +70971,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97439">
+<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97457">
<summary>
Do not audit attempts to send xserver_server packets.
</summary>
@@ -70898,7 +70982,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xserver_server_packets" lineno="97458">
+<interface name="corenet_receive_xserver_server_packets" lineno="97476">
<summary>
Receive xserver_server packets.
</summary>
@@ -70909,7 +70993,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97477">
+<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97495">
<summary>
Do not audit attempts to receive xserver_server packets.
</summary>
@@ -70920,7 +71004,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xserver_server_packets" lineno="97496">
+<interface name="corenet_sendrecv_xserver_server_packets" lineno="97514">
<summary>
Send and receive xserver_server packets.
</summary>
@@ -70931,7 +71015,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97512">
+<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97530">
<summary>
Do not audit attempts to send and receive xserver_server packets.
</summary>
@@ -70942,7 +71026,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xserver_server_packets" lineno="97527">
+<interface name="corenet_relabelto_xserver_server_packets" lineno="97545">
<summary>
Relabel packets to xserver_server the packet type.
</summary>
@@ -70952,7 +71036,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97549">
+<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97567">
<summary>
Send and receive TCP traffic on the zarafa port.
</summary>
@@ -70963,7 +71047,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zarafa_port" lineno="97564">
+<interface name="corenet_udp_send_zarafa_port" lineno="97582">
<summary>
Send UDP traffic on the zarafa port.
</summary>
@@ -70974,7 +71058,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97579">
+<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97597">
<summary>
Do not audit attempts to send UDP traffic on the zarafa port.
</summary>
@@ -70985,7 +71069,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zarafa_port" lineno="97594">
+<interface name="corenet_udp_receive_zarafa_port" lineno="97612">
<summary>
Receive UDP traffic on the zarafa port.
</summary>
@@ -70996,7 +71080,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97609">
+<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97627">
<summary>
Do not audit attempts to receive UDP traffic on the zarafa port.
</summary>
@@ -71007,7 +71091,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97624">
+<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97642">
<summary>
Send and receive UDP traffic on the zarafa port.
</summary>
@@ -71018,7 +71102,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97640">
+<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97658">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zarafa port.
@@ -71030,7 +71114,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zarafa_port" lineno="97655">
+<interface name="corenet_tcp_bind_zarafa_port" lineno="97673">
<summary>
Bind TCP sockets to the zarafa port.
</summary>
@@ -71041,7 +71125,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zarafa_port" lineno="97675">
+<interface name="corenet_udp_bind_zarafa_port" lineno="97693">
<summary>
Bind UDP sockets to the zarafa port.
</summary>
@@ -71052,7 +71136,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zarafa_port" lineno="97694">
+<interface name="corenet_tcp_connect_zarafa_port" lineno="97712">
<summary>
Make a TCP connection to the zarafa port.
</summary>
@@ -71062,7 +71146,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zarafa_client_packets" lineno="97714">
+<interface name="corenet_send_zarafa_client_packets" lineno="97732">
<summary>
Send zarafa_client packets.
</summary>
@@ -71073,7 +71157,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97733">
+<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97751">
<summary>
Do not audit attempts to send zarafa_client packets.
</summary>
@@ -71084,7 +71168,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zarafa_client_packets" lineno="97752">
+<interface name="corenet_receive_zarafa_client_packets" lineno="97770">
<summary>
Receive zarafa_client packets.
</summary>
@@ -71095,7 +71179,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97771">
+<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97789">
<summary>
Do not audit attempts to receive zarafa_client packets.
</summary>
@@ -71106,7 +71190,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97790">
+<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97808">
<summary>
Send and receive zarafa_client packets.
</summary>
@@ -71117,7 +71201,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97806">
+<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97824">
<summary>
Do not audit attempts to send and receive zarafa_client packets.
</summary>
@@ -71128,7 +71212,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zarafa_client_packets" lineno="97821">
+<interface name="corenet_relabelto_zarafa_client_packets" lineno="97839">
<summary>
Relabel packets to zarafa_client the packet type.
</summary>
@@ -71138,7 +71222,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zarafa_server_packets" lineno="97841">
+<interface name="corenet_send_zarafa_server_packets" lineno="97859">
<summary>
Send zarafa_server packets.
</summary>
@@ -71149,7 +71233,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97860">
+<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97878">
<summary>
Do not audit attempts to send zarafa_server packets.
</summary>
@@ -71160,7 +71244,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zarafa_server_packets" lineno="97879">
+<interface name="corenet_receive_zarafa_server_packets" lineno="97897">
<summary>
Receive zarafa_server packets.
</summary>
@@ -71171,7 +71255,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97898">
+<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97916">
<summary>
Do not audit attempts to receive zarafa_server packets.
</summary>
@@ -71182,7 +71266,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97917">
+<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97935">
<summary>
Send and receive zarafa_server packets.
</summary>
@@ -71193,7 +71277,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97933">
+<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97951">
<summary>
Do not audit attempts to send and receive zarafa_server packets.
</summary>
@@ -71204,7 +71288,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zarafa_server_packets" lineno="97948">
+<interface name="corenet_relabelto_zarafa_server_packets" lineno="97966">
<summary>
Relabel packets to zarafa_server the packet type.
</summary>
@@ -71214,7 +71298,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97970">
+<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97988">
<summary>
Send and receive TCP traffic on the zabbix port.
</summary>
@@ -71225,7 +71309,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zabbix_port" lineno="97985">
+<interface name="corenet_udp_send_zabbix_port" lineno="98003">
<summary>
Send UDP traffic on the zabbix port.
</summary>
@@ -71236,7 +71320,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="98000">
+<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="98018">
<summary>
Do not audit attempts to send UDP traffic on the zabbix port.
</summary>
@@ -71247,7 +71331,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zabbix_port" lineno="98015">
+<interface name="corenet_udp_receive_zabbix_port" lineno="98033">
<summary>
Receive UDP traffic on the zabbix port.
</summary>
@@ -71258,7 +71342,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="98030">
+<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="98048">
<summary>
Do not audit attempts to receive UDP traffic on the zabbix port.
</summary>
@@ -71269,7 +71353,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zabbix_port" lineno="98045">
+<interface name="corenet_udp_sendrecv_zabbix_port" lineno="98063">
<summary>
Send and receive UDP traffic on the zabbix port.
</summary>
@@ -71280,7 +71364,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="98061">
+<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="98079">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zabbix port.
@@ -71292,7 +71376,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zabbix_port" lineno="98076">
+<interface name="corenet_tcp_bind_zabbix_port" lineno="98094">
<summary>
Bind TCP sockets to the zabbix port.
</summary>
@@ -71303,7 +71387,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zabbix_port" lineno="98096">
+<interface name="corenet_udp_bind_zabbix_port" lineno="98114">
<summary>
Bind UDP sockets to the zabbix port.
</summary>
@@ -71314,7 +71398,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zabbix_port" lineno="98115">
+<interface name="corenet_tcp_connect_zabbix_port" lineno="98133">
<summary>
Make a TCP connection to the zabbix port.
</summary>
@@ -71324,7 +71408,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_client_packets" lineno="98135">
+<interface name="corenet_send_zabbix_client_packets" lineno="98153">
<summary>
Send zabbix_client packets.
</summary>
@@ -71335,7 +71419,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="98154">
+<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="98172">
<summary>
Do not audit attempts to send zabbix_client packets.
</summary>
@@ -71346,7 +71430,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_client_packets" lineno="98173">
+<interface name="corenet_receive_zabbix_client_packets" lineno="98191">
<summary>
Receive zabbix_client packets.
</summary>
@@ -71357,7 +71441,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="98192">
+<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="98210">
<summary>
Do not audit attempts to receive zabbix_client packets.
</summary>
@@ -71368,7 +71452,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_client_packets" lineno="98211">
+<interface name="corenet_sendrecv_zabbix_client_packets" lineno="98229">
<summary>
Send and receive zabbix_client packets.
</summary>
@@ -71379,7 +71463,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="98227">
+<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="98245">
<summary>
Do not audit attempts to send and receive zabbix_client packets.
</summary>
@@ -71390,7 +71474,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_client_packets" lineno="98242">
+<interface name="corenet_relabelto_zabbix_client_packets" lineno="98260">
<summary>
Relabel packets to zabbix_client the packet type.
</summary>
@@ -71400,7 +71484,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_server_packets" lineno="98262">
+<interface name="corenet_send_zabbix_server_packets" lineno="98280">
<summary>
Send zabbix_server packets.
</summary>
@@ -71411,7 +71495,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="98281">
+<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="98299">
<summary>
Do not audit attempts to send zabbix_server packets.
</summary>
@@ -71422,7 +71506,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_server_packets" lineno="98300">
+<interface name="corenet_receive_zabbix_server_packets" lineno="98318">
<summary>
Receive zabbix_server packets.
</summary>
@@ -71433,7 +71517,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="98319">
+<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="98337">
<summary>
Do not audit attempts to receive zabbix_server packets.
</summary>
@@ -71444,7 +71528,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_server_packets" lineno="98338">
+<interface name="corenet_sendrecv_zabbix_server_packets" lineno="98356">
<summary>
Send and receive zabbix_server packets.
</summary>
@@ -71455,7 +71539,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="98354">
+<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="98372">
<summary>
Do not audit attempts to send and receive zabbix_server packets.
</summary>
@@ -71466,7 +71550,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_server_packets" lineno="98369">
+<interface name="corenet_relabelto_zabbix_server_packets" lineno="98387">
<summary>
Relabel packets to zabbix_server the packet type.
</summary>
@@ -71476,7 +71560,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="98391">
+<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="98409">
<summary>
Send and receive TCP traffic on the zabbix_agent port.
</summary>
@@ -71487,7 +71571,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zabbix_agent_port" lineno="98406">
+<interface name="corenet_udp_send_zabbix_agent_port" lineno="98424">
<summary>
Send UDP traffic on the zabbix_agent port.
</summary>
@@ -71498,7 +71582,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98421">
+<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98439">
<summary>
Do not audit attempts to send UDP traffic on the zabbix_agent port.
</summary>
@@ -71509,7 +71593,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98436">
+<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98454">
<summary>
Receive UDP traffic on the zabbix_agent port.
</summary>
@@ -71520,7 +71604,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98451">
+<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98469">
<summary>
Do not audit attempts to receive UDP traffic on the zabbix_agent port.
</summary>
@@ -71531,7 +71615,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98466">
+<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98484">
<summary>
Send and receive UDP traffic on the zabbix_agent port.
</summary>
@@ -71542,7 +71626,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98482">
+<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98500">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zabbix_agent port.
@@ -71554,7 +71638,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98497">
+<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98515">
<summary>
Bind TCP sockets to the zabbix_agent port.
</summary>
@@ -71565,7 +71649,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98517">
+<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98535">
<summary>
Bind UDP sockets to the zabbix_agent port.
</summary>
@@ -71576,7 +71660,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98536">
+<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98554">
<summary>
Make a TCP connection to the zabbix_agent port.
</summary>
@@ -71586,7 +71670,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_agent_client_packets" lineno="98556">
+<interface name="corenet_send_zabbix_agent_client_packets" lineno="98574">
<summary>
Send zabbix_agent_client packets.
</summary>
@@ -71597,7 +71681,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98575">
+<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98593">
<summary>
Do not audit attempts to send zabbix_agent_client packets.
</summary>
@@ -71608,7 +71692,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98594">
+<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98612">
<summary>
Receive zabbix_agent_client packets.
</summary>
@@ -71619,7 +71703,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98613">
+<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98631">
<summary>
Do not audit attempts to receive zabbix_agent_client packets.
</summary>
@@ -71630,7 +71714,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98632">
+<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98650">
<summary>
Send and receive zabbix_agent_client packets.
</summary>
@@ -71641,7 +71725,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98648">
+<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98666">
<summary>
Do not audit attempts to send and receive zabbix_agent_client packets.
</summary>
@@ -71652,7 +71736,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98663">
+<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98681">
<summary>
Relabel packets to zabbix_agent_client the packet type.
</summary>
@@ -71662,7 +71746,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_agent_server_packets" lineno="98683">
+<interface name="corenet_send_zabbix_agent_server_packets" lineno="98701">
<summary>
Send zabbix_agent_server packets.
</summary>
@@ -71673,7 +71757,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98702">
+<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98720">
<summary>
Do not audit attempts to send zabbix_agent_server packets.
</summary>
@@ -71684,7 +71768,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98721">
+<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98739">
<summary>
Receive zabbix_agent_server packets.
</summary>
@@ -71695,7 +71779,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98740">
+<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98758">
<summary>
Do not audit attempts to receive zabbix_agent_server packets.
</summary>
@@ -71706,7 +71790,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98759">
+<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98777">
<summary>
Send and receive zabbix_agent_server packets.
</summary>
@@ -71717,7 +71801,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98775">
+<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98793">
<summary>
Do not audit attempts to send and receive zabbix_agent_server packets.
</summary>
@@ -71728,7 +71812,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98790">
+<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98808">
<summary>
Relabel packets to zabbix_agent_server the packet type.
</summary>
@@ -71738,7 +71822,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98812">
+<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98830">
<summary>
Send and receive TCP traffic on the zookeeper_client port.
</summary>
@@ -71749,7 +71833,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zookeeper_client_port" lineno="98827">
+<interface name="corenet_udp_send_zookeeper_client_port" lineno="98845">
<summary>
Send UDP traffic on the zookeeper_client port.
</summary>
@@ -71760,7 +71844,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98842">
+<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98860">
<summary>
Do not audit attempts to send UDP traffic on the zookeeper_client port.
</summary>
@@ -71771,7 +71855,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98857">
+<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98875">
<summary>
Receive UDP traffic on the zookeeper_client port.
</summary>
@@ -71782,7 +71866,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98872">
+<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98890">
<summary>
Do not audit attempts to receive UDP traffic on the zookeeper_client port.
</summary>
@@ -71793,7 +71877,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98887">
+<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98905">
<summary>
Send and receive UDP traffic on the zookeeper_client port.
</summary>
@@ -71804,7 +71888,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98903">
+<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98921">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zookeeper_client port.
@@ -71816,7 +71900,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98918">
+<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98936">
<summary>
Bind TCP sockets to the zookeeper_client port.
</summary>
@@ -71827,7 +71911,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98938">
+<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98956">
<summary>
Bind UDP sockets to the zookeeper_client port.
</summary>
@@ -71838,7 +71922,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98957">
+<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98975">
<summary>
Make a TCP connection to the zookeeper_client port.
</summary>
@@ -71848,7 +71932,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_client_client_packets" lineno="98977">
+<interface name="corenet_send_zookeeper_client_client_packets" lineno="98995">
<summary>
Send zookeeper_client_client packets.
</summary>
@@ -71859,7 +71943,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="98996">
+<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="99014">
<summary>
Do not audit attempts to send zookeeper_client_client packets.
</summary>
@@ -71870,7 +71954,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_client_client_packets" lineno="99015">
+<interface name="corenet_receive_zookeeper_client_client_packets" lineno="99033">
<summary>
Receive zookeeper_client_client packets.
</summary>
@@ -71881,7 +71965,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="99034">
+<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="99052">
<summary>
Do not audit attempts to receive zookeeper_client_client packets.
</summary>
@@ -71892,7 +71976,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="99053">
+<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="99071">
<summary>
Send and receive zookeeper_client_client packets.
</summary>
@@ -71903,7 +71987,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="99069">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="99087">
<summary>
Do not audit attempts to send and receive zookeeper_client_client packets.
</summary>
@@ -71914,7 +71998,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="99084">
+<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="99102">
<summary>
Relabel packets to zookeeper_client_client the packet type.
</summary>
@@ -71924,7 +72008,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_client_server_packets" lineno="99104">
+<interface name="corenet_send_zookeeper_client_server_packets" lineno="99122">
<summary>
Send zookeeper_client_server packets.
</summary>
@@ -71935,7 +72019,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="99123">
+<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="99141">
<summary>
Do not audit attempts to send zookeeper_client_server packets.
</summary>
@@ -71946,7 +72030,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_client_server_packets" lineno="99142">
+<interface name="corenet_receive_zookeeper_client_server_packets" lineno="99160">
<summary>
Receive zookeeper_client_server packets.
</summary>
@@ -71957,7 +72041,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="99161">
+<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="99179">
<summary>
Do not audit attempts to receive zookeeper_client_server packets.
</summary>
@@ -71968,7 +72052,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="99180">
+<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="99198">
<summary>
Send and receive zookeeper_client_server packets.
</summary>
@@ -71979,7 +72063,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="99196">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="99214">
<summary>
Do not audit attempts to send and receive zookeeper_client_server packets.
</summary>
@@ -71990,7 +72074,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="99211">
+<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="99229">
<summary>
Relabel packets to zookeeper_client_server the packet type.
</summary>
@@ -72000,7 +72084,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="99233">
+<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="99251">
<summary>
Send and receive TCP traffic on the zookeeper_election port.
</summary>
@@ -72011,7 +72095,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zookeeper_election_port" lineno="99248">
+<interface name="corenet_udp_send_zookeeper_election_port" lineno="99266">
<summary>
Send UDP traffic on the zookeeper_election port.
</summary>
@@ -72022,7 +72106,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="99263">
+<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="99281">
<summary>
Do not audit attempts to send UDP traffic on the zookeeper_election port.
</summary>
@@ -72033,7 +72117,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zookeeper_election_port" lineno="99278">
+<interface name="corenet_udp_receive_zookeeper_election_port" lineno="99296">
<summary>
Receive UDP traffic on the zookeeper_election port.
</summary>
@@ -72044,7 +72128,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="99293">
+<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="99311">
<summary>
Do not audit attempts to receive UDP traffic on the zookeeper_election port.
</summary>
@@ -72055,7 +72139,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="99308">
+<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="99326">
<summary>
Send and receive UDP traffic on the zookeeper_election port.
</summary>
@@ -72066,7 +72150,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="99324">
+<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="99342">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zookeeper_election port.
@@ -72078,7 +72162,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="99339">
+<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="99357">
<summary>
Bind TCP sockets to the zookeeper_election port.
</summary>
@@ -72089,7 +72173,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zookeeper_election_port" lineno="99359">
+<interface name="corenet_udp_bind_zookeeper_election_port" lineno="99377">
<summary>
Bind UDP sockets to the zookeeper_election port.
</summary>
@@ -72100,7 +72184,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="99378">
+<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="99396">
<summary>
Make a TCP connection to the zookeeper_election port.
</summary>
@@ -72110,7 +72194,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_election_client_packets" lineno="99398">
+<interface name="corenet_send_zookeeper_election_client_packets" lineno="99416">
<summary>
Send zookeeper_election_client packets.
</summary>
@@ -72121,7 +72205,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="99417">
+<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="99435">
<summary>
Do not audit attempts to send zookeeper_election_client packets.
</summary>
@@ -72132,7 +72216,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99436">
+<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99454">
<summary>
Receive zookeeper_election_client packets.
</summary>
@@ -72143,7 +72227,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99455">
+<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99473">
<summary>
Do not audit attempts to receive zookeeper_election_client packets.
</summary>
@@ -72154,7 +72238,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99474">
+<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99492">
<summary>
Send and receive zookeeper_election_client packets.
</summary>
@@ -72165,7 +72249,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99490">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99508">
<summary>
Do not audit attempts to send and receive zookeeper_election_client packets.
</summary>
@@ -72176,7 +72260,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99505">
+<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99523">
<summary>
Relabel packets to zookeeper_election_client the packet type.
</summary>
@@ -72186,7 +72270,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_election_server_packets" lineno="99525">
+<interface name="corenet_send_zookeeper_election_server_packets" lineno="99543">
<summary>
Send zookeeper_election_server packets.
</summary>
@@ -72197,7 +72281,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99544">
+<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99562">
<summary>
Do not audit attempts to send zookeeper_election_server packets.
</summary>
@@ -72208,7 +72292,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99563">
+<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99581">
<summary>
Receive zookeeper_election_server packets.
</summary>
@@ -72219,7 +72303,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99582">
+<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99600">
<summary>
Do not audit attempts to receive zookeeper_election_server packets.
</summary>
@@ -72230,7 +72314,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99601">
+<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99619">
<summary>
Send and receive zookeeper_election_server packets.
</summary>
@@ -72241,7 +72325,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99617">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99635">
<summary>
Do not audit attempts to send and receive zookeeper_election_server packets.
</summary>
@@ -72252,7 +72336,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99632">
+<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99650">
<summary>
Relabel packets to zookeeper_election_server the packet type.
</summary>
@@ -72262,7 +72346,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99654">
+<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99672">
<summary>
Send and receive TCP traffic on the zookeeper_leader port.
</summary>
@@ -72273,7 +72357,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99669">
+<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99687">
<summary>
Send UDP traffic on the zookeeper_leader port.
</summary>
@@ -72284,7 +72368,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99684">
+<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99702">
<summary>
Do not audit attempts to send UDP traffic on the zookeeper_leader port.
</summary>
@@ -72295,7 +72379,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99699">
+<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99717">
<summary>
Receive UDP traffic on the zookeeper_leader port.
</summary>
@@ -72306,7 +72390,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99714">
+<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99732">
<summary>
Do not audit attempts to receive UDP traffic on the zookeeper_leader port.
</summary>
@@ -72317,7 +72401,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99729">
+<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99747">
<summary>
Send and receive UDP traffic on the zookeeper_leader port.
</summary>
@@ -72328,7 +72412,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99745">
+<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99763">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zookeeper_leader port.
@@ -72340,7 +72424,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99760">
+<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99778">
<summary>
Bind TCP sockets to the zookeeper_leader port.
</summary>
@@ -72351,7 +72435,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99780">
+<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99798">
<summary>
Bind UDP sockets to the zookeeper_leader port.
</summary>
@@ -72362,7 +72446,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99799">
+<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99817">
<summary>
Make a TCP connection to the zookeeper_leader port.
</summary>
@@ -72372,7 +72456,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99819">
+<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99837">
<summary>
Send zookeeper_leader_client packets.
</summary>
@@ -72383,7 +72467,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99838">
+<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99856">
<summary>
Do not audit attempts to send zookeeper_leader_client packets.
</summary>
@@ -72394,7 +72478,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99857">
+<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99875">
<summary>
Receive zookeeper_leader_client packets.
</summary>
@@ -72405,7 +72489,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99876">
+<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99894">
<summary>
Do not audit attempts to receive zookeeper_leader_client packets.
</summary>
@@ -72416,7 +72500,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99895">
+<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99913">
<summary>
Send and receive zookeeper_leader_client packets.
</summary>
@@ -72427,7 +72511,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99911">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99929">
<summary>
Do not audit attempts to send and receive zookeeper_leader_client packets.
</summary>
@@ -72438,7 +72522,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99926">
+<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99944">
<summary>
Relabel packets to zookeeper_leader_client the packet type.
</summary>
@@ -72448,7 +72532,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99946">
+<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99964">
<summary>
Send zookeeper_leader_server packets.
</summary>
@@ -72459,7 +72543,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99965">
+<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99983">
<summary>
Do not audit attempts to send zookeeper_leader_server packets.
</summary>
@@ -72470,7 +72554,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="99984">
+<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="100002">
<summary>
Receive zookeeper_leader_server packets.
</summary>
@@ -72481,7 +72565,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="100003">
+<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="100021">
<summary>
Do not audit attempts to receive zookeeper_leader_server packets.
</summary>
@@ -72492,7 +72576,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="100022">
+<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="100040">
<summary>
Send and receive zookeeper_leader_server packets.
</summary>
@@ -72503,7 +72587,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="100038">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="100056">
<summary>
Do not audit attempts to send and receive zookeeper_leader_server packets.
</summary>
@@ -72514,7 +72598,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="100053">
+<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="100071">
<summary>
Relabel packets to zookeeper_leader_server the packet type.
</summary>
@@ -72524,7 +72608,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zebra_port" lineno="100075">
+<interface name="corenet_tcp_sendrecv_zebra_port" lineno="100093">
<summary>
Send and receive TCP traffic on the zebra port.
</summary>
@@ -72535,7 +72619,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zebra_port" lineno="100090">
+<interface name="corenet_udp_send_zebra_port" lineno="100108">
<summary>
Send UDP traffic on the zebra port.
</summary>
@@ -72546,7 +72630,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="100105">
+<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="100123">
<summary>
Do not audit attempts to send UDP traffic on the zebra port.
</summary>
@@ -72557,7 +72641,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zebra_port" lineno="100120">
+<interface name="corenet_udp_receive_zebra_port" lineno="100138">
<summary>
Receive UDP traffic on the zebra port.
</summary>
@@ -72568,7 +72652,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="100135">
+<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="100153">
<summary>
Do not audit attempts to receive UDP traffic on the zebra port.
</summary>
@@ -72579,7 +72663,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zebra_port" lineno="100150">
+<interface name="corenet_udp_sendrecv_zebra_port" lineno="100168">
<summary>
Send and receive UDP traffic on the zebra port.
</summary>
@@ -72590,7 +72674,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="100166">
+<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="100184">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zebra port.
@@ -72602,7 +72686,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zebra_port" lineno="100181">
+<interface name="corenet_tcp_bind_zebra_port" lineno="100199">
<summary>
Bind TCP sockets to the zebra port.
</summary>
@@ -72613,7 +72697,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zebra_port" lineno="100201">
+<interface name="corenet_udp_bind_zebra_port" lineno="100219">
<summary>
Bind UDP sockets to the zebra port.
</summary>
@@ -72624,7 +72708,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zebra_port" lineno="100220">
+<interface name="corenet_tcp_connect_zebra_port" lineno="100238">
<summary>
Make a TCP connection to the zebra port.
</summary>
@@ -72634,7 +72718,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zebra_client_packets" lineno="100240">
+<interface name="corenet_send_zebra_client_packets" lineno="100258">
<summary>
Send zebra_client packets.
</summary>
@@ -72645,7 +72729,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="100259">
+<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="100277">
<summary>
Do not audit attempts to send zebra_client packets.
</summary>
@@ -72656,7 +72740,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zebra_client_packets" lineno="100278">
+<interface name="corenet_receive_zebra_client_packets" lineno="100296">
<summary>
Receive zebra_client packets.
</summary>
@@ -72667,7 +72751,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="100297">
+<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="100315">
<summary>
Do not audit attempts to receive zebra_client packets.
</summary>
@@ -72678,7 +72762,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zebra_client_packets" lineno="100316">
+<interface name="corenet_sendrecv_zebra_client_packets" lineno="100334">
<summary>
Send and receive zebra_client packets.
</summary>
@@ -72689,7 +72773,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="100332">
+<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="100350">
<summary>
Do not audit attempts to send and receive zebra_client packets.
</summary>
@@ -72700,7 +72784,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zebra_client_packets" lineno="100347">
+<interface name="corenet_relabelto_zebra_client_packets" lineno="100365">
<summary>
Relabel packets to zebra_client the packet type.
</summary>
@@ -72710,7 +72794,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zebra_server_packets" lineno="100367">
+<interface name="corenet_send_zebra_server_packets" lineno="100385">
<summary>
Send zebra_server packets.
</summary>
@@ -72721,7 +72805,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="100386">
+<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="100404">
<summary>
Do not audit attempts to send zebra_server packets.
</summary>
@@ -72732,7 +72816,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zebra_server_packets" lineno="100405">
+<interface name="corenet_receive_zebra_server_packets" lineno="100423">
<summary>
Receive zebra_server packets.
</summary>
@@ -72743,7 +72827,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100424">
+<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100442">
<summary>
Do not audit attempts to receive zebra_server packets.
</summary>
@@ -72754,7 +72838,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zebra_server_packets" lineno="100443">
+<interface name="corenet_sendrecv_zebra_server_packets" lineno="100461">
<summary>
Send and receive zebra_server packets.
</summary>
@@ -72765,7 +72849,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100459">
+<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100477">
<summary>
Do not audit attempts to send and receive zebra_server packets.
</summary>
@@ -72776,7 +72860,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zebra_server_packets" lineno="100474">
+<interface name="corenet_relabelto_zebra_server_packets" lineno="100492">
<summary>
Relabel packets to zebra_server the packet type.
</summary>
@@ -72786,7 +72870,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zented_port" lineno="100496">
+<interface name="corenet_tcp_sendrecv_zented_port" lineno="100514">
<summary>
Send and receive TCP traffic on the zented port.
</summary>
@@ -72797,7 +72881,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zented_port" lineno="100511">
+<interface name="corenet_udp_send_zented_port" lineno="100529">
<summary>
Send UDP traffic on the zented port.
</summary>
@@ -72808,7 +72892,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100526">
+<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100544">
<summary>
Do not audit attempts to send UDP traffic on the zented port.
</summary>
@@ -72819,7 +72903,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zented_port" lineno="100541">
+<interface name="corenet_udp_receive_zented_port" lineno="100559">
<summary>
Receive UDP traffic on the zented port.
</summary>
@@ -72830,7 +72914,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100556">
+<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100574">
<summary>
Do not audit attempts to receive UDP traffic on the zented port.
</summary>
@@ -72841,7 +72925,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zented_port" lineno="100571">
+<interface name="corenet_udp_sendrecv_zented_port" lineno="100589">
<summary>
Send and receive UDP traffic on the zented port.
</summary>
@@ -72852,7 +72936,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100587">
+<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100605">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zented port.
@@ -72864,7 +72948,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zented_port" lineno="100602">
+<interface name="corenet_tcp_bind_zented_port" lineno="100620">
<summary>
Bind TCP sockets to the zented port.
</summary>
@@ -72875,7 +72959,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zented_port" lineno="100622">
+<interface name="corenet_udp_bind_zented_port" lineno="100640">
<summary>
Bind UDP sockets to the zented port.
</summary>
@@ -72886,7 +72970,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zented_port" lineno="100641">
+<interface name="corenet_tcp_connect_zented_port" lineno="100659">
<summary>
Make a TCP connection to the zented port.
</summary>
@@ -72896,7 +72980,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zented_client_packets" lineno="100661">
+<interface name="corenet_send_zented_client_packets" lineno="100679">
<summary>
Send zented_client packets.
</summary>
@@ -72907,7 +72991,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100680">
+<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100698">
<summary>
Do not audit attempts to send zented_client packets.
</summary>
@@ -72918,7 +73002,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zented_client_packets" lineno="100699">
+<interface name="corenet_receive_zented_client_packets" lineno="100717">
<summary>
Receive zented_client packets.
</summary>
@@ -72929,7 +73013,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100718">
+<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100736">
<summary>
Do not audit attempts to receive zented_client packets.
</summary>
@@ -72940,7 +73024,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zented_client_packets" lineno="100737">
+<interface name="corenet_sendrecv_zented_client_packets" lineno="100755">
<summary>
Send and receive zented_client packets.
</summary>
@@ -72951,7 +73035,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100753">
+<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100771">
<summary>
Do not audit attempts to send and receive zented_client packets.
</summary>
@@ -72962,7 +73046,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zented_client_packets" lineno="100768">
+<interface name="corenet_relabelto_zented_client_packets" lineno="100786">
<summary>
Relabel packets to zented_client the packet type.
</summary>
@@ -72972,7 +73056,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zented_server_packets" lineno="100788">
+<interface name="corenet_send_zented_server_packets" lineno="100806">
<summary>
Send zented_server packets.
</summary>
@@ -72983,7 +73067,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100807">
+<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100825">
<summary>
Do not audit attempts to send zented_server packets.
</summary>
@@ -72994,7 +73078,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zented_server_packets" lineno="100826">
+<interface name="corenet_receive_zented_server_packets" lineno="100844">
<summary>
Receive zented_server packets.
</summary>
@@ -73005,7 +73089,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100845">
+<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100863">
<summary>
Do not audit attempts to receive zented_server packets.
</summary>
@@ -73016,7 +73100,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zented_server_packets" lineno="100864">
+<interface name="corenet_sendrecv_zented_server_packets" lineno="100882">
<summary>
Send and receive zented_server packets.
</summary>
@@ -73027,7 +73111,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100880">
+<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100898">
<summary>
Do not audit attempts to send and receive zented_server packets.
</summary>
@@ -73038,7 +73122,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zented_server_packets" lineno="100895">
+<interface name="corenet_relabelto_zented_server_packets" lineno="100913">
<summary>
Relabel packets to zented_server the packet type.
</summary>
@@ -73048,7 +73132,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zope_port" lineno="100917">
+<interface name="corenet_tcp_sendrecv_zope_port" lineno="100935">
<summary>
Send and receive TCP traffic on the zope port.
</summary>
@@ -73059,7 +73143,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zope_port" lineno="100932">
+<interface name="corenet_udp_send_zope_port" lineno="100950">
<summary>
Send UDP traffic on the zope port.
</summary>
@@ -73070,7 +73154,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100947">
+<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100965">
<summary>
Do not audit attempts to send UDP traffic on the zope port.
</summary>
@@ -73081,7 +73165,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zope_port" lineno="100962">
+<interface name="corenet_udp_receive_zope_port" lineno="100980">
<summary>
Receive UDP traffic on the zope port.
</summary>
@@ -73092,7 +73176,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100977">
+<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100995">
<summary>
Do not audit attempts to receive UDP traffic on the zope port.
</summary>
@@ -73103,7 +73187,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zope_port" lineno="100992">
+<interface name="corenet_udp_sendrecv_zope_port" lineno="101010">
<summary>
Send and receive UDP traffic on the zope port.
</summary>
@@ -73114,7 +73198,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="101008">
+<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="101026">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zope port.
@@ -73126,7 +73210,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zope_port" lineno="101023">
+<interface name="corenet_tcp_bind_zope_port" lineno="101041">
<summary>
Bind TCP sockets to the zope port.
</summary>
@@ -73137,7 +73221,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zope_port" lineno="101043">
+<interface name="corenet_udp_bind_zope_port" lineno="101061">
<summary>
Bind UDP sockets to the zope port.
</summary>
@@ -73148,7 +73232,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zope_port" lineno="101062">
+<interface name="corenet_tcp_connect_zope_port" lineno="101080">
<summary>
Make a TCP connection to the zope port.
</summary>
@@ -73158,7 +73242,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zope_client_packets" lineno="101082">
+<interface name="corenet_send_zope_client_packets" lineno="101100">
<summary>
Send zope_client packets.
</summary>
@@ -73169,7 +73253,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zope_client_packets" lineno="101101">
+<interface name="corenet_dontaudit_send_zope_client_packets" lineno="101119">
<summary>
Do not audit attempts to send zope_client packets.
</summary>
@@ -73180,7 +73264,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zope_client_packets" lineno="101120">
+<interface name="corenet_receive_zope_client_packets" lineno="101138">
<summary>
Receive zope_client packets.
</summary>
@@ -73191,7 +73275,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="101139">
+<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="101157">
<summary>
Do not audit attempts to receive zope_client packets.
</summary>
@@ -73202,7 +73286,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zope_client_packets" lineno="101158">
+<interface name="corenet_sendrecv_zope_client_packets" lineno="101176">
<summary>
Send and receive zope_client packets.
</summary>
@@ -73213,7 +73297,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="101174">
+<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="101192">
<summary>
Do not audit attempts to send and receive zope_client packets.
</summary>
@@ -73224,7 +73308,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zope_client_packets" lineno="101189">
+<interface name="corenet_relabelto_zope_client_packets" lineno="101207">
<summary>
Relabel packets to zope_client the packet type.
</summary>
@@ -73234,7 +73318,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zope_server_packets" lineno="101209">
+<interface name="corenet_send_zope_server_packets" lineno="101227">
<summary>
Send zope_server packets.
</summary>
@@ -73245,7 +73329,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zope_server_packets" lineno="101228">
+<interface name="corenet_dontaudit_send_zope_server_packets" lineno="101246">
<summary>
Do not audit attempts to send zope_server packets.
</summary>
@@ -73256,7 +73340,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zope_server_packets" lineno="101247">
+<interface name="corenet_receive_zope_server_packets" lineno="101265">
<summary>
Receive zope_server packets.
</summary>
@@ -73267,7 +73351,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="101266">
+<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="101284">
<summary>
Do not audit attempts to receive zope_server packets.
</summary>
@@ -73278,7 +73362,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zope_server_packets" lineno="101285">
+<interface name="corenet_sendrecv_zope_server_packets" lineno="101303">
<summary>
Send and receive zope_server packets.
</summary>
@@ -73289,7 +73373,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="101301">
+<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="101319">
<summary>
Do not audit attempts to send and receive zope_server packets.
</summary>
@@ -73300,7 +73384,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zope_server_packets" lineno="101316">
+<interface name="corenet_relabelto_zope_server_packets" lineno="101334">
<summary>
Relabel packets to zope_server the packet type.
</summary>
@@ -73310,7 +73394,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lo_if" lineno="101339">
+<interface name="corenet_tcp_sendrecv_lo_if" lineno="101357">
<summary>
Send and receive TCP network traffic on the lo interface.
</summary>
@@ -73321,7 +73405,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_lo_if" lineno="101358">
+<interface name="corenet_udp_send_lo_if" lineno="101376">
<summary>
Send UDP network traffic on the lo interface.
</summary>
@@ -73332,7 +73416,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_udp_receive_lo_if" lineno="101377">
+<interface name="corenet_udp_receive_lo_if" lineno="101395">
<summary>
Receive UDP network traffic on the lo interface.
</summary>
@@ -73343,7 +73427,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_udp_sendrecv_lo_if" lineno="101396">
+<interface name="corenet_udp_sendrecv_lo_if" lineno="101414">
<summary>
Send and receive UDP network traffic on the lo interface.
</summary>
@@ -73354,7 +73438,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_raw_send_lo_if" lineno="101412">
+<interface name="corenet_raw_send_lo_if" lineno="101430">
<summary>
Send raw IP packets on the lo interface.
</summary>
@@ -73365,7 +73449,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_raw_receive_lo_if" lineno="101431">
+<interface name="corenet_raw_receive_lo_if" lineno="101449">
<summary>
Receive raw IP packets on the lo interface.
</summary>
@@ -73376,7 +73460,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_raw_sendrecv_lo_if" lineno="101450">
+<interface name="corenet_raw_sendrecv_lo_if" lineno="101468">
<summary>
Send and receive raw IP packets on the lo interface.
</summary>
@@ -74725,7 +74809,27 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_kmsg" lineno="2381">
+<interface name="dev_rw_hyperv_kvp" lineno="2381">
+<summary>
+Allow read/write the hypervkvp device
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_rw_hyperv_vss" lineno="2399">
+<summary>
+Allow read/write the hypervvssd device
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_read_kmsg" lineno="2417">
<summary>
Read the kernel messages
</summary>
@@ -74735,7 +74839,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_kmsg" lineno="2399">
+<interface name="dev_dontaudit_read_kmsg" lineno="2435">
<summary>
Do not audit attempts to read the kernel messages
</summary>
@@ -74745,7 +74849,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_kmsg" lineno="2417">
+<interface name="dev_write_kmsg" lineno="2453">
<summary>
Write to the kernel messages device
</summary>
@@ -74755,7 +74859,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_kmsg" lineno="2435">
+<interface name="dev_rw_kmsg" lineno="2471">
<summary>
Read and write to the kernel messages device
</summary>
@@ -74765,7 +74869,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mounton_kmsg" lineno="2453">
+<interface name="dev_mounton_kmsg" lineno="2489">
<summary>
Mount on the kernel messages device
</summary>
@@ -74775,7 +74879,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_ksm_dev" lineno="2471">
+<interface name="dev_getattr_ksm_dev" lineno="2507">
<summary>
Get the attributes of the ksm devices.
</summary>
@@ -74785,7 +74889,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_ksm_dev" lineno="2489">
+<interface name="dev_setattr_ksm_dev" lineno="2525">
<summary>
Set the attributes of the ksm devices.
</summary>
@@ -74795,7 +74899,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_ksm" lineno="2507">
+<interface name="dev_read_ksm" lineno="2543">
<summary>
Read the ksm devices.
</summary>
@@ -74805,7 +74909,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_ksm" lineno="2525">
+<interface name="dev_rw_ksm" lineno="2561">
<summary>
Read and write to ksm devices.
</summary>
@@ -74815,7 +74919,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_kvm_dev" lineno="2543">
+<interface name="dev_getattr_kvm_dev" lineno="2579">
<summary>
Get the attributes of the kvm devices.
</summary>
@@ -74825,7 +74929,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_kvm_dev" lineno="2561">
+<interface name="dev_setattr_kvm_dev" lineno="2597">
<summary>
Set the attributes of the kvm devices.
</summary>
@@ -74835,7 +74939,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_kvm" lineno="2579">
+<interface name="dev_read_kvm" lineno="2615">
<summary>
Read the kvm devices.
</summary>
@@ -74845,7 +74949,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_kvm" lineno="2597">
+<interface name="dev_rw_kvm" lineno="2633">
<summary>
Read and write to kvm devices.
</summary>
@@ -74855,7 +74959,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_lirc" lineno="2615">
+<interface name="dev_read_lirc" lineno="2651">
<summary>
Read the lirc device.
</summary>
@@ -74865,7 +74969,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_lirc" lineno="2633">
+<interface name="dev_rw_lirc" lineno="2669">
<summary>
Read and write the lirc device.
</summary>
@@ -74875,7 +74979,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_filetrans_lirc" lineno="2657">
+<interface name="dev_filetrans_lirc" lineno="2693">
<summary>
Automatic type transition to the type
for lirc device nodes when created in /dev.
@@ -74891,7 +74995,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dev_rw_loop_control" lineno="2675">
+<interface name="dev_rw_loop_control" lineno="2711">
<summary>
Read and write the loop-control device.
</summary>
@@ -74901,7 +75005,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_lvm_control" lineno="2693">
+<interface name="dev_getattr_lvm_control" lineno="2729">
<summary>
Get the attributes of the lvm comtrol device.
</summary>
@@ -74911,7 +75015,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_lvm_control" lineno="2711">
+<interface name="dev_read_lvm_control" lineno="2747">
<summary>
Read the lvm comtrol device.
</summary>
@@ -74921,7 +75025,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_lvm_control" lineno="2729">
+<interface name="dev_rw_lvm_control" lineno="2765">
<summary>
Read and write the lvm control device.
</summary>
@@ -74931,7 +75035,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_rw_lvm_control" lineno="2747">
+<interface name="dev_dontaudit_rw_lvm_control" lineno="2783">
<summary>
Do not audit attempts to read and write lvm control device.
</summary>
@@ -74941,7 +75045,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_delete_lvm_control_dev" lineno="2765">
+<interface name="dev_delete_lvm_control_dev" lineno="2801">
<summary>
Delete the lvm control device.
</summary>
@@ -74951,7 +75055,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_memory_dev" lineno="2783">
+<interface name="dev_dontaudit_getattr_memory_dev" lineno="2819">
<summary>
dontaudit getattr raw memory devices (e.g. /dev/mem).
</summary>
@@ -74961,7 +75065,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_raw_memory" lineno="2804">
+<interface name="dev_read_raw_memory" lineno="2840">
<summary>
Read raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -74974,7 +75078,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_raw_memory_cond" lineno="2834">
+<interface name="dev_read_raw_memory_cond" lineno="2870">
<summary>
Read raw memory devices (e.g. /dev/mem) if a tunable is set.
This is extremely dangerous as it can bypass the
@@ -74992,7 +75096,7 @@ Tunable to depend on
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_raw_memory" lineno="2861">
+<interface name="dev_dontaudit_read_raw_memory" lineno="2897">
<summary>
Do not audit attempts to read raw memory devices
(e.g. /dev/mem).
@@ -75006,7 +75110,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_raw_memory" lineno="2882">
+<interface name="dev_write_raw_memory" lineno="2918">
<summary>
Write raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -75019,7 +75123,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_raw_memory_cond" lineno="2912">
+<interface name="dev_write_raw_memory_cond" lineno="2948">
<summary>
Write raw memory devices (e.g. /dev/mem) if a tunable is set.
This is extremely dangerous as it can bypass the
@@ -75037,7 +75141,7 @@ Tunable to depend on
</summary>
</param>
</interface>
-<interface name="dev_rx_raw_memory" lineno="2938">
+<interface name="dev_rx_raw_memory" lineno="2974">
<summary>
Read and execute raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -75050,7 +75154,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_wx_raw_memory" lineno="2960">
+<interface name="dev_wx_raw_memory" lineno="2996">
<summary>
Write and execute raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -75063,7 +75167,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_wx_raw_memory_cond" lineno="2987">
+<interface name="dev_wx_raw_memory_cond" lineno="3023">
<summary>
Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set.
This is extremely dangerous as it can bypass the
@@ -75081,7 +75185,7 @@ Tunable to depend on
</summary>
</param>
</interface>
-<interface name="dev_getattr_misc_dev" lineno="3010">
+<interface name="dev_getattr_misc_dev" lineno="3046">
<summary>
Get the attributes of miscellaneous devices.
</summary>
@@ -75091,7 +75195,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_misc_dev" lineno="3029">
+<interface name="dev_dontaudit_getattr_misc_dev" lineno="3065">
<summary>
Do not audit attempts to get the attributes
of miscellaneous devices.
@@ -75102,7 +75206,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_misc_dev" lineno="3047">
+<interface name="dev_setattr_misc_dev" lineno="3083">
<summary>
Set the attributes of miscellaneous devices.
</summary>
@@ -75112,7 +75216,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_misc_dev" lineno="3066">
+<interface name="dev_dontaudit_setattr_misc_dev" lineno="3102">
<summary>
Do not audit attempts to set the attributes
of miscellaneous devices.
@@ -75123,7 +75227,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_misc" lineno="3084">
+<interface name="dev_read_misc" lineno="3120">
<summary>
Read miscellaneous devices.
</summary>
@@ -75133,7 +75237,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_misc" lineno="3102">
+<interface name="dev_write_misc" lineno="3138">
<summary>
Write miscellaneous devices.
</summary>
@@ -75143,7 +75247,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_rw_misc" lineno="3120">
+<interface name="dev_dontaudit_rw_misc" lineno="3156">
<summary>
Do not audit attempts to read and write miscellaneous devices.
</summary>
@@ -75153,7 +75257,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_modem_dev" lineno="3138">
+<interface name="dev_getattr_modem_dev" lineno="3174">
<summary>
Get the attributes of the modem devices.
</summary>
@@ -75163,7 +75267,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_modem_dev" lineno="3156">
+<interface name="dev_setattr_modem_dev" lineno="3192">
<summary>
Set the attributes of the modem devices.
</summary>
@@ -75173,7 +75277,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_modem" lineno="3174">
+<interface name="dev_read_modem" lineno="3210">
<summary>
Read the modem devices.
</summary>
@@ -75183,7 +75287,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_modem" lineno="3192">
+<interface name="dev_rw_modem" lineno="3228">
<summary>
Read and write to modem devices.
</summary>
@@ -75193,7 +75297,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_mouse_dev" lineno="3210">
+<interface name="dev_getattr_mouse_dev" lineno="3246">
<summary>
Get the attributes of the mouse devices.
</summary>
@@ -75203,7 +75307,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_mouse_dev" lineno="3228">
+<interface name="dev_setattr_mouse_dev" lineno="3264">
<summary>
Set the attributes of the mouse devices.
</summary>
@@ -75213,7 +75317,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_mouse" lineno="3246">
+<interface name="dev_read_mouse" lineno="3282">
<summary>
Read the mouse devices.
</summary>
@@ -75223,7 +75327,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_mouse" lineno="3264">
+<interface name="dev_rw_mouse" lineno="3300">
<summary>
Read and write to mouse devices.
</summary>
@@ -75233,7 +75337,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_mtrr_dev" lineno="3283">
+<interface name="dev_getattr_mtrr_dev" lineno="3319">
<summary>
Get the attributes of the memory type range
registers (MTRR) device.
@@ -75244,7 +75348,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_write_mtrr" lineno="3303">
+<interface name="dev_dontaudit_write_mtrr" lineno="3339">
<summary>
Do not audit attempts to write the memory type
range registers (MTRR).
@@ -75255,7 +75359,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_mtrr" lineno="3322">
+<interface name="dev_rw_mtrr" lineno="3358">
<summary>
Read and write the memory type range registers (MTRR).
</summary>
@@ -75265,7 +75369,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_netcontrol_dev" lineno="3341">
+<interface name="dev_getattr_netcontrol_dev" lineno="3377">
<summary>
Get the attributes of the network control device (Deprecated)
</summary>
@@ -75275,7 +75379,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_netcontrol" lineno="3356">
+<interface name="dev_read_netcontrol" lineno="3392">
<summary>
Read the network control identity. (Deprecated)
</summary>
@@ -75285,7 +75389,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_netcontrol" lineno="3371">
+<interface name="dev_rw_netcontrol" lineno="3407">
<summary>
Read and write the the network control device. (Deprecated)
</summary>
@@ -75295,7 +75399,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_null_dev" lineno="3386">
+<interface name="dev_getattr_null_dev" lineno="3422">
<summary>
Get the attributes of the null device nodes.
</summary>
@@ -75305,7 +75409,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_null_dev" lineno="3404">
+<interface name="dev_setattr_null_dev" lineno="3440">
<summary>
Set the attributes of the null device nodes.
</summary>
@@ -75315,7 +75419,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_null_dev" lineno="3423">
+<interface name="dev_dontaudit_setattr_null_dev" lineno="3459">
<summary>
Do not audit attempts to set the attributes of
the null device nodes.
@@ -75326,7 +75430,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_delete_null" lineno="3441">
+<interface name="dev_delete_null" lineno="3477">
<summary>
Delete the null device (/dev/null).
</summary>
@@ -75336,7 +75440,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_null" lineno="3459">
+<interface name="dev_rw_null" lineno="3495">
<summary>
Read and write to the null device (/dev/null).
</summary>
@@ -75346,7 +75450,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_null_dev" lineno="3477">
+<interface name="dev_create_null_dev" lineno="3513">
<summary>
Create the null device (/dev/null).
</summary>
@@ -75356,7 +75460,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_null_service" lineno="3496">
+<interface name="dev_manage_null_service" lineno="3532">
<summary>
Manage services with script type null_device_t for when
/lib/systemd/system/something.service is a link to /dev/null
@@ -75367,7 +75471,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3516">
+<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3552">
<summary>
Do not audit attempts to get the attributes
of the BIOS non-volatile RAM device.
@@ -75378,7 +75482,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_nvram" lineno="3534">
+<interface name="dev_rw_nvram" lineno="3570">
<summary>
Read and write BIOS non-volatile RAM.
</summary>
@@ -75388,7 +75492,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_printer_dev" lineno="3552">
+<interface name="dev_getattr_printer_dev" lineno="3588">
<summary>
Get the attributes of the printer device nodes.
</summary>
@@ -75398,7 +75502,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_printer_dev" lineno="3570">
+<interface name="dev_setattr_printer_dev" lineno="3606">
<summary>
Set the attributes of the printer device nodes.
</summary>
@@ -75408,7 +75512,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_append_printer" lineno="3589">
+<interface name="dev_append_printer" lineno="3625">
<summary>
Append the printer device.
</summary>
@@ -75418,7 +75522,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_printer" lineno="3607">
+<interface name="dev_rw_printer" lineno="3643">
<summary>
Read and write the printer device.
</summary>
@@ -75428,7 +75532,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_pmqos_dev" lineno="3625">
+<interface name="dev_getattr_pmqos_dev" lineno="3661">
<summary>
Get the attributes of PM QoS devices
</summary>
@@ -75438,7 +75542,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_pmqos" lineno="3643">
+<interface name="dev_read_pmqos" lineno="3679">
<summary>
Read the PM QoS devices.
</summary>
@@ -75448,7 +75552,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_pmqos" lineno="3661">
+<interface name="dev_rw_pmqos" lineno="3697">
<summary>
Read and write the the PM QoS devices.
</summary>
@@ -75458,7 +75562,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_qemu_dev" lineno="3680">
+<interface name="dev_getattr_qemu_dev" lineno="3716">
<summary>
Get the attributes of the QEMU
microcode and id interfaces.
@@ -75469,7 +75573,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_qemu_dev" lineno="3699">
+<interface name="dev_setattr_qemu_dev" lineno="3735">
<summary>
Set the attributes of the QEMU
microcode and id interfaces.
@@ -75480,7 +75584,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_qemu" lineno="3717">
+<interface name="dev_read_qemu" lineno="3753">
<summary>
Read the QEMU device
</summary>
@@ -75490,7 +75594,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_qemu" lineno="3735">
+<interface name="dev_rw_qemu" lineno="3771">
<summary>
Read and write the the QEMU device.
</summary>
@@ -75500,7 +75604,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_rand" lineno="3769">
+<interface name="dev_read_rand" lineno="3805">
<summary>
Read from random number generator
devices (e.g., /dev/random).
@@ -75526,7 +75630,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_dontaudit_read_rand" lineno="3788">
+<interface name="dev_dontaudit_read_rand" lineno="3824">
<summary>
Do not audit attempts to read from random
number generator devices (e.g., /dev/random)
@@ -75537,7 +75641,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_append_rand" lineno="3807">
+<interface name="dev_dontaudit_append_rand" lineno="3843">
<summary>
Do not audit attempts to append to random
number generator devices (e.g., /dev/random)
@@ -75548,7 +75652,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_rand" lineno="3827">
+<interface name="dev_write_rand" lineno="3863">
<summary>
Write to the random device (e.g., /dev/random). This adds
entropy used to generate the random data read from the
@@ -75560,7 +75664,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_rand_dev" lineno="3845">
+<interface name="dev_create_rand_dev" lineno="3881">
<summary>
Create the random device (/dev/random).
</summary>
@@ -75570,7 +75674,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_realtime_clock" lineno="3863">
+<interface name="dev_read_realtime_clock" lineno="3899">
<summary>
Read the realtime clock (/dev/rtc).
</summary>
@@ -75580,7 +75684,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_realtime_clock" lineno="3881">
+<interface name="dev_write_realtime_clock" lineno="3917">
<summary>
Set the realtime clock (/dev/rtc).
</summary>
@@ -75590,7 +75694,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_realtime_clock" lineno="3901">
+<interface name="dev_rw_realtime_clock" lineno="3937">
<summary>
Read and set the realtime clock (/dev/rtc).
</summary>
@@ -75600,7 +75704,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_scanner_dev" lineno="3916">
+<interface name="dev_getattr_scanner_dev" lineno="3952">
<summary>
Get the attributes of the scanner device.
</summary>
@@ -75610,7 +75714,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3935">
+<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3971">
<summary>
Do not audit attempts to get the attributes of
the scanner device.
@@ -75621,7 +75725,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_scanner_dev" lineno="3953">
+<interface name="dev_setattr_scanner_dev" lineno="3989">
<summary>
Set the attributes of the scanner device.
</summary>
@@ -75631,7 +75735,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3972">
+<interface name="dev_dontaudit_setattr_scanner_dev" lineno="4008">
<summary>
Do not audit attempts to set the attributes of
the scanner device.
@@ -75642,7 +75746,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_scanner" lineno="3990">
+<interface name="dev_rw_scanner" lineno="4026">
<summary>
Read and write the scanner device.
</summary>
@@ -75652,7 +75756,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_sound_dev" lineno="4008">
+<interface name="dev_getattr_sound_dev" lineno="4044">
<summary>
Get the attributes of the sound devices.
</summary>
@@ -75662,7 +75766,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_sound_dev" lineno="4026">
+<interface name="dev_setattr_sound_dev" lineno="4062">
<summary>
Set the attributes of the sound devices.
</summary>
@@ -75672,7 +75776,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_sound" lineno="4044">
+<interface name="dev_read_sound" lineno="4080">
<summary>
Read the sound devices.
</summary>
@@ -75682,7 +75786,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_sound" lineno="4063">
+<interface name="dev_write_sound" lineno="4099">
<summary>
Write the sound devices.
</summary>
@@ -75692,7 +75796,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_sound_mixer" lineno="4082">
+<interface name="dev_read_sound_mixer" lineno="4118">
<summary>
Read the sound mixer devices.
</summary>
@@ -75702,7 +75806,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_sound_mixer" lineno="4101">
+<interface name="dev_write_sound_mixer" lineno="4137">
<summary>
Write the sound mixer devices.
</summary>
@@ -75712,7 +75816,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_power_mgmt_dev" lineno="4120">
+<interface name="dev_getattr_power_mgmt_dev" lineno="4156">
<summary>
Get the attributes of the the power management device.
</summary>
@@ -75722,7 +75826,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_power_mgmt_dev" lineno="4138">
+<interface name="dev_setattr_power_mgmt_dev" lineno="4174">
<summary>
Set the attributes of the the power management device.
</summary>
@@ -75732,7 +75836,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_power_management" lineno="4156">
+<interface name="dev_rw_power_management" lineno="4192">
<summary>
Read and write the the power management device.
</summary>
@@ -75742,7 +75846,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_smartcard_dev" lineno="4174">
+<interface name="dev_getattr_smartcard_dev" lineno="4210">
<summary>
Getattr on smartcard devices
</summary>
@@ -75752,7 +75856,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4193">
+<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4229">
<summary>
dontaudit getattr on smartcard devices
</summary>
@@ -75762,7 +75866,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_smartcard" lineno="4212">
+<interface name="dev_rw_smartcard" lineno="4248">
<summary>
Read and write smartcard devices.
</summary>
@@ -75772,7 +75876,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_smartcard" lineno="4230">
+<interface name="dev_manage_smartcard" lineno="4266">
<summary>
Create, read, write, and delete smartcard devices.
</summary>
@@ -75782,7 +75886,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_sysdig" lineno="4248">
+<interface name="dev_rw_sysdig" lineno="4284">
<summary>
Read, write and map the sysdig device.
</summary>
@@ -75792,7 +75896,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mounton_sysfs" lineno="4267">
+<interface name="dev_mounton_sysfs" lineno="4303">
<summary>
Mount a filesystem on sysfs. (Deprecated)
</summary>
@@ -75802,7 +75906,7 @@ Domain allow access.
</summary>
</param>
</interface>
-<interface name="dev_associate_sysfs" lineno="4282">
+<interface name="dev_associate_sysfs" lineno="4318">
<summary>
Associate a file to a sysfs filesystem.
</summary>
@@ -75812,7 +75916,7 @@ The type of the file to be associated to sysfs.
</summary>
</param>
</interface>
-<interface name="dev_getattr_sysfs_dirs" lineno="4300">
+<interface name="dev_getattr_sysfs_dirs" lineno="4336">
<summary>
Get the attributes of sysfs directories.
</summary>
@@ -75822,7 +75926,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_sysfs" lineno="4318">
+<interface name="dev_getattr_sysfs" lineno="4354">
<summary>
Get the attributes of sysfs filesystem
</summary>
@@ -75832,7 +75936,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mount_sysfs" lineno="4336">
+<interface name="dev_mount_sysfs" lineno="4372">
<summary>
mount a sysfs filesystem
</summary>
@@ -75842,7 +75946,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_remount_sysfs" lineno="4354">
+<interface name="dev_remount_sysfs" lineno="4390">
<summary>
Remount a sysfs filesystem.
</summary>
@@ -75852,7 +75956,7 @@ Domain allow access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_sysfs" lineno="4372">
+<interface name="dev_dontaudit_getattr_sysfs" lineno="4408">
<summary>
Do not audit getting the attributes of sysfs filesystem
</summary>
@@ -75862,7 +75966,7 @@ Domain to dontaudit access from
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_sysfs" lineno="4390">
+<interface name="dev_dontaudit_read_sysfs" lineno="4426">
<summary>
Dont audit attempts to read hardware state information
</summary>
@@ -75872,7 +75976,7 @@ Domain for which the attempts do not need to be audited
</summary>
</param>
</interface>
-<interface name="dev_mounton_sysfs_dirs" lineno="4410">
+<interface name="dev_mounton_sysfs_dirs" lineno="4446">
<summary>
Mount on sysfs directories.
</summary>
@@ -75882,7 +75986,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_search_sysfs" lineno="4428">
+<interface name="dev_search_sysfs" lineno="4464">
<summary>
Search the sysfs directories.
</summary>
@@ -75892,7 +75996,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_search_sysfs" lineno="4446">
+<interface name="dev_dontaudit_search_sysfs" lineno="4482">
<summary>
Do not audit attempts to search sysfs.
</summary>
@@ -75902,7 +76006,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_list_sysfs" lineno="4464">
+<interface name="dev_list_sysfs" lineno="4500">
<summary>
List the contents of the sysfs directories.
</summary>
@@ -75912,7 +76016,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_sysfs_dirs" lineno="4483">
+<interface name="dev_write_sysfs_dirs" lineno="4519">
<summary>
Write in a sysfs directories.
</summary>
@@ -75922,7 +76026,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4501">
+<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4537">
<summary>
Do not audit attempts to write in a sysfs directory.
</summary>
@@ -75932,7 +76036,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_write_sysfs_files" lineno="4519">
+<interface name="dev_dontaudit_write_sysfs_files" lineno="4555">
<summary>
Do not audit attempts to write to a sysfs file.
</summary>
@@ -75942,7 +76046,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_manage_sysfs_dirs" lineno="4538">
+<interface name="dev_manage_sysfs_dirs" lineno="4574">
<summary>
Create, read, write, and delete sysfs
directories.
@@ -75953,7 +76057,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_sysfs" lineno="4565">
+<interface name="dev_read_sysfs" lineno="4601">
<summary>
Read hardware state information.
</summary>
@@ -75972,7 +76076,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_write_sysfs" lineno="4593">
+<interface name="dev_write_sysfs" lineno="4629">
<summary>
Write to hardware state information.
</summary>
@@ -75989,7 +76093,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_rw_sysfs" lineno="4612">
+<interface name="dev_rw_sysfs" lineno="4648">
<summary>
Allow caller to modify hardware state information.
</summary>
@@ -75999,7 +76103,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_sysfs_files" lineno="4633">
+<interface name="dev_create_sysfs_files" lineno="4669">
<summary>
Add a sysfs file
</summary>
@@ -76009,7 +76113,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_sysfs_dirs" lineno="4651">
+<interface name="dev_relabel_sysfs_dirs" lineno="4687">
<summary>
Relabel hardware state directories.
</summary>
@@ -76019,7 +76123,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_all_sysfs" lineno="4669">
+<interface name="dev_relabel_all_sysfs" lineno="4705">
<summary>
Relabel from/to all sysfs types.
</summary>
@@ -76029,7 +76133,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_all_sysfs" lineno="4689">
+<interface name="dev_setattr_all_sysfs" lineno="4725">
<summary>
Set the attributes of sysfs files, directories and symlinks.
</summary>
@@ -76039,7 +76143,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_tpm" lineno="4709">
+<interface name="dev_rw_tpm" lineno="4745">
<summary>
Read and write the TPM device.
</summary>
@@ -76049,7 +76153,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_urand" lineno="4750">
+<interface name="dev_read_urand" lineno="4786">
<summary>
Read from pseudo random number generator devices (e.g., /dev/urandom).
</summary>
@@ -76082,7 +76186,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_dontaudit_read_urand" lineno="4769">
+<interface name="dev_dontaudit_read_urand" lineno="4805">
<summary>
Do not audit attempts to read from pseudo
random devices (e.g., /dev/urandom)
@@ -76093,7 +76197,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_urand" lineno="4788">
+<interface name="dev_write_urand" lineno="4824">
<summary>
Write to the pseudo random device (e.g., /dev/urandom). This
sets the random number generator seed.
@@ -76104,7 +76208,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_urand_dev" lineno="4806">
+<interface name="dev_create_urand_dev" lineno="4842">
<summary>
Create the urandom device (/dev/urandom).
</summary>
@@ -76114,7 +76218,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_generic_usb_dev" lineno="4824">
+<interface name="dev_getattr_generic_usb_dev" lineno="4860">
<summary>
Getattr generic the USB devices.
</summary>
@@ -76124,7 +76228,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_generic_usb_dev" lineno="4842">
+<interface name="dev_setattr_generic_usb_dev" lineno="4878">
<summary>
Setattr generic the USB devices.
</summary>
@@ -76134,7 +76238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_generic_usb_dev" lineno="4860">
+<interface name="dev_read_generic_usb_dev" lineno="4896">
<summary>
Read generic the USB devices.
</summary>
@@ -76144,7 +76248,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_generic_usb_dev" lineno="4878">
+<interface name="dev_rw_generic_usb_dev" lineno="4914">
<summary>
Read and write generic the USB devices.
</summary>
@@ -76154,7 +76258,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_generic_usb_dev" lineno="4896">
+<interface name="dev_relabel_generic_usb_dev" lineno="4932">
<summary>
Relabel generic the USB devices.
</summary>
@@ -76164,7 +76268,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_usbmon_dev" lineno="4914">
+<interface name="dev_read_usbmon_dev" lineno="4950">
<summary>
Read USB monitor devices.
</summary>
@@ -76174,7 +76278,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_usbmon_dev" lineno="4932">
+<interface name="dev_write_usbmon_dev" lineno="4968">
<summary>
Write USB monitor devices.
</summary>
@@ -76184,7 +76288,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mount_usbfs" lineno="4950">
+<interface name="dev_mount_usbfs" lineno="4986">
<summary>
Mount a usbfs filesystem.
</summary>
@@ -76194,7 +76298,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_associate_usbfs" lineno="4968">
+<interface name="dev_associate_usbfs" lineno="5004">
<summary>
Associate a file to a usbfs filesystem.
</summary>
@@ -76204,7 +76308,7 @@ The type of the file to be associated to usbfs.
</summary>
</param>
</interface>
-<interface name="dev_getattr_usbfs_dirs" lineno="4986">
+<interface name="dev_getattr_usbfs_dirs" lineno="5022">
<summary>
Get the attributes of a directory in the usb filesystem.
</summary>
@@ -76214,7 +76318,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5005">
+<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5041">
<summary>
Do not audit attempts to get the attributes
of a directory in the usb filesystem.
@@ -76225,7 +76329,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_search_usbfs" lineno="5023">
+<interface name="dev_search_usbfs" lineno="5059">
<summary>
Search the directory containing USB hardware information.
</summary>
@@ -76235,7 +76339,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_list_usbfs" lineno="5041">
+<interface name="dev_list_usbfs" lineno="5077">
<summary>
Allow caller to get a list of usb hardware.
</summary>
@@ -76245,7 +76349,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_usbfs_files" lineno="5062">
+<interface name="dev_setattr_usbfs_files" lineno="5098">
<summary>
Set the attributes of usbfs filesystem.
</summary>
@@ -76255,7 +76359,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_usbfs" lineno="5082">
+<interface name="dev_read_usbfs" lineno="5118">
<summary>
Read USB hardware information using
the usbfs filesystem interface.
@@ -76266,7 +76370,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_usbfs" lineno="5102">
+<interface name="dev_rw_usbfs" lineno="5138">
<summary>
Allow caller to modify usb hardware configuration files.
</summary>
@@ -76276,7 +76380,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_video_dev" lineno="5122">
+<interface name="dev_getattr_video_dev" lineno="5158">
<summary>
Get the attributes of video4linux devices.
</summary>
@@ -76286,7 +76390,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_userio_dev" lineno="5140">
+<interface name="dev_rw_userio_dev" lineno="5176">
<summary>
Read and write userio device.
</summary>
@@ -76296,7 +76400,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_video_dev" lineno="5159">
+<interface name="dev_dontaudit_getattr_video_dev" lineno="5195">
<summary>
Do not audit attempts to get the attributes
of video4linux device nodes.
@@ -76307,7 +76411,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_video_dev" lineno="5177">
+<interface name="dev_setattr_video_dev" lineno="5213">
<summary>
Set the attributes of video4linux device nodes.
</summary>
@@ -76317,7 +76421,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_video_dev" lineno="5196">
+<interface name="dev_dontaudit_setattr_video_dev" lineno="5232">
<summary>
Do not audit attempts to set the attributes
of video4linux device nodes.
@@ -76328,7 +76432,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_video_dev" lineno="5214">
+<interface name="dev_read_video_dev" lineno="5250">
<summary>
Read the video4linux devices.
</summary>
@@ -76338,7 +76442,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_video_dev" lineno="5232">
+<interface name="dev_write_video_dev" lineno="5268">
<summary>
Write the video4linux devices.
</summary>
@@ -76348,7 +76452,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_vfio_dev" lineno="5250">
+<interface name="dev_rw_vfio_dev" lineno="5286">
<summary>
Read and write vfio devices.
</summary>
@@ -76358,7 +76462,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabelfrom_vfio_dev" lineno="5268">
+<interface name="dev_relabelfrom_vfio_dev" lineno="5304">
<summary>
Relabel vfio devices.
</summary>
@@ -76368,7 +76472,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_vhost" lineno="5286">
+<interface name="dev_rw_vhost" lineno="5322">
<summary>
Allow read/write the vhost devices
</summary>
@@ -76378,7 +76482,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_vmware" lineno="5304">
+<interface name="dev_rw_vmware" lineno="5340">
<summary>
Read and write VMWare devices.
</summary>
@@ -76388,7 +76492,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rwx_vmware" lineno="5322">
+<interface name="dev_rwx_vmware" lineno="5358">
<summary>
Read, write, and mmap VMWare devices.
</summary>
@@ -76398,7 +76502,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_watchdog" lineno="5341">
+<interface name="dev_read_watchdog" lineno="5377">
<summary>
Read from watchdog devices.
</summary>
@@ -76408,7 +76512,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_watchdog" lineno="5359">
+<interface name="dev_write_watchdog" lineno="5395">
<summary>
Write to watchdog devices.
</summary>
@@ -76418,7 +76522,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_wireless" lineno="5377">
+<interface name="dev_read_wireless" lineno="5413">
<summary>
Read the wireless device.
</summary>
@@ -76428,7 +76532,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_wireless" lineno="5395">
+<interface name="dev_rw_wireless" lineno="5431">
<summary>
Read and write the the wireless device.
</summary>
@@ -76438,7 +76542,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_wireless" lineno="5413">
+<interface name="dev_manage_wireless" lineno="5449">
<summary>
manage the wireless device.
</summary>
@@ -76448,7 +76552,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_xen" lineno="5431">
+<interface name="dev_rw_xen" lineno="5467">
<summary>
Read and write Xen devices.
</summary>
@@ -76458,7 +76562,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_xen" lineno="5450">
+<interface name="dev_manage_xen" lineno="5486">
<summary>
Create, read, write, and delete Xen devices.
</summary>
@@ -76468,7 +76572,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_filetrans_xen" lineno="5474">
+<interface name="dev_filetrans_xen" lineno="5510">
<summary>
Automatic type transition to the type
for xen device nodes when created in /dev.
@@ -76484,7 +76588,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dev_getattr_xserver_misc_dev" lineno="5492">
+<interface name="dev_getattr_xserver_misc_dev" lineno="5528">
<summary>
Get the attributes of X server miscellaneous devices.
</summary>
@@ -76494,7 +76598,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_xserver_misc_dev" lineno="5510">
+<interface name="dev_setattr_xserver_misc_dev" lineno="5546">
<summary>
Set the attributes of X server miscellaneous devices.
</summary>
@@ -76504,7 +76608,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_xserver_misc" lineno="5528">
+<interface name="dev_rw_xserver_misc" lineno="5564">
<summary>
Read and write X server miscellaneous devices.
</summary>
@@ -76514,7 +76618,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_map_xserver_misc" lineno="5546">
+<interface name="dev_map_xserver_misc" lineno="5582">
<summary>
Map X server miscellaneous devices.
</summary>
@@ -76524,7 +76628,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_zero" lineno="5564">
+<interface name="dev_rw_zero" lineno="5600">
<summary>
Read and write to the zero device (/dev/zero).
</summary>
@@ -76534,7 +76638,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rwx_zero" lineno="5582">
+<interface name="dev_rwx_zero" lineno="5618">
<summary>
Read, write, and execute the zero device (/dev/zero).
</summary>
@@ -76544,7 +76648,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_execmod_zero" lineno="5601">
+<interface name="dev_execmod_zero" lineno="5637">
<summary>
Execmod the zero device (/dev/zero).
</summary>
@@ -76554,7 +76658,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_zero_dev" lineno="5620">
+<interface name="dev_create_zero_dev" lineno="5656">
<summary>
Create the zero device (/dev/zero).
</summary>
@@ -76564,7 +76668,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_cpu_online" lineno="5643">
+<interface name="dev_read_cpu_online" lineno="5679">
<summary>
Read cpu online hardware state information
</summary>
@@ -76579,7 +76683,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_unconfined" lineno="5663">
+<interface name="dev_unconfined" lineno="5699">
<summary>
Unconfined access to devices.
</summary>
@@ -76589,7 +76693,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_cpu_online" lineno="5683">
+<interface name="dev_relabel_cpu_online" lineno="5719">
<summary>
Relabel cpu online hardware state information.
</summary>
@@ -76599,7 +76703,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_usbmon_dev" lineno="5702">
+<interface name="dev_dontaudit_read_usbmon_dev" lineno="5738">
<summary>
Dont audit attempts to read usbmon devices
</summary>
@@ -78355,7 +78459,7 @@ must be negated by the caller.
</param>
<rolecap/>
</interface>
-<interface name="files_search_all" lineno="1259">
+<interface name="files_search_all" lineno="1255">
<summary>
Search the contents of all directories on
extended attribute filesystems.
@@ -78366,7 +78470,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_all" lineno="1278">
+<interface name="files_list_all" lineno="1274">
<summary>
List the contents of all directories on
extended attribute filesystems.
@@ -78377,7 +78481,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_files_as" lineno="1296">
+<interface name="files_create_all_files_as" lineno="1292">
<summary>
Create all files as is.
</summary>
@@ -78387,7 +78491,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_all_dirs" lineno="1316">
+<interface name="files_dontaudit_search_all_dirs" lineno="1312">
<summary>
Do not audit attempts to search the
contents of any directories on extended
@@ -78399,7 +78503,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_file_type_fs" lineno="1339">
+<interface name="files_getattr_all_file_type_fs" lineno="1335">
<summary>
Get the attributes of all filesystems
with the type of a file.
@@ -78410,7 +78514,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_all_file_type_fs" lineno="1357">
+<interface name="files_relabelto_all_file_type_fs" lineno="1353">
<summary>
Relabel a filesystem to the type of a file.
</summary>
@@ -78420,7 +78524,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_file_type_fs" lineno="1375">
+<interface name="files_relabel_all_file_type_fs" lineno="1371">
<summary>
Relabel a filesystem to and from the type of a file.
</summary>
@@ -78430,7 +78534,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mount_all_file_type_fs" lineno="1393">
+<interface name="files_mount_all_file_type_fs" lineno="1389">
<summary>
Mount all filesystems with the type of a file.
</summary>
@@ -78440,7 +78544,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_unmount_all_file_type_fs" lineno="1411">
+<interface name="files_unmount_all_file_type_fs" lineno="1407">
<summary>
Unmount all filesystems with the type of a file.
</summary>
@@ -78450,7 +78554,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_non_auth_dirs" lineno="1430">
+<interface name="files_list_non_auth_dirs" lineno="1426">
<summary>
Read all non-authentication related
directories.
@@ -78461,7 +78565,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_non_auth_files" lineno="1449">
+<interface name="files_read_non_auth_files" lineno="1445">
<summary>
Read all non-authentication related
files.
@@ -78472,7 +78576,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_non_auth_symlinks" lineno="1468">
+<interface name="files_read_non_auth_symlinks" lineno="1464">
<summary>
Read all non-authentication related
symbolic links.
@@ -78483,7 +78587,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_non_auth_files" lineno="1486">
+<interface name="files_rw_non_auth_files" lineno="1482">
<summary>
rw non-authentication related files.
</summary>
@@ -78493,7 +78597,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_non_auth_files" lineno="1506">
+<interface name="files_manage_non_auth_files" lineno="1502">
<summary>
Manage non-authentication related
files.
@@ -78505,7 +78609,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_map_non_auth_files" lineno="1534">
+<interface name="files_map_non_auth_files" lineno="1526">
<summary>
Mmap non-authentication related
files.
@@ -78517,7 +78621,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_non_auth_files" lineno="1554">
+<interface name="files_relabel_non_auth_files" lineno="1546">
<summary>
Relabel all non-authentication related
files.
@@ -78529,7 +78633,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_config_dirs" lineno="1587">
+<interface name="files_manage_config_dirs" lineno="1579">
<summary>
Manage all configuration directories on filesystem
</summary>
@@ -78540,7 +78644,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_relabel_config_dirs" lineno="1606">
+<interface name="files_relabel_config_dirs" lineno="1598">
<summary>
Relabel configuration directories
</summary>
@@ -78551,7 +78655,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_dontaudit_relabel_config_dirs" lineno="1625">
+<interface name="files_dontaudit_relabel_config_dirs" lineno="1617">
<summary>
Do not audit attempts to relabel configuration directories
</summary>
@@ -78562,7 +78666,7 @@ Domain not to audit.
</param>
</interface>
-<interface name="files_read_config_files" lineno="1643">
+<interface name="files_read_config_files" lineno="1635">
<summary>
Read config files in /etc.
</summary>
@@ -78572,7 +78676,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_config_files" lineno="1664">
+<interface name="files_manage_config_files" lineno="1656">
<summary>
Manage all configuration files on filesystem
</summary>
@@ -78583,7 +78687,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_relabel_config_files" lineno="1683">
+<interface name="files_relabel_config_files" lineno="1675">
<summary>
Relabel configuration files
</summary>
@@ -78594,7 +78698,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_dontaudit_relabel_config_files" lineno="1702">
+<interface name="files_dontaudit_relabel_config_files" lineno="1694">
<summary>
Do not audit attempts to relabel configuration files
</summary>
@@ -78605,7 +78709,7 @@ Domain not to audit.
</param>
</interface>
-<interface name="files_mounton_all_mountpoints" lineno="1720">
+<interface name="files_mounton_all_mountpoints" lineno="1712">
<summary>
Mount a filesystem on all mount points.
</summary>
@@ -78615,7 +78719,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_mountpoints" lineno="1741">
+<interface name="files_getattr_all_mountpoints" lineno="1733">
<summary>
Get the attributes of all mount points.
</summary>
@@ -78625,7 +78729,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_all_mountpoints" lineno="1759">
+<interface name="files_setattr_all_mountpoints" lineno="1751">
<summary>
Set the attributes of all mount points.
</summary>
@@ -78635,7 +78739,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1777">
+<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1769">
<summary>
Do not audit attempts to set the attributes on all mount points.
</summary>
@@ -78645,7 +78749,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_all_mountpoints" lineno="1795">
+<interface name="files_search_all_mountpoints" lineno="1787">
<summary>
Search all mount points.
</summary>
@@ -78655,7 +78759,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_all_mountpoints" lineno="1813">
+<interface name="files_dontaudit_search_all_mountpoints" lineno="1805">
<summary>
Do not audit searching of all mount points.
</summary>
@@ -78665,7 +78769,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_all_mountpoints" lineno="1831">
+<interface name="files_list_all_mountpoints" lineno="1823">
<summary>
List all mount points.
</summary>
@@ -78675,7 +78779,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_all_mountpoints" lineno="1849">
+<interface name="files_dontaudit_list_all_mountpoints" lineno="1841">
<summary>
Do not audit listing of all mount points.
</summary>
@@ -78685,7 +78789,17 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_all_mountpoints" lineno="1867">
+<interface name="files_write_all_mountpoints" lineno="1859">
+<summary>
+Check if all mountpoints are writable.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_dontaudit_write_all_mountpoints" lineno="1877">
<summary>
Do not audit attempts to write to mount points.
</summary>
@@ -78695,7 +78809,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_root" lineno="1885">
+<interface name="files_list_root" lineno="1895">
<summary>
List the contents of the root directory.
</summary>
@@ -78705,7 +78819,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_root_symlinks" lineno="1905">
+<interface name="files_delete_root_symlinks" lineno="1915">
<summary>
Delete symbolic links in the
root directory.
@@ -78716,7 +78830,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_root_dirs" lineno="1923">
+<interface name="files_dontaudit_write_root_dirs" lineno="1933">
<summary>
Do not audit attempts to write to / dirs.
</summary>
@@ -78726,7 +78840,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_root_dir" lineno="1942">
+<interface name="files_dontaudit_rw_root_dir" lineno="1952">
<summary>
Do not audit attempts to write
files in the root directory.
@@ -78737,7 +78851,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_watch_root_dirs" lineno="1960">
+<interface name="files_watch_root_dirs" lineno="1970">
<summary>
Watch the root directory.
</summary>
@@ -78747,7 +78861,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_root_filetrans" lineno="1994">
+<interface name="files_root_filetrans" lineno="2004">
<summary>
Create an object in the root directory, with a private
type using a type transition.
@@ -78773,7 +78887,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_root_files" lineno="2013">
+<interface name="files_dontaudit_read_root_files" lineno="2023">
<summary>
Do not audit attempts to read files in
the root directory.
@@ -78784,7 +78898,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_root_files" lineno="2032">
+<interface name="files_dontaudit_rw_root_files" lineno="2042">
<summary>
Do not audit attempts to read or write
files in the root directory.
@@ -78795,7 +78909,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_root_chr_files" lineno="2051">
+<interface name="files_dontaudit_rw_root_chr_files" lineno="2061">
<summary>
Do not audit attempts to read or write
character device nodes in the root directory.
@@ -78806,7 +78920,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_delete_root_chr_files" lineno="2070">
+<interface name="files_delete_root_chr_files" lineno="2080">
<summary>
Delete character device nodes in
the root directory.
@@ -78817,7 +78931,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_root_files" lineno="2088">
+<interface name="files_delete_root_files" lineno="2098">
<summary>
Delete files in the root directory.
</summary>
@@ -78827,7 +78941,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_root_files" lineno="2106">
+<interface name="files_exec_root_files" lineno="2116">
<summary>
Execute files in the root directory.
</summary>
@@ -78837,7 +78951,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_root_dir_entry" lineno="2124">
+<interface name="files_delete_root_dir_entry" lineno="2134">
<summary>
Remove entries from the root directory.
</summary>
@@ -78847,7 +78961,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_root_dir" lineno="2142">
+<interface name="files_manage_root_dir" lineno="2152">
<summary>
Manage the root directory.
</summary>
@@ -78857,7 +78971,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_rootfs" lineno="2161">
+<interface name="files_getattr_rootfs" lineno="2171">
<summary>
Get the attributes of a rootfs
file system.
@@ -78868,7 +78982,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_associate_rootfs" lineno="2179">
+<interface name="files_associate_rootfs" lineno="2189">
<summary>
Associate to root file system.
</summary>
@@ -78878,7 +78992,7 @@ Type of the file to associate.
</summary>
</param>
</interface>
-<interface name="files_relabel_rootfs" lineno="2197">
+<interface name="files_relabel_rootfs" lineno="2207">
<summary>
Relabel to and from rootfs file system.
</summary>
@@ -78888,7 +79002,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_unmount_rootfs" lineno="2215">
+<interface name="files_unmount_rootfs" lineno="2225">
<summary>
Unmount a rootfs filesystem.
</summary>
@@ -78898,7 +79012,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_root" lineno="2233">
+<interface name="files_mounton_root" lineno="2243">
<summary>
Mount on the root directory (/)
</summary>
@@ -78908,7 +79022,28 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_boot_dirs" lineno="2251">
+<interface name="files_getattr_boot_fs" lineno="2262">
+<summary>
+Get the attributes of a filesystem
+mounted on /boot.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_remount_boot" lineno="2280">
+<summary>
+Remount a filesystem mounted on /boot.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_getattr_boot_dirs" lineno="2298">
<summary>
Get attributes of the /boot directory.
</summary>
@@ -78918,7 +79053,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_boot_dirs" lineno="2270">
+<interface name="files_dontaudit_getattr_boot_dirs" lineno="2317">
<summary>
Do not audit attempts to get attributes
of the /boot directory.
@@ -78929,7 +79064,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_boot" lineno="2288">
+<interface name="files_search_boot" lineno="2335">
<summary>
Search the /boot directory.
</summary>
@@ -78939,7 +79074,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_boot" lineno="2306">
+<interface name="files_dontaudit_search_boot" lineno="2353">
<summary>
Do not audit attempts to search the /boot directory.
</summary>
@@ -78949,7 +79084,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_boot" lineno="2324">
+<interface name="files_list_boot" lineno="2371">
<summary>
List the /boot directory.
</summary>
@@ -78959,7 +79094,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_boot" lineno="2342">
+<interface name="files_dontaudit_list_boot" lineno="2389">
<summary>
Do not audit attempts to list the /boot directory.
</summary>
@@ -78969,7 +79104,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_boot_dirs" lineno="2360">
+<interface name="files_create_boot_dirs" lineno="2407">
<summary>
Create directories in /boot
</summary>
@@ -78979,7 +79114,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_boot_dirs" lineno="2379">
+<interface name="files_manage_boot_dirs" lineno="2426">
<summary>
Create, read, write, and delete
directories in /boot.
@@ -78990,7 +79125,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_boot_filetrans" lineno="2413">
+<interface name="files_boot_filetrans" lineno="2460">
<summary>
Create a private type object in boot
with an automatic type transition
@@ -79016,7 +79151,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_read_boot_files" lineno="2432">
+<interface name="files_read_boot_files" lineno="2479">
<summary>
read files in the /boot directory.
</summary>
@@ -79027,7 +79162,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_boot_files" lineno="2452">
+<interface name="files_manage_boot_files" lineno="2499">
<summary>
Create, read, write, and delete files
in the /boot directory.
@@ -79039,7 +79174,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabelfrom_boot_files" lineno="2470">
+<interface name="files_relabelfrom_boot_files" lineno="2517">
<summary>
Relabel from files in the /boot directory.
</summary>
@@ -79049,7 +79184,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_boot_symlinks" lineno="2488">
+<interface name="files_read_boot_symlinks" lineno="2535">
<summary>
Read symbolic links in the /boot directory.
</summary>
@@ -79059,7 +79194,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_boot_symlinks" lineno="2507">
+<interface name="files_rw_boot_symlinks" lineno="2554">
<summary>
Read and write symbolic links
in the /boot directory.
@@ -79070,7 +79205,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_boot_symlinks" lineno="2527">
+<interface name="files_manage_boot_symlinks" lineno="2574">
<summary>
Create, read, write, and delete symbolic links
in the /boot directory.
@@ -79081,7 +79216,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_kernel_img" lineno="2545">
+<interface name="files_read_kernel_img" lineno="2592">
<summary>
Read kernel files in the /boot directory.
</summary>
@@ -79091,7 +79226,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_kernel_img" lineno="2566">
+<interface name="files_create_kernel_img" lineno="2613">
<summary>
Install a kernel into the /boot directory.
</summary>
@@ -79102,7 +79237,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_delete_kernel" lineno="2586">
+<interface name="files_delete_kernel" lineno="2633">
<summary>
Delete a kernel from /boot.
</summary>
@@ -79113,7 +79248,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_default_dirs" lineno="2604">
+<interface name="files_getattr_default_dirs" lineno="2651">
<summary>
Getattr of directories with the default file type.
</summary>
@@ -79123,7 +79258,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_default_dirs" lineno="2623">
+<interface name="files_dontaudit_getattr_default_dirs" lineno="2670">
<summary>
Do not audit attempts to get the attributes of
directories with the default file type.
@@ -79134,7 +79269,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_default" lineno="2641">
+<interface name="files_search_default" lineno="2688">
<summary>
Search the contents of directories with the default file type.
</summary>
@@ -79144,7 +79279,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_default" lineno="2659">
+<interface name="files_list_default" lineno="2706">
<summary>
List contents of directories with the default file type.
</summary>
@@ -79154,7 +79289,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_default" lineno="2678">
+<interface name="files_dontaudit_list_default" lineno="2725">
<summary>
Do not audit attempts to list contents of
directories with the default file type.
@@ -79165,7 +79300,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_default_dirs" lineno="2697">
+<interface name="files_manage_default_dirs" lineno="2744">
<summary>
Create, read, write, and delete directories with
the default file type.
@@ -79176,7 +79311,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_default" lineno="2715">
+<interface name="files_mounton_default" lineno="2762">
<summary>
Mount a filesystem on a directory with the default file type.
</summary>
@@ -79186,7 +79321,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_default_files" lineno="2734">
+<interface name="files_dontaudit_getattr_default_files" lineno="2781">
<summary>
Do not audit attempts to get the attributes of
files with the default file type.
@@ -79197,7 +79332,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_default_files" lineno="2752">
+<interface name="files_read_default_files" lineno="2799">
<summary>
Read files with the default file type.
</summary>
@@ -79207,7 +79342,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_default_files" lineno="2771">
+<interface name="files_dontaudit_read_default_files" lineno="2818">
<summary>
Do not audit attempts to read files
with the default file type.
@@ -79218,7 +79353,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_default_files" lineno="2790">
+<interface name="files_manage_default_files" lineno="2837">
<summary>
Create, read, write, and delete files with
the default file type.
@@ -79229,7 +79364,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_default_symlinks" lineno="2808">
+<interface name="files_read_default_symlinks" lineno="2855">
<summary>
Read symbolic links with the default file type.
</summary>
@@ -79239,7 +79374,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_default_sockets" lineno="2826">
+<interface name="files_read_default_sockets" lineno="2873">
<summary>
Read sockets with the default file type.
</summary>
@@ -79249,7 +79384,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_default_pipes" lineno="2844">
+<interface name="files_read_default_pipes" lineno="2891">
<summary>
Read named pipes with the default file type.
</summary>
@@ -79259,7 +79394,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_etc" lineno="2862">
+<interface name="files_search_etc" lineno="2909">
<summary>
Search the contents of /etc directories.
</summary>
@@ -79269,7 +79404,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_etc_dirs" lineno="2880">
+<interface name="files_setattr_etc_dirs" lineno="2927">
<summary>
Set the attributes of the /etc directories.
</summary>
@@ -79279,7 +79414,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_etc" lineno="2898">
+<interface name="files_list_etc" lineno="2945">
<summary>
List the contents of /etc directories.
</summary>
@@ -79289,7 +79424,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_etc_dirs" lineno="2916">
+<interface name="files_dontaudit_write_etc_dirs" lineno="2963">
<summary>
Do not audit attempts to write to /etc dirs.
</summary>
@@ -79299,7 +79434,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_rw_etc_dirs" lineno="2934">
+<interface name="files_rw_etc_dirs" lineno="2981">
<summary>
Add and remove entries from /etc directories.
</summary>
@@ -79309,7 +79444,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_etc_dirs" lineno="2953">
+<interface name="files_manage_etc_dirs" lineno="3000">
<summary>
Manage generic directories in /etc
</summary>
@@ -79320,7 +79455,7 @@ Domain allowed access
</param>
</interface>
-<interface name="files_relabelto_etc_dirs" lineno="2971">
+<interface name="files_relabelto_etc_dirs" lineno="3018">
<summary>
Relabel directories to etc_t.
</summary>
@@ -79330,7 +79465,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_etc_dirs" lineno="2990">
+<interface name="files_mounton_etc_dirs" lineno="3037">
<summary>
Mount a filesystem on the
etc directories.
@@ -79341,7 +79476,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_etc_dirs" lineno="3008">
+<interface name="files_watch_etc_dirs" lineno="3055">
<summary>
Watch /etc directories
</summary>
@@ -79351,7 +79486,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_etc_files" lineno="3060">
+<interface name="files_read_etc_files" lineno="3107">
<summary>
Read generic files in /etc.
</summary>
@@ -79395,7 +79530,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_map_etc_files" lineno="3092">
+<interface name="files_map_etc_files" lineno="3139">
<summary>
Map generic files in /etc.
</summary>
@@ -79417,7 +79552,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_dontaudit_write_etc_files" lineno="3110">
+<interface name="files_dontaudit_write_etc_files" lineno="3157">
<summary>
Do not audit attempts to write generic files in /etc.
</summary>
@@ -79427,7 +79562,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_etc_files" lineno="3129">
+<interface name="files_rw_etc_files" lineno="3176">
<summary>
Read and write generic files in /etc.
</summary>
@@ -79438,7 +79573,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_etc_files" lineno="3151">
+<interface name="files_manage_etc_files" lineno="3198">
<summary>
Create, read, write, and delete generic
files in /etc.
@@ -79450,7 +79585,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_manage_etc_files" lineno="3172">
+<interface name="files_dontaudit_manage_etc_files" lineno="3219">
<summary>
Do not audit attempts to create, read, write,
and delete generic files in /etc.
@@ -79462,7 +79597,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="files_delete_etc_files" lineno="3190">
+<interface name="files_delete_etc_files" lineno="3237">
<summary>
Delete system configuration files in /etc.
</summary>
@@ -79472,7 +79607,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_etc_files" lineno="3208">
+<interface name="files_exec_etc_files" lineno="3255">
<summary>
Execute generic files in /etc.
</summary>
@@ -79482,7 +79617,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_get_etc_unit_status" lineno="3228">
+<interface name="files_watch_etc_files" lineno="3275">
+<summary>
+Watch /etc files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_get_etc_unit_status" lineno="3293">
<summary>
Get etc_t service status.
</summary>
@@ -79492,7 +79637,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_start_etc_service" lineno="3247">
+<interface name="files_start_etc_service" lineno="3312">
<summary>
start etc_t service
</summary>
@@ -79502,7 +79647,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_stop_etc_service" lineno="3266">
+<interface name="files_stop_etc_service" lineno="3331">
<summary>
stop etc_t service
</summary>
@@ -79512,7 +79657,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_etc_files" lineno="3285">
+<interface name="files_relabel_etc_files" lineno="3350">
<summary>
Relabel from and to generic files in /etc.
</summary>
@@ -79522,7 +79667,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_etc_symlinks" lineno="3304">
+<interface name="files_read_etc_symlinks" lineno="3369">
<summary>
Read symbolic links in /etc.
</summary>
@@ -79532,7 +79677,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_etc_symlinks" lineno="3322">
+<interface name="files_watch_etc_symlinks" lineno="3387">
<summary>
Watch /etc symlinks
</summary>
@@ -79542,7 +79687,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_etc_symlinks" lineno="3340">
+<interface name="files_manage_etc_symlinks" lineno="3405">
<summary>
Create, read, write, and delete symbolic links in /etc.
</summary>
@@ -79552,7 +79697,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_etc_filetrans" lineno="3374">
+<interface name="files_etc_filetrans" lineno="3439">
<summary>
Create objects in /etc with a private
type using a type_transition.
@@ -79578,7 +79723,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_create_boot_flag" lineno="3404">
+<interface name="files_create_boot_flag" lineno="3469">
<summary>
Create a boot flag.
</summary>
@@ -79600,7 +79745,7 @@ The name of the object being created.
</param>
<rolecap/>
</interface>
-<interface name="files_delete_boot_flag" lineno="3430">
+<interface name="files_delete_boot_flag" lineno="3495">
<summary>
Delete a boot flag.
</summary>
@@ -79617,7 +79762,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_etc_runtime_dirs" lineno="3449">
+<interface name="files_getattr_etc_runtime_dirs" lineno="3514">
<summary>
Get the attributes of the
etc_runtime directories.
@@ -79628,7 +79773,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_etc_runtime_dirs" lineno="3468">
+<interface name="files_mounton_etc_runtime_dirs" lineno="3533">
<summary>
Mount a filesystem on the
etc_runtime directories.
@@ -79639,7 +79784,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_etc_runtime_dirs" lineno="3486">
+<interface name="files_relabelto_etc_runtime_dirs" lineno="3551">
<summary>
Relabel to etc_runtime_t dirs.
</summary>
@@ -79649,7 +79794,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3504">
+<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3569">
<summary>
Do not audit attempts to set the attributes of the etc_runtime files
</summary>
@@ -79659,7 +79804,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_etc_runtime_files" lineno="3542">
+<interface name="files_read_etc_runtime_files" lineno="3607">
<summary>
Read files in /etc that are dynamically
created on boot, such as mtab.
@@ -79689,7 +79834,7 @@ Domain allowed access.
<infoflow type="read" weight="10" />
<rolecap/>
</interface>
-<interface name="files_dontaudit_read_etc_runtime_files" lineno="3564">
+<interface name="files_dontaudit_read_etc_runtime_files" lineno="3629">
<summary>
Do not audit attempts to read files
in /etc that are dynamically
@@ -79701,7 +79846,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_etc_files" lineno="3583">
+<interface name="files_dontaudit_read_etc_files" lineno="3648">
<summary>
Do not audit attempts to read files
in /etc
@@ -79712,7 +79857,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_etc_runtime_files" lineno="3602">
+<interface name="files_dontaudit_write_etc_runtime_files" lineno="3667">
<summary>
Do not audit attempts to write
etc runtime files.
@@ -79723,7 +79868,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_rw_etc_runtime_files" lineno="3622">
+<interface name="files_rw_etc_runtime_files" lineno="3687">
<summary>
Read and write files in /etc that are dynamically
created on boot, such as mtab.
@@ -79735,7 +79880,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_etc_runtime_files" lineno="3644">
+<interface name="files_manage_etc_runtime_files" lineno="3709">
<summary>
Create, read, write, and delete files in
/etc that are dynamically created on boot,
@@ -79748,7 +79893,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabelto_etc_runtime_files" lineno="3662">
+<interface name="files_relabelto_etc_runtime_files" lineno="3727">
<summary>
Relabel to etc_runtime_t files.
</summary>
@@ -79758,7 +79903,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_etc_filetrans_etc_runtime" lineno="3691">
+<interface name="files_etc_filetrans_etc_runtime" lineno="3756">
<summary>
Create, etc runtime objects with an automatic
type transition.
@@ -79779,7 +79924,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_getattr_home_dir" lineno="3710">
+<interface name="files_getattr_home_dir" lineno="3775">
<summary>
Get the attributes of the home directories root
(/home).
@@ -79790,7 +79935,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_home_dir" lineno="3731">
+<interface name="files_dontaudit_getattr_home_dir" lineno="3796">
<summary>
Do not audit attempts to get the
attributes of the home directories root
@@ -79802,7 +79947,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_home" lineno="3750">
+<interface name="files_search_home" lineno="3815">
<summary>
Search home directories root (/home).
</summary>
@@ -79812,7 +79957,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_home" lineno="3770">
+<interface name="files_dontaudit_search_home" lineno="3835">
<summary>
Do not audit attempts to search
home directories root (/home).
@@ -79823,7 +79968,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_home" lineno="3790">
+<interface name="files_dontaudit_list_home" lineno="3855">
<summary>
Do not audit attempts to list
home directories root (/home).
@@ -79834,7 +79979,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_home" lineno="3809">
+<interface name="files_list_home" lineno="3874">
<summary>
Get listing of home directories.
</summary>
@@ -79844,7 +79989,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_home" lineno="3828">
+<interface name="files_relabelto_home" lineno="3893">
<summary>
Relabel to user home root (/home).
</summary>
@@ -79854,7 +79999,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelfrom_home" lineno="3846">
+<interface name="files_relabelfrom_home" lineno="3911">
<summary>
Relabel from user home root (/home).
</summary>
@@ -79864,7 +80009,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_home_filetrans" lineno="3879">
+<interface name="files_watch_home" lineno="3929">
+<summary>
+Watch the user home root (/home).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_home_filetrans" lineno="3962">
<summary>
Create objects in /home.
</summary>
@@ -79889,7 +80044,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_getattr_lost_found_dirs" lineno="3897">
+<interface name="files_getattr_lost_found_dirs" lineno="3980">
<summary>
Get the attributes of lost+found directories.
</summary>
@@ -79899,7 +80054,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3916">
+<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3999">
<summary>
Do not audit attempts to get the attributes of
lost+found directories.
@@ -79910,7 +80065,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_lost_found" lineno="3934">
+<interface name="files_list_lost_found" lineno="4017">
<summary>
List the contents of lost+found directories.
</summary>
@@ -79920,7 +80075,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_lost_found" lineno="3954">
+<interface name="files_manage_lost_found" lineno="4037">
<summary>
Create, read, write, and delete objects in
lost+found directories.
@@ -79932,7 +80087,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_search_mnt" lineno="3976">
+<interface name="files_search_mnt" lineno="4059">
<summary>
Search the contents of /mnt.
</summary>
@@ -79942,7 +80097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_mnt" lineno="3994">
+<interface name="files_dontaudit_search_mnt" lineno="4077">
<summary>
Do not audit attempts to search /mnt.
</summary>
@@ -79952,7 +80107,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_mnt" lineno="4012">
+<interface name="files_list_mnt" lineno="4095">
<summary>
List the contents of /mnt.
</summary>
@@ -79962,7 +80117,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_mnt" lineno="4030">
+<interface name="files_dontaudit_list_mnt" lineno="4113">
<summary>
Do not audit attempts to list the contents of /mnt.
</summary>
@@ -79972,7 +80127,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_mnt" lineno="4048">
+<interface name="files_mounton_mnt" lineno="4131">
<summary>
Mount a filesystem on /mnt.
</summary>
@@ -79982,7 +80137,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_mnt_dirs" lineno="4067">
+<interface name="files_manage_mnt_dirs" lineno="4150">
<summary>
Create, read, write, and delete directories in /mnt.
</summary>
@@ -79993,7 +80148,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_mnt_files" lineno="4085">
+<interface name="files_manage_mnt_files" lineno="4168">
<summary>
Create, read, write, and delete files in /mnt.
</summary>
@@ -80003,7 +80158,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_mnt_files" lineno="4103">
+<interface name="files_read_mnt_files" lineno="4186">
<summary>
read files in /mnt.
</summary>
@@ -80013,7 +80168,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_mnt_symlinks" lineno="4121">
+<interface name="files_read_mnt_symlinks" lineno="4204">
<summary>
Read symbolic links in /mnt.
</summary>
@@ -80023,7 +80178,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_mnt_symlinks" lineno="4139">
+<interface name="files_manage_mnt_symlinks" lineno="4222">
<summary>
Create, read, write, and delete symbolic links in /mnt.
</summary>
@@ -80033,7 +80188,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_kernel_modules" lineno="4157">
+<interface name="files_search_kernel_modules" lineno="4240">
<summary>
Search the contents of the kernel module directories.
</summary>
@@ -80043,7 +80198,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_kernel_modules" lineno="4176">
+<interface name="files_list_kernel_modules" lineno="4259">
<summary>
List the contents of the kernel module directories.
</summary>
@@ -80053,7 +80208,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_kernel_modules" lineno="4195">
+<interface name="files_getattr_kernel_modules" lineno="4278">
<summary>
Get the attributes of kernel module files.
</summary>
@@ -80063,7 +80218,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_kernel_modules" lineno="4213">
+<interface name="files_read_kernel_modules" lineno="4296">
<summary>
Read kernel module files.
</summary>
@@ -80073,7 +80228,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mmap_read_kernel_modules" lineno="4233">
+<interface name="files_mmap_read_kernel_modules" lineno="4316">
<summary>
Read and mmap kernel module files.
</summary>
@@ -80083,7 +80238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_kernel_modules" lineno="4254">
+<interface name="files_write_kernel_modules" lineno="4337">
<summary>
Write kernel module files.
</summary>
@@ -80093,7 +80248,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_kernel_modules" lineno="4273">
+<interface name="files_delete_kernel_modules" lineno="4356">
<summary>
Delete kernel module files.
</summary>
@@ -80103,7 +80258,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_kernel_modules" lineno="4293">
+<interface name="files_manage_kernel_modules" lineno="4376">
<summary>
Create, read, write, and delete
kernel module files.
@@ -80115,7 +80270,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_kernel_modules" lineno="4313">
+<interface name="files_relabel_kernel_modules" lineno="4396">
<summary>
Relabel from and to kernel module files.
</summary>
@@ -80125,7 +80280,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_kernel_modules_filetrans" lineno="4348">
+<interface name="files_kernel_modules_filetrans" lineno="4431">
<summary>
Create objects in the kernel module directories
with a private type via an automatic type transition.
@@ -80151,7 +80306,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_load_kernel_modules" lineno="4366">
+<interface name="files_load_kernel_modules" lineno="4449">
<summary>
Load kernel module files.
</summary>
@@ -80161,7 +80316,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_load_kernel_modules" lineno="4385">
+<interface name="files_dontaudit_load_kernel_modules" lineno="4468">
<summary>
Load kernel module files.
</summary>
@@ -80171,7 +80326,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_world_readable" lineno="4405">
+<interface name="files_list_world_readable" lineno="4488">
<summary>
List world-readable directories.
</summary>
@@ -80182,7 +80337,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_world_readable_files" lineno="4424">
+<interface name="files_read_world_readable_files" lineno="4507">
<summary>
Read world-readable files.
</summary>
@@ -80193,7 +80348,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_world_readable_symlinks" lineno="4443">
+<interface name="files_read_world_readable_symlinks" lineno="4526">
<summary>
Read world-readable symbolic links.
</summary>
@@ -80204,7 +80359,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_world_readable_pipes" lineno="4461">
+<interface name="files_read_world_readable_pipes" lineno="4544">
<summary>
Read world-readable named pipes.
</summary>
@@ -80214,7 +80369,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_world_readable_sockets" lineno="4479">
+<interface name="files_read_world_readable_sockets" lineno="4562">
<summary>
Read world-readable sockets.
</summary>
@@ -80224,7 +80379,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_associate_tmp" lineno="4499">
+<interface name="files_associate_tmp" lineno="4582">
<summary>
Allow the specified type to associate
to a filesystem with the type of the
@@ -80236,7 +80391,7 @@ Type of the file to associate.
</summary>
</param>
</interface>
-<interface name="files_getattr_tmp_dirs" lineno="4517">
+<interface name="files_getattr_tmp_dirs" lineno="4600">
<summary>
Get the attributes of the tmp directory (/tmp).
</summary>
@@ -80246,7 +80401,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4536">
+<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4619">
<summary>
Do not audit attempts to get the
attributes of the tmp directory (/tmp).
@@ -80257,7 +80412,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_tmp" lineno="4554">
+<interface name="files_search_tmp" lineno="4637">
<summary>
Search the tmp directory (/tmp).
</summary>
@@ -80267,7 +80422,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_tmp" lineno="4572">
+<interface name="files_dontaudit_search_tmp" lineno="4655">
<summary>
Do not audit attempts to search the tmp directory (/tmp).
</summary>
@@ -80277,7 +80432,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_tmp" lineno="4590">
+<interface name="files_list_tmp" lineno="4673">
<summary>
Read the tmp directory (/tmp).
</summary>
@@ -80287,7 +80442,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_tmp" lineno="4608">
+<interface name="files_dontaudit_list_tmp" lineno="4691">
<summary>
Do not audit listing of the tmp directory (/tmp).
</summary>
@@ -80297,7 +80452,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="files_delete_tmp_dir_entry" lineno="4626">
+<interface name="files_delete_tmp_dir_entry" lineno="4709">
<summary>
Remove entries from the tmp directory.
</summary>
@@ -80307,7 +80462,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_tmp_files" lineno="4644">
+<interface name="files_read_generic_tmp_files" lineno="4727">
<summary>
Read files in the tmp directory (/tmp).
</summary>
@@ -80317,7 +80472,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_tmp_dirs" lineno="4662">
+<interface name="files_manage_generic_tmp_dirs" lineno="4745">
<summary>
Manage temporary directories in /tmp.
</summary>
@@ -80327,7 +80482,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_generic_tmp_dirs" lineno="4680">
+<interface name="files_relabel_generic_tmp_dirs" lineno="4763">
<summary>
Relabel temporary directories in /tmp.
</summary>
@@ -80337,7 +80492,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_tmp_files" lineno="4698">
+<interface name="files_manage_generic_tmp_files" lineno="4781">
<summary>
Manage temporary files and directories in /tmp.
</summary>
@@ -80347,7 +80502,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_tmp_symlinks" lineno="4716">
+<interface name="files_read_generic_tmp_symlinks" lineno="4799">
<summary>
Read symbolic links in the tmp directory (/tmp).
</summary>
@@ -80357,7 +80512,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_generic_tmp_sockets" lineno="4734">
+<interface name="files_rw_generic_tmp_sockets" lineno="4817">
<summary>
Read and write generic named sockets in the tmp directory (/tmp).
</summary>
@@ -80367,7 +80522,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_tmp" lineno="4752">
+<interface name="files_mounton_tmp" lineno="4835">
<summary>
Mount filesystems in the tmp directory (/tmp)
</summary>
@@ -80377,7 +80532,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_all_tmp_dirs" lineno="4770">
+<interface name="files_setattr_all_tmp_dirs" lineno="4853">
<summary>
Set the attributes of all tmp directories.
</summary>
@@ -80387,7 +80542,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_all_tmp" lineno="4788">
+<interface name="files_list_all_tmp" lineno="4871">
<summary>
List all tmp directories.
</summary>
@@ -80397,7 +80552,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_tmp_dirs" lineno="4808">
+<interface name="files_relabel_all_tmp_dirs" lineno="4891">
<summary>
Relabel to and from all temporary
directory types.
@@ -80409,7 +80564,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4829">
+<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4912">
<summary>
Do not audit attempts to get the attributes
of all tmp files.
@@ -80420,7 +80575,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_tmp_files" lineno="4848">
+<interface name="files_getattr_all_tmp_files" lineno="4931">
<summary>
Allow attempts to get the attributes
of all tmp files.
@@ -80431,7 +80586,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_tmp_files" lineno="4868">
+<interface name="files_relabel_all_tmp_files" lineno="4951">
<summary>
Relabel to and from all temporary
file types.
@@ -80443,7 +80598,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4889">
+<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4972">
<summary>
Do not audit attempts to get the attributes
of all tmp sock_file.
@@ -80454,7 +80609,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_tmp_files" lineno="4907">
+<interface name="files_read_all_tmp_files" lineno="4990">
<summary>
Read all tmp files.
</summary>
@@ -80464,7 +80619,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_tmp_filetrans" lineno="4941">
+<interface name="files_tmp_filetrans" lineno="5024">
<summary>
Create an object in the tmp directories, with a private
type using a type transition.
@@ -80490,7 +80645,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_purge_tmp" lineno="4959">
+<interface name="files_purge_tmp" lineno="5042">
<summary>
Delete the contents of /tmp.
</summary>
@@ -80500,7 +80655,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_usr_dirs" lineno="4982">
+<interface name="files_getattr_all_tmpfs_files" lineno="5065">
+<summary>
+Get the attributes of all tmpfs files.
+</summary>
+<param name="type">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_setattr_usr_dirs" lineno="5084">
<summary>
Set the attributes of the /usr directory.
</summary>
@@ -80510,7 +80675,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_usr" lineno="5000">
+<interface name="files_search_usr" lineno="5102">
<summary>
Search the content of /usr.
</summary>
@@ -80520,7 +80685,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_usr" lineno="5019">
+<interface name="files_list_usr" lineno="5121">
<summary>
List the contents of generic
directories in /usr.
@@ -80531,7 +80696,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_usr_dirs" lineno="5037">
+<interface name="files_dontaudit_write_usr_dirs" lineno="5139">
<summary>
Do not audit write of /usr dirs
</summary>
@@ -80541,7 +80706,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_rw_usr_dirs" lineno="5055">
+<interface name="files_rw_usr_dirs" lineno="5157">
<summary>
Add and remove entries from /usr directories.
</summary>
@@ -80551,7 +80716,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_usr_dirs" lineno="5074">
+<interface name="files_dontaudit_rw_usr_dirs" lineno="5176">
<summary>
Do not audit attempts to add and remove
entries from /usr directories.
@@ -80562,7 +80727,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_delete_usr_dirs" lineno="5092">
+<interface name="files_delete_usr_dirs" lineno="5194">
<summary>
Delete generic directories in /usr in the caller domain.
</summary>
@@ -80572,7 +80737,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_usr_dirs" lineno="5110">
+<interface name="files_watch_usr_dirs" lineno="5212">
<summary>
Watch generic directories in /usr.
</summary>
@@ -80582,7 +80747,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_usr_files" lineno="5128">
+<interface name="files_delete_usr_files" lineno="5230">
<summary>
Delete generic files in /usr in the caller domain.
</summary>
@@ -80592,7 +80757,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_usr_files" lineno="5146">
+<interface name="files_getattr_usr_files" lineno="5248">
<summary>
Get the attributes of files in /usr.
</summary>
@@ -80602,7 +80767,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_map_usr_files" lineno="5165">
+<interface name="files_map_usr_files" lineno="5267">
<summary>
Map generic files in /usr.
</summary>
@@ -80613,7 +80778,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_read_usr_files" lineno="5201">
+<interface name="files_read_usr_files" lineno="5303">
<summary>
Read generic files in /usr.
</summary>
@@ -80641,7 +80806,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_exec_usr_files" lineno="5221">
+<interface name="files_exec_usr_files" lineno="5323">
<summary>
Execute generic programs in /usr in the caller domain.
</summary>
@@ -80651,7 +80816,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_usr_files" lineno="5241">
+<interface name="files_dontaudit_write_usr_files" lineno="5343">
<summary>
dontaudit write of /usr files
</summary>
@@ -80661,7 +80826,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_usr_files" lineno="5259">
+<interface name="files_manage_usr_files" lineno="5361">
<summary>
Create, read, write, and delete files in the /usr directory.
</summary>
@@ -80671,7 +80836,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_usr_files" lineno="5277">
+<interface name="files_relabelto_usr_files" lineno="5379">
<summary>
Relabel a file to the type used in /usr.
</summary>
@@ -80681,7 +80846,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelfrom_usr_files" lineno="5295">
+<interface name="files_relabelfrom_usr_files" lineno="5397">
<summary>
Relabel a file from the type used in /usr.
</summary>
@@ -80691,7 +80856,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_usr_symlinks" lineno="5313">
+<interface name="files_read_usr_symlinks" lineno="5415">
<summary>
Read symbolic links in /usr.
</summary>
@@ -80701,7 +80866,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_usr_filetrans" lineno="5346">
+<interface name="files_usr_filetrans" lineno="5448">
<summary>
Create objects in the /usr directory
</summary>
@@ -80726,7 +80891,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_search_src" lineno="5364">
+<interface name="files_search_src" lineno="5466">
<summary>
Search directories in /usr/src.
</summary>
@@ -80736,7 +80901,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_src" lineno="5382">
+<interface name="files_dontaudit_search_src" lineno="5484">
<summary>
Do not audit attempts to search /usr/src.
</summary>
@@ -80746,7 +80911,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_usr_src_files" lineno="5400">
+<interface name="files_getattr_usr_src_files" lineno="5502">
<summary>
Get the attributes of files in /usr/src.
</summary>
@@ -80756,7 +80921,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_usr_src_files" lineno="5421">
+<interface name="files_read_usr_src_files" lineno="5523">
<summary>
Read files in /usr/src.
</summary>
@@ -80766,7 +80931,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_usr_src_files" lineno="5442">
+<interface name="files_exec_usr_src_files" lineno="5544">
<summary>
Execute programs in /usr/src in the caller domain.
</summary>
@@ -80776,7 +80941,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_kernel_symbol_table" lineno="5462">
+<interface name="files_create_kernel_symbol_table" lineno="5564">
<summary>
Install a system.map into the /boot directory.
</summary>
@@ -80786,7 +80951,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_kernel_symbol_table" lineno="5481">
+<interface name="files_read_kernel_symbol_table" lineno="5583">
<summary>
Read system.map in the /boot directory.
</summary>
@@ -80796,7 +80961,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_kernel_symbol_table" lineno="5500">
+<interface name="files_delete_kernel_symbol_table" lineno="5602">
<summary>
Delete a system.map in the /boot directory.
</summary>
@@ -80806,7 +80971,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_var" lineno="5519">
+<interface name="files_search_var" lineno="5621">
<summary>
Search the contents of /var.
</summary>
@@ -80816,7 +80981,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_var_dirs" lineno="5537">
+<interface name="files_dontaudit_write_var_dirs" lineno="5639">
<summary>
Do not audit attempts to write to /var.
</summary>
@@ -80826,7 +80991,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_write_var_dirs" lineno="5555">
+<interface name="files_write_var_dirs" lineno="5657">
<summary>
Allow attempts to write to /var.dirs
</summary>
@@ -80836,7 +81001,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_var" lineno="5574">
+<interface name="files_dontaudit_search_var" lineno="5676">
<summary>
Do not audit attempts to search
the contents of /var.
@@ -80847,7 +81012,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_var" lineno="5592">
+<interface name="files_list_var" lineno="5694">
<summary>
List the contents of /var.
</summary>
@@ -80857,7 +81022,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_var" lineno="5611">
+<interface name="files_dontaudit_list_var" lineno="5713">
<summary>
Do not audit attempts to list
the contents of /var.
@@ -80868,7 +81033,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_var_dirs" lineno="5630">
+<interface name="files_manage_var_dirs" lineno="5732">
<summary>
Create, read, write, and delete directories
in the /var directory.
@@ -80879,7 +81044,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_var_dirs" lineno="5648">
+<interface name="files_relabel_var_dirs" lineno="5750">
<summary>
relabelto/from var directories
</summary>
@@ -80889,7 +81054,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_var_files" lineno="5666">
+<interface name="files_read_var_files" lineno="5768">
<summary>
Read files in the /var directory.
</summary>
@@ -80899,7 +81064,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_append_var_files" lineno="5684">
+<interface name="files_append_var_files" lineno="5786">
<summary>
Append files in the /var directory.
</summary>
@@ -80909,7 +81074,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_var_files" lineno="5702">
+<interface name="files_rw_var_files" lineno="5804">
<summary>
Read and write files in the /var directory.
</summary>
@@ -80919,7 +81084,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_var_files" lineno="5721">
+<interface name="files_dontaudit_rw_var_files" lineno="5823">
<summary>
Do not audit attempts to read and write
files in the /var directory.
@@ -80930,7 +81095,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_var_files" lineno="5739">
+<interface name="files_manage_var_files" lineno="5841">
<summary>
Create, read, write, and delete files in the /var directory.
</summary>
@@ -80940,7 +81105,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_var_symlinks" lineno="5757">
+<interface name="files_read_var_symlinks" lineno="5859">
<summary>
Read symbolic links in the /var directory.
</summary>
@@ -80950,7 +81115,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_var_symlinks" lineno="5776">
+<interface name="files_manage_var_symlinks" lineno="5878">
<summary>
Create, read, write, and delete symbolic
links in the /var directory.
@@ -80961,7 +81126,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_var_filetrans" lineno="5809">
+<interface name="files_var_filetrans" lineno="5911">
<summary>
Create objects in the /var directory
</summary>
@@ -80986,7 +81151,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_getattr_var_lib_dirs" lineno="5827">
+<interface name="files_getattr_var_lib_dirs" lineno="5929">
<summary>
Get the attributes of the /var/lib directory.
</summary>
@@ -80996,7 +81161,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_var_lib" lineno="5859">
+<interface name="files_search_var_lib" lineno="5961">
<summary>
Search the /var/lib directory.
</summary>
@@ -81020,7 +81185,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="5"/>
</interface>
-<interface name="files_dontaudit_search_var_lib" lineno="5879">
+<interface name="files_dontaudit_search_var_lib" lineno="5981">
<summary>
Do not audit attempts to search the
contents of /var/lib.
@@ -81032,7 +81197,7 @@ Domain to not audit.
</param>
<infoflow type="read" weight="5"/>
</interface>
-<interface name="files_list_var_lib" lineno="5897">
+<interface name="files_list_var_lib" lineno="5999">
<summary>
List the contents of the /var/lib directory.
</summary>
@@ -81042,7 +81207,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_var_lib_dirs" lineno="5915">
+<interface name="files_rw_var_lib_dirs" lineno="6017">
<summary>
Read-write /var/lib directories
</summary>
@@ -81052,7 +81217,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_var_lib_dirs" lineno="5933">
+<interface name="files_manage_var_lib_dirs" lineno="6035">
<summary>
manage var_lib_t dirs
</summary>
@@ -81062,7 +81227,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_var_lib_dirs" lineno="5952">
+<interface name="files_relabel_var_lib_dirs" lineno="6054">
<summary>
relabel var_lib_t dirs
</summary>
@@ -81072,7 +81237,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_var_lib_filetrans" lineno="5986">
+<interface name="files_var_lib_filetrans" lineno="6088">
<summary>
Create objects in the /var/lib directory
</summary>
@@ -81097,7 +81262,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_read_var_lib_files" lineno="6005">
+<interface name="files_read_var_lib_files" lineno="6107">
<summary>
Read generic files in /var/lib.
</summary>
@@ -81107,7 +81272,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_var_lib_symlinks" lineno="6024">
+<interface name="files_read_var_lib_symlinks" lineno="6126">
<summary>
Read generic symbolic links in /var/lib
</summary>
@@ -81117,7 +81282,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_urandom_seed" lineno="6046">
+<interface name="files_manage_urandom_seed" lineno="6148">
<summary>
Create, read, write, and delete the
pseudorandom number generator seed.
@@ -81128,7 +81293,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_mounttab" lineno="6066">
+<interface name="files_manage_mounttab" lineno="6168">
<summary>
Allow domain to manage mount tables
necessary for rpcd, nfsd, etc.
@@ -81139,7 +81304,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_lock_dirs" lineno="6085">
+<interface name="files_setattr_lock_dirs" lineno="6187">
<summary>
Set the attributes of the generic lock directories.
</summary>
@@ -81149,7 +81314,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_locks" lineno="6103">
+<interface name="files_search_locks" lineno="6205">
<summary>
Search the locks directory (/var/lock).
</summary>
@@ -81159,7 +81324,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_locks" lineno="6123">
+<interface name="files_dontaudit_search_locks" lineno="6225">
<summary>
Do not audit attempts to search the
locks directory (/var/lock).
@@ -81170,7 +81335,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_locks" lineno="6142">
+<interface name="files_list_locks" lineno="6244">
<summary>
List generic lock directories.
</summary>
@@ -81180,7 +81345,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_check_write_lock_dirs" lineno="6161">
+<interface name="files_check_write_lock_dirs" lineno="6263">
<summary>
Test write access on lock directories.
</summary>
@@ -81190,7 +81355,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_add_entry_lock_dirs" lineno="6180">
+<interface name="files_add_entry_lock_dirs" lineno="6282">
<summary>
Add entries in the /var/lock directories.
</summary>
@@ -81200,7 +81365,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_lock_dirs" lineno="6200">
+<interface name="files_rw_lock_dirs" lineno="6302">
<summary>
Add and remove entries in the /var/lock
directories.
@@ -81211,7 +81376,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_lock_dirs" lineno="6219">
+<interface name="files_create_lock_dirs" lineno="6321">
<summary>
Create lock directories
</summary>
@@ -81221,7 +81386,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_relabel_all_lock_dirs" lineno="6240">
+<interface name="files_relabel_all_lock_dirs" lineno="6342">
<summary>
Relabel to and from all lock directory types.
</summary>
@@ -81232,7 +81397,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_generic_locks" lineno="6261">
+<interface name="files_getattr_generic_locks" lineno="6363">
<summary>
Get the attributes of generic lock files.
</summary>
@@ -81242,7 +81407,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_generic_locks" lineno="6282">
+<interface name="files_delete_generic_locks" lineno="6384">
<summary>
Delete generic lock files.
</summary>
@@ -81252,7 +81417,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_locks" lineno="6303">
+<interface name="files_manage_generic_locks" lineno="6405">
<summary>
Create, read, write, and delete generic
lock files.
@@ -81263,7 +81428,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_locks" lineno="6325">
+<interface name="files_delete_all_locks" lineno="6427">
<summary>
Delete all lock files.
</summary>
@@ -81274,7 +81439,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_all_locks" lineno="6346">
+<interface name="files_read_all_locks" lineno="6448">
<summary>
Read all lock files.
</summary>
@@ -81284,7 +81449,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_all_locks" lineno="6369">
+<interface name="files_manage_all_locks" lineno="6471">
<summary>
manage all lock files.
</summary>
@@ -81294,7 +81459,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_locks" lineno="6392">
+<interface name="files_relabel_all_locks" lineno="6494">
<summary>
Relabel from/to all lock files.
</summary>
@@ -81304,7 +81469,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_lock_filetrans" lineno="6431">
+<interface name="files_lock_filetrans" lineno="6533">
<summary>
Create an object in the locks directory, with a private
type using a type transition.
@@ -81330,7 +81495,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_pid_dirs" lineno="6452">
+<interface name="files_dontaudit_getattr_pid_dirs" lineno="6554">
<summary>
Do not audit attempts to get the attributes
of the /var/run directory. (Deprecated)
@@ -81341,7 +81506,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_mounton_pid_dirs" lineno="6467">
+<interface name="files_mounton_pid_dirs" lineno="6569">
<summary>
mounton a /var/run directory. (Deprecated)
</summary>
@@ -81351,7 +81516,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_pid_dirs" lineno="6482">
+<interface name="files_setattr_pid_dirs" lineno="6584">
<summary>
Set the attributes of the /var/run directory. (Deprecated)
</summary>
@@ -81361,7 +81526,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_pids" lineno="6498">
+<interface name="files_search_pids" lineno="6600">
<summary>
Search the contents of runtime process
ID directories (/var/run). (Deprecated)
@@ -81372,7 +81537,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_pids" lineno="6514">
+<interface name="files_dontaudit_search_pids" lineno="6616">
<summary>
Do not audit attempts to search
the /var/run directory. (Deprecated)
@@ -81383,7 +81548,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_pids" lineno="6530">
+<interface name="files_list_pids" lineno="6632">
<summary>
List the contents of the runtime process
ID directories (/var/run). (Deprecated)
@@ -81394,7 +81559,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_check_write_pid_dirs" lineno="6545">
+<interface name="files_check_write_pid_dirs" lineno="6647">
<summary>
Check write access on /var/run directories. (Deprecated)
</summary>
@@ -81404,7 +81569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_pid_dirs" lineno="6560">
+<interface name="files_create_pid_dirs" lineno="6662">
<summary>
Create a /var/run directory. (Deprecated)
</summary>
@@ -81414,7 +81579,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6576">
+<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6678">
<summary>
Do not audit attempts to get the attributes
of the /var/run directory.
@@ -81425,7 +81590,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_mounton_runtime_dirs" lineno="6595">
+<interface name="files_mounton_runtime_dirs" lineno="6697">
<summary>
mounton a /var/run directory.
</summary>
@@ -81435,7 +81600,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_runtime_dirs" lineno="6613">
+<interface name="files_setattr_runtime_dirs" lineno="6715">
<summary>
Set the attributes of the /var/run directory.
</summary>
@@ -81445,7 +81610,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_runtime" lineno="6633">
+<interface name="files_search_runtime" lineno="6735">
<summary>
Search the contents of runtime process
ID directories (/var/run).
@@ -81456,7 +81621,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_runtime" lineno="6653">
+<interface name="files_dontaudit_search_runtime" lineno="6755">
<summary>
Do not audit attempts to search
the /var/run directory.
@@ -81467,7 +81632,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_runtime" lineno="6673">
+<interface name="files_list_runtime" lineno="6775">
<summary>
List the contents of the runtime process
ID directories (/var/run).
@@ -81478,7 +81643,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_check_write_runtime_dirs" lineno="6692">
+<interface name="files_check_write_runtime_dirs" lineno="6794">
<summary>
Check write access on /var/run directories.
</summary>
@@ -81488,7 +81653,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_runtime_dirs" lineno="6710">
+<interface name="files_create_runtime_dirs" lineno="6812">
<summary>
Create a /var/run directory.
</summary>
@@ -81498,7 +81663,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_runtime_dirs" lineno="6728">
+<interface name="files_watch_runtime_dirs" lineno="6830">
<summary>
Watch /var/run directories.
</summary>
@@ -81508,7 +81673,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_pids" lineno="6746">
+<interface name="files_read_generic_pids" lineno="6848">
<summary>
Read generic process ID files. (Deprecated)
</summary>
@@ -81518,7 +81683,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_generic_pid_pipes" lineno="6761">
+<interface name="files_write_generic_pid_pipes" lineno="6863">
<summary>
Write named generic process ID pipes. (Deprecated)
</summary>
@@ -81528,7 +81693,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_pid_filetrans" lineno="6818">
+<interface name="files_pid_filetrans" lineno="6920">
<summary>
Create an object in the process ID directory, with a private type. (Deprecated)
</summary>
@@ -81580,7 +81745,7 @@ The name of the object being created.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="files_pid_filetrans_lock_dir" lineno="6838">
+<interface name="files_pid_filetrans_lock_dir" lineno="6940">
<summary>
Create a generic lock directory within the run directories. (Deprecated)
</summary>
@@ -81595,7 +81760,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_rw_generic_pids" lineno="6853">
+<interface name="files_rw_generic_pids" lineno="6955">
<summary>
Read and write generic process ID files. (Deprecated)
</summary>
@@ -81605,7 +81770,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_pids" lineno="6869">
+<interface name="files_dontaudit_getattr_all_pids" lineno="6971">
<summary>
Do not audit attempts to get the attributes of
daemon runtime data files. (Deprecated)
@@ -81616,7 +81781,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_all_pids" lineno="6884">
+<interface name="files_dontaudit_write_all_pids" lineno="6986">
<summary>
Do not audit attempts to write to daemon runtime data files. (Deprecated)
</summary>
@@ -81626,7 +81791,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_ioctl_all_pids" lineno="6899">
+<interface name="files_dontaudit_ioctl_all_pids" lineno="7001">
<summary>
Do not audit attempts to ioctl daemon runtime data files. (Deprecated)
</summary>
@@ -81636,7 +81801,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_all_pid_dirs" lineno="6915">
+<interface name="files_manage_all_pid_dirs" lineno="7017">
<summary>
manage all pidfile directories
in the /var/run directory. (Deprecated)
@@ -81647,7 +81812,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_all_pids" lineno="6931">
+<interface name="files_read_all_pids" lineno="7033">
<summary>
Read all process ID files. (Deprecated)
</summary>
@@ -81658,7 +81823,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_exec_generic_pid_files" lineno="6946">
+<interface name="files_exec_generic_pid_files" lineno="7048">
<summary>
Execute generic programs in /var/run in the caller domain. (Deprecated)
</summary>
@@ -81668,7 +81833,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_pid_files" lineno="6961">
+<interface name="files_relabel_all_pid_files" lineno="7063">
<summary>
Relabel all pid files. (Deprecated)
</summary>
@@ -81678,7 +81843,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_pids" lineno="6977">
+<interface name="files_delete_all_pids" lineno="7079">
<summary>
Delete all process IDs. (Deprecated)
</summary>
@@ -81689,7 +81854,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_create_all_pid_sockets" lineno="6996">
+<interface name="files_create_all_pid_sockets" lineno="7098">
<summary>
Create all pid sockets. (Deprecated)
</summary>
@@ -81699,7 +81864,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_pid_pipes" lineno="7011">
+<interface name="files_create_all_pid_pipes" lineno="7113">
<summary>
Create all pid named pipes. (Deprecated)
</summary>
@@ -81709,7 +81874,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_runtime_files" lineno="7026">
+<interface name="files_read_runtime_files" lineno="7128">
<summary>
Read generic runtime files.
</summary>
@@ -81719,7 +81884,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_runtime" lineno="7046">
+<interface name="files_exec_runtime" lineno="7148">
<summary>
Execute generic programs in /var/run in the caller domain.
</summary>
@@ -81729,7 +81894,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_runtime_files" lineno="7064">
+<interface name="files_rw_runtime_files" lineno="7166">
<summary>
Read and write generic runtime files.
</summary>
@@ -81739,7 +81904,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_runtime_symlinks" lineno="7084">
+<interface name="files_delete_runtime_symlinks" lineno="7186">
<summary>
Delete generic runtime symlinks.
</summary>
@@ -81749,7 +81914,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_runtime_pipes" lineno="7102">
+<interface name="files_write_runtime_pipes" lineno="7204">
<summary>
Write named generic runtime pipes.
</summary>
@@ -81759,7 +81924,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_runtime_dirs" lineno="7122">
+<interface name="files_delete_all_runtime_dirs" lineno="7224">
<summary>
Delete all runtime dirs.
</summary>
@@ -81770,7 +81935,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_runtime_dirs" lineno="7140">
+<interface name="files_manage_all_runtime_dirs" lineno="7242">
<summary>
Create, read, write, and delete all runtime directories.
</summary>
@@ -81780,7 +81945,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_runtime_dirs" lineno="7158">
+<interface name="files_relabel_all_runtime_dirs" lineno="7260">
<summary>
Relabel all runtime directories.
</summary>
@@ -81790,7 +81955,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7177">
+<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7279">
<summary>
Do not audit attempts to get the attributes of
all runtime data files.
@@ -81801,7 +81966,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_runtime_files" lineno="7198">
+<interface name="files_read_all_runtime_files" lineno="7300">
<summary>
Read all runtime files.
</summary>
@@ -81812,7 +81977,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7219">
+<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7321">
<summary>
Do not audit attempts to ioctl all runtime files.
</summary>
@@ -81822,7 +81987,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_all_runtime_files" lineno="7239">
+<interface name="files_dontaudit_write_all_runtime_files" lineno="7341">
<summary>
Do not audit attempts to write to all runtime files.
</summary>
@@ -81832,7 +81997,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_delete_all_runtime_files" lineno="7260">
+<interface name="files_delete_all_runtime_files" lineno="7362">
<summary>
Delete all runtime files.
</summary>
@@ -81843,7 +82008,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_runtime_files" lineno="7279">
+<interface name="files_manage_all_runtime_files" lineno="7381">
<summary>
Create, read, write and delete all
var_run (pid) files
@@ -81854,7 +82019,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_runtime_files" lineno="7297">
+<interface name="files_relabel_all_runtime_files" lineno="7399">
<summary>
Relabel all runtime files.
</summary>
@@ -81864,7 +82029,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_runtime_symlinks" lineno="7316">
+<interface name="files_delete_all_runtime_symlinks" lineno="7418">
<summary>
Delete all runtime symlinks.
</summary>
@@ -81875,7 +82040,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_runtime_symlinks" lineno="7335">
+<interface name="files_manage_all_runtime_symlinks" lineno="7437">
<summary>
Create, read, write and delete all
var_run (pid) symbolic links.
@@ -81886,7 +82051,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_runtime_symlinks" lineno="7353">
+<interface name="files_relabel_all_runtime_symlinks" lineno="7455">
<summary>
Relabel all runtime symbolic links.
</summary>
@@ -81896,7 +82061,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_runtime_pipes" lineno="7371">
+<interface name="files_create_all_runtime_pipes" lineno="7473">
<summary>
Create all runtime named pipes
</summary>
@@ -81906,7 +82071,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_runtime_pipes" lineno="7390">
+<interface name="files_delete_all_runtime_pipes" lineno="7492">
<summary>
Delete all runtime named pipes
</summary>
@@ -81916,7 +82081,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_runtime_sockets" lineno="7409">
+<interface name="files_create_all_runtime_sockets" lineno="7511">
<summary>
Create all runtime sockets.
</summary>
@@ -81926,7 +82091,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_runtime_sockets" lineno="7427">
+<interface name="files_delete_all_runtime_sockets" lineno="7529">
<summary>
Delete all runtime sockets.
</summary>
@@ -81936,7 +82101,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_runtime_sockets" lineno="7445">
+<interface name="files_relabel_all_runtime_sockets" lineno="7547">
<summary>
Relabel all runtime named sockets.
</summary>
@@ -81946,7 +82111,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_runtime_filetrans" lineno="7505">
+<interface name="files_runtime_filetrans" lineno="7607">
<summary>
Create an object in the /run directory, with a private type.
</summary>
@@ -81998,7 +82163,7 @@ The name of the object being created.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="files_runtime_filetrans_lock_dir" lineno="7530">
+<interface name="files_runtime_filetrans_lock_dir" lineno="7632">
<summary>
Create a generic lock directory within the run directories.
</summary>
@@ -82013,7 +82178,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_create_all_spool_sockets" lineno="7548">
+<interface name="files_create_all_spool_sockets" lineno="7650">
<summary>
Create all spool sockets
</summary>
@@ -82023,7 +82188,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_spool_sockets" lineno="7566">
+<interface name="files_delete_all_spool_sockets" lineno="7668">
<summary>
Delete all spool sockets
</summary>
@@ -82033,7 +82198,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_pid_dirs" lineno="7584">
+<interface name="files_delete_all_pid_dirs" lineno="7686">
<summary>
Delete all process ID directories. (Deprecated)
</summary>
@@ -82043,7 +82208,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_all_pids" lineno="7600">
+<interface name="files_manage_all_pids" lineno="7702">
<summary>
Create, read, write and delete all
var_run (pid) content (Deprecated)
@@ -82054,7 +82219,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_pid_dirs" lineno="7617">
+<interface name="files_relabel_all_pid_dirs" lineno="7719">
<summary>
Relabel to/from all var_run (pid) directories (Deprecated)
</summary>
@@ -82064,7 +82229,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_pid_sock_files" lineno="7632">
+<interface name="files_relabel_all_pid_sock_files" lineno="7734">
<summary>
Relabel to/from all var_run (pid) socket files (Deprecated)
</summary>
@@ -82074,7 +82239,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_pids" lineno="7647">
+<interface name="files_relabel_all_pids" lineno="7749">
<summary>
Relabel to/from all var_run (pid) files and directories (Deprecated)
</summary>
@@ -82084,7 +82249,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_all_poly_members" lineno="7665">
+<interface name="files_mounton_all_poly_members" lineno="7767">
<summary>
Mount filesystems on all polyinstantiation
member directories.
@@ -82095,7 +82260,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_spool" lineno="7684">
+<interface name="files_search_spool" lineno="7786">
<summary>
Search the contents of generic spool
directories (/var/spool).
@@ -82106,7 +82271,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_spool" lineno="7703">
+<interface name="files_dontaudit_search_spool" lineno="7805">
<summary>
Do not audit attempts to search generic
spool directories.
@@ -82117,7 +82282,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_spool" lineno="7722">
+<interface name="files_list_spool" lineno="7824">
<summary>
List the contents of generic spool
(/var/spool) directories.
@@ -82128,7 +82293,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_spool_dirs" lineno="7741">
+<interface name="files_manage_generic_spool_dirs" lineno="7843">
<summary>
Create, read, write, and delete generic
spool directories (/var/spool).
@@ -82139,7 +82304,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_spool" lineno="7760">
+<interface name="files_read_generic_spool" lineno="7862">
<summary>
Read generic spool files.
</summary>
@@ -82149,7 +82314,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_spool" lineno="7780">
+<interface name="files_manage_generic_spool" lineno="7882">
<summary>
Create, read, write, and delete generic
spool files.
@@ -82160,7 +82325,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_spool_filetrans" lineno="7816">
+<interface name="files_spool_filetrans" lineno="7918">
<summary>
Create objects in the spool directory
with a private type with a type transition.
@@ -82187,7 +82352,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_polyinstantiate_all" lineno="7836">
+<interface name="files_polyinstantiate_all" lineno="7938">
<summary>
Allow access to manage all polyinstantiated
directories on the system.
@@ -82198,7 +82363,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_unconfined" lineno="7890">
+<interface name="files_unconfined" lineno="7992">
<summary>
Unconfined access to files.
</summary>
@@ -82208,7 +82373,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_etc_runtime_lnk_files" lineno="7912">
+<interface name="files_manage_etc_runtime_lnk_files" lineno="8014">
<summary>
Create, read, write, and delete symbolic links in
/etc that are dynamically created on boot.
@@ -82220,7 +82385,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_read_etc_runtime" lineno="7930">
+<interface name="files_dontaudit_read_etc_runtime" lineno="8032">
<summary>
Do not audit attempts to read etc_runtime resources
</summary>
@@ -82230,7 +82395,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_src" lineno="7948">
+<interface name="files_list_src" lineno="8050">
<summary>
List usr/src files
</summary>
@@ -82240,7 +82405,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_read_src_files" lineno="7966">
+<interface name="files_read_src_files" lineno="8068">
<summary>
Read usr/src files
</summary>
@@ -82250,7 +82415,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_manage_src_files" lineno="7984">
+<interface name="files_manage_src_files" lineno="8086">
<summary>
Manage /usr/src files
</summary>
@@ -82260,7 +82425,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_lib_filetrans_kernel_modules" lineno="8015">
+<interface name="files_lib_filetrans_kernel_modules" lineno="8117">
<summary>
Create a resource in the generic lib location
with an automatic type transition towards the kernel modules
@@ -82282,7 +82447,7 @@ Optional name of the resource
</summary>
</param>
</interface>
-<interface name="files_read_etc_runtime" lineno="8033">
+<interface name="files_read_etc_runtime" lineno="8135">
<summary>
Read etc runtime resources
</summary>
@@ -82292,7 +82457,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_relabel_all_non_security_file_types" lineno="8055">
+<interface name="files_relabel_all_non_security_file_types" lineno="8157">
<summary>
Allow relabel from and to non-security types
</summary>
@@ -82303,7 +82468,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_non_security_file_types" lineno="8085">
+<interface name="files_manage_all_non_security_file_types" lineno="8187">
<summary>
Manage non-security-sensitive resource types
</summary>
@@ -82314,7 +82479,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_all_pidfiles" lineno="8107">
+<interface name="files_relabel_all_pidfiles" lineno="8209">
<summary>
Allow relabeling from and to any pidfile associated type
</summary>
@@ -82792,7 +82957,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_delete_cgroup_dirs" lineno="783">
+<interface name="fs_ioctl_cgroup_dirs" lineno="783">
+<summary>
+Ioctl cgroup directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_delete_cgroup_dirs" lineno="802">
<summary>
Delete cgroup directories.
</summary>
@@ -82802,7 +82977,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_cgroup_dirs" lineno="802">
+<interface name="fs_manage_cgroup_dirs" lineno="821">
<summary>
Manage cgroup directories.
</summary>
@@ -82812,7 +82987,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_cgroup_dirs" lineno="822">
+<interface name="fs_relabel_cgroup_dirs" lineno="841">
<summary>
Relabel cgroup directories.
</summary>
@@ -82822,7 +82997,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_cgroup_files" lineno="840">
+<interface name="fs_getattr_cgroup_files" lineno="859">
<summary>
Get attributes of cgroup files.
</summary>
@@ -82832,7 +83007,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cgroup_files" lineno="860">
+<interface name="fs_read_cgroup_files" lineno="879">
<summary>
Read cgroup files.
</summary>
@@ -82842,7 +83017,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_watch_cgroup_files" lineno="881">
+<interface name="fs_watch_cgroup_files" lineno="900">
<summary>
Watch cgroup files.
</summary>
@@ -82852,7 +83027,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_create_cgroup_links" lineno="900">
+<interface name="fs_create_cgroup_links" lineno="919">
<summary>
Create cgroup lnk_files.
</summary>
@@ -82862,7 +83037,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_write_cgroup_files" lineno="920">
+<interface name="fs_write_cgroup_files" lineno="939">
<summary>
Write cgroup files.
</summary>
@@ -82872,7 +83047,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_cgroup_files" lineno="939">
+<interface name="fs_rw_cgroup_files" lineno="958">
<summary>
Read and write cgroup files.
</summary>
@@ -82882,7 +83057,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_rw_cgroup_files" lineno="961">
+<interface name="fs_dontaudit_rw_cgroup_files" lineno="980">
<summary>
Do not audit attempts to open,
get attributes, read and write
@@ -82894,7 +83069,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_cgroup_files" lineno="979">
+<interface name="fs_manage_cgroup_files" lineno="998">
<summary>
Manage cgroup files.
</summary>
@@ -82904,7 +83079,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_cgroup_symlinks" lineno="999">
+<interface name="fs_relabel_cgroup_symlinks" lineno="1018">
<summary>
Relabel cgroup symbolic links.
</summary>
@@ -82914,7 +83089,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mounton_cgroup" lineno="1017">
+<interface name="fs_mounton_cgroup" lineno="1036">
<summary>
Mount on cgroup directories.
</summary>
@@ -82924,7 +83099,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_cgroup_filetrans" lineno="1051">
+<interface name="fs_cgroup_filetrans" lineno="1070">
<summary>
Create an object in a cgroup tmpfs filesystem, with a private
type using a type transition.
@@ -82950,7 +83125,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_cifs_dirs" lineno="1072">
+<interface name="fs_dontaudit_list_cifs_dirs" lineno="1091">
<summary>
Do not audit attempts to read
dirs on a CIFS or SMB filesystem.
@@ -82961,7 +83136,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mount_cifs" lineno="1090">
+<interface name="fs_mount_cifs" lineno="1109">
<summary>
Mount a CIFS or SMB network filesystem.
</summary>
@@ -82971,7 +83146,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_cifs" lineno="1109">
+<interface name="fs_remount_cifs" lineno="1128">
<summary>
Remount a CIFS or SMB network filesystem.
This allows some mount options to be changed.
@@ -82982,7 +83157,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_cifs" lineno="1127">
+<interface name="fs_unmount_cifs" lineno="1146">
<summary>
Unmount a CIFS or SMB network filesystem.
</summary>
@@ -82992,7 +83167,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_cifs" lineno="1147">
+<interface name="fs_getattr_cifs" lineno="1166">
<summary>
Get the attributes of a CIFS or
SMB network filesystem.
@@ -83004,7 +83179,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_search_cifs" lineno="1165">
+<interface name="fs_search_cifs" lineno="1184">
<summary>
Search directories on a CIFS or SMB filesystem.
</summary>
@@ -83014,7 +83189,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_cifs" lineno="1184">
+<interface name="fs_list_cifs" lineno="1203">
<summary>
List the contents of directories on a
CIFS or SMB filesystem.
@@ -83025,7 +83200,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_cifs" lineno="1203">
+<interface name="fs_dontaudit_list_cifs" lineno="1222">
<summary>
Do not audit attempts to list the contents
of directories on a CIFS or SMB filesystem.
@@ -83036,7 +83211,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mounton_cifs" lineno="1221">
+<interface name="fs_mounton_cifs" lineno="1240">
<summary>
Mounton a CIFS filesystem.
</summary>
@@ -83046,7 +83221,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_files" lineno="1240">
+<interface name="fs_read_cifs_files" lineno="1259">
<summary>
Read files on a CIFS or SMB filesystem.
</summary>
@@ -83057,7 +83232,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_read_all_inherited_image_files" lineno="1260">
+<interface name="fs_read_all_inherited_image_files" lineno="1279">
<summary>
Read all inherited filesystem image files.
</summary>
@@ -83068,7 +83243,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_read_all_image_files" lineno="1279">
+<interface name="fs_read_all_image_files" lineno="1298">
<summary>
Read all filesystem image files.
</summary>
@@ -83079,7 +83254,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_mmap_read_all_image_files" lineno="1298">
+<interface name="fs_mmap_read_all_image_files" lineno="1317">
<summary>
Mmap-read all filesystem image files.
</summary>
@@ -83090,7 +83265,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_rw_all_image_files" lineno="1317">
+<interface name="fs_rw_all_image_files" lineno="1336">
<summary>
Read and write all filesystem image files.
</summary>
@@ -83101,7 +83276,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_mmap_rw_all_image_files" lineno="1336">
+<interface name="fs_mmap_rw_all_image_files" lineno="1355">
<summary>
Mmap-Read-write all filesystem image files.
</summary>
@@ -83112,7 +83287,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_write_all_image_files" lineno="1355">
+<interface name="fs_dontaudit_write_all_image_files" lineno="1374">
<summary>
Do not audit attempts to write all filesystem image files.
</summary>
@@ -83123,7 +83298,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_noxattr_fs" lineno="1375">
+<interface name="fs_getattr_noxattr_fs" lineno="1394">
<summary>
Get the attributes of filesystems that
do not have extended attribute support.
@@ -83135,7 +83310,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_list_noxattr_fs" lineno="1393">
+<interface name="fs_list_noxattr_fs" lineno="1412">
<summary>
Read all noxattrfs directories.
</summary>
@@ -83145,7 +83320,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_noxattr_fs" lineno="1412">
+<interface name="fs_dontaudit_list_noxattr_fs" lineno="1431">
<summary>
Do not audit attempts to list all
noxattrfs directories.
@@ -83156,7 +83331,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_noxattr_fs_dirs" lineno="1430">
+<interface name="fs_manage_noxattr_fs_dirs" lineno="1449">
<summary>
Create, read, write, and delete all noxattrfs directories.
</summary>
@@ -83166,7 +83341,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_noxattr_fs_files" lineno="1448">
+<interface name="fs_read_noxattr_fs_files" lineno="1467">
<summary>
Read all noxattrfs files.
</summary>
@@ -83176,7 +83351,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1468">
+<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1487">
<summary>
Do not audit attempts to read all
noxattrfs files.
@@ -83187,7 +83362,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1486">
+<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1505">
<summary>
Dont audit attempts to write to noxattrfs files.
</summary>
@@ -83197,7 +83372,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_noxattr_fs_files" lineno="1504">
+<interface name="fs_manage_noxattr_fs_files" lineno="1523">
<summary>
Create, read, write, and delete all noxattrfs files.
</summary>
@@ -83207,7 +83382,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_noxattr_fs_symlinks" lineno="1523">
+<interface name="fs_read_noxattr_fs_symlinks" lineno="1542">
<summary>
Read all noxattrfs symbolic links.
</summary>
@@ -83217,7 +83392,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_noxattr_fs_symlinks" lineno="1542">
+<interface name="fs_manage_noxattr_fs_symlinks" lineno="1561">
<summary>
Manage all noxattrfs symbolic links.
</summary>
@@ -83227,7 +83402,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_noxattr_fs" lineno="1562">
+<interface name="fs_relabelfrom_noxattr_fs" lineno="1581">
<summary>
Relabel all objects from filesystems that
do not support extended attributes.
@@ -83238,7 +83413,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_cifs_files" lineno="1588">
+<interface name="fs_dontaudit_read_cifs_files" lineno="1607">
<summary>
Do not audit attempts to read
files on a CIFS or SMB filesystem.
@@ -83249,7 +83424,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_append_cifs_files" lineno="1608">
+<interface name="fs_append_cifs_files" lineno="1627">
<summary>
Append files
on a CIFS filesystem.
@@ -83261,7 +83436,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_append_cifs_files" lineno="1628">
+<interface name="fs_dontaudit_append_cifs_files" lineno="1647">
<summary>
dontaudit Append files
on a CIFS filesystem.
@@ -83273,7 +83448,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_rw_cifs_files" lineno="1647">
+<interface name="fs_dontaudit_rw_cifs_files" lineno="1666">
<summary>
Do not audit attempts to read or
write files on a CIFS or SMB filesystem.
@@ -83284,7 +83459,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_symlinks" lineno="1665">
+<interface name="fs_read_cifs_symlinks" lineno="1684">
<summary>
Read symbolic links on a CIFS or SMB filesystem.
</summary>
@@ -83294,7 +83469,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_named_pipes" lineno="1685">
+<interface name="fs_read_cifs_named_pipes" lineno="1704">
<summary>
Read named pipes
on a CIFS or SMB network filesystem.
@@ -83305,7 +83480,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_named_sockets" lineno="1704">
+<interface name="fs_read_cifs_named_sockets" lineno="1723">
<summary>
Read named sockets
on a CIFS or SMB network filesystem.
@@ -83316,7 +83491,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_exec_cifs_files" lineno="1725">
+<interface name="fs_exec_cifs_files" lineno="1744">
<summary>
Execute files on a CIFS or SMB
network filesystem, in the caller
@@ -83329,7 +83504,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_cifs_dirs" lineno="1746">
+<interface name="fs_manage_cifs_dirs" lineno="1765">
<summary>
Create, read, write, and delete directories
on a CIFS or SMB network filesystem.
@@ -83341,7 +83516,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1766">
+<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1785">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -83353,7 +83528,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_files" lineno="1786">
+<interface name="fs_manage_cifs_files" lineno="1805">
<summary>
Create, read, write, and delete files
on a CIFS or SMB network filesystem.
@@ -83365,7 +83540,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_cifs_files" lineno="1806">
+<interface name="fs_dontaudit_manage_cifs_files" lineno="1825">
<summary>
Do not audit attempts to create, read,
write, and delete files
@@ -83377,7 +83552,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_symlinks" lineno="1825">
+<interface name="fs_manage_cifs_symlinks" lineno="1844">
<summary>
Create, read, write, and delete symbolic links
on a CIFS or SMB network filesystem.
@@ -83388,7 +83563,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_named_pipes" lineno="1844">
+<interface name="fs_manage_cifs_named_pipes" lineno="1863">
<summary>
Create, read, write, and delete named pipes
on a CIFS or SMB network filesystem.
@@ -83399,7 +83574,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_named_sockets" lineno="1863">
+<interface name="fs_manage_cifs_named_sockets" lineno="1882">
<summary>
Create, read, write, and delete named sockets
on a CIFS or SMB network filesystem.
@@ -83410,7 +83585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_cifs_domtrans" lineno="1906">
+<interface name="fs_cifs_domtrans" lineno="1925">
<summary>
Execute a file on a CIFS or SMB filesystem
in the specified domain.
@@ -83445,7 +83620,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="fs_manage_configfs_dirs" lineno="1926">
+<interface name="fs_manage_configfs_dirs" lineno="1945">
<summary>
Create, read, write, and delete dirs
on a configfs filesystem.
@@ -83456,7 +83631,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_configfs_files" lineno="1945">
+<interface name="fs_manage_configfs_files" lineno="1964">
<summary>
Create, read, write, and delete files
on a configfs filesystem.
@@ -83467,7 +83642,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_dos_fs" lineno="1964">
+<interface name="fs_mount_dos_fs" lineno="1983">
<summary>
Mount a DOS filesystem, such as
FAT32 or NTFS.
@@ -83478,7 +83653,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_dos_fs" lineno="1984">
+<interface name="fs_remount_dos_fs" lineno="2003">
<summary>
Remount a DOS filesystem, such as
FAT32 or NTFS. This allows
@@ -83490,7 +83665,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_dos_fs" lineno="2003">
+<interface name="fs_unmount_dos_fs" lineno="2022">
<summary>
Unmount a DOS filesystem, such as
FAT32 or NTFS.
@@ -83501,7 +83676,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_dos_fs" lineno="2023">
+<interface name="fs_getattr_dos_fs" lineno="2042">
<summary>
Get the attributes of a DOS
filesystem, such as FAT32 or NTFS.
@@ -83513,7 +83688,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_relabelfrom_dos_fs" lineno="2042">
+<interface name="fs_relabelfrom_dos_fs" lineno="2061">
<summary>
Allow changing of the label of a
DOS filesystem using the context= mount option.
@@ -83524,7 +83699,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_dos_dirs" lineno="2060">
+<interface name="fs_getattr_dos_dirs" lineno="2079">
<summary>
Get attributes of directories on a dosfs filesystem.
</summary>
@@ -83534,7 +83709,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_dos" lineno="2078">
+<interface name="fs_search_dos" lineno="2097">
<summary>
Search dosfs filesystem.
</summary>
@@ -83544,7 +83719,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_dos" lineno="2096">
+<interface name="fs_list_dos" lineno="2115">
<summary>
List dirs DOS filesystem.
</summary>
@@ -83554,7 +83729,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_dos_dirs" lineno="2115">
+<interface name="fs_manage_dos_dirs" lineno="2134">
<summary>
Create, read, write, and delete dirs
on a DOS filesystem.
@@ -83565,7 +83740,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_dos_files" lineno="2133">
+<interface name="fs_read_dos_files" lineno="2152">
<summary>
Read files on a DOS filesystem.
</summary>
@@ -83575,7 +83750,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mmap_read_dos_files" lineno="2151">
+<interface name="fs_mmap_read_dos_files" lineno="2170">
<summary>
Read and map files on a DOS filesystem.
</summary>
@@ -83585,7 +83760,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_dos_files" lineno="2171">
+<interface name="fs_manage_dos_files" lineno="2190">
<summary>
Create, read, write, and delete files
on a DOS filesystem.
@@ -83596,7 +83771,52 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_efivarfs" lineno="2189">
+<interface name="fs_list_ecryptfs" lineno="2208">
+<summary>
+Read symbolic links on an eCryptfs filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_manage_ecryptfs_dirs" lineno="2229">
+<summary>
+Create, read, write, and delete directories
+on an eCryptfs filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_ecryptfs_files" lineno="2249">
+<summary>
+Create, read, write, and delete files
+on an eCryptfs filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_ecryptfs_named_sockets" lineno="2268">
+<summary>
+Create, read, write, and delete named sockets
+on an eCryptfs filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_getattr_efivarfs" lineno="2286">
<summary>
Get the attributes of efivarfs filesystems.
</summary>
@@ -83606,7 +83826,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_efivars" lineno="2207">
+<interface name="fs_list_efivars" lineno="2304">
<summary>
List dirs in efivarfs filesystem.
</summary>
@@ -83616,7 +83836,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_efivarfs_files" lineno="2227">
+<interface name="fs_read_efivarfs_files" lineno="2324">
<summary>
Read files in efivarfs
- contains Linux Kernel configuration options for UEFI systems
@@ -83628,7 +83848,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_efivarfs_files" lineno="2247">
+<interface name="fs_manage_efivarfs_files" lineno="2344">
<summary>
Create, read, write, and delete files
on a efivarfs filesystem.
@@ -83640,7 +83860,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_fusefs" lineno="2265">
+<interface name="fs_getattr_fusefs" lineno="2362">
<summary>
stat a FUSE filesystem
</summary>
@@ -83650,7 +83870,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_fusefs" lineno="2283">
+<interface name="fs_mount_fusefs" lineno="2380">
<summary>
Mount a FUSE filesystem.
</summary>
@@ -83660,7 +83880,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_fusefs" lineno="2301">
+<interface name="fs_unmount_fusefs" lineno="2398">
<summary>
Unmount a FUSE filesystem.
</summary>
@@ -83670,7 +83890,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_fusefs" lineno="2319">
+<interface name="fs_remount_fusefs" lineno="2416">
<summary>
Remount a FUSE filesystem.
</summary>
@@ -83680,7 +83900,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mounton_fusefs" lineno="2337">
+<interface name="fs_mounton_fusefs" lineno="2434">
<summary>
Mounton a FUSEFS filesystem.
</summary>
@@ -83690,7 +83910,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_fusefs_entry_type" lineno="2356">
+<interface name="fs_fusefs_entry_type" lineno="2453">
<summary>
Make FUSEFS files an entrypoint for the
specified domain.
@@ -83701,7 +83921,7 @@ The domain for which fusefs_t is an entrypoint.
</summary>
</param>
</interface>
-<interface name="fs_fusefs_domtrans" lineno="2389">
+<interface name="fs_fusefs_domtrans" lineno="2486">
<summary>
Execute FUSEFS files in a specified domain.
</summary>
@@ -83726,7 +83946,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="fs_search_fusefs" lineno="2409">
+<interface name="fs_search_fusefs" lineno="2506">
<summary>
Search directories
on a FUSEFS filesystem.
@@ -83738,7 +83958,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_list_fusefs" lineno="2428">
+<interface name="fs_dontaudit_list_fusefs" lineno="2525">
<summary>
Do not audit attempts to list the contents
of directories on a FUSEFS filesystem.
@@ -83749,7 +83969,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_fusefs_dirs" lineno="2448">
+<interface name="fs_manage_fusefs_dirs" lineno="2545">
<summary>
Create, read, write, and delete directories
on a FUSEFS filesystem.
@@ -83761,7 +83981,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2468">
+<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2565">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -83773,7 +83993,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_fusefs_files" lineno="2487">
+<interface name="fs_read_fusefs_files" lineno="2584">
<summary>
Read, a FUSEFS filesystem.
</summary>
@@ -83784,7 +84004,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_exec_fusefs_files" lineno="2506">
+<interface name="fs_exec_fusefs_files" lineno="2603">
<summary>
Execute files on a FUSEFS filesystem.
</summary>
@@ -83795,7 +84015,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_fusefs_files" lineno="2526">
+<interface name="fs_manage_fusefs_files" lineno="2623">
<summary>
Create, read, write, and delete files
on a FUSEFS filesystem.
@@ -83807,7 +84027,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_fusefs_files" lineno="2546">
+<interface name="fs_dontaudit_manage_fusefs_files" lineno="2643">
<summary>
Do not audit attempts to create,
read, write, and delete files
@@ -83819,7 +84039,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_fusefs_symlinks" lineno="2564">
+<interface name="fs_read_fusefs_symlinks" lineno="2661">
<summary>
Read symbolic links on a FUSEFS filesystem.
</summary>
@@ -83829,7 +84049,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_fusefs_symlinks" lineno="2584">
+<interface name="fs_manage_fusefs_symlinks" lineno="2681">
<summary>
Manage symlinks on a FUSEFS filesystem.
</summary>
@@ -83840,7 +84060,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_hugetlbfs" lineno="2603">
+<interface name="fs_getattr_hugetlbfs" lineno="2700">
<summary>
Get the attributes of an hugetlbfs
filesystem.
@@ -83851,7 +84071,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_hugetlbfs" lineno="2621">
+<interface name="fs_list_hugetlbfs" lineno="2718">
<summary>
List hugetlbfs.
</summary>
@@ -83861,7 +84081,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_hugetlbfs_dirs" lineno="2639">
+<interface name="fs_manage_hugetlbfs_dirs" lineno="2736">
<summary>
Manage hugetlbfs dirs.
</summary>
@@ -83871,7 +84091,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2657">
+<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2754">
<summary>
Read and write inherited hugetlbfs files.
</summary>
@@ -83881,7 +84101,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_hugetlbfs_files" lineno="2675">
+<interface name="fs_rw_hugetlbfs_files" lineno="2772">
<summary>
Read and write hugetlbfs files.
</summary>
@@ -83891,7 +84111,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2693">
+<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2790">
<summary>
Read, map and write hugetlbfs files.
</summary>
@@ -83901,7 +84121,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_associate_hugetlbfs" lineno="2712">
+<interface name="fs_associate_hugetlbfs" lineno="2809">
<summary>
Allow the type to associate to hugetlbfs filesystems.
</summary>
@@ -83911,7 +84131,7 @@ The type of the object to be associated.
</summary>
</param>
</interface>
-<interface name="fs_search_inotifyfs" lineno="2730">
+<interface name="fs_search_inotifyfs" lineno="2827">
<summary>
Search inotifyfs filesystem.
</summary>
@@ -83921,7 +84141,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_inotifyfs" lineno="2748">
+<interface name="fs_list_inotifyfs" lineno="2845">
<summary>
List inotifyfs filesystem.
</summary>
@@ -83931,7 +84151,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_inotifyfs" lineno="2766">
+<interface name="fs_dontaudit_list_inotifyfs" lineno="2863">
<summary>
Dontaudit List inotifyfs filesystem.
</summary>
@@ -83941,7 +84161,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_hugetlbfs_filetrans" lineno="2800">
+<interface name="fs_hugetlbfs_filetrans" lineno="2897">
<summary>
Create an object in a hugetlbfs filesystem, with a private
type using a type transition.
@@ -83967,7 +84187,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="fs_mount_iso9660_fs" lineno="2820">
+<interface name="fs_mount_iso9660_fs" lineno="2917">
<summary>
Mount an iso9660 filesystem, which
is usually used on CDs.
@@ -83978,7 +84198,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_iso9660_fs" lineno="2840">
+<interface name="fs_remount_iso9660_fs" lineno="2937">
<summary>
Remount an iso9660 filesystem, which
is usually used on CDs. This allows
@@ -83990,7 +84210,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_iso9660_fs" lineno="2859">
+<interface name="fs_relabelfrom_iso9660_fs" lineno="2956">
<summary>
Allow changing of the label of a
filesystem with iso9660 type
@@ -84001,7 +84221,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_iso9660_fs" lineno="2878">
+<interface name="fs_unmount_iso9660_fs" lineno="2975">
<summary>
Unmount an iso9660 filesystem, which
is usually used on CDs.
@@ -84012,7 +84232,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_iso9660_fs" lineno="2898">
+<interface name="fs_getattr_iso9660_fs" lineno="2995">
<summary>
Get the attributes of an iso9660
filesystem, which is usually used on CDs.
@@ -84024,7 +84244,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_iso9660_files" lineno="2917">
+<interface name="fs_getattr_iso9660_files" lineno="3014">
<summary>
Get the attributes of files on an iso9660
filesystem, which is usually used on CDs.
@@ -84035,7 +84255,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_iso9660_files" lineno="2937">
+<interface name="fs_read_iso9660_files" lineno="3034">
<summary>
Read files on an iso9660 filesystem, which
is usually used on CDs.
@@ -84046,7 +84266,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_nfs" lineno="2957">
+<interface name="fs_mount_nfs" lineno="3054">
<summary>
Mount a NFS filesystem.
</summary>
@@ -84056,7 +84276,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_nfs" lineno="2976">
+<interface name="fs_remount_nfs" lineno="3073">
<summary>
Remount a NFS filesystem. This allows
some mount options to be changed.
@@ -84067,7 +84287,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_nfs" lineno="2994">
+<interface name="fs_unmount_nfs" lineno="3091">
<summary>
Unmount a NFS filesystem.
</summary>
@@ -84077,7 +84297,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nfs" lineno="3013">
+<interface name="fs_getattr_nfs" lineno="3110">
<summary>
Get the attributes of a NFS filesystem.
</summary>
@@ -84088,7 +84308,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_search_nfs" lineno="3031">
+<interface name="fs_search_nfs" lineno="3128">
<summary>
Search directories on a NFS filesystem.
</summary>
@@ -84098,7 +84318,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_nfs" lineno="3049">
+<interface name="fs_list_nfs" lineno="3146">
<summary>
List NFS filesystem.
</summary>
@@ -84108,7 +84328,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_nfs" lineno="3068">
+<interface name="fs_dontaudit_list_nfs" lineno="3165">
<summary>
Do not audit attempts to list the contents
of directories on a NFS filesystem.
@@ -84119,7 +84339,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mounton_nfs" lineno="3086">
+<interface name="fs_mounton_nfs" lineno="3183">
<summary>
Mounton a NFS filesystem.
</summary>
@@ -84129,7 +84349,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_files" lineno="3105">
+<interface name="fs_read_nfs_files" lineno="3202">
<summary>
Read files on a NFS filesystem.
</summary>
@@ -84140,7 +84360,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_read_nfs_files" lineno="3125">
+<interface name="fs_dontaudit_read_nfs_files" lineno="3222">
<summary>
Do not audit attempts to read
files on a NFS filesystem.
@@ -84151,7 +84371,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_write_nfs_files" lineno="3143">
+<interface name="fs_write_nfs_files" lineno="3240">
<summary>
Read files on a NFS filesystem.
</summary>
@@ -84161,7 +84381,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_exec_nfs_files" lineno="3163">
+<interface name="fs_exec_nfs_files" lineno="3260">
<summary>
Execute files on a NFS filesystem.
</summary>
@@ -84172,7 +84392,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_append_nfs_files" lineno="3184">
+<interface name="fs_append_nfs_files" lineno="3281">
<summary>
Append files
on a NFS filesystem.
@@ -84184,7 +84404,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_append_nfs_files" lineno="3204">
+<interface name="fs_dontaudit_append_nfs_files" lineno="3301">
<summary>
dontaudit Append files
on a NFS filesystem.
@@ -84196,7 +84416,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_rw_nfs_files" lineno="3223">
+<interface name="fs_dontaudit_rw_nfs_files" lineno="3320">
<summary>
Do not audit attempts to read or
write files on a NFS filesystem.
@@ -84207,7 +84427,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_symlinks" lineno="3241">
+<interface name="fs_read_nfs_symlinks" lineno="3338">
<summary>
Read symbolic links on a NFS filesystem.
</summary>
@@ -84217,7 +84437,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3260">
+<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3357">
<summary>
Dontaudit read symbolic links on a NFS filesystem.
</summary>
@@ -84227,7 +84447,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_named_sockets" lineno="3278">
+<interface name="fs_read_nfs_named_sockets" lineno="3375">
<summary>
Read named sockets on a NFS filesystem.
</summary>
@@ -84237,7 +84457,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_named_pipes" lineno="3297">
+<interface name="fs_read_nfs_named_pipes" lineno="3394">
<summary>
Read named pipes on a NFS network filesystem.
</summary>
@@ -84248,7 +84468,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_rpc_dirs" lineno="3316">
+<interface name="fs_getattr_rpc_dirs" lineno="3413">
<summary>
Get the attributes of directories of RPC
file system pipes.
@@ -84259,7 +84479,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_rpc" lineno="3335">
+<interface name="fs_search_rpc" lineno="3432">
<summary>
Search directories of RPC file system pipes.
</summary>
@@ -84269,7 +84489,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_removable" lineno="3353">
+<interface name="fs_search_removable" lineno="3450">
<summary>
Search removable storage directories.
</summary>
@@ -84279,7 +84499,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_removable" lineno="3371">
+<interface name="fs_dontaudit_list_removable" lineno="3468">
<summary>
Do not audit attempts to list removable storage directories.
</summary>
@@ -84289,7 +84509,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="fs_read_removable_files" lineno="3389">
+<interface name="fs_read_removable_files" lineno="3486">
<summary>
Read removable storage files.
</summary>
@@ -84299,7 +84519,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_removable_files" lineno="3407">
+<interface name="fs_dontaudit_read_removable_files" lineno="3504">
<summary>
Do not audit attempts to read removable storage files.
</summary>
@@ -84309,7 +84529,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_removable_files" lineno="3425">
+<interface name="fs_dontaudit_write_removable_files" lineno="3522">
<summary>
Do not audit attempts to write removable storage files.
</summary>
@@ -84319,7 +84539,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="fs_read_removable_symlinks" lineno="3443">
+<interface name="fs_read_removable_symlinks" lineno="3540">
<summary>
Read removable storage symbolic links.
</summary>
@@ -84329,7 +84549,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_removable_blk_files" lineno="3461">
+<interface name="fs_read_removable_blk_files" lineno="3558">
<summary>
Read block nodes on removable filesystems.
</summary>
@@ -84339,7 +84559,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_removable_blk_files" lineno="3480">
+<interface name="fs_rw_removable_blk_files" lineno="3577">
<summary>
Read and write block nodes on removable filesystems.
</summary>
@@ -84349,7 +84569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_rpc" lineno="3499">
+<interface name="fs_list_rpc" lineno="3596">
<summary>
Read directories of RPC file system pipes.
</summary>
@@ -84359,7 +84579,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_rpc_files" lineno="3517">
+<interface name="fs_read_rpc_files" lineno="3614">
<summary>
Read files of RPC file system pipes.
</summary>
@@ -84369,7 +84589,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_rpc_symlinks" lineno="3535">
+<interface name="fs_read_rpc_symlinks" lineno="3632">
<summary>
Read symbolic links of RPC file system pipes.
</summary>
@@ -84379,7 +84599,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_rpc_sockets" lineno="3553">
+<interface name="fs_read_rpc_sockets" lineno="3650">
<summary>
Read sockets of RPC file system pipes.
</summary>
@@ -84389,7 +84609,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_rpc_sockets" lineno="3571">
+<interface name="fs_rw_rpc_sockets" lineno="3668">
<summary>
Read and write sockets of RPC file system pipes.
</summary>
@@ -84399,7 +84619,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_dirs" lineno="3591">
+<interface name="fs_manage_nfs_dirs" lineno="3688">
<summary>
Create, read, write, and delete directories
on a NFS filesystem.
@@ -84411,7 +84631,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3611">
+<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3708">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -84423,7 +84643,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_files" lineno="3631">
+<interface name="fs_manage_nfs_files" lineno="3728">
<summary>
Create, read, write, and delete files
on a NFS filesystem.
@@ -84435,7 +84655,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_nfs_files" lineno="3651">
+<interface name="fs_dontaudit_manage_nfs_files" lineno="3748">
<summary>
Do not audit attempts to create,
read, write, and delete files
@@ -84447,7 +84667,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_symlinks" lineno="3671">
+<interface name="fs_manage_nfs_symlinks" lineno="3768">
<summary>
Create, read, write, and delete symbolic links
on a NFS network filesystem.
@@ -84459,7 +84679,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_nfs_named_pipes" lineno="3690">
+<interface name="fs_manage_nfs_named_pipes" lineno="3787">
<summary>
Create, read, write, and delete named pipes
on a NFS filesystem.
@@ -84470,7 +84690,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_named_sockets" lineno="3709">
+<interface name="fs_manage_nfs_named_sockets" lineno="3806">
<summary>
Create, read, write, and delete named sockets
on a NFS filesystem.
@@ -84481,7 +84701,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_nfs_domtrans" lineno="3752">
+<interface name="fs_nfs_domtrans" lineno="3849">
<summary>
Execute a file on a NFS filesystem
in the specified domain.
@@ -84516,7 +84736,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="fs_mount_nfsd_fs" lineno="3771">
+<interface name="fs_mount_nfsd_fs" lineno="3868">
<summary>
Mount a NFS server pseudo filesystem.
</summary>
@@ -84526,7 +84746,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_nfsd_fs" lineno="3790">
+<interface name="fs_remount_nfsd_fs" lineno="3887">
<summary>
Mount a NFS server pseudo filesystem.
This allows some mount options to be changed.
@@ -84537,7 +84757,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_nfsd_fs" lineno="3808">
+<interface name="fs_unmount_nfsd_fs" lineno="3905">
<summary>
Unmount a NFS server pseudo filesystem.
</summary>
@@ -84547,7 +84767,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nfsd_fs" lineno="3827">
+<interface name="fs_getattr_nfsd_fs" lineno="3924">
<summary>
Get the attributes of a NFS server
pseudo filesystem.
@@ -84558,7 +84778,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_nfsd_fs" lineno="3845">
+<interface name="fs_search_nfsd_fs" lineno="3942">
<summary>
Search NFS server directories.
</summary>
@@ -84568,7 +84788,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_nfsd_fs" lineno="3863">
+<interface name="fs_list_nfsd_fs" lineno="3960">
<summary>
List NFS server directories.
</summary>
@@ -84578,7 +84798,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_watch_nfsd_dirs" lineno="3881">
+<interface name="fs_watch_nfsd_dirs" lineno="3978">
<summary>
Watch NFS server directories.
</summary>
@@ -84588,7 +84808,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nfsd_files" lineno="3899">
+<interface name="fs_getattr_nfsd_files" lineno="3996">
<summary>
Getattr files on an nfsd filesystem
</summary>
@@ -84598,7 +84818,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_nfsd_fs" lineno="3917">
+<interface name="fs_rw_nfsd_fs" lineno="4014">
<summary>
Read and write NFS server files.
</summary>
@@ -84608,7 +84828,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nsfs_files" lineno="3935">
+<interface name="fs_getattr_nsfs_files" lineno="4032">
+<summary>
+Get the attributes of nsfs inodes (e.g. /proc/pid/ns/uts)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_read_nsfs_files" lineno="4050">
<summary>
Read nsfs inodes (e.g. /proc/pid/ns/uts)
</summary>
@@ -84618,7 +84848,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nsfs" lineno="3953">
+<interface name="fs_getattr_nsfs" lineno="4068">
<summary>
Get the attributes of an nsfs filesystem.
</summary>
@@ -84628,7 +84858,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_nsfs" lineno="3971">
+<interface name="fs_unmount_nsfs" lineno="4086">
<summary>
Unmount an nsfs filesystem.
</summary>
@@ -84638,7 +84868,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_pstorefs" lineno="3989">
+<interface name="fs_getattr_pstorefs" lineno="4104">
<summary>
Get the attributes of a pstore filesystem.
</summary>
@@ -84648,7 +84878,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_pstore_dirs" lineno="4008">
+<interface name="fs_getattr_pstore_dirs" lineno="4123">
<summary>
Get the attributes of directories
of a pstore filesystem.
@@ -84659,7 +84889,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_create_pstore_dirs" lineno="4027">
+<interface name="fs_create_pstore_dirs" lineno="4142">
<summary>
Create pstore directories.
</summary>
@@ -84669,7 +84899,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_pstore_dirs" lineno="4046">
+<interface name="fs_relabel_pstore_dirs" lineno="4161">
<summary>
Relabel to/from pstore_t directories.
</summary>
@@ -84679,7 +84909,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_pstore_dirs" lineno="4065">
+<interface name="fs_list_pstore_dirs" lineno="4180">
<summary>
List the directories
of a pstore filesystem.
@@ -84690,7 +84920,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_pstore_files" lineno="4084">
+<interface name="fs_read_pstore_files" lineno="4199">
<summary>
Read pstore_t files
</summary>
@@ -84700,7 +84930,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_delete_pstore_files" lineno="4103">
+<interface name="fs_delete_pstore_files" lineno="4218">
<summary>
Delete the files
of a pstore filesystem.
@@ -84711,7 +84941,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_associate_ramfs" lineno="4122">
+<interface name="fs_associate_ramfs" lineno="4237">
<summary>
Allow the type to associate to ramfs filesystems.
</summary>
@@ -84721,7 +84951,7 @@ The type of the object to be associated.
</summary>
</param>
</interface>
-<interface name="fs_mount_ramfs" lineno="4140">
+<interface name="fs_mount_ramfs" lineno="4255">
<summary>
Mount a RAM filesystem.
</summary>
@@ -84731,7 +84961,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_ramfs" lineno="4159">
+<interface name="fs_remount_ramfs" lineno="4274">
<summary>
Remount a RAM filesystem. This allows
some mount options to be changed.
@@ -84742,7 +84972,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_ramfs" lineno="4177">
+<interface name="fs_unmount_ramfs" lineno="4292">
<summary>
Unmount a RAM filesystem.
</summary>
@@ -84752,7 +84982,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_ramfs" lineno="4195">
+<interface name="fs_getattr_ramfs" lineno="4310">
<summary>
Get the attributes of a RAM filesystem.
</summary>
@@ -84762,7 +84992,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_ramfs" lineno="4213">
+<interface name="fs_search_ramfs" lineno="4328">
<summary>
Search directories on a ramfs
</summary>
@@ -84772,7 +85002,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_search_ramfs" lineno="4231">
+<interface name="fs_dontaudit_search_ramfs" lineno="4346">
<summary>
Dontaudit Search directories on a ramfs
</summary>
@@ -84782,7 +85012,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_dirs" lineno="4250">
+<interface name="fs_manage_ramfs_dirs" lineno="4365">
<summary>
Create, read, write, and delete
directories on a ramfs.
@@ -84793,7 +85023,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_ramfs_files" lineno="4268">
+<interface name="fs_dontaudit_read_ramfs_files" lineno="4383">
<summary>
Dontaudit read on a ramfs files.
</summary>
@@ -84803,7 +85033,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4286">
+<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4401">
<summary>
Dontaudit read on a ramfs fifo_files.
</summary>
@@ -84813,7 +85043,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_files" lineno="4305">
+<interface name="fs_manage_ramfs_files" lineno="4420">
<summary>
Create, read, write, and delete
files on a ramfs filesystem.
@@ -84824,7 +85054,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_write_ramfs_pipes" lineno="4323">
+<interface name="fs_write_ramfs_pipes" lineno="4438">
<summary>
Write to named pipe on a ramfs filesystem.
</summary>
@@ -84834,7 +85064,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4342">
+<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4457">
<summary>
Do not audit attempts to write to named
pipes on a ramfs filesystem.
@@ -84845,7 +85075,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_rw_ramfs_pipes" lineno="4360">
+<interface name="fs_rw_ramfs_pipes" lineno="4475">
<summary>
Read and write a named pipe on a ramfs filesystem.
</summary>
@@ -84855,7 +85085,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_pipes" lineno="4379">
+<interface name="fs_manage_ramfs_pipes" lineno="4494">
<summary>
Create, read, write, and delete
named pipes on a ramfs filesystem.
@@ -84866,7 +85096,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_write_ramfs_sockets" lineno="4397">
+<interface name="fs_write_ramfs_sockets" lineno="4512">
<summary>
Write to named socket on a ramfs filesystem.
</summary>
@@ -84876,7 +85106,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_sockets" lineno="4416">
+<interface name="fs_manage_ramfs_sockets" lineno="4531">
<summary>
Create, read, write, and delete
named sockets on a ramfs filesystem.
@@ -84887,7 +85117,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_romfs" lineno="4434">
+<interface name="fs_mount_romfs" lineno="4549">
<summary>
Mount a ROM filesystem.
</summary>
@@ -84897,7 +85127,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_romfs" lineno="4453">
+<interface name="fs_remount_romfs" lineno="4568">
<summary>
Remount a ROM filesystem. This allows
some mount options to be changed.
@@ -84908,7 +85138,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_romfs" lineno="4471">
+<interface name="fs_unmount_romfs" lineno="4586">
<summary>
Unmount a ROM filesystem.
</summary>
@@ -84918,7 +85148,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_romfs" lineno="4490">
+<interface name="fs_getattr_romfs" lineno="4605">
<summary>
Get the attributes of a ROM
filesystem.
@@ -84929,7 +85159,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_rpc_pipefs" lineno="4508">
+<interface name="fs_mount_rpc_pipefs" lineno="4623">
<summary>
Mount a RPC pipe filesystem.
</summary>
@@ -84939,7 +85169,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_rpc_pipefs" lineno="4527">
+<interface name="fs_remount_rpc_pipefs" lineno="4642">
<summary>
Remount a RPC pipe filesystem. This
allows some mount option to be changed.
@@ -84950,7 +85180,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_rpc_pipefs" lineno="4545">
+<interface name="fs_unmount_rpc_pipefs" lineno="4660">
<summary>
Unmount a RPC pipe filesystem.
</summary>
@@ -84960,7 +85190,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_rpc_pipefs" lineno="4564">
+<interface name="fs_getattr_rpc_pipefs" lineno="4679">
<summary>
Get the attributes of a RPC pipe
filesystem.
@@ -84971,7 +85201,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_rpc_named_pipes" lineno="4582">
+<interface name="fs_rw_rpc_named_pipes" lineno="4697">
<summary>
Read and write RPC pipe filesystem named pipes.
</summary>
@@ -84981,7 +85211,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_tmpfs" lineno="4600">
+<interface name="fs_mount_tmpfs" lineno="4715">
<summary>
Mount a tmpfs filesystem.
</summary>
@@ -84991,7 +85221,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_tmpfs" lineno="4618">
+<interface name="fs_remount_tmpfs" lineno="4733">
<summary>
Remount a tmpfs filesystem.
</summary>
@@ -85001,7 +85231,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_tmpfs" lineno="4636">
+<interface name="fs_unmount_tmpfs" lineno="4751">
<summary>
Unmount a tmpfs filesystem.
</summary>
@@ -85011,7 +85241,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_tmpfs" lineno="4654">
+<interface name="fs_dontaudit_getattr_tmpfs" lineno="4769">
<summary>
Do not audit getting the attributes of a tmpfs filesystem
</summary>
@@ -85021,7 +85251,7 @@ Domain to not audit
</summary>
</param>
</interface>
-<interface name="fs_getattr_tmpfs" lineno="4674">
+<interface name="fs_getattr_tmpfs" lineno="4789">
<summary>
Get the attributes of a tmpfs
filesystem.
@@ -85033,7 +85263,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_associate_tmpfs" lineno="4692">
+<interface name="fs_associate_tmpfs" lineno="4807">
<summary>
Allow the type to associate to tmpfs filesystems.
</summary>
@@ -85043,7 +85273,7 @@ The type of the object to be associated.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs" lineno="4710">
+<interface name="fs_relabelfrom_tmpfs" lineno="4825">
<summary>
Relabel from tmpfs filesystem.
</summary>
@@ -85053,7 +85283,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tmpfs_dirs" lineno="4728">
+<interface name="fs_getattr_tmpfs_dirs" lineno="4843">
<summary>
Get the attributes of tmpfs directories.
</summary>
@@ -85063,7 +85293,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4747">
+<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4862">
<summary>
Do not audit attempts to get the attributes
of tmpfs directories.
@@ -85074,7 +85304,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mounton_tmpfs" lineno="4765">
+<interface name="fs_mounton_tmpfs" lineno="4880">
<summary>
Mount on tmpfs directories.
</summary>
@@ -85084,7 +85314,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mounton_tmpfs_files" lineno="4783">
+<interface name="fs_mounton_tmpfs_files" lineno="4898">
<summary>
Mount on tmpfs files.
</summary>
@@ -85094,7 +85324,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_setattr_tmpfs_dirs" lineno="4801">
+<interface name="fs_setattr_tmpfs_dirs" lineno="4916">
<summary>
Set the attributes of tmpfs directories.
</summary>
@@ -85104,7 +85334,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_tmpfs" lineno="4819">
+<interface name="fs_search_tmpfs" lineno="4934">
<summary>
Search tmpfs directories.
</summary>
@@ -85114,7 +85344,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_tmpfs" lineno="4837">
+<interface name="fs_list_tmpfs" lineno="4952">
<summary>
List the contents of generic tmpfs directories.
</summary>
@@ -85124,7 +85354,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_tmpfs" lineno="4856">
+<interface name="fs_dontaudit_list_tmpfs" lineno="4971">
<summary>
Do not audit attempts to list the
contents of generic tmpfs directories.
@@ -85135,7 +85365,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_dirs" lineno="4875">
+<interface name="fs_manage_tmpfs_dirs" lineno="4990">
<summary>
Create, read, write, and delete
tmpfs directories
@@ -85146,7 +85376,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4894">
+<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="5009">
<summary>
Do not audit attempts to write
tmpfs directories
@@ -85157,7 +85387,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4912">
+<interface name="fs_relabelfrom_tmpfs_dirs" lineno="5027">
<summary>
Relabel from tmpfs_t dir
</summary>
@@ -85167,7 +85397,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_dirs" lineno="4930">
+<interface name="fs_relabel_tmpfs_dirs" lineno="5045">
<summary>
Relabel directory on tmpfs filesystems.
</summary>
@@ -85177,7 +85407,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_tmpfs_filetrans" lineno="4963">
+<interface name="fs_tmpfs_filetrans" lineno="5078">
<summary>
Create an object in a tmpfs filesystem, with a private
type using a type transition.
@@ -85203,7 +85433,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4983">
+<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="5098">
<summary>
Do not audit attempts to getattr
generic tmpfs files.
@@ -85214,7 +85444,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5002">
+<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5117">
<summary>
Do not audit attempts to read or write
generic tmpfs files.
@@ -85225,7 +85455,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_delete_tmpfs_symlinks" lineno="5020">
+<interface name="fs_delete_tmpfs_symlinks" lineno="5135">
<summary>
Delete tmpfs symbolic links.
</summary>
@@ -85235,7 +85465,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_auto_mountpoints" lineno="5039">
+<interface name="fs_manage_auto_mountpoints" lineno="5154">
<summary>
Create, read, write, and delete
auto moutpoints.
@@ -85246,7 +85476,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_tmpfs_files" lineno="5057">
+<interface name="fs_read_tmpfs_files" lineno="5172">
<summary>
Read generic tmpfs files.
</summary>
@@ -85256,7 +85486,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_tmpfs_files" lineno="5075">
+<interface name="fs_rw_tmpfs_files" lineno="5190">
<summary>
Read and write generic tmpfs files.
</summary>
@@ -85266,7 +85496,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_files" lineno="5093">
+<interface name="fs_relabel_tmpfs_files" lineno="5208">
<summary>
Relabel files on tmpfs filesystems.
</summary>
@@ -85276,7 +85506,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_tmpfs_symlinks" lineno="5111">
+<interface name="fs_read_tmpfs_symlinks" lineno="5226">
<summary>
Read tmpfs link files.
</summary>
@@ -85286,7 +85516,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5129">
+<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5244">
<summary>
Relabelfrom socket files on tmpfs filesystems.
</summary>
@@ -85296,7 +85526,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5147">
+<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5262">
<summary>
Relabelfrom tmpfs link files.
</summary>
@@ -85306,7 +85536,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_tmpfs_chr_files" lineno="5165">
+<interface name="fs_rw_tmpfs_chr_files" lineno="5280">
<summary>
Read and write character nodes on tmpfs filesystems.
</summary>
@@ -85316,7 +85546,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5184">
+<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5299">
<summary>
dontaudit Read and write character nodes on tmpfs filesystems.
</summary>
@@ -85326,7 +85556,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_chr_files" lineno="5203">
+<interface name="fs_relabel_tmpfs_chr_files" lineno="5318">
<summary>
Relabel character nodes on tmpfs filesystems.
</summary>
@@ -85336,7 +85566,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_chr_file" lineno="5222">
+<interface name="fs_relabel_tmpfs_chr_file" lineno="5337">
<summary>
Relabel character nodes on tmpfs filesystems.
</summary>
@@ -85346,7 +85576,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_tmpfs_blk_files" lineno="5237">
+<interface name="fs_rw_tmpfs_blk_files" lineno="5352">
<summary>
Read and write block nodes on tmpfs filesystems.
</summary>
@@ -85356,7 +85586,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_blk_files" lineno="5256">
+<interface name="fs_relabel_tmpfs_blk_files" lineno="5371">
<summary>
Relabel block nodes on tmpfs filesystems.
</summary>
@@ -85366,7 +85596,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_blk_file" lineno="5275">
+<interface name="fs_relabel_tmpfs_blk_file" lineno="5390">
<summary>
Relabel block nodes on tmpfs filesystems.
</summary>
@@ -85376,7 +85606,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_fifo_files" lineno="5290">
+<interface name="fs_relabel_tmpfs_fifo_files" lineno="5405">
<summary>
Relabel named pipes on tmpfs filesystems.
</summary>
@@ -85386,7 +85616,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_files" lineno="5310">
+<interface name="fs_manage_tmpfs_files" lineno="5425">
<summary>
Read and write, create and delete generic
files on tmpfs filesystems.
@@ -85397,7 +85627,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_symlinks" lineno="5329">
+<interface name="fs_manage_tmpfs_symlinks" lineno="5444">
<summary>
Read and write, create and delete symbolic
links on tmpfs filesystems.
@@ -85408,7 +85638,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_sockets" lineno="5348">
+<interface name="fs_manage_tmpfs_sockets" lineno="5463">
<summary>
Read and write, create and delete socket
files on tmpfs filesystems.
@@ -85419,7 +85649,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_chr_files" lineno="5367">
+<interface name="fs_manage_tmpfs_chr_files" lineno="5482">
<summary>
Read and write, create and delete character
nodes on tmpfs filesystems.
@@ -85430,7 +85660,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_blk_files" lineno="5386">
+<interface name="fs_manage_tmpfs_blk_files" lineno="5501">
<summary>
Read and write, create and delete block nodes
on tmpfs filesystems.
@@ -85441,7 +85671,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tracefs" lineno="5404">
+<interface name="fs_getattr_tracefs" lineno="5519">
<summary>
Get the attributes of a trace filesystem.
</summary>
@@ -85451,7 +85681,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tracefs_dirs" lineno="5422">
+<interface name="fs_getattr_tracefs_dirs" lineno="5537">
<summary>
Get attributes of dirs on tracefs filesystem.
</summary>
@@ -85461,7 +85691,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_tracefs" lineno="5440">
+<interface name="fs_search_tracefs" lineno="5555">
<summary>
search directories on a tracefs filesystem
</summary>
@@ -85471,7 +85701,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tracefs_files" lineno="5459">
+<interface name="fs_getattr_tracefs_files" lineno="5574">
<summary>
Get the attributes of files
on a trace filesystem.
@@ -85482,7 +85712,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_xenfs" lineno="5477">
+<interface name="fs_mount_xenfs" lineno="5592">
<summary>
Mount a XENFS filesystem.
</summary>
@@ -85492,7 +85722,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_xenfs" lineno="5495">
+<interface name="fs_search_xenfs" lineno="5610">
<summary>
Search the XENFS filesystem.
</summary>
@@ -85502,7 +85732,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_xenfs_dirs" lineno="5515">
+<interface name="fs_manage_xenfs_dirs" lineno="5630">
<summary>
Create, read, write, and delete directories
on a XENFS filesystem.
@@ -85514,7 +85744,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5535">
+<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5650">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -85526,7 +85756,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_xenfs_files" lineno="5555">
+<interface name="fs_manage_xenfs_files" lineno="5670">
<summary>
Create, read, write, and delete files
on a XENFS filesystem.
@@ -85538,7 +85768,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_mmap_xenfs_files" lineno="5573">
+<interface name="fs_mmap_xenfs_files" lineno="5688">
<summary>
Map files a XENFS filesystem.
</summary>
@@ -85548,7 +85778,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_manage_xenfs_files" lineno="5593">
+<interface name="fs_dontaudit_manage_xenfs_files" lineno="5708">
<summary>
Do not audit attempts to create,
read, write, and delete files
@@ -85560,7 +85790,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mount_all_fs" lineno="5611">
+<interface name="fs_mount_all_fs" lineno="5726">
<summary>
Mount all filesystems.
</summary>
@@ -85570,7 +85800,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_all_fs" lineno="5630">
+<interface name="fs_remount_all_fs" lineno="5745">
<summary>
Remount all filesystems. This
allows some mount options to be changed.
@@ -85581,7 +85811,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_all_fs" lineno="5648">
+<interface name="fs_unmount_all_fs" lineno="5763">
<summary>
Unmount all filesystems.
</summary>
@@ -85591,7 +85821,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_fs" lineno="5680">
+<interface name="fs_getattr_all_fs" lineno="5795">
<summary>
Get the attributes of all filesystems.
</summary>
@@ -85615,7 +85845,7 @@ Domain allowed access.
<infoflow type="read" weight="5"/>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_getattr_all_fs" lineno="5700">
+<interface name="fs_dontaudit_getattr_all_fs" lineno="5815">
<summary>
Do not audit attempts to get the attributes
all filesystems.
@@ -85626,7 +85856,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_get_all_fs_quotas" lineno="5719">
+<interface name="fs_get_all_fs_quotas" lineno="5834">
<summary>
Get the quotas of all filesystems.
</summary>
@@ -85637,7 +85867,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_set_all_quotas" lineno="5738">
+<interface name="fs_set_all_quotas" lineno="5853">
<summary>
Set the quotas of all filesystems.
</summary>
@@ -85648,7 +85878,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_relabelfrom_all_fs" lineno="5756">
+<interface name="fs_relabelfrom_all_fs" lineno="5871">
<summary>
Relabelfrom all filesystems.
</summary>
@@ -85658,7 +85888,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_dirs" lineno="5775">
+<interface name="fs_getattr_all_dirs" lineno="5890">
<summary>
Get the attributes of all directories
with a filesystem type.
@@ -85669,7 +85899,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_all" lineno="5793">
+<interface name="fs_search_all" lineno="5908">
<summary>
Search all directories with a filesystem type.
</summary>
@@ -85679,7 +85909,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_all" lineno="5811">
+<interface name="fs_list_all" lineno="5926">
<summary>
List all directories with a filesystem type.
</summary>
@@ -85689,7 +85919,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_files" lineno="5830">
+<interface name="fs_getattr_all_files" lineno="5945">
<summary>
Get the attributes of all files with
a filesystem type.
@@ -85700,7 +85930,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_files" lineno="5849">
+<interface name="fs_dontaudit_getattr_all_files" lineno="5964">
<summary>
Do not audit attempts to get the attributes
of all files with a filesystem type.
@@ -85711,7 +85941,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_symlinks" lineno="5868">
+<interface name="fs_getattr_all_symlinks" lineno="5983">
<summary>
Get the attributes of all symbolic links with
a filesystem type.
@@ -85722,7 +85952,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5887">
+<interface name="fs_dontaudit_getattr_all_symlinks" lineno="6002">
<summary>
Do not audit attempts to get the attributes
of all symbolic links with a filesystem type.
@@ -85733,7 +85963,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_pipes" lineno="5906">
+<interface name="fs_getattr_all_pipes" lineno="6021">
<summary>
Get the attributes of all named pipes with
a filesystem type.
@@ -85744,7 +85974,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_pipes" lineno="5925">
+<interface name="fs_dontaudit_getattr_all_pipes" lineno="6040">
<summary>
Do not audit attempts to get the attributes
of all named pipes with a filesystem type.
@@ -85755,7 +85985,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_sockets" lineno="5944">
+<interface name="fs_getattr_all_sockets" lineno="6059">
<summary>
Get the attributes of all named sockets with
a filesystem type.
@@ -85766,7 +85996,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_sockets" lineno="5963">
+<interface name="fs_dontaudit_getattr_all_sockets" lineno="6078">
<summary>
Do not audit attempts to get the attributes
of all named sockets with a filesystem type.
@@ -85777,7 +86007,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_blk_files" lineno="5982">
+<interface name="fs_getattr_all_blk_files" lineno="6097">
<summary>
Get the attributes of all block device nodes with
a filesystem type.
@@ -85788,7 +86018,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_chr_files" lineno="6001">
+<interface name="fs_getattr_all_chr_files" lineno="6116">
<summary>
Get the attributes of all character device nodes with
a filesystem type.
@@ -85799,7 +86029,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unconfined" lineno="6019">
+<interface name="fs_unconfined" lineno="6134">
<summary>
Unconfined access to filesystems
</summary>
@@ -90282,7 +90512,27 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_getattr_all_ttys" lineno="1298">
+<interface name="term_watch_unallocated_ttys" lineno="1297">
+<summary>
+Watch unallocated ttys.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="term_watch_reads_unallocated_ttys" lineno="1316">
+<summary>
+Watch reads on unallocated ttys.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="term_getattr_all_ttys" lineno="1336">
<summary>
Get the attributes of all tty device nodes.
</summary>
@@ -90293,7 +90543,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_getattr_all_ttys" lineno="1318">
+<interface name="term_dontaudit_getattr_all_ttys" lineno="1356">
<summary>
Do not audit attempts to get the
attributes of any tty device nodes.
@@ -90304,7 +90554,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_setattr_all_ttys" lineno="1338">
+<interface name="term_setattr_all_ttys" lineno="1376">
<summary>
Set the attributes of all tty device nodes.
</summary>
@@ -90315,7 +90565,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_relabel_all_ttys" lineno="1357">
+<interface name="term_relabel_all_ttys" lineno="1395">
<summary>
Relabel from and to all tty device nodes.
</summary>
@@ -90325,7 +90575,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_write_all_ttys" lineno="1376">
+<interface name="term_write_all_ttys" lineno="1414">
<summary>
Write to all ttys.
</summary>
@@ -90335,7 +90585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_use_all_ttys" lineno="1396">
+<interface name="term_use_all_ttys" lineno="1434">
<summary>
Read and write all ttys.
</summary>
@@ -90346,7 +90596,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_use_all_ttys" lineno="1416">
+<interface name="term_dontaudit_use_all_ttys" lineno="1454">
<summary>
Do not audit attempts to read or write
any ttys.
@@ -90357,7 +90607,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_use_virtio_console" lineno="1434">
+<interface name="term_use_virtio_console" lineno="1472">
<summary>
Read from and write virtio console.
</summary>
@@ -91756,7 +92006,17 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apache_initrc_domtrans" lineno="249">
+<interface name="apache_exec" lineno="249">
+<summary>
+Execute httpd
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to execute it.
+</summary>
+</param>
+</interface>
+<interface name="apache_initrc_domtrans" lineno="267">
<summary>
Execute httpd server in the httpd domain.
</summary>
@@ -91766,7 +92026,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apache_signal" lineno="267">
+<interface name="apache_signal" lineno="285">
<summary>
Send generic signals to httpd.
</summary>
@@ -91776,7 +92036,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_signull" lineno="285">
+<interface name="apache_signull" lineno="303">
<summary>
Send null signals to httpd.
</summary>
@@ -91786,7 +92046,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_sigchld" lineno="303">
+<interface name="apache_sigchld" lineno="321">
<summary>
Send child terminated signals to httpd.
</summary>
@@ -91796,7 +92056,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_use_fds" lineno="322">
+<interface name="apache_use_fds" lineno="340">
<summary>
Inherit and use file descriptors
from httpd.
@@ -91807,7 +92067,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_rw_fifo_file" lineno="341">
+<interface name="apache_dontaudit_rw_fifo_file" lineno="359">
<summary>
Do not audit attempts to read and
write httpd unnamed pipes.
@@ -91818,7 +92078,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_rw_stream_sockets" lineno="360">
+<interface name="apache_dontaudit_rw_stream_sockets" lineno="378">
<summary>
Do not audit attempts to read and
write httpd unix domain stream sockets.
@@ -91829,7 +92089,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_rw_stream_sockets" lineno="379">
+<interface name="apache_rw_stream_sockets" lineno="397">
<summary>
Read and write httpd unix domain
stream sockets.
@@ -91840,7 +92100,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_rw_tcp_sockets" lineno="398">
+<interface name="apache_dontaudit_rw_tcp_sockets" lineno="416">
<summary>
Do not audit attempts to read and
write httpd TCP sockets.
@@ -91851,7 +92111,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_reload" lineno="416">
+<interface name="apache_reload" lineno="434">
<summary>
Reload the httpd service (systemd).
</summary>
@@ -91861,7 +92121,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_all_ra_content" lineno="435">
+<interface name="apache_read_all_ra_content" lineno="453">
<summary>
Read all appendable content
</summary>
@@ -91871,7 +92131,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_append_all_ra_content" lineno="454">
+<interface name="apache_append_all_ra_content" lineno="472">
<summary>
Append to all appendable web content
</summary>
@@ -91881,7 +92141,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_all_rw_content" lineno="472">
+<interface name="apache_read_all_rw_content" lineno="490">
<summary>
Read all read/write content
</summary>
@@ -91891,7 +92151,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_manage_all_rw_content" lineno="491">
+<interface name="apache_manage_all_rw_content" lineno="509">
<summary>
Manage all read/write content
</summary>
@@ -91901,7 +92161,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_all_content" lineno="510">
+<interface name="apache_read_all_content" lineno="528">
<summary>
Read all web content.
</summary>
@@ -91911,7 +92171,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_search_all_content" lineno="532">
+<interface name="apache_search_all_content" lineno="550">
<summary>
Search all apache content.
</summary>
@@ -91921,7 +92181,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_list_all_content" lineno="550">
+<interface name="apache_list_all_content" lineno="568">
<summary>
List all apache content.
</summary>
@@ -91931,7 +92191,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_manage_all_content" lineno="570">
+<interface name="apache_manage_all_content" lineno="588">
<summary>
Create, read, write, and delete
all httpd content.
@@ -91943,7 +92203,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_setattr_cache_dirs" lineno="594">
+<interface name="apache_setattr_cache_dirs" lineno="612">
<summary>
Set attributes httpd cache directories.
</summary>
@@ -91953,7 +92213,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_list_cache" lineno="612">
+<interface name="apache_list_cache" lineno="630">
<summary>
List httpd cache directories.
</summary>
@@ -91963,7 +92223,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_rw_cache_files" lineno="630">
+<interface name="apache_rw_cache_files" lineno="648">
<summary>
Read and write httpd cache files.
</summary>
@@ -91973,7 +92233,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_delete_cache_dirs" lineno="648">
+<interface name="apache_delete_cache_dirs" lineno="666">
<summary>
Delete httpd cache directories.
</summary>
@@ -91983,7 +92243,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_delete_cache_files" lineno="666">
+<interface name="apache_delete_cache_files" lineno="684">
<summary>
Delete httpd cache files.
</summary>
@@ -91993,7 +92253,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_config" lineno="685">
+<interface name="apache_read_config" lineno="703">
<summary>
Read httpd configuration files.
</summary>
@@ -92004,7 +92264,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_search_config" lineno="706">
+<interface name="apache_search_config" lineno="724">
<summary>
Search httpd configuration directories.
</summary>
@@ -92014,7 +92274,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_manage_config" lineno="726">
+<interface name="apache_manage_config" lineno="744">
<summary>
Create, read, write, and delete
httpd configuration files.
@@ -92025,7 +92285,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_domtrans_helper" lineno="748">
+<interface name="apache_domtrans_helper" lineno="766">
<summary>
Execute the Apache helper program
with a domain transition.
@@ -92036,7 +92296,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_run_helper" lineno="775">
+<interface name="apache_run_helper" lineno="793">
<summary>
Execute the Apache helper program with
a domain transition, and allow the
@@ -92054,7 +92314,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_read_log" lineno="795">
+<interface name="apache_read_log" lineno="813">
<summary>
Read httpd log files.
</summary>
@@ -92065,7 +92325,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_append_log" lineno="816">
+<interface name="apache_append_log" lineno="834">
<summary>
Append httpd log files.
</summary>
@@ -92075,7 +92335,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_append_log" lineno="837">
+<interface name="apache_dontaudit_append_log" lineno="855">
<summary>
Do not audit attempts to append
httpd log files.
@@ -92086,7 +92346,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_manage_log" lineno="856">
+<interface name="apache_manage_log" lineno="874">
<summary>
Create, read, write, and delete
httpd log files.
@@ -92097,7 +92357,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_write_log" lineno="877">
+<interface name="apache_write_log" lineno="895">
<summary>
Write apache log files.
</summary>
@@ -92107,7 +92367,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_search_modules" lineno="897">
+<interface name="apache_dontaudit_search_modules" lineno="915">
<summary>
Do not audit attempts to search
httpd module directories.
@@ -92118,7 +92378,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_list_modules" lineno="915">
+<interface name="apache_list_modules" lineno="933">
<summary>
List httpd module directories.
</summary>
@@ -92128,7 +92388,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_exec_modules" lineno="933">
+<interface name="apache_exec_modules" lineno="951">
<summary>
Execute httpd module files.
</summary>
@@ -92138,7 +92398,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_module_files" lineno="953">
+<interface name="apache_read_module_files" lineno="971">
<summary>
Read httpd module files.
</summary>
@@ -92148,7 +92408,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_domtrans_rotatelogs" lineno="973">
+<interface name="apache_domtrans_rotatelogs" lineno="991">
<summary>
Execute a domain transition to
run httpd_rotatelogs.
@@ -92159,7 +92419,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apache_list_sys_content" lineno="992">
+<interface name="apache_list_sys_content" lineno="1010">
<summary>
List httpd system content directories.
</summary>
@@ -92169,7 +92429,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_manage_sys_content" lineno="1013">
+<interface name="apache_manage_sys_content" lineno="1031">
<summary>
Create, read, write, and delete
httpd system content files.
@@ -92181,7 +92441,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_manage_sys_rw_content" lineno="1035">
+<interface name="apache_manage_sys_rw_content" lineno="1053">
<summary>
Create, read, write, and delete
httpd system rw content.
@@ -92192,7 +92452,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_domtrans_sys_script" lineno="1057">
+<interface name="apache_domtrans_sys_script" lineno="1075">
<summary>
Execute all httpd scripts in the
system script domain.
@@ -92203,7 +92463,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1080">
+<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1098">
<summary>
Do not audit attempts to read and
write httpd system script unix
@@ -92215,7 +92475,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_domtrans_all_scripts" lineno="1099">
+<interface name="apache_domtrans_all_scripts" lineno="1117">
<summary>
Execute all user scripts in the user
script domain.
@@ -92226,7 +92486,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apache_run_all_scripts" lineno="1124">
+<interface name="apache_run_all_scripts" lineno="1142">
<summary>
Execute all user scripts in the user
script domain. Add user script domains
@@ -92243,7 +92503,7 @@ Role allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_squirrelmail_data" lineno="1143">
+<interface name="apache_read_squirrelmail_data" lineno="1161">
<summary>
Read httpd squirrelmail data files.
</summary>
@@ -92253,7 +92513,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_append_squirrelmail_data" lineno="1161">
+<interface name="apache_append_squirrelmail_data" lineno="1179">
<summary>
Append httpd squirrelmail data files.
</summary>
@@ -92263,7 +92523,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_delete_squirrelmail_spool" lineno="1179">
+<interface name="apache_delete_squirrelmail_spool" lineno="1197">
<summary>
delete httpd squirrelmail spool files.
</summary>
@@ -92273,7 +92533,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_search_sys_content" lineno="1197">
+<interface name="apache_search_sys_content" lineno="1215">
<summary>
Search httpd system content.
</summary>
@@ -92283,7 +92543,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_sys_content" lineno="1216">
+<interface name="apache_read_sys_content" lineno="1234">
<summary>
Read httpd system content.
</summary>
@@ -92293,7 +92553,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_search_sys_scripts" lineno="1236">
+<interface name="apache_search_sys_scripts" lineno="1254">
<summary>
Search httpd system CGI directories.
</summary>
@@ -92303,7 +92563,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_manage_all_user_content" lineno="1256">
+<interface name="apache_manage_all_user_content" lineno="1274">
<summary>
Create, read, write, and delete all
user httpd content.
@@ -92315,7 +92575,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_search_sys_script_state" lineno="1277">
+<interface name="apache_search_sys_script_state" lineno="1295">
<summary>
Search system script state directories.
</summary>
@@ -92325,7 +92585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_tmp_files" lineno="1295">
+<interface name="apache_read_tmp_files" lineno="1313">
<summary>
Read httpd tmp files.
</summary>
@@ -92335,7 +92595,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_write_tmp_files" lineno="1315">
+<interface name="apache_dontaudit_write_tmp_files" lineno="1333">
<summary>
Do not audit attempts to write
httpd tmp files.
@@ -92346,7 +92606,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_delete_lib_files" lineno="1333">
+<interface name="apache_delete_lib_files" lineno="1351">
<summary>
Delete httpd_var_lib_t files
</summary>
@@ -92356,7 +92616,7 @@ Domain that can delete the files
</summary>
</param>
</interface>
-<interface name="apache_cgi_domain" lineno="1364">
+<interface name="apache_cgi_domain" lineno="1382">
<summary>
Execute CGI in the specified domain.
</summary>
@@ -92378,7 +92638,7 @@ Type of the executable to enter the cgi domain.
</summary>
</param>
</interface>
-<interface name="apache_admin" lineno="1392">
+<interface name="apache_admin" lineno="1410">
<summary>
All of the rules required to
administrate an apache environment.
@@ -92395,6 +92655,16 @@ Role allowed access.
</param>
<rolecap/>
</interface>
+<interface name="apache_rw_runtime_files" lineno="1462">
+<summary>
+rw httpd_runtime_t files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
<tunable name="allow_httpd_anon_write" dftval="false">
<desc>
<p>
@@ -94992,7 +95262,7 @@ Role allowed access.
</summary>
</param>
</template>
-<template name="container_system_role" lineno="187">
+<template name="container_system_role" lineno="175">
<summary>
Role access for system containers.
</summary>
@@ -95018,7 +95288,7 @@ Role allowed access.
</summary>
</param>
</template>
-<template name="container_user_role" lineno="229">
+<template name="container_user_role" lineno="217">
<summary>
Role access for user containers.
</summary>
@@ -95044,7 +95314,33 @@ Role allowed access.
</summary>
</param>
</template>
-<interface name="container_domtrans_generic_engine" lineno="307">
+<template name="container_unconfined_role" lineno="280">
+<summary>
+Unconfined role access for containers.
+</summary>
+<param name="role_prefix">
+<summary>
+The prefix of the user role (e.g., user
+is the prefix for user_r).
+</summary>
+</param>
+<param name="user_domain">
+<summary>
+User domain for the role.
+</summary>
+</param>
+<param name="user_exec_domain">
+<summary>
+User exec domain for execute and transition access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+</template>
+<interface name="container_domtrans_generic_engine" lineno="319">
<summary>
Execute generic container engines in the
container engine domain.
@@ -95055,7 +95351,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="container_run_generic_engine" lineno="333">
+<interface name="container_run_generic_engine" lineno="345">
<summary>
Execute generic container engines in the
container engine domain, and allow the
@@ -95072,7 +95368,7 @@ The role to be allowed the container domain.
</summary>
</param>
</interface>
-<interface name="container_engine_executable_file" lineno="353">
+<interface name="container_engine_executable_file" lineno="365">
<summary>
Make the specified type usable for files
that are executables for container engines.
@@ -95083,7 +95379,7 @@ Type to be used for files.
</summary>
</param>
</interface>
-<interface name="container_generic_engine_domtrans" lineno="380">
+<interface name="container_generic_engine_domtrans" lineno="392">
<summary>
Execute a generic container engine
executable with an automatic transition
@@ -95100,7 +95396,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="container_engine_executable_entrypoint" lineno="401">
+<interface name="container_engine_executable_entrypoint" lineno="413">
<summary>
Allow the generic container engine
executables to be an entrypoint
@@ -95112,7 +95408,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_engine_dbus_chat" lineno="420">
+<interface name="container_engine_dbus_chat" lineno="432">
<summary>
Send and receive messages from
container engines over dbus.
@@ -95123,7 +95419,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_runtime_named_socket_activation" lineno="443">
+<interface name="container_runtime_named_socket_activation" lineno="455">
<summary>
Allow the specified domain to be started
by systemd socket activation using a
@@ -95136,7 +95432,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_engine_tmp_files" lineno="462">
+<interface name="container_manage_engine_tmp_files" lineno="474">
<summary>
Allow the specified domain to manage
container engine temporary files.
@@ -95147,7 +95443,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_engine_tmp_sock_files" lineno="482">
+<interface name="container_manage_engine_tmp_sock_files" lineno="494">
<summary>
Allow the specified domain to manage
container engine temporary named sockets.
@@ -95158,7 +95454,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_engine_tmp_filetrans" lineno="514">
+<interface name="container_engine_tmp_filetrans" lineno="526">
<summary>
Allow the specified domain to create
objects in generic temporary directories
@@ -95181,7 +95477,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="container_read_system_container_state" lineno="533">
+<interface name="container_read_system_container_state" lineno="545">
<summary>
Read the process state (/proc/pid)
of all system containers.
@@ -95192,7 +95488,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_read_user_container_state" lineno="552">
+<interface name="container_read_user_container_state" lineno="564">
<summary>
Read the process state (/proc/pid)
of all user containers.
@@ -95203,7 +95499,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_all_containers" lineno="572">
+<interface name="container_manage_all_containers" lineno="584">
<summary>
All of the permissions necessary
for a container engine to manage
@@ -95215,7 +95511,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_domtrans" lineno="592">
+<interface name="container_domtrans" lineno="604">
<summary>
Allow the specified domain to
perform a type transition to
@@ -95227,7 +95523,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="container_stream_connect_system_containers" lineno="611">
+<interface name="container_stream_connect_system_containers" lineno="623">
<summary>
Connect to a system container domain
over a unix stream socket.
@@ -95238,7 +95534,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_stream_connect_user_containers" lineno="633">
+<interface name="container_stream_connect_user_containers" lineno="645">
<summary>
Connect to a user container domain
over a unix stream socket.
@@ -95249,7 +95545,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_stream_connect_all_containers" lineno="655">
+<interface name="container_stream_connect_all_containers" lineno="667">
<summary>
Connect to a container domain
over a unix stream socket.
@@ -95260,7 +95556,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_signal_all_containers" lineno="678">
+<interface name="container_signal_all_containers" lineno="690">
<summary>
Allow the specified domain to
send all signals to a container
@@ -95272,7 +95568,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="container_setattr_container_ptys" lineno="696">
+<interface name="container_setattr_container_ptys" lineno="708">
<summary>
Set the attributes of container ptys.
</summary>
@@ -95282,7 +95578,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_use_container_ptys" lineno="714">
+<interface name="container_use_container_ptys" lineno="726">
<summary>
Read and write container ptys.
</summary>
@@ -95292,7 +95588,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_mountpoint" lineno="733">
+<interface name="container_mountpoint" lineno="745">
<summary>
Make the specified type usable as a mountpoint
for containers.
@@ -95303,7 +95599,29 @@ Type to be used as a mountpoint.
</summary>
</param>
</interface>
-<interface name="container_manage_config_files" lineno="752">
+<interface name="container_create_config_files" lineno="764">
+<summary>
+Allow the specified domain to
+create container config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_write_config_files" lineno="783">
+<summary>
+Allow the specified domain to
+write container config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_config_files" lineno="802">
<summary>
Allow the specified domain to
manage container config files.
@@ -95314,7 +95632,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_file_root_filetrans" lineno="773">
+<interface name="container_file_root_filetrans" lineno="823">
<summary>
Allow the specified domain to
create container files in the
@@ -95327,7 +95645,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_dirs" lineno="792">
+<interface name="container_manage_dirs" lineno="842">
<summary>
Allow the specified domain to
manage container file directories.
@@ -95338,7 +95656,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_files" lineno="811">
+<interface name="container_manage_files" lineno="861">
<summary>
Allow the specified domain to
manage container files.
@@ -95349,7 +95667,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_lnk_files" lineno="830">
+<interface name="container_manage_lnk_files" lineno="880">
<summary>
Allow the specified domain to
manage container lnk files.
@@ -95360,7 +95678,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_fifo_files" lineno="849">
+<interface name="container_manage_fifo_files" lineno="899">
<summary>
Allow the specified domain to
manage container fifo files.
@@ -95371,7 +95689,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_sock_files" lineno="868">
+<interface name="container_manage_sock_files" lineno="918">
<summary>
Allow the specified domain to
manage container sock files.
@@ -95382,7 +95700,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_rw_chr_files" lineno="887">
+<interface name="container_rw_chr_files" lineno="937">
<summary>
Allow the specified domain to read
and write container chr files.
@@ -95393,7 +95711,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_dontaudit_rw_chr_files" lineno="906">
+<interface name="container_dontaudit_rw_chr_files" lineno="956">
<summary>
Do not audit attempts to read
and write container chr files.
@@ -95404,7 +95722,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_chr_files" lineno="925">
+<interface name="container_manage_chr_files" lineno="975">
<summary>
Allow the specified domain to
manage container chr files.
@@ -95415,7 +95733,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_home_config" lineno="944">
+<interface name="container_manage_home_config" lineno="994">
<summary>
Allow the specified domain to
manage container config home content.
@@ -95426,7 +95744,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_config_home_filetrans" lineno="976">
+<interface name="container_config_home_filetrans" lineno="1026">
<summary>
Allow the specified domain to create
objects in an xdg_config directory
@@ -95449,7 +95767,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="container_manage_home_data_files" lineno="996">
+<interface name="container_manage_home_data_files" lineno="1046">
<summary>
Allow the specified domain to
manage container data home files.
@@ -95460,7 +95778,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_home_data_fifo_files" lineno="1016">
+<interface name="container_manage_home_data_fifo_files" lineno="1066">
<summary>
Allow the specified domain to
manage container data home named
@@ -95472,7 +95790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_home_data_sock_files" lineno="1036">
+<interface name="container_manage_home_data_sock_files" lineno="1086">
<summary>
Allow the specified domain to
manage container data home named
@@ -95484,7 +95802,51 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_relabel_all_content" lineno="1056">
+<interface name="container_admin_all_files" lineno="1104">
+<summary>
+Administrate all container files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_admin_all_ro_files" lineno="1124">
+<summary>
+Administrate all container read-only files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_admin_all_user_runtime_content" lineno="1146">
+<summary>
+All of the rules necessary for a user
+to manage user container runtime data
+in their user runtime directory.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_all_home_content" lineno="1166">
+<summary>
+All of the rules necessary for a user
+to manage container data in their home
+directory.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_relabel_all_content" lineno="1210">
<summary>
Allow the specified domain to
relabel container files and
@@ -95496,7 +95858,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_relabel_fs" lineno="1075">
+<interface name="container_remount_fs" lineno="1229">
+<summary>
+Allow the specified domain to
+remount container filesystems.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_relabel_fs" lineno="1248">
<summary>
Allow the specified domain to
relabel container filesystems.
@@ -95507,7 +95880,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_getattr_fs" lineno="1095">
+<interface name="container_getattr_fs" lineno="1268">
<summary>
Allow the specified domain to
get the attributes of container
@@ -95519,7 +95892,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_search_runtime" lineno="1114">
+<interface name="container_search_runtime" lineno="1287">
<summary>
Allow the specified domain to search
runtime container directories.
@@ -95530,7 +95903,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_runtime_files" lineno="1134">
+<interface name="container_manage_runtime_files" lineno="1307">
<summary>
Allow the specified domain to manage
runtime container files.
@@ -95541,7 +95914,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_runtime_fifo_files" lineno="1153">
+<interface name="container_manage_runtime_fifo_files" lineno="1326">
<summary>
Allow the specified domain to manage
runtime container named pipes.
@@ -95552,7 +95925,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_runtime_sock_files" lineno="1172">
+<interface name="container_manage_runtime_sock_files" lineno="1345">
<summary>
Allow the specified domain to manage
runtime container named sockets.
@@ -95563,7 +95936,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_user_runtime_files" lineno="1191">
+<interface name="container_manage_user_runtime_files" lineno="1364">
<summary>
Allow the specified domain to manage
user runtime container files.
@@ -95574,7 +95947,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_rw_user_runtime_sock_files" lineno="1210">
+<interface name="container_rw_user_runtime_sock_files" lineno="1383">
<summary>
Allow the specified domain to read and
write user runtime container named sockets.
@@ -95585,7 +95958,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_search_var_lib" lineno="1229">
+<interface name="container_search_var_lib" lineno="1402">
<summary>
Allow the specified domain to search
container directories in /var/lib.
@@ -95596,7 +95969,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_var_lib_files" lineno="1249">
+<interface name="container_manage_var_lib_files" lineno="1422">
<summary>
Allow the specified domain to manage
container files in /var/lib.
@@ -95607,7 +95980,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_var_lib_fifo_files" lineno="1268">
+<interface name="container_manage_var_lib_fifo_files" lineno="1441">
<summary>
Allow the specified domain to manage
container named pipes in /var/lib.
@@ -95618,7 +95991,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_var_lib_sock_files" lineno="1287">
+<interface name="container_manage_var_lib_sock_files" lineno="1460">
<summary>
Allow the specified domain to manage
container named sockets in /var/lib.
@@ -95629,7 +96002,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_unlabeled_var_lib_filetrans" lineno="1318">
+<interface name="container_unlabeled_var_lib_filetrans" lineno="1491">
<summary>
Allow the specified domain to create
objects in unlabeled directories with
@@ -95652,7 +96025,18 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="container_admin" lineno="1346">
+<interface name="container_start_units" lineno="1512">
+<summary>
+Allow the specified domain to start
+systemd units for containers.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_admin" lineno="1539">
<summary>
All of the rules required to
administrate a container
@@ -95686,6 +96070,27 @@ Allow container engines to mount on all non-security files.
</p>
</desc>
</tunable>
+<tunable name="container_manage_public_content" dftval="false">
+<desc>
+<p>
+Allow containers to manage all read-writable public content.
+</p>
+</desc>
+</tunable>
+<tunable name="container_read_public_content" dftval="false">
+<desc>
+<p>
+Allow containers to read all public content.
+</p>
+</desc>
+</tunable>
+<tunable name="container_use_ecryptfs" dftval="false">
+<desc>
+<p>
+Allow containers to use eCryptfs filesystems.
+</p>
+</desc>
+</tunable>
<tunable name="container_use_nfs" dftval="false">
<desc>
<p>
@@ -96950,7 +97355,7 @@ User domain for the role
</summary>
</param>
</template>
-<interface name="dbus_system_bus_client" lineno="140">
+<interface name="dbus_system_bus_client" lineno="137">
<summary>
Template for creating connections to
the system bus.
@@ -96961,7 +97366,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_connect_all_session_bus" lineno="179">
+<interface name="dbus_connect_all_session_bus" lineno="176">
<summary>
Acquire service on all DBUS
session busses.
@@ -96972,7 +97377,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<template name="dbus_connect_spec_session_bus" lineno="205">
+<template name="dbus_connect_spec_session_bus" lineno="202">
<summary>
Acquire service on specified
DBUS session bus.
@@ -96989,7 +97394,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<interface name="dbus_all_session_bus_client" lineno="225">
+<interface name="dbus_all_session_bus_client" lineno="222">
<summary>
Creating connections to all
DBUS session busses.
@@ -97000,7 +97405,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<template name="dbus_spec_session_bus_client" lineno="257">
+<template name="dbus_spec_session_bus_client" lineno="254">
<summary>
Creating connections to specified
DBUS session bus.
@@ -97017,7 +97422,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<interface name="dbus_send_all_session_bus" lineno="284">
+<interface name="dbus_send_all_session_bus" lineno="281">
<summary>
Send messages to all DBUS
session busses.
@@ -97028,7 +97433,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<template name="dbus_send_spec_session_bus" lineno="310">
+<template name="dbus_send_spec_session_bus" lineno="307">
<summary>
Send messages to specified
DBUS session busses.
@@ -97045,7 +97450,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<interface name="dbus_getattr_session_runtime_socket" lineno="330">
+<interface name="dbus_getattr_session_runtime_socket" lineno="327">
<summary>
Allow the specified domain to get the
attributes of the session dbus sock file.
@@ -97056,7 +97461,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_write_session_runtime_socket" lineno="349">
+<interface name="dbus_write_session_runtime_socket" lineno="346">
<summary>
Allow the specified domain to write to
the session dbus sock file.
@@ -97067,7 +97472,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_read_config" lineno="367">
+<interface name="dbus_read_config" lineno="364">
<summary>
Read dbus configuration content.
</summary>
@@ -97077,7 +97482,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_read_lib_files" lineno="386">
+<interface name="dbus_read_lib_files" lineno="383">
<summary>
Read system dbus lib files.
</summary>
@@ -97087,7 +97492,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_relabel_lib_dirs" lineno="406">
+<interface name="dbus_relabel_lib_dirs" lineno="403">
<summary>
Relabel system dbus lib directory.
</summary>
@@ -97097,7 +97502,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_manage_lib_files" lineno="426">
+<interface name="dbus_manage_lib_files" lineno="423">
<summary>
Create, read, write, and delete
system dbus lib files.
@@ -97108,7 +97513,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_all_session_domain" lineno="452">
+<interface name="dbus_all_session_domain" lineno="449">
<summary>
Allow a application domain to be
started by the specified session bus.
@@ -97125,7 +97530,7 @@ entry point to this domain.
</summary>
</param>
</interface>
-<template name="dbus_spec_session_domain" lineno="486">
+<template name="dbus_spec_session_domain" lineno="483">
<summary>
Allow a application domain to be
started by the specified session bus.
@@ -97148,7 +97553,7 @@ entry point to this domain.
</summary>
</param>
</template>
-<interface name="dbus_connect_system_bus" lineno="507">
+<interface name="dbus_connect_system_bus" lineno="504">
<summary>
Acquire service on the DBUS system bus.
</summary>
@@ -97158,7 +97563,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_send_system_bus" lineno="526">
+<interface name="dbus_send_system_bus" lineno="523">
<summary>
Send messages to the DBUS system bus.
</summary>
@@ -97168,7 +97573,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_system_bus_unconfined" lineno="545">
+<interface name="dbus_system_bus_unconfined" lineno="542">
<summary>
Unconfined access to DBUS system bus.
</summary>
@@ -97178,7 +97583,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_system_domain" lineno="570">
+<interface name="dbus_system_domain" lineno="567">
<summary>
Create a domain for processes which
can be started by the DBUS system bus.
@@ -97194,7 +97599,7 @@ Type of the program to be used as an entry point to this domain.
</summary>
</param>
</interface>
-<interface name="dbus_use_system_bus_fds" lineno="610">
+<interface name="dbus_use_system_bus_fds" lineno="605">
<summary>
Use and inherit DBUS system bus
file descriptors.
@@ -97205,7 +97610,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="629">
+<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="624">
<summary>
Do not audit attempts to read and
write DBUS system bus TCP sockets.
@@ -97216,7 +97621,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dbus_watch_system_bus_runtime_dirs" lineno="647">
+<interface name="dbus_watch_system_bus_runtime_dirs" lineno="642">
<summary>
Watch system bus runtime directories.
</summary>
@@ -97226,7 +97631,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_list_system_bus_runtime" lineno="665">
+<interface name="dbus_read_system_bus_runtime_files" lineno="660">
+<summary>
+Read system bus runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dbus_list_system_bus_runtime" lineno="679">
<summary>
List system bus runtime directories.
</summary>
@@ -97236,7 +97651,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="683">
+<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="697">
<summary>
Watch system bus runtime named sockets.
</summary>
@@ -97246,7 +97661,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_read_system_bus_runtime_named_sockets" lineno="701">
+<interface name="dbus_read_system_bus_runtime_named_sockets" lineno="715">
<summary>
Read system bus runtime named sockets.
</summary>
@@ -97256,7 +97671,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_unconfined" lineno="719">
+<interface name="dbus_unconfined" lineno="733">
<summary>
Unconfined access to DBUS.
</summary>
@@ -97266,7 +97681,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="749">
+<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="763">
<summary>
Create resources in /run or /var/run with the system_dbusd_runtime_t
label. This method is deprecated in favor of the init_daemon_run_dir
@@ -97288,7 +97703,7 @@ Optional file name used for the resource
</summary>
</param>
</interface>
-<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="763">
+<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="777">
<summary>
Create directories with the system_dbusd_runtime_t label
</summary>
@@ -97307,6 +97722,23 @@ over D-Bus. This is needed by openvpn3-linux.
</p>
</desc>
</tunable>
+<tunable name="dbus_broker_run_transient_units" dftval="false">
+<desc>
+<p>
+Allow dbus-daemon system bus to to run systemd transient
+units. This is used by dbus-broker for dbus-activated
+services when the unit file for the service does not exist.
+</p>
+</desc>
+</tunable>
+<tunable name="dbus_broker_system_bus" dftval="false">
+<desc>
+<p>
+Enable additional rules to support using dbus-broker
+as the dbus-daemon system bus.
+</p>
+</desc>
+</tunable>
</module>
<module name="ddclient" filename="policy/modules/services/ddclient.if">
<summary>Update dynamic IP address at DynDNS.org.</summary>
@@ -101404,7 +101836,27 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="mailman_exec" lineno="120">
+<interface name="mailman_stream_connect_cgi" lineno="120">
+<summary>
+Talk to mailman_cgi_t via Unix domain socket
+</summary>
+<param name="domain">
+<summary>
+Domain talking to mailman
+</summary>
+</param>
+</interface>
+<interface name="mailman_manage_runtime_files" lineno="139">
+<summary>
+Manage mailman runtime files
+</summary>
+<param name="domain">
+<summary>
+Domain to manage the files
+</summary>
+</param>
+</interface>
+<interface name="mailman_exec" lineno="158">
<summary>
Execute mailman in the caller domain.
</summary>
@@ -101414,7 +101866,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mailman_signal_cgi" lineno="139">
+<interface name="mailman_signal_cgi" lineno="177">
<summary>
Send generic signals to mailman cgi.
</summary>
@@ -101424,7 +101876,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mailman_search_data" lineno="157">
+<interface name="mailman_search_data" lineno="195">
<summary>
Search mailman data directories.
</summary>
@@ -101434,7 +101886,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mailman_read_data_files" lineno="176">
+<interface name="mailman_read_data_files" lineno="214">
<summary>
Read mailman data content.
</summary>
@@ -101444,7 +101896,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mailman_manage_data_files" lineno="198">
+<interface name="mailman_map_data_files" lineno="235">
+<summary>
+map mailman data content.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="mailman_manage_data_files" lineno="254">
<summary>
Create, read, write, and delete
mailman data files.
@@ -101455,7 +101917,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mailman_list_data" lineno="218">
+<interface name="mailman_list_data" lineno="274">
<summary>
List mailman data directories.
</summary>
@@ -101465,7 +101927,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mailman_read_data_symlinks" lineno="237">
+<interface name="mailman_read_data_symlinks" lineno="293">
<summary>
Read mailman data symbolic links.
</summary>
@@ -101475,7 +101937,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mailman_read_log" lineno="255">
+<interface name="mailman_read_log" lineno="311">
<summary>
Read mailman log files.
</summary>
@@ -101485,7 +101947,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mailman_append_log" lineno="274">
+<interface name="mailman_append_log" lineno="330">
<summary>
Append mailman log files.
</summary>
@@ -101495,7 +101957,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mailman_manage_log" lineno="294">
+<interface name="mailman_manage_log" lineno="350">
<summary>
Create, read, write, and delete
mailman log content.
@@ -101506,7 +101968,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mailman_read_archive" lineno="314">
+<interface name="mailman_read_archive" lineno="370">
<summary>
Read mailman archive content.
</summary>
@@ -101516,7 +101978,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mailman_domtrans_queue" lineno="337">
+<interface name="mailman_domtrans_queue" lineno="393">
<summary>
Execute mailman_queue in the
mailman_queue domain.
@@ -101527,6 +101989,34 @@ Domain allowed to transition.
</summary>
</param>
</interface>
+<interface name="mailman_manage_lockdir" lineno="412">
+<summary>
+Manage mailman lock dir
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to manage it.
+</summary>
+</param>
+</interface>
+</module>
+<module name="matrixd" filename="policy/modules/services/matrixd.if">
+<summary>matrix.org synapse reference server.</summary>
+<tunable name="matrix_allow_federation" dftval="true">
+<desc>
+<p>
+Determine whether Matrixd is allowed to federate
+(bind all UDP ports and connect to all TCP ports).
+</p>
+</desc>
+</tunable>
+<tunable name="matrix_postgresql_connect" dftval="false">
+<desc>
+<p>
+Determine whether Matrixd can connect to the Postgres database.
+</p>
+</desc>
+</tunable>
</module>
<module name="mediawiki" filename="policy/modules/services/mediawiki.if">
<summary>Open source wiki package written in PHP.</summary>
@@ -102588,7 +103078,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_read_spool_symlinks" lineno="835">
+<interface name="mta_read_spool_symlinks" lineno="836">
<summary>
Allow reading mail spool symlinks.
</summary>
@@ -102598,7 +103088,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_dontaudit_read_spool_symlinks" lineno="854">
+<interface name="mta_dontaudit_read_spool_symlinks" lineno="855">
<summary>
Do not audit attempts to read
mail spool symlinks.
@@ -102609,7 +103099,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_getattr_spool" lineno="872">
+<interface name="mta_getattr_spool" lineno="873">
<summary>
Get attributes of mail spool content.
</summary>
@@ -102619,7 +103109,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_dontaudit_getattr_spool_files" lineno="894">
+<interface name="mta_dontaudit_getattr_spool_files" lineno="895">
<summary>
Do not audit attempts to get
attributes of mail spool files.
@@ -102630,7 +103120,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_spool_filetrans" lineno="932">
+<interface name="mta_spool_filetrans" lineno="933">
<summary>
Create specified objects in the
mail spool directory with a
@@ -102657,7 +103147,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="mta_read_spool_files" lineno="951">
+<interface name="mta_read_spool_files" lineno="952">
<summary>
Read mail spool files.
</summary>
@@ -102667,7 +103157,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_rw_spool" lineno="971">
+<interface name="mta_rw_spool" lineno="972">
<summary>
Read and write mail spool files.
</summary>
@@ -102677,7 +103167,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_append_spool" lineno="992">
+<interface name="mta_append_spool" lineno="993">
<summary>
Create, read, and write mail spool files.
</summary>
@@ -102687,7 +103177,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_delete_spool" lineno="1013">
+<interface name="mta_delete_spool" lineno="1014">
<summary>
Delete mail spool files.
</summary>
@@ -102697,7 +103187,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_manage_spool" lineno="1033">
+<interface name="mta_manage_spool" lineno="1034">
<summary>
Create, read, write, and delete
mail spool content.
@@ -102708,7 +103198,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_watch_spool" lineno="1055">
+<interface name="mta_watch_spool" lineno="1056">
<summary>
Watch mail spool content.
</summary>
@@ -102718,7 +103208,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_queue_filetrans" lineno="1090">
+<interface name="mta_queue_filetrans" lineno="1091">
<summary>
Create specified objects in the
mail queue spool directory with a
@@ -102745,7 +103235,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="mta_search_queue" lineno="1109">
+<interface name="mta_search_queue" lineno="1110">
<summary>
Search mail queue directories.
</summary>
@@ -102755,7 +103245,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_list_queue" lineno="1128">
+<interface name="mta_list_queue" lineno="1129">
<summary>
List mail queue directories.
</summary>
@@ -102765,7 +103255,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_read_queue" lineno="1147">
+<interface name="mta_read_queue" lineno="1148">
<summary>
Read mail queue files.
</summary>
@@ -102775,7 +103265,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_dontaudit_rw_queue" lineno="1167">
+<interface name="mta_dontaudit_rw_queue" lineno="1168">
<summary>
Do not audit attempts to read and
write mail queue content.
@@ -102786,7 +103276,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_manage_queue" lineno="1187">
+<interface name="mta_manage_queue" lineno="1188">
<summary>
Create, read, write, and delete
mail queue content.
@@ -102797,7 +103287,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_read_sendmail_bin" lineno="1207">
+<interface name="mta_read_sendmail_bin" lineno="1208">
<summary>
Read sendmail binary.
</summary>
@@ -102807,7 +103297,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_rw_user_mail_stream_sockets" lineno="1226">
+<interface name="mta_rw_user_mail_stream_sockets" lineno="1227">
<summary>
Read and write unix domain stream
sockets of all base mail domains.
@@ -103830,6 +104320,9 @@ Role allowed access.
<rolecap/>
</interface>
</module>
+<module name="node_exporter" filename="policy/modules/services/node_exporter.if">
+<summary>Prometheus Node Exporter</summary>
+</module>
<module name="nscd" filename="policy/modules/services/nscd.if">
<summary>Name service cache daemon.</summary>
<interface name="nscd_signal" lineno="13">
@@ -105351,7 +105844,22 @@ Role allowed access.
</module>
<module name="podman" filename="policy/modules/services/podman.if">
<summary>Policy for podman</summary>
-<interface name="podman_domtrans" lineno="13">
+<template name="podman_conmon_domain_template" lineno="18">
+<summary>
+Template for conmon domains.
+</summary>
+<param name="prefix">
+<summary>
+Prefix for generated types.
+</summary>
+</param>
+<param name="source_domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</template>
+<interface name="podman_domtrans" lineno="55">
<summary>
Execute podman in the podman domain.
</summary>
@@ -105361,7 +105869,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="podman_run" lineno="39">
+<interface name="podman_run" lineno="81">
<summary>
Execute podman in the podman domain,
and allow the specified role the
@@ -105378,7 +105886,7 @@ The role to be allowed the podman domain.
</summary>
</param>
</interface>
-<interface name="podman_domtrans_user" lineno="60">
+<interface name="podman_domtrans_user" lineno="102">
<summary>
Execute podman in the podman user
domain (rootless podman).
@@ -105389,7 +105897,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="podman_run_user" lineno="87">
+<interface name="podman_run_user" lineno="129">
<summary>
Execute podman in the podman user
domain, and allow the specified role
@@ -105407,9 +105915,9 @@ The role to be allowed the podman domain.
</summary>
</param>
</interface>
-<interface name="podman_domtrans_conmon" lineno="107">
+<interface name="podman_domtrans_conmon" lineno="149">
<summary>
-Execute conmon in the conmon domain.
+Execute conmon in the podman conmon domain.
</summary>
<param name="domain">
<summary>
@@ -105417,11 +105925,11 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="podman_run_conmon" lineno="133">
+<interface name="podman_run_conmon" lineno="175">
<summary>
-Execute conmon in the conmon domain,
-and allow the specified role the
-conmon domain.
+Execute conmon in the podman conmon
+domain, and allow the specified role
+the podman conmon domain.
</summary>
<param name="domain">
<summary>
@@ -105434,10 +105942,10 @@ The role to be allowed the conmon domain.
</summary>
</param>
</interface>
-<interface name="podman_domtrans_conmon_user" lineno="154">
+<interface name="podman_domtrans_conmon_user" lineno="196">
<summary>
-Execute conmon in the conmon user
-domain (rootless podman).
+Execute conmon in the podman conmon
+user domain (rootless podman).
</summary>
<param name="domain">
<summary>
@@ -105445,12 +105953,12 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="podman_run_conmon_user" lineno="181">
+<interface name="podman_run_conmon_user" lineno="223">
<summary>
-Execute conmon in the conmon user
-domain, and allow the specified role
-the conmon user domain (rootless
-podman).
+Execute conmon in the podman conmon
+user domain, and allow the specified
+role the podman conmon user domain
+(rootless podman).
</summary>
<param name="domain">
<summary>
@@ -105463,7 +105971,44 @@ The role to be allowed the conmon domain.
</summary>
</param>
</interface>
-<template name="podman_user_role" lineno="218">
+<interface name="podman_spec_rangetrans_conmon" lineno="249">
+<summary>
+Make the specified domain perform a
+range transition when executing conmon.
+</summary>
+<param name="domain">
+<summary>
+Domain to transition ranges.
+</summary>
+</param>
+<param name="range">
+<summary>
+MLS range to transition to.
+</summary>
+</param>
+</interface>
+<interface name="podman_rw_conmon_pipes" lineno="272">
+<summary>
+Read and write podman conmon unnamed pipes.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="podman_use_conmon_fds" lineno="293">
+<summary>
+Allow the specified domain to inherit
+file descriptors from podman conmon.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<template name="podman_user_role" lineno="330">
<summary>
Role access for rootless podman.
</summary>
@@ -105490,7 +106035,7 @@ Role allowed access.
</param>
<rolecap/>
</template>
-<interface name="podman_admin" lineno="255">
+<interface name="podman_admin" lineno="367">
<summary>
All of the rules required to
administrate a podman
@@ -105649,6 +106194,46 @@ Domain allowed access.
</summary>
</param>
</interface>
+<interface name="policykit_get_unit_status" lineno="260">
+<summary>
+Get the status of the polkit systemd unit.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="policykit_start_unit" lineno="279">
+<summary>
+Start the polkit systemd unit.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="policykit_stop_unit" lineno="298">
+<summary>
+Stop the polkit systemd unit.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="policykit_reload_unit" lineno="317">
+<summary>
+Reload the polkit systemd unit.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
</module>
<module name="portmap" filename="policy/modules/services/portmap.if">
<summary>RPC port mapping service.</summary>
@@ -110653,7 +111238,7 @@ is the prefix for sshd_t).
</summary>
</param>
</template>
-<template name="ssh_role_template" lineno="309">
+<template name="ssh_role_template" lineno="322">
<summary>
Role access for ssh
</summary>
@@ -110679,7 +111264,7 @@ Role allowed access
</summary>
</param>
</template>
-<interface name="ssh_sigchld" lineno="474">
+<interface name="ssh_sigchld" lineno="487">
<summary>
Send a SIGCHLD signal to the ssh server.
</summary>
@@ -110689,7 +111274,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_signal" lineno="492">
+<interface name="ssh_signal" lineno="505">
<summary>
Send a generic signal to the ssh server.
</summary>
@@ -110699,7 +111284,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_signull" lineno="510">
+<interface name="ssh_signull" lineno="523">
<summary>
Send a null signal to sshd processes.
</summary>
@@ -110709,7 +111294,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_read_pipes" lineno="528">
+<interface name="ssh_read_pipes" lineno="541">
<summary>
Read a ssh server unnamed pipe.
</summary>
@@ -110719,7 +111304,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_rw_pipes" lineno="545">
+<interface name="ssh_rw_pipes" lineno="558">
<summary>
Read and write a ssh server unnamed pipe.
</summary>
@@ -110729,7 +111314,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_rw_stream_sockets" lineno="563">
+<interface name="ssh_rw_stream_sockets" lineno="576">
<summary>
Read and write ssh server unix domain stream sockets.
</summary>
@@ -110739,7 +111324,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_rw_tcp_sockets" lineno="581">
+<interface name="ssh_rw_tcp_sockets" lineno="594">
<summary>
Read and write ssh server TCP sockets.
</summary>
@@ -110749,7 +111334,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="600">
+<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="613">
<summary>
Do not audit attempts to read and write
ssh server TCP sockets.
@@ -110760,7 +111345,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="ssh_exec_sshd" lineno="618">
+<interface name="ssh_exec_sshd" lineno="631">
<summary>
Execute the ssh daemon in the caller domain.
</summary>
@@ -110770,7 +111355,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_domtrans" lineno="637">
+<interface name="ssh_domtrans" lineno="650">
<summary>
Execute the ssh daemon sshd domain.
</summary>
@@ -110780,7 +111365,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ssh_client_domtrans" lineno="655">
+<interface name="ssh_client_domtrans" lineno="668">
<summary>
Execute the ssh client in the ssh client domain.
</summary>
@@ -110790,7 +111375,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ssh_exec" lineno="673">
+<interface name="ssh_exec" lineno="686">
<summary>
Execute the ssh client in the caller domain.
</summary>
@@ -110800,7 +111385,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_setattr_key_files" lineno="692">
+<interface name="ssh_setattr_key_files" lineno="705">
<summary>
Set the attributes of sshd key files.
</summary>
@@ -110810,7 +111395,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_agent_exec" lineno="711">
+<interface name="ssh_agent_exec" lineno="724">
<summary>
Execute the ssh agent client in the caller domain.
</summary>
@@ -110820,7 +111405,27 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_read_user_home_files" lineno="730">
+<interface name="ssh_setattr_home_dirs" lineno="743">
+<summary>
+Set the attributes of ssh home directory (~/.ssh)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="ssh_create_home_dirs" lineno="761">
+<summary>
+Create ssh home directory (~/.ssh)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="ssh_read_user_home_files" lineno="780">
<summary>
Read ssh home directory content
</summary>
@@ -110830,7 +111435,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_domtrans_keygen" lineno="751">
+<interface name="ssh_domtrans_keygen" lineno="801">
<summary>
Execute the ssh key generator in the ssh keygen domain.
</summary>
@@ -110840,17 +111445,27 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ssh_dontaudit_read_server_keys" lineno="769">
+<interface name="ssh_read_server_keys" lineno="819">
<summary>
Read ssh server keys
</summary>
<param name="domain">
<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="ssh_dontaudit_read_server_keys" lineno="837">
+<summary>
+Do not audit denials on reading ssh server keys
+</summary>
+<param name="domain">
+<summary>
Domain to not audit.
</summary>
</param>
</interface>
-<interface name="ssh_manage_home_files" lineno="787">
+<interface name="ssh_manage_home_files" lineno="855">
<summary>
Manage ssh home directory content
</summary>
@@ -110860,7 +111475,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_delete_tmp" lineno="806">
+<interface name="ssh_delete_tmp" lineno="874">
<summary>
Delete from the ssh temp files.
</summary>
@@ -110870,7 +111485,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_dontaudit_agent_tmp" lineno="825">
+<interface name="ssh_dontaudit_agent_tmp" lineno="893">
<summary>
dontaudit access to ssh agent tmp dirs
</summary>
@@ -115841,7 +116456,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_signal" lineno="76">
+<interface name="fstools_signal" lineno="77">
<summary>
Send signal to fsadm process
</summary>
@@ -115851,7 +116466,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_use_fds" lineno="94">
+<interface name="fstools_use_fds" lineno="95">
<summary>
Inherit fstools file descriptors.
</summary>
@@ -115861,7 +116476,7 @@ The type of the process performing this action.
</summary>
</param>
</interface>
-<interface name="fstools_read_pipes" lineno="112">
+<interface name="fstools_read_pipes" lineno="113">
<summary>
Read fstools unnamed pipes.
</summary>
@@ -115871,7 +116486,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_relabelto_entry_files" lineno="131">
+<interface name="fstools_relabelto_entry_files" lineno="132">
<summary>
Relabel a file to the type used by the
filesystem tools programs.
@@ -115882,7 +116497,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_manage_entry_files" lineno="150">
+<interface name="fstools_manage_entry_files" lineno="151">
<summary>
Create, read, write, and delete a file used by the
filesystem tools programs.
@@ -115893,7 +116508,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_write_log" lineno="168">
+<interface name="fstools_write_log" lineno="169">
<summary>
Write to fsadm_log_t
</summary>
@@ -115903,7 +116518,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_manage_runtime_files" lineno="187">
+<interface name="fstools_manage_runtime_files" lineno="188">
<summary>
Create, read, write, and delete filesystem tools
runtime files.
@@ -115914,7 +116529,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_getattr_swap_files" lineno="205">
+<interface name="fstools_getattr_swap_files" lineno="206">
<summary>
Getattr swapfile
</summary>
@@ -115924,7 +116539,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_dontaudit_getattr_swap_files" lineno="223">
+<interface name="fstools_dontaudit_getattr_swap_files" lineno="224">
<summary>
Ignore access to a swapfile.
</summary>
@@ -115934,7 +116549,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fstools_relabelto_swap_files" lineno="241">
+<interface name="fstools_relabelto_swap_files" lineno="242">
<summary>
Relabel to swapfile.
</summary>
@@ -115944,7 +116559,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fstools_manage_swap_files" lineno="259">
+<interface name="fstools_manage_swap_files" lineno="260">
<summary>
Manage swapfile.
</summary>
@@ -116244,7 +116859,7 @@ Type of the program to be used as an entry point to this domain.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="init_ranged_daemon_domain" lineno="431">
+<interface name="init_ranged_daemon_domain" lineno="433">
<summary>
Create a domain for long running processes
(daemons/services) which are started by init scripts,
@@ -116286,7 +116901,7 @@ MLS/MCS range for the domain.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="init_abstract_socket_activation" lineno="462">
+<interface name="init_abstract_socket_activation" lineno="464">
<summary>
Abstract socket service activation (systemd).
</summary>
@@ -116296,7 +116911,7 @@ The domain to be started by systemd socket activation.
</summary>
</param>
</interface>
-<interface name="init_named_socket_activation" lineno="487">
+<interface name="init_named_socket_activation" lineno="489">
<summary>
Named socket service activation (systemd).
</summary>
@@ -116311,7 +116926,7 @@ The domain socket file type.
</summary>
</param>
</interface>
-<interface name="init_system_domain" lineno="538">
+<interface name="init_system_domain" lineno="540">
<summary>
Create a domain for short running processes
which are started by init scripts.
@@ -116348,7 +116963,7 @@ Type of the program to be used as an entry point to this domain.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="init_ranged_system_domain" lineno="600">
+<interface name="init_ranged_system_domain" lineno="602">
<summary>
Create a domain for short running processes
which are started by init scripts.
@@ -116391,7 +117006,7 @@ Range for the domain.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="init_dyntrans" lineno="631">
+<interface name="init_dyntrans" lineno="633">
<summary>
Allow domain dyntransition to init_t domain.
</summary>
@@ -116401,7 +117016,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_daemon_pid_file" lineno="660">
+<interface name="init_daemon_pid_file" lineno="662">
<summary>
Mark the file type as a daemon pid file, allowing initrc_t
to create it (Deprecated)
@@ -116422,7 +117037,7 @@ Filename of the file that the init script creates
</summary>
</param>
</interface>
-<interface name="init_daemon_runtime_file" lineno="687">
+<interface name="init_daemon_runtime_file" lineno="689">
<summary>
Mark the file type as a daemon runtime file, allowing initrc_t
to create it
@@ -116443,7 +117058,7 @@ Filename of the file that the init script creates
</summary>
</param>
</interface>
-<interface name="init_daemon_lock_file" lineno="720">
+<interface name="init_daemon_lock_file" lineno="722">
<summary>
Mark the file type as a daemon lock file, allowing initrc_t
to create it
@@ -116464,7 +117079,7 @@ Filename of the file that the init script creates
</summary>
</param>
</interface>
-<interface name="init_domtrans" lineno="742">
+<interface name="init_domtrans" lineno="744">
<summary>
Execute init (/sbin/init) with a domain transition.
</summary>
@@ -116474,7 +117089,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_pgm_spec_user_daemon_domain" lineno="766">
+<interface name="init_pgm_spec_user_daemon_domain" lineno="768">
<summary>
Execute init (/sbin/init) with a domain transition
to the provided domain.
@@ -116490,7 +117105,7 @@ The type to be used as a systemd --user domain.
</summary>
</param>
</interface>
-<interface name="init_exec" lineno="794">
+<interface name="init_exec" lineno="796">
<summary>
Execute the init program in the caller domain.
</summary>
@@ -116501,7 +117116,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_pgm_entrypoint" lineno="815">
+<interface name="init_pgm_entrypoint" lineno="817">
<summary>
Allow the init program to be an entrypoint
for the specified domain.
@@ -116513,7 +117128,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_exec_rc" lineno="844">
+<interface name="init_exec_rc" lineno="846">
<summary>
Execute the rc application in the caller domain.
</summary>
@@ -116534,7 +117149,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getpgid" lineno="863">
+<interface name="init_getpgid" lineno="865">
<summary>
Get the process group of init.
</summary>
@@ -116544,7 +117159,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signal" lineno="881">
+<interface name="init_signal" lineno="883">
<summary>
Send init a generic signal.
</summary>
@@ -116554,7 +117169,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signull" lineno="899">
+<interface name="init_signull" lineno="901">
<summary>
Send init a null signal.
</summary>
@@ -116564,7 +117179,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_sigchld" lineno="917">
+<interface name="init_sigchld" lineno="919">
<summary>
Send init a SIGCHLD signal.
</summary>
@@ -116574,7 +117189,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_setsched" lineno="935">
+<interface name="init_setsched" lineno="937">
<summary>
Set the nice level of init.
</summary>
@@ -116584,7 +117199,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stream_connect" lineno="953">
+<interface name="init_stream_connect" lineno="955">
<summary>
Connect to init with a unix socket.
</summary>
@@ -116594,7 +117209,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_unix_stream_socket_connectto" lineno="974">
+<interface name="init_unix_stream_socket_connectto" lineno="976">
<summary>
Connect to init with a unix socket.
Without any additional permissions.
@@ -116605,7 +117220,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_fds" lineno="1032">
+<interface name="init_use_fds" lineno="1034">
<summary>
Inherit and use file descriptors from init.
</summary>
@@ -116655,7 +117270,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="1"/>
</interface>
-<interface name="init_dontaudit_use_fds" lineno="1051">
+<interface name="init_dontaudit_use_fds" lineno="1053">
<summary>
Do not audit attempts to inherit file
descriptors from init.
@@ -116666,7 +117281,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_dgram_send" lineno="1070">
+<interface name="init_dgram_send" lineno="1072">
<summary>
Send messages to init unix datagram sockets.
</summary>
@@ -116677,7 +117292,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_rw_inherited_stream_socket" lineno="1090">
+<interface name="init_rw_inherited_stream_socket" lineno="1092">
<summary>
Read and write to inherited init unix streams.
</summary>
@@ -116687,7 +117302,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_stream_sockets" lineno="1109">
+<interface name="init_rw_stream_sockets" lineno="1111">
<summary>
Allow the specified domain to read/write to
init with unix domain stream sockets.
@@ -116698,7 +117313,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_system" lineno="1127">
+<interface name="init_dontaudit_search_keys" lineno="1129">
+<summary>
+Do not audit attempts to search init keys.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_start_system" lineno="1147">
<summary>
start service (systemd).
</summary>
@@ -116708,7 +117333,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_system" lineno="1145">
+<interface name="init_stop_system" lineno="1165">
<summary>
stop service (systemd).
</summary>
@@ -116718,7 +117343,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_system_status" lineno="1163">
+<interface name="init_get_system_status" lineno="1183">
<summary>
Get all service status (systemd).
</summary>
@@ -116728,7 +117353,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_enable" lineno="1181">
+<interface name="init_enable" lineno="1201">
<summary>
Enable all systemd services (systemd).
</summary>
@@ -116738,7 +117363,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_disable" lineno="1199">
+<interface name="init_disable" lineno="1219">
<summary>
Disable all services (systemd).
</summary>
@@ -116748,7 +117373,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_reload" lineno="1217">
+<interface name="init_reload" lineno="1237">
<summary>
Reload all services (systemd).
</summary>
@@ -116758,7 +117383,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_reboot_system" lineno="1235">
+<interface name="init_reboot_system" lineno="1255">
<summary>
Reboot the system (systemd).
</summary>
@@ -116768,7 +117393,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_shutdown_system" lineno="1253">
+<interface name="init_shutdown_system" lineno="1273">
<summary>
Shutdown (halt) the system (systemd).
</summary>
@@ -116778,7 +117403,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_service_status" lineno="1271">
+<interface name="init_service_status" lineno="1291">
<summary>
Allow specified domain to get init status
</summary>
@@ -116788,7 +117413,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="init_service_start" lineno="1290">
+<interface name="init_service_start" lineno="1310">
<summary>
Allow specified domain to get init start
</summary>
@@ -116798,7 +117423,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="init_dbus_chat" lineno="1310">
+<interface name="init_dbus_chat" lineno="1330">
<summary>
Send and receive messages from
systemd over dbus.
@@ -116809,7 +117434,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_run_bpf" lineno="1330">
+<interface name="init_run_bpf" lineno="1350">
<summary>
Run init BPF programs.
</summary>
@@ -116819,7 +117444,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_var_lib_links" lineno="1349">
+<interface name="init_read_var_lib_links" lineno="1369">
<summary>
read/follow symlinks under /var/lib/systemd/
</summary>
@@ -116829,7 +117454,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_list_var_lib_dirs" lineno="1368">
+<interface name="init_search_var_lib_dirs" lineno="1388">
+<summary>
+Search /var/lib/systemd/ dirs
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_list_var_lib_dirs" lineno="1407">
<summary>
List /var/lib/systemd/ dir
</summary>
@@ -116839,7 +117474,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_relabel_var_lib_dirs" lineno="1386">
+<interface name="init_relabel_var_lib_dirs" lineno="1425">
<summary>
Relabel dirs in /var/lib/systemd/.
</summary>
@@ -116849,7 +117484,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_var_lib_files" lineno="1404">
+<interface name="init_manage_var_lib_files" lineno="1443">
<summary>
Manage files in /var/lib/systemd/.
</summary>
@@ -116859,7 +117494,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_var_lib_filetrans" lineno="1439">
+<interface name="init_var_lib_filetrans" lineno="1478">
<summary>
Create files in /var/lib/systemd
with an automatic type transition.
@@ -116885,7 +117520,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_search_pids" lineno="1458">
+<interface name="init_search_pids" lineno="1497">
<summary>
Allow search directory in the /run/systemd directory. (Deprecated)
</summary>
@@ -116895,7 +117530,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_list_pids" lineno="1473">
+<interface name="init_list_pids" lineno="1512">
<summary>
Allow listing of the /run/systemd directory. (Deprecated)
</summary>
@@ -116905,7 +117540,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_pid_symlinks" lineno="1488">
+<interface name="init_manage_pid_symlinks" lineno="1527">
<summary>
Create symbolic links in the /run/systemd directory. (Deprecated)
</summary>
@@ -116915,7 +117550,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_create_pid_files" lineno="1503">
+<interface name="init_create_pid_files" lineno="1542">
<summary>
Create files in the /run/systemd directory. (Deprecated)
</summary>
@@ -116925,7 +117560,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_write_pid_files" lineno="1518">
+<interface name="init_write_pid_files" lineno="1557">
<summary>
Write files in the /run/systemd directory. (Deprecated)
</summary>
@@ -116935,7 +117570,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_pid_dirs" lineno="1534">
+<interface name="init_manage_pid_dirs" lineno="1573">
<summary>
Create, read, write, and delete
directories in the /run/systemd directory. (Deprecated)
@@ -116946,7 +117581,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_pid_filetrans" lineno="1564">
+<interface name="init_pid_filetrans" lineno="1603">
<summary>
Create files in an init PID directory. (Deprecated)
</summary>
@@ -116971,7 +117606,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_search_runtime" lineno="1579">
+<interface name="init_search_runtime" lineno="1618">
<summary>
Search init runtime directories, e.g. /run/systemd.
</summary>
@@ -116981,7 +117616,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_list_runtime" lineno="1597">
+<interface name="init_list_runtime" lineno="1636">
<summary>
List init runtime directories, e.g. /run/systemd.
</summary>
@@ -116991,7 +117626,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_runtime_dirs" lineno="1617">
+<interface name="init_manage_runtime_dirs" lineno="1656">
<summary>
Create, read, write, and delete
directories in the /run/systemd directory.
@@ -117002,7 +117637,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_runtime_filetrans" lineno="1650">
+<interface name="init_runtime_filetrans" lineno="1689">
<summary>
Create files in an init runtime directory with a private type.
</summary>
@@ -117027,7 +117662,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_write_runtime_files" lineno="1669">
+<interface name="init_write_runtime_files" lineno="1708">
<summary>
Write init runtime files, e.g. in /run/systemd.
</summary>
@@ -117037,7 +117672,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_create_runtime_files" lineno="1687">
+<interface name="init_create_runtime_files" lineno="1726">
<summary>
Create init runtime files, e.g. in /run/systemd.
</summary>
@@ -117047,7 +117682,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_runtime_symlinks" lineno="1705">
+<interface name="init_manage_runtime_symlinks" lineno="1744">
<summary>
Create init runtime symbolic links, e.g. in /run/systemd.
</summary>
@@ -117057,7 +117692,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getattr_initctl" lineno="1723">
+<interface name="init_getattr_initctl" lineno="1762">
<summary>
Get the attributes of initctl.
</summary>
@@ -117067,7 +117702,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_getattr_initctl" lineno="1744">
+<interface name="init_dontaudit_getattr_initctl" lineno="1783">
<summary>
Do not audit attempts to get the
attributes of initctl.
@@ -117078,7 +117713,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_write_initctl" lineno="1762">
+<interface name="init_write_initctl" lineno="1801">
<summary>
Write to initctl.
</summary>
@@ -117088,7 +117723,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_telinit" lineno="1783">
+<interface name="init_telinit" lineno="1822">
<summary>
Use telinit (Read and write initctl).
</summary>
@@ -117099,7 +117734,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_rw_initctl" lineno="1816">
+<interface name="init_rw_initctl" lineno="1855">
<summary>
Read and write initctl.
</summary>
@@ -117109,7 +117744,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_rw_initctl" lineno="1837">
+<interface name="init_dontaudit_rw_initctl" lineno="1876">
<summary>
Do not audit attempts to read and
write initctl.
@@ -117120,7 +117755,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_script_file_entry_type" lineno="1856">
+<interface name="init_script_file_entry_type" lineno="1895">
<summary>
Make init scripts an entry point for
the specified domain.
@@ -117131,7 +117766,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_spec_domtrans_script" lineno="1879">
+<interface name="init_spec_domtrans_script" lineno="1918">
<summary>
Execute init scripts with a specified domain transition.
</summary>
@@ -117141,7 +117776,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_domtrans_script" lineno="1906">
+<interface name="init_domtrans_script" lineno="1945">
<summary>
Execute init scripts with an automatic domain transition.
</summary>
@@ -117151,7 +117786,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_domtrans_labeled_script" lineno="1941">
+<interface name="init_domtrans_labeled_script" lineno="1980">
<summary>
Execute labelled init scripts with an automatic domain transition.
</summary>
@@ -117161,7 +117796,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_script_file_domtrans" lineno="1987">
+<interface name="init_script_file_domtrans" lineno="2026">
<summary>
Execute a init script in a specified domain.
</summary>
@@ -117186,7 +117821,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="init_kill_scripts" lineno="2006">
+<interface name="init_kill_scripts" lineno="2045">
<summary>
Send a kill signal to init scripts.
</summary>
@@ -117196,7 +117831,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_script_service" lineno="2024">
+<interface name="init_manage_script_service" lineno="2063">
<summary>
Allow manage service for initrc_exec_t scripts
</summary>
@@ -117206,7 +117841,7 @@ Target domain
</summary>
</param>
</interface>
-<interface name="init_labeled_script_domtrans" lineno="2049">
+<interface name="init_labeled_script_domtrans" lineno="2088">
<summary>
Transition to the init script domain
on a specified labeled init script.
@@ -117222,7 +117857,7 @@ Labeled init script file.
</summary>
</param>
</interface>
-<interface name="init_all_labeled_script_domtrans" lineno="2071">
+<interface name="init_all_labeled_script_domtrans" lineno="2110">
<summary>
Transition to the init script domain
for all labeled init script types
@@ -117233,7 +117868,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_get_script_status" lineno="2089">
+<interface name="init_get_script_status" lineno="2128">
<summary>
Allow getting service status of initrc_exec_t scripts
</summary>
@@ -117243,7 +117878,7 @@ Target domain
</summary>
</param>
</interface>
-<interface name="init_startstop_service" lineno="2129">
+<interface name="init_startstop_service" lineno="2168">
<summary>
Allow the role to start and stop
labeled services.
@@ -117274,7 +117909,7 @@ Systemd unit file type.
</summary>
</param>
</interface>
-<interface name="init_run_daemon" lineno="2185">
+<interface name="init_run_daemon" lineno="2224">
<summary>
Start and stop daemon programs directly.
</summary>
@@ -117296,7 +117931,7 @@ The role to be performing this action.
</summary>
</param>
</interface>
-<interface name="init_startstop_all_script_services" lineno="2207">
+<interface name="init_startstop_all_script_services" lineno="2246">
<summary>
Start and stop init_script_file_type services
</summary>
@@ -117306,7 +117941,7 @@ domain that can start and stop the services
</summary>
</param>
</interface>
-<interface name="init_read_state" lineno="2226">
+<interface name="init_read_state" lineno="2265">
<summary>
Read the process state (/proc/pid) of init.
</summary>
@@ -117316,7 +117951,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_read_state" lineno="2246">
+<interface name="init_dontaudit_read_state" lineno="2285">
<summary>
Dontaudit read the process state (/proc/pid) of init.
</summary>
@@ -117326,7 +117961,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_ptrace" lineno="2267">
+<interface name="init_ptrace" lineno="2306">
<summary>
Ptrace init
</summary>
@@ -117337,7 +117972,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_getattr" lineno="2286">
+<interface name="init_getattr" lineno="2325">
<summary>
get init process stats
</summary>
@@ -117348,7 +117983,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_read_script_pipes" lineno="2304">
+<interface name="init_read_script_pipes" lineno="2343">
<summary>
Read an init script unnamed pipe.
</summary>
@@ -117358,7 +117993,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_write_script_pipes" lineno="2322">
+<interface name="init_write_script_pipes" lineno="2361">
<summary>
Write an init script unnamed pipe.
</summary>
@@ -117368,7 +118003,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getattr_script_files" lineno="2340">
+<interface name="init_getattr_script_files" lineno="2379">
<summary>
Get the attribute of init script entrypoint files.
</summary>
@@ -117378,7 +118013,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_files" lineno="2359">
+<interface name="init_read_script_files" lineno="2398">
<summary>
Read init scripts.
</summary>
@@ -117388,7 +118023,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_exec_script_files" lineno="2378">
+<interface name="init_exec_script_files" lineno="2417">
<summary>
Execute init scripts in the caller domain.
</summary>
@@ -117398,7 +118033,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getattr_all_script_files" lineno="2397">
+<interface name="init_getattr_all_script_files" lineno="2436">
<summary>
Get the attribute of all init script entrypoint files.
</summary>
@@ -117408,7 +118043,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_all_script_files" lineno="2416">
+<interface name="init_read_all_script_files" lineno="2455">
<summary>
Read all init script files.
</summary>
@@ -117418,7 +118053,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_read_all_script_files" lineno="2440">
+<interface name="init_dontaudit_read_all_script_files" lineno="2479">
<summary>
Dontaudit read all init script files.
</summary>
@@ -117428,7 +118063,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_exec_all_script_files" lineno="2458">
+<interface name="init_exec_all_script_files" lineno="2497">
<summary>
Execute all init scripts in the caller domain.
</summary>
@@ -117438,7 +118073,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_state" lineno="2477">
+<interface name="init_read_script_state" lineno="2516">
<summary>
Read the process state (/proc/pid) of the init scripts.
</summary>
@@ -117448,7 +118083,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_script_fds" lineno="2496">
+<interface name="init_use_script_fds" lineno="2535">
<summary>
Inherit and use init script file descriptors.
</summary>
@@ -117458,7 +118093,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_use_script_fds" lineno="2515">
+<interface name="init_dontaudit_use_script_fds" lineno="2554">
<summary>
Do not audit attempts to inherit
init script file descriptors.
@@ -117469,7 +118104,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_search_script_keys" lineno="2533">
+<interface name="init_search_script_keys" lineno="2572">
<summary>
Search init script keys.
</summary>
@@ -117479,7 +118114,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getpgid_script" lineno="2551">
+<interface name="init_getpgid_script" lineno="2590">
<summary>
Get the process group ID of init scripts.
</summary>
@@ -117489,7 +118124,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_sigchld_script" lineno="2569">
+<interface name="init_sigchld_script" lineno="2608">
<summary>
Send SIGCHLD signals to init scripts.
</summary>
@@ -117499,7 +118134,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signal_script" lineno="2587">
+<interface name="init_signal_script" lineno="2626">
<summary>
Send generic signals to init scripts.
</summary>
@@ -117509,7 +118144,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signull_script" lineno="2605">
+<interface name="init_signull_script" lineno="2644">
<summary>
Send null signals to init scripts.
</summary>
@@ -117519,7 +118154,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_script_pipes" lineno="2623">
+<interface name="init_rw_script_pipes" lineno="2662">
<summary>
Read and write init script unnamed pipes.
</summary>
@@ -117529,7 +118164,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stream_connect_script" lineno="2642">
+<interface name="init_stream_connect_script" lineno="2681">
<summary>
Allow the specified domain to connect to
init scripts with a unix socket.
@@ -117540,7 +118175,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_script_stream_sockets" lineno="2661">
+<interface name="init_rw_script_stream_sockets" lineno="2700">
<summary>
Allow the specified domain to read/write to
init scripts with a unix domain stream sockets.
@@ -117551,7 +118186,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_stream_connect_script" lineno="2680">
+<interface name="init_dontaudit_stream_connect_script" lineno="2719">
<summary>
Dont audit the specified domain connecting to
init scripts with a unix domain stream socket.
@@ -117562,7 +118197,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_dbus_send_script" lineno="2697">
+<interface name="init_dbus_send_script" lineno="2736">
<summary>
Send messages to init scripts over dbus.
</summary>
@@ -117572,7 +118207,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dbus_chat_script" lineno="2717">
+<interface name="init_dbus_chat_script" lineno="2756">
<summary>
Send and receive messages from
init scripts over dbus.
@@ -117583,7 +118218,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_script_ptys" lineno="2746">
+<interface name="init_use_script_ptys" lineno="2785">
<summary>
Read and write the init script pty.
</summary>
@@ -117602,7 +118237,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_inherited_script_ptys" lineno="2765">
+<interface name="init_use_inherited_script_ptys" lineno="2804">
<summary>
Read and write inherited init script ptys.
</summary>
@@ -117612,7 +118247,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_use_script_ptys" lineno="2787">
+<interface name="init_dontaudit_use_script_ptys" lineno="2826">
<summary>
Do not audit attempts to read and
write the init script pty.
@@ -117623,7 +118258,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_getattr_script_status_files" lineno="2806">
+<interface name="init_getattr_script_status_files" lineno="2845">
<summary>
Get the attributes of init script
status files.
@@ -117634,7 +118269,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_read_script_status_files" lineno="2825">
+<interface name="init_dontaudit_read_script_status_files" lineno="2864">
<summary>
Do not audit attempts to read init script
status files.
@@ -117645,7 +118280,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_search_run" lineno="2844">
+<interface name="init_search_run" lineno="2883">
<summary>
Search the /run/systemd directory.
</summary>
@@ -117655,7 +118290,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_tmp_files" lineno="2863">
+<interface name="init_read_script_tmp_files" lineno="2902">
<summary>
Read init script temporary data.
</summary>
@@ -117665,7 +118300,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_inherited_script_tmp_files" lineno="2882">
+<interface name="init_rw_inherited_script_tmp_files" lineno="2921">
<summary>
Read and write init script inherited temporary data.
</summary>
@@ -117675,7 +118310,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_script_tmp_files" lineno="2900">
+<interface name="init_rw_script_tmp_files" lineno="2939">
<summary>
Read and write init script temporary data.
</summary>
@@ -117685,7 +118320,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_script_tmp_filetrans" lineno="2935">
+<interface name="init_script_tmp_filetrans" lineno="2974">
<summary>
Create files in a init script
temporary data directory.
@@ -117711,7 +118346,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_getattr_utmp" lineno="2954">
+<interface name="init_getattr_utmp" lineno="2993">
<summary>
Get the attributes of init script process id files.
</summary>
@@ -117721,7 +118356,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_utmp" lineno="2972">
+<interface name="init_read_utmp" lineno="3011">
<summary>
Read utmp.
</summary>
@@ -117731,7 +118366,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_write_utmp" lineno="2991">
+<interface name="init_dontaudit_write_utmp" lineno="3030">
<summary>
Do not audit attempts to write utmp.
</summary>
@@ -117741,7 +118376,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_write_utmp" lineno="3009">
+<interface name="init_write_utmp" lineno="3048">
<summary>
Write to utmp.
</summary>
@@ -117751,7 +118386,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_lock_utmp" lineno="3029">
+<interface name="init_dontaudit_lock_utmp" lineno="3068">
<summary>
Do not audit attempts to lock
init script pid files.
@@ -117762,7 +118397,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_rw_utmp" lineno="3047">
+<interface name="init_rw_utmp" lineno="3086">
<summary>
Read and write utmp.
</summary>
@@ -117772,7 +118407,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_rw_utmp" lineno="3066">
+<interface name="init_dontaudit_rw_utmp" lineno="3105">
<summary>
Do not audit attempts to read and write utmp.
</summary>
@@ -117782,7 +118417,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_manage_utmp" lineno="3084">
+<interface name="init_manage_utmp" lineno="3123">
<summary>
Create, read, write, and delete utmp.
</summary>
@@ -117792,7 +118427,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_watch_utmp" lineno="3103">
+<interface name="init_watch_utmp" lineno="3142">
<summary>
Add a watch on utmp.
</summary>
@@ -117802,7 +118437,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_relabel_utmp" lineno="3121">
+<interface name="init_relabel_utmp" lineno="3160">
<summary>
Relabel utmp.
</summary>
@@ -117812,7 +118447,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_runtime_filetrans_utmp" lineno="3140">
+<interface name="init_runtime_filetrans_utmp" lineno="3179">
<summary>
Create files in /var/run with the
utmp file type.
@@ -117823,7 +118458,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_create_runtime_dirs" lineno="3158">
+<interface name="init_create_runtime_dirs" lineno="3197">
<summary>
Create a directory in the /run/systemd directory.
</summary>
@@ -117833,7 +118468,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_runtime_files" lineno="3177">
+<interface name="init_read_runtime_files" lineno="3216">
<summary>
Read init_runtime_t files
</summary>
@@ -117843,7 +118478,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_rename_runtime_files" lineno="3195">
+<interface name="init_rename_runtime_files" lineno="3234">
<summary>
Rename init_runtime_t files
</summary>
@@ -117853,7 +118488,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_setattr_runtime_files" lineno="3213">
+<interface name="init_setattr_runtime_files" lineno="3252">
<summary>
Setattr init_runtime_t files
</summary>
@@ -117863,7 +118498,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_delete_runtime_files" lineno="3231">
+<interface name="init_delete_runtime_files" lineno="3270">
<summary>
Delete init_runtime_t files
</summary>
@@ -117873,7 +118508,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_write_runtime_socket" lineno="3250">
+<interface name="init_write_runtime_socket" lineno="3289">
<summary>
Allow the specified domain to write to
init sock file.
@@ -117884,7 +118519,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_runtime_pipes" lineno="3268">
+<interface name="init_read_runtime_pipes" lineno="3307">
<summary>
Read init unnamed pipes.
</summary>
@@ -117894,7 +118529,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_runtime_symlinks" lineno="3286">
+<interface name="init_read_runtime_symlinks" lineno="3325">
<summary>
read systemd unit symlinks (usually under /run/systemd/units/)
</summary>
@@ -117904,7 +118539,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_tcp_recvfrom_all_daemons" lineno="3304">
+<interface name="init_tcp_recvfrom_all_daemons" lineno="3343">
<summary>
Allow the specified domain to connect to daemon with a tcp socket
</summary>
@@ -117914,7 +118549,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_udp_recvfrom_all_daemons" lineno="3322">
+<interface name="init_udp_recvfrom_all_daemons" lineno="3361">
<summary>
Allow the specified domain to connect to daemon with a udp socket
</summary>
@@ -117924,7 +118559,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_status_files" lineno="3341">
+<interface name="init_read_script_status_files" lineno="3380">
<summary>
Allow reading the init script state files
</summary>
@@ -117934,7 +118569,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="init_relabelto_script_state" lineno="3359">
+<interface name="init_relabelto_script_state" lineno="3398">
<summary>
Label to init script status files
</summary>
@@ -117944,7 +118579,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="init_script_readable_type" lineno="3378">
+<interface name="init_script_readable_type" lineno="3417">
<summary>
Mark as a readable type for the initrc_t domain
</summary>
@@ -117954,7 +118589,7 @@ Type that initrc_t needs read access to
</summary>
</param>
</interface>
-<interface name="init_search_units" lineno="3396">
+<interface name="init_search_units" lineno="3435">
<summary>
Search systemd unit dirs.
</summary>
@@ -117964,7 +118599,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_list_unit_dirs" lineno="3421">
+<interface name="init_list_unit_dirs" lineno="3460">
<summary>
List systemd unit dirs.
</summary>
@@ -117974,7 +118609,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_generic_units_files" lineno="3441">
+<interface name="init_getattr_generic_units_files" lineno="3480">
+<summary>
+Get the attributes of systemd unit files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_read_generic_units_files" lineno="3498">
<summary>
Read systemd unit files
</summary>
@@ -117984,7 +118629,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_generic_units_symlinks" lineno="3459">
+<interface name="init_read_generic_units_symlinks" lineno="3516">
<summary>
Read systemd unit links
</summary>
@@ -117994,7 +118639,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_generic_units_status" lineno="3477">
+<interface name="init_get_generic_units_status" lineno="3534">
<summary>
Get status of generic systemd units.
</summary>
@@ -118004,7 +118649,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_generic_units" lineno="3496">
+<interface name="init_start_generic_units" lineno="3553">
<summary>
Start generic systemd units.
</summary>
@@ -118014,7 +118659,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_generic_units" lineno="3515">
+<interface name="init_stop_generic_units" lineno="3572">
<summary>
Stop generic systemd units.
</summary>
@@ -118024,7 +118669,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_reload_generic_units" lineno="3534">
+<interface name="init_reload_generic_units" lineno="3591">
<summary>
Reload generic systemd units.
</summary>
@@ -118034,7 +118679,47 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_all_units_status" lineno="3553">
+<interface name="init_get_transient_units_status" lineno="3610">
+<summary>
+Get status of transient systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_start_transient_units" lineno="3629">
+<summary>
+Start transient systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_stop_transient_units" lineno="3648">
+<summary>
+Stop transient systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="init_reload_transient_units" lineno="3667">
+<summary>
+Reload transient systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_get_all_units_status" lineno="3687">
<summary>
Get status of all systemd units.
</summary>
@@ -118044,7 +118729,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_all_units" lineno="3572">
+<interface name="init_manage_all_units" lineno="3706">
<summary>
All perms on all systemd units.
</summary>
@@ -118054,7 +118739,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_all_units" lineno="3592">
+<interface name="init_start_all_units" lineno="3726">
<summary>
Start all systemd units.
</summary>
@@ -118064,7 +118749,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_all_units" lineno="3611">
+<interface name="init_stop_all_units" lineno="3745">
<summary>
Stop all systemd units.
</summary>
@@ -118074,7 +118759,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_reload_all_units" lineno="3630">
+<interface name="init_reload_all_units" lineno="3764">
<summary>
Reload all systemd units.
</summary>
@@ -118084,7 +118769,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_all_unit_files" lineno="3649">
+<interface name="init_manage_all_unit_files" lineno="3783">
<summary>
Manage systemd unit dirs and the files in them
</summary>
@@ -118094,7 +118779,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_linkable_keyring" lineno="3670">
+<interface name="init_linkable_keyring" lineno="3804">
<summary>
Associate the specified domain to be a domain whose
keyring init should be allowed to link.
@@ -118105,7 +118790,7 @@ Domain whose keyring init should be allowed to link.
</summary>
</param>
</interface>
-<interface name="init_admin" lineno="3688">
+<interface name="init_admin" lineno="3822">
<summary>
Allow unconfined access to send instructions to init
</summary>
@@ -118115,7 +118800,7 @@ Target domain
</summary>
</param>
</interface>
-<interface name="init_getrlimit" lineno="3720">
+<interface name="init_getrlimit" lineno="3854">
<summary>
Allow getting init_t rlimit
</summary>
@@ -118412,7 +119097,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="iptables_run" lineno="43">
+<interface name="iptables_run" lineno="41">
<summary>
Execute iptables in the iptables domain, and
allow the specified role the iptables domain.
@@ -118429,7 +119114,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="iptables_exec" lineno="62">
+<interface name="iptables_exec" lineno="60">
<summary>
Execute iptables in the caller domain.
</summary>
@@ -118439,7 +119124,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_initrc_domtrans" lineno="82">
+<interface name="iptables_initrc_domtrans" lineno="80">
<summary>
Execute iptables init scripts in
the init script domain.
@@ -118450,7 +119135,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="iptables_setattr_config" lineno="100">
+<interface name="iptables_setattr_config" lineno="98">
<summary>
Set the attributes of iptables config files.
</summary>
@@ -118460,7 +119145,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_read_config" lineno="119">
+<interface name="iptables_read_config" lineno="117">
<summary>
Read iptables config files.
</summary>
@@ -118470,7 +119155,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_etc_filetrans_config" lineno="140">
+<interface name="iptables_etc_filetrans_config" lineno="138">
<summary>
Create files in /etc with the type used for
the iptables config files.
@@ -118481,7 +119166,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_manage_config" lineno="158">
+<interface name="iptables_manage_config" lineno="156">
<summary>
Manage iptables config files.
</summary>
@@ -118491,7 +119176,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_dontaudit_read_pids" lineno="177">
+<interface name="iptables_dontaudit_read_pids" lineno="175">
<summary>
dontaudit reading iptables_runtime_t (Deprecated)
</summary>
@@ -118501,7 +119186,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="iptables_dontaudit_read_runtime_files" lineno="192">
+<interface name="iptables_dontaudit_read_runtime_files" lineno="190">
<summary>
Do not audit reading iptables runtime files.
</summary>
@@ -118511,7 +119196,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="iptables_startstop" lineno="210">
+<interface name="iptables_startstop" lineno="208">
<summary>
Allow specified domain to start and stop iptables service
</summary>
@@ -118521,7 +119206,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_status" lineno="229">
+<interface name="iptables_status" lineno="227">
<summary>
Allow specified domain to get status of iptables service
</summary>
@@ -118531,7 +119216,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_admin" lineno="256">
+<interface name="iptables_admin" lineno="254">
<summary>
All of the rules required to
administrate an iptables
@@ -118743,7 +119428,24 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="libs_manage_lib_dirs" lineno="246">
+<interface name="libs_dontaudit_manage_lib_dirs" lineno="253">
+<summary>
+Do not audit attempts to manage to library directories.
+</summary>
+<desc>
+<p>
+Do not audit attempts to manage to library directories.
+Typically this is used to quiet attempts to recompile
+python byte code.
+</p>
+</desc>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="libs_manage_lib_dirs" lineno="271">
<summary>
Create, read, write, and delete library directories.
</summary>
@@ -118753,7 +119455,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_dontaudit_setattr_lib_files" lineno="264">
+<interface name="libs_dontaudit_setattr_lib_files" lineno="289">
<summary>
dontaudit attempts to setattr on library files
</summary>
@@ -118763,7 +119465,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="libs_read_lib_files" lineno="283">
+<interface name="libs_read_lib_files" lineno="308">
<summary>
Read files in the library directories, such
as static libraries.
@@ -118774,7 +119476,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_exec_lib_files" lineno="304">
+<interface name="libs_exec_lib_files" lineno="329">
<summary>
Execute library scripts in the caller domain.
</summary>
@@ -118784,7 +119486,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_manage_lib_files" lineno="327">
+<interface name="libs_manage_lib_files" lineno="352">
<summary>
Create, read, write, and delete generic
files in library directories.
@@ -118795,7 +119497,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_relabelto_lib_files" lineno="345">
+<interface name="libs_dontaudit_manage_lib_files" lineno="371">
+<summary>
+Do not audit attempts to create, read, write,
+and delete generic files in library directories.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="libs_relabelto_lib_files" lineno="389">
<summary>
Relabel files to the type used in library directories.
</summary>
@@ -118805,7 +119518,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_relabel_lib_files" lineno="365">
+<interface name="libs_relabel_lib_files" lineno="409">
<summary>
Relabel to and from the type used
for generic lib files.
@@ -118816,7 +119529,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_delete_lib_symlinks" lineno="384">
+<interface name="libs_delete_lib_symlinks" lineno="428">
<summary>
Delete generic symlinks in library directories.
</summary>
@@ -118826,7 +119539,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_manage_lib_symlinks" lineno="402">
+<interface name="libs_manage_lib_symlinks" lineno="446">
<summary>
Manage generic symlinks in library directories.
</summary>
@@ -118836,7 +119549,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_manage_shared_libs" lineno="421">
+<interface name="libs_manage_shared_libs" lineno="465">
<summary>
Create, read, write, and delete shared libraries.
</summary>
@@ -118846,7 +119559,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_use_shared_libs" lineno="439">
+<interface name="libs_use_shared_libs" lineno="483">
<summary>
Load and execute functions from shared libraries.
</summary>
@@ -118856,7 +119569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_legacy_use_shared_libs" lineno="462">
+<interface name="libs_legacy_use_shared_libs" lineno="506">
<summary>
Load and execute functions from shared libraries,
with legacy support.
@@ -118867,7 +119580,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_relabel_shared_libs" lineno="483">
+<interface name="libs_relabel_shared_libs" lineno="527">
<summary>
Relabel to and from the type used for
shared libraries.
@@ -118878,7 +119591,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="516">
+<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="560">
<summary>
Create an object in etc with a type transition to
the ld_so_cache_t type
@@ -118901,7 +119614,7 @@ Name of the resource created for which a type transition occurs
</summary>
</param>
</interface>
-<interface name="libs_lib_filetrans" lineno="550">
+<interface name="libs_lib_filetrans" lineno="594">
<summary>
Create an object in the generic lib location with a type transition
to the provided type
@@ -118927,7 +119640,7 @@ Name of the resource created for which a type transition should occur
</summary>
</param>
</interface>
-<interface name="libs_relabel_lib_dirs" lineno="571">
+<interface name="libs_relabel_lib_dirs" lineno="615">
<summary>
Relabel to and from the type used
for generic lib directories.
@@ -122118,7 +122831,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_domtrans_ifconfig" lineno="627">
+<interface name="sysnet_manage_dhcpc_runtime_files" lineno="627">
+<summary>
+Create, read, write, and delete dhcp client runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sysnet_domtrans_ifconfig" lineno="645">
<summary>
Execute ifconfig in the ifconfig domain.
</summary>
@@ -122128,7 +122851,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="sysnet_run_ifconfig" lineno="654">
+<interface name="sysnet_run_ifconfig" lineno="672">
<summary>
Execute ifconfig in the ifconfig domain, and
allow the specified role the ifconfig domain,
@@ -122146,7 +122869,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_exec_ifconfig" lineno="674">
+<interface name="sysnet_exec_ifconfig" lineno="692">
<summary>
Execute ifconfig in the caller domain.
</summary>
@@ -122156,7 +122879,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_signal_ifconfig" lineno="694">
+<interface name="sysnet_signal_ifconfig" lineno="712">
<summary>
Send a generic signal to ifconfig.
</summary>
@@ -122167,7 +122890,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_signull_ifconfig" lineno="713">
+<interface name="sysnet_signull_ifconfig" lineno="731">
<summary>
Send null signals to ifconfig.
</summary>
@@ -122178,7 +122901,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_create_netns_dirs" lineno="732">
+<interface name="sysnet_create_netns_dirs" lineno="750">
<summary>
Create the /run/netns directory with
an automatic type transition.
@@ -122189,7 +122912,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_netns_filetrans" lineno="766">
+<interface name="sysnet_netns_filetrans" lineno="784">
<summary>
Create an object in the /run/netns
directory with a private type.
@@ -122215,7 +122938,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="sysnet_read_dhcp_config" lineno="787">
+<interface name="sysnet_read_dhcp_config" lineno="805">
<summary>
Read the DHCP configuration files.
</summary>
@@ -122225,7 +122948,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_search_dhcp_state" lineno="807">
+<interface name="sysnet_search_dhcp_state" lineno="825">
<summary>
Search the DHCP state data directory.
</summary>
@@ -122235,7 +122958,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_dhcp_state_filetrans" lineno="851">
+<interface name="sysnet_dhcp_state_filetrans" lineno="869">
<summary>
Create DHCP state data.
</summary>
@@ -122270,7 +122993,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="sysnet_dns_name_resolve" lineno="871">
+<interface name="sysnet_dns_name_resolve" lineno="889">
<summary>
Perform a DNS name resolution.
</summary>
@@ -122281,7 +123004,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_use_ldap" lineno="921">
+<interface name="sysnet_use_ldap" lineno="940">
<summary>
Connect and use a LDAP server.
</summary>
@@ -122291,7 +123014,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_use_portmap" lineno="948">
+<interface name="sysnet_use_portmap" lineno="967">
<summary>
Connect and use remote port mappers.
</summary>
@@ -122301,7 +123024,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_dhcpc_script_entry" lineno="982">
+<interface name="sysnet_dhcpc_script_entry" lineno="1001">
<summary>
Make the specified program domain
accessable from the DHCP hooks/scripts.
@@ -122353,7 +123076,7 @@ The type for the user pty
</summary>
</param>
</template>
-<template name="systemd_user_daemon_domain" lineno="205">
+<template name="systemd_user_daemon_domain" lineno="221">
<summary>
Allow the specified domain to be started as a daemon by the
specified systemd user instance.
@@ -122374,7 +123097,7 @@ Domain to allow the systemd user domain to run.
</summary>
</param>
</template>
-<interface name="systemd_user_activated_sock_file" lineno="226">
+<interface name="systemd_user_activated_sock_file" lineno="242">
<summary>
Associate the specified file type to be a type whose sock files
can be managed by systemd user instances for socket activation.
@@ -122385,7 +123108,7 @@ File type to be associated.
</summary>
</param>
</interface>
-<interface name="systemd_user_unix_stream_activated_socket" lineno="251">
+<interface name="systemd_user_unix_stream_activated_socket" lineno="267">
<summary>
Associate the specified domain to be a domain whose unix stream
sockets and sock files can be managed by systemd user instances
@@ -122402,7 +123125,7 @@ File type of the domain's sock files to be associated.
</summary>
</param>
</interface>
-<template name="systemd_user_send_systemd_notify" lineno="277">
+<template name="systemd_user_send_systemd_notify" lineno="293">
<summary>
Allow the target domain the permissions necessary
to use systemd notify when started by the specified
@@ -122419,7 +123142,7 @@ Domain to be allowed systemd notify permissions.
</summary>
</param>
</template>
-<template name="systemd_user_app_status" lineno="305">
+<template name="systemd_user_app_status" lineno="321">
<summary>
Allow the target domain to be monitored and have its output
captured by the specified systemd user instance domain.
@@ -122435,7 +123158,7 @@ Domain to allow the systemd user instance to monitor.
</summary>
</param>
</template>
-<template name="systemd_read_user_manager_state" lineno="345">
+<template name="systemd_read_user_manager_state" lineno="361">
<summary>
Read the process state (/proc/pid) of
the specified systemd user instance.
@@ -122451,7 +123174,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<template name="systemd_user_manager_system_start" lineno="369">
+<template name="systemd_user_manager_system_start" lineno="385">
<summary>
Send a start request to the specified
systemd user instance system object.
@@ -122467,7 +123190,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<template name="systemd_user_manager_system_stop" lineno="393">
+<template name="systemd_user_manager_system_stop" lineno="409">
<summary>
Send a stop request to the specified
systemd user instance system object.
@@ -122483,7 +123206,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<template name="systemd_user_manager_system_status" lineno="417">
+<template name="systemd_user_manager_system_status" lineno="433">
<summary>
Get the status of the specified
systemd user instance system object.
@@ -122499,7 +123222,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<template name="systemd_user_manager_dbus_chat" lineno="441">
+<template name="systemd_user_manager_dbus_chat" lineno="457">
<summary>
Send and receive messages from the
specified systemd user instance over dbus.
@@ -122515,7 +123238,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<interface name="systemd_search_conf_home_content" lineno="462">
+<interface name="systemd_search_conf_home_content" lineno="478">
<summary>
Allow the specified domain to search systemd config home
content.
@@ -122526,7 +123249,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_conf_home_content" lineno="481">
+<interface name="systemd_manage_conf_home_content" lineno="497">
<summary>
Allow the specified domain to manage systemd config home
content.
@@ -122537,7 +123260,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabel_conf_home_content" lineno="502">
+<interface name="systemd_relabel_conf_home_content" lineno="518">
<summary>
Allow the specified domain to relabel systemd config home
content.
@@ -122548,7 +123271,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_search_data_home_content" lineno="523">
+<interface name="systemd_search_data_home_content" lineno="539">
<summary>
Allow the specified domain to search systemd data home
content.
@@ -122559,7 +123282,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_data_home_content" lineno="542">
+<interface name="systemd_manage_data_home_content" lineno="558">
<summary>
Allow the specified domain to manage systemd data home
content.
@@ -122570,7 +123293,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabel_data_home_content" lineno="563">
+<interface name="systemd_relabel_data_home_content" lineno="579">
<summary>
Allow the specified domain to relabel systemd data home
content.
@@ -122581,7 +123304,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_search_user_runtime" lineno="584">
+<interface name="systemd_search_user_runtime" lineno="600">
<summary>
Allow the specified domain to search systemd user runtime
content.
@@ -122592,7 +123315,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_runtime_files" lineno="602">
+<interface name="systemd_read_user_runtime_files" lineno="618">
<summary>
Allow the specified domain to read systemd user runtime files.
</summary>
@@ -122602,7 +123325,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_runtime_lnk_files" lineno="620">
+<interface name="systemd_read_user_runtime_lnk_files" lineno="636">
<summary>
Allow the specified domain to read systemd user runtime lnk files.
</summary>
@@ -122612,7 +123335,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_user_runtime_socket" lineno="639">
+<interface name="systemd_write_user_runtime_socket" lineno="655">
<summary>
Allow the specified domain to write to
the systemd user runtime named socket.
@@ -122623,7 +123346,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_unit_files" lineno="658">
+<interface name="systemd_read_user_unit_files" lineno="674">
+<summary>
+Allow the specified domain to read system-wide systemd
+user unit files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_read_user_units_files" lineno="690">
<summary>
Allow the specified domain to read system-wide systemd
user unit files.
@@ -122634,7 +123368,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_runtime_units" lineno="678">
+<interface name="systemd_read_user_runtime_units" lineno="710">
+<summary>
+Allow the specified domain to read systemd user runtime unit files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_read_user_runtime_units_files" lineno="725">
<summary>
Allow the specified domain to read systemd user runtime unit files.
</summary>
@@ -122644,7 +123388,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_search_user_runtime_unit_dirs" lineno="698">
+<interface name="systemd_search_user_runtime_unit_dirs" lineno="745">
<summary>
Allow the specified domain to search systemd user runtime unit
directories.
@@ -122655,7 +123399,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_list_user_runtime_unit_dirs" lineno="717">
+<interface name="systemd_list_user_runtime_unit_dirs" lineno="764">
<summary>
Allow the specified domain to list the contents of systemd
user runtime unit directories.
@@ -122666,7 +123410,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_status_user_runtime_units" lineno="735">
+<interface name="systemd_status_user_runtime_units" lineno="782">
+<summary>
+Allow the specified domain to get the status of systemd user runtime units. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_get_user_runtime_units_status" lineno="797">
<summary>
Allow the specified domain to get the status of systemd user runtime units.
</summary>
@@ -122676,7 +123430,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_start_user_runtime_units" lineno="754">
+<interface name="systemd_start_user_runtime_units" lineno="816">
<summary>
Allow the specified domain to start systemd user runtime units.
</summary>
@@ -122686,7 +123440,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_stop_user_runtime_units" lineno="773">
+<interface name="systemd_stop_user_runtime_units" lineno="835">
<summary>
Allow the specified domain to stop systemd user runtime units.
</summary>
@@ -122696,7 +123450,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_reload_user_runtime_units" lineno="792">
+<interface name="systemd_reload_user_runtime_units" lineno="854">
<summary>
Allow the specified domain to reload systemd user runtime units.
</summary>
@@ -122706,7 +123460,79 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_log_parse_environment" lineno="812">
+<interface name="systemd_read_user_transient_units_files" lineno="873">
+<summary>
+Allow the specified domain to read systemd user transient unit files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_search_user_transient_unit_dirs" lineno="893">
+<summary>
+Allow the specified domain to search systemd user transient unit
+directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_list_user_transient_unit_dirs" lineno="912">
+<summary>
+Allow the specified domain to list the contents of systemd
+user transient unit directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_get_user_transient_units_status" lineno="930">
+<summary>
+Allow the specified domain to get the status of systemd user transient units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_start_user_transient_units" lineno="949">
+<summary>
+Allow the specified domain to start systemd user transient units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_stop_user_transient_units" lineno="968">
+<summary>
+Allow the specified domain to stop systemd user transient units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_reload_user_transient_units" lineno="987">
+<summary>
+Allow the specified domain to reload systemd user transient units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_log_parse_environment" lineno="1007">
<summary>
Make the specified type usable as an
log parse environment type.
@@ -122717,7 +123543,7 @@ Type to be used as a log parse environment type.
</summary>
</param>
</interface>
-<interface name="systemd_use_nss" lineno="832">
+<interface name="systemd_use_nss" lineno="1027">
<summary>
Allow domain to use systemd's Name Service Switch (NSS) module.
This module provides UNIX user and group name resolution for dynamic users
@@ -122729,7 +123555,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_PrivateDevices" lineno="859">
+<interface name="systemd_PrivateDevices" lineno="1054">
<summary>
Allow domain to be used as a systemd service with a unit
that uses PrivateDevices=yes in section [Service].
@@ -122740,7 +123566,17 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_read_hwdb" lineno="876">
+<interface name="systemd_rw_homework_semaphores" lineno="1071">
+<summary>
+Read and write systemd-homework semaphores.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access
+</summary>
+</param>
+</interface>
+<interface name="systemd_read_hwdb" lineno="1089">
<summary>
Allow domain to read udev hwdb file
</summary>
@@ -122750,7 +123586,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_map_hwdb" lineno="894">
+<interface name="systemd_map_hwdb" lineno="1107">
<summary>
Allow domain to map udev hwdb file
</summary>
@@ -122760,7 +123596,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_pids" lineno="912">
+<interface name="systemd_read_logind_pids" lineno="1125">
<summary>
Read systemd_login PID files. (Deprecated)
</summary>
@@ -122770,7 +123606,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_logind_pid_pipes" lineno="927">
+<interface name="systemd_manage_logind_pid_pipes" lineno="1140">
<summary>
Manage systemd_login PID pipes. (Deprecated)
</summary>
@@ -122780,7 +123616,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_logind_pid_pipes" lineno="942">
+<interface name="systemd_write_logind_pid_pipes" lineno="1155">
<summary>
Write systemd_login named pipe. (Deprecated)
</summary>
@@ -122790,7 +123626,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_watch_logind_runtime_dirs" lineno="957">
+<interface name="systemd_watch_logind_runtime_dirs" lineno="1170">
<summary>
Watch systemd-logind runtime dirs.
</summary>
@@ -122800,7 +123636,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_runtime_files" lineno="976">
+<interface name="systemd_read_logind_runtime_files" lineno="1189">
<summary>
Read systemd-logind runtime files.
</summary>
@@ -122810,7 +123646,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_logind_runtime_pipes" lineno="996">
+<interface name="systemd_manage_logind_runtime_pipes" lineno="1209">
<summary>
Manage systemd-logind runtime pipes.
</summary>
@@ -122820,7 +123656,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_logind_runtime_pipes" lineno="1015">
+<interface name="systemd_write_logind_runtime_pipes" lineno="1228">
<summary>
Write systemd-logind runtime named pipe.
</summary>
@@ -122830,7 +123666,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_use_logind_fds" lineno="1036">
+<interface name="systemd_use_logind_fds" lineno="1249">
<summary>
Use inherited systemd
logind file descriptors.
@@ -122841,7 +123677,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_watch_logind_sessions_dirs" lineno="1054">
+<interface name="systemd_watch_logind_sessions_dirs" lineno="1267">
<summary>
Watch logind sessions dirs.
</summary>
@@ -122851,7 +123687,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_sessions_files" lineno="1073">
+<interface name="systemd_read_logind_sessions_files" lineno="1286">
<summary>
Read logind sessions files.
</summary>
@@ -122861,7 +123697,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1094">
+<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1307">
<summary>
Write inherited logind sessions pipes.
</summary>
@@ -122871,7 +123707,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1114">
+<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1327">
<summary>
Write inherited logind inhibit pipes.
</summary>
@@ -122881,7 +123717,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_logind" lineno="1135">
+<interface name="systemd_dbus_chat_logind" lineno="1348">
<summary>
Send and receive messages from
systemd logind over dbus.
@@ -122892,7 +123728,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_status_logind" lineno="1155">
+<interface name="systemd_status_logind" lineno="1368">
<summary>
Get the system status information from systemd_login
</summary>
@@ -122902,7 +123738,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_signull_logind" lineno="1174">
+<interface name="systemd_signull_logind" lineno="1387">
<summary>
Send systemd_login a null signal.
</summary>
@@ -122912,7 +123748,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_userdb_runtime_dirs" lineno="1192">
+<interface name="systemd_manage_userdb_runtime_dirs" lineno="1405">
<summary>
Manage systemd userdb runtime directories.
</summary>
@@ -122922,7 +123758,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1210">
+<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1423">
<summary>
Manage socket files under /run/systemd/userdb .
</summary>
@@ -122932,7 +123768,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_stream_connect_userdb" lineno="1228">
+<interface name="systemd_stream_connect_userdb" lineno="1441">
<summary>
Connect to /run/systemd/userdb/io.systemd.DynamicUser .
</summary>
@@ -122942,7 +123778,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_machines" lineno="1249">
+<interface name="systemd_read_machines" lineno="1463">
<summary>
Allow reading /run/systemd/machines
</summary>
@@ -122952,7 +123788,7 @@ Domain that can access the machines files
</summary>
</param>
</interface>
-<interface name="systemd_connect_machined" lineno="1268">
+<interface name="systemd_connect_machined" lineno="1482">
<summary>
Allow connecting to /run/systemd/userdb/io.systemd.Machine socket
</summary>
@@ -122962,7 +123798,7 @@ Domain that can access the socket
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_machined" lineno="1287">
+<interface name="systemd_dbus_chat_machined" lineno="1501">
<summary>
Send and receive messages from
systemd machined over dbus.
@@ -122973,7 +123809,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_hostnamed" lineno="1308">
+<interface name="systemd_dbus_chat_hostnamed" lineno="1522">
<summary>
Send and receive messages from
systemd hostnamed over dbus.
@@ -122984,7 +123820,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_use_passwd_agent_fds" lineno="1328">
+<interface name="systemd_use_passwd_agent_fds" lineno="1542">
<summary>
allow systemd_passwd_agent to inherit fds
</summary>
@@ -122994,7 +123830,7 @@ Domain that owns the fds
</summary>
</param>
</interface>
-<interface name="systemd_run_passwd_agent" lineno="1351">
+<interface name="systemd_run_passwd_agent" lineno="1565">
<summary>
allow systemd_passwd_agent to be run by admin
</summary>
@@ -123009,7 +123845,7 @@ role that it runs in
</summary>
</param>
</interface>
-<interface name="systemd_use_passwd_agent" lineno="1372">
+<interface name="systemd_use_passwd_agent" lineno="1586">
<summary>
Allow a systemd_passwd_agent_t process to interact with a daemon
that needs a password from the sysadmin.
@@ -123020,7 +123856,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1396">
+<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1610">
<summary>
Transition to systemd_passwd_runtime_t when creating dirs
</summary>
@@ -123030,9 +123866,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1417">
+<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1631">
<summary>
-Transition to systemd_userdb_runtime_t when
+Transition to systemd_userdbd_runtime_t when
creating the userdb directory inside an init runtime
directory.
</summary>
@@ -123042,7 +123878,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1435">
+<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1649">
<summary>
Allow to domain to create systemd-passwd symlink
</summary>
@@ -123052,7 +123888,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_watch_passwd_runtime_dirs" lineno="1453">
+<interface name="systemd_watch_passwd_runtime_dirs" lineno="1667">
<summary>
Allow a domain to watch systemd-passwd runtime dirs.
</summary>
@@ -123062,7 +123898,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_all_units" lineno="1471">
+<interface name="systemd_manage_all_units" lineno="1685">
<summary>
manage systemd unit dirs and the files in them (Deprecated)
</summary>
@@ -123072,7 +123908,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_list_journal_dirs" lineno="1486">
+<interface name="systemd_list_journal_dirs" lineno="1700">
<summary>
Allow domain to list the contents of systemd_journal_t dirs
</summary>
@@ -123082,7 +123918,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_journal_files" lineno="1504">
+<interface name="systemd_read_journal_files" lineno="1718">
<summary>
Allow domain to read systemd_journal_t files
</summary>
@@ -123092,7 +123928,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_journal_files" lineno="1523">
+<interface name="systemd_manage_journal_files" lineno="1737">
<summary>
Allow domain to create/manage systemd_journal_t files
</summary>
@@ -123102,7 +123938,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_watch_journal_dirs" lineno="1543">
+<interface name="systemd_watch_journal_dirs" lineno="1757">
<summary>
Allow domain to add a watch on systemd_journal_t directories
</summary>
@@ -123112,7 +123948,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_journal_dirs" lineno="1561">
+<interface name="systemd_relabelto_journal_dirs" lineno="1775">
<summary>
Relabel to systemd-journald directory type.
</summary>
@@ -123122,7 +123958,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_journal_files" lineno="1580">
+<interface name="systemd_relabelto_journal_files" lineno="1794">
<summary>
Relabel to systemd-journald file type.
</summary>
@@ -123132,7 +123968,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_networkd_units" lineno="1600">
+<interface name="systemd_read_networkd_units" lineno="1814">
<summary>
Allow domain to read systemd_networkd_t unit files
</summary>
@@ -123142,7 +123978,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_networkd_units" lineno="1620">
+<interface name="systemd_manage_networkd_units" lineno="1834">
<summary>
Allow domain to create/manage systemd_networkd_t unit files
</summary>
@@ -123152,7 +123988,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_enabledisable_networkd" lineno="1640">
+<interface name="systemd_enabledisable_networkd" lineno="1854">
<summary>
Allow specified domain to enable systemd-networkd units
</summary>
@@ -123162,7 +123998,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_startstop_networkd" lineno="1659">
+<interface name="systemd_startstop_networkd" lineno="1873">
<summary>
Allow specified domain to start systemd-networkd units
</summary>
@@ -123172,7 +124008,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_networkd" lineno="1679">
+<interface name="systemd_dbus_chat_networkd" lineno="1893">
<summary>
Send and receive messages from
systemd networkd over dbus.
@@ -123183,7 +124019,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_status_networkd" lineno="1699">
+<interface name="systemd_status_networkd" lineno="1913">
<summary>
Allow specified domain to get status of systemd-networkd
</summary>
@@ -123193,7 +124029,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1718">
+<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1932">
<summary>
Relabel systemd_networkd tun socket.
</summary>
@@ -123203,7 +124039,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1736">
+<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1950">
<summary>
Read/Write from systemd_networkd netlink route socket.
</summary>
@@ -123213,7 +124049,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_list_networkd_runtime" lineno="1754">
+<interface name="systemd_list_networkd_runtime" lineno="1968">
<summary>
Allow domain to list dirs under /run/systemd/netif
</summary>
@@ -123223,7 +124059,7 @@ domain permitted the access
</summary>
</param>
</interface>
-<interface name="systemd_watch_networkd_runtime_dirs" lineno="1773">
+<interface name="systemd_watch_networkd_runtime_dirs" lineno="1987">
<summary>
Watch directories under /run/systemd/netif
</summary>
@@ -123233,7 +124069,7 @@ Domain permitted the access
</summary>
</param>
</interface>
-<interface name="systemd_read_networkd_runtime" lineno="1792">
+<interface name="systemd_read_networkd_runtime" lineno="2006">
<summary>
Allow domain to read files generated by systemd_networkd
</summary>
@@ -123243,7 +124079,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_state" lineno="1811">
+<interface name="systemd_read_logind_state" lineno="2025">
<summary>
Allow systemd_logind_t to read process state for cgroup file
</summary>
@@ -123253,7 +124089,19 @@ Domain systemd_logind_t may access.
</summary>
</param>
</interface>
-<interface name="systemd_start_user_manager_units" lineno="1831">
+<interface name="systemd_create_logind_linger_dir" lineno="2046">
+<summary>
+Allow the specified domain to create
+the systemd-logind linger directory with
+the correct context.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_start_user_manager_units" lineno="2066">
<summary>
Allow the specified domain to start systemd
user manager units (systemd --user).
@@ -123264,7 +124112,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_stop_user_manager_units" lineno="1851">
+<interface name="systemd_stop_user_manager_units" lineno="2086">
<summary>
Allow the specified domain to stop systemd
user manager units (systemd --user).
@@ -123275,7 +124123,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_reload_user_manager_units" lineno="1871">
+<interface name="systemd_reload_user_manager_units" lineno="2106">
<summary>
Allow the specified domain to reload systemd
user manager units (systemd --user).
@@ -123286,7 +124134,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_status_user_manager_units" lineno="1891">
+<interface name="systemd_get_user_manager_units_status" lineno="2126">
<summary>
Get the status of systemd user manager
units (systemd --user).
@@ -123297,7 +124145,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_start_power_units" lineno="1910">
+<interface name="systemd_start_power_units" lineno="2145">
<summary>
Allow specified domain to start power units
</summary>
@@ -123307,7 +124155,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="systemd_status_power_units" lineno="1929">
+<interface name="systemd_status_power_units" lineno="2164">
<summary>
Get the system status information about power units
</summary>
@@ -123317,7 +124165,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_stream_connect_socket_proxyd" lineno="1948">
+<interface name="systemd_stream_connect_socket_proxyd" lineno="2183">
<summary>
Allows connections to the systemd-socket-proxyd's socket.
</summary>
@@ -123327,7 +124175,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfiles_conf_file" lineno="1967">
+<interface name="systemd_tmpfiles_conf_file" lineno="2202">
<summary>
Make the specified type usable for
systemd tmpfiles config files.
@@ -123338,7 +124186,7 @@ Type to be used for systemd tmpfiles config files.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfiles_creator" lineno="1988">
+<interface name="systemd_tmpfiles_creator" lineno="2223">
<summary>
Allow the specified domain to create
the tmpfiles config directory with
@@ -123350,7 +124198,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfiles_conf_filetrans" lineno="2024">
+<interface name="systemd_tmpfiles_conf_filetrans" lineno="2259">
<summary>
Create an object in the systemd tmpfiles config
directory, with a private type
@@ -123377,7 +124225,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="systemd_list_tmpfiles_conf" lineno="2043">
+<interface name="systemd_list_tmpfiles_conf" lineno="2278">
<summary>
Allow domain to list systemd tmpfiles config directory
</summary>
@@ -123387,7 +124235,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2061">
+<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2296">
<summary>
Allow domain to relabel to systemd tmpfiles config directory
</summary>
@@ -123397,7 +124245,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2079">
+<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2314">
<summary>
Allow domain to relabel to systemd tmpfiles config files
</summary>
@@ -123407,7 +124255,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfilesd_managed" lineno="2097">
+<interface name="systemd_tmpfilesd_managed" lineno="2332">
<summary>
Allow systemd_tmpfiles_t to manage filesystem objects
</summary>
@@ -123417,7 +124265,18 @@ Type of object to manage
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_resolved" lineno="2124">
+<interface name="systemd_stream_connect_resolved" lineno="2359">
+<summary>
+Connect to systemd resolved over
+/run/systemd/resolve/io.systemd.Resolve .
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_dbus_chat_resolved" lineno="2380">
<summary>
Send and receive messages from
systemd resolved over dbus.
@@ -123428,7 +124287,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_resolved_runtime" lineno="2144">
+<interface name="systemd_read_resolved_runtime" lineno="2400">
<summary>
Allow domain to read resolv.conf file generated by systemd_resolved
</summary>
@@ -123438,7 +124297,17 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_getattr_updated_runtime" lineno="2162">
+<interface name="systemd_exec_systemctl" lineno="2422">
+<summary>
+Execute the systemctl program.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_getattr_updated_runtime" lineno="2453">
<summary>
Allow domain to getattr on .updated file (generated by systemd-update-done
</summary>
@@ -123448,7 +124317,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_search_all_user_keys" lineno="2180">
+<interface name="systemd_search_all_user_keys" lineno="2471">
<summary>
Search keys for the all systemd --user domains.
</summary>
@@ -123458,7 +124327,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_create_all_user_keys" lineno="2198">
+<interface name="systemd_create_all_user_keys" lineno="2489">
<summary>
Create keys for the all systemd --user domains.
</summary>
@@ -123468,7 +124337,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_all_user_keys" lineno="2216">
+<interface name="systemd_write_all_user_keys" lineno="2507">
<summary>
Write keys for the all systemd --user domains.
</summary>
@@ -123478,7 +124347,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_domtrans_sysusers" lineno="2235">
+<interface name="systemd_domtrans_sysusers" lineno="2526">
<summary>
Execute systemd-sysusers in the
systemd sysusers domain.
@@ -123489,7 +124358,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_run_sysusers" lineno="2260">
+<interface name="systemd_run_sysusers" lineno="2551">
<summary>
Run systemd-sysusers with a domain transition.
</summary>
@@ -123505,7 +124374,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="systemd_use_inherited_machined_ptys" lineno="2280">
+<interface name="systemd_use_inherited_machined_ptys" lineno="2571">
<summary>
receive and use a systemd_machined_devpts_t file handle
</summary>
@@ -123523,6 +124392,13 @@ Enable support for systemd-tmpfiles to manage all non-security files.
</p>
</desc>
</tunable>
+<tunable name="systemd_networkd_dhcp_server" dftval="false">
+<desc>
+<p>
+Allow systemd-networkd to run its DHCPd server component
+</p>
+</desc>
+</tunable>
<tunable name="systemd_nspawn_labeled_namespace" dftval="false">
<desc>
<p>
@@ -124675,7 +125551,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_login_user_template" lineno="954">
+<template name="userdom_login_user_template" lineno="958">
<summary>
The template for creating a login user.
</summary>
@@ -124693,7 +125569,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_restricted_user_template" lineno="1077">
+<template name="userdom_restricted_user_template" lineno="1081">
<summary>
The template for creating a unprivileged login user.
</summary>
@@ -124711,7 +125587,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_restricted_xwindows_user_template" lineno="1118">
+<template name="userdom_restricted_xwindows_user_template" lineno="1122">
<summary>
The template for creating a unprivileged xwindows login user.
</summary>
@@ -124732,7 +125608,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_unpriv_user_template" lineno="1201">
+<template name="userdom_unpriv_user_template" lineno="1205">
<summary>
The template for creating a unprivileged user roughly
equivalent to a regular linux user.
@@ -124755,7 +125631,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_admin_user_template" lineno="1321">
+<template name="userdom_admin_user_template" lineno="1325">
<summary>
The template for creating an administrative user.
</summary>
@@ -124784,7 +125660,7 @@ is the prefix for sysadm_t).
</summary>
</param>
</template>
-<interface name="userdom_security_admin_template" lineno="1501">
+<interface name="userdom_security_admin_template" lineno="1505">
<summary>
Allow user to run as a secadm
</summary>
@@ -124810,7 +125686,7 @@ The role of the object to create.
</summary>
</param>
</interface>
-<template name="userdom_xdg_user_template" lineno="1604">
+<template name="userdom_xdg_user_template" lineno="1608">
<summary>
Allow user to interact with xdg content types
</summary>
@@ -124831,7 +125707,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<interface name="userdom_user_application_type" lineno="1653">
+<interface name="userdom_user_application_type" lineno="1657">
<summary>
Make the specified type usable as
a user application domain type.
@@ -124842,7 +125718,7 @@ Type to be used as a user application domain.
</summary>
</param>
</interface>
-<interface name="userdom_user_application_domain" lineno="1674">
+<interface name="userdom_user_application_domain" lineno="1678">
<summary>
Make the specified type usable as
a user application domain.
@@ -124858,7 +125734,7 @@ Type to be used as the domain entry point.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_content" lineno="1691">
+<interface name="userdom_user_home_content" lineno="1695">
<summary>
Make the specified type usable in a
user home directory.
@@ -124870,7 +125746,7 @@ user home directory.
</summary>
</param>
</interface>
-<interface name="userdom_user_tmp_file" lineno="1717">
+<interface name="userdom_user_tmp_file" lineno="1721">
<summary>
Make the specified type usable as a
user temporary file.
@@ -124882,7 +125758,7 @@ temporary directories.
</summary>
</param>
</interface>
-<interface name="userdom_user_tmpfs_file" lineno="1734">
+<interface name="userdom_user_tmpfs_file" lineno="1738">
<summary>
Make the specified type usable as a
user tmpfs file.
@@ -124894,7 +125770,7 @@ tmpfs directories.
</summary>
</param>
</interface>
-<interface name="userdom_attach_admin_tun_iface" lineno="1749">
+<interface name="userdom_attach_admin_tun_iface" lineno="1753">
<summary>
Allow domain to attach to TUN devices created by administrative users.
</summary>
@@ -124904,7 +125780,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_setattr_user_ptys" lineno="1768">
+<interface name="userdom_setattr_user_ptys" lineno="1772">
<summary>
Set the attributes of a user pty.
</summary>
@@ -124914,7 +125790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_create_user_pty" lineno="1786">
+<interface name="userdom_create_user_pty" lineno="1790">
<summary>
Create a user pty.
</summary>
@@ -124924,7 +125800,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_getattr_user_home_dirs" lineno="1804">
+<interface name="userdom_getattr_user_home_dirs" lineno="1808">
<summary>
Get the attributes of user home directories.
</summary>
@@ -124934,7 +125810,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1823">
+<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1827">
<summary>
Do not audit attempts to get the attributes of user home directories.
</summary>
@@ -124944,7 +125820,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_home_dirs" lineno="1841">
+<interface name="userdom_search_user_home_dirs" lineno="1845">
<summary>
Search user home directories.
</summary>
@@ -124954,7 +125830,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1868">
+<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1872">
<summary>
Do not audit attempts to search user home directories.
</summary>
@@ -124972,7 +125848,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="userdom_list_user_home_dirs" lineno="1886">
+<interface name="userdom_list_user_home_dirs" lineno="1890">
<summary>
List user home directories.
</summary>
@@ -124982,7 +125858,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1905">
+<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1909">
<summary>
Do not audit attempts to list user home subdirectories.
</summary>
@@ -124992,7 +125868,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_create_user_home_dirs" lineno="1923">
+<interface name="userdom_create_user_home_dirs" lineno="1927">
<summary>
Create user home directories.
</summary>
@@ -125002,7 +125878,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_dirs" lineno="1941">
+<interface name="userdom_manage_user_home_dirs" lineno="1945">
<summary>
Manage user home directories.
</summary>
@@ -125012,7 +125888,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabelto_user_home_dirs" lineno="1959">
+<interface name="userdom_relabelto_user_home_dirs" lineno="1963">
<summary>
Relabel to user home directories.
</summary>
@@ -125022,7 +125898,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_home_filetrans_user_home_dir" lineno="1983">
+<interface name="userdom_home_filetrans_user_home_dir" lineno="1987">
<summary>
Create directories in the home dir root with
the user home directory type.
@@ -125038,7 +125914,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_domtrans" lineno="2020">
+<interface name="userdom_user_home_domtrans" lineno="2024">
<summary>
Do a domain transition to the specified
domain when executing a program in the
@@ -125067,7 +125943,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_search_user_home_content" lineno="2040">
+<interface name="userdom_dontaudit_search_user_home_content" lineno="2044">
<summary>
Do not audit attempts to search user home content directories.
</summary>
@@ -125077,7 +125953,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_list_all_user_home_content" lineno="2058">
+<interface name="userdom_list_all_user_home_content" lineno="2062">
<summary>
List all users home content directories.
</summary>
@@ -125087,7 +125963,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_list_user_home_content" lineno="2077">
+<interface name="userdom_list_user_home_content" lineno="2081">
<summary>
List contents of users home directory.
</summary>
@@ -125097,7 +125973,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_dirs" lineno="2096">
+<interface name="userdom_manage_user_home_content_dirs" lineno="2100">
<summary>
Create, read, write, and delete directories
in a user home subdirectory.
@@ -125108,7 +125984,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_home_content_dirs" lineno="2115">
+<interface name="userdom_delete_all_user_home_content_dirs" lineno="2119">
<summary>
Delete all user home content directories.
</summary>
@@ -125118,7 +125994,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_home_content_dirs" lineno="2135">
+<interface name="userdom_delete_user_home_content_dirs" lineno="2139">
<summary>
Delete directories in a user home subdirectory.
</summary>
@@ -125128,7 +126004,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2153">
+<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2157">
<summary>
Set attributes of all user home content directories.
</summary>
@@ -125138,7 +126014,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2173">
+<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2177">
<summary>
Do not audit attempts to set the
attributes of user home files.
@@ -125149,7 +126025,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_map_user_home_content_files" lineno="2191">
+<interface name="userdom_map_user_home_content_files" lineno="2195">
<summary>
Map user home files.
</summary>
@@ -125159,7 +126035,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_mmap_user_home_content_files" lineno="2209">
+<interface name="userdom_mmap_user_home_content_files" lineno="2213">
<summary>
Mmap user home files.
</summary>
@@ -125169,7 +126045,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_home_content_files" lineno="2228">
+<interface name="userdom_read_user_home_content_files" lineno="2232">
<summary>
Read user home files.
</summary>
@@ -125179,7 +126055,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2247">
+<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2251">
<summary>
Do not audit attempts to read user home files.
</summary>
@@ -125189,7 +126065,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_all_user_home_content" lineno="2266">
+<interface name="userdom_read_all_user_home_content" lineno="2270">
<summary>
Read all user home content, including application-specific resources.
</summary>
@@ -125199,7 +126075,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_manage_all_user_home_content" lineno="2288">
+<interface name="userdom_manage_all_user_home_content" lineno="2292">
<summary>
Manage all user home content, including application-specific resources.
</summary>
@@ -125209,7 +126085,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_map_all_user_home_content_files" lineno="2310">
+<interface name="userdom_map_all_user_home_content_files" lineno="2314">
<summary>
Map all user home content, including application-specific resources.
</summary>
@@ -125219,7 +126095,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2328">
+<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2332">
<summary>
Do not audit attempts to append user home files.
</summary>
@@ -125229,7 +126105,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2346">
+<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2350">
<summary>
Do not audit attempts to write user home files.
</summary>
@@ -125239,7 +126115,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_home_content_files" lineno="2364">
+<interface name="userdom_delete_all_user_home_content_files" lineno="2368">
<summary>
Delete all user home content files.
</summary>
@@ -125249,7 +126125,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_home_content_files" lineno="2384">
+<interface name="userdom_delete_user_home_content_files" lineno="2388">
<summary>
Delete files in a user home subdirectory.
</summary>
@@ -125259,7 +126135,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_generic_user_home_dirs" lineno="2402">
+<interface name="userdom_relabel_generic_user_home_dirs" lineno="2406">
<summary>
Relabel generic user home dirs.
</summary>
@@ -125269,7 +126145,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_generic_user_home_files" lineno="2420">
+<interface name="userdom_relabel_generic_user_home_files" lineno="2424">
<summary>
Relabel generic user home files.
</summary>
@@ -125279,7 +126155,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2438">
+<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2442">
<summary>
Do not audit attempts to relabel user home files.
</summary>
@@ -125289,7 +126165,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_home_content_symlinks" lineno="2456">
+<interface name="userdom_read_user_home_content_symlinks" lineno="2460">
<summary>
Read user home subdirectory symbolic links.
</summary>
@@ -125299,7 +126175,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_exec_user_home_content_files" lineno="2476">
+<interface name="userdom_exec_user_home_content_files" lineno="2480">
<summary>
Execute user home files.
</summary>
@@ -125310,7 +126186,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2503">
+<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2507">
<summary>
Do not audit attempts to execute user home files.
</summary>
@@ -125320,7 +126196,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_files" lineno="2522">
+<interface name="userdom_manage_user_home_content_files" lineno="2526">
<summary>
Create, read, write, and delete files
in a user home subdirectory.
@@ -125331,7 +126207,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2543">
+<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2547">
<summary>
Do not audit attempts to create, read, write, and delete directories
in a user home subdirectory.
@@ -125342,7 +126218,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_symlinks" lineno="2562">
+<interface name="userdom_manage_user_home_content_symlinks" lineno="2566">
<summary>
Create, read, write, and delete symbolic links
in a user home subdirectory.
@@ -125353,7 +126229,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2582">
+<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2586">
<summary>
Delete all user home content symbolic links.
</summary>
@@ -125363,7 +126239,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_home_content_symlinks" lineno="2602">
+<interface name="userdom_delete_user_home_content_symlinks" lineno="2606">
<summary>
Delete symbolic links in a user home directory.
</summary>
@@ -125373,7 +126249,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_pipes" lineno="2621">
+<interface name="userdom_manage_user_home_content_pipes" lineno="2625">
<summary>
Create, read, write, and delete named pipes
in a user home subdirectory.
@@ -125384,7 +126260,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_sockets" lineno="2642">
+<interface name="userdom_manage_user_home_content_sockets" lineno="2646">
<summary>
Create, read, write, and delete named sockets
in a user home subdirectory.
@@ -125395,7 +126271,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_dir_filetrans" lineno="2679">
+<interface name="userdom_user_home_dir_filetrans" lineno="2683">
<summary>
Create objects in a user home directory
with an automatic type transition to
@@ -125422,7 +126298,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_content_filetrans" lineno="2716">
+<interface name="userdom_user_home_content_filetrans" lineno="2720">
<summary>
Create objects in a directory located
in a user home directory with an
@@ -125450,7 +126326,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2747">
+<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2751">
<summary>
Automatically use the user_cert_t label for selected resources
created in a users home directory
@@ -125471,7 +126347,7 @@ Name of the resource that is being created
</summary>
</param>
</interface>
-<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2777">
+<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2781">
<summary>
Create objects in a user home directory
with an automatic type transition to
@@ -125493,7 +126369,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_exec_user_bin_files" lineno="2796">
+<interface name="userdom_exec_user_bin_files" lineno="2800">
<summary>
Execute user executable files.
</summary>
@@ -125503,7 +126379,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_bin" lineno="2816">
+<interface name="userdom_manage_user_bin" lineno="2820">
<summary>
Manage user executable files.
</summary>
@@ -125513,7 +126389,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_certs" lineno="2838">
+<interface name="userdom_read_user_certs" lineno="2842">
<summary>
Read user SSL certificates.
</summary>
@@ -125524,7 +126400,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="userdom_dontaudit_manage_user_certs" lineno="2861">
+<interface name="userdom_dontaudit_manage_user_certs" lineno="2865">
<summary>
Do not audit attempts to manage
the user SSL certificates.
@@ -125536,7 +126412,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="userdom_manage_user_certs" lineno="2881">
+<interface name="userdom_manage_user_certs" lineno="2885">
<summary>
Manage user SSL certificates.
</summary>
@@ -125546,7 +126422,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_write_user_tmp_sockets" lineno="2902">
+<interface name="userdom_write_user_tmp_sockets" lineno="2906">
<summary>
Write to user temporary named sockets.
</summary>
@@ -125556,7 +126432,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_list_user_tmp" lineno="2922">
+<interface name="userdom_list_user_tmp" lineno="2926">
<summary>
List user temporary directories.
</summary>
@@ -125566,7 +126442,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_list_user_tmp" lineno="2944">
+<interface name="userdom_dontaudit_list_user_tmp" lineno="2948">
<summary>
Do not audit attempts to list user
temporary directories.
@@ -125577,7 +126453,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_dirs" lineno="2962">
+<interface name="userdom_delete_user_tmp_dirs" lineno="2966">
<summary>
Delete users temporary directories.
</summary>
@@ -125587,7 +126463,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2981">
+<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2985">
<summary>
Do not audit attempts to manage users
temporary directories.
@@ -125598,7 +126474,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_tmp_files" lineno="2999">
+<interface name="userdom_read_user_tmp_files" lineno="3003">
<summary>
Read user temporary files.
</summary>
@@ -125608,7 +126484,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_map_user_tmp_files" lineno="3020">
+<interface name="userdom_map_user_tmp_files" lineno="3024">
<summary>
Map user temporary files.
</summary>
@@ -125618,7 +126494,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3039">
+<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3043">
<summary>
Do not audit attempts to read users
temporary files.
@@ -125629,7 +126505,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3058">
+<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3062">
<summary>
Do not audit attempts to append users
temporary files.
@@ -125640,7 +126516,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_rw_user_tmp_files" lineno="3076">
+<interface name="userdom_rw_user_tmp_files" lineno="3080">
<summary>
Read and write user temporary files.
</summary>
@@ -125650,7 +126526,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_files" lineno="3097">
+<interface name="userdom_delete_user_tmp_files" lineno="3101">
<summary>
Delete users temporary files.
</summary>
@@ -125660,7 +126536,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3116">
+<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3120">
<summary>
Do not audit attempts to manage users
temporary files.
@@ -125671,7 +126547,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_tmp_symlinks" lineno="3134">
+<interface name="userdom_read_user_tmp_symlinks" lineno="3138">
<summary>
Read user temporary symbolic links.
</summary>
@@ -125681,7 +126557,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_symlinks" lineno="3155">
+<interface name="userdom_delete_user_tmp_symlinks" lineno="3159">
<summary>
Delete users temporary symbolic links.
</summary>
@@ -125691,7 +126567,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_dirs" lineno="3174">
+<interface name="userdom_manage_user_tmp_dirs" lineno="3178">
<summary>
Create, read, write, and delete user
temporary directories.
@@ -125702,7 +126578,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_named_pipes" lineno="3194">
+<interface name="userdom_delete_user_tmp_named_pipes" lineno="3198">
<summary>
Delete users temporary named pipes.
</summary>
@@ -125712,7 +126588,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_files" lineno="3213">
+<interface name="userdom_manage_user_tmp_files" lineno="3217">
<summary>
Create, read, write, and delete user
temporary files.
@@ -125723,7 +126599,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_named_sockets" lineno="3233">
+<interface name="userdom_delete_user_tmp_named_sockets" lineno="3237">
<summary>
Delete users temporary named sockets.
</summary>
@@ -125733,7 +126609,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_symlinks" lineno="3252">
+<interface name="userdom_manage_user_tmp_symlinks" lineno="3256">
<summary>
Create, read, write, and delete user
temporary symbolic links.
@@ -125744,7 +126620,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3273">
+<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3277">
<summary>
Do not audit attempts to read and write
temporary pipes.
@@ -125755,7 +126631,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_pipes" lineno="3292">
+<interface name="userdom_manage_user_tmp_pipes" lineno="3296">
<summary>
Create, read, write, and delete user
temporary named pipes.
@@ -125766,7 +126642,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_sockets" lineno="3313">
+<interface name="userdom_manage_user_tmp_sockets" lineno="3317">
<summary>
Create, read, write, and delete user
temporary named sockets.
@@ -125777,7 +126653,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_user_tmp_filetrans" lineno="3350">
+<interface name="userdom_user_tmp_filetrans" lineno="3354">
<summary>
Create objects in a user temporary directory
with an automatic type transition to
@@ -125804,7 +126680,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_tmp_filetrans_user_tmp" lineno="3382">
+<interface name="userdom_tmp_filetrans_user_tmp" lineno="3386">
<summary>
Create objects in the temporary directory
with an automatic type transition to
@@ -125826,7 +126702,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_map_user_tmpfs_files" lineno="3400">
+<interface name="userdom_map_user_tmpfs_files" lineno="3404">
<summary>
Map user tmpfs files.
</summary>
@@ -125836,7 +126712,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_tmpfs_files" lineno="3418">
+<interface name="userdom_read_user_tmpfs_files" lineno="3422">
<summary>
Read user tmpfs files.
</summary>
@@ -125846,7 +126722,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3438">
+<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3442">
<summary>
dontaudit Read attempts of user tmpfs files.
</summary>
@@ -125856,7 +126732,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3457">
+<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3461">
<summary>
relabel to/from user tmpfs dirs
</summary>
@@ -125866,7 +126742,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_tmpfs_files" lineno="3476">
+<interface name="userdom_relabel_user_tmpfs_files" lineno="3480">
<summary>
relabel to/from user tmpfs files
</summary>
@@ -125876,7 +126752,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_content" lineno="3498">
+<interface name="userdom_user_runtime_content" lineno="3502">
<summary>
Make the specified type usable in
the directory /run/user/%{USERID}/.
@@ -125888,7 +126764,7 @@ user_runtime_content_dir_t.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_runtime" lineno="3518">
+<interface name="userdom_search_user_runtime" lineno="3522">
<summary>
Search users runtime directories.
</summary>
@@ -125898,7 +126774,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_runtime_root" lineno="3537">
+<interface name="userdom_search_user_runtime_root" lineno="3541">
<summary>
Search user runtime root directories.
</summary>
@@ -125908,7 +126784,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3557">
+<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3561">
<summary>
Do not audit attempts to search
user runtime root directories.
@@ -125919,7 +126795,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_runtime_root_dirs" lineno="3576">
+<interface name="userdom_manage_user_runtime_root_dirs" lineno="3580">
<summary>
Create, read, write, and delete user
runtime root dirs.
@@ -125930,7 +126806,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3595">
+<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3599">
<summary>
Relabel to and from user runtime root dirs.
</summary>
@@ -125940,7 +126816,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_runtime_dirs" lineno="3614">
+<interface name="userdom_manage_user_runtime_dirs" lineno="3618">
<summary>
Create, read, write, and delete user
runtime dirs.
@@ -125951,7 +126827,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_mounton_user_runtime_dirs" lineno="3634">
+<interface name="userdom_mounton_user_runtime_dirs" lineno="3638">
<summary>
Mount a filesystem on user runtime dir
directories.
@@ -125962,7 +126838,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabelto_user_runtime_dirs" lineno="3652">
+<interface name="userdom_relabelto_user_runtime_dirs" lineno="3656">
<summary>
Relabel to user runtime directories.
</summary>
@@ -125972,7 +126848,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3670">
+<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3674">
<summary>
Relabel from user runtime directories.
</summary>
@@ -125982,7 +126858,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_runtime_files" lineno="3688">
+<interface name="userdom_delete_user_runtime_files" lineno="3692">
<summary>
delete user runtime files
</summary>
@@ -125992,7 +126868,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_search_all_user_runtime" lineno="3707">
+<interface name="userdom_search_all_user_runtime" lineno="3711">
<summary>
Search users runtime directories.
</summary>
@@ -126002,7 +126878,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_list_all_user_runtime" lineno="3726">
+<interface name="userdom_list_all_user_runtime" lineno="3730">
<summary>
List user runtime directories.
</summary>
@@ -126012,7 +126888,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_dirs" lineno="3745">
+<interface name="userdom_delete_all_user_runtime_dirs" lineno="3749">
<summary>
delete user runtime directories
</summary>
@@ -126022,7 +126898,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_files" lineno="3763">
+<interface name="userdom_delete_all_user_runtime_files" lineno="3767">
<summary>
delete user runtime files
</summary>
@@ -126032,7 +126908,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3781">
+<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3785">
<summary>
delete user runtime symlink files
</summary>
@@ -126042,7 +126918,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3799">
+<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3803">
<summary>
delete user runtime fifo files
</summary>
@@ -126052,7 +126928,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3817">
+<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3821">
<summary>
delete user runtime socket files
</summary>
@@ -126062,7 +126938,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3835">
+<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3839">
<summary>
delete user runtime blk files
</summary>
@@ -126072,7 +126948,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3853">
+<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3857">
<summary>
delete user runtime chr files
</summary>
@@ -126082,7 +126958,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3883">
+<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3887">
<summary>
Create objects in the pid directory
with an automatic type transition to
@@ -126104,7 +126980,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3910">
+<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3914">
<summary>
Create objects in the runtime directory
with an automatic type transition to
@@ -126126,7 +127002,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_filetrans" lineno="3946">
+<interface name="userdom_user_runtime_filetrans" lineno="3950">
<summary>
Create objects in a user runtime
directory with an automatic type
@@ -126154,7 +127030,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3977">
+<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3981">
<summary>
Create objects in the user runtime directory
with an automatic type transition to
@@ -126176,7 +127052,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4007">
+<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4011">
<summary>
Create objects in the user runtime root
directory with an automatic type transition
@@ -126198,7 +127074,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_run_filetrans_user_runtime" lineno="4038">
+<interface name="userdom_user_run_filetrans_user_runtime" lineno="4042">
<summary>
Create objects in the user runtime root
directory with an automatic type transition
@@ -126220,7 +127096,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_rw_user_tmpfs_files" lineno="4056">
+<interface name="userdom_rw_user_tmpfs_files" lineno="4060">
<summary>
Read and write user tmpfs files.
</summary>
@@ -126230,7 +127106,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmpfs_files" lineno="4077">
+<interface name="userdom_delete_user_tmpfs_files" lineno="4081">
<summary>
Delete user tmpfs files.
</summary>
@@ -126240,7 +127116,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmpfs_files" lineno="4096">
+<interface name="userdom_manage_user_tmpfs_files" lineno="4100">
<summary>
Create, read, write, and delete user tmpfs files.
</summary>
@@ -126250,7 +127126,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_getattr_user_ttys" lineno="4116">
+<interface name="userdom_getattr_user_ttys" lineno="4120">
<summary>
Get the attributes of a user domain tty.
</summary>
@@ -126260,7 +127136,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4134">
+<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4138">
<summary>
Do not audit attempts to get the attributes of a user domain tty.
</summary>
@@ -126270,7 +127146,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_setattr_user_ttys" lineno="4152">
+<interface name="userdom_setattr_user_ttys" lineno="4156">
<summary>
Set the attributes of a user domain tty.
</summary>
@@ -126280,7 +127156,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4170">
+<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4174">
<summary>
Do not audit attempts to set the attributes of a user domain tty.
</summary>
@@ -126290,7 +127166,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_use_user_ttys" lineno="4188">
+<interface name="userdom_use_user_ttys" lineno="4192">
<summary>
Read and write a user domain tty.
</summary>
@@ -126300,7 +127176,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_user_ptys" lineno="4206">
+<interface name="userdom_use_user_ptys" lineno="4210">
<summary>
Read and write a user domain pty.
</summary>
@@ -126310,7 +127186,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_inherited_user_terminals" lineno="4241">
+<interface name="userdom_use_inherited_user_terminals" lineno="4245">
<summary>
Read and write a user TTYs and PTYs.
</summary>
@@ -126336,7 +127212,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="userdom_use_user_terminals" lineno="4282">
+<interface name="userdom_use_user_terminals" lineno="4286">
<summary>
Read, write and open a user TTYs and PTYs.
</summary>
@@ -126368,7 +127244,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="userdom_dontaudit_use_user_terminals" lineno="4298">
+<interface name="userdom_dontaudit_use_user_terminals" lineno="4302">
<summary>
Do not audit attempts to read and write
a user domain tty and pty.
@@ -126379,7 +127255,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_spec_domtrans_all_users" lineno="4319">
+<interface name="userdom_spec_domtrans_all_users" lineno="4323">
<summary>
Execute a shell in all user domains. This
is an explicit transition, requiring the
@@ -126391,7 +127267,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4342">
+<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4346">
<summary>
Execute an Xserver session in all user domains. This
is an explicit transition, requiring the
@@ -126403,7 +127279,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_spec_domtrans_unpriv_users" lineno="4365">
+<interface name="userdom_spec_domtrans_unpriv_users" lineno="4369">
<summary>
Execute a shell in all unprivileged user domains. This
is an explicit transition, requiring the
@@ -126415,7 +127291,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4388">
+<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4392">
<summary>
Execute an Xserver session in all unprivileged user domains. This
is an explicit transition, requiring the
@@ -126427,7 +127303,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_rw_unpriv_user_semaphores" lineno="4409">
+<interface name="userdom_rw_unpriv_user_semaphores" lineno="4413">
<summary>
Read and write unpriviledged user SysV sempaphores.
</summary>
@@ -126437,7 +127313,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_unpriv_user_semaphores" lineno="4427">
+<interface name="userdom_manage_unpriv_user_semaphores" lineno="4431">
<summary>
Manage unpriviledged user SysV sempaphores.
</summary>
@@ -126447,7 +127323,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4446">
+<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4450">
<summary>
Read and write unpriviledged user SysV shared
memory segments.
@@ -126458,7 +127334,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4465">
+<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4469">
<summary>
Manage unpriviledged user SysV shared
memory segments.
@@ -126469,7 +127345,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4485">
+<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4489">
<summary>
Execute bin_t in the unprivileged user domains. This
is an explicit transition, requiring the
@@ -126481,7 +127357,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4508">
+<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4512">
<summary>
Execute all entrypoint files in unprivileged user
domains. This is an explicit transition, requiring the
@@ -126493,7 +127369,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_home_content" lineno="4529">
+<interface name="userdom_search_user_home_content" lineno="4533">
<summary>
Search users home directories.
</summary>
@@ -126503,7 +127379,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_signull_unpriv_users" lineno="4548">
+<interface name="userdom_signull_unpriv_users" lineno="4552">
<summary>
Send signull to unprivileged user domains.
</summary>
@@ -126513,7 +127389,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_signal_unpriv_users" lineno="4566">
+<interface name="userdom_signal_unpriv_users" lineno="4570">
<summary>
Send general signals to unprivileged user domains.
</summary>
@@ -126523,7 +127399,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_unpriv_users_fds" lineno="4584">
+<interface name="userdom_use_unpriv_users_fds" lineno="4588">
<summary>
Inherit the file descriptors from unprivileged user domains.
</summary>
@@ -126533,7 +127409,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4612">
+<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4616">
<summary>
Do not audit attempts to inherit the file descriptors
from unprivileged user domains.
@@ -126553,7 +127429,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="userdom_dontaudit_use_user_ptys" lineno="4630">
+<interface name="userdom_dontaudit_use_user_ptys" lineno="4634">
<summary>
Do not audit attempts to use user ptys.
</summary>
@@ -126563,7 +127439,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_relabelto_user_ptys" lineno="4648">
+<interface name="userdom_relabelto_user_ptys" lineno="4652">
<summary>
Relabel files to unprivileged user pty types.
</summary>
@@ -126573,7 +127449,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4667">
+<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4671">
<summary>
Do not audit attempts to relabel files from
user pty types.
@@ -126584,7 +127460,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_write_user_tmp_files" lineno="4685">
+<interface name="userdom_write_user_tmp_files" lineno="4689">
<summary>
Write all users files in /tmp
</summary>
@@ -126594,7 +127470,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4704">
+<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4708">
<summary>
Do not audit attempts to write users
temporary files.
@@ -126605,7 +127481,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_use_user_ttys" lineno="4722">
+<interface name="userdom_dontaudit_use_user_ttys" lineno="4726">
<summary>
Do not audit attempts to use user ttys.
</summary>
@@ -126615,7 +127491,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_all_users_state" lineno="4740">
+<interface name="userdom_read_all_users_state" lineno="4744">
<summary>
Read the process state of all user domains.
</summary>
@@ -126625,7 +127501,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_getattr_all_users" lineno="4760">
+<interface name="userdom_getattr_all_users" lineno="4764">
<summary>
Get the attributes of all user domains.
</summary>
@@ -126635,7 +127511,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_all_users_fds" lineno="4778">
+<interface name="userdom_use_all_users_fds" lineno="4782">
<summary>
Inherit the file descriptors from all user domains
</summary>
@@ -126645,7 +127521,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_use_all_users_fds" lineno="4797">
+<interface name="userdom_dontaudit_use_all_users_fds" lineno="4801">
<summary>
Do not audit attempts to inherit the file
descriptors from any user domains.
@@ -126656,7 +127532,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_signal_all_users" lineno="4815">
+<interface name="userdom_signal_all_users" lineno="4819">
<summary>
Send general signals to all user domains.
</summary>
@@ -126666,7 +127542,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_sigchld_all_users" lineno="4833">
+<interface name="userdom_sigchld_all_users" lineno="4837">
<summary>
Send a SIGCHLD signal to all user domains.
</summary>
@@ -126676,7 +127552,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_all_users_keys" lineno="4851">
+<interface name="userdom_read_all_users_keys" lineno="4855">
<summary>
Read keys for all user domains.
</summary>
@@ -126686,7 +127562,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_write_all_users_keys" lineno="4869">
+<interface name="userdom_write_all_users_keys" lineno="4873">
<summary>
Write keys for all user domains.
</summary>
@@ -126696,7 +127572,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_rw_all_users_keys" lineno="4887">
+<interface name="userdom_rw_all_users_keys" lineno="4891">
<summary>
Read and write keys for all user domains.
</summary>
@@ -126706,7 +127582,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_create_all_users_keys" lineno="4905">
+<interface name="userdom_create_all_users_keys" lineno="4909">
<summary>
Create keys for all user domains.
</summary>
@@ -126716,7 +127592,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_all_users_keys" lineno="4923">
+<interface name="userdom_manage_all_users_keys" lineno="4927">
<summary>
Manage keys for all user domains.
</summary>
@@ -126726,7 +127602,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dbus_send_all_users" lineno="4941">
+<interface name="userdom_dbus_send_all_users" lineno="4945">
<summary>
Send a dbus message to all user domains.
</summary>
@@ -126736,7 +127612,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_chr_files" lineno="4963">
+<interface name="userdom_manage_user_tmp_chr_files" lineno="4967">
<summary>
Create, read, write, and delete user
temporary character files.
@@ -126747,7 +127623,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_certs" lineno="4984">
+<interface name="userdom_relabel_user_certs" lineno="4988">
<summary>
Allow relabeling resources to user_cert_t
</summary>
@@ -126757,7 +127633,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5007">
+<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5011">
<summary>
Do not audit attempts to read and write
unserdomain stream.