aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorKenton Groombridge <concord@gentoo.org>2022-12-13 14:33:04 -0500
committerKenton Groombridge <concord@gentoo.org>2022-12-13 14:33:04 -0500
commitc9ea1d5713d9a33466145fc78970b80a398065fb (patch)
tree44d004553345a5fba393fa8c2ade8639ffbf25e7 /doc
parentsalt: use mmap_manage_file_perms (diff)
downloadhardened-refpolicy-c9ea1d5713d9a33466145fc78970b80a398065fb.tar.gz
hardened-refpolicy-c9ea1d5713d9a33466145fc78970b80a398065fb.tar.bz2
hardened-refpolicy-c9ea1d5713d9a33466145fc78970b80a398065fb.zip
Update generated policy and doc files2.20221101-r3
Signed-off-by: Kenton Groombridge <concord@gentoo.org>
Diffstat (limited to 'doc')
-rw-r--r--doc/policy.xml34579
1 files changed, 8770 insertions, 25809 deletions
diff --git a/doc/policy.xml b/doc/policy.xml
index 6dd4831a2..ed1c8ef5d 100644
--- a/doc/policy.xml
+++ b/doc/policy.xml
@@ -1353,6 +1353,96 @@ Role allowed access.
</param>
</interface>
</module>
+<module name="fapolicyd" filename="policy/modules/admin/fapolicyd.if">
+<summary>
+The fapolicyd software framework controls the execution of applications based
+on a user-defined policy. This is one of the most efficient ways to prevent
+running untrusted and possibly malicious applications on the system.
+</summary>
+<interface name="fapolicyd_mmap_read_config_files" lineno="17">
+<summary>
+Read fapolicyd config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fapolicyd_domtrans_fagenrules" lineno="35">
+<summary>
+Execute fagenrules in the fagenrules_t domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="fapolicyd_run_fagenrules" lineno="62">
+<summary>
+Execute fagenrules in the fagenrules domain,
+and allow the specified roles the
+fagenurles domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fapolicyd_domtrans_cli" lineno="82">
+<summary>
+Execute fapolicyd-cli in the fapolicyc domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="fapolicyd_run_cli" lineno="109">
+<summary>
+Execute fapoliyd-cli in the fapolicyc domain,
+and allow the specified roles the
+fapolicyc domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fapolicyd_admin" lineno="135">
+<summary>
+All of the rules required to
+administrate an fapolicyd environment.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+</module>
<module name="firstboot" filename="policy/modules/admin/firstboot.if">
<summary>Initial system configuration utility.</summary>
<interface name="firstboot_domtrans" lineno="13">
@@ -1642,28 +1732,7 @@ Role allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_read_pid_files" lineno="95">
-<summary>
-Read kismet pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="kismet_manage_pid_files" lineno="111">
-<summary>
-Create, read, write, and delete
-kismet pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="kismet_read_runtime_files" lineno="126">
+<interface name="kismet_read_runtime_files" lineno="95">
<summary>
Read kismet runtime files.
</summary>
@@ -1673,7 +1742,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_manage_runtime_files" lineno="146">
+<interface name="kismet_manage_runtime_files" lineno="115">
<summary>
Create, read, write, and delete
kismet runtime files.
@@ -1684,7 +1753,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_search_lib" lineno="165">
+<interface name="kismet_search_lib" lineno="134">
<summary>
Search kismet lib directories.
</summary>
@@ -1694,7 +1763,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_read_lib_files" lineno="184">
+<interface name="kismet_read_lib_files" lineno="153">
<summary>
Read kismet lib files.
</summary>
@@ -1704,7 +1773,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_manage_lib_files" lineno="205">
+<interface name="kismet_manage_lib_files" lineno="174">
<summary>
Create, read, write, and delete
kismet lib files.
@@ -1715,7 +1784,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_manage_lib" lineno="225">
+<interface name="kismet_manage_lib" lineno="194">
<summary>
Create, read, write, and delete
kismet lib content.
@@ -1726,7 +1795,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_read_log" lineno="247">
+<interface name="kismet_read_log" lineno="216">
<summary>
Read kismet log files.
</summary>
@@ -1737,7 +1806,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kismet_append_log" lineno="266">
+<interface name="kismet_append_log" lineno="235">
<summary>
Append kismet log files.
</summary>
@@ -1747,7 +1816,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_manage_log" lineno="286">
+<interface name="kismet_manage_log" lineno="255">
<summary>
Create, read, write, and delete
kismet log content.
@@ -1758,7 +1827,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_admin" lineno="314">
+<interface name="kismet_admin" lineno="283">
<summary>
All of the rules required to
administrate an kismet environment.
@@ -3212,49 +3281,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="rpm_read_pid_files" lineno="538">
-<summary>
-Read rpm pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rpm_manage_pid_files" lineno="553">
-<summary>
-Create, read, write, and delete
-rpm pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rpm_pid_filetrans_rpm_pid" lineno="579">
-<summary>
-Create specified objects in pid directories
-with the rpm pid file type. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="object_class">
-<summary>
-Class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="rpm_manage_runtime_files" lineno="594">
+<interface name="rpm_manage_runtime_files" lineno="539">
<summary>
Create, read, write, and delete
rpm runtime files.
@@ -3265,7 +3292,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpm_admin" lineno="620">
+<interface name="rpm_admin" lineno="565">
<summary>
All of the rules required to
administrate an rpm environment.
@@ -3384,18 +3411,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="samhain_manage_pid_files" lineno="187">
-<summary>
-Create, read, write, and delete
-samhain pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="samhain_admin" lineno="208">
+<interface name="samhain_admin" lineno="193">
<summary>
All of the rules required to
administrate the samhain environment.
@@ -3425,17 +3441,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="sblim_read_pid_files" lineno="32">
-<summary>
-Read gatherd pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="sblim_admin" lineno="53">
+<interface name="sblim_admin" lineno="39">
<summary>
All of the rules required to
administrate an sblim environment.
@@ -3817,7 +3823,7 @@ Role allowed access
</summary>
</param>
</template>
-<interface name="sudo_sigchld" lineno="220">
+<interface name="sudo_sigchld" lineno="232">
<summary>
Send a SIGCHLD signal to the sudo domain.
</summary>
@@ -7485,17 +7491,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_delete_pid_sock_file" lineno="293">
-<summary>
-Unlink qemu socket (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="qemu_delete_runtime_sock_files" lineno="308">
+<interface name="qemu_delete_runtime_sock_files" lineno="293">
<summary>
Unlink qemu runtime sockets.
</summary>
@@ -7505,7 +7501,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_domtrans_unconfined" lineno="327">
+<interface name="qemu_domtrans_unconfined" lineno="312">
<summary>
Execute a domain transition to
run qemu unconfined.
@@ -7516,7 +7512,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="qemu_manage_tmp_dirs" lineno="347">
+<interface name="qemu_manage_tmp_dirs" lineno="332">
<summary>
Create, read, write, and delete
qemu temporary directories.
@@ -7527,7 +7523,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_manage_tmp_files" lineno="367">
+<interface name="qemu_manage_tmp_files" lineno="352">
<summary>
Create, read, write, and delete
qemu temporary files.
@@ -7538,7 +7534,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_spec_domtrans" lineno="401">
+<interface name="qemu_spec_domtrans" lineno="386">
<summary>
Execute qemu in a specified domain.
</summary>
@@ -7563,7 +7559,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="qemu_entry_type" lineno="421">
+<interface name="qemu_entry_type" lineno="406">
<summary>
Make qemu executable files an
entrypoint for the specified domain.
@@ -7574,7 +7570,7 @@ The domain for which qemu_exec_t is an entrypoint.
</summary>
</param>
</interface>
-<interface name="qemu_rw_pid_sock_files" lineno="441">
+<interface name="qemu_rw_pid_sock_files" lineno="426">
<summary>
Read/write to qemu socket files in /var/run
</summary>
@@ -7702,6 +7698,17 @@ Domain allowed access.
</summary>
</param>
</interface>
+<interface name="screen_dontaudit_getattr_sock_file" lineno="134">
+<summary>
+Do not audit attempts to get the attributes
+of the screen runtime named socket.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
</module>
<module name="seunshare" filename="policy/modules/apps/seunshare.if">
<summary>Filesystem namespacing/polyinstantiation application.</summary>
@@ -9564,6 +9571,49 @@ Allow phpfpm to send syslog messages
</p>
</desc>
</tunable>
+<tunable name="phpfpm_exec_shell" dftval="false">
+<desc>
+<p>
+Allow phpfpm to execute shells. This
+is needed by some webapps.
+</p>
+</desc>
+</tunable>
+<tunable name="phpfpm_connect_http" dftval="false">
+<desc>
+<p>
+Allow phpfpm to connect to http ports.
+</p>
+</desc>
+</tunable>
+<tunable name="phpfpm_connect_pop" dftval="false">
+<desc>
+<p>
+Allow phpfpm to connect to pop ports.
+</p>
+</desc>
+</tunable>
+<tunable name="phpfpm_connect_redis" dftval="false">
+<desc>
+<p>
+Allow phpfpm to connect to redis ports.
+</p>
+</desc>
+</tunable>
+<tunable name="phpfpm_connect_sieve" dftval="false">
+<desc>
+<p>
+Allow phpfpm to connect to sieve ports.
+</p>
+</desc>
+</tunable>
+<tunable name="phpfpm_connect_smtp" dftval="false">
+<desc>
+<p>
+Allow phpfpm to connect to smtp ports.
+</p>
+</desc>
+</tunable>
</module>
<module name="resolvconf" filename="policy/modules/contrib/resolvconf.if">
<summary>OpenResolv network configuration management</summary>
@@ -9922,19 +9972,19 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_dontaudit_write_bin_dirs" lineno="137">
+<interface name="corecmd_watch_bin_dirs" lineno="137">
<summary>
-Do not audit attempts to write bin directories.
+Watch bin directories.
</summary>
<param name="domain">
<summary>
-Domain to not audit.
+Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_watch_bin_dirs" lineno="155">
+<interface name="corecmd_mounton_bin_dirs" lineno="155">
<summary>
-Watch bin directories.
+Mount on bin directories.
</summary>
<param name="domain">
<summary>
@@ -9942,7 +9992,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_getattr_bin_files" lineno="173">
+<interface name="corecmd_dontaudit_write_bin_dirs" lineno="173">
+<summary>
+Do not audit attempts to write bin directories.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="corecmd_getattr_bin_files" lineno="191">
<summary>
Get the attributes of files in bin directories.
</summary>
@@ -9952,7 +10012,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_dontaudit_getattr_bin_files" lineno="192">
+<interface name="corecmd_dontaudit_getattr_bin_files" lineno="210">
<summary>
Do not audit attempts to get the attributes of files in bin directories.
</summary>
@@ -9962,7 +10022,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corecmd_check_exec_bin_files" lineno="211">
+<interface name="corecmd_check_exec_bin_files" lineno="229">
<summary>
Check if files in bin directories are executable (DAC-wise)
</summary>
@@ -9972,7 +10032,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_read_bin_files" lineno="230">
+<interface name="corecmd_read_bin_files" lineno="248">
<summary>
Read files in bin directories.
</summary>
@@ -9982,7 +10042,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_dontaudit_write_bin_files" lineno="249">
+<interface name="corecmd_dontaudit_write_bin_files" lineno="267">
<summary>
Do not audit attempts to write bin files.
</summary>
@@ -9992,7 +10052,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corecmd_read_bin_pipes" lineno="267">
+<interface name="corecmd_read_bin_pipes" lineno="285">
<summary>
Read pipes in bin directories.
</summary>
@@ -10002,7 +10062,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_read_bin_sockets" lineno="286">
+<interface name="corecmd_read_bin_sockets" lineno="304">
<summary>
Read named sockets in bin directories.
</summary>
@@ -10012,7 +10072,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_exec_bin" lineno="326">
+<interface name="corecmd_exec_bin" lineno="344">
<summary>
Execute generic programs in bin directories,
in the caller domain.
@@ -10043,7 +10103,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_manage_bin_files" lineno="345">
+<interface name="corecmd_manage_bin_files" lineno="363">
<summary>
Create, read, write, and delete bin files.
</summary>
@@ -10053,7 +10113,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_manage_bin_symlinks" lineno="364">
+<interface name="corecmd_manage_bin_symlinks" lineno="382">
<summary>
Manage symlinks for bin files.
</summary>
@@ -10063,7 +10123,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_relabel_bin_files" lineno="383">
+<interface name="corecmd_relabel_bin_files" lineno="401">
<summary>
Relabel to and from the bin type.
</summary>
@@ -10073,7 +10133,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_mmap_bin_files" lineno="402">
+<interface name="corecmd_mmap_bin_files" lineno="420">
<summary>
Mmap a bin file as executable.
</summary>
@@ -10083,7 +10143,34 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_bin_spec_domtrans" lineno="447">
+<interface name="corecmd_bin_filetrans" lineno="456">
+<summary>
+Create objects in bin directories
+with an automatic transition to a
+private type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="file_type">
+<summary>
+The type of the object being created.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="corecmd_bin_spec_domtrans" lineno="501">
<summary>
Execute a file in a bin directory
in the specified domain but do not
@@ -10119,7 +10206,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="corecmd_bin_domtrans" lineno="490">
+<interface name="corecmd_bin_domtrans" lineno="544">
<summary>
Execute a file in a bin directory
in the specified domain.
@@ -10153,7 +10240,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="corecmd_check_exec_shell" lineno="509">
+<interface name="corecmd_check_exec_shell" lineno="563">
<summary>
Check if a shell is executable (DAC-wise).
</summary>
@@ -10163,7 +10250,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_exec_shell" lineno="546">
+<interface name="corecmd_exec_shell" lineno="600">
<summary>
Execute shells in the caller domain.
</summary>
@@ -10191,7 +10278,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_shell_spec_domtrans" lineno="584">
+<interface name="corecmd_shell_spec_domtrans" lineno="638">
<summary>
Execute a shell in the target domain. This
is an explicit transition, requiring the
@@ -10220,7 +10307,7 @@ The type of the shell process.
</summary>
</param>
</interface>
-<interface name="corecmd_shell_domtrans" lineno="618">
+<interface name="corecmd_shell_domtrans" lineno="672">
<summary>
Execute a shell in the specified domain.
</summary>
@@ -10245,7 +10332,7 @@ The type of the shell process.
</summary>
</param>
</interface>
-<interface name="corecmd_exec_chroot" lineno="637">
+<interface name="corecmd_exec_chroot" lineno="691">
<summary>
Execute chroot in the caller domain.
</summary>
@@ -10255,7 +10342,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_getattr_all_executables" lineno="658">
+<interface name="corecmd_getattr_all_executables" lineno="712">
<summary>
Get the attributes of all executable files.
</summary>
@@ -10266,7 +10353,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_read_all_executables" lineno="679">
+<interface name="corecmd_read_all_executables" lineno="733">
<summary>
Read all executable files.
</summary>
@@ -10277,7 +10364,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_exec_all_executables" lineno="699">
+<interface name="corecmd_exec_all_executables" lineno="753">
<summary>
Execute all executable files.
</summary>
@@ -10288,7 +10375,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_dontaudit_exec_all_executables" lineno="720">
+<interface name="corecmd_dontaudit_exec_all_executables" lineno="774">
<summary>
Do not audit attempts to execute all executables.
</summary>
@@ -10298,7 +10385,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corecmd_manage_all_executables" lineno="739">
+<interface name="corecmd_manage_all_executables" lineno="793">
<summary>
Create, read, write, and all executable files.
</summary>
@@ -10309,7 +10396,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_relabel_all_executables" lineno="761">
+<interface name="corecmd_relabel_all_executables" lineno="815">
<summary>
Relabel to and from the bin type.
</summary>
@@ -10320,7 +10407,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_mmap_all_executables" lineno="781">
+<interface name="corecmd_mmap_all_executables" lineno="835">
<summary>
Mmap all executables as executable.
</summary>
@@ -10330,7 +10417,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_relabel_bin_dirs" lineno="803">
+<interface name="corecmd_relabel_bin_dirs" lineno="857">
<summary>
Relabel to and from the bin type.
</summary>
@@ -10340,7 +10427,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_relabel_bin_lnk_files" lineno="821">
+<interface name="corecmd_relabel_bin_lnk_files" lineno="875">
<summary>
Relabel to and from the bin type.
</summary>
@@ -12610,85 +12697,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_adb_port" lineno="3684">
-<summary>
-Send and receive TCP traffic on the adb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_adb_port" lineno="3699">
-<summary>
-Send UDP traffic on the adb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3714">
-<summary>
-Do not audit attempts to send UDP traffic on the adb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_adb_port" lineno="3729">
-<summary>
-Receive UDP traffic on the adb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3744">
-<summary>
-Do not audit attempts to receive UDP traffic on the adb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_adb_port" lineno="3759">
-<summary>
-Send and receive UDP traffic on the adb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3775">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the adb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_adb_port" lineno="3790">
+<interface name="corenet_tcp_bind_adb_port" lineno="3684">
<summary>
Bind TCP sockets to the adb port.
</summary>
@@ -12699,7 +12708,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_adb_port" lineno="3810">
+<interface name="corenet_udp_bind_adb_port" lineno="3704">
<summary>
Bind UDP sockets to the adb port.
</summary>
@@ -12710,7 +12719,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_adb_port" lineno="3829">
+<interface name="corenet_tcp_connect_adb_port" lineno="3723">
<summary>
Make a TCP connection to the adb port.
</summary>
@@ -12720,7 +12729,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_adb_client_packets" lineno="3849">
+<interface name="corenet_send_adb_client_packets" lineno="3743">
<summary>
Send adb_client packets.
</summary>
@@ -12731,7 +12740,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3868">
+<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3762">
<summary>
Do not audit attempts to send adb_client packets.
</summary>
@@ -12742,7 +12751,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_adb_client_packets" lineno="3887">
+<interface name="corenet_receive_adb_client_packets" lineno="3781">
<summary>
Receive adb_client packets.
</summary>
@@ -12753,7 +12762,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3906">
+<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3800">
<summary>
Do not audit attempts to receive adb_client packets.
</summary>
@@ -12764,7 +12773,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_adb_client_packets" lineno="3925">
+<interface name="corenet_sendrecv_adb_client_packets" lineno="3819">
<summary>
Send and receive adb_client packets.
</summary>
@@ -12775,7 +12784,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3941">
+<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3835">
<summary>
Do not audit attempts to send and receive adb_client packets.
</summary>
@@ -12786,7 +12795,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_adb_client_packets" lineno="3956">
+<interface name="corenet_relabelto_adb_client_packets" lineno="3850">
<summary>
Relabel packets to adb_client the packet type.
</summary>
@@ -12796,7 +12805,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_adb_server_packets" lineno="3976">
+<interface name="corenet_send_adb_server_packets" lineno="3870">
<summary>
Send adb_server packets.
</summary>
@@ -12807,7 +12816,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3995">
+<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3889">
<summary>
Do not audit attempts to send adb_server packets.
</summary>
@@ -12818,7 +12827,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_adb_server_packets" lineno="4014">
+<interface name="corenet_receive_adb_server_packets" lineno="3908">
<summary>
Receive adb_server packets.
</summary>
@@ -12829,7 +12838,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="4033">
+<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="3927">
<summary>
Do not audit attempts to receive adb_server packets.
</summary>
@@ -12840,7 +12849,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_adb_server_packets" lineno="4052">
+<interface name="corenet_sendrecv_adb_server_packets" lineno="3946">
<summary>
Send and receive adb_server packets.
</summary>
@@ -12851,7 +12860,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4068">
+<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="3962">
<summary>
Do not audit attempts to send and receive adb_server packets.
</summary>
@@ -12862,7 +12871,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_adb_server_packets" lineno="4083">
+<interface name="corenet_relabelto_adb_server_packets" lineno="3977">
<summary>
Relabel packets to adb_server the packet type.
</summary>
@@ -12872,85 +12881,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4105">
-<summary>
-Send and receive TCP traffic on the afs_bos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_afs_bos_port" lineno="4120">
-<summary>
-Send UDP traffic on the afs_bos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4135">
-<summary>
-Do not audit attempts to send UDP traffic on the afs_bos port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_afs_bos_port" lineno="4150">
-<summary>
-Receive UDP traffic on the afs_bos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4165">
-<summary>
-Do not audit attempts to receive UDP traffic on the afs_bos port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4180">
-<summary>
-Send and receive UDP traffic on the afs_bos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4196">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the afs_bos port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_afs_bos_port" lineno="4211">
+<interface name="corenet_tcp_bind_afs_bos_port" lineno="3999">
<summary>
Bind TCP sockets to the afs_bos port.
</summary>
@@ -12961,7 +12892,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_bos_port" lineno="4231">
+<interface name="corenet_udp_bind_afs_bos_port" lineno="4019">
<summary>
Bind UDP sockets to the afs_bos port.
</summary>
@@ -12972,7 +12903,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_bos_port" lineno="4250">
+<interface name="corenet_tcp_connect_afs_bos_port" lineno="4038">
<summary>
Make a TCP connection to the afs_bos port.
</summary>
@@ -12982,7 +12913,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_bos_client_packets" lineno="4270">
+<interface name="corenet_send_afs_bos_client_packets" lineno="4058">
<summary>
Send afs_bos_client packets.
</summary>
@@ -12993,7 +12924,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4289">
+<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4077">
<summary>
Do not audit attempts to send afs_bos_client packets.
</summary>
@@ -13004,7 +12935,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_bos_client_packets" lineno="4308">
+<interface name="corenet_receive_afs_bos_client_packets" lineno="4096">
<summary>
Receive afs_bos_client packets.
</summary>
@@ -13015,7 +12946,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4327">
+<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4115">
<summary>
Do not audit attempts to receive afs_bos_client packets.
</summary>
@@ -13026,7 +12957,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4346">
+<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4134">
<summary>
Send and receive afs_bos_client packets.
</summary>
@@ -13037,7 +12968,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4362">
+<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4150">
<summary>
Do not audit attempts to send and receive afs_bos_client packets.
</summary>
@@ -13048,7 +12979,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4377">
+<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4165">
<summary>
Relabel packets to afs_bos_client the packet type.
</summary>
@@ -13058,7 +12989,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_bos_server_packets" lineno="4397">
+<interface name="corenet_send_afs_bos_server_packets" lineno="4185">
<summary>
Send afs_bos_server packets.
</summary>
@@ -13069,7 +13000,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4416">
+<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4204">
<summary>
Do not audit attempts to send afs_bos_server packets.
</summary>
@@ -13080,7 +13011,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_bos_server_packets" lineno="4435">
+<interface name="corenet_receive_afs_bos_server_packets" lineno="4223">
<summary>
Receive afs_bos_server packets.
</summary>
@@ -13091,7 +13022,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4454">
+<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4242">
<summary>
Do not audit attempts to receive afs_bos_server packets.
</summary>
@@ -13102,7 +13033,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4473">
+<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4261">
<summary>
Send and receive afs_bos_server packets.
</summary>
@@ -13113,7 +13044,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4489">
+<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4277">
<summary>
Do not audit attempts to send and receive afs_bos_server packets.
</summary>
@@ -13124,7 +13055,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4504">
+<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4292">
<summary>
Relabel packets to afs_bos_server the packet type.
</summary>
@@ -13134,85 +13065,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4526">
-<summary>
-Send and receive TCP traffic on the afs_fs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_afs_fs_port" lineno="4541">
-<summary>
-Send UDP traffic on the afs_fs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4556">
-<summary>
-Do not audit attempts to send UDP traffic on the afs_fs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_afs_fs_port" lineno="4571">
-<summary>
-Receive UDP traffic on the afs_fs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4586">
-<summary>
-Do not audit attempts to receive UDP traffic on the afs_fs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4601">
-<summary>
-Send and receive UDP traffic on the afs_fs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4617">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the afs_fs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_afs_fs_port" lineno="4632">
+<interface name="corenet_tcp_bind_afs_fs_port" lineno="4314">
<summary>
Bind TCP sockets to the afs_fs port.
</summary>
@@ -13223,7 +13076,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_fs_port" lineno="4652">
+<interface name="corenet_udp_bind_afs_fs_port" lineno="4334">
<summary>
Bind UDP sockets to the afs_fs port.
</summary>
@@ -13234,7 +13087,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_fs_port" lineno="4671">
+<interface name="corenet_tcp_connect_afs_fs_port" lineno="4353">
<summary>
Make a TCP connection to the afs_fs port.
</summary>
@@ -13244,7 +13097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_fs_client_packets" lineno="4691">
+<interface name="corenet_send_afs_fs_client_packets" lineno="4373">
<summary>
Send afs_fs_client packets.
</summary>
@@ -13255,7 +13108,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4710">
+<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4392">
<summary>
Do not audit attempts to send afs_fs_client packets.
</summary>
@@ -13266,7 +13119,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_fs_client_packets" lineno="4729">
+<interface name="corenet_receive_afs_fs_client_packets" lineno="4411">
<summary>
Receive afs_fs_client packets.
</summary>
@@ -13277,7 +13130,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4748">
+<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4430">
<summary>
Do not audit attempts to receive afs_fs_client packets.
</summary>
@@ -13288,7 +13141,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4767">
+<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4449">
<summary>
Send and receive afs_fs_client packets.
</summary>
@@ -13299,7 +13152,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4783">
+<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4465">
<summary>
Do not audit attempts to send and receive afs_fs_client packets.
</summary>
@@ -13310,7 +13163,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4798">
+<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4480">
<summary>
Relabel packets to afs_fs_client the packet type.
</summary>
@@ -13320,7 +13173,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_fs_server_packets" lineno="4818">
+<interface name="corenet_send_afs_fs_server_packets" lineno="4500">
<summary>
Send afs_fs_server packets.
</summary>
@@ -13331,7 +13184,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4837">
+<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4519">
<summary>
Do not audit attempts to send afs_fs_server packets.
</summary>
@@ -13342,7 +13195,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_fs_server_packets" lineno="4856">
+<interface name="corenet_receive_afs_fs_server_packets" lineno="4538">
<summary>
Receive afs_fs_server packets.
</summary>
@@ -13353,7 +13206,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4875">
+<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4557">
<summary>
Do not audit attempts to receive afs_fs_server packets.
</summary>
@@ -13364,7 +13217,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4894">
+<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4576">
<summary>
Send and receive afs_fs_server packets.
</summary>
@@ -13375,7 +13228,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4910">
+<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4592">
<summary>
Do not audit attempts to send and receive afs_fs_server packets.
</summary>
@@ -13386,7 +13239,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4925">
+<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4607">
<summary>
Relabel packets to afs_fs_server the packet type.
</summary>
@@ -13396,85 +13249,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4947">
-<summary>
-Send and receive TCP traffic on the afs_ka port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_afs_ka_port" lineno="4962">
-<summary>
-Send UDP traffic on the afs_ka port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4977">
-<summary>
-Do not audit attempts to send UDP traffic on the afs_ka port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_afs_ka_port" lineno="4992">
-<summary>
-Receive UDP traffic on the afs_ka port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="5007">
-<summary>
-Do not audit attempts to receive UDP traffic on the afs_ka port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5022">
-<summary>
-Send and receive UDP traffic on the afs_ka port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5038">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the afs_ka port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_afs_ka_port" lineno="5053">
+<interface name="corenet_tcp_bind_afs_ka_port" lineno="4629">
<summary>
Bind TCP sockets to the afs_ka port.
</summary>
@@ -13485,7 +13260,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_ka_port" lineno="5073">
+<interface name="corenet_udp_bind_afs_ka_port" lineno="4649">
<summary>
Bind UDP sockets to the afs_ka port.
</summary>
@@ -13496,7 +13271,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_ka_port" lineno="5092">
+<interface name="corenet_tcp_connect_afs_ka_port" lineno="4668">
<summary>
Make a TCP connection to the afs_ka port.
</summary>
@@ -13506,7 +13281,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_ka_client_packets" lineno="5112">
+<interface name="corenet_send_afs_ka_client_packets" lineno="4688">
<summary>
Send afs_ka_client packets.
</summary>
@@ -13517,7 +13292,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5131">
+<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="4707">
<summary>
Do not audit attempts to send afs_ka_client packets.
</summary>
@@ -13528,7 +13303,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_ka_client_packets" lineno="5150">
+<interface name="corenet_receive_afs_ka_client_packets" lineno="4726">
<summary>
Receive afs_ka_client packets.
</summary>
@@ -13539,7 +13314,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5169">
+<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="4745">
<summary>
Do not audit attempts to receive afs_ka_client packets.
</summary>
@@ -13550,7 +13325,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5188">
+<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="4764">
<summary>
Send and receive afs_ka_client packets.
</summary>
@@ -13561,7 +13336,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5204">
+<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="4780">
<summary>
Do not audit attempts to send and receive afs_ka_client packets.
</summary>
@@ -13572,7 +13347,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5219">
+<interface name="corenet_relabelto_afs_ka_client_packets" lineno="4795">
<summary>
Relabel packets to afs_ka_client the packet type.
</summary>
@@ -13582,7 +13357,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_ka_server_packets" lineno="5239">
+<interface name="corenet_send_afs_ka_server_packets" lineno="4815">
<summary>
Send afs_ka_server packets.
</summary>
@@ -13593,7 +13368,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5258">
+<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="4834">
<summary>
Do not audit attempts to send afs_ka_server packets.
</summary>
@@ -13604,7 +13379,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_ka_server_packets" lineno="5277">
+<interface name="corenet_receive_afs_ka_server_packets" lineno="4853">
<summary>
Receive afs_ka_server packets.
</summary>
@@ -13615,7 +13390,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5296">
+<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="4872">
<summary>
Do not audit attempts to receive afs_ka_server packets.
</summary>
@@ -13626,7 +13401,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5315">
+<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="4891">
<summary>
Send and receive afs_ka_server packets.
</summary>
@@ -13637,7 +13412,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5331">
+<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="4907">
<summary>
Do not audit attempts to send and receive afs_ka_server packets.
</summary>
@@ -13648,7 +13423,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5346">
+<interface name="corenet_relabelto_afs_ka_server_packets" lineno="4922">
<summary>
Relabel packets to afs_ka_server the packet type.
</summary>
@@ -13658,85 +13433,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5368">
-<summary>
-Send and receive TCP traffic on the afs_pt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_afs_pt_port" lineno="5383">
-<summary>
-Send UDP traffic on the afs_pt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5398">
-<summary>
-Do not audit attempts to send UDP traffic on the afs_pt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_afs_pt_port" lineno="5413">
-<summary>
-Receive UDP traffic on the afs_pt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5428">
-<summary>
-Do not audit attempts to receive UDP traffic on the afs_pt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5443">
-<summary>
-Send and receive UDP traffic on the afs_pt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5459">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the afs_pt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_afs_pt_port" lineno="5474">
+<interface name="corenet_tcp_bind_afs_pt_port" lineno="4944">
<summary>
Bind TCP sockets to the afs_pt port.
</summary>
@@ -13747,7 +13444,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_pt_port" lineno="5494">
+<interface name="corenet_udp_bind_afs_pt_port" lineno="4964">
<summary>
Bind UDP sockets to the afs_pt port.
</summary>
@@ -13758,7 +13455,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_pt_port" lineno="5513">
+<interface name="corenet_tcp_connect_afs_pt_port" lineno="4983">
<summary>
Make a TCP connection to the afs_pt port.
</summary>
@@ -13768,7 +13465,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_pt_client_packets" lineno="5533">
+<interface name="corenet_send_afs_pt_client_packets" lineno="5003">
<summary>
Send afs_pt_client packets.
</summary>
@@ -13779,7 +13476,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5552">
+<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5022">
<summary>
Do not audit attempts to send afs_pt_client packets.
</summary>
@@ -13790,7 +13487,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_pt_client_packets" lineno="5571">
+<interface name="corenet_receive_afs_pt_client_packets" lineno="5041">
<summary>
Receive afs_pt_client packets.
</summary>
@@ -13801,7 +13498,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5590">
+<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5060">
<summary>
Do not audit attempts to receive afs_pt_client packets.
</summary>
@@ -13812,7 +13509,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5609">
+<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5079">
<summary>
Send and receive afs_pt_client packets.
</summary>
@@ -13823,7 +13520,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5625">
+<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5095">
<summary>
Do not audit attempts to send and receive afs_pt_client packets.
</summary>
@@ -13834,7 +13531,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5640">
+<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5110">
<summary>
Relabel packets to afs_pt_client the packet type.
</summary>
@@ -13844,7 +13541,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_pt_server_packets" lineno="5660">
+<interface name="corenet_send_afs_pt_server_packets" lineno="5130">
<summary>
Send afs_pt_server packets.
</summary>
@@ -13855,7 +13552,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5679">
+<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5149">
<summary>
Do not audit attempts to send afs_pt_server packets.
</summary>
@@ -13866,7 +13563,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_pt_server_packets" lineno="5698">
+<interface name="corenet_receive_afs_pt_server_packets" lineno="5168">
<summary>
Receive afs_pt_server packets.
</summary>
@@ -13877,7 +13574,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5717">
+<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5187">
<summary>
Do not audit attempts to receive afs_pt_server packets.
</summary>
@@ -13888,7 +13585,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5736">
+<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5206">
<summary>
Send and receive afs_pt_server packets.
</summary>
@@ -13899,7 +13596,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5752">
+<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5222">
<summary>
Do not audit attempts to send and receive afs_pt_server packets.
</summary>
@@ -13910,7 +13607,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5767">
+<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5237">
<summary>
Relabel packets to afs_pt_server the packet type.
</summary>
@@ -13920,85 +13617,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5789">
-<summary>
-Send and receive TCP traffic on the afs_vl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_afs_vl_port" lineno="5804">
-<summary>
-Send UDP traffic on the afs_vl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5819">
-<summary>
-Do not audit attempts to send UDP traffic on the afs_vl port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_afs_vl_port" lineno="5834">
-<summary>
-Receive UDP traffic on the afs_vl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5849">
-<summary>
-Do not audit attempts to receive UDP traffic on the afs_vl port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5864">
-<summary>
-Send and receive UDP traffic on the afs_vl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5880">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the afs_vl port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_afs_vl_port" lineno="5895">
+<interface name="corenet_tcp_bind_afs_vl_port" lineno="5259">
<summary>
Bind TCP sockets to the afs_vl port.
</summary>
@@ -14009,7 +13628,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_vl_port" lineno="5915">
+<interface name="corenet_udp_bind_afs_vl_port" lineno="5279">
<summary>
Bind UDP sockets to the afs_vl port.
</summary>
@@ -14020,7 +13639,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_vl_port" lineno="5934">
+<interface name="corenet_tcp_connect_afs_vl_port" lineno="5298">
<summary>
Make a TCP connection to the afs_vl port.
</summary>
@@ -14030,7 +13649,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_vl_client_packets" lineno="5954">
+<interface name="corenet_send_afs_vl_client_packets" lineno="5318">
<summary>
Send afs_vl_client packets.
</summary>
@@ -14041,7 +13660,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5973">
+<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5337">
<summary>
Do not audit attempts to send afs_vl_client packets.
</summary>
@@ -14052,7 +13671,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_vl_client_packets" lineno="5992">
+<interface name="corenet_receive_afs_vl_client_packets" lineno="5356">
<summary>
Receive afs_vl_client packets.
</summary>
@@ -14063,7 +13682,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="6011">
+<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5375">
<summary>
Do not audit attempts to receive afs_vl_client packets.
</summary>
@@ -14074,7 +13693,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6030">
+<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="5394">
<summary>
Send and receive afs_vl_client packets.
</summary>
@@ -14085,7 +13704,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6046">
+<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="5410">
<summary>
Do not audit attempts to send and receive afs_vl_client packets.
</summary>
@@ -14096,7 +13715,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6061">
+<interface name="corenet_relabelto_afs_vl_client_packets" lineno="5425">
<summary>
Relabel packets to afs_vl_client the packet type.
</summary>
@@ -14106,7 +13725,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_vl_server_packets" lineno="6081">
+<interface name="corenet_send_afs_vl_server_packets" lineno="5445">
<summary>
Send afs_vl_server packets.
</summary>
@@ -14117,7 +13736,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6100">
+<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="5464">
<summary>
Do not audit attempts to send afs_vl_server packets.
</summary>
@@ -14128,7 +13747,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_vl_server_packets" lineno="6119">
+<interface name="corenet_receive_afs_vl_server_packets" lineno="5483">
<summary>
Receive afs_vl_server packets.
</summary>
@@ -14139,7 +13758,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6138">
+<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="5502">
<summary>
Do not audit attempts to receive afs_vl_server packets.
</summary>
@@ -14150,7 +13769,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6157">
+<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="5521">
<summary>
Send and receive afs_vl_server packets.
</summary>
@@ -14161,7 +13780,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6173">
+<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="5537">
<summary>
Do not audit attempts to send and receive afs_vl_server packets.
</summary>
@@ -14172,7 +13791,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6188">
+<interface name="corenet_relabelto_afs_vl_server_packets" lineno="5552">
<summary>
Relabel packets to afs_vl_server the packet type.
</summary>
@@ -14182,85 +13801,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6210">
-<summary>
-Send and receive TCP traffic on the afs3_callback port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_afs3_callback_port" lineno="6225">
-<summary>
-Send UDP traffic on the afs3_callback port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6240">
-<summary>
-Do not audit attempts to send UDP traffic on the afs3_callback port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_afs3_callback_port" lineno="6255">
-<summary>
-Receive UDP traffic on the afs3_callback port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6270">
-<summary>
-Do not audit attempts to receive UDP traffic on the afs3_callback port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6285">
-<summary>
-Send and receive UDP traffic on the afs3_callback port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6301">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the afs3_callback port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6316">
+<interface name="corenet_tcp_bind_afs3_callback_port" lineno="5574">
<summary>
Bind TCP sockets to the afs3_callback port.
</summary>
@@ -14271,7 +13812,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs3_callback_port" lineno="6336">
+<interface name="corenet_udp_bind_afs3_callback_port" lineno="5594">
<summary>
Bind UDP sockets to the afs3_callback port.
</summary>
@@ -14282,7 +13823,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6355">
+<interface name="corenet_tcp_connect_afs3_callback_port" lineno="5613">
<summary>
Make a TCP connection to the afs3_callback port.
</summary>
@@ -14292,7 +13833,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs3_callback_client_packets" lineno="6375">
+<interface name="corenet_send_afs3_callback_client_packets" lineno="5633">
<summary>
Send afs3_callback_client packets.
</summary>
@@ -14303,7 +13844,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6394">
+<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="5652">
<summary>
Do not audit attempts to send afs3_callback_client packets.
</summary>
@@ -14314,7 +13855,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs3_callback_client_packets" lineno="6413">
+<interface name="corenet_receive_afs3_callback_client_packets" lineno="5671">
<summary>
Receive afs3_callback_client packets.
</summary>
@@ -14325,7 +13866,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6432">
+<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="5690">
<summary>
Do not audit attempts to receive afs3_callback_client packets.
</summary>
@@ -14336,7 +13877,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6451">
+<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="5709">
<summary>
Send and receive afs3_callback_client packets.
</summary>
@@ -14347,7 +13888,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6467">
+<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="5725">
<summary>
Do not audit attempts to send and receive afs3_callback_client packets.
</summary>
@@ -14358,7 +13899,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6482">
+<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="5740">
<summary>
Relabel packets to afs3_callback_client the packet type.
</summary>
@@ -14368,7 +13909,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs3_callback_server_packets" lineno="6502">
+<interface name="corenet_send_afs3_callback_server_packets" lineno="5760">
<summary>
Send afs3_callback_server packets.
</summary>
@@ -14379,7 +13920,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6521">
+<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="5779">
<summary>
Do not audit attempts to send afs3_callback_server packets.
</summary>
@@ -14390,7 +13931,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs3_callback_server_packets" lineno="6540">
+<interface name="corenet_receive_afs3_callback_server_packets" lineno="5798">
<summary>
Receive afs3_callback_server packets.
</summary>
@@ -14401,7 +13942,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6559">
+<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="5817">
<summary>
Do not audit attempts to receive afs3_callback_server packets.
</summary>
@@ -14412,7 +13953,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6578">
+<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="5836">
<summary>
Send and receive afs3_callback_server packets.
</summary>
@@ -14423,7 +13964,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6594">
+<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="5852">
<summary>
Do not audit attempts to send and receive afs3_callback_server packets.
</summary>
@@ -14434,7 +13975,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6609">
+<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="5867">
<summary>
Relabel packets to afs3_callback_server the packet type.
</summary>
@@ -14444,85 +13985,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6631">
-<summary>
-Send and receive TCP traffic on the agentx port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_agentx_port" lineno="6646">
-<summary>
-Send UDP traffic on the agentx port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6661">
-<summary>
-Do not audit attempts to send UDP traffic on the agentx port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_agentx_port" lineno="6676">
-<summary>
-Receive UDP traffic on the agentx port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6691">
-<summary>
-Do not audit attempts to receive UDP traffic on the agentx port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_agentx_port" lineno="6706">
-<summary>
-Send and receive UDP traffic on the agentx port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6722">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the agentx port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_agentx_port" lineno="6737">
+<interface name="corenet_tcp_bind_agentx_port" lineno="5889">
<summary>
Bind TCP sockets to the agentx port.
</summary>
@@ -14533,7 +13996,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_agentx_port" lineno="6757">
+<interface name="corenet_udp_bind_agentx_port" lineno="5909">
<summary>
Bind UDP sockets to the agentx port.
</summary>
@@ -14544,7 +14007,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_agentx_port" lineno="6776">
+<interface name="corenet_tcp_connect_agentx_port" lineno="5928">
<summary>
Make a TCP connection to the agentx port.
</summary>
@@ -14554,7 +14017,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_agentx_client_packets" lineno="6796">
+<interface name="corenet_send_agentx_client_packets" lineno="5948">
<summary>
Send agentx_client packets.
</summary>
@@ -14565,7 +14028,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6815">
+<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="5967">
<summary>
Do not audit attempts to send agentx_client packets.
</summary>
@@ -14576,7 +14039,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_agentx_client_packets" lineno="6834">
+<interface name="corenet_receive_agentx_client_packets" lineno="5986">
<summary>
Receive agentx_client packets.
</summary>
@@ -14587,7 +14050,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6853">
+<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6005">
<summary>
Do not audit attempts to receive agentx_client packets.
</summary>
@@ -14598,7 +14061,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_agentx_client_packets" lineno="6872">
+<interface name="corenet_sendrecv_agentx_client_packets" lineno="6024">
<summary>
Send and receive agentx_client packets.
</summary>
@@ -14609,7 +14072,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6888">
+<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6040">
<summary>
Do not audit attempts to send and receive agentx_client packets.
</summary>
@@ -14620,7 +14083,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_agentx_client_packets" lineno="6903">
+<interface name="corenet_relabelto_agentx_client_packets" lineno="6055">
<summary>
Relabel packets to agentx_client the packet type.
</summary>
@@ -14630,7 +14093,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_agentx_server_packets" lineno="6923">
+<interface name="corenet_send_agentx_server_packets" lineno="6075">
<summary>
Send agentx_server packets.
</summary>
@@ -14641,7 +14104,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6942">
+<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6094">
<summary>
Do not audit attempts to send agentx_server packets.
</summary>
@@ -14652,7 +14115,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_agentx_server_packets" lineno="6961">
+<interface name="corenet_receive_agentx_server_packets" lineno="6113">
<summary>
Receive agentx_server packets.
</summary>
@@ -14663,7 +14126,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6980">
+<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6132">
<summary>
Do not audit attempts to receive agentx_server packets.
</summary>
@@ -14674,7 +14137,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_agentx_server_packets" lineno="6999">
+<interface name="corenet_sendrecv_agentx_server_packets" lineno="6151">
<summary>
Send and receive agentx_server packets.
</summary>
@@ -14685,7 +14148,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="7015">
+<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6167">
<summary>
Do not audit attempts to send and receive agentx_server packets.
</summary>
@@ -14696,7 +14159,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_agentx_server_packets" lineno="7030">
+<interface name="corenet_relabelto_agentx_server_packets" lineno="6182">
<summary>
Relabel packets to agentx_server the packet type.
</summary>
@@ -14706,85 +14169,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7052">
-<summary>
-Send and receive TCP traffic on the amanda port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_amanda_port" lineno="7067">
-<summary>
-Send UDP traffic on the amanda port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7082">
-<summary>
-Do not audit attempts to send UDP traffic on the amanda port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_amanda_port" lineno="7097">
-<summary>
-Receive UDP traffic on the amanda port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7112">
-<summary>
-Do not audit attempts to receive UDP traffic on the amanda port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_amanda_port" lineno="7127">
-<summary>
-Send and receive UDP traffic on the amanda port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7143">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the amanda port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_amanda_port" lineno="7158">
+<interface name="corenet_tcp_bind_amanda_port" lineno="6204">
<summary>
Bind TCP sockets to the amanda port.
</summary>
@@ -14795,7 +14180,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amanda_port" lineno="7178">
+<interface name="corenet_udp_bind_amanda_port" lineno="6224">
<summary>
Bind UDP sockets to the amanda port.
</summary>
@@ -14806,7 +14191,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amanda_port" lineno="7197">
+<interface name="corenet_tcp_connect_amanda_port" lineno="6243">
<summary>
Make a TCP connection to the amanda port.
</summary>
@@ -14816,7 +14201,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amanda_client_packets" lineno="7217">
+<interface name="corenet_send_amanda_client_packets" lineno="6263">
<summary>
Send amanda_client packets.
</summary>
@@ -14827,7 +14212,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7236">
+<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="6282">
<summary>
Do not audit attempts to send amanda_client packets.
</summary>
@@ -14838,7 +14223,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amanda_client_packets" lineno="7255">
+<interface name="corenet_receive_amanda_client_packets" lineno="6301">
<summary>
Receive amanda_client packets.
</summary>
@@ -14849,7 +14234,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7274">
+<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="6320">
<summary>
Do not audit attempts to receive amanda_client packets.
</summary>
@@ -14860,7 +14245,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amanda_client_packets" lineno="7293">
+<interface name="corenet_sendrecv_amanda_client_packets" lineno="6339">
<summary>
Send and receive amanda_client packets.
</summary>
@@ -14871,7 +14256,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7309">
+<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="6355">
<summary>
Do not audit attempts to send and receive amanda_client packets.
</summary>
@@ -14882,7 +14267,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amanda_client_packets" lineno="7324">
+<interface name="corenet_relabelto_amanda_client_packets" lineno="6370">
<summary>
Relabel packets to amanda_client the packet type.
</summary>
@@ -14892,7 +14277,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amanda_server_packets" lineno="7344">
+<interface name="corenet_send_amanda_server_packets" lineno="6390">
<summary>
Send amanda_server packets.
</summary>
@@ -14903,7 +14288,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7363">
+<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="6409">
<summary>
Do not audit attempts to send amanda_server packets.
</summary>
@@ -14914,7 +14299,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amanda_server_packets" lineno="7382">
+<interface name="corenet_receive_amanda_server_packets" lineno="6428">
<summary>
Receive amanda_server packets.
</summary>
@@ -14925,7 +14310,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7401">
+<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="6447">
<summary>
Do not audit attempts to receive amanda_server packets.
</summary>
@@ -14936,7 +14321,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amanda_server_packets" lineno="7420">
+<interface name="corenet_sendrecv_amanda_server_packets" lineno="6466">
<summary>
Send and receive amanda_server packets.
</summary>
@@ -14947,7 +14332,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7436">
+<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="6482">
<summary>
Do not audit attempts to send and receive amanda_server packets.
</summary>
@@ -14958,7 +14343,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amanda_server_packets" lineno="7451">
+<interface name="corenet_relabelto_amanda_server_packets" lineno="6497">
<summary>
Relabel packets to amanda_server the packet type.
</summary>
@@ -14968,85 +14353,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7473">
-<summary>
-Send and receive TCP traffic on the amavisd_recv port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_amavisd_recv_port" lineno="7488">
-<summary>
-Send UDP traffic on the amavisd_recv port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7503">
-<summary>
-Do not audit attempts to send UDP traffic on the amavisd_recv port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7518">
-<summary>
-Receive UDP traffic on the amavisd_recv port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7533">
-<summary>
-Do not audit attempts to receive UDP traffic on the amavisd_recv port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7548">
-<summary>
-Send and receive UDP traffic on the amavisd_recv port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7564">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the amavisd_recv port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7579">
+<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="6519">
<summary>
Bind TCP sockets to the amavisd_recv port.
</summary>
@@ -15057,7 +14364,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7599">
+<interface name="corenet_udp_bind_amavisd_recv_port" lineno="6539">
<summary>
Bind UDP sockets to the amavisd_recv port.
</summary>
@@ -15068,7 +14375,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7618">
+<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="6558">
<summary>
Make a TCP connection to the amavisd_recv port.
</summary>
@@ -15078,7 +14385,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_recv_client_packets" lineno="7638">
+<interface name="corenet_send_amavisd_recv_client_packets" lineno="6578">
<summary>
Send amavisd_recv_client packets.
</summary>
@@ -15089,7 +14396,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7657">
+<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="6597">
<summary>
Do not audit attempts to send amavisd_recv_client packets.
</summary>
@@ -15100,7 +14407,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7676">
+<interface name="corenet_receive_amavisd_recv_client_packets" lineno="6616">
<summary>
Receive amavisd_recv_client packets.
</summary>
@@ -15111,7 +14418,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7695">
+<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="6635">
<summary>
Do not audit attempts to receive amavisd_recv_client packets.
</summary>
@@ -15122,7 +14429,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7714">
+<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="6654">
<summary>
Send and receive amavisd_recv_client packets.
</summary>
@@ -15133,7 +14440,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7730">
+<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="6670">
<summary>
Do not audit attempts to send and receive amavisd_recv_client packets.
</summary>
@@ -15144,7 +14451,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7745">
+<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="6685">
<summary>
Relabel packets to amavisd_recv_client the packet type.
</summary>
@@ -15154,7 +14461,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_recv_server_packets" lineno="7765">
+<interface name="corenet_send_amavisd_recv_server_packets" lineno="6705">
<summary>
Send amavisd_recv_server packets.
</summary>
@@ -15165,7 +14472,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7784">
+<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="6724">
<summary>
Do not audit attempts to send amavisd_recv_server packets.
</summary>
@@ -15176,7 +14483,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7803">
+<interface name="corenet_receive_amavisd_recv_server_packets" lineno="6743">
<summary>
Receive amavisd_recv_server packets.
</summary>
@@ -15187,7 +14494,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7822">
+<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="6762">
<summary>
Do not audit attempts to receive amavisd_recv_server packets.
</summary>
@@ -15198,7 +14505,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7841">
+<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="6781">
<summary>
Send and receive amavisd_recv_server packets.
</summary>
@@ -15209,7 +14516,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7857">
+<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="6797">
<summary>
Do not audit attempts to send and receive amavisd_recv_server packets.
</summary>
@@ -15220,7 +14527,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7872">
+<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="6812">
<summary>
Relabel packets to amavisd_recv_server the packet type.
</summary>
@@ -15230,85 +14537,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7894">
-<summary>
-Send and receive TCP traffic on the amavisd_send port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_amavisd_send_port" lineno="7909">
-<summary>
-Send UDP traffic on the amavisd_send port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7924">
-<summary>
-Do not audit attempts to send UDP traffic on the amavisd_send port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_amavisd_send_port" lineno="7939">
-<summary>
-Receive UDP traffic on the amavisd_send port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7954">
-<summary>
-Do not audit attempts to receive UDP traffic on the amavisd_send port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7969">
-<summary>
-Send and receive UDP traffic on the amavisd_send port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7985">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the amavisd_send port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_amavisd_send_port" lineno="8000">
+<interface name="corenet_tcp_bind_amavisd_send_port" lineno="6834">
<summary>
Bind TCP sockets to the amavisd_send port.
</summary>
@@ -15319,7 +14548,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amavisd_send_port" lineno="8020">
+<interface name="corenet_udp_bind_amavisd_send_port" lineno="6854">
<summary>
Bind UDP sockets to the amavisd_send port.
</summary>
@@ -15330,7 +14559,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8039">
+<interface name="corenet_tcp_connect_amavisd_send_port" lineno="6873">
<summary>
Make a TCP connection to the amavisd_send port.
</summary>
@@ -15340,7 +14569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_send_client_packets" lineno="8059">
+<interface name="corenet_send_amavisd_send_client_packets" lineno="6893">
<summary>
Send amavisd_send_client packets.
</summary>
@@ -15351,7 +14580,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8078">
+<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="6912">
<summary>
Do not audit attempts to send amavisd_send_client packets.
</summary>
@@ -15362,7 +14591,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_send_client_packets" lineno="8097">
+<interface name="corenet_receive_amavisd_send_client_packets" lineno="6931">
<summary>
Receive amavisd_send_client packets.
</summary>
@@ -15373,7 +14602,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8116">
+<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="6950">
<summary>
Do not audit attempts to receive amavisd_send_client packets.
</summary>
@@ -15384,7 +14613,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8135">
+<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="6969">
<summary>
Send and receive amavisd_send_client packets.
</summary>
@@ -15395,7 +14624,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8151">
+<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="6985">
<summary>
Do not audit attempts to send and receive amavisd_send_client packets.
</summary>
@@ -15406,7 +14635,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8166">
+<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="7000">
<summary>
Relabel packets to amavisd_send_client the packet type.
</summary>
@@ -15416,7 +14645,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_send_server_packets" lineno="8186">
+<interface name="corenet_send_amavisd_send_server_packets" lineno="7020">
<summary>
Send amavisd_send_server packets.
</summary>
@@ -15427,7 +14656,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8205">
+<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="7039">
<summary>
Do not audit attempts to send amavisd_send_server packets.
</summary>
@@ -15438,7 +14667,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_send_server_packets" lineno="8224">
+<interface name="corenet_receive_amavisd_send_server_packets" lineno="7058">
<summary>
Receive amavisd_send_server packets.
</summary>
@@ -15449,7 +14678,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8243">
+<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="7077">
<summary>
Do not audit attempts to receive amavisd_send_server packets.
</summary>
@@ -15460,7 +14689,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8262">
+<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="7096">
<summary>
Send and receive amavisd_send_server packets.
</summary>
@@ -15471,7 +14700,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8278">
+<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="7112">
<summary>
Do not audit attempts to send and receive amavisd_send_server packets.
</summary>
@@ -15482,7 +14711,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8293">
+<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="7127">
<summary>
Relabel packets to amavisd_send_server the packet type.
</summary>
@@ -15492,85 +14721,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8315">
-<summary>
-Send and receive TCP traffic on the amqp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_amqp_port" lineno="8330">
-<summary>
-Send UDP traffic on the amqp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8345">
-<summary>
-Do not audit attempts to send UDP traffic on the amqp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_amqp_port" lineno="8360">
-<summary>
-Receive UDP traffic on the amqp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8375">
-<summary>
-Do not audit attempts to receive UDP traffic on the amqp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_amqp_port" lineno="8390">
-<summary>
-Send and receive UDP traffic on the amqp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8406">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the amqp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_amqp_port" lineno="8421">
+<interface name="corenet_tcp_bind_amqp_port" lineno="7149">
<summary>
Bind TCP sockets to the amqp port.
</summary>
@@ -15581,7 +14732,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amqp_port" lineno="8441">
+<interface name="corenet_udp_bind_amqp_port" lineno="7169">
<summary>
Bind UDP sockets to the amqp port.
</summary>
@@ -15592,7 +14743,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amqp_port" lineno="8460">
+<interface name="corenet_tcp_connect_amqp_port" lineno="7188">
<summary>
Make a TCP connection to the amqp port.
</summary>
@@ -15602,7 +14753,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amqp_client_packets" lineno="8480">
+<interface name="corenet_send_amqp_client_packets" lineno="7208">
<summary>
Send amqp_client packets.
</summary>
@@ -15613,7 +14764,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8499">
+<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="7227">
<summary>
Do not audit attempts to send amqp_client packets.
</summary>
@@ -15624,7 +14775,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amqp_client_packets" lineno="8518">
+<interface name="corenet_receive_amqp_client_packets" lineno="7246">
<summary>
Receive amqp_client packets.
</summary>
@@ -15635,7 +14786,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8537">
+<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="7265">
<summary>
Do not audit attempts to receive amqp_client packets.
</summary>
@@ -15646,7 +14797,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amqp_client_packets" lineno="8556">
+<interface name="corenet_sendrecv_amqp_client_packets" lineno="7284">
<summary>
Send and receive amqp_client packets.
</summary>
@@ -15657,7 +14808,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8572">
+<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="7300">
<summary>
Do not audit attempts to send and receive amqp_client packets.
</summary>
@@ -15668,7 +14819,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amqp_client_packets" lineno="8587">
+<interface name="corenet_relabelto_amqp_client_packets" lineno="7315">
<summary>
Relabel packets to amqp_client the packet type.
</summary>
@@ -15678,7 +14829,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amqp_server_packets" lineno="8607">
+<interface name="corenet_send_amqp_server_packets" lineno="7335">
<summary>
Send amqp_server packets.
</summary>
@@ -15689,7 +14840,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8626">
+<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="7354">
<summary>
Do not audit attempts to send amqp_server packets.
</summary>
@@ -15700,7 +14851,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amqp_server_packets" lineno="8645">
+<interface name="corenet_receive_amqp_server_packets" lineno="7373">
<summary>
Receive amqp_server packets.
</summary>
@@ -15711,7 +14862,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8664">
+<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="7392">
<summary>
Do not audit attempts to receive amqp_server packets.
</summary>
@@ -15722,7 +14873,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amqp_server_packets" lineno="8683">
+<interface name="corenet_sendrecv_amqp_server_packets" lineno="7411">
<summary>
Send and receive amqp_server packets.
</summary>
@@ -15733,7 +14884,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8699">
+<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="7427">
<summary>
Do not audit attempts to send and receive amqp_server packets.
</summary>
@@ -15744,7 +14895,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amqp_server_packets" lineno="8714">
+<interface name="corenet_relabelto_amqp_server_packets" lineno="7442">
<summary>
Relabel packets to amqp_server the packet type.
</summary>
@@ -15754,85 +14905,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_aol_port" lineno="8736">
-<summary>
-Send and receive TCP traffic on the aol port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_aol_port" lineno="8751">
-<summary>
-Send UDP traffic on the aol port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8766">
-<summary>
-Do not audit attempts to send UDP traffic on the aol port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_aol_port" lineno="8781">
-<summary>
-Receive UDP traffic on the aol port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8796">
-<summary>
-Do not audit attempts to receive UDP traffic on the aol port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_aol_port" lineno="8811">
-<summary>
-Send and receive UDP traffic on the aol port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8827">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the aol port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_aol_port" lineno="8842">
+<interface name="corenet_tcp_bind_aol_port" lineno="7464">
<summary>
Bind TCP sockets to the aol port.
</summary>
@@ -15843,7 +14916,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_aol_port" lineno="8862">
+<interface name="corenet_udp_bind_aol_port" lineno="7484">
<summary>
Bind UDP sockets to the aol port.
</summary>
@@ -15854,7 +14927,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_aol_port" lineno="8881">
+<interface name="corenet_tcp_connect_aol_port" lineno="7503">
<summary>
Make a TCP connection to the aol port.
</summary>
@@ -15864,7 +14937,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_aol_client_packets" lineno="8901">
+<interface name="corenet_send_aol_client_packets" lineno="7523">
<summary>
Send aol_client packets.
</summary>
@@ -15875,7 +14948,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8920">
+<interface name="corenet_dontaudit_send_aol_client_packets" lineno="7542">
<summary>
Do not audit attempts to send aol_client packets.
</summary>
@@ -15886,7 +14959,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_aol_client_packets" lineno="8939">
+<interface name="corenet_receive_aol_client_packets" lineno="7561">
<summary>
Receive aol_client packets.
</summary>
@@ -15897,7 +14970,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8958">
+<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="7580">
<summary>
Do not audit attempts to receive aol_client packets.
</summary>
@@ -15908,7 +14981,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_aol_client_packets" lineno="8977">
+<interface name="corenet_sendrecv_aol_client_packets" lineno="7599">
<summary>
Send and receive aol_client packets.
</summary>
@@ -15919,7 +14992,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8993">
+<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="7615">
<summary>
Do not audit attempts to send and receive aol_client packets.
</summary>
@@ -15930,7 +15003,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_aol_client_packets" lineno="9008">
+<interface name="corenet_relabelto_aol_client_packets" lineno="7630">
<summary>
Relabel packets to aol_client the packet type.
</summary>
@@ -15940,7 +15013,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_aol_server_packets" lineno="9028">
+<interface name="corenet_send_aol_server_packets" lineno="7650">
<summary>
Send aol_server packets.
</summary>
@@ -15951,7 +15024,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9047">
+<interface name="corenet_dontaudit_send_aol_server_packets" lineno="7669">
<summary>
Do not audit attempts to send aol_server packets.
</summary>
@@ -15962,7 +15035,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_aol_server_packets" lineno="9066">
+<interface name="corenet_receive_aol_server_packets" lineno="7688">
<summary>
Receive aol_server packets.
</summary>
@@ -15973,7 +15046,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9085">
+<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="7707">
<summary>
Do not audit attempts to receive aol_server packets.
</summary>
@@ -15984,7 +15057,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_aol_server_packets" lineno="9104">
+<interface name="corenet_sendrecv_aol_server_packets" lineno="7726">
<summary>
Send and receive aol_server packets.
</summary>
@@ -15995,7 +15068,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9120">
+<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="7742">
<summary>
Do not audit attempts to send and receive aol_server packets.
</summary>
@@ -16006,7 +15079,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_aol_server_packets" lineno="9135">
+<interface name="corenet_relabelto_aol_server_packets" lineno="7757">
<summary>
Relabel packets to aol_server the packet type.
</summary>
@@ -16016,85 +15089,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9157">
-<summary>
-Send and receive TCP traffic on the apcupsd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_apcupsd_port" lineno="9172">
-<summary>
-Send UDP traffic on the apcupsd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9187">
-<summary>
-Do not audit attempts to send UDP traffic on the apcupsd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_apcupsd_port" lineno="9202">
-<summary>
-Receive UDP traffic on the apcupsd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9217">
-<summary>
-Do not audit attempts to receive UDP traffic on the apcupsd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9232">
-<summary>
-Send and receive UDP traffic on the apcupsd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9248">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the apcupsd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_apcupsd_port" lineno="9263">
+<interface name="corenet_tcp_bind_apcupsd_port" lineno="7779">
<summary>
Bind TCP sockets to the apcupsd port.
</summary>
@@ -16105,7 +15100,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_apcupsd_port" lineno="9283">
+<interface name="corenet_udp_bind_apcupsd_port" lineno="7799">
<summary>
Bind UDP sockets to the apcupsd port.
</summary>
@@ -16116,7 +15111,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_apcupsd_port" lineno="9302">
+<interface name="corenet_tcp_connect_apcupsd_port" lineno="7818">
<summary>
Make a TCP connection to the apcupsd port.
</summary>
@@ -16126,7 +15121,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apcupsd_client_packets" lineno="9322">
+<interface name="corenet_send_apcupsd_client_packets" lineno="7838">
<summary>
Send apcupsd_client packets.
</summary>
@@ -16137,7 +15132,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9341">
+<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="7857">
<summary>
Do not audit attempts to send apcupsd_client packets.
</summary>
@@ -16148,7 +15143,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apcupsd_client_packets" lineno="9360">
+<interface name="corenet_receive_apcupsd_client_packets" lineno="7876">
<summary>
Receive apcupsd_client packets.
</summary>
@@ -16159,7 +15154,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9379">
+<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="7895">
<summary>
Do not audit attempts to receive apcupsd_client packets.
</summary>
@@ -16170,7 +15165,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9398">
+<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="7914">
<summary>
Send and receive apcupsd_client packets.
</summary>
@@ -16181,7 +15176,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9414">
+<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="7930">
<summary>
Do not audit attempts to send and receive apcupsd_client packets.
</summary>
@@ -16192,7 +15187,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9429">
+<interface name="corenet_relabelto_apcupsd_client_packets" lineno="7945">
<summary>
Relabel packets to apcupsd_client the packet type.
</summary>
@@ -16202,7 +15197,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apcupsd_server_packets" lineno="9449">
+<interface name="corenet_send_apcupsd_server_packets" lineno="7965">
<summary>
Send apcupsd_server packets.
</summary>
@@ -16213,7 +15208,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9468">
+<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="7984">
<summary>
Do not audit attempts to send apcupsd_server packets.
</summary>
@@ -16224,7 +15219,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apcupsd_server_packets" lineno="9487">
+<interface name="corenet_receive_apcupsd_server_packets" lineno="8003">
<summary>
Receive apcupsd_server packets.
</summary>
@@ -16235,7 +15230,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9506">
+<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="8022">
<summary>
Do not audit attempts to receive apcupsd_server packets.
</summary>
@@ -16246,7 +15241,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9525">
+<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="8041">
<summary>
Send and receive apcupsd_server packets.
</summary>
@@ -16257,7 +15252,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9541">
+<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="8057">
<summary>
Do not audit attempts to send and receive apcupsd_server packets.
</summary>
@@ -16268,7 +15263,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9556">
+<interface name="corenet_relabelto_apcupsd_server_packets" lineno="8072">
<summary>
Relabel packets to apcupsd_server the packet type.
</summary>
@@ -16278,85 +15273,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9578">
-<summary>
-Send and receive TCP traffic on the apertus_ldp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_apertus_ldp_port" lineno="9593">
-<summary>
-Send UDP traffic on the apertus_ldp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9608">
-<summary>
-Do not audit attempts to send UDP traffic on the apertus_ldp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9623">
-<summary>
-Receive UDP traffic on the apertus_ldp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9638">
-<summary>
-Do not audit attempts to receive UDP traffic on the apertus_ldp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9653">
-<summary>
-Send and receive UDP traffic on the apertus_ldp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9669">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the apertus_ldp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9684">
+<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="8094">
<summary>
Bind TCP sockets to the apertus_ldp port.
</summary>
@@ -16367,7 +15284,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9704">
+<interface name="corenet_udp_bind_apertus_ldp_port" lineno="8114">
<summary>
Bind UDP sockets to the apertus_ldp port.
</summary>
@@ -16378,7 +15295,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9723">
+<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="8133">
<summary>
Make a TCP connection to the apertus_ldp port.
</summary>
@@ -16388,7 +15305,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apertus_ldp_client_packets" lineno="9743">
+<interface name="corenet_send_apertus_ldp_client_packets" lineno="8153">
<summary>
Send apertus_ldp_client packets.
</summary>
@@ -16399,7 +15316,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9762">
+<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="8172">
<summary>
Do not audit attempts to send apertus_ldp_client packets.
</summary>
@@ -16410,7 +15327,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9781">
+<interface name="corenet_receive_apertus_ldp_client_packets" lineno="8191">
<summary>
Receive apertus_ldp_client packets.
</summary>
@@ -16421,7 +15338,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9800">
+<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="8210">
<summary>
Do not audit attempts to receive apertus_ldp_client packets.
</summary>
@@ -16432,7 +15349,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9819">
+<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="8229">
<summary>
Send and receive apertus_ldp_client packets.
</summary>
@@ -16443,7 +15360,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9835">
+<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="8245">
<summary>
Do not audit attempts to send and receive apertus_ldp_client packets.
</summary>
@@ -16454,7 +15371,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9850">
+<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="8260">
<summary>
Relabel packets to apertus_ldp_client the packet type.
</summary>
@@ -16464,7 +15381,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apertus_ldp_server_packets" lineno="9870">
+<interface name="corenet_send_apertus_ldp_server_packets" lineno="8280">
<summary>
Send apertus_ldp_server packets.
</summary>
@@ -16475,7 +15392,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9889">
+<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="8299">
<summary>
Do not audit attempts to send apertus_ldp_server packets.
</summary>
@@ -16486,7 +15403,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9908">
+<interface name="corenet_receive_apertus_ldp_server_packets" lineno="8318">
<summary>
Receive apertus_ldp_server packets.
</summary>
@@ -16497,7 +15414,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9927">
+<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="8337">
<summary>
Do not audit attempts to receive apertus_ldp_server packets.
</summary>
@@ -16508,7 +15425,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9946">
+<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="8356">
<summary>
Send and receive apertus_ldp_server packets.
</summary>
@@ -16519,7 +15436,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9962">
+<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="8372">
<summary>
Do not audit attempts to send and receive apertus_ldp_server packets.
</summary>
@@ -16530,7 +15447,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9977">
+<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="8387">
<summary>
Relabel packets to apertus_ldp_server the packet type.
</summary>
@@ -16540,85 +15457,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_aptcacher_port" lineno="9999">
-<summary>
-Send and receive TCP traffic on the aptcacher port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_aptcacher_port" lineno="10014">
-<summary>
-Send UDP traffic on the aptcacher port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_aptcacher_port" lineno="10029">
-<summary>
-Do not audit attempts to send UDP traffic on the aptcacher port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_aptcacher_port" lineno="10044">
-<summary>
-Receive UDP traffic on the aptcacher port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_aptcacher_port" lineno="10059">
-<summary>
-Do not audit attempts to receive UDP traffic on the aptcacher port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_aptcacher_port" lineno="10074">
-<summary>
-Send and receive UDP traffic on the aptcacher port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_aptcacher_port" lineno="10090">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the aptcacher port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_aptcacher_port" lineno="10105">
+<interface name="corenet_tcp_bind_aptcacher_port" lineno="8409">
<summary>
Bind TCP sockets to the aptcacher port.
</summary>
@@ -16629,7 +15468,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_aptcacher_port" lineno="10125">
+<interface name="corenet_udp_bind_aptcacher_port" lineno="8429">
<summary>
Bind UDP sockets to the aptcacher port.
</summary>
@@ -16640,7 +15479,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_aptcacher_port" lineno="10144">
+<interface name="corenet_tcp_connect_aptcacher_port" lineno="8448">
<summary>
Make a TCP connection to the aptcacher port.
</summary>
@@ -16650,7 +15489,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_aptcacher_client_packets" lineno="10164">
+<interface name="corenet_send_aptcacher_client_packets" lineno="8468">
<summary>
Send aptcacher_client packets.
</summary>
@@ -16661,7 +15500,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="10183">
+<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="8487">
<summary>
Do not audit attempts to send aptcacher_client packets.
</summary>
@@ -16672,7 +15511,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_aptcacher_client_packets" lineno="10202">
+<interface name="corenet_receive_aptcacher_client_packets" lineno="8506">
<summary>
Receive aptcacher_client packets.
</summary>
@@ -16683,7 +15522,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="10221">
+<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="8525">
<summary>
Do not audit attempts to receive aptcacher_client packets.
</summary>
@@ -16694,7 +15533,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="10240">
+<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="8544">
<summary>
Send and receive aptcacher_client packets.
</summary>
@@ -16705,7 +15544,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="10256">
+<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="8560">
<summary>
Do not audit attempts to send and receive aptcacher_client packets.
</summary>
@@ -16716,7 +15555,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_aptcacher_client_packets" lineno="10271">
+<interface name="corenet_relabelto_aptcacher_client_packets" lineno="8575">
<summary>
Relabel packets to aptcacher_client the packet type.
</summary>
@@ -16726,7 +15565,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_aptcacher_server_packets" lineno="10291">
+<interface name="corenet_send_aptcacher_server_packets" lineno="8595">
<summary>
Send aptcacher_server packets.
</summary>
@@ -16737,7 +15576,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="10310">
+<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="8614">
<summary>
Do not audit attempts to send aptcacher_server packets.
</summary>
@@ -16748,7 +15587,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_aptcacher_server_packets" lineno="10329">
+<interface name="corenet_receive_aptcacher_server_packets" lineno="8633">
<summary>
Receive aptcacher_server packets.
</summary>
@@ -16759,7 +15598,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="10348">
+<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="8652">
<summary>
Do not audit attempts to receive aptcacher_server packets.
</summary>
@@ -16770,7 +15609,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="10367">
+<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="8671">
<summary>
Send and receive aptcacher_server packets.
</summary>
@@ -16781,7 +15620,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="10383">
+<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="8687">
<summary>
Do not audit attempts to send and receive aptcacher_server packets.
</summary>
@@ -16792,7 +15631,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_aptcacher_server_packets" lineno="10398">
+<interface name="corenet_relabelto_aptcacher_server_packets" lineno="8702">
<summary>
Relabel packets to aptcacher_server the packet type.
</summary>
@@ -16802,85 +15641,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10420">
-<summary>
-Send and receive TCP traffic on the armtechdaemon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_armtechdaemon_port" lineno="10435">
-<summary>
-Send UDP traffic on the armtechdaemon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10450">
-<summary>
-Do not audit attempts to send UDP traffic on the armtechdaemon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10465">
-<summary>
-Receive UDP traffic on the armtechdaemon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10480">
-<summary>
-Do not audit attempts to receive UDP traffic on the armtechdaemon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10495">
-<summary>
-Send and receive UDP traffic on the armtechdaemon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10511">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the armtechdaemon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10526">
+<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="8724">
<summary>
Bind TCP sockets to the armtechdaemon port.
</summary>
@@ -16891,7 +15652,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10546">
+<interface name="corenet_udp_bind_armtechdaemon_port" lineno="8744">
<summary>
Bind UDP sockets to the armtechdaemon port.
</summary>
@@ -16902,7 +15663,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10565">
+<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="8763">
<summary>
Make a TCP connection to the armtechdaemon port.
</summary>
@@ -16912,7 +15673,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_armtechdaemon_client_packets" lineno="10585">
+<interface name="corenet_send_armtechdaemon_client_packets" lineno="8783">
<summary>
Send armtechdaemon_client packets.
</summary>
@@ -16923,7 +15684,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10604">
+<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="8802">
<summary>
Do not audit attempts to send armtechdaemon_client packets.
</summary>
@@ -16934,7 +15695,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10623">
+<interface name="corenet_receive_armtechdaemon_client_packets" lineno="8821">
<summary>
Receive armtechdaemon_client packets.
</summary>
@@ -16945,7 +15706,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10642">
+<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="8840">
<summary>
Do not audit attempts to receive armtechdaemon_client packets.
</summary>
@@ -16956,7 +15717,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10661">
+<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="8859">
<summary>
Send and receive armtechdaemon_client packets.
</summary>
@@ -16967,7 +15728,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10677">
+<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="8875">
<summary>
Do not audit attempts to send and receive armtechdaemon_client packets.
</summary>
@@ -16978,7 +15739,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10692">
+<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="8890">
<summary>
Relabel packets to armtechdaemon_client the packet type.
</summary>
@@ -16988,7 +15749,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_armtechdaemon_server_packets" lineno="10712">
+<interface name="corenet_send_armtechdaemon_server_packets" lineno="8910">
<summary>
Send armtechdaemon_server packets.
</summary>
@@ -16999,7 +15760,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10731">
+<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="8929">
<summary>
Do not audit attempts to send armtechdaemon_server packets.
</summary>
@@ -17010,7 +15771,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10750">
+<interface name="corenet_receive_armtechdaemon_server_packets" lineno="8948">
<summary>
Receive armtechdaemon_server packets.
</summary>
@@ -17021,7 +15782,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10769">
+<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="8967">
<summary>
Do not audit attempts to receive armtechdaemon_server packets.
</summary>
@@ -17032,7 +15793,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10788">
+<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="8986">
<summary>
Send and receive armtechdaemon_server packets.
</summary>
@@ -17043,7 +15804,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10804">
+<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="9002">
<summary>
Do not audit attempts to send and receive armtechdaemon_server packets.
</summary>
@@ -17054,7 +15815,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10819">
+<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="9017">
<summary>
Relabel packets to armtechdaemon_server the packet type.
</summary>
@@ -17064,85 +15825,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10841">
-<summary>
-Send and receive TCP traffic on the asterisk port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_asterisk_port" lineno="10856">
-<summary>
-Send UDP traffic on the asterisk port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10871">
-<summary>
-Do not audit attempts to send UDP traffic on the asterisk port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_asterisk_port" lineno="10886">
-<summary>
-Receive UDP traffic on the asterisk port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10901">
-<summary>
-Do not audit attempts to receive UDP traffic on the asterisk port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10916">
-<summary>
-Send and receive UDP traffic on the asterisk port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10932">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the asterisk port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_asterisk_port" lineno="10947">
+<interface name="corenet_tcp_bind_asterisk_port" lineno="9039">
<summary>
Bind TCP sockets to the asterisk port.
</summary>
@@ -17153,7 +15836,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_asterisk_port" lineno="10967">
+<interface name="corenet_udp_bind_asterisk_port" lineno="9059">
<summary>
Bind UDP sockets to the asterisk port.
</summary>
@@ -17164,7 +15847,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_asterisk_port" lineno="10986">
+<interface name="corenet_tcp_connect_asterisk_port" lineno="9078">
<summary>
Make a TCP connection to the asterisk port.
</summary>
@@ -17174,7 +15857,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_asterisk_client_packets" lineno="11006">
+<interface name="corenet_send_asterisk_client_packets" lineno="9098">
<summary>
Send asterisk_client packets.
</summary>
@@ -17185,7 +15868,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="11025">
+<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="9117">
<summary>
Do not audit attempts to send asterisk_client packets.
</summary>
@@ -17196,7 +15879,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_asterisk_client_packets" lineno="11044">
+<interface name="corenet_receive_asterisk_client_packets" lineno="9136">
<summary>
Receive asterisk_client packets.
</summary>
@@ -17207,7 +15890,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="11063">
+<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="9155">
<summary>
Do not audit attempts to receive asterisk_client packets.
</summary>
@@ -17218,7 +15901,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_asterisk_client_packets" lineno="11082">
+<interface name="corenet_sendrecv_asterisk_client_packets" lineno="9174">
<summary>
Send and receive asterisk_client packets.
</summary>
@@ -17229,7 +15912,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="11098">
+<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="9190">
<summary>
Do not audit attempts to send and receive asterisk_client packets.
</summary>
@@ -17240,7 +15923,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_asterisk_client_packets" lineno="11113">
+<interface name="corenet_relabelto_asterisk_client_packets" lineno="9205">
<summary>
Relabel packets to asterisk_client the packet type.
</summary>
@@ -17250,7 +15933,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_asterisk_server_packets" lineno="11133">
+<interface name="corenet_send_asterisk_server_packets" lineno="9225">
<summary>
Send asterisk_server packets.
</summary>
@@ -17261,7 +15944,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11152">
+<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="9244">
<summary>
Do not audit attempts to send asterisk_server packets.
</summary>
@@ -17272,7 +15955,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_asterisk_server_packets" lineno="11171">
+<interface name="corenet_receive_asterisk_server_packets" lineno="9263">
<summary>
Receive asterisk_server packets.
</summary>
@@ -17283,7 +15966,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11190">
+<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="9282">
<summary>
Do not audit attempts to receive asterisk_server packets.
</summary>
@@ -17294,7 +15977,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11209">
+<interface name="corenet_sendrecv_asterisk_server_packets" lineno="9301">
<summary>
Send and receive asterisk_server packets.
</summary>
@@ -17305,7 +15988,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11225">
+<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="9317">
<summary>
Do not audit attempts to send and receive asterisk_server packets.
</summary>
@@ -17316,7 +15999,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_asterisk_server_packets" lineno="11240">
+<interface name="corenet_relabelto_asterisk_server_packets" lineno="9332">
<summary>
Relabel packets to asterisk_server the packet type.
</summary>
@@ -17326,85 +16009,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_audit_port" lineno="11262">
-<summary>
-Send and receive TCP traffic on the audit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_audit_port" lineno="11277">
-<summary>
-Send UDP traffic on the audit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11292">
-<summary>
-Do not audit attempts to send UDP traffic on the audit port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_audit_port" lineno="11307">
-<summary>
-Receive UDP traffic on the audit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11322">
-<summary>
-Do not audit attempts to receive UDP traffic on the audit port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_audit_port" lineno="11337">
-<summary>
-Send and receive UDP traffic on the audit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11353">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the audit port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_audit_port" lineno="11368">
+<interface name="corenet_tcp_bind_audit_port" lineno="9354">
<summary>
Bind TCP sockets to the audit port.
</summary>
@@ -17415,7 +16020,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_audit_port" lineno="11388">
+<interface name="corenet_udp_bind_audit_port" lineno="9374">
<summary>
Bind UDP sockets to the audit port.
</summary>
@@ -17426,7 +16031,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_audit_port" lineno="11407">
+<interface name="corenet_tcp_connect_audit_port" lineno="9393">
<summary>
Make a TCP connection to the audit port.
</summary>
@@ -17436,7 +16041,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_audit_client_packets" lineno="11427">
+<interface name="corenet_send_audit_client_packets" lineno="9413">
<summary>
Send audit_client packets.
</summary>
@@ -17447,7 +16052,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11446">
+<interface name="corenet_dontaudit_send_audit_client_packets" lineno="9432">
<summary>
Do not audit attempts to send audit_client packets.
</summary>
@@ -17458,7 +16063,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_audit_client_packets" lineno="11465">
+<interface name="corenet_receive_audit_client_packets" lineno="9451">
<summary>
Receive audit_client packets.
</summary>
@@ -17469,7 +16074,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11484">
+<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="9470">
<summary>
Do not audit attempts to receive audit_client packets.
</summary>
@@ -17480,7 +16085,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_audit_client_packets" lineno="11503">
+<interface name="corenet_sendrecv_audit_client_packets" lineno="9489">
<summary>
Send and receive audit_client packets.
</summary>
@@ -17491,7 +16096,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11519">
+<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="9505">
<summary>
Do not audit attempts to send and receive audit_client packets.
</summary>
@@ -17502,7 +16107,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_audit_client_packets" lineno="11534">
+<interface name="corenet_relabelto_audit_client_packets" lineno="9520">
<summary>
Relabel packets to audit_client the packet type.
</summary>
@@ -17512,7 +16117,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_audit_server_packets" lineno="11554">
+<interface name="corenet_send_audit_server_packets" lineno="9540">
<summary>
Send audit_server packets.
</summary>
@@ -17523,7 +16128,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11573">
+<interface name="corenet_dontaudit_send_audit_server_packets" lineno="9559">
<summary>
Do not audit attempts to send audit_server packets.
</summary>
@@ -17534,7 +16139,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_audit_server_packets" lineno="11592">
+<interface name="corenet_receive_audit_server_packets" lineno="9578">
<summary>
Receive audit_server packets.
</summary>
@@ -17545,7 +16150,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11611">
+<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="9597">
<summary>
Do not audit attempts to receive audit_server packets.
</summary>
@@ -17556,7 +16161,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_audit_server_packets" lineno="11630">
+<interface name="corenet_sendrecv_audit_server_packets" lineno="9616">
<summary>
Send and receive audit_server packets.
</summary>
@@ -17567,7 +16172,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11646">
+<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="9632">
<summary>
Do not audit attempts to send and receive audit_server packets.
</summary>
@@ -17578,7 +16183,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_audit_server_packets" lineno="11661">
+<interface name="corenet_relabelto_audit_server_packets" lineno="9647">
<summary>
Relabel packets to audit_server the packet type.
</summary>
@@ -17588,85 +16193,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_auth_port" lineno="11683">
-<summary>
-Send and receive TCP traffic on the auth port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_auth_port" lineno="11698">
-<summary>
-Send UDP traffic on the auth port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11713">
-<summary>
-Do not audit attempts to send UDP traffic on the auth port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_auth_port" lineno="11728">
-<summary>
-Receive UDP traffic on the auth port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11743">
-<summary>
-Do not audit attempts to receive UDP traffic on the auth port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_auth_port" lineno="11758">
-<summary>
-Send and receive UDP traffic on the auth port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11774">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the auth port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_auth_port" lineno="11789">
+<interface name="corenet_tcp_bind_auth_port" lineno="9669">
<summary>
Bind TCP sockets to the auth port.
</summary>
@@ -17677,7 +16204,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_auth_port" lineno="11809">
+<interface name="corenet_udp_bind_auth_port" lineno="9689">
<summary>
Bind UDP sockets to the auth port.
</summary>
@@ -17688,7 +16215,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_auth_port" lineno="11828">
+<interface name="corenet_tcp_connect_auth_port" lineno="9708">
<summary>
Make a TCP connection to the auth port.
</summary>
@@ -17698,7 +16225,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_auth_client_packets" lineno="11848">
+<interface name="corenet_send_auth_client_packets" lineno="9728">
<summary>
Send auth_client packets.
</summary>
@@ -17709,7 +16236,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11867">
+<interface name="corenet_dontaudit_send_auth_client_packets" lineno="9747">
<summary>
Do not audit attempts to send auth_client packets.
</summary>
@@ -17720,7 +16247,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_auth_client_packets" lineno="11886">
+<interface name="corenet_receive_auth_client_packets" lineno="9766">
<summary>
Receive auth_client packets.
</summary>
@@ -17731,7 +16258,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11905">
+<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="9785">
<summary>
Do not audit attempts to receive auth_client packets.
</summary>
@@ -17742,7 +16269,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_auth_client_packets" lineno="11924">
+<interface name="corenet_sendrecv_auth_client_packets" lineno="9804">
<summary>
Send and receive auth_client packets.
</summary>
@@ -17753,7 +16280,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11940">
+<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="9820">
<summary>
Do not audit attempts to send and receive auth_client packets.
</summary>
@@ -17764,7 +16291,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_auth_client_packets" lineno="11955">
+<interface name="corenet_relabelto_auth_client_packets" lineno="9835">
<summary>
Relabel packets to auth_client the packet type.
</summary>
@@ -17774,7 +16301,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_auth_server_packets" lineno="11975">
+<interface name="corenet_send_auth_server_packets" lineno="9855">
<summary>
Send auth_server packets.
</summary>
@@ -17785,7 +16312,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11994">
+<interface name="corenet_dontaudit_send_auth_server_packets" lineno="9874">
<summary>
Do not audit attempts to send auth_server packets.
</summary>
@@ -17796,7 +16323,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_auth_server_packets" lineno="12013">
+<interface name="corenet_receive_auth_server_packets" lineno="9893">
<summary>
Receive auth_server packets.
</summary>
@@ -17807,7 +16334,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="12032">
+<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="9912">
<summary>
Do not audit attempts to receive auth_server packets.
</summary>
@@ -17818,7 +16345,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_auth_server_packets" lineno="12051">
+<interface name="corenet_sendrecv_auth_server_packets" lineno="9931">
<summary>
Send and receive auth_server packets.
</summary>
@@ -17829,7 +16356,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="12067">
+<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="9947">
<summary>
Do not audit attempts to send and receive auth_server packets.
</summary>
@@ -17840,7 +16367,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_auth_server_packets" lineno="12082">
+<interface name="corenet_relabelto_auth_server_packets" lineno="9962">
<summary>
Relabel packets to auth_server the packet type.
</summary>
@@ -17850,85 +16377,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12104">
-<summary>
-Send and receive TCP traffic on the bgp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_bgp_port" lineno="12119">
-<summary>
-Send UDP traffic on the bgp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12134">
-<summary>
-Do not audit attempts to send UDP traffic on the bgp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_bgp_port" lineno="12149">
-<summary>
-Receive UDP traffic on the bgp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12164">
-<summary>
-Do not audit attempts to receive UDP traffic on the bgp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_bgp_port" lineno="12179">
-<summary>
-Send and receive UDP traffic on the bgp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12195">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the bgp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_bgp_port" lineno="12210">
+<interface name="corenet_tcp_bind_bgp_port" lineno="9984">
<summary>
Bind TCP sockets to the bgp port.
</summary>
@@ -17939,7 +16388,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_bgp_port" lineno="12230">
+<interface name="corenet_udp_bind_bgp_port" lineno="10004">
<summary>
Bind UDP sockets to the bgp port.
</summary>
@@ -17950,7 +16399,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_bgp_port" lineno="12249">
+<interface name="corenet_tcp_connect_bgp_port" lineno="10023">
<summary>
Make a TCP connection to the bgp port.
</summary>
@@ -17960,7 +16409,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bgp_client_packets" lineno="12269">
+<interface name="corenet_send_bgp_client_packets" lineno="10043">
<summary>
Send bgp_client packets.
</summary>
@@ -17971,7 +16420,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12288">
+<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="10062">
<summary>
Do not audit attempts to send bgp_client packets.
</summary>
@@ -17982,7 +16431,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bgp_client_packets" lineno="12307">
+<interface name="corenet_receive_bgp_client_packets" lineno="10081">
<summary>
Receive bgp_client packets.
</summary>
@@ -17993,7 +16442,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12326">
+<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="10100">
<summary>
Do not audit attempts to receive bgp_client packets.
</summary>
@@ -18004,7 +16453,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bgp_client_packets" lineno="12345">
+<interface name="corenet_sendrecv_bgp_client_packets" lineno="10119">
<summary>
Send and receive bgp_client packets.
</summary>
@@ -18015,7 +16464,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12361">
+<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="10135">
<summary>
Do not audit attempts to send and receive bgp_client packets.
</summary>
@@ -18026,7 +16475,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bgp_client_packets" lineno="12376">
+<interface name="corenet_relabelto_bgp_client_packets" lineno="10150">
<summary>
Relabel packets to bgp_client the packet type.
</summary>
@@ -18036,7 +16485,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bgp_server_packets" lineno="12396">
+<interface name="corenet_send_bgp_server_packets" lineno="10170">
<summary>
Send bgp_server packets.
</summary>
@@ -18047,7 +16496,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12415">
+<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="10189">
<summary>
Do not audit attempts to send bgp_server packets.
</summary>
@@ -18058,7 +16507,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bgp_server_packets" lineno="12434">
+<interface name="corenet_receive_bgp_server_packets" lineno="10208">
<summary>
Receive bgp_server packets.
</summary>
@@ -18069,7 +16518,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12453">
+<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="10227">
<summary>
Do not audit attempts to receive bgp_server packets.
</summary>
@@ -18080,7 +16529,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bgp_server_packets" lineno="12472">
+<interface name="corenet_sendrecv_bgp_server_packets" lineno="10246">
<summary>
Send and receive bgp_server packets.
</summary>
@@ -18091,7 +16540,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12488">
+<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="10262">
<summary>
Do not audit attempts to send and receive bgp_server packets.
</summary>
@@ -18102,7 +16551,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bgp_server_packets" lineno="12503">
+<interface name="corenet_relabelto_bgp_server_packets" lineno="10277">
<summary>
Relabel packets to bgp_server the packet type.
</summary>
@@ -18112,85 +16561,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12525">
-<summary>
-Send and receive TCP traffic on the bitcoin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_bitcoin_port" lineno="12540">
-<summary>
-Send UDP traffic on the bitcoin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12555">
-<summary>
-Do not audit attempts to send UDP traffic on the bitcoin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_bitcoin_port" lineno="12570">
-<summary>
-Receive UDP traffic on the bitcoin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12585">
-<summary>
-Do not audit attempts to receive UDP traffic on the bitcoin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12600">
-<summary>
-Send and receive UDP traffic on the bitcoin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12616">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the bitcoin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_bitcoin_port" lineno="12631">
+<interface name="corenet_tcp_bind_bitcoin_port" lineno="10299">
<summary>
Bind TCP sockets to the bitcoin port.
</summary>
@@ -18201,7 +16572,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_bitcoin_port" lineno="12651">
+<interface name="corenet_udp_bind_bitcoin_port" lineno="10319">
<summary>
Bind UDP sockets to the bitcoin port.
</summary>
@@ -18212,7 +16583,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_bitcoin_port" lineno="12670">
+<interface name="corenet_tcp_connect_bitcoin_port" lineno="10338">
<summary>
Make a TCP connection to the bitcoin port.
</summary>
@@ -18222,7 +16593,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bitcoin_client_packets" lineno="12690">
+<interface name="corenet_send_bitcoin_client_packets" lineno="10358">
<summary>
Send bitcoin_client packets.
</summary>
@@ -18233,7 +16604,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12709">
+<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="10377">
<summary>
Do not audit attempts to send bitcoin_client packets.
</summary>
@@ -18244,7 +16615,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bitcoin_client_packets" lineno="12728">
+<interface name="corenet_receive_bitcoin_client_packets" lineno="10396">
<summary>
Receive bitcoin_client packets.
</summary>
@@ -18255,7 +16626,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12747">
+<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="10415">
<summary>
Do not audit attempts to receive bitcoin_client packets.
</summary>
@@ -18266,7 +16637,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12766">
+<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="10434">
<summary>
Send and receive bitcoin_client packets.
</summary>
@@ -18277,7 +16648,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12782">
+<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="10450">
<summary>
Do not audit attempts to send and receive bitcoin_client packets.
</summary>
@@ -18288,7 +16659,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12797">
+<interface name="corenet_relabelto_bitcoin_client_packets" lineno="10465">
<summary>
Relabel packets to bitcoin_client the packet type.
</summary>
@@ -18298,7 +16669,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bitcoin_server_packets" lineno="12817">
+<interface name="corenet_send_bitcoin_server_packets" lineno="10485">
<summary>
Send bitcoin_server packets.
</summary>
@@ -18309,7 +16680,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12836">
+<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="10504">
<summary>
Do not audit attempts to send bitcoin_server packets.
</summary>
@@ -18320,7 +16691,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bitcoin_server_packets" lineno="12855">
+<interface name="corenet_receive_bitcoin_server_packets" lineno="10523">
<summary>
Receive bitcoin_server packets.
</summary>
@@ -18331,7 +16702,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12874">
+<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="10542">
<summary>
Do not audit attempts to receive bitcoin_server packets.
</summary>
@@ -18342,7 +16713,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12893">
+<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="10561">
<summary>
Send and receive bitcoin_server packets.
</summary>
@@ -18353,7 +16724,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12909">
+<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="10577">
<summary>
Do not audit attempts to send and receive bitcoin_server packets.
</summary>
@@ -18364,7 +16735,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12924">
+<interface name="corenet_relabelto_bitcoin_server_packets" lineno="10592">
<summary>
Relabel packets to bitcoin_server the packet type.
</summary>
@@ -18374,85 +16745,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12946">
-<summary>
-Send and receive TCP traffic on the boinc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_boinc_port" lineno="12961">
-<summary>
-Send UDP traffic on the boinc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12976">
-<summary>
-Do not audit attempts to send UDP traffic on the boinc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_boinc_port" lineno="12991">
-<summary>
-Receive UDP traffic on the boinc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="13006">
-<summary>
-Do not audit attempts to receive UDP traffic on the boinc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_boinc_port" lineno="13021">
-<summary>
-Send and receive UDP traffic on the boinc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13037">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the boinc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_boinc_port" lineno="13052">
+<interface name="corenet_tcp_bind_boinc_port" lineno="10614">
<summary>
Bind TCP sockets to the boinc port.
</summary>
@@ -18463,7 +16756,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_boinc_port" lineno="13072">
+<interface name="corenet_udp_bind_boinc_port" lineno="10634">
<summary>
Bind UDP sockets to the boinc port.
</summary>
@@ -18474,7 +16767,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_boinc_port" lineno="13091">
+<interface name="corenet_tcp_connect_boinc_port" lineno="10653">
<summary>
Make a TCP connection to the boinc port.
</summary>
@@ -18484,7 +16777,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_client_packets" lineno="13111">
+<interface name="corenet_send_boinc_client_packets" lineno="10673">
<summary>
Send boinc_client packets.
</summary>
@@ -18495,7 +16788,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13130">
+<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="10692">
<summary>
Do not audit attempts to send boinc_client packets.
</summary>
@@ -18506,7 +16799,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_client_packets" lineno="13149">
+<interface name="corenet_receive_boinc_client_packets" lineno="10711">
<summary>
Receive boinc_client packets.
</summary>
@@ -18517,7 +16810,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13168">
+<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="10730">
<summary>
Do not audit attempts to receive boinc_client packets.
</summary>
@@ -18528,7 +16821,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_client_packets" lineno="13187">
+<interface name="corenet_sendrecv_boinc_client_packets" lineno="10749">
<summary>
Send and receive boinc_client packets.
</summary>
@@ -18539,7 +16832,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13203">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="10765">
<summary>
Do not audit attempts to send and receive boinc_client packets.
</summary>
@@ -18550,7 +16843,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_client_packets" lineno="13218">
+<interface name="corenet_relabelto_boinc_client_packets" lineno="10780">
<summary>
Relabel packets to boinc_client the packet type.
</summary>
@@ -18560,7 +16853,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_server_packets" lineno="13238">
+<interface name="corenet_send_boinc_server_packets" lineno="10800">
<summary>
Send boinc_server packets.
</summary>
@@ -18571,7 +16864,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13257">
+<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="10819">
<summary>
Do not audit attempts to send boinc_server packets.
</summary>
@@ -18582,7 +16875,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_server_packets" lineno="13276">
+<interface name="corenet_receive_boinc_server_packets" lineno="10838">
<summary>
Receive boinc_server packets.
</summary>
@@ -18593,7 +16886,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13295">
+<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="10857">
<summary>
Do not audit attempts to receive boinc_server packets.
</summary>
@@ -18604,7 +16897,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_server_packets" lineno="13314">
+<interface name="corenet_sendrecv_boinc_server_packets" lineno="10876">
<summary>
Send and receive boinc_server packets.
</summary>
@@ -18615,7 +16908,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13330">
+<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="10892">
<summary>
Do not audit attempts to send and receive boinc_server packets.
</summary>
@@ -18626,7 +16919,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_server_packets" lineno="13345">
+<interface name="corenet_relabelto_boinc_server_packets" lineno="10907">
<summary>
Relabel packets to boinc_server the packet type.
</summary>
@@ -18636,85 +16929,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13367">
-<summary>
-Send and receive TCP traffic on the boinc_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_boinc_client_port" lineno="13382">
-<summary>
-Send UDP traffic on the boinc_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13397">
-<summary>
-Do not audit attempts to send UDP traffic on the boinc_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_boinc_client_port" lineno="13412">
-<summary>
-Receive UDP traffic on the boinc_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13427">
-<summary>
-Do not audit attempts to receive UDP traffic on the boinc_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13442">
-<summary>
-Send and receive UDP traffic on the boinc_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13458">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the boinc_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_boinc_client_port" lineno="13473">
+<interface name="corenet_tcp_bind_boinc_client_port" lineno="10929">
<summary>
Bind TCP sockets to the boinc_client port.
</summary>
@@ -18725,7 +16940,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_boinc_client_port" lineno="13493">
+<interface name="corenet_udp_bind_boinc_client_port" lineno="10949">
<summary>
Bind UDP sockets to the boinc_client port.
</summary>
@@ -18736,7 +16951,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_boinc_client_port" lineno="13512">
+<interface name="corenet_tcp_connect_boinc_client_port" lineno="10968">
<summary>
Make a TCP connection to the boinc_client port.
</summary>
@@ -18746,7 +16961,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_client_client_packets" lineno="13532">
+<interface name="corenet_send_boinc_client_client_packets" lineno="10988">
<summary>
Send boinc_client_client packets.
</summary>
@@ -18757,7 +16972,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13551">
+<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="11007">
<summary>
Do not audit attempts to send boinc_client_client packets.
</summary>
@@ -18768,7 +16983,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_client_client_packets" lineno="13570">
+<interface name="corenet_receive_boinc_client_client_packets" lineno="11026">
<summary>
Receive boinc_client_client packets.
</summary>
@@ -18779,7 +16994,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13589">
+<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="11045">
<summary>
Do not audit attempts to receive boinc_client_client packets.
</summary>
@@ -18790,7 +17005,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13608">
+<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="11064">
<summary>
Send and receive boinc_client_client packets.
</summary>
@@ -18801,7 +17016,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13624">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="11080">
<summary>
Do not audit attempts to send and receive boinc_client_client packets.
</summary>
@@ -18812,7 +17027,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13639">
+<interface name="corenet_relabelto_boinc_client_client_packets" lineno="11095">
<summary>
Relabel packets to boinc_client_client the packet type.
</summary>
@@ -18822,7 +17037,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_client_server_packets" lineno="13659">
+<interface name="corenet_send_boinc_client_server_packets" lineno="11115">
<summary>
Send boinc_client_server packets.
</summary>
@@ -18833,7 +17048,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13678">
+<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="11134">
<summary>
Do not audit attempts to send boinc_client_server packets.
</summary>
@@ -18844,7 +17059,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_client_server_packets" lineno="13697">
+<interface name="corenet_receive_boinc_client_server_packets" lineno="11153">
<summary>
Receive boinc_client_server packets.
</summary>
@@ -18855,7 +17070,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13716">
+<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="11172">
<summary>
Do not audit attempts to receive boinc_client_server packets.
</summary>
@@ -18866,7 +17081,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13735">
+<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="11191">
<summary>
Send and receive boinc_client_server packets.
</summary>
@@ -18877,7 +17092,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13751">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="11207">
<summary>
Do not audit attempts to send and receive boinc_client_server packets.
</summary>
@@ -18888,7 +17103,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13766">
+<interface name="corenet_relabelto_boinc_client_server_packets" lineno="11222">
<summary>
Relabel packets to boinc_client_server the packet type.
</summary>
@@ -18898,85 +17113,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_biff_port" lineno="13788">
-<summary>
-Send and receive TCP traffic on the biff port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_biff_port" lineno="13803">
-<summary>
-Send UDP traffic on the biff port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13818">
-<summary>
-Do not audit attempts to send UDP traffic on the biff port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_biff_port" lineno="13833">
-<summary>
-Receive UDP traffic on the biff port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13848">
-<summary>
-Do not audit attempts to receive UDP traffic on the biff port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_biff_port" lineno="13863">
-<summary>
-Send and receive UDP traffic on the biff port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13879">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the biff port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_biff_port" lineno="13894">
+<interface name="corenet_tcp_bind_biff_port" lineno="11244">
<summary>
Bind TCP sockets to the biff port.
</summary>
@@ -18987,7 +17124,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_biff_port" lineno="13914">
+<interface name="corenet_udp_bind_biff_port" lineno="11264">
<summary>
Bind UDP sockets to the biff port.
</summary>
@@ -18998,7 +17135,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_biff_port" lineno="13933">
+<interface name="corenet_tcp_connect_biff_port" lineno="11283">
<summary>
Make a TCP connection to the biff port.
</summary>
@@ -19008,7 +17145,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_biff_client_packets" lineno="13953">
+<interface name="corenet_send_biff_client_packets" lineno="11303">
<summary>
Send biff_client packets.
</summary>
@@ -19019,7 +17156,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13972">
+<interface name="corenet_dontaudit_send_biff_client_packets" lineno="11322">
<summary>
Do not audit attempts to send biff_client packets.
</summary>
@@ -19030,7 +17167,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_biff_client_packets" lineno="13991">
+<interface name="corenet_receive_biff_client_packets" lineno="11341">
<summary>
Receive biff_client packets.
</summary>
@@ -19041,7 +17178,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="14010">
+<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="11360">
<summary>
Do not audit attempts to receive biff_client packets.
</summary>
@@ -19052,7 +17189,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_biff_client_packets" lineno="14029">
+<interface name="corenet_sendrecv_biff_client_packets" lineno="11379">
<summary>
Send and receive biff_client packets.
</summary>
@@ -19063,7 +17200,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14045">
+<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="11395">
<summary>
Do not audit attempts to send and receive biff_client packets.
</summary>
@@ -19074,7 +17211,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_biff_client_packets" lineno="14060">
+<interface name="corenet_relabelto_biff_client_packets" lineno="11410">
<summary>
Relabel packets to biff_client the packet type.
</summary>
@@ -19084,7 +17221,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_biff_server_packets" lineno="14080">
+<interface name="corenet_send_biff_server_packets" lineno="11430">
<summary>
Send biff_server packets.
</summary>
@@ -19095,7 +17232,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14099">
+<interface name="corenet_dontaudit_send_biff_server_packets" lineno="11449">
<summary>
Do not audit attempts to send biff_server packets.
</summary>
@@ -19106,7 +17243,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_biff_server_packets" lineno="14118">
+<interface name="corenet_receive_biff_server_packets" lineno="11468">
<summary>
Receive biff_server packets.
</summary>
@@ -19117,7 +17254,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14137">
+<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="11487">
<summary>
Do not audit attempts to receive biff_server packets.
</summary>
@@ -19128,7 +17265,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_biff_server_packets" lineno="14156">
+<interface name="corenet_sendrecv_biff_server_packets" lineno="11506">
<summary>
Send and receive biff_server packets.
</summary>
@@ -19139,7 +17276,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14172">
+<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="11522">
<summary>
Do not audit attempts to send and receive biff_server packets.
</summary>
@@ -19150,7 +17287,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_biff_server_packets" lineno="14187">
+<interface name="corenet_relabelto_biff_server_packets" lineno="11537">
<summary>
Relabel packets to biff_server the packet type.
</summary>
@@ -19160,85 +17297,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14209">
-<summary>
-Send and receive TCP traffic on the certmaster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_certmaster_port" lineno="14224">
-<summary>
-Send UDP traffic on the certmaster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14239">
-<summary>
-Do not audit attempts to send UDP traffic on the certmaster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_certmaster_port" lineno="14254">
-<summary>
-Receive UDP traffic on the certmaster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14269">
-<summary>
-Do not audit attempts to receive UDP traffic on the certmaster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14284">
-<summary>
-Send and receive UDP traffic on the certmaster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14300">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the certmaster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_certmaster_port" lineno="14315">
+<interface name="corenet_tcp_bind_certmaster_port" lineno="11559">
<summary>
Bind TCP sockets to the certmaster port.
</summary>
@@ -19249,7 +17308,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_certmaster_port" lineno="14335">
+<interface name="corenet_udp_bind_certmaster_port" lineno="11579">
<summary>
Bind UDP sockets to the certmaster port.
</summary>
@@ -19260,7 +17319,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_certmaster_port" lineno="14354">
+<interface name="corenet_tcp_connect_certmaster_port" lineno="11598">
<summary>
Make a TCP connection to the certmaster port.
</summary>
@@ -19270,7 +17329,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_certmaster_client_packets" lineno="14374">
+<interface name="corenet_send_certmaster_client_packets" lineno="11618">
<summary>
Send certmaster_client packets.
</summary>
@@ -19281,7 +17340,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14393">
+<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="11637">
<summary>
Do not audit attempts to send certmaster_client packets.
</summary>
@@ -19292,7 +17351,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_certmaster_client_packets" lineno="14412">
+<interface name="corenet_receive_certmaster_client_packets" lineno="11656">
<summary>
Receive certmaster_client packets.
</summary>
@@ -19303,7 +17362,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14431">
+<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="11675">
<summary>
Do not audit attempts to receive certmaster_client packets.
</summary>
@@ -19314,7 +17373,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14450">
+<interface name="corenet_sendrecv_certmaster_client_packets" lineno="11694">
<summary>
Send and receive certmaster_client packets.
</summary>
@@ -19325,7 +17384,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14466">
+<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="11710">
<summary>
Do not audit attempts to send and receive certmaster_client packets.
</summary>
@@ -19336,7 +17395,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_certmaster_client_packets" lineno="14481">
+<interface name="corenet_relabelto_certmaster_client_packets" lineno="11725">
<summary>
Relabel packets to certmaster_client the packet type.
</summary>
@@ -19346,7 +17405,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_certmaster_server_packets" lineno="14501">
+<interface name="corenet_send_certmaster_server_packets" lineno="11745">
<summary>
Send certmaster_server packets.
</summary>
@@ -19357,7 +17416,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14520">
+<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="11764">
<summary>
Do not audit attempts to send certmaster_server packets.
</summary>
@@ -19368,7 +17427,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_certmaster_server_packets" lineno="14539">
+<interface name="corenet_receive_certmaster_server_packets" lineno="11783">
<summary>
Receive certmaster_server packets.
</summary>
@@ -19379,7 +17438,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14558">
+<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="11802">
<summary>
Do not audit attempts to receive certmaster_server packets.
</summary>
@@ -19390,7 +17449,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14577">
+<interface name="corenet_sendrecv_certmaster_server_packets" lineno="11821">
<summary>
Send and receive certmaster_server packets.
</summary>
@@ -19401,7 +17460,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14593">
+<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="11837">
<summary>
Do not audit attempts to send and receive certmaster_server packets.
</summary>
@@ -19412,7 +17471,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_certmaster_server_packets" lineno="14608">
+<interface name="corenet_relabelto_certmaster_server_packets" lineno="11852">
<summary>
Relabel packets to certmaster_server the packet type.
</summary>
@@ -19422,85 +17481,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14630">
-<summary>
-Send and receive TCP traffic on the chronyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_chronyd_port" lineno="14645">
-<summary>
-Send UDP traffic on the chronyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14660">
-<summary>
-Do not audit attempts to send UDP traffic on the chronyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_chronyd_port" lineno="14675">
-<summary>
-Receive UDP traffic on the chronyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14690">
-<summary>
-Do not audit attempts to receive UDP traffic on the chronyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14705">
-<summary>
-Send and receive UDP traffic on the chronyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14721">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the chronyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_chronyd_port" lineno="14736">
+<interface name="corenet_tcp_bind_chronyd_port" lineno="11874">
<summary>
Bind TCP sockets to the chronyd port.
</summary>
@@ -19511,7 +17492,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_chronyd_port" lineno="14756">
+<interface name="corenet_udp_bind_chronyd_port" lineno="11894">
<summary>
Bind UDP sockets to the chronyd port.
</summary>
@@ -19522,7 +17503,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_chronyd_port" lineno="14775">
+<interface name="corenet_tcp_connect_chronyd_port" lineno="11913">
<summary>
Make a TCP connection to the chronyd port.
</summary>
@@ -19532,7 +17513,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_chronyd_client_packets" lineno="14795">
+<interface name="corenet_send_chronyd_client_packets" lineno="11933">
<summary>
Send chronyd_client packets.
</summary>
@@ -19543,7 +17524,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14814">
+<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="11952">
<summary>
Do not audit attempts to send chronyd_client packets.
</summary>
@@ -19554,7 +17535,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_chronyd_client_packets" lineno="14833">
+<interface name="corenet_receive_chronyd_client_packets" lineno="11971">
<summary>
Receive chronyd_client packets.
</summary>
@@ -19565,7 +17546,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14852">
+<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="11990">
<summary>
Do not audit attempts to receive chronyd_client packets.
</summary>
@@ -19576,7 +17557,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14871">
+<interface name="corenet_sendrecv_chronyd_client_packets" lineno="12009">
<summary>
Send and receive chronyd_client packets.
</summary>
@@ -19587,7 +17568,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14887">
+<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="12025">
<summary>
Do not audit attempts to send and receive chronyd_client packets.
</summary>
@@ -19598,7 +17579,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_chronyd_client_packets" lineno="14902">
+<interface name="corenet_relabelto_chronyd_client_packets" lineno="12040">
<summary>
Relabel packets to chronyd_client the packet type.
</summary>
@@ -19608,7 +17589,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_chronyd_server_packets" lineno="14922">
+<interface name="corenet_send_chronyd_server_packets" lineno="12060">
<summary>
Send chronyd_server packets.
</summary>
@@ -19619,7 +17600,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14941">
+<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="12079">
<summary>
Do not audit attempts to send chronyd_server packets.
</summary>
@@ -19630,7 +17611,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_chronyd_server_packets" lineno="14960">
+<interface name="corenet_receive_chronyd_server_packets" lineno="12098">
<summary>
Receive chronyd_server packets.
</summary>
@@ -19641,7 +17622,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14979">
+<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="12117">
<summary>
Do not audit attempts to receive chronyd_server packets.
</summary>
@@ -19652,7 +17633,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14998">
+<interface name="corenet_sendrecv_chronyd_server_packets" lineno="12136">
<summary>
Send and receive chronyd_server packets.
</summary>
@@ -19663,7 +17644,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="15014">
+<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="12152">
<summary>
Do not audit attempts to send and receive chronyd_server packets.
</summary>
@@ -19674,7 +17655,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_chronyd_server_packets" lineno="15029">
+<interface name="corenet_relabelto_chronyd_server_packets" lineno="12167">
<summary>
Relabel packets to chronyd_server the packet type.
</summary>
@@ -19684,85 +17665,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15051">
-<summary>
-Send and receive TCP traffic on the clamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_clamd_port" lineno="15066">
-<summary>
-Send UDP traffic on the clamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15081">
-<summary>
-Do not audit attempts to send UDP traffic on the clamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_clamd_port" lineno="15096">
-<summary>
-Receive UDP traffic on the clamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15111">
-<summary>
-Do not audit attempts to receive UDP traffic on the clamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_clamd_port" lineno="15126">
-<summary>
-Send and receive UDP traffic on the clamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15142">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the clamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_clamd_port" lineno="15157">
+<interface name="corenet_tcp_bind_clamd_port" lineno="12189">
<summary>
Bind TCP sockets to the clamd port.
</summary>
@@ -19773,7 +17676,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_clamd_port" lineno="15177">
+<interface name="corenet_udp_bind_clamd_port" lineno="12209">
<summary>
Bind UDP sockets to the clamd port.
</summary>
@@ -19784,7 +17687,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_clamd_port" lineno="15196">
+<interface name="corenet_tcp_connect_clamd_port" lineno="12228">
<summary>
Make a TCP connection to the clamd port.
</summary>
@@ -19794,7 +17697,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clamd_client_packets" lineno="15216">
+<interface name="corenet_send_clamd_client_packets" lineno="12248">
<summary>
Send clamd_client packets.
</summary>
@@ -19805,7 +17708,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15235">
+<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="12267">
<summary>
Do not audit attempts to send clamd_client packets.
</summary>
@@ -19816,7 +17719,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clamd_client_packets" lineno="15254">
+<interface name="corenet_receive_clamd_client_packets" lineno="12286">
<summary>
Receive clamd_client packets.
</summary>
@@ -19827,7 +17730,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15273">
+<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="12305">
<summary>
Do not audit attempts to receive clamd_client packets.
</summary>
@@ -19838,7 +17741,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clamd_client_packets" lineno="15292">
+<interface name="corenet_sendrecv_clamd_client_packets" lineno="12324">
<summary>
Send and receive clamd_client packets.
</summary>
@@ -19849,7 +17752,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15308">
+<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="12340">
<summary>
Do not audit attempts to send and receive clamd_client packets.
</summary>
@@ -19860,7 +17763,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clamd_client_packets" lineno="15323">
+<interface name="corenet_relabelto_clamd_client_packets" lineno="12355">
<summary>
Relabel packets to clamd_client the packet type.
</summary>
@@ -19870,7 +17773,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clamd_server_packets" lineno="15343">
+<interface name="corenet_send_clamd_server_packets" lineno="12375">
<summary>
Send clamd_server packets.
</summary>
@@ -19881,7 +17784,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15362">
+<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="12394">
<summary>
Do not audit attempts to send clamd_server packets.
</summary>
@@ -19892,7 +17795,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clamd_server_packets" lineno="15381">
+<interface name="corenet_receive_clamd_server_packets" lineno="12413">
<summary>
Receive clamd_server packets.
</summary>
@@ -19903,7 +17806,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15400">
+<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="12432">
<summary>
Do not audit attempts to receive clamd_server packets.
</summary>
@@ -19914,7 +17817,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clamd_server_packets" lineno="15419">
+<interface name="corenet_sendrecv_clamd_server_packets" lineno="12451">
<summary>
Send and receive clamd_server packets.
</summary>
@@ -19925,7 +17828,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15435">
+<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="12467">
<summary>
Do not audit attempts to send and receive clamd_server packets.
</summary>
@@ -19936,7 +17839,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clamd_server_packets" lineno="15450">
+<interface name="corenet_relabelto_clamd_server_packets" lineno="12482">
<summary>
Relabel packets to clamd_server the packet type.
</summary>
@@ -19946,85 +17849,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15472">
-<summary>
-Send and receive TCP traffic on the clockspeed port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_clockspeed_port" lineno="15487">
-<summary>
-Send UDP traffic on the clockspeed port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15502">
-<summary>
-Do not audit attempts to send UDP traffic on the clockspeed port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_clockspeed_port" lineno="15517">
-<summary>
-Receive UDP traffic on the clockspeed port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15532">
-<summary>
-Do not audit attempts to receive UDP traffic on the clockspeed port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15547">
-<summary>
-Send and receive UDP traffic on the clockspeed port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15563">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the clockspeed port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_clockspeed_port" lineno="15578">
+<interface name="corenet_tcp_bind_clockspeed_port" lineno="12504">
<summary>
Bind TCP sockets to the clockspeed port.
</summary>
@@ -20035,7 +17860,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_clockspeed_port" lineno="15598">
+<interface name="corenet_udp_bind_clockspeed_port" lineno="12524">
<summary>
Bind UDP sockets to the clockspeed port.
</summary>
@@ -20046,7 +17871,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_clockspeed_port" lineno="15617">
+<interface name="corenet_tcp_connect_clockspeed_port" lineno="12543">
<summary>
Make a TCP connection to the clockspeed port.
</summary>
@@ -20056,7 +17881,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clockspeed_client_packets" lineno="15637">
+<interface name="corenet_send_clockspeed_client_packets" lineno="12563">
<summary>
Send clockspeed_client packets.
</summary>
@@ -20067,7 +17892,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15656">
+<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="12582">
<summary>
Do not audit attempts to send clockspeed_client packets.
</summary>
@@ -20078,7 +17903,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clockspeed_client_packets" lineno="15675">
+<interface name="corenet_receive_clockspeed_client_packets" lineno="12601">
<summary>
Receive clockspeed_client packets.
</summary>
@@ -20089,7 +17914,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15694">
+<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="12620">
<summary>
Do not audit attempts to receive clockspeed_client packets.
</summary>
@@ -20100,7 +17925,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15713">
+<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="12639">
<summary>
Send and receive clockspeed_client packets.
</summary>
@@ -20111,7 +17936,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15729">
+<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="12655">
<summary>
Do not audit attempts to send and receive clockspeed_client packets.
</summary>
@@ -20122,7 +17947,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15744">
+<interface name="corenet_relabelto_clockspeed_client_packets" lineno="12670">
<summary>
Relabel packets to clockspeed_client the packet type.
</summary>
@@ -20132,7 +17957,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clockspeed_server_packets" lineno="15764">
+<interface name="corenet_send_clockspeed_server_packets" lineno="12690">
<summary>
Send clockspeed_server packets.
</summary>
@@ -20143,7 +17968,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15783">
+<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="12709">
<summary>
Do not audit attempts to send clockspeed_server packets.
</summary>
@@ -20154,7 +17979,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clockspeed_server_packets" lineno="15802">
+<interface name="corenet_receive_clockspeed_server_packets" lineno="12728">
<summary>
Receive clockspeed_server packets.
</summary>
@@ -20165,7 +17990,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15821">
+<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="12747">
<summary>
Do not audit attempts to receive clockspeed_server packets.
</summary>
@@ -20176,7 +18001,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15840">
+<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="12766">
<summary>
Send and receive clockspeed_server packets.
</summary>
@@ -20187,7 +18012,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15856">
+<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="12782">
<summary>
Do not audit attempts to send and receive clockspeed_server packets.
</summary>
@@ -20198,7 +18023,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15871">
+<interface name="corenet_relabelto_clockspeed_server_packets" lineno="12797">
<summary>
Relabel packets to clockspeed_server the packet type.
</summary>
@@ -20208,85 +18033,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15893">
-<summary>
-Send and receive TCP traffic on the cluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_cluster_port" lineno="15908">
-<summary>
-Send UDP traffic on the cluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15923">
-<summary>
-Do not audit attempts to send UDP traffic on the cluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_cluster_port" lineno="15938">
-<summary>
-Receive UDP traffic on the cluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15953">
-<summary>
-Do not audit attempts to receive UDP traffic on the cluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_cluster_port" lineno="15968">
-<summary>
-Send and receive UDP traffic on the cluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15984">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the cluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_cluster_port" lineno="15999">
+<interface name="corenet_tcp_bind_cluster_port" lineno="12819">
<summary>
Bind TCP sockets to the cluster port.
</summary>
@@ -20297,7 +18044,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cluster_port" lineno="16019">
+<interface name="corenet_udp_bind_cluster_port" lineno="12839">
<summary>
Bind UDP sockets to the cluster port.
</summary>
@@ -20308,7 +18055,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cluster_port" lineno="16038">
+<interface name="corenet_tcp_connect_cluster_port" lineno="12858">
<summary>
Make a TCP connection to the cluster port.
</summary>
@@ -20318,7 +18065,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cluster_client_packets" lineno="16058">
+<interface name="corenet_send_cluster_client_packets" lineno="12878">
<summary>
Send cluster_client packets.
</summary>
@@ -20329,7 +18076,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16077">
+<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="12897">
<summary>
Do not audit attempts to send cluster_client packets.
</summary>
@@ -20340,7 +18087,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cluster_client_packets" lineno="16096">
+<interface name="corenet_receive_cluster_client_packets" lineno="12916">
<summary>
Receive cluster_client packets.
</summary>
@@ -20351,7 +18098,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16115">
+<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="12935">
<summary>
Do not audit attempts to receive cluster_client packets.
</summary>
@@ -20362,7 +18109,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cluster_client_packets" lineno="16134">
+<interface name="corenet_sendrecv_cluster_client_packets" lineno="12954">
<summary>
Send and receive cluster_client packets.
</summary>
@@ -20373,7 +18120,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16150">
+<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="12970">
<summary>
Do not audit attempts to send and receive cluster_client packets.
</summary>
@@ -20384,7 +18131,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cluster_client_packets" lineno="16165">
+<interface name="corenet_relabelto_cluster_client_packets" lineno="12985">
<summary>
Relabel packets to cluster_client the packet type.
</summary>
@@ -20394,7 +18141,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cluster_server_packets" lineno="16185">
+<interface name="corenet_send_cluster_server_packets" lineno="13005">
<summary>
Send cluster_server packets.
</summary>
@@ -20405,7 +18152,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16204">
+<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="13024">
<summary>
Do not audit attempts to send cluster_server packets.
</summary>
@@ -20416,7 +18163,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cluster_server_packets" lineno="16223">
+<interface name="corenet_receive_cluster_server_packets" lineno="13043">
<summary>
Receive cluster_server packets.
</summary>
@@ -20427,7 +18174,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16242">
+<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="13062">
<summary>
Do not audit attempts to receive cluster_server packets.
</summary>
@@ -20438,7 +18185,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cluster_server_packets" lineno="16261">
+<interface name="corenet_sendrecv_cluster_server_packets" lineno="13081">
<summary>
Send and receive cluster_server packets.
</summary>
@@ -20449,7 +18196,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16277">
+<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="13097">
<summary>
Do not audit attempts to send and receive cluster_server packets.
</summary>
@@ -20460,7 +18207,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cluster_server_packets" lineno="16292">
+<interface name="corenet_relabelto_cluster_server_packets" lineno="13112">
<summary>
Relabel packets to cluster_server the packet type.
</summary>
@@ -20470,85 +18217,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cma_port" lineno="16314">
-<summary>
-Send and receive TCP traffic on the cma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_cma_port" lineno="16329">
-<summary>
-Send UDP traffic on the cma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16344">
-<summary>
-Do not audit attempts to send UDP traffic on the cma port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_cma_port" lineno="16359">
-<summary>
-Receive UDP traffic on the cma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16374">
-<summary>
-Do not audit attempts to receive UDP traffic on the cma port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_cma_port" lineno="16389">
-<summary>
-Send and receive UDP traffic on the cma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16405">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the cma port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_cma_port" lineno="16420">
+<interface name="corenet_tcp_bind_cma_port" lineno="13134">
<summary>
Bind TCP sockets to the cma port.
</summary>
@@ -20559,7 +18228,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cma_port" lineno="16440">
+<interface name="corenet_udp_bind_cma_port" lineno="13154">
<summary>
Bind UDP sockets to the cma port.
</summary>
@@ -20570,7 +18239,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cma_port" lineno="16459">
+<interface name="corenet_tcp_connect_cma_port" lineno="13173">
<summary>
Make a TCP connection to the cma port.
</summary>
@@ -20580,7 +18249,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cma_client_packets" lineno="16479">
+<interface name="corenet_send_cma_client_packets" lineno="13193">
<summary>
Send cma_client packets.
</summary>
@@ -20591,7 +18260,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16498">
+<interface name="corenet_dontaudit_send_cma_client_packets" lineno="13212">
<summary>
Do not audit attempts to send cma_client packets.
</summary>
@@ -20602,7 +18271,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cma_client_packets" lineno="16517">
+<interface name="corenet_receive_cma_client_packets" lineno="13231">
<summary>
Receive cma_client packets.
</summary>
@@ -20613,7 +18282,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16536">
+<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="13250">
<summary>
Do not audit attempts to receive cma_client packets.
</summary>
@@ -20624,7 +18293,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cma_client_packets" lineno="16555">
+<interface name="corenet_sendrecv_cma_client_packets" lineno="13269">
<summary>
Send and receive cma_client packets.
</summary>
@@ -20635,7 +18304,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16571">
+<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="13285">
<summary>
Do not audit attempts to send and receive cma_client packets.
</summary>
@@ -20646,7 +18315,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cma_client_packets" lineno="16586">
+<interface name="corenet_relabelto_cma_client_packets" lineno="13300">
<summary>
Relabel packets to cma_client the packet type.
</summary>
@@ -20656,7 +18325,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cma_server_packets" lineno="16606">
+<interface name="corenet_send_cma_server_packets" lineno="13320">
<summary>
Send cma_server packets.
</summary>
@@ -20667,7 +18336,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16625">
+<interface name="corenet_dontaudit_send_cma_server_packets" lineno="13339">
<summary>
Do not audit attempts to send cma_server packets.
</summary>
@@ -20678,7 +18347,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cma_server_packets" lineno="16644">
+<interface name="corenet_receive_cma_server_packets" lineno="13358">
<summary>
Receive cma_server packets.
</summary>
@@ -20689,7 +18358,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16663">
+<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="13377">
<summary>
Do not audit attempts to receive cma_server packets.
</summary>
@@ -20700,7 +18369,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cma_server_packets" lineno="16682">
+<interface name="corenet_sendrecv_cma_server_packets" lineno="13396">
<summary>
Send and receive cma_server packets.
</summary>
@@ -20711,7 +18380,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16698">
+<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="13412">
<summary>
Do not audit attempts to send and receive cma_server packets.
</summary>
@@ -20722,7 +18391,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cma_server_packets" lineno="16713">
+<interface name="corenet_relabelto_cma_server_packets" lineno="13427">
<summary>
Relabel packets to cma_server the packet type.
</summary>
@@ -20732,85 +18401,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16735">
-<summary>
-Send and receive TCP traffic on the cobbler port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_cobbler_port" lineno="16750">
-<summary>
-Send UDP traffic on the cobbler port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16765">
-<summary>
-Do not audit attempts to send UDP traffic on the cobbler port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_cobbler_port" lineno="16780">
-<summary>
-Receive UDP traffic on the cobbler port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16795">
-<summary>
-Do not audit attempts to receive UDP traffic on the cobbler port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16810">
-<summary>
-Send and receive UDP traffic on the cobbler port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16826">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the cobbler port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_cobbler_port" lineno="16841">
+<interface name="corenet_tcp_bind_cobbler_port" lineno="13449">
<summary>
Bind TCP sockets to the cobbler port.
</summary>
@@ -20821,7 +18412,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cobbler_port" lineno="16861">
+<interface name="corenet_udp_bind_cobbler_port" lineno="13469">
<summary>
Bind UDP sockets to the cobbler port.
</summary>
@@ -20832,7 +18423,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cobbler_port" lineno="16880">
+<interface name="corenet_tcp_connect_cobbler_port" lineno="13488">
<summary>
Make a TCP connection to the cobbler port.
</summary>
@@ -20842,7 +18433,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cobbler_client_packets" lineno="16900">
+<interface name="corenet_send_cobbler_client_packets" lineno="13508">
<summary>
Send cobbler_client packets.
</summary>
@@ -20853,7 +18444,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16919">
+<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="13527">
<summary>
Do not audit attempts to send cobbler_client packets.
</summary>
@@ -20864,7 +18455,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cobbler_client_packets" lineno="16938">
+<interface name="corenet_receive_cobbler_client_packets" lineno="13546">
<summary>
Receive cobbler_client packets.
</summary>
@@ -20875,7 +18466,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16957">
+<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="13565">
<summary>
Do not audit attempts to receive cobbler_client packets.
</summary>
@@ -20886,7 +18477,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16976">
+<interface name="corenet_sendrecv_cobbler_client_packets" lineno="13584">
<summary>
Send and receive cobbler_client packets.
</summary>
@@ -20897,7 +18488,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16992">
+<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="13600">
<summary>
Do not audit attempts to send and receive cobbler_client packets.
</summary>
@@ -20908,7 +18499,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cobbler_client_packets" lineno="17007">
+<interface name="corenet_relabelto_cobbler_client_packets" lineno="13615">
<summary>
Relabel packets to cobbler_client the packet type.
</summary>
@@ -20918,7 +18509,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cobbler_server_packets" lineno="17027">
+<interface name="corenet_send_cobbler_server_packets" lineno="13635">
<summary>
Send cobbler_server packets.
</summary>
@@ -20929,7 +18520,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17046">
+<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="13654">
<summary>
Do not audit attempts to send cobbler_server packets.
</summary>
@@ -20940,7 +18531,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cobbler_server_packets" lineno="17065">
+<interface name="corenet_receive_cobbler_server_packets" lineno="13673">
<summary>
Receive cobbler_server packets.
</summary>
@@ -20951,7 +18542,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17084">
+<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="13692">
<summary>
Do not audit attempts to receive cobbler_server packets.
</summary>
@@ -20962,7 +18553,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17103">
+<interface name="corenet_sendrecv_cobbler_server_packets" lineno="13711">
<summary>
Send and receive cobbler_server packets.
</summary>
@@ -20973,7 +18564,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17119">
+<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="13727">
<summary>
Do not audit attempts to send and receive cobbler_server packets.
</summary>
@@ -20984,7 +18575,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cobbler_server_packets" lineno="17134">
+<interface name="corenet_relabelto_cobbler_server_packets" lineno="13742">
<summary>
Relabel packets to cobbler_server the packet type.
</summary>
@@ -20994,85 +18585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17156">
-<summary>
-Send and receive TCP traffic on the commplex_link port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_commplex_link_port" lineno="17171">
-<summary>
-Send UDP traffic on the commplex_link port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17186">
-<summary>
-Do not audit attempts to send UDP traffic on the commplex_link port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_commplex_link_port" lineno="17201">
-<summary>
-Receive UDP traffic on the commplex_link port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17216">
-<summary>
-Do not audit attempts to receive UDP traffic on the commplex_link port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17231">
-<summary>
-Send and receive UDP traffic on the commplex_link port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17247">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the commplex_link port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_commplex_link_port" lineno="17262">
+<interface name="corenet_tcp_bind_commplex_link_port" lineno="13764">
<summary>
Bind TCP sockets to the commplex_link port.
</summary>
@@ -21083,7 +18596,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_commplex_link_port" lineno="17282">
+<interface name="corenet_udp_bind_commplex_link_port" lineno="13784">
<summary>
Bind UDP sockets to the commplex_link port.
</summary>
@@ -21094,7 +18607,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_commplex_link_port" lineno="17301">
+<interface name="corenet_tcp_connect_commplex_link_port" lineno="13803">
<summary>
Make a TCP connection to the commplex_link port.
</summary>
@@ -21104,7 +18617,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_link_client_packets" lineno="17321">
+<interface name="corenet_send_commplex_link_client_packets" lineno="13823">
<summary>
Send commplex_link_client packets.
</summary>
@@ -21115,7 +18628,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17340">
+<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="13842">
<summary>
Do not audit attempts to send commplex_link_client packets.
</summary>
@@ -21126,7 +18639,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_link_client_packets" lineno="17359">
+<interface name="corenet_receive_commplex_link_client_packets" lineno="13861">
<summary>
Receive commplex_link_client packets.
</summary>
@@ -21137,7 +18650,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17378">
+<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="13880">
<summary>
Do not audit attempts to receive commplex_link_client packets.
</summary>
@@ -21148,7 +18661,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17397">
+<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="13899">
<summary>
Send and receive commplex_link_client packets.
</summary>
@@ -21159,7 +18672,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17413">
+<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="13915">
<summary>
Do not audit attempts to send and receive commplex_link_client packets.
</summary>
@@ -21170,7 +18683,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17428">
+<interface name="corenet_relabelto_commplex_link_client_packets" lineno="13930">
<summary>
Relabel packets to commplex_link_client the packet type.
</summary>
@@ -21180,7 +18693,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_link_server_packets" lineno="17448">
+<interface name="corenet_send_commplex_link_server_packets" lineno="13950">
<summary>
Send commplex_link_server packets.
</summary>
@@ -21191,7 +18704,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17467">
+<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="13969">
<summary>
Do not audit attempts to send commplex_link_server packets.
</summary>
@@ -21202,7 +18715,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_link_server_packets" lineno="17486">
+<interface name="corenet_receive_commplex_link_server_packets" lineno="13988">
<summary>
Receive commplex_link_server packets.
</summary>
@@ -21213,7 +18726,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17505">
+<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="14007">
<summary>
Do not audit attempts to receive commplex_link_server packets.
</summary>
@@ -21224,7 +18737,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17524">
+<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="14026">
<summary>
Send and receive commplex_link_server packets.
</summary>
@@ -21235,7 +18748,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17540">
+<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="14042">
<summary>
Do not audit attempts to send and receive commplex_link_server packets.
</summary>
@@ -21246,7 +18759,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17555">
+<interface name="corenet_relabelto_commplex_link_server_packets" lineno="14057">
<summary>
Relabel packets to commplex_link_server the packet type.
</summary>
@@ -21256,85 +18769,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17577">
-<summary>
-Send and receive TCP traffic on the commplex_main port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_commplex_main_port" lineno="17592">
-<summary>
-Send UDP traffic on the commplex_main port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17607">
-<summary>
-Do not audit attempts to send UDP traffic on the commplex_main port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_commplex_main_port" lineno="17622">
-<summary>
-Receive UDP traffic on the commplex_main port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17637">
-<summary>
-Do not audit attempts to receive UDP traffic on the commplex_main port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17652">
-<summary>
-Send and receive UDP traffic on the commplex_main port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17668">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the commplex_main port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_commplex_main_port" lineno="17683">
+<interface name="corenet_tcp_bind_commplex_main_port" lineno="14079">
<summary>
Bind TCP sockets to the commplex_main port.
</summary>
@@ -21345,7 +18780,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_commplex_main_port" lineno="17703">
+<interface name="corenet_udp_bind_commplex_main_port" lineno="14099">
<summary>
Bind UDP sockets to the commplex_main port.
</summary>
@@ -21356,7 +18791,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_commplex_main_port" lineno="17722">
+<interface name="corenet_tcp_connect_commplex_main_port" lineno="14118">
<summary>
Make a TCP connection to the commplex_main port.
</summary>
@@ -21366,7 +18801,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_main_client_packets" lineno="17742">
+<interface name="corenet_send_commplex_main_client_packets" lineno="14138">
<summary>
Send commplex_main_client packets.
</summary>
@@ -21377,7 +18812,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17761">
+<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="14157">
<summary>
Do not audit attempts to send commplex_main_client packets.
</summary>
@@ -21388,7 +18823,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_main_client_packets" lineno="17780">
+<interface name="corenet_receive_commplex_main_client_packets" lineno="14176">
<summary>
Receive commplex_main_client packets.
</summary>
@@ -21399,7 +18834,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17799">
+<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="14195">
<summary>
Do not audit attempts to receive commplex_main_client packets.
</summary>
@@ -21410,7 +18845,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17818">
+<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="14214">
<summary>
Send and receive commplex_main_client packets.
</summary>
@@ -21421,7 +18856,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17834">
+<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="14230">
<summary>
Do not audit attempts to send and receive commplex_main_client packets.
</summary>
@@ -21432,7 +18867,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17849">
+<interface name="corenet_relabelto_commplex_main_client_packets" lineno="14245">
<summary>
Relabel packets to commplex_main_client the packet type.
</summary>
@@ -21442,7 +18877,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_main_server_packets" lineno="17869">
+<interface name="corenet_send_commplex_main_server_packets" lineno="14265">
<summary>
Send commplex_main_server packets.
</summary>
@@ -21453,7 +18888,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17888">
+<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="14284">
<summary>
Do not audit attempts to send commplex_main_server packets.
</summary>
@@ -21464,7 +18899,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_main_server_packets" lineno="17907">
+<interface name="corenet_receive_commplex_main_server_packets" lineno="14303">
<summary>
Receive commplex_main_server packets.
</summary>
@@ -21475,7 +18910,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17926">
+<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="14322">
<summary>
Do not audit attempts to receive commplex_main_server packets.
</summary>
@@ -21486,7 +18921,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17945">
+<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="14341">
<summary>
Send and receive commplex_main_server packets.
</summary>
@@ -21497,7 +18932,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17961">
+<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="14357">
<summary>
Do not audit attempts to send and receive commplex_main_server packets.
</summary>
@@ -21508,7 +18943,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17976">
+<interface name="corenet_relabelto_commplex_main_server_packets" lineno="14372">
<summary>
Relabel packets to commplex_main_server the packet type.
</summary>
@@ -21518,85 +18953,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17998">
-<summary>
-Send and receive TCP traffic on the comsat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_comsat_port" lineno="18013">
-<summary>
-Send UDP traffic on the comsat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18028">
-<summary>
-Do not audit attempts to send UDP traffic on the comsat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_comsat_port" lineno="18043">
-<summary>
-Receive UDP traffic on the comsat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18058">
-<summary>
-Do not audit attempts to receive UDP traffic on the comsat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_comsat_port" lineno="18073">
-<summary>
-Send and receive UDP traffic on the comsat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18089">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the comsat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_comsat_port" lineno="18104">
+<interface name="corenet_tcp_bind_comsat_port" lineno="14394">
<summary>
Bind TCP sockets to the comsat port.
</summary>
@@ -21607,7 +18964,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_comsat_port" lineno="18124">
+<interface name="corenet_udp_bind_comsat_port" lineno="14414">
<summary>
Bind UDP sockets to the comsat port.
</summary>
@@ -21618,7 +18975,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_comsat_port" lineno="18143">
+<interface name="corenet_tcp_connect_comsat_port" lineno="14433">
<summary>
Make a TCP connection to the comsat port.
</summary>
@@ -21628,7 +18985,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_comsat_client_packets" lineno="18163">
+<interface name="corenet_send_comsat_client_packets" lineno="14453">
<summary>
Send comsat_client packets.
</summary>
@@ -21639,7 +18996,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18182">
+<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="14472">
<summary>
Do not audit attempts to send comsat_client packets.
</summary>
@@ -21650,7 +19007,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_comsat_client_packets" lineno="18201">
+<interface name="corenet_receive_comsat_client_packets" lineno="14491">
<summary>
Receive comsat_client packets.
</summary>
@@ -21661,7 +19018,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18220">
+<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="14510">
<summary>
Do not audit attempts to receive comsat_client packets.
</summary>
@@ -21672,7 +19029,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_comsat_client_packets" lineno="18239">
+<interface name="corenet_sendrecv_comsat_client_packets" lineno="14529">
<summary>
Send and receive comsat_client packets.
</summary>
@@ -21683,7 +19040,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18255">
+<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="14545">
<summary>
Do not audit attempts to send and receive comsat_client packets.
</summary>
@@ -21694,7 +19051,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_comsat_client_packets" lineno="18270">
+<interface name="corenet_relabelto_comsat_client_packets" lineno="14560">
<summary>
Relabel packets to comsat_client the packet type.
</summary>
@@ -21704,7 +19061,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_comsat_server_packets" lineno="18290">
+<interface name="corenet_send_comsat_server_packets" lineno="14580">
<summary>
Send comsat_server packets.
</summary>
@@ -21715,7 +19072,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18309">
+<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="14599">
<summary>
Do not audit attempts to send comsat_server packets.
</summary>
@@ -21726,7 +19083,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_comsat_server_packets" lineno="18328">
+<interface name="corenet_receive_comsat_server_packets" lineno="14618">
<summary>
Receive comsat_server packets.
</summary>
@@ -21737,7 +19094,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18347">
+<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="14637">
<summary>
Do not audit attempts to receive comsat_server packets.
</summary>
@@ -21748,7 +19105,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_comsat_server_packets" lineno="18366">
+<interface name="corenet_sendrecv_comsat_server_packets" lineno="14656">
<summary>
Send and receive comsat_server packets.
</summary>
@@ -21759,7 +19116,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18382">
+<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="14672">
<summary>
Do not audit attempts to send and receive comsat_server packets.
</summary>
@@ -21770,7 +19127,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_comsat_server_packets" lineno="18397">
+<interface name="corenet_relabelto_comsat_server_packets" lineno="14687">
<summary>
Relabel packets to comsat_server the packet type.
</summary>
@@ -21780,85 +19137,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_condor_port" lineno="18419">
-<summary>
-Send and receive TCP traffic on the condor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_condor_port" lineno="18434">
-<summary>
-Send UDP traffic on the condor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18449">
-<summary>
-Do not audit attempts to send UDP traffic on the condor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_condor_port" lineno="18464">
-<summary>
-Receive UDP traffic on the condor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18479">
-<summary>
-Do not audit attempts to receive UDP traffic on the condor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_condor_port" lineno="18494">
-<summary>
-Send and receive UDP traffic on the condor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18510">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the condor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_condor_port" lineno="18525">
+<interface name="corenet_tcp_bind_condor_port" lineno="14709">
<summary>
Bind TCP sockets to the condor port.
</summary>
@@ -21869,7 +19148,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_condor_port" lineno="18545">
+<interface name="corenet_udp_bind_condor_port" lineno="14729">
<summary>
Bind UDP sockets to the condor port.
</summary>
@@ -21880,7 +19159,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_condor_port" lineno="18564">
+<interface name="corenet_tcp_connect_condor_port" lineno="14748">
<summary>
Make a TCP connection to the condor port.
</summary>
@@ -21890,7 +19169,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_condor_client_packets" lineno="18584">
+<interface name="corenet_send_condor_client_packets" lineno="14768">
<summary>
Send condor_client packets.
</summary>
@@ -21901,7 +19180,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18603">
+<interface name="corenet_dontaudit_send_condor_client_packets" lineno="14787">
<summary>
Do not audit attempts to send condor_client packets.
</summary>
@@ -21912,7 +19191,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_condor_client_packets" lineno="18622">
+<interface name="corenet_receive_condor_client_packets" lineno="14806">
<summary>
Receive condor_client packets.
</summary>
@@ -21923,7 +19202,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18641">
+<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="14825">
<summary>
Do not audit attempts to receive condor_client packets.
</summary>
@@ -21934,7 +19213,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_condor_client_packets" lineno="18660">
+<interface name="corenet_sendrecv_condor_client_packets" lineno="14844">
<summary>
Send and receive condor_client packets.
</summary>
@@ -21945,7 +19224,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18676">
+<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="14860">
<summary>
Do not audit attempts to send and receive condor_client packets.
</summary>
@@ -21956,7 +19235,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_condor_client_packets" lineno="18691">
+<interface name="corenet_relabelto_condor_client_packets" lineno="14875">
<summary>
Relabel packets to condor_client the packet type.
</summary>
@@ -21966,7 +19245,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_condor_server_packets" lineno="18711">
+<interface name="corenet_send_condor_server_packets" lineno="14895">
<summary>
Send condor_server packets.
</summary>
@@ -21977,7 +19256,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18730">
+<interface name="corenet_dontaudit_send_condor_server_packets" lineno="14914">
<summary>
Do not audit attempts to send condor_server packets.
</summary>
@@ -21988,7 +19267,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_condor_server_packets" lineno="18749">
+<interface name="corenet_receive_condor_server_packets" lineno="14933">
<summary>
Receive condor_server packets.
</summary>
@@ -21999,7 +19278,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18768">
+<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="14952">
<summary>
Do not audit attempts to receive condor_server packets.
</summary>
@@ -22010,7 +19289,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_condor_server_packets" lineno="18787">
+<interface name="corenet_sendrecv_condor_server_packets" lineno="14971">
<summary>
Send and receive condor_server packets.
</summary>
@@ -22021,7 +19300,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18803">
+<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="14987">
<summary>
Do not audit attempts to send and receive condor_server packets.
</summary>
@@ -22032,7 +19311,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_condor_server_packets" lineno="18818">
+<interface name="corenet_relabelto_condor_server_packets" lineno="15002">
<summary>
Relabel packets to condor_server the packet type.
</summary>
@@ -22042,85 +19321,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18840">
-<summary>
-Send and receive TCP traffic on the couchdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_couchdb_port" lineno="18855">
-<summary>
-Send UDP traffic on the couchdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18870">
-<summary>
-Do not audit attempts to send UDP traffic on the couchdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_couchdb_port" lineno="18885">
-<summary>
-Receive UDP traffic on the couchdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18900">
-<summary>
-Do not audit attempts to receive UDP traffic on the couchdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18915">
-<summary>
-Send and receive UDP traffic on the couchdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18931">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the couchdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_couchdb_port" lineno="18946">
+<interface name="corenet_tcp_bind_couchdb_port" lineno="15024">
<summary>
Bind TCP sockets to the couchdb port.
</summary>
@@ -22131,7 +19332,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_couchdb_port" lineno="18966">
+<interface name="corenet_udp_bind_couchdb_port" lineno="15044">
<summary>
Bind UDP sockets to the couchdb port.
</summary>
@@ -22142,7 +19343,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_couchdb_port" lineno="18985">
+<interface name="corenet_tcp_connect_couchdb_port" lineno="15063">
<summary>
Make a TCP connection to the couchdb port.
</summary>
@@ -22152,7 +19353,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_couchdb_client_packets" lineno="19005">
+<interface name="corenet_send_couchdb_client_packets" lineno="15083">
<summary>
Send couchdb_client packets.
</summary>
@@ -22163,7 +19364,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19024">
+<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="15102">
<summary>
Do not audit attempts to send couchdb_client packets.
</summary>
@@ -22174,7 +19375,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_couchdb_client_packets" lineno="19043">
+<interface name="corenet_receive_couchdb_client_packets" lineno="15121">
<summary>
Receive couchdb_client packets.
</summary>
@@ -22185,7 +19386,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19062">
+<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="15140">
<summary>
Do not audit attempts to receive couchdb_client packets.
</summary>
@@ -22196,7 +19397,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19081">
+<interface name="corenet_sendrecv_couchdb_client_packets" lineno="15159">
<summary>
Send and receive couchdb_client packets.
</summary>
@@ -22207,7 +19408,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19097">
+<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="15175">
<summary>
Do not audit attempts to send and receive couchdb_client packets.
</summary>
@@ -22218,7 +19419,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_couchdb_client_packets" lineno="19112">
+<interface name="corenet_relabelto_couchdb_client_packets" lineno="15190">
<summary>
Relabel packets to couchdb_client the packet type.
</summary>
@@ -22228,7 +19429,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_couchdb_server_packets" lineno="19132">
+<interface name="corenet_send_couchdb_server_packets" lineno="15210">
<summary>
Send couchdb_server packets.
</summary>
@@ -22239,7 +19440,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19151">
+<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="15229">
<summary>
Do not audit attempts to send couchdb_server packets.
</summary>
@@ -22250,7 +19451,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_couchdb_server_packets" lineno="19170">
+<interface name="corenet_receive_couchdb_server_packets" lineno="15248">
<summary>
Receive couchdb_server packets.
</summary>
@@ -22261,7 +19462,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19189">
+<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="15267">
<summary>
Do not audit attempts to receive couchdb_server packets.
</summary>
@@ -22272,7 +19473,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19208">
+<interface name="corenet_sendrecv_couchdb_server_packets" lineno="15286">
<summary>
Send and receive couchdb_server packets.
</summary>
@@ -22283,7 +19484,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19224">
+<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="15302">
<summary>
Do not audit attempts to send and receive couchdb_server packets.
</summary>
@@ -22294,7 +19495,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_couchdb_server_packets" lineno="19239">
+<interface name="corenet_relabelto_couchdb_server_packets" lineno="15317">
<summary>
Relabel packets to couchdb_server the packet type.
</summary>
@@ -22304,85 +19505,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19261">
-<summary>
-Send and receive TCP traffic on the cslistener port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_cslistener_port" lineno="19276">
-<summary>
-Send UDP traffic on the cslistener port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19291">
-<summary>
-Do not audit attempts to send UDP traffic on the cslistener port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_cslistener_port" lineno="19306">
-<summary>
-Receive UDP traffic on the cslistener port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19321">
-<summary>
-Do not audit attempts to receive UDP traffic on the cslistener port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19336">
-<summary>
-Send and receive UDP traffic on the cslistener port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19352">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the cslistener port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_cslistener_port" lineno="19367">
+<interface name="corenet_tcp_bind_cslistener_port" lineno="15339">
<summary>
Bind TCP sockets to the cslistener port.
</summary>
@@ -22393,7 +19516,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cslistener_port" lineno="19387">
+<interface name="corenet_udp_bind_cslistener_port" lineno="15359">
<summary>
Bind UDP sockets to the cslistener port.
</summary>
@@ -22404,7 +19527,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cslistener_port" lineno="19406">
+<interface name="corenet_tcp_connect_cslistener_port" lineno="15378">
<summary>
Make a TCP connection to the cslistener port.
</summary>
@@ -22414,7 +19537,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cslistener_client_packets" lineno="19426">
+<interface name="corenet_send_cslistener_client_packets" lineno="15398">
<summary>
Send cslistener_client packets.
</summary>
@@ -22425,7 +19548,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19445">
+<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="15417">
<summary>
Do not audit attempts to send cslistener_client packets.
</summary>
@@ -22436,7 +19559,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cslistener_client_packets" lineno="19464">
+<interface name="corenet_receive_cslistener_client_packets" lineno="15436">
<summary>
Receive cslistener_client packets.
</summary>
@@ -22447,7 +19570,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19483">
+<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="15455">
<summary>
Do not audit attempts to receive cslistener_client packets.
</summary>
@@ -22458,7 +19581,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19502">
+<interface name="corenet_sendrecv_cslistener_client_packets" lineno="15474">
<summary>
Send and receive cslistener_client packets.
</summary>
@@ -22469,7 +19592,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19518">
+<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="15490">
<summary>
Do not audit attempts to send and receive cslistener_client packets.
</summary>
@@ -22480,7 +19603,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cslistener_client_packets" lineno="19533">
+<interface name="corenet_relabelto_cslistener_client_packets" lineno="15505">
<summary>
Relabel packets to cslistener_client the packet type.
</summary>
@@ -22490,7 +19613,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cslistener_server_packets" lineno="19553">
+<interface name="corenet_send_cslistener_server_packets" lineno="15525">
<summary>
Send cslistener_server packets.
</summary>
@@ -22501,7 +19624,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19572">
+<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="15544">
<summary>
Do not audit attempts to send cslistener_server packets.
</summary>
@@ -22512,7 +19635,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cslistener_server_packets" lineno="19591">
+<interface name="corenet_receive_cslistener_server_packets" lineno="15563">
<summary>
Receive cslistener_server packets.
</summary>
@@ -22523,7 +19646,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19610">
+<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="15582">
<summary>
Do not audit attempts to receive cslistener_server packets.
</summary>
@@ -22534,7 +19657,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19629">
+<interface name="corenet_sendrecv_cslistener_server_packets" lineno="15601">
<summary>
Send and receive cslistener_server packets.
</summary>
@@ -22545,7 +19668,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19645">
+<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="15617">
<summary>
Do not audit attempts to send and receive cslistener_server packets.
</summary>
@@ -22556,7 +19679,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cslistener_server_packets" lineno="19660">
+<interface name="corenet_relabelto_cslistener_server_packets" lineno="15632">
<summary>
Relabel packets to cslistener_server the packet type.
</summary>
@@ -22566,85 +19689,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19682">
-<summary>
-Send and receive TCP traffic on the ctdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ctdb_port" lineno="19697">
-<summary>
-Send UDP traffic on the ctdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19712">
-<summary>
-Do not audit attempts to send UDP traffic on the ctdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ctdb_port" lineno="19727">
-<summary>
-Receive UDP traffic on the ctdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19742">
-<summary>
-Do not audit attempts to receive UDP traffic on the ctdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19757">
-<summary>
-Send and receive UDP traffic on the ctdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19773">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ctdb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ctdb_port" lineno="19788">
+<interface name="corenet_tcp_bind_ctdb_port" lineno="15654">
<summary>
Bind TCP sockets to the ctdb port.
</summary>
@@ -22655,7 +19700,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ctdb_port" lineno="19808">
+<interface name="corenet_udp_bind_ctdb_port" lineno="15674">
<summary>
Bind UDP sockets to the ctdb port.
</summary>
@@ -22666,7 +19711,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ctdb_port" lineno="19827">
+<interface name="corenet_tcp_connect_ctdb_port" lineno="15693">
<summary>
Make a TCP connection to the ctdb port.
</summary>
@@ -22676,7 +19721,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ctdb_client_packets" lineno="19847">
+<interface name="corenet_send_ctdb_client_packets" lineno="15713">
<summary>
Send ctdb_client packets.
</summary>
@@ -22687,7 +19732,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19866">
+<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="15732">
<summary>
Do not audit attempts to send ctdb_client packets.
</summary>
@@ -22698,7 +19743,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ctdb_client_packets" lineno="19885">
+<interface name="corenet_receive_ctdb_client_packets" lineno="15751">
<summary>
Receive ctdb_client packets.
</summary>
@@ -22709,7 +19754,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19904">
+<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="15770">
<summary>
Do not audit attempts to receive ctdb_client packets.
</summary>
@@ -22720,7 +19765,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19923">
+<interface name="corenet_sendrecv_ctdb_client_packets" lineno="15789">
<summary>
Send and receive ctdb_client packets.
</summary>
@@ -22731,7 +19776,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19939">
+<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="15805">
<summary>
Do not audit attempts to send and receive ctdb_client packets.
</summary>
@@ -22742,7 +19787,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ctdb_client_packets" lineno="19954">
+<interface name="corenet_relabelto_ctdb_client_packets" lineno="15820">
<summary>
Relabel packets to ctdb_client the packet type.
</summary>
@@ -22752,7 +19797,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ctdb_server_packets" lineno="19974">
+<interface name="corenet_send_ctdb_server_packets" lineno="15840">
<summary>
Send ctdb_server packets.
</summary>
@@ -22763,7 +19808,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19993">
+<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="15859">
<summary>
Do not audit attempts to send ctdb_server packets.
</summary>
@@ -22774,7 +19819,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ctdb_server_packets" lineno="20012">
+<interface name="corenet_receive_ctdb_server_packets" lineno="15878">
<summary>
Receive ctdb_server packets.
</summary>
@@ -22785,7 +19830,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20031">
+<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="15897">
<summary>
Do not audit attempts to receive ctdb_server packets.
</summary>
@@ -22796,7 +19841,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20050">
+<interface name="corenet_sendrecv_ctdb_server_packets" lineno="15916">
<summary>
Send and receive ctdb_server packets.
</summary>
@@ -22807,7 +19852,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20066">
+<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="15932">
<summary>
Do not audit attempts to send and receive ctdb_server packets.
</summary>
@@ -22818,7 +19863,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ctdb_server_packets" lineno="20081">
+<interface name="corenet_relabelto_ctdb_server_packets" lineno="15947">
<summary>
Relabel packets to ctdb_server the packet type.
</summary>
@@ -22828,85 +19873,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20103">
-<summary>
-Send and receive TCP traffic on the cvs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_cvs_port" lineno="20118">
-<summary>
-Send UDP traffic on the cvs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20133">
-<summary>
-Do not audit attempts to send UDP traffic on the cvs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_cvs_port" lineno="20148">
-<summary>
-Receive UDP traffic on the cvs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20163">
-<summary>
-Do not audit attempts to receive UDP traffic on the cvs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_cvs_port" lineno="20178">
-<summary>
-Send and receive UDP traffic on the cvs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20194">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the cvs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_cvs_port" lineno="20209">
+<interface name="corenet_tcp_bind_cvs_port" lineno="15969">
<summary>
Bind TCP sockets to the cvs port.
</summary>
@@ -22917,7 +19884,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cvs_port" lineno="20229">
+<interface name="corenet_udp_bind_cvs_port" lineno="15989">
<summary>
Bind UDP sockets to the cvs port.
</summary>
@@ -22928,7 +19895,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cvs_port" lineno="20248">
+<interface name="corenet_tcp_connect_cvs_port" lineno="16008">
<summary>
Make a TCP connection to the cvs port.
</summary>
@@ -22938,7 +19905,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cvs_client_packets" lineno="20268">
+<interface name="corenet_send_cvs_client_packets" lineno="16028">
<summary>
Send cvs_client packets.
</summary>
@@ -22949,7 +19916,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20287">
+<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="16047">
<summary>
Do not audit attempts to send cvs_client packets.
</summary>
@@ -22960,7 +19927,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cvs_client_packets" lineno="20306">
+<interface name="corenet_receive_cvs_client_packets" lineno="16066">
<summary>
Receive cvs_client packets.
</summary>
@@ -22971,7 +19938,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20325">
+<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="16085">
<summary>
Do not audit attempts to receive cvs_client packets.
</summary>
@@ -22982,7 +19949,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cvs_client_packets" lineno="20344">
+<interface name="corenet_sendrecv_cvs_client_packets" lineno="16104">
<summary>
Send and receive cvs_client packets.
</summary>
@@ -22993,7 +19960,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20360">
+<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="16120">
<summary>
Do not audit attempts to send and receive cvs_client packets.
</summary>
@@ -23004,7 +19971,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cvs_client_packets" lineno="20375">
+<interface name="corenet_relabelto_cvs_client_packets" lineno="16135">
<summary>
Relabel packets to cvs_client the packet type.
</summary>
@@ -23014,7 +19981,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cvs_server_packets" lineno="20395">
+<interface name="corenet_send_cvs_server_packets" lineno="16155">
<summary>
Send cvs_server packets.
</summary>
@@ -23025,7 +19992,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20414">
+<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="16174">
<summary>
Do not audit attempts to send cvs_server packets.
</summary>
@@ -23036,7 +20003,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cvs_server_packets" lineno="20433">
+<interface name="corenet_receive_cvs_server_packets" lineno="16193">
<summary>
Receive cvs_server packets.
</summary>
@@ -23047,7 +20014,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20452">
+<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="16212">
<summary>
Do not audit attempts to receive cvs_server packets.
</summary>
@@ -23058,7 +20025,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cvs_server_packets" lineno="20471">
+<interface name="corenet_sendrecv_cvs_server_packets" lineno="16231">
<summary>
Send and receive cvs_server packets.
</summary>
@@ -23069,7 +20036,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20487">
+<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="16247">
<summary>
Do not audit attempts to send and receive cvs_server packets.
</summary>
@@ -23080,7 +20047,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cvs_server_packets" lineno="20502">
+<interface name="corenet_relabelto_cvs_server_packets" lineno="16262">
<summary>
Relabel packets to cvs_server the packet type.
</summary>
@@ -23090,85 +20057,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20524">
-<summary>
-Send and receive TCP traffic on the cyphesis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_cyphesis_port" lineno="20539">
-<summary>
-Send UDP traffic on the cyphesis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20554">
-<summary>
-Do not audit attempts to send UDP traffic on the cyphesis port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_cyphesis_port" lineno="20569">
-<summary>
-Receive UDP traffic on the cyphesis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20584">
-<summary>
-Do not audit attempts to receive UDP traffic on the cyphesis port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20599">
-<summary>
-Send and receive UDP traffic on the cyphesis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20615">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the cyphesis port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_cyphesis_port" lineno="20630">
+<interface name="corenet_tcp_bind_cyphesis_port" lineno="16284">
<summary>
Bind TCP sockets to the cyphesis port.
</summary>
@@ -23179,7 +20068,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cyphesis_port" lineno="20650">
+<interface name="corenet_udp_bind_cyphesis_port" lineno="16304">
<summary>
Bind UDP sockets to the cyphesis port.
</summary>
@@ -23190,7 +20079,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cyphesis_port" lineno="20669">
+<interface name="corenet_tcp_connect_cyphesis_port" lineno="16323">
<summary>
Make a TCP connection to the cyphesis port.
</summary>
@@ -23200,7 +20089,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cyphesis_client_packets" lineno="20689">
+<interface name="corenet_send_cyphesis_client_packets" lineno="16343">
<summary>
Send cyphesis_client packets.
</summary>
@@ -23211,7 +20100,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20708">
+<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="16362">
<summary>
Do not audit attempts to send cyphesis_client packets.
</summary>
@@ -23222,7 +20111,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cyphesis_client_packets" lineno="20727">
+<interface name="corenet_receive_cyphesis_client_packets" lineno="16381">
<summary>
Receive cyphesis_client packets.
</summary>
@@ -23233,7 +20122,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20746">
+<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="16400">
<summary>
Do not audit attempts to receive cyphesis_client packets.
</summary>
@@ -23244,7 +20133,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20765">
+<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="16419">
<summary>
Send and receive cyphesis_client packets.
</summary>
@@ -23255,7 +20144,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20781">
+<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="16435">
<summary>
Do not audit attempts to send and receive cyphesis_client packets.
</summary>
@@ -23266,7 +20155,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20796">
+<interface name="corenet_relabelto_cyphesis_client_packets" lineno="16450">
<summary>
Relabel packets to cyphesis_client the packet type.
</summary>
@@ -23276,7 +20165,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cyphesis_server_packets" lineno="20816">
+<interface name="corenet_send_cyphesis_server_packets" lineno="16470">
<summary>
Send cyphesis_server packets.
</summary>
@@ -23287,7 +20176,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20835">
+<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="16489">
<summary>
Do not audit attempts to send cyphesis_server packets.
</summary>
@@ -23298,7 +20187,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cyphesis_server_packets" lineno="20854">
+<interface name="corenet_receive_cyphesis_server_packets" lineno="16508">
<summary>
Receive cyphesis_server packets.
</summary>
@@ -23309,7 +20198,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20873">
+<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="16527">
<summary>
Do not audit attempts to receive cyphesis_server packets.
</summary>
@@ -23320,7 +20209,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20892">
+<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="16546">
<summary>
Send and receive cyphesis_server packets.
</summary>
@@ -23331,7 +20220,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20908">
+<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="16562">
<summary>
Do not audit attempts to send and receive cyphesis_server packets.
</summary>
@@ -23342,7 +20231,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20923">
+<interface name="corenet_relabelto_cyphesis_server_packets" lineno="16577">
<summary>
Relabel packets to cyphesis_server the packet type.
</summary>
@@ -23352,85 +20241,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_daap_port" lineno="20945">
-<summary>
-Send and receive TCP traffic on the daap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_daap_port" lineno="20960">
-<summary>
-Send UDP traffic on the daap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20975">
-<summary>
-Do not audit attempts to send UDP traffic on the daap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_daap_port" lineno="20990">
-<summary>
-Receive UDP traffic on the daap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="21005">
-<summary>
-Do not audit attempts to receive UDP traffic on the daap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_daap_port" lineno="21020">
-<summary>
-Send and receive UDP traffic on the daap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21036">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the daap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_daap_port" lineno="21051">
+<interface name="corenet_tcp_bind_daap_port" lineno="16599">
<summary>
Bind TCP sockets to the daap port.
</summary>
@@ -23441,7 +20252,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_daap_port" lineno="21071">
+<interface name="corenet_udp_bind_daap_port" lineno="16619">
<summary>
Bind UDP sockets to the daap port.
</summary>
@@ -23452,7 +20263,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_daap_port" lineno="21090">
+<interface name="corenet_tcp_connect_daap_port" lineno="16638">
<summary>
Make a TCP connection to the daap port.
</summary>
@@ -23462,7 +20273,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_daap_client_packets" lineno="21110">
+<interface name="corenet_send_daap_client_packets" lineno="16658">
<summary>
Send daap_client packets.
</summary>
@@ -23473,7 +20284,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21129">
+<interface name="corenet_dontaudit_send_daap_client_packets" lineno="16677">
<summary>
Do not audit attempts to send daap_client packets.
</summary>
@@ -23484,7 +20295,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_daap_client_packets" lineno="21148">
+<interface name="corenet_receive_daap_client_packets" lineno="16696">
<summary>
Receive daap_client packets.
</summary>
@@ -23495,7 +20306,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21167">
+<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="16715">
<summary>
Do not audit attempts to receive daap_client packets.
</summary>
@@ -23506,7 +20317,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_daap_client_packets" lineno="21186">
+<interface name="corenet_sendrecv_daap_client_packets" lineno="16734">
<summary>
Send and receive daap_client packets.
</summary>
@@ -23517,7 +20328,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21202">
+<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="16750">
<summary>
Do not audit attempts to send and receive daap_client packets.
</summary>
@@ -23528,7 +20339,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_daap_client_packets" lineno="21217">
+<interface name="corenet_relabelto_daap_client_packets" lineno="16765">
<summary>
Relabel packets to daap_client the packet type.
</summary>
@@ -23538,7 +20349,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_daap_server_packets" lineno="21237">
+<interface name="corenet_send_daap_server_packets" lineno="16785">
<summary>
Send daap_server packets.
</summary>
@@ -23549,7 +20360,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21256">
+<interface name="corenet_dontaudit_send_daap_server_packets" lineno="16804">
<summary>
Do not audit attempts to send daap_server packets.
</summary>
@@ -23560,7 +20371,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_daap_server_packets" lineno="21275">
+<interface name="corenet_receive_daap_server_packets" lineno="16823">
<summary>
Receive daap_server packets.
</summary>
@@ -23571,7 +20382,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21294">
+<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="16842">
<summary>
Do not audit attempts to receive daap_server packets.
</summary>
@@ -23582,7 +20393,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_daap_server_packets" lineno="21313">
+<interface name="corenet_sendrecv_daap_server_packets" lineno="16861">
<summary>
Send and receive daap_server packets.
</summary>
@@ -23593,7 +20404,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21329">
+<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="16877">
<summary>
Do not audit attempts to send and receive daap_server packets.
</summary>
@@ -23604,7 +20415,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_daap_server_packets" lineno="21344">
+<interface name="corenet_relabelto_daap_server_packets" lineno="16892">
<summary>
Relabel packets to daap_server the packet type.
</summary>
@@ -23614,85 +20425,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21366">
-<summary>
-Send and receive TCP traffic on the dbskkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dbskkd_port" lineno="21381">
-<summary>
-Send UDP traffic on the dbskkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21396">
-<summary>
-Do not audit attempts to send UDP traffic on the dbskkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dbskkd_port" lineno="21411">
-<summary>
-Receive UDP traffic on the dbskkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21426">
-<summary>
-Do not audit attempts to receive UDP traffic on the dbskkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21441">
-<summary>
-Send and receive UDP traffic on the dbskkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21457">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dbskkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dbskkd_port" lineno="21472">
+<interface name="corenet_tcp_bind_dbskkd_port" lineno="16914">
<summary>
Bind TCP sockets to the dbskkd port.
</summary>
@@ -23703,7 +20436,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dbskkd_port" lineno="21492">
+<interface name="corenet_udp_bind_dbskkd_port" lineno="16934">
<summary>
Bind UDP sockets to the dbskkd port.
</summary>
@@ -23714,7 +20447,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dbskkd_port" lineno="21511">
+<interface name="corenet_tcp_connect_dbskkd_port" lineno="16953">
<summary>
Make a TCP connection to the dbskkd port.
</summary>
@@ -23724,7 +20457,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dbskkd_client_packets" lineno="21531">
+<interface name="corenet_send_dbskkd_client_packets" lineno="16973">
<summary>
Send dbskkd_client packets.
</summary>
@@ -23735,7 +20468,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21550">
+<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="16992">
<summary>
Do not audit attempts to send dbskkd_client packets.
</summary>
@@ -23746,7 +20479,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dbskkd_client_packets" lineno="21569">
+<interface name="corenet_receive_dbskkd_client_packets" lineno="17011">
<summary>
Receive dbskkd_client packets.
</summary>
@@ -23757,7 +20490,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21588">
+<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="17030">
<summary>
Do not audit attempts to receive dbskkd_client packets.
</summary>
@@ -23768,7 +20501,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21607">
+<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="17049">
<summary>
Send and receive dbskkd_client packets.
</summary>
@@ -23779,7 +20512,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21623">
+<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="17065">
<summary>
Do not audit attempts to send and receive dbskkd_client packets.
</summary>
@@ -23790,7 +20523,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21638">
+<interface name="corenet_relabelto_dbskkd_client_packets" lineno="17080">
<summary>
Relabel packets to dbskkd_client the packet type.
</summary>
@@ -23800,7 +20533,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dbskkd_server_packets" lineno="21658">
+<interface name="corenet_send_dbskkd_server_packets" lineno="17100">
<summary>
Send dbskkd_server packets.
</summary>
@@ -23811,7 +20544,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21677">
+<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="17119">
<summary>
Do not audit attempts to send dbskkd_server packets.
</summary>
@@ -23822,7 +20555,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dbskkd_server_packets" lineno="21696">
+<interface name="corenet_receive_dbskkd_server_packets" lineno="17138">
<summary>
Receive dbskkd_server packets.
</summary>
@@ -23833,7 +20566,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21715">
+<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="17157">
<summary>
Do not audit attempts to receive dbskkd_server packets.
</summary>
@@ -23844,7 +20577,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21734">
+<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="17176">
<summary>
Send and receive dbskkd_server packets.
</summary>
@@ -23855,7 +20588,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21750">
+<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="17192">
<summary>
Do not audit attempts to send and receive dbskkd_server packets.
</summary>
@@ -23866,7 +20599,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21765">
+<interface name="corenet_relabelto_dbskkd_server_packets" lineno="17207">
<summary>
Relabel packets to dbskkd_server the packet type.
</summary>
@@ -23876,85 +20609,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21787">
-<summary>
-Send and receive TCP traffic on the dcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dcc_port" lineno="21802">
-<summary>
-Send UDP traffic on the dcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21817">
-<summary>
-Do not audit attempts to send UDP traffic on the dcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dcc_port" lineno="21832">
-<summary>
-Receive UDP traffic on the dcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21847">
-<summary>
-Do not audit attempts to receive UDP traffic on the dcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dcc_port" lineno="21862">
-<summary>
-Send and receive UDP traffic on the dcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21878">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dcc_port" lineno="21893">
+<interface name="corenet_tcp_bind_dcc_port" lineno="17229">
<summary>
Bind TCP sockets to the dcc port.
</summary>
@@ -23965,7 +20620,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dcc_port" lineno="21913">
+<interface name="corenet_udp_bind_dcc_port" lineno="17249">
<summary>
Bind UDP sockets to the dcc port.
</summary>
@@ -23976,7 +20631,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dcc_port" lineno="21932">
+<interface name="corenet_tcp_connect_dcc_port" lineno="17268">
<summary>
Make a TCP connection to the dcc port.
</summary>
@@ -23986,7 +20641,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dcc_client_packets" lineno="21952">
+<interface name="corenet_send_dcc_client_packets" lineno="17288">
<summary>
Send dcc_client packets.
</summary>
@@ -23997,7 +20652,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21971">
+<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="17307">
<summary>
Do not audit attempts to send dcc_client packets.
</summary>
@@ -24008,7 +20663,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dcc_client_packets" lineno="21990">
+<interface name="corenet_receive_dcc_client_packets" lineno="17326">
<summary>
Receive dcc_client packets.
</summary>
@@ -24019,7 +20674,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="22009">
+<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="17345">
<summary>
Do not audit attempts to receive dcc_client packets.
</summary>
@@ -24030,7 +20685,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dcc_client_packets" lineno="22028">
+<interface name="corenet_sendrecv_dcc_client_packets" lineno="17364">
<summary>
Send and receive dcc_client packets.
</summary>
@@ -24041,7 +20696,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22044">
+<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="17380">
<summary>
Do not audit attempts to send and receive dcc_client packets.
</summary>
@@ -24052,7 +20707,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dcc_client_packets" lineno="22059">
+<interface name="corenet_relabelto_dcc_client_packets" lineno="17395">
<summary>
Relabel packets to dcc_client the packet type.
</summary>
@@ -24062,7 +20717,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dcc_server_packets" lineno="22079">
+<interface name="corenet_send_dcc_server_packets" lineno="17415">
<summary>
Send dcc_server packets.
</summary>
@@ -24073,7 +20728,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22098">
+<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="17434">
<summary>
Do not audit attempts to send dcc_server packets.
</summary>
@@ -24084,7 +20739,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dcc_server_packets" lineno="22117">
+<interface name="corenet_receive_dcc_server_packets" lineno="17453">
<summary>
Receive dcc_server packets.
</summary>
@@ -24095,7 +20750,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22136">
+<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="17472">
<summary>
Do not audit attempts to receive dcc_server packets.
</summary>
@@ -24106,7 +20761,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dcc_server_packets" lineno="22155">
+<interface name="corenet_sendrecv_dcc_server_packets" lineno="17491">
<summary>
Send and receive dcc_server packets.
</summary>
@@ -24117,7 +20772,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22171">
+<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="17507">
<summary>
Do not audit attempts to send and receive dcc_server packets.
</summary>
@@ -24128,7 +20783,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dcc_server_packets" lineno="22186">
+<interface name="corenet_relabelto_dcc_server_packets" lineno="17522">
<summary>
Relabel packets to dcc_server the packet type.
</summary>
@@ -24138,85 +20793,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22208">
-<summary>
-Send and receive TCP traffic on the dccm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dccm_port" lineno="22223">
-<summary>
-Send UDP traffic on the dccm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22238">
-<summary>
-Do not audit attempts to send UDP traffic on the dccm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dccm_port" lineno="22253">
-<summary>
-Receive UDP traffic on the dccm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22268">
-<summary>
-Do not audit attempts to receive UDP traffic on the dccm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dccm_port" lineno="22283">
-<summary>
-Send and receive UDP traffic on the dccm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22299">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dccm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dccm_port" lineno="22314">
+<interface name="corenet_tcp_bind_dccm_port" lineno="17544">
<summary>
Bind TCP sockets to the dccm port.
</summary>
@@ -24227,7 +20804,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dccm_port" lineno="22334">
+<interface name="corenet_udp_bind_dccm_port" lineno="17564">
<summary>
Bind UDP sockets to the dccm port.
</summary>
@@ -24238,7 +20815,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dccm_port" lineno="22353">
+<interface name="corenet_tcp_connect_dccm_port" lineno="17583">
<summary>
Make a TCP connection to the dccm port.
</summary>
@@ -24248,7 +20825,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dccm_client_packets" lineno="22373">
+<interface name="corenet_send_dccm_client_packets" lineno="17603">
<summary>
Send dccm_client packets.
</summary>
@@ -24259,7 +20836,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22392">
+<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="17622">
<summary>
Do not audit attempts to send dccm_client packets.
</summary>
@@ -24270,7 +20847,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dccm_client_packets" lineno="22411">
+<interface name="corenet_receive_dccm_client_packets" lineno="17641">
<summary>
Receive dccm_client packets.
</summary>
@@ -24281,7 +20858,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22430">
+<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="17660">
<summary>
Do not audit attempts to receive dccm_client packets.
</summary>
@@ -24292,7 +20869,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dccm_client_packets" lineno="22449">
+<interface name="corenet_sendrecv_dccm_client_packets" lineno="17679">
<summary>
Send and receive dccm_client packets.
</summary>
@@ -24303,7 +20880,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22465">
+<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="17695">
<summary>
Do not audit attempts to send and receive dccm_client packets.
</summary>
@@ -24314,7 +20891,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dccm_client_packets" lineno="22480">
+<interface name="corenet_relabelto_dccm_client_packets" lineno="17710">
<summary>
Relabel packets to dccm_client the packet type.
</summary>
@@ -24324,7 +20901,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dccm_server_packets" lineno="22500">
+<interface name="corenet_send_dccm_server_packets" lineno="17730">
<summary>
Send dccm_server packets.
</summary>
@@ -24335,7 +20912,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22519">
+<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="17749">
<summary>
Do not audit attempts to send dccm_server packets.
</summary>
@@ -24346,7 +20923,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dccm_server_packets" lineno="22538">
+<interface name="corenet_receive_dccm_server_packets" lineno="17768">
<summary>
Receive dccm_server packets.
</summary>
@@ -24357,7 +20934,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="22557">
+<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="17787">
<summary>
Do not audit attempts to receive dccm_server packets.
</summary>
@@ -24368,7 +20945,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dccm_server_packets" lineno="22576">
+<interface name="corenet_sendrecv_dccm_server_packets" lineno="17806">
<summary>
Send and receive dccm_server packets.
</summary>
@@ -24379,7 +20956,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22592">
+<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="17822">
<summary>
Do not audit attempts to send and receive dccm_server packets.
</summary>
@@ -24390,7 +20967,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dccm_server_packets" lineno="22607">
+<interface name="corenet_relabelto_dccm_server_packets" lineno="17837">
<summary>
Relabel packets to dccm_server the packet type.
</summary>
@@ -24400,85 +20977,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22629">
-<summary>
-Send and receive TCP traffic on the dhcpc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dhcpc_port" lineno="22644">
-<summary>
-Send UDP traffic on the dhcpc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22659">
-<summary>
-Do not audit attempts to send UDP traffic on the dhcpc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dhcpc_port" lineno="22674">
-<summary>
-Receive UDP traffic on the dhcpc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22689">
-<summary>
-Do not audit attempts to receive UDP traffic on the dhcpc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22704">
-<summary>
-Send and receive UDP traffic on the dhcpc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22720">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dhcpc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dhcpc_port" lineno="22735">
+<interface name="corenet_tcp_bind_dhcpc_port" lineno="17859">
<summary>
Bind TCP sockets to the dhcpc port.
</summary>
@@ -24489,7 +20988,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dhcpc_port" lineno="22755">
+<interface name="corenet_udp_bind_dhcpc_port" lineno="17879">
<summary>
Bind UDP sockets to the dhcpc port.
</summary>
@@ -24500,7 +20999,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dhcpc_port" lineno="22774">
+<interface name="corenet_tcp_connect_dhcpc_port" lineno="17898">
<summary>
Make a TCP connection to the dhcpc port.
</summary>
@@ -24510,7 +21009,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpc_client_packets" lineno="22794">
+<interface name="corenet_send_dhcpc_client_packets" lineno="17918">
<summary>
Send dhcpc_client packets.
</summary>
@@ -24521,7 +21020,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22813">
+<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="17937">
<summary>
Do not audit attempts to send dhcpc_client packets.
</summary>
@@ -24532,7 +21031,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpc_client_packets" lineno="22832">
+<interface name="corenet_receive_dhcpc_client_packets" lineno="17956">
<summary>
Receive dhcpc_client packets.
</summary>
@@ -24543,7 +21042,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22851">
+<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="17975">
<summary>
Do not audit attempts to receive dhcpc_client packets.
</summary>
@@ -24554,7 +21053,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22870">
+<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="17994">
<summary>
Send and receive dhcpc_client packets.
</summary>
@@ -24565,7 +21064,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22886">
+<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="18010">
<summary>
Do not audit attempts to send and receive dhcpc_client packets.
</summary>
@@ -24576,7 +21075,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22901">
+<interface name="corenet_relabelto_dhcpc_client_packets" lineno="18025">
<summary>
Relabel packets to dhcpc_client the packet type.
</summary>
@@ -24586,7 +21085,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpc_server_packets" lineno="22921">
+<interface name="corenet_send_dhcpc_server_packets" lineno="18045">
<summary>
Send dhcpc_server packets.
</summary>
@@ -24597,7 +21096,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22940">
+<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="18064">
<summary>
Do not audit attempts to send dhcpc_server packets.
</summary>
@@ -24608,7 +21107,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpc_server_packets" lineno="22959">
+<interface name="corenet_receive_dhcpc_server_packets" lineno="18083">
<summary>
Receive dhcpc_server packets.
</summary>
@@ -24619,7 +21118,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22978">
+<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="18102">
<summary>
Do not audit attempts to receive dhcpc_server packets.
</summary>
@@ -24630,7 +21129,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22997">
+<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="18121">
<summary>
Send and receive dhcpc_server packets.
</summary>
@@ -24641,7 +21140,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="23013">
+<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="18137">
<summary>
Do not audit attempts to send and receive dhcpc_server packets.
</summary>
@@ -24652,7 +21151,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23028">
+<interface name="corenet_relabelto_dhcpc_server_packets" lineno="18152">
<summary>
Relabel packets to dhcpc_server the packet type.
</summary>
@@ -24662,85 +21161,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23050">
-<summary>
-Send and receive TCP traffic on the dhcpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dhcpd_port" lineno="23065">
-<summary>
-Send UDP traffic on the dhcpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23080">
-<summary>
-Do not audit attempts to send UDP traffic on the dhcpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dhcpd_port" lineno="23095">
-<summary>
-Receive UDP traffic on the dhcpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23110">
-<summary>
-Do not audit attempts to receive UDP traffic on the dhcpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23125">
-<summary>
-Send and receive UDP traffic on the dhcpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23141">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dhcpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dhcpd_port" lineno="23156">
+<interface name="corenet_tcp_bind_dhcpd_port" lineno="18174">
<summary>
Bind TCP sockets to the dhcpd port.
</summary>
@@ -24751,7 +21172,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dhcpd_port" lineno="23176">
+<interface name="corenet_udp_bind_dhcpd_port" lineno="18194">
<summary>
Bind UDP sockets to the dhcpd port.
</summary>
@@ -24762,7 +21183,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dhcpd_port" lineno="23195">
+<interface name="corenet_tcp_connect_dhcpd_port" lineno="18213">
<summary>
Make a TCP connection to the dhcpd port.
</summary>
@@ -24772,7 +21193,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpd_client_packets" lineno="23215">
+<interface name="corenet_send_dhcpd_client_packets" lineno="18233">
<summary>
Send dhcpd_client packets.
</summary>
@@ -24783,7 +21204,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23234">
+<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="18252">
<summary>
Do not audit attempts to send dhcpd_client packets.
</summary>
@@ -24794,7 +21215,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpd_client_packets" lineno="23253">
+<interface name="corenet_receive_dhcpd_client_packets" lineno="18271">
<summary>
Receive dhcpd_client packets.
</summary>
@@ -24805,7 +21226,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23272">
+<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="18290">
<summary>
Do not audit attempts to receive dhcpd_client packets.
</summary>
@@ -24816,7 +21237,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23291">
+<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="18309">
<summary>
Send and receive dhcpd_client packets.
</summary>
@@ -24827,7 +21248,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23307">
+<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="18325">
<summary>
Do not audit attempts to send and receive dhcpd_client packets.
</summary>
@@ -24838,7 +21259,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23322">
+<interface name="corenet_relabelto_dhcpd_client_packets" lineno="18340">
<summary>
Relabel packets to dhcpd_client the packet type.
</summary>
@@ -24848,7 +21269,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpd_server_packets" lineno="23342">
+<interface name="corenet_send_dhcpd_server_packets" lineno="18360">
<summary>
Send dhcpd_server packets.
</summary>
@@ -24859,7 +21280,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23361">
+<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="18379">
<summary>
Do not audit attempts to send dhcpd_server packets.
</summary>
@@ -24870,7 +21291,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpd_server_packets" lineno="23380">
+<interface name="corenet_receive_dhcpd_server_packets" lineno="18398">
<summary>
Receive dhcpd_server packets.
</summary>
@@ -24881,7 +21302,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23399">
+<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="18417">
<summary>
Do not audit attempts to receive dhcpd_server packets.
</summary>
@@ -24892,7 +21313,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23418">
+<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="18436">
<summary>
Send and receive dhcpd_server packets.
</summary>
@@ -24903,7 +21324,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23434">
+<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="18452">
<summary>
Do not audit attempts to send and receive dhcpd_server packets.
</summary>
@@ -24914,7 +21335,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23449">
+<interface name="corenet_relabelto_dhcpd_server_packets" lineno="18467">
<summary>
Relabel packets to dhcpd_server the packet type.
</summary>
@@ -24924,85 +21345,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dict_port" lineno="23471">
-<summary>
-Send and receive TCP traffic on the dict port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dict_port" lineno="23486">
-<summary>
-Send UDP traffic on the dict port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dict_port" lineno="23501">
-<summary>
-Do not audit attempts to send UDP traffic on the dict port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dict_port" lineno="23516">
-<summary>
-Receive UDP traffic on the dict port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="23531">
-<summary>
-Do not audit attempts to receive UDP traffic on the dict port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dict_port" lineno="23546">
-<summary>
-Send and receive UDP traffic on the dict port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23562">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dict port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dict_port" lineno="23577">
+<interface name="corenet_tcp_bind_dict_port" lineno="18489">
<summary>
Bind TCP sockets to the dict port.
</summary>
@@ -25013,7 +21356,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dict_port" lineno="23597">
+<interface name="corenet_udp_bind_dict_port" lineno="18509">
<summary>
Bind UDP sockets to the dict port.
</summary>
@@ -25024,7 +21367,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dict_port" lineno="23616">
+<interface name="corenet_tcp_connect_dict_port" lineno="18528">
<summary>
Make a TCP connection to the dict port.
</summary>
@@ -25034,7 +21377,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dict_client_packets" lineno="23636">
+<interface name="corenet_send_dict_client_packets" lineno="18548">
<summary>
Send dict_client packets.
</summary>
@@ -25045,7 +21388,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23655">
+<interface name="corenet_dontaudit_send_dict_client_packets" lineno="18567">
<summary>
Do not audit attempts to send dict_client packets.
</summary>
@@ -25056,7 +21399,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dict_client_packets" lineno="23674">
+<interface name="corenet_receive_dict_client_packets" lineno="18586">
<summary>
Receive dict_client packets.
</summary>
@@ -25067,7 +21410,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23693">
+<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="18605">
<summary>
Do not audit attempts to receive dict_client packets.
</summary>
@@ -25078,7 +21421,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dict_client_packets" lineno="23712">
+<interface name="corenet_sendrecv_dict_client_packets" lineno="18624">
<summary>
Send and receive dict_client packets.
</summary>
@@ -25089,7 +21432,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23728">
+<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="18640">
<summary>
Do not audit attempts to send and receive dict_client packets.
</summary>
@@ -25100,7 +21443,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dict_client_packets" lineno="23743">
+<interface name="corenet_relabelto_dict_client_packets" lineno="18655">
<summary>
Relabel packets to dict_client the packet type.
</summary>
@@ -25110,7 +21453,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dict_server_packets" lineno="23763">
+<interface name="corenet_send_dict_server_packets" lineno="18675">
<summary>
Send dict_server packets.
</summary>
@@ -25121,7 +21464,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23782">
+<interface name="corenet_dontaudit_send_dict_server_packets" lineno="18694">
<summary>
Do not audit attempts to send dict_server packets.
</summary>
@@ -25132,7 +21475,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dict_server_packets" lineno="23801">
+<interface name="corenet_receive_dict_server_packets" lineno="18713">
<summary>
Receive dict_server packets.
</summary>
@@ -25143,7 +21486,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23820">
+<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="18732">
<summary>
Do not audit attempts to receive dict_server packets.
</summary>
@@ -25154,7 +21497,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dict_server_packets" lineno="23839">
+<interface name="corenet_sendrecv_dict_server_packets" lineno="18751">
<summary>
Send and receive dict_server packets.
</summary>
@@ -25165,7 +21508,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23855">
+<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="18767">
<summary>
Do not audit attempts to send and receive dict_server packets.
</summary>
@@ -25176,7 +21519,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dict_server_packets" lineno="23870">
+<interface name="corenet_relabelto_dict_server_packets" lineno="18782">
<summary>
Relabel packets to dict_server the packet type.
</summary>
@@ -25186,85 +21529,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23892">
-<summary>
-Send and receive TCP traffic on the distccd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_distccd_port" lineno="23907">
-<summary>
-Send UDP traffic on the distccd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23922">
-<summary>
-Do not audit attempts to send UDP traffic on the distccd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_distccd_port" lineno="23937">
-<summary>
-Receive UDP traffic on the distccd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23952">
-<summary>
-Do not audit attempts to receive UDP traffic on the distccd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_distccd_port" lineno="23967">
-<summary>
-Send and receive UDP traffic on the distccd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23983">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the distccd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_distccd_port" lineno="23998">
+<interface name="corenet_tcp_bind_distccd_port" lineno="18804">
<summary>
Bind TCP sockets to the distccd port.
</summary>
@@ -25275,7 +21540,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_distccd_port" lineno="24018">
+<interface name="corenet_udp_bind_distccd_port" lineno="18824">
<summary>
Bind UDP sockets to the distccd port.
</summary>
@@ -25286,7 +21551,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_distccd_port" lineno="24037">
+<interface name="corenet_tcp_connect_distccd_port" lineno="18843">
<summary>
Make a TCP connection to the distccd port.
</summary>
@@ -25296,7 +21561,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_distccd_client_packets" lineno="24057">
+<interface name="corenet_send_distccd_client_packets" lineno="18863">
<summary>
Send distccd_client packets.
</summary>
@@ -25307,7 +21572,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24076">
+<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="18882">
<summary>
Do not audit attempts to send distccd_client packets.
</summary>
@@ -25318,7 +21583,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_distccd_client_packets" lineno="24095">
+<interface name="corenet_receive_distccd_client_packets" lineno="18901">
<summary>
Receive distccd_client packets.
</summary>
@@ -25329,7 +21594,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24114">
+<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="18920">
<summary>
Do not audit attempts to receive distccd_client packets.
</summary>
@@ -25340,7 +21605,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_distccd_client_packets" lineno="24133">
+<interface name="corenet_sendrecv_distccd_client_packets" lineno="18939">
<summary>
Send and receive distccd_client packets.
</summary>
@@ -25351,7 +21616,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24149">
+<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="18955">
<summary>
Do not audit attempts to send and receive distccd_client packets.
</summary>
@@ -25362,7 +21627,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_distccd_client_packets" lineno="24164">
+<interface name="corenet_relabelto_distccd_client_packets" lineno="18970">
<summary>
Relabel packets to distccd_client the packet type.
</summary>
@@ -25372,7 +21637,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_distccd_server_packets" lineno="24184">
+<interface name="corenet_send_distccd_server_packets" lineno="18990">
<summary>
Send distccd_server packets.
</summary>
@@ -25383,7 +21648,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24203">
+<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="19009">
<summary>
Do not audit attempts to send distccd_server packets.
</summary>
@@ -25394,7 +21659,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_distccd_server_packets" lineno="24222">
+<interface name="corenet_receive_distccd_server_packets" lineno="19028">
<summary>
Receive distccd_server packets.
</summary>
@@ -25405,7 +21670,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24241">
+<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="19047">
<summary>
Do not audit attempts to receive distccd_server packets.
</summary>
@@ -25416,7 +21681,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_distccd_server_packets" lineno="24260">
+<interface name="corenet_sendrecv_distccd_server_packets" lineno="19066">
<summary>
Send and receive distccd_server packets.
</summary>
@@ -25427,7 +21692,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24276">
+<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="19082">
<summary>
Do not audit attempts to send and receive distccd_server packets.
</summary>
@@ -25438,7 +21703,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_distccd_server_packets" lineno="24291">
+<interface name="corenet_relabelto_distccd_server_packets" lineno="19097">
<summary>
Relabel packets to distccd_server the packet type.
</summary>
@@ -25448,85 +21713,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dns_port" lineno="24313">
-<summary>
-Send and receive TCP traffic on the dns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dns_port" lineno="24328">
-<summary>
-Send UDP traffic on the dns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24343">
-<summary>
-Do not audit attempts to send UDP traffic on the dns port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dns_port" lineno="24358">
-<summary>
-Receive UDP traffic on the dns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24373">
-<summary>
-Do not audit attempts to receive UDP traffic on the dns port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dns_port" lineno="24388">
-<summary>
-Send and receive UDP traffic on the dns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24404">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dns port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dns_port" lineno="24419">
+<interface name="corenet_tcp_bind_dns_port" lineno="19119">
<summary>
Bind TCP sockets to the dns port.
</summary>
@@ -25537,7 +21724,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dns_port" lineno="24439">
+<interface name="corenet_udp_bind_dns_port" lineno="19139">
<summary>
Bind UDP sockets to the dns port.
</summary>
@@ -25548,7 +21735,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dns_port" lineno="24458">
+<interface name="corenet_tcp_connect_dns_port" lineno="19158">
<summary>
Make a TCP connection to the dns port.
</summary>
@@ -25558,7 +21745,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dns_client_packets" lineno="24478">
+<interface name="corenet_send_dns_client_packets" lineno="19178">
<summary>
Send dns_client packets.
</summary>
@@ -25569,7 +21756,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dns_client_packets" lineno="24497">
+<interface name="corenet_dontaudit_send_dns_client_packets" lineno="19197">
<summary>
Do not audit attempts to send dns_client packets.
</summary>
@@ -25580,7 +21767,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dns_client_packets" lineno="24516">
+<interface name="corenet_receive_dns_client_packets" lineno="19216">
<summary>
Receive dns_client packets.
</summary>
@@ -25591,7 +21778,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="24535">
+<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="19235">
<summary>
Do not audit attempts to receive dns_client packets.
</summary>
@@ -25602,7 +21789,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dns_client_packets" lineno="24554">
+<interface name="corenet_sendrecv_dns_client_packets" lineno="19254">
<summary>
Send and receive dns_client packets.
</summary>
@@ -25613,7 +21800,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24570">
+<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="19270">
<summary>
Do not audit attempts to send and receive dns_client packets.
</summary>
@@ -25624,7 +21811,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dns_client_packets" lineno="24585">
+<interface name="corenet_relabelto_dns_client_packets" lineno="19285">
<summary>
Relabel packets to dns_client the packet type.
</summary>
@@ -25634,7 +21821,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dns_server_packets" lineno="24605">
+<interface name="corenet_send_dns_server_packets" lineno="19305">
<summary>
Send dns_server packets.
</summary>
@@ -25645,7 +21832,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24624">
+<interface name="corenet_dontaudit_send_dns_server_packets" lineno="19324">
<summary>
Do not audit attempts to send dns_server packets.
</summary>
@@ -25656,7 +21843,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dns_server_packets" lineno="24643">
+<interface name="corenet_receive_dns_server_packets" lineno="19343">
<summary>
Receive dns_server packets.
</summary>
@@ -25667,7 +21854,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24662">
+<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="19362">
<summary>
Do not audit attempts to receive dns_server packets.
</summary>
@@ -25678,7 +21865,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dns_server_packets" lineno="24681">
+<interface name="corenet_sendrecv_dns_server_packets" lineno="19381">
<summary>
Send and receive dns_server packets.
</summary>
@@ -25689,7 +21876,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24697">
+<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="19397">
<summary>
Do not audit attempts to send and receive dns_server packets.
</summary>
@@ -25700,7 +21887,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dns_server_packets" lineno="24712">
+<interface name="corenet_relabelto_dns_server_packets" lineno="19412">
<summary>
Relabel packets to dns_server the packet type.
</summary>
@@ -25710,85 +21897,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24734">
-<summary>
-Send and receive TCP traffic on the dropbox port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_dropbox_port" lineno="24749">
-<summary>
-Send UDP traffic on the dropbox port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24764">
-<summary>
-Do not audit attempts to send UDP traffic on the dropbox port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_dropbox_port" lineno="24779">
-<summary>
-Receive UDP traffic on the dropbox port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24794">
-<summary>
-Do not audit attempts to receive UDP traffic on the dropbox port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24809">
-<summary>
-Send and receive UDP traffic on the dropbox port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24825">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the dropbox port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_dropbox_port" lineno="24840">
+<interface name="corenet_tcp_bind_dropbox_port" lineno="19434">
<summary>
Bind TCP sockets to the dropbox port.
</summary>
@@ -25799,7 +21908,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dropbox_port" lineno="24860">
+<interface name="corenet_udp_bind_dropbox_port" lineno="19454">
<summary>
Bind UDP sockets to the dropbox port.
</summary>
@@ -25810,7 +21919,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dropbox_port" lineno="24879">
+<interface name="corenet_tcp_connect_dropbox_port" lineno="19473">
<summary>
Make a TCP connection to the dropbox port.
</summary>
@@ -25820,7 +21929,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dropbox_client_packets" lineno="24899">
+<interface name="corenet_send_dropbox_client_packets" lineno="19493">
<summary>
Send dropbox_client packets.
</summary>
@@ -25831,7 +21940,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24918">
+<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="19512">
<summary>
Do not audit attempts to send dropbox_client packets.
</summary>
@@ -25842,7 +21951,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dropbox_client_packets" lineno="24937">
+<interface name="corenet_receive_dropbox_client_packets" lineno="19531">
<summary>
Receive dropbox_client packets.
</summary>
@@ -25853,7 +21962,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24956">
+<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="19550">
<summary>
Do not audit attempts to receive dropbox_client packets.
</summary>
@@ -25864,7 +21973,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24975">
+<interface name="corenet_sendrecv_dropbox_client_packets" lineno="19569">
<summary>
Send and receive dropbox_client packets.
</summary>
@@ -25875,7 +21984,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24991">
+<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="19585">
<summary>
Do not audit attempts to send and receive dropbox_client packets.
</summary>
@@ -25886,7 +21995,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dropbox_client_packets" lineno="25006">
+<interface name="corenet_relabelto_dropbox_client_packets" lineno="19600">
<summary>
Relabel packets to dropbox_client the packet type.
</summary>
@@ -25896,7 +22005,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dropbox_server_packets" lineno="25026">
+<interface name="corenet_send_dropbox_server_packets" lineno="19620">
<summary>
Send dropbox_server packets.
</summary>
@@ -25907,7 +22016,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25045">
+<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="19639">
<summary>
Do not audit attempts to send dropbox_server packets.
</summary>
@@ -25918,7 +22027,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dropbox_server_packets" lineno="25064">
+<interface name="corenet_receive_dropbox_server_packets" lineno="19658">
<summary>
Receive dropbox_server packets.
</summary>
@@ -25929,7 +22038,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25083">
+<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="19677">
<summary>
Do not audit attempts to receive dropbox_server packets.
</summary>
@@ -25940,7 +22049,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25102">
+<interface name="corenet_sendrecv_dropbox_server_packets" lineno="19696">
<summary>
Send and receive dropbox_server packets.
</summary>
@@ -25951,7 +22060,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25118">
+<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="19712">
<summary>
Do not audit attempts to send and receive dropbox_server packets.
</summary>
@@ -25962,7 +22071,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dropbox_server_packets" lineno="25133">
+<interface name="corenet_relabelto_dropbox_server_packets" lineno="19727">
<summary>
Relabel packets to dropbox_server the packet type.
</summary>
@@ -25972,85 +22081,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_efs_port" lineno="25155">
-<summary>
-Send and receive TCP traffic on the efs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_efs_port" lineno="25170">
-<summary>
-Send UDP traffic on the efs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25185">
-<summary>
-Do not audit attempts to send UDP traffic on the efs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_efs_port" lineno="25200">
-<summary>
-Receive UDP traffic on the efs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25215">
-<summary>
-Do not audit attempts to receive UDP traffic on the efs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_efs_port" lineno="25230">
-<summary>
-Send and receive UDP traffic on the efs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25246">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the efs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_efs_port" lineno="25261">
+<interface name="corenet_tcp_bind_efs_port" lineno="19749">
<summary>
Bind TCP sockets to the efs port.
</summary>
@@ -26061,7 +22092,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_efs_port" lineno="25281">
+<interface name="corenet_udp_bind_efs_port" lineno="19769">
<summary>
Bind UDP sockets to the efs port.
</summary>
@@ -26072,7 +22103,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_efs_port" lineno="25300">
+<interface name="corenet_tcp_connect_efs_port" lineno="19788">
<summary>
Make a TCP connection to the efs port.
</summary>
@@ -26082,7 +22113,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_efs_client_packets" lineno="25320">
+<interface name="corenet_send_efs_client_packets" lineno="19808">
<summary>
Send efs_client packets.
</summary>
@@ -26093,7 +22124,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25339">
+<interface name="corenet_dontaudit_send_efs_client_packets" lineno="19827">
<summary>
Do not audit attempts to send efs_client packets.
</summary>
@@ -26104,7 +22135,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_efs_client_packets" lineno="25358">
+<interface name="corenet_receive_efs_client_packets" lineno="19846">
<summary>
Receive efs_client packets.
</summary>
@@ -26115,7 +22146,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25377">
+<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="19865">
<summary>
Do not audit attempts to receive efs_client packets.
</summary>
@@ -26126,7 +22157,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_efs_client_packets" lineno="25396">
+<interface name="corenet_sendrecv_efs_client_packets" lineno="19884">
<summary>
Send and receive efs_client packets.
</summary>
@@ -26137,7 +22168,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="25412">
+<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="19900">
<summary>
Do not audit attempts to send and receive efs_client packets.
</summary>
@@ -26148,7 +22179,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_efs_client_packets" lineno="25427">
+<interface name="corenet_relabelto_efs_client_packets" lineno="19915">
<summary>
Relabel packets to efs_client the packet type.
</summary>
@@ -26158,7 +22189,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_efs_server_packets" lineno="25447">
+<interface name="corenet_send_efs_server_packets" lineno="19935">
<summary>
Send efs_server packets.
</summary>
@@ -26169,7 +22200,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_efs_server_packets" lineno="25466">
+<interface name="corenet_dontaudit_send_efs_server_packets" lineno="19954">
<summary>
Do not audit attempts to send efs_server packets.
</summary>
@@ -26180,7 +22211,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_efs_server_packets" lineno="25485">
+<interface name="corenet_receive_efs_server_packets" lineno="19973">
<summary>
Receive efs_server packets.
</summary>
@@ -26191,7 +22222,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="25504">
+<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="19992">
<summary>
Do not audit attempts to receive efs_server packets.
</summary>
@@ -26202,7 +22233,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_efs_server_packets" lineno="25523">
+<interface name="corenet_sendrecv_efs_server_packets" lineno="20011">
<summary>
Send and receive efs_server packets.
</summary>
@@ -26213,7 +22244,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="25539">
+<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="20027">
<summary>
Do not audit attempts to send and receive efs_server packets.
</summary>
@@ -26224,7 +22255,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_efs_server_packets" lineno="25554">
+<interface name="corenet_relabelto_efs_server_packets" lineno="20042">
<summary>
Relabel packets to efs_server the packet type.
</summary>
@@ -26234,85 +22265,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25576">
-<summary>
-Send and receive TCP traffic on the embrace_dp_c port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25591">
-<summary>
-Send UDP traffic on the embrace_dp_c port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25606">
-<summary>
-Do not audit attempts to send UDP traffic on the embrace_dp_c port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25621">
-<summary>
-Receive UDP traffic on the embrace_dp_c port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25636">
-<summary>
-Do not audit attempts to receive UDP traffic on the embrace_dp_c port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25651">
-<summary>
-Send and receive UDP traffic on the embrace_dp_c port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25667">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the embrace_dp_c port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25682">
+<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="20064">
<summary>
Bind TCP sockets to the embrace_dp_c port.
</summary>
@@ -26323,7 +22276,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25702">
+<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="20084">
<summary>
Bind UDP sockets to the embrace_dp_c port.
</summary>
@@ -26334,7 +22287,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25721">
+<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="20103">
<summary>
Make a TCP connection to the embrace_dp_c port.
</summary>
@@ -26344,7 +22297,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25741">
+<interface name="corenet_send_embrace_dp_c_client_packets" lineno="20123">
<summary>
Send embrace_dp_c_client packets.
</summary>
@@ -26355,7 +22308,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25760">
+<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="20142">
<summary>
Do not audit attempts to send embrace_dp_c_client packets.
</summary>
@@ -26366,7 +22319,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25779">
+<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="20161">
<summary>
Receive embrace_dp_c_client packets.
</summary>
@@ -26377,7 +22330,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25798">
+<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="20180">
<summary>
Do not audit attempts to receive embrace_dp_c_client packets.
</summary>
@@ -26388,7 +22341,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25817">
+<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="20199">
<summary>
Send and receive embrace_dp_c_client packets.
</summary>
@@ -26399,7 +22352,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25833">
+<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="20215">
<summary>
Do not audit attempts to send and receive embrace_dp_c_client packets.
</summary>
@@ -26410,7 +22363,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25848">
+<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="20230">
<summary>
Relabel packets to embrace_dp_c_client the packet type.
</summary>
@@ -26420,7 +22373,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25868">
+<interface name="corenet_send_embrace_dp_c_server_packets" lineno="20250">
<summary>
Send embrace_dp_c_server packets.
</summary>
@@ -26431,7 +22384,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25887">
+<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="20269">
<summary>
Do not audit attempts to send embrace_dp_c_server packets.
</summary>
@@ -26442,7 +22395,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25906">
+<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="20288">
<summary>
Receive embrace_dp_c_server packets.
</summary>
@@ -26453,7 +22406,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25925">
+<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="20307">
<summary>
Do not audit attempts to receive embrace_dp_c_server packets.
</summary>
@@ -26464,7 +22417,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25944">
+<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="20326">
<summary>
Send and receive embrace_dp_c_server packets.
</summary>
@@ -26475,7 +22428,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25960">
+<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="20342">
<summary>
Do not audit attempts to send and receive embrace_dp_c_server packets.
</summary>
@@ -26486,7 +22439,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25975">
+<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="20357">
<summary>
Relabel packets to embrace_dp_c_server the packet type.
</summary>
@@ -26496,85 +22449,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25997">
-<summary>
-Send and receive TCP traffic on the epmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_epmap_port" lineno="26012">
-<summary>
-Send UDP traffic on the epmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26027">
-<summary>
-Do not audit attempts to send UDP traffic on the epmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_epmap_port" lineno="26042">
-<summary>
-Receive UDP traffic on the epmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26057">
-<summary>
-Do not audit attempts to receive UDP traffic on the epmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_epmap_port" lineno="26072">
-<summary>
-Send and receive UDP traffic on the epmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26088">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the epmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_epmap_port" lineno="26103">
+<interface name="corenet_tcp_bind_epmap_port" lineno="20379">
<summary>
Bind TCP sockets to the epmap port.
</summary>
@@ -26585,7 +22460,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_epmap_port" lineno="26123">
+<interface name="corenet_udp_bind_epmap_port" lineno="20399">
<summary>
Bind UDP sockets to the epmap port.
</summary>
@@ -26596,7 +22471,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_epmap_port" lineno="26142">
+<interface name="corenet_tcp_connect_epmap_port" lineno="20418">
<summary>
Make a TCP connection to the epmap port.
</summary>
@@ -26606,7 +22481,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmap_client_packets" lineno="26162">
+<interface name="corenet_send_epmap_client_packets" lineno="20438">
<summary>
Send epmap_client packets.
</summary>
@@ -26617,7 +22492,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26181">
+<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="20457">
<summary>
Do not audit attempts to send epmap_client packets.
</summary>
@@ -26628,7 +22503,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmap_client_packets" lineno="26200">
+<interface name="corenet_receive_epmap_client_packets" lineno="20476">
<summary>
Receive epmap_client packets.
</summary>
@@ -26639,7 +22514,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26219">
+<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="20495">
<summary>
Do not audit attempts to receive epmap_client packets.
</summary>
@@ -26650,7 +22525,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmap_client_packets" lineno="26238">
+<interface name="corenet_sendrecv_epmap_client_packets" lineno="20514">
<summary>
Send and receive epmap_client packets.
</summary>
@@ -26661,7 +22536,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26254">
+<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="20530">
<summary>
Do not audit attempts to send and receive epmap_client packets.
</summary>
@@ -26672,7 +22547,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmap_client_packets" lineno="26269">
+<interface name="corenet_relabelto_epmap_client_packets" lineno="20545">
<summary>
Relabel packets to epmap_client the packet type.
</summary>
@@ -26682,7 +22557,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmap_server_packets" lineno="26289">
+<interface name="corenet_send_epmap_server_packets" lineno="20565">
<summary>
Send epmap_server packets.
</summary>
@@ -26693,7 +22568,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26308">
+<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="20584">
<summary>
Do not audit attempts to send epmap_server packets.
</summary>
@@ -26704,7 +22579,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmap_server_packets" lineno="26327">
+<interface name="corenet_receive_epmap_server_packets" lineno="20603">
<summary>
Receive epmap_server packets.
</summary>
@@ -26715,7 +22590,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="26346">
+<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="20622">
<summary>
Do not audit attempts to receive epmap_server packets.
</summary>
@@ -26726,7 +22601,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmap_server_packets" lineno="26365">
+<interface name="corenet_sendrecv_epmap_server_packets" lineno="20641">
<summary>
Send and receive epmap_server packets.
</summary>
@@ -26737,7 +22612,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="26381">
+<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="20657">
<summary>
Do not audit attempts to send and receive epmap_server packets.
</summary>
@@ -26748,7 +22623,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmap_server_packets" lineno="26396">
+<interface name="corenet_relabelto_epmap_server_packets" lineno="20672">
<summary>
Relabel packets to epmap_server the packet type.
</summary>
@@ -26758,85 +22633,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_epmd_port" lineno="26418">
-<summary>
-Send and receive TCP traffic on the epmd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_epmd_port" lineno="26433">
-<summary>
-Send UDP traffic on the epmd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="26448">
-<summary>
-Do not audit attempts to send UDP traffic on the epmd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_epmd_port" lineno="26463">
-<summary>
-Receive UDP traffic on the epmd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="26478">
-<summary>
-Do not audit attempts to receive UDP traffic on the epmd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_epmd_port" lineno="26493">
-<summary>
-Send and receive UDP traffic on the epmd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="26509">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the epmd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_epmd_port" lineno="26524">
+<interface name="corenet_tcp_bind_epmd_port" lineno="20694">
<summary>
Bind TCP sockets to the epmd port.
</summary>
@@ -26847,7 +22644,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_epmd_port" lineno="26544">
+<interface name="corenet_udp_bind_epmd_port" lineno="20714">
<summary>
Bind UDP sockets to the epmd port.
</summary>
@@ -26858,7 +22655,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_epmd_port" lineno="26563">
+<interface name="corenet_tcp_connect_epmd_port" lineno="20733">
<summary>
Make a TCP connection to the epmd port.
</summary>
@@ -26868,7 +22665,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmd_client_packets" lineno="26583">
+<interface name="corenet_send_epmd_client_packets" lineno="20753">
<summary>
Send epmd_client packets.
</summary>
@@ -26879,7 +22676,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26602">
+<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="20772">
<summary>
Do not audit attempts to send epmd_client packets.
</summary>
@@ -26890,7 +22687,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmd_client_packets" lineno="26621">
+<interface name="corenet_receive_epmd_client_packets" lineno="20791">
<summary>
Receive epmd_client packets.
</summary>
@@ -26901,7 +22698,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26640">
+<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="20810">
<summary>
Do not audit attempts to receive epmd_client packets.
</summary>
@@ -26912,7 +22709,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmd_client_packets" lineno="26659">
+<interface name="corenet_sendrecv_epmd_client_packets" lineno="20829">
<summary>
Send and receive epmd_client packets.
</summary>
@@ -26923,7 +22720,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26675">
+<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="20845">
<summary>
Do not audit attempts to send and receive epmd_client packets.
</summary>
@@ -26934,7 +22731,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmd_client_packets" lineno="26690">
+<interface name="corenet_relabelto_epmd_client_packets" lineno="20860">
<summary>
Relabel packets to epmd_client the packet type.
</summary>
@@ -26944,7 +22741,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmd_server_packets" lineno="26710">
+<interface name="corenet_send_epmd_server_packets" lineno="20880">
<summary>
Send epmd_server packets.
</summary>
@@ -26955,7 +22752,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26729">
+<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="20899">
<summary>
Do not audit attempts to send epmd_server packets.
</summary>
@@ -26966,7 +22763,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmd_server_packets" lineno="26748">
+<interface name="corenet_receive_epmd_server_packets" lineno="20918">
<summary>
Receive epmd_server packets.
</summary>
@@ -26977,7 +22774,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26767">
+<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="20937">
<summary>
Do not audit attempts to receive epmd_server packets.
</summary>
@@ -26988,7 +22785,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmd_server_packets" lineno="26786">
+<interface name="corenet_sendrecv_epmd_server_packets" lineno="20956">
<summary>
Send and receive epmd_server packets.
</summary>
@@ -26999,7 +22796,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26802">
+<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="20972">
<summary>
Do not audit attempts to send and receive epmd_server packets.
</summary>
@@ -27010,7 +22807,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmd_server_packets" lineno="26817">
+<interface name="corenet_relabelto_epmd_server_packets" lineno="20987">
<summary>
Relabel packets to epmd_server the packet type.
</summary>
@@ -27020,85 +22817,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26839">
-<summary>
-Send and receive TCP traffic on the fingerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_fingerd_port" lineno="26854">
-<summary>
-Send UDP traffic on the fingerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26869">
-<summary>
-Do not audit attempts to send UDP traffic on the fingerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_fingerd_port" lineno="26884">
-<summary>
-Receive UDP traffic on the fingerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26899">
-<summary>
-Do not audit attempts to receive UDP traffic on the fingerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26914">
-<summary>
-Send and receive UDP traffic on the fingerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26930">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the fingerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_fingerd_port" lineno="26945">
+<interface name="corenet_tcp_bind_fingerd_port" lineno="21009">
<summary>
Bind TCP sockets to the fingerd port.
</summary>
@@ -27109,7 +22828,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_fingerd_port" lineno="26965">
+<interface name="corenet_udp_bind_fingerd_port" lineno="21029">
<summary>
Bind UDP sockets to the fingerd port.
</summary>
@@ -27120,7 +22839,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_fingerd_port" lineno="26984">
+<interface name="corenet_tcp_connect_fingerd_port" lineno="21048">
<summary>
Make a TCP connection to the fingerd port.
</summary>
@@ -27130,7 +22849,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_fingerd_client_packets" lineno="27004">
+<interface name="corenet_send_fingerd_client_packets" lineno="21068">
<summary>
Send fingerd_client packets.
</summary>
@@ -27141,7 +22860,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27023">
+<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="21087">
<summary>
Do not audit attempts to send fingerd_client packets.
</summary>
@@ -27152,7 +22871,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_fingerd_client_packets" lineno="27042">
+<interface name="corenet_receive_fingerd_client_packets" lineno="21106">
<summary>
Receive fingerd_client packets.
</summary>
@@ -27163,7 +22882,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27061">
+<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="21125">
<summary>
Do not audit attempts to receive fingerd_client packets.
</summary>
@@ -27174,7 +22893,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27080">
+<interface name="corenet_sendrecv_fingerd_client_packets" lineno="21144">
<summary>
Send and receive fingerd_client packets.
</summary>
@@ -27185,7 +22904,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27096">
+<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="21160">
<summary>
Do not audit attempts to send and receive fingerd_client packets.
</summary>
@@ -27196,7 +22915,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_fingerd_client_packets" lineno="27111">
+<interface name="corenet_relabelto_fingerd_client_packets" lineno="21175">
<summary>
Relabel packets to fingerd_client the packet type.
</summary>
@@ -27206,7 +22925,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_fingerd_server_packets" lineno="27131">
+<interface name="corenet_send_fingerd_server_packets" lineno="21195">
<summary>
Send fingerd_server packets.
</summary>
@@ -27217,7 +22936,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27150">
+<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="21214">
<summary>
Do not audit attempts to send fingerd_server packets.
</summary>
@@ -27228,7 +22947,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_fingerd_server_packets" lineno="27169">
+<interface name="corenet_receive_fingerd_server_packets" lineno="21233">
<summary>
Receive fingerd_server packets.
</summary>
@@ -27239,7 +22958,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27188">
+<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="21252">
<summary>
Do not audit attempts to receive fingerd_server packets.
</summary>
@@ -27250,7 +22969,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27207">
+<interface name="corenet_sendrecv_fingerd_server_packets" lineno="21271">
<summary>
Send and receive fingerd_server packets.
</summary>
@@ -27261,7 +22980,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27223">
+<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="21287">
<summary>
Do not audit attempts to send and receive fingerd_server packets.
</summary>
@@ -27272,7 +22991,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_fingerd_server_packets" lineno="27238">
+<interface name="corenet_relabelto_fingerd_server_packets" lineno="21302">
<summary>
Relabel packets to fingerd_server the packet type.
</summary>
@@ -27282,85 +23001,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27260">
-<summary>
-Send and receive TCP traffic on the ftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ftp_port" lineno="27275">
-<summary>
-Send UDP traffic on the ftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="27290">
-<summary>
-Do not audit attempts to send UDP traffic on the ftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ftp_port" lineno="27305">
-<summary>
-Receive UDP traffic on the ftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="27320">
-<summary>
-Do not audit attempts to receive UDP traffic on the ftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ftp_port" lineno="27335">
-<summary>
-Send and receive UDP traffic on the ftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="27351">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ftp_port" lineno="27366">
+<interface name="corenet_tcp_bind_ftp_port" lineno="21324">
<summary>
Bind TCP sockets to the ftp port.
</summary>
@@ -27371,7 +23012,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ftp_port" lineno="27386">
+<interface name="corenet_udp_bind_ftp_port" lineno="21344">
<summary>
Bind UDP sockets to the ftp port.
</summary>
@@ -27382,7 +23023,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ftp_port" lineno="27405">
+<interface name="corenet_tcp_connect_ftp_port" lineno="21363">
<summary>
Make a TCP connection to the ftp port.
</summary>
@@ -27392,7 +23033,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_client_packets" lineno="27425">
+<interface name="corenet_send_ftp_client_packets" lineno="21383">
<summary>
Send ftp_client packets.
</summary>
@@ -27403,7 +23044,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="27444">
+<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="21402">
<summary>
Do not audit attempts to send ftp_client packets.
</summary>
@@ -27414,7 +23055,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_client_packets" lineno="27463">
+<interface name="corenet_receive_ftp_client_packets" lineno="21421">
<summary>
Receive ftp_client packets.
</summary>
@@ -27425,7 +23066,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="27482">
+<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="21440">
<summary>
Do not audit attempts to receive ftp_client packets.
</summary>
@@ -27436,7 +23077,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_client_packets" lineno="27501">
+<interface name="corenet_sendrecv_ftp_client_packets" lineno="21459">
<summary>
Send and receive ftp_client packets.
</summary>
@@ -27447,7 +23088,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="27517">
+<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="21475">
<summary>
Do not audit attempts to send and receive ftp_client packets.
</summary>
@@ -27458,7 +23099,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_client_packets" lineno="27532">
+<interface name="corenet_relabelto_ftp_client_packets" lineno="21490">
<summary>
Relabel packets to ftp_client the packet type.
</summary>
@@ -27468,7 +23109,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_server_packets" lineno="27552">
+<interface name="corenet_send_ftp_server_packets" lineno="21510">
<summary>
Send ftp_server packets.
</summary>
@@ -27479,7 +23120,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27571">
+<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="21529">
<summary>
Do not audit attempts to send ftp_server packets.
</summary>
@@ -27490,7 +23131,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_server_packets" lineno="27590">
+<interface name="corenet_receive_ftp_server_packets" lineno="21548">
<summary>
Receive ftp_server packets.
</summary>
@@ -27501,7 +23142,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27609">
+<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="21567">
<summary>
Do not audit attempts to receive ftp_server packets.
</summary>
@@ -27512,7 +23153,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_server_packets" lineno="27628">
+<interface name="corenet_sendrecv_ftp_server_packets" lineno="21586">
<summary>
Send and receive ftp_server packets.
</summary>
@@ -27523,7 +23164,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27644">
+<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="21602">
<summary>
Do not audit attempts to send and receive ftp_server packets.
</summary>
@@ -27534,7 +23175,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_server_packets" lineno="27659">
+<interface name="corenet_relabelto_ftp_server_packets" lineno="21617">
<summary>
Relabel packets to ftp_server the packet type.
</summary>
@@ -27544,85 +23185,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27681">
-<summary>
-Send and receive TCP traffic on the ftp_data port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ftp_data_port" lineno="27696">
-<summary>
-Send UDP traffic on the ftp_data port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27711">
-<summary>
-Do not audit attempts to send UDP traffic on the ftp_data port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ftp_data_port" lineno="27726">
-<summary>
-Receive UDP traffic on the ftp_data port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27741">
-<summary>
-Do not audit attempts to receive UDP traffic on the ftp_data port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27756">
-<summary>
-Send and receive UDP traffic on the ftp_data port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27772">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ftp_data port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ftp_data_port" lineno="27787">
+<interface name="corenet_tcp_bind_ftp_data_port" lineno="21639">
<summary>
Bind TCP sockets to the ftp_data port.
</summary>
@@ -27633,7 +23196,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ftp_data_port" lineno="27807">
+<interface name="corenet_udp_bind_ftp_data_port" lineno="21659">
<summary>
Bind UDP sockets to the ftp_data port.
</summary>
@@ -27644,7 +23207,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ftp_data_port" lineno="27826">
+<interface name="corenet_tcp_connect_ftp_data_port" lineno="21678">
<summary>
Make a TCP connection to the ftp_data port.
</summary>
@@ -27654,7 +23217,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_data_client_packets" lineno="27846">
+<interface name="corenet_send_ftp_data_client_packets" lineno="21698">
<summary>
Send ftp_data_client packets.
</summary>
@@ -27665,7 +23228,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27865">
+<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="21717">
<summary>
Do not audit attempts to send ftp_data_client packets.
</summary>
@@ -27676,7 +23239,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_data_client_packets" lineno="27884">
+<interface name="corenet_receive_ftp_data_client_packets" lineno="21736">
<summary>
Receive ftp_data_client packets.
</summary>
@@ -27687,7 +23250,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27903">
+<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="21755">
<summary>
Do not audit attempts to receive ftp_data_client packets.
</summary>
@@ -27698,7 +23261,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27922">
+<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="21774">
<summary>
Send and receive ftp_data_client packets.
</summary>
@@ -27709,7 +23272,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27938">
+<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="21790">
<summary>
Do not audit attempts to send and receive ftp_data_client packets.
</summary>
@@ -27720,7 +23283,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27953">
+<interface name="corenet_relabelto_ftp_data_client_packets" lineno="21805">
<summary>
Relabel packets to ftp_data_client the packet type.
</summary>
@@ -27730,7 +23293,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_data_server_packets" lineno="27973">
+<interface name="corenet_send_ftp_data_server_packets" lineno="21825">
<summary>
Send ftp_data_server packets.
</summary>
@@ -27741,7 +23304,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27992">
+<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="21844">
<summary>
Do not audit attempts to send ftp_data_server packets.
</summary>
@@ -27752,7 +23315,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_data_server_packets" lineno="28011">
+<interface name="corenet_receive_ftp_data_server_packets" lineno="21863">
<summary>
Receive ftp_data_server packets.
</summary>
@@ -27763,7 +23326,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28030">
+<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="21882">
<summary>
Do not audit attempts to receive ftp_data_server packets.
</summary>
@@ -27774,7 +23337,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28049">
+<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="21901">
<summary>
Send and receive ftp_data_server packets.
</summary>
@@ -27785,7 +23348,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28065">
+<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="21917">
<summary>
Do not audit attempts to send and receive ftp_data_server packets.
</summary>
@@ -27796,7 +23359,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28080">
+<interface name="corenet_relabelto_ftp_data_server_packets" lineno="21932">
<summary>
Relabel packets to ftp_data_server the packet type.
</summary>
@@ -27806,85 +23369,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28102">
-<summary>
-Send and receive TCP traffic on the gatekeeper port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_gatekeeper_port" lineno="28117">
-<summary>
-Send UDP traffic on the gatekeeper port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28132">
-<summary>
-Do not audit attempts to send UDP traffic on the gatekeeper port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_gatekeeper_port" lineno="28147">
-<summary>
-Receive UDP traffic on the gatekeeper port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28162">
-<summary>
-Do not audit attempts to receive UDP traffic on the gatekeeper port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28177">
-<summary>
-Send and receive UDP traffic on the gatekeeper port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28193">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the gatekeeper port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28208">
+<interface name="corenet_tcp_bind_gatekeeper_port" lineno="21954">
<summary>
Bind TCP sockets to the gatekeeper port.
</summary>
@@ -27895,7 +23380,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gatekeeper_port" lineno="28228">
+<interface name="corenet_udp_bind_gatekeeper_port" lineno="21974">
<summary>
Bind UDP sockets to the gatekeeper port.
</summary>
@@ -27906,7 +23391,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gatekeeper_port" lineno="28247">
+<interface name="corenet_tcp_connect_gatekeeper_port" lineno="21993">
<summary>
Make a TCP connection to the gatekeeper port.
</summary>
@@ -27916,7 +23401,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gatekeeper_client_packets" lineno="28267">
+<interface name="corenet_send_gatekeeper_client_packets" lineno="22013">
<summary>
Send gatekeeper_client packets.
</summary>
@@ -27927,7 +23412,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="28286">
+<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="22032">
<summary>
Do not audit attempts to send gatekeeper_client packets.
</summary>
@@ -27938,7 +23423,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gatekeeper_client_packets" lineno="28305">
+<interface name="corenet_receive_gatekeeper_client_packets" lineno="22051">
<summary>
Receive gatekeeper_client packets.
</summary>
@@ -27949,7 +23434,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="28324">
+<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="22070">
<summary>
Do not audit attempts to receive gatekeeper_client packets.
</summary>
@@ -27960,7 +23445,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="28343">
+<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="22089">
<summary>
Send and receive gatekeeper_client packets.
</summary>
@@ -27971,7 +23456,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="28359">
+<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="22105">
<summary>
Do not audit attempts to send and receive gatekeeper_client packets.
</summary>
@@ -27982,7 +23467,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="28374">
+<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="22120">
<summary>
Relabel packets to gatekeeper_client the packet type.
</summary>
@@ -27992,7 +23477,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gatekeeper_server_packets" lineno="28394">
+<interface name="corenet_send_gatekeeper_server_packets" lineno="22140">
<summary>
Send gatekeeper_server packets.
</summary>
@@ -28003,7 +23488,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="28413">
+<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="22159">
<summary>
Do not audit attempts to send gatekeeper_server packets.
</summary>
@@ -28014,7 +23499,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gatekeeper_server_packets" lineno="28432">
+<interface name="corenet_receive_gatekeeper_server_packets" lineno="22178">
<summary>
Receive gatekeeper_server packets.
</summary>
@@ -28025,7 +23510,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="28451">
+<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="22197">
<summary>
Do not audit attempts to receive gatekeeper_server packets.
</summary>
@@ -28036,7 +23521,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="28470">
+<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="22216">
<summary>
Send and receive gatekeeper_server packets.
</summary>
@@ -28047,7 +23532,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="28486">
+<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="22232">
<summary>
Do not audit attempts to send and receive gatekeeper_server packets.
</summary>
@@ -28058,7 +23543,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="28501">
+<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="22247">
<summary>
Relabel packets to gatekeeper_server the packet type.
</summary>
@@ -28068,85 +23553,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="28523">
-<summary>
-Send and receive TCP traffic on the gdomap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_gdomap_port" lineno="28538">
-<summary>
-Send UDP traffic on the gdomap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="28553">
-<summary>
-Do not audit attempts to send UDP traffic on the gdomap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_gdomap_port" lineno="28568">
-<summary>
-Receive UDP traffic on the gdomap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28583">
-<summary>
-Do not audit attempts to receive UDP traffic on the gdomap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28598">
-<summary>
-Send and receive UDP traffic on the gdomap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28614">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the gdomap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_gdomap_port" lineno="28629">
+<interface name="corenet_tcp_bind_gdomap_port" lineno="22269">
<summary>
Bind TCP sockets to the gdomap port.
</summary>
@@ -28157,7 +23564,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gdomap_port" lineno="28649">
+<interface name="corenet_udp_bind_gdomap_port" lineno="22289">
<summary>
Bind UDP sockets to the gdomap port.
</summary>
@@ -28168,7 +23575,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gdomap_port" lineno="28668">
+<interface name="corenet_tcp_connect_gdomap_port" lineno="22308">
<summary>
Make a TCP connection to the gdomap port.
</summary>
@@ -28178,7 +23585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gdomap_client_packets" lineno="28688">
+<interface name="corenet_send_gdomap_client_packets" lineno="22328">
<summary>
Send gdomap_client packets.
</summary>
@@ -28189,7 +23596,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28707">
+<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="22347">
<summary>
Do not audit attempts to send gdomap_client packets.
</summary>
@@ -28200,7 +23607,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gdomap_client_packets" lineno="28726">
+<interface name="corenet_receive_gdomap_client_packets" lineno="22366">
<summary>
Receive gdomap_client packets.
</summary>
@@ -28211,7 +23618,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28745">
+<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="22385">
<summary>
Do not audit attempts to receive gdomap_client packets.
</summary>
@@ -28222,7 +23629,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28764">
+<interface name="corenet_sendrecv_gdomap_client_packets" lineno="22404">
<summary>
Send and receive gdomap_client packets.
</summary>
@@ -28233,7 +23640,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28780">
+<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="22420">
<summary>
Do not audit attempts to send and receive gdomap_client packets.
</summary>
@@ -28244,7 +23651,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gdomap_client_packets" lineno="28795">
+<interface name="corenet_relabelto_gdomap_client_packets" lineno="22435">
<summary>
Relabel packets to gdomap_client the packet type.
</summary>
@@ -28254,7 +23661,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gdomap_server_packets" lineno="28815">
+<interface name="corenet_send_gdomap_server_packets" lineno="22455">
<summary>
Send gdomap_server packets.
</summary>
@@ -28265,7 +23672,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28834">
+<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="22474">
<summary>
Do not audit attempts to send gdomap_server packets.
</summary>
@@ -28276,7 +23683,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gdomap_server_packets" lineno="28853">
+<interface name="corenet_receive_gdomap_server_packets" lineno="22493">
<summary>
Receive gdomap_server packets.
</summary>
@@ -28287,7 +23694,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28872">
+<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="22512">
<summary>
Do not audit attempts to receive gdomap_server packets.
</summary>
@@ -28298,7 +23705,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28891">
+<interface name="corenet_sendrecv_gdomap_server_packets" lineno="22531">
<summary>
Send and receive gdomap_server packets.
</summary>
@@ -28309,7 +23716,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28907">
+<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="22547">
<summary>
Do not audit attempts to send and receive gdomap_server packets.
</summary>
@@ -28320,7 +23727,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gdomap_server_packets" lineno="28922">
+<interface name="corenet_relabelto_gdomap_server_packets" lineno="22562">
<summary>
Relabel packets to gdomap_server the packet type.
</summary>
@@ -28330,85 +23737,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28944">
-<summary>
-Send and receive TCP traffic on the gds_db port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_gds_db_port" lineno="28959">
-<summary>
-Send UDP traffic on the gds_db port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28974">
-<summary>
-Do not audit attempts to send UDP traffic on the gds_db port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_gds_db_port" lineno="28989">
-<summary>
-Receive UDP traffic on the gds_db port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="29004">
-<summary>
-Do not audit attempts to receive UDP traffic on the gds_db port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29019">
-<summary>
-Send and receive UDP traffic on the gds_db port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29035">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the gds_db port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_gds_db_port" lineno="29050">
+<interface name="corenet_tcp_bind_gds_db_port" lineno="22584">
<summary>
Bind TCP sockets to the gds_db port.
</summary>
@@ -28419,7 +23748,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gds_db_port" lineno="29070">
+<interface name="corenet_udp_bind_gds_db_port" lineno="22604">
<summary>
Bind UDP sockets to the gds_db port.
</summary>
@@ -28430,7 +23759,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gds_db_port" lineno="29089">
+<interface name="corenet_tcp_connect_gds_db_port" lineno="22623">
<summary>
Make a TCP connection to the gds_db port.
</summary>
@@ -28440,7 +23769,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gds_db_client_packets" lineno="29109">
+<interface name="corenet_send_gds_db_client_packets" lineno="22643">
<summary>
Send gds_db_client packets.
</summary>
@@ -28451,7 +23780,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29128">
+<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="22662">
<summary>
Do not audit attempts to send gds_db_client packets.
</summary>
@@ -28462,7 +23791,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gds_db_client_packets" lineno="29147">
+<interface name="corenet_receive_gds_db_client_packets" lineno="22681">
<summary>
Receive gds_db_client packets.
</summary>
@@ -28473,7 +23802,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29166">
+<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="22700">
<summary>
Do not audit attempts to receive gds_db_client packets.
</summary>
@@ -28484,7 +23813,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29185">
+<interface name="corenet_sendrecv_gds_db_client_packets" lineno="22719">
<summary>
Send and receive gds_db_client packets.
</summary>
@@ -28495,7 +23824,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="29201">
+<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="22735">
<summary>
Do not audit attempts to send and receive gds_db_client packets.
</summary>
@@ -28506,7 +23835,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gds_db_client_packets" lineno="29216">
+<interface name="corenet_relabelto_gds_db_client_packets" lineno="22750">
<summary>
Relabel packets to gds_db_client the packet type.
</summary>
@@ -28516,7 +23845,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gds_db_server_packets" lineno="29236">
+<interface name="corenet_send_gds_db_server_packets" lineno="22770">
<summary>
Send gds_db_server packets.
</summary>
@@ -28527,7 +23856,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="29255">
+<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="22789">
<summary>
Do not audit attempts to send gds_db_server packets.
</summary>
@@ -28538,7 +23867,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gds_db_server_packets" lineno="29274">
+<interface name="corenet_receive_gds_db_server_packets" lineno="22808">
<summary>
Receive gds_db_server packets.
</summary>
@@ -28549,7 +23878,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="29293">
+<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="22827">
<summary>
Do not audit attempts to receive gds_db_server packets.
</summary>
@@ -28560,7 +23889,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gds_db_server_packets" lineno="29312">
+<interface name="corenet_sendrecv_gds_db_server_packets" lineno="22846">
<summary>
Send and receive gds_db_server packets.
</summary>
@@ -28571,7 +23900,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="29328">
+<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="22862">
<summary>
Do not audit attempts to send and receive gds_db_server packets.
</summary>
@@ -28582,7 +23911,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gds_db_server_packets" lineno="29343">
+<interface name="corenet_relabelto_gds_db_server_packets" lineno="22877">
<summary>
Relabel packets to gds_db_server the packet type.
</summary>
@@ -28592,85 +23921,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_git_port" lineno="29365">
-<summary>
-Send and receive TCP traffic on the git port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_git_port" lineno="29380">
-<summary>
-Send UDP traffic on the git port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_git_port" lineno="29395">
-<summary>
-Do not audit attempts to send UDP traffic on the git port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_git_port" lineno="29410">
-<summary>
-Receive UDP traffic on the git port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29425">
-<summary>
-Do not audit attempts to receive UDP traffic on the git port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_git_port" lineno="29440">
-<summary>
-Send and receive UDP traffic on the git port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29456">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the git port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_git_port" lineno="29471">
+<interface name="corenet_tcp_bind_git_port" lineno="22899">
<summary>
Bind TCP sockets to the git port.
</summary>
@@ -28681,7 +23932,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_git_port" lineno="29491">
+<interface name="corenet_udp_bind_git_port" lineno="22919">
<summary>
Bind UDP sockets to the git port.
</summary>
@@ -28692,7 +23943,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_git_port" lineno="29510">
+<interface name="corenet_tcp_connect_git_port" lineno="22938">
<summary>
Make a TCP connection to the git port.
</summary>
@@ -28702,7 +23953,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_git_client_packets" lineno="29530">
+<interface name="corenet_send_git_client_packets" lineno="22958">
<summary>
Send git_client packets.
</summary>
@@ -28713,7 +23964,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_git_client_packets" lineno="29549">
+<interface name="corenet_dontaudit_send_git_client_packets" lineno="22977">
<summary>
Do not audit attempts to send git_client packets.
</summary>
@@ -28724,7 +23975,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_git_client_packets" lineno="29568">
+<interface name="corenet_receive_git_client_packets" lineno="22996">
<summary>
Receive git_client packets.
</summary>
@@ -28735,7 +23986,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29587">
+<interface name="corenet_dontaudit_receive_git_client_packets" lineno="23015">
<summary>
Do not audit attempts to receive git_client packets.
</summary>
@@ -28746,7 +23997,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_git_client_packets" lineno="29606">
+<interface name="corenet_sendrecv_git_client_packets" lineno="23034">
<summary>
Send and receive git_client packets.
</summary>
@@ -28757,7 +24008,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29622">
+<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="23050">
<summary>
Do not audit attempts to send and receive git_client packets.
</summary>
@@ -28768,7 +24019,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_git_client_packets" lineno="29637">
+<interface name="corenet_relabelto_git_client_packets" lineno="23065">
<summary>
Relabel packets to git_client the packet type.
</summary>
@@ -28778,7 +24029,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_git_server_packets" lineno="29657">
+<interface name="corenet_send_git_server_packets" lineno="23085">
<summary>
Send git_server packets.
</summary>
@@ -28789,7 +24040,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_git_server_packets" lineno="29676">
+<interface name="corenet_dontaudit_send_git_server_packets" lineno="23104">
<summary>
Do not audit attempts to send git_server packets.
</summary>
@@ -28800,7 +24051,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_git_server_packets" lineno="29695">
+<interface name="corenet_receive_git_server_packets" lineno="23123">
<summary>
Receive git_server packets.
</summary>
@@ -28811,7 +24062,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29714">
+<interface name="corenet_dontaudit_receive_git_server_packets" lineno="23142">
<summary>
Do not audit attempts to receive git_server packets.
</summary>
@@ -28822,7 +24073,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_git_server_packets" lineno="29733">
+<interface name="corenet_sendrecv_git_server_packets" lineno="23161">
<summary>
Send and receive git_server packets.
</summary>
@@ -28833,7 +24084,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29749">
+<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="23177">
<summary>
Do not audit attempts to send and receive git_server packets.
</summary>
@@ -28844,7 +24095,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_git_server_packets" lineno="29764">
+<interface name="corenet_relabelto_git_server_packets" lineno="23192">
<summary>
Relabel packets to git_server the packet type.
</summary>
@@ -28854,85 +24105,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29786">
-<summary>
-Send and receive TCP traffic on the glance_registry port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_glance_registry_port" lineno="29801">
-<summary>
-Send UDP traffic on the glance_registry port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29816">
-<summary>
-Do not audit attempts to send UDP traffic on the glance_registry port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_glance_registry_port" lineno="29831">
-<summary>
-Receive UDP traffic on the glance_registry port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29846">
-<summary>
-Do not audit attempts to receive UDP traffic on the glance_registry port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29861">
-<summary>
-Send and receive UDP traffic on the glance_registry port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29877">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the glance_registry port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_glance_registry_port" lineno="29892">
+<interface name="corenet_tcp_bind_glance_registry_port" lineno="23214">
<summary>
Bind TCP sockets to the glance_registry port.
</summary>
@@ -28943,7 +24116,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_glance_registry_port" lineno="29912">
+<interface name="corenet_udp_bind_glance_registry_port" lineno="23234">
<summary>
Bind UDP sockets to the glance_registry port.
</summary>
@@ -28954,7 +24127,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_glance_registry_port" lineno="29931">
+<interface name="corenet_tcp_connect_glance_registry_port" lineno="23253">
<summary>
Make a TCP connection to the glance_registry port.
</summary>
@@ -28964,7 +24137,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_glance_registry_client_packets" lineno="29951">
+<interface name="corenet_send_glance_registry_client_packets" lineno="23273">
<summary>
Send glance_registry_client packets.
</summary>
@@ -28975,7 +24148,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29970">
+<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="23292">
<summary>
Do not audit attempts to send glance_registry_client packets.
</summary>
@@ -28986,7 +24159,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_glance_registry_client_packets" lineno="29989">
+<interface name="corenet_receive_glance_registry_client_packets" lineno="23311">
<summary>
Receive glance_registry_client packets.
</summary>
@@ -28997,7 +24170,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="30008">
+<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="23330">
<summary>
Do not audit attempts to receive glance_registry_client packets.
</summary>
@@ -29008,7 +24181,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="30027">
+<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="23349">
<summary>
Send and receive glance_registry_client packets.
</summary>
@@ -29019,7 +24192,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="30043">
+<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="23365">
<summary>
Do not audit attempts to send and receive glance_registry_client packets.
</summary>
@@ -29030,7 +24203,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_glance_registry_client_packets" lineno="30058">
+<interface name="corenet_relabelto_glance_registry_client_packets" lineno="23380">
<summary>
Relabel packets to glance_registry_client the packet type.
</summary>
@@ -29040,7 +24213,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_glance_registry_server_packets" lineno="30078">
+<interface name="corenet_send_glance_registry_server_packets" lineno="23400">
<summary>
Send glance_registry_server packets.
</summary>
@@ -29051,7 +24224,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="30097">
+<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="23419">
<summary>
Do not audit attempts to send glance_registry_server packets.
</summary>
@@ -29062,7 +24235,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_glance_registry_server_packets" lineno="30116">
+<interface name="corenet_receive_glance_registry_server_packets" lineno="23438">
<summary>
Receive glance_registry_server packets.
</summary>
@@ -29073,7 +24246,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="30135">
+<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="23457">
<summary>
Do not audit attempts to receive glance_registry_server packets.
</summary>
@@ -29084,7 +24257,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30154">
+<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="23476">
<summary>
Send and receive glance_registry_server packets.
</summary>
@@ -29095,7 +24268,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30170">
+<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="23492">
<summary>
Do not audit attempts to send and receive glance_registry_server packets.
</summary>
@@ -29106,7 +24279,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30185">
+<interface name="corenet_relabelto_glance_registry_server_packets" lineno="23507">
<summary>
Relabel packets to glance_registry_server the packet type.
</summary>
@@ -29116,53 +24289,52 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30207">
+<interface name="corenet_tcp_bind_glusterd_port" lineno="23529">
<summary>
-Send and receive TCP traffic on the gopher port.
+Bind TCP sockets to the glusterd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="both" weight="10"/>
+<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_send_gopher_port" lineno="30222">
+<interface name="corenet_udp_bind_glusterd_port" lineno="23549">
<summary>
-Send UDP traffic on the gopher port.
+Bind UDP sockets to the glusterd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="write" weight="10"/>
+<infoflow type="none"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30237">
+<interface name="corenet_tcp_connect_glusterd_port" lineno="23568">
<summary>
-Do not audit attempts to send UDP traffic on the gopher port.
+Make a TCP connection to the glusterd port.
</summary>
<param name="domain">
<summary>
-Domain to not audit.
+Domain allowed access.
</summary>
</param>
-<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gopher_port" lineno="30252">
+<interface name="corenet_send_glusterd_client_packets" lineno="23588">
<summary>
-Receive UDP traffic on the gopher port.
+Send glusterd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="read" weight="10"/>
+<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30267">
+<interface name="corenet_dontaudit_send_glusterd_client_packets" lineno="23607">
<summary>
-Do not audit attempts to receive UDP traffic on the gopher port.
+Do not audit attempts to send glusterd_client packets.
</summary>
<param name="domain">
<summary>
@@ -29171,54 +24343,53 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gopher_port" lineno="30282">
+<interface name="corenet_receive_glusterd_client_packets" lineno="23626">
<summary>
-Send and receive UDP traffic on the gopher port.
+Receive glusterd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="both" weight="10"/>
+<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30298">
+<interface name="corenet_dontaudit_receive_glusterd_client_packets" lineno="23645">
<summary>
-Do not audit attempts to send and receive
-UDP traffic on the gopher port.
+Do not audit attempts to receive glusterd_client packets.
</summary>
<param name="domain">
<summary>
-Domain to not audit.
+Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gopher_port" lineno="30313">
+<interface name="corenet_sendrecv_glusterd_client_packets" lineno="23664">
<summary>
-Bind TCP sockets to the gopher port.
+Send and receive glusterd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="none"/>
+<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_bind_gopher_port" lineno="30333">
+<interface name="corenet_dontaudit_sendrecv_glusterd_client_packets" lineno="23680">
<summary>
-Bind UDP sockets to the gopher port.
+Do not audit attempts to send and receive glusterd_client packets.
</summary>
<param name="domain">
<summary>
-Domain allowed access.
+Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gopher_port" lineno="30352">
+<interface name="corenet_relabelto_glusterd_client_packets" lineno="23695">
<summary>
-Make a TCP connection to the gopher port.
+Relabel packets to glusterd_client the packet type.
</summary>
<param name="domain">
<summary>
@@ -29226,9 +24397,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gopher_client_packets" lineno="30372">
+<interface name="corenet_send_glusterd_server_packets" lineno="23715">
<summary>
-Send gopher_client packets.
+Send glusterd_server packets.
</summary>
<param name="domain">
<summary>
@@ -29237,9 +24408,9 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30391">
+<interface name="corenet_dontaudit_send_glusterd_server_packets" lineno="23734">
<summary>
-Do not audit attempts to send gopher_client packets.
+Do not audit attempts to send glusterd_server packets.
</summary>
<param name="domain">
<summary>
@@ -29248,9 +24419,9 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gopher_client_packets" lineno="30410">
+<interface name="corenet_receive_glusterd_server_packets" lineno="23753">
<summary>
-Receive gopher_client packets.
+Receive glusterd_server packets.
</summary>
<param name="domain">
<summary>
@@ -29259,9 +24430,9 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30429">
+<interface name="corenet_dontaudit_receive_glusterd_server_packets" lineno="23772">
<summary>
-Do not audit attempts to receive gopher_client packets.
+Do not audit attempts to receive glusterd_server packets.
</summary>
<param name="domain">
<summary>
@@ -29270,9 +24441,9 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gopher_client_packets" lineno="30448">
+<interface name="corenet_sendrecv_glusterd_server_packets" lineno="23791">
<summary>
-Send and receive gopher_client packets.
+Send and receive glusterd_server packets.
</summary>
<param name="domain">
<summary>
@@ -29281,9 +24452,9 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30464">
+<interface name="corenet_dontaudit_sendrecv_glusterd_server_packets" lineno="23807">
<summary>
-Do not audit attempts to send and receive gopher_client packets.
+Do not audit attempts to send and receive glusterd_server packets.
</summary>
<param name="domain">
<summary>
@@ -29292,9 +24463,9 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gopher_client_packets" lineno="30479">
+<interface name="corenet_relabelto_glusterd_server_packets" lineno="23822">
<summary>
-Relabel packets to gopher_client the packet type.
+Relabel packets to glusterd_server the packet type.
</summary>
<param name="domain">
<summary>
@@ -29302,96 +24473,117 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gopher_server_packets" lineno="30499">
+<interface name="corenet_tcp_bind_gopher_port" lineno="23844">
<summary>
-Send gopher_server packets.
+Bind TCP sockets to the gopher port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="write" weight="10"/>
+<infoflow type="none"/>
</interface>
-<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30518">
+<interface name="corenet_udp_bind_gopher_port" lineno="23864">
<summary>
-Do not audit attempts to send gopher_server packets.
+Bind UDP sockets to the gopher port.
</summary>
<param name="domain">
<summary>
-Domain to not audit.
+Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gopher_server_packets" lineno="30537">
+<interface name="corenet_tcp_connect_gopher_port" lineno="23883">
<summary>
-Receive gopher_server packets.
+Make a TCP connection to the gopher port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30556">
+<interface name="corenet_send_gopher_client_packets" lineno="23903">
<summary>
-Do not audit attempts to receive gopher_server packets.
+Send gopher_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
+<infoflow type="write" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="23922">
+<summary>
+Do not audit attempts to send gopher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gopher_server_packets" lineno="30575">
+<interface name="corenet_receive_gopher_client_packets" lineno="23941">
<summary>
-Send and receive gopher_server packets.
+Receive gopher_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="both" weight="10"/>
+<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30591">
+<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="23960">
<summary>
-Do not audit attempts to send and receive gopher_server packets.
+Do not audit attempts to receive gopher_client packets.
</summary>
<param name="domain">
<summary>
-Domain to not audit.
+Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gopher_server_packets" lineno="30606">
+<interface name="corenet_sendrecv_gopher_client_packets" lineno="23979">
<summary>
-Relabel packets to gopher_server the packet type.
+Send and receive gopher_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
+<infoflow type="both" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="23995">
+<summary>
+Do not audit attempts to send and receive gopher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30628">
+<interface name="corenet_relabelto_gopher_client_packets" lineno="24010">
<summary>
-Send and receive TCP traffic on the gpsd port.
+Relabel packets to gopher_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gpsd_port" lineno="30643">
+<interface name="corenet_send_gopher_server_packets" lineno="24030">
<summary>
-Send UDP traffic on the gpsd port.
+Send gopher_server packets.
</summary>
<param name="domain">
<summary>
@@ -29400,9 +24592,9 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30658">
+<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="24049">
<summary>
-Do not audit attempts to send UDP traffic on the gpsd port.
+Do not audit attempts to send gopher_server packets.
</summary>
<param name="domain">
<summary>
@@ -29411,9 +24603,9 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gpsd_port" lineno="30673">
+<interface name="corenet_receive_gopher_server_packets" lineno="24068">
<summary>
-Receive UDP traffic on the gpsd port.
+Receive gopher_server packets.
</summary>
<param name="domain">
<summary>
@@ -29422,20 +24614,20 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30688">
+<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="24087">
<summary>
-Do not audit attempts to receive UDP traffic on the gpsd port.
+Do not audit attempts to receive gopher_server packets.
</summary>
<param name="domain">
<summary>
-Domain to not audit.
+Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30703">
+<interface name="corenet_sendrecv_gopher_server_packets" lineno="24106">
<summary>
-Send and receive UDP traffic on the gpsd port.
+Send and receive gopher_server packets.
</summary>
<param name="domain">
<summary>
@@ -29444,10 +24636,9 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30719">
+<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="24122">
<summary>
-Do not audit attempts to send and receive
-UDP traffic on the gpsd port.
+Do not audit attempts to send and receive gopher_server packets.
</summary>
<param name="domain">
<summary>
@@ -29456,7 +24647,17 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gpsd_port" lineno="30734">
+<interface name="corenet_relabelto_gopher_server_packets" lineno="24137">
+<summary>
+Relabel packets to gopher_server the packet type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corenet_tcp_bind_gpsd_port" lineno="24159">
<summary>
Bind TCP sockets to the gpsd port.
</summary>
@@ -29467,7 +24668,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gpsd_port" lineno="30754">
+<interface name="corenet_udp_bind_gpsd_port" lineno="24179">
<summary>
Bind UDP sockets to the gpsd port.
</summary>
@@ -29478,7 +24679,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gpsd_port" lineno="30773">
+<interface name="corenet_tcp_connect_gpsd_port" lineno="24198">
<summary>
Make a TCP connection to the gpsd port.
</summary>
@@ -29488,7 +24689,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gpsd_client_packets" lineno="30793">
+<interface name="corenet_send_gpsd_client_packets" lineno="24218">
<summary>
Send gpsd_client packets.
</summary>
@@ -29499,7 +24700,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30812">
+<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="24237">
<summary>
Do not audit attempts to send gpsd_client packets.
</summary>
@@ -29510,7 +24711,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gpsd_client_packets" lineno="30831">
+<interface name="corenet_receive_gpsd_client_packets" lineno="24256">
<summary>
Receive gpsd_client packets.
</summary>
@@ -29521,7 +24722,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30850">
+<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="24275">
<summary>
Do not audit attempts to receive gpsd_client packets.
</summary>
@@ -29532,7 +24733,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30869">
+<interface name="corenet_sendrecv_gpsd_client_packets" lineno="24294">
<summary>
Send and receive gpsd_client packets.
</summary>
@@ -29543,7 +24744,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30885">
+<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="24310">
<summary>
Do not audit attempts to send and receive gpsd_client packets.
</summary>
@@ -29554,7 +24755,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gpsd_client_packets" lineno="30900">
+<interface name="corenet_relabelto_gpsd_client_packets" lineno="24325">
<summary>
Relabel packets to gpsd_client the packet type.
</summary>
@@ -29564,7 +24765,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gpsd_server_packets" lineno="30920">
+<interface name="corenet_send_gpsd_server_packets" lineno="24345">
<summary>
Send gpsd_server packets.
</summary>
@@ -29575,7 +24776,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30939">
+<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="24364">
<summary>
Do not audit attempts to send gpsd_server packets.
</summary>
@@ -29586,7 +24787,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gpsd_server_packets" lineno="30958">
+<interface name="corenet_receive_gpsd_server_packets" lineno="24383">
<summary>
Receive gpsd_server packets.
</summary>
@@ -29597,7 +24798,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30977">
+<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="24402">
<summary>
Do not audit attempts to receive gpsd_server packets.
</summary>
@@ -29608,7 +24809,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30996">
+<interface name="corenet_sendrecv_gpsd_server_packets" lineno="24421">
<summary>
Send and receive gpsd_server packets.
</summary>
@@ -29619,7 +24820,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="31012">
+<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="24437">
<summary>
Do not audit attempts to send and receive gpsd_server packets.
</summary>
@@ -29630,7 +24831,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gpsd_server_packets" lineno="31027">
+<interface name="corenet_relabelto_gpsd_server_packets" lineno="24452">
<summary>
Relabel packets to gpsd_server the packet type.
</summary>
@@ -29640,85 +24841,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="31049">
-<summary>
-Send and receive TCP traffic on the hadoop_datanode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_hadoop_datanode_port" lineno="31064">
-<summary>
-Send UDP traffic on the hadoop_datanode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="31079">
-<summary>
-Do not audit attempts to send UDP traffic on the hadoop_datanode port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="31094">
-<summary>
-Receive UDP traffic on the hadoop_datanode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="31109">
-<summary>
-Do not audit attempts to receive UDP traffic on the hadoop_datanode port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="31124">
-<summary>
-Send and receive UDP traffic on the hadoop_datanode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="31140">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the hadoop_datanode port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31155">
+<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="24474">
<summary>
Bind TCP sockets to the hadoop_datanode port.
</summary>
@@ -29729,7 +24852,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31175">
+<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="24494">
<summary>
Bind UDP sockets to the hadoop_datanode port.
</summary>
@@ -29740,7 +24863,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31194">
+<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="24513">
<summary>
Make a TCP connection to the hadoop_datanode port.
</summary>
@@ -29750,7 +24873,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31214">
+<interface name="corenet_send_hadoop_datanode_client_packets" lineno="24533">
<summary>
Send hadoop_datanode_client packets.
</summary>
@@ -29761,7 +24884,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31233">
+<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="24552">
<summary>
Do not audit attempts to send hadoop_datanode_client packets.
</summary>
@@ -29772,7 +24895,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31252">
+<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="24571">
<summary>
Receive hadoop_datanode_client packets.
</summary>
@@ -29783,7 +24906,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31271">
+<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="24590">
<summary>
Do not audit attempts to receive hadoop_datanode_client packets.
</summary>
@@ -29794,7 +24917,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31290">
+<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="24609">
<summary>
Send and receive hadoop_datanode_client packets.
</summary>
@@ -29805,7 +24928,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31306">
+<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="24625">
<summary>
Do not audit attempts to send and receive hadoop_datanode_client packets.
</summary>
@@ -29816,7 +24939,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31321">
+<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="24640">
<summary>
Relabel packets to hadoop_datanode_client the packet type.
</summary>
@@ -29826,7 +24949,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31341">
+<interface name="corenet_send_hadoop_datanode_server_packets" lineno="24660">
<summary>
Send hadoop_datanode_server packets.
</summary>
@@ -29837,7 +24960,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31360">
+<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="24679">
<summary>
Do not audit attempts to send hadoop_datanode_server packets.
</summary>
@@ -29848,7 +24971,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31379">
+<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="24698">
<summary>
Receive hadoop_datanode_server packets.
</summary>
@@ -29859,7 +24982,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31398">
+<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="24717">
<summary>
Do not audit attempts to receive hadoop_datanode_server packets.
</summary>
@@ -29870,7 +24993,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31417">
+<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="24736">
<summary>
Send and receive hadoop_datanode_server packets.
</summary>
@@ -29881,7 +25004,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31433">
+<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="24752">
<summary>
Do not audit attempts to send and receive hadoop_datanode_server packets.
</summary>
@@ -29892,7 +25015,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31448">
+<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="24767">
<summary>
Relabel packets to hadoop_datanode_server the packet type.
</summary>
@@ -29902,85 +25025,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31470">
-<summary>
-Send and receive TCP traffic on the hadoop_namenode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31485">
-<summary>
-Send UDP traffic on the hadoop_namenode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31500">
-<summary>
-Do not audit attempts to send UDP traffic on the hadoop_namenode port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31515">
-<summary>
-Receive UDP traffic on the hadoop_namenode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31530">
-<summary>
-Do not audit attempts to receive UDP traffic on the hadoop_namenode port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31545">
-<summary>
-Send and receive UDP traffic on the hadoop_namenode port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31561">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the hadoop_namenode port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31576">
+<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="24789">
<summary>
Bind TCP sockets to the hadoop_namenode port.
</summary>
@@ -29991,7 +25036,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31596">
+<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="24809">
<summary>
Bind UDP sockets to the hadoop_namenode port.
</summary>
@@ -30002,7 +25047,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31615">
+<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="24828">
<summary>
Make a TCP connection to the hadoop_namenode port.
</summary>
@@ -30012,7 +25057,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31635">
+<interface name="corenet_send_hadoop_namenode_client_packets" lineno="24848">
<summary>
Send hadoop_namenode_client packets.
</summary>
@@ -30023,7 +25068,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31654">
+<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="24867">
<summary>
Do not audit attempts to send hadoop_namenode_client packets.
</summary>
@@ -30034,7 +25079,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31673">
+<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="24886">
<summary>
Receive hadoop_namenode_client packets.
</summary>
@@ -30045,7 +25090,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31692">
+<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="24905">
<summary>
Do not audit attempts to receive hadoop_namenode_client packets.
</summary>
@@ -30056,7 +25101,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31711">
+<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="24924">
<summary>
Send and receive hadoop_namenode_client packets.
</summary>
@@ -30067,7 +25112,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31727">
+<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="24940">
<summary>
Do not audit attempts to send and receive hadoop_namenode_client packets.
</summary>
@@ -30078,7 +25123,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31742">
+<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="24955">
<summary>
Relabel packets to hadoop_namenode_client the packet type.
</summary>
@@ -30088,7 +25133,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31762">
+<interface name="corenet_send_hadoop_namenode_server_packets" lineno="24975">
<summary>
Send hadoop_namenode_server packets.
</summary>
@@ -30099,7 +25144,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31781">
+<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="24994">
<summary>
Do not audit attempts to send hadoop_namenode_server packets.
</summary>
@@ -30110,7 +25155,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31800">
+<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="25013">
<summary>
Receive hadoop_namenode_server packets.
</summary>
@@ -30121,7 +25166,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31819">
+<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="25032">
<summary>
Do not audit attempts to receive hadoop_namenode_server packets.
</summary>
@@ -30132,7 +25177,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31838">
+<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="25051">
<summary>
Send and receive hadoop_namenode_server packets.
</summary>
@@ -30143,7 +25188,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31854">
+<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="25067">
<summary>
Do not audit attempts to send and receive hadoop_namenode_server packets.
</summary>
@@ -30154,7 +25199,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31869">
+<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="25082">
<summary>
Relabel packets to hadoop_namenode_server the packet type.
</summary>
@@ -30164,85 +25209,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31891">
-<summary>
-Send and receive TCP traffic on the hddtemp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_hddtemp_port" lineno="31906">
-<summary>
-Send UDP traffic on the hddtemp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31921">
-<summary>
-Do not audit attempts to send UDP traffic on the hddtemp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_hddtemp_port" lineno="31936">
-<summary>
-Receive UDP traffic on the hddtemp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31951">
-<summary>
-Do not audit attempts to receive UDP traffic on the hddtemp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31966">
-<summary>
-Send and receive UDP traffic on the hddtemp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31982">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the hddtemp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_hddtemp_port" lineno="31997">
+<interface name="corenet_tcp_bind_hddtemp_port" lineno="25104">
<summary>
Bind TCP sockets to the hddtemp port.
</summary>
@@ -30253,7 +25220,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hddtemp_port" lineno="32017">
+<interface name="corenet_udp_bind_hddtemp_port" lineno="25124">
<summary>
Bind UDP sockets to the hddtemp port.
</summary>
@@ -30264,7 +25231,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hddtemp_port" lineno="32036">
+<interface name="corenet_tcp_connect_hddtemp_port" lineno="25143">
<summary>
Make a TCP connection to the hddtemp port.
</summary>
@@ -30274,7 +25241,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hddtemp_client_packets" lineno="32056">
+<interface name="corenet_send_hddtemp_client_packets" lineno="25163">
<summary>
Send hddtemp_client packets.
</summary>
@@ -30285,7 +25252,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="32075">
+<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="25182">
<summary>
Do not audit attempts to send hddtemp_client packets.
</summary>
@@ -30296,7 +25263,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hddtemp_client_packets" lineno="32094">
+<interface name="corenet_receive_hddtemp_client_packets" lineno="25201">
<summary>
Receive hddtemp_client packets.
</summary>
@@ -30307,7 +25274,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="32113">
+<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="25220">
<summary>
Do not audit attempts to receive hddtemp_client packets.
</summary>
@@ -30318,7 +25285,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="32132">
+<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="25239">
<summary>
Send and receive hddtemp_client packets.
</summary>
@@ -30329,7 +25296,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32148">
+<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="25255">
<summary>
Do not audit attempts to send and receive hddtemp_client packets.
</summary>
@@ -30340,7 +25307,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32163">
+<interface name="corenet_relabelto_hddtemp_client_packets" lineno="25270">
<summary>
Relabel packets to hddtemp_client the packet type.
</summary>
@@ -30350,7 +25317,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hddtemp_server_packets" lineno="32183">
+<interface name="corenet_send_hddtemp_server_packets" lineno="25290">
<summary>
Send hddtemp_server packets.
</summary>
@@ -30361,7 +25328,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32202">
+<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="25309">
<summary>
Do not audit attempts to send hddtemp_server packets.
</summary>
@@ -30372,7 +25339,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hddtemp_server_packets" lineno="32221">
+<interface name="corenet_receive_hddtemp_server_packets" lineno="25328">
<summary>
Receive hddtemp_server packets.
</summary>
@@ -30383,7 +25350,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32240">
+<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="25347">
<summary>
Do not audit attempts to receive hddtemp_server packets.
</summary>
@@ -30394,7 +25361,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32259">
+<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="25366">
<summary>
Send and receive hddtemp_server packets.
</summary>
@@ -30405,7 +25372,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32275">
+<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="25382">
<summary>
Do not audit attempts to send and receive hddtemp_server packets.
</summary>
@@ -30416,7 +25383,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32290">
+<interface name="corenet_relabelto_hddtemp_server_packets" lineno="25397">
<summary>
Relabel packets to hddtemp_server the packet type.
</summary>
@@ -30426,85 +25393,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_howl_port" lineno="32312">
-<summary>
-Send and receive TCP traffic on the howl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_howl_port" lineno="32327">
-<summary>
-Send UDP traffic on the howl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32342">
-<summary>
-Do not audit attempts to send UDP traffic on the howl port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_howl_port" lineno="32357">
-<summary>
-Receive UDP traffic on the howl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32372">
-<summary>
-Do not audit attempts to receive UDP traffic on the howl port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_howl_port" lineno="32387">
-<summary>
-Send and receive UDP traffic on the howl port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32403">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the howl port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_howl_port" lineno="32418">
+<interface name="corenet_tcp_bind_howl_port" lineno="25419">
<summary>
Bind TCP sockets to the howl port.
</summary>
@@ -30515,7 +25404,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_howl_port" lineno="32438">
+<interface name="corenet_udp_bind_howl_port" lineno="25439">
<summary>
Bind UDP sockets to the howl port.
</summary>
@@ -30526,7 +25415,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_howl_port" lineno="32457">
+<interface name="corenet_tcp_connect_howl_port" lineno="25458">
<summary>
Make a TCP connection to the howl port.
</summary>
@@ -30536,7 +25425,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_howl_client_packets" lineno="32477">
+<interface name="corenet_send_howl_client_packets" lineno="25478">
<summary>
Send howl_client packets.
</summary>
@@ -30547,7 +25436,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32496">
+<interface name="corenet_dontaudit_send_howl_client_packets" lineno="25497">
<summary>
Do not audit attempts to send howl_client packets.
</summary>
@@ -30558,7 +25447,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_howl_client_packets" lineno="32515">
+<interface name="corenet_receive_howl_client_packets" lineno="25516">
<summary>
Receive howl_client packets.
</summary>
@@ -30569,7 +25458,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32534">
+<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="25535">
<summary>
Do not audit attempts to receive howl_client packets.
</summary>
@@ -30580,7 +25469,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_howl_client_packets" lineno="32553">
+<interface name="corenet_sendrecv_howl_client_packets" lineno="25554">
<summary>
Send and receive howl_client packets.
</summary>
@@ -30591,7 +25480,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32569">
+<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="25570">
<summary>
Do not audit attempts to send and receive howl_client packets.
</summary>
@@ -30602,7 +25491,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_howl_client_packets" lineno="32584">
+<interface name="corenet_relabelto_howl_client_packets" lineno="25585">
<summary>
Relabel packets to howl_client the packet type.
</summary>
@@ -30612,7 +25501,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_howl_server_packets" lineno="32604">
+<interface name="corenet_send_howl_server_packets" lineno="25605">
<summary>
Send howl_server packets.
</summary>
@@ -30623,7 +25512,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32623">
+<interface name="corenet_dontaudit_send_howl_server_packets" lineno="25624">
<summary>
Do not audit attempts to send howl_server packets.
</summary>
@@ -30634,7 +25523,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_howl_server_packets" lineno="32642">
+<interface name="corenet_receive_howl_server_packets" lineno="25643">
<summary>
Receive howl_server packets.
</summary>
@@ -30645,7 +25534,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32661">
+<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="25662">
<summary>
Do not audit attempts to receive howl_server packets.
</summary>
@@ -30656,7 +25545,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_howl_server_packets" lineno="32680">
+<interface name="corenet_sendrecv_howl_server_packets" lineno="25681">
<summary>
Send and receive howl_server packets.
</summary>
@@ -30667,7 +25556,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32696">
+<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="25697">
<summary>
Do not audit attempts to send and receive howl_server packets.
</summary>
@@ -30678,7 +25567,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_howl_server_packets" lineno="32711">
+<interface name="corenet_relabelto_howl_server_packets" lineno="25712">
<summary>
Relabel packets to howl_server the packet type.
</summary>
@@ -30688,85 +25577,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32733">
-<summary>
-Send and receive TCP traffic on the hplip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_hplip_port" lineno="32748">
-<summary>
-Send UDP traffic on the hplip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32763">
-<summary>
-Do not audit attempts to send UDP traffic on the hplip port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_hplip_port" lineno="32778">
-<summary>
-Receive UDP traffic on the hplip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32793">
-<summary>
-Do not audit attempts to receive UDP traffic on the hplip port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_hplip_port" lineno="32808">
-<summary>
-Send and receive UDP traffic on the hplip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32824">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the hplip port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_hplip_port" lineno="32839">
+<interface name="corenet_tcp_bind_hplip_port" lineno="25734">
<summary>
Bind TCP sockets to the hplip port.
</summary>
@@ -30777,7 +25588,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hplip_port" lineno="32859">
+<interface name="corenet_udp_bind_hplip_port" lineno="25754">
<summary>
Bind UDP sockets to the hplip port.
</summary>
@@ -30788,7 +25599,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hplip_port" lineno="32878">
+<interface name="corenet_tcp_connect_hplip_port" lineno="25773">
<summary>
Make a TCP connection to the hplip port.
</summary>
@@ -30798,7 +25609,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hplip_client_packets" lineno="32898">
+<interface name="corenet_send_hplip_client_packets" lineno="25793">
<summary>
Send hplip_client packets.
</summary>
@@ -30809,7 +25620,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32917">
+<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="25812">
<summary>
Do not audit attempts to send hplip_client packets.
</summary>
@@ -30820,7 +25631,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hplip_client_packets" lineno="32936">
+<interface name="corenet_receive_hplip_client_packets" lineno="25831">
<summary>
Receive hplip_client packets.
</summary>
@@ -30831,7 +25642,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32955">
+<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="25850">
<summary>
Do not audit attempts to receive hplip_client packets.
</summary>
@@ -30842,7 +25653,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hplip_client_packets" lineno="32974">
+<interface name="corenet_sendrecv_hplip_client_packets" lineno="25869">
<summary>
Send and receive hplip_client packets.
</summary>
@@ -30853,7 +25664,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32990">
+<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="25885">
<summary>
Do not audit attempts to send and receive hplip_client packets.
</summary>
@@ -30864,7 +25675,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hplip_client_packets" lineno="33005">
+<interface name="corenet_relabelto_hplip_client_packets" lineno="25900">
<summary>
Relabel packets to hplip_client the packet type.
</summary>
@@ -30874,7 +25685,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hplip_server_packets" lineno="33025">
+<interface name="corenet_send_hplip_server_packets" lineno="25920">
<summary>
Send hplip_server packets.
</summary>
@@ -30885,7 +25696,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="33044">
+<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="25939">
<summary>
Do not audit attempts to send hplip_server packets.
</summary>
@@ -30896,7 +25707,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hplip_server_packets" lineno="33063">
+<interface name="corenet_receive_hplip_server_packets" lineno="25958">
<summary>
Receive hplip_server packets.
</summary>
@@ -30907,7 +25718,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="33082">
+<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="25977">
<summary>
Do not audit attempts to receive hplip_server packets.
</summary>
@@ -30918,7 +25729,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hplip_server_packets" lineno="33101">
+<interface name="corenet_sendrecv_hplip_server_packets" lineno="25996">
<summary>
Send and receive hplip_server packets.
</summary>
@@ -30929,7 +25740,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="33117">
+<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="26012">
<summary>
Do not audit attempts to send and receive hplip_server packets.
</summary>
@@ -30940,7 +25751,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hplip_server_packets" lineno="33132">
+<interface name="corenet_relabelto_hplip_server_packets" lineno="26027">
<summary>
Relabel packets to hplip_server the packet type.
</summary>
@@ -30950,85 +25761,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_http_port" lineno="33154">
-<summary>
-Send and receive TCP traffic on the http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_http_port" lineno="33169">
-<summary>
-Send UDP traffic on the http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_http_port" lineno="33184">
-<summary>
-Do not audit attempts to send UDP traffic on the http port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_http_port" lineno="33199">
-<summary>
-Receive UDP traffic on the http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33214">
-<summary>
-Do not audit attempts to receive UDP traffic on the http port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_http_port" lineno="33229">
-<summary>
-Send and receive UDP traffic on the http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33245">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the http port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_http_port" lineno="33260">
+<interface name="corenet_tcp_bind_http_port" lineno="26049">
<summary>
Bind TCP sockets to the http port.
</summary>
@@ -31039,7 +25772,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_http_port" lineno="33280">
+<interface name="corenet_udp_bind_http_port" lineno="26069">
<summary>
Bind UDP sockets to the http port.
</summary>
@@ -31050,7 +25783,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_http_port" lineno="33299">
+<interface name="corenet_tcp_connect_http_port" lineno="26088">
<summary>
Make a TCP connection to the http port.
</summary>
@@ -31060,7 +25793,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_client_packets" lineno="33319">
+<interface name="corenet_send_http_client_packets" lineno="26108">
<summary>
Send http_client packets.
</summary>
@@ -31071,7 +25804,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_client_packets" lineno="33338">
+<interface name="corenet_dontaudit_send_http_client_packets" lineno="26127">
<summary>
Do not audit attempts to send http_client packets.
</summary>
@@ -31082,7 +25815,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_client_packets" lineno="33357">
+<interface name="corenet_receive_http_client_packets" lineno="26146">
<summary>
Receive http_client packets.
</summary>
@@ -31093,7 +25826,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33376">
+<interface name="corenet_dontaudit_receive_http_client_packets" lineno="26165">
<summary>
Do not audit attempts to receive http_client packets.
</summary>
@@ -31104,7 +25837,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_client_packets" lineno="33395">
+<interface name="corenet_sendrecv_http_client_packets" lineno="26184">
<summary>
Send and receive http_client packets.
</summary>
@@ -31115,7 +25848,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33411">
+<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="26200">
<summary>
Do not audit attempts to send and receive http_client packets.
</summary>
@@ -31126,7 +25859,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_client_packets" lineno="33426">
+<interface name="corenet_relabelto_http_client_packets" lineno="26215">
<summary>
Relabel packets to http_client the packet type.
</summary>
@@ -31136,7 +25869,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_server_packets" lineno="33446">
+<interface name="corenet_send_http_server_packets" lineno="26235">
<summary>
Send http_server packets.
</summary>
@@ -31147,7 +25880,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_server_packets" lineno="33465">
+<interface name="corenet_dontaudit_send_http_server_packets" lineno="26254">
<summary>
Do not audit attempts to send http_server packets.
</summary>
@@ -31158,7 +25891,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_server_packets" lineno="33484">
+<interface name="corenet_receive_http_server_packets" lineno="26273">
<summary>
Receive http_server packets.
</summary>
@@ -31169,7 +25902,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33503">
+<interface name="corenet_dontaudit_receive_http_server_packets" lineno="26292">
<summary>
Do not audit attempts to receive http_server packets.
</summary>
@@ -31180,7 +25913,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_server_packets" lineno="33522">
+<interface name="corenet_sendrecv_http_server_packets" lineno="26311">
<summary>
Send and receive http_server packets.
</summary>
@@ -31191,7 +25924,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33538">
+<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="26327">
<summary>
Do not audit attempts to send and receive http_server packets.
</summary>
@@ -31202,7 +25935,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_server_packets" lineno="33553">
+<interface name="corenet_relabelto_http_server_packets" lineno="26342">
<summary>
Relabel packets to http_server the packet type.
</summary>
@@ -31212,85 +25945,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33575">
-<summary>
-Send and receive TCP traffic on the http_cache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_http_cache_port" lineno="33590">
-<summary>
-Send UDP traffic on the http_cache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33605">
-<summary>
-Do not audit attempts to send UDP traffic on the http_cache port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_http_cache_port" lineno="33620">
-<summary>
-Receive UDP traffic on the http_cache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33635">
-<summary>
-Do not audit attempts to receive UDP traffic on the http_cache port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33650">
-<summary>
-Send and receive UDP traffic on the http_cache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33666">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the http_cache port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_http_cache_port" lineno="33681">
+<interface name="corenet_tcp_bind_http_cache_port" lineno="26364">
<summary>
Bind TCP sockets to the http_cache port.
</summary>
@@ -31301,7 +25956,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_http_cache_port" lineno="33701">
+<interface name="corenet_udp_bind_http_cache_port" lineno="26384">
<summary>
Bind UDP sockets to the http_cache port.
</summary>
@@ -31312,7 +25967,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_http_cache_port" lineno="33720">
+<interface name="corenet_tcp_connect_http_cache_port" lineno="26403">
<summary>
Make a TCP connection to the http_cache port.
</summary>
@@ -31322,7 +25977,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_cache_client_packets" lineno="33740">
+<interface name="corenet_send_http_cache_client_packets" lineno="26423">
<summary>
Send http_cache_client packets.
</summary>
@@ -31333,7 +25988,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33759">
+<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="26442">
<summary>
Do not audit attempts to send http_cache_client packets.
</summary>
@@ -31344,7 +25999,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_cache_client_packets" lineno="33778">
+<interface name="corenet_receive_http_cache_client_packets" lineno="26461">
<summary>
Receive http_cache_client packets.
</summary>
@@ -31355,7 +26010,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33797">
+<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="26480">
<summary>
Do not audit attempts to receive http_cache_client packets.
</summary>
@@ -31366,7 +26021,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33816">
+<interface name="corenet_sendrecv_http_cache_client_packets" lineno="26499">
<summary>
Send and receive http_cache_client packets.
</summary>
@@ -31377,7 +26032,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33832">
+<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="26515">
<summary>
Do not audit attempts to send and receive http_cache_client packets.
</summary>
@@ -31388,7 +26043,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_cache_client_packets" lineno="33847">
+<interface name="corenet_relabelto_http_cache_client_packets" lineno="26530">
<summary>
Relabel packets to http_cache_client the packet type.
</summary>
@@ -31398,7 +26053,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_cache_server_packets" lineno="33867">
+<interface name="corenet_send_http_cache_server_packets" lineno="26550">
<summary>
Send http_cache_server packets.
</summary>
@@ -31409,7 +26064,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33886">
+<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="26569">
<summary>
Do not audit attempts to send http_cache_server packets.
</summary>
@@ -31420,7 +26075,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_cache_server_packets" lineno="33905">
+<interface name="corenet_receive_http_cache_server_packets" lineno="26588">
<summary>
Receive http_cache_server packets.
</summary>
@@ -31431,7 +26086,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33924">
+<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="26607">
<summary>
Do not audit attempts to receive http_cache_server packets.
</summary>
@@ -31442,7 +26097,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33943">
+<interface name="corenet_sendrecv_http_cache_server_packets" lineno="26626">
<summary>
Send and receive http_cache_server packets.
</summary>
@@ -31453,7 +26108,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33959">
+<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="26642">
<summary>
Do not audit attempts to send and receive http_cache_server packets.
</summary>
@@ -31464,7 +26119,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_cache_server_packets" lineno="33974">
+<interface name="corenet_relabelto_http_cache_server_packets" lineno="26657">
<summary>
Relabel packets to http_cache_server the packet type.
</summary>
@@ -31474,85 +26129,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33996">
-<summary>
-Send and receive TCP traffic on the i18n_input port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_i18n_input_port" lineno="34011">
-<summary>
-Send UDP traffic on the i18n_input port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="34026">
-<summary>
-Do not audit attempts to send UDP traffic on the i18n_input port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_i18n_input_port" lineno="34041">
-<summary>
-Receive UDP traffic on the i18n_input port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="34056">
-<summary>
-Do not audit attempts to receive UDP traffic on the i18n_input port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="34071">
-<summary>
-Send and receive UDP traffic on the i18n_input port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="34087">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the i18n_input port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_i18n_input_port" lineno="34102">
+<interface name="corenet_tcp_bind_i18n_input_port" lineno="26679">
<summary>
Bind TCP sockets to the i18n_input port.
</summary>
@@ -31563,7 +26140,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_i18n_input_port" lineno="34122">
+<interface name="corenet_udp_bind_i18n_input_port" lineno="26699">
<summary>
Bind UDP sockets to the i18n_input port.
</summary>
@@ -31574,7 +26151,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_i18n_input_port" lineno="34141">
+<interface name="corenet_tcp_connect_i18n_input_port" lineno="26718">
<summary>
Make a TCP connection to the i18n_input port.
</summary>
@@ -31584,7 +26161,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_i18n_input_client_packets" lineno="34161">
+<interface name="corenet_send_i18n_input_client_packets" lineno="26738">
<summary>
Send i18n_input_client packets.
</summary>
@@ -31595,7 +26172,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34180">
+<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="26757">
<summary>
Do not audit attempts to send i18n_input_client packets.
</summary>
@@ -31606,7 +26183,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_i18n_input_client_packets" lineno="34199">
+<interface name="corenet_receive_i18n_input_client_packets" lineno="26776">
<summary>
Receive i18n_input_client packets.
</summary>
@@ -31617,7 +26194,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34218">
+<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="26795">
<summary>
Do not audit attempts to receive i18n_input_client packets.
</summary>
@@ -31628,7 +26205,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34237">
+<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="26814">
<summary>
Send and receive i18n_input_client packets.
</summary>
@@ -31639,7 +26216,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34253">
+<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="26830">
<summary>
Do not audit attempts to send and receive i18n_input_client packets.
</summary>
@@ -31650,7 +26227,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34268">
+<interface name="corenet_relabelto_i18n_input_client_packets" lineno="26845">
<summary>
Relabel packets to i18n_input_client the packet type.
</summary>
@@ -31660,7 +26237,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_i18n_input_server_packets" lineno="34288">
+<interface name="corenet_send_i18n_input_server_packets" lineno="26865">
<summary>
Send i18n_input_server packets.
</summary>
@@ -31671,7 +26248,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34307">
+<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="26884">
<summary>
Do not audit attempts to send i18n_input_server packets.
</summary>
@@ -31682,7 +26259,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_i18n_input_server_packets" lineno="34326">
+<interface name="corenet_receive_i18n_input_server_packets" lineno="26903">
<summary>
Receive i18n_input_server packets.
</summary>
@@ -31693,7 +26270,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34345">
+<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="26922">
<summary>
Do not audit attempts to receive i18n_input_server packets.
</summary>
@@ -31704,7 +26281,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34364">
+<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="26941">
<summary>
Send and receive i18n_input_server packets.
</summary>
@@ -31715,7 +26292,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34380">
+<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="26957">
<summary>
Do not audit attempts to send and receive i18n_input_server packets.
</summary>
@@ -31726,7 +26303,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34395">
+<interface name="corenet_relabelto_i18n_input_server_packets" lineno="26972">
<summary>
Relabel packets to i18n_input_server the packet type.
</summary>
@@ -31736,85 +26313,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34417">
-<summary>
-Send and receive TCP traffic on the imaze port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_imaze_port" lineno="34432">
-<summary>
-Send UDP traffic on the imaze port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34447">
-<summary>
-Do not audit attempts to send UDP traffic on the imaze port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_imaze_port" lineno="34462">
-<summary>
-Receive UDP traffic on the imaze port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34477">
-<summary>
-Do not audit attempts to receive UDP traffic on the imaze port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_imaze_port" lineno="34492">
-<summary>
-Send and receive UDP traffic on the imaze port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34508">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the imaze port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_imaze_port" lineno="34523">
+<interface name="corenet_tcp_bind_imaze_port" lineno="26994">
<summary>
Bind TCP sockets to the imaze port.
</summary>
@@ -31825,7 +26324,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_imaze_port" lineno="34543">
+<interface name="corenet_udp_bind_imaze_port" lineno="27014">
<summary>
Bind UDP sockets to the imaze port.
</summary>
@@ -31836,7 +26335,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_imaze_port" lineno="34562">
+<interface name="corenet_tcp_connect_imaze_port" lineno="27033">
<summary>
Make a TCP connection to the imaze port.
</summary>
@@ -31846,7 +26345,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_imaze_client_packets" lineno="34582">
+<interface name="corenet_send_imaze_client_packets" lineno="27053">
<summary>
Send imaze_client packets.
</summary>
@@ -31857,7 +26356,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34601">
+<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="27072">
<summary>
Do not audit attempts to send imaze_client packets.
</summary>
@@ -31868,7 +26367,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_imaze_client_packets" lineno="34620">
+<interface name="corenet_receive_imaze_client_packets" lineno="27091">
<summary>
Receive imaze_client packets.
</summary>
@@ -31879,7 +26378,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34639">
+<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="27110">
<summary>
Do not audit attempts to receive imaze_client packets.
</summary>
@@ -31890,7 +26389,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_imaze_client_packets" lineno="34658">
+<interface name="corenet_sendrecv_imaze_client_packets" lineno="27129">
<summary>
Send and receive imaze_client packets.
</summary>
@@ -31901,7 +26400,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34674">
+<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="27145">
<summary>
Do not audit attempts to send and receive imaze_client packets.
</summary>
@@ -31912,7 +26411,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_imaze_client_packets" lineno="34689">
+<interface name="corenet_relabelto_imaze_client_packets" lineno="27160">
<summary>
Relabel packets to imaze_client the packet type.
</summary>
@@ -31922,7 +26421,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_imaze_server_packets" lineno="34709">
+<interface name="corenet_send_imaze_server_packets" lineno="27180">
<summary>
Send imaze_server packets.
</summary>
@@ -31933,7 +26432,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34728">
+<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="27199">
<summary>
Do not audit attempts to send imaze_server packets.
</summary>
@@ -31944,7 +26443,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_imaze_server_packets" lineno="34747">
+<interface name="corenet_receive_imaze_server_packets" lineno="27218">
<summary>
Receive imaze_server packets.
</summary>
@@ -31955,7 +26454,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34766">
+<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="27237">
<summary>
Do not audit attempts to receive imaze_server packets.
</summary>
@@ -31966,7 +26465,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_imaze_server_packets" lineno="34785">
+<interface name="corenet_sendrecv_imaze_server_packets" lineno="27256">
<summary>
Send and receive imaze_server packets.
</summary>
@@ -31977,7 +26476,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34801">
+<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="27272">
<summary>
Do not audit attempts to send and receive imaze_server packets.
</summary>
@@ -31988,7 +26487,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_imaze_server_packets" lineno="34816">
+<interface name="corenet_relabelto_imaze_server_packets" lineno="27287">
<summary>
Relabel packets to imaze_server the packet type.
</summary>
@@ -31998,85 +26497,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34838">
-<summary>
-Send and receive TCP traffic on the inetd_child port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_inetd_child_port" lineno="34853">
-<summary>
-Send UDP traffic on the inetd_child port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34868">
-<summary>
-Do not audit attempts to send UDP traffic on the inetd_child port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_inetd_child_port" lineno="34883">
-<summary>
-Receive UDP traffic on the inetd_child port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34898">
-<summary>
-Do not audit attempts to receive UDP traffic on the inetd_child port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34913">
-<summary>
-Send and receive UDP traffic on the inetd_child port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34929">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the inetd_child port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_inetd_child_port" lineno="34944">
+<interface name="corenet_tcp_bind_inetd_child_port" lineno="27309">
<summary>
Bind TCP sockets to the inetd_child port.
</summary>
@@ -32087,7 +26508,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_inetd_child_port" lineno="34964">
+<interface name="corenet_udp_bind_inetd_child_port" lineno="27329">
<summary>
Bind UDP sockets to the inetd_child port.
</summary>
@@ -32098,7 +26519,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_inetd_child_port" lineno="34983">
+<interface name="corenet_tcp_connect_inetd_child_port" lineno="27348">
<summary>
Make a TCP connection to the inetd_child port.
</summary>
@@ -32108,7 +26529,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_inetd_child_client_packets" lineno="35003">
+<interface name="corenet_send_inetd_child_client_packets" lineno="27368">
<summary>
Send inetd_child_client packets.
</summary>
@@ -32119,7 +26540,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="35022">
+<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="27387">
<summary>
Do not audit attempts to send inetd_child_client packets.
</summary>
@@ -32130,7 +26551,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_inetd_child_client_packets" lineno="35041">
+<interface name="corenet_receive_inetd_child_client_packets" lineno="27406">
<summary>
Receive inetd_child_client packets.
</summary>
@@ -32141,7 +26562,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="35060">
+<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="27425">
<summary>
Do not audit attempts to receive inetd_child_client packets.
</summary>
@@ -32152,7 +26573,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="35079">
+<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="27444">
<summary>
Send and receive inetd_child_client packets.
</summary>
@@ -32163,7 +26584,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="35095">
+<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="27460">
<summary>
Do not audit attempts to send and receive inetd_child_client packets.
</summary>
@@ -32174,7 +26595,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_inetd_child_client_packets" lineno="35110">
+<interface name="corenet_relabelto_inetd_child_client_packets" lineno="27475">
<summary>
Relabel packets to inetd_child_client the packet type.
</summary>
@@ -32184,7 +26605,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_inetd_child_server_packets" lineno="35130">
+<interface name="corenet_send_inetd_child_server_packets" lineno="27495">
<summary>
Send inetd_child_server packets.
</summary>
@@ -32195,7 +26616,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35149">
+<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="27514">
<summary>
Do not audit attempts to send inetd_child_server packets.
</summary>
@@ -32206,7 +26627,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_inetd_child_server_packets" lineno="35168">
+<interface name="corenet_receive_inetd_child_server_packets" lineno="27533">
<summary>
Receive inetd_child_server packets.
</summary>
@@ -32217,7 +26638,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35187">
+<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="27552">
<summary>
Do not audit attempts to receive inetd_child_server packets.
</summary>
@@ -32228,7 +26649,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35206">
+<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="27571">
<summary>
Send and receive inetd_child_server packets.
</summary>
@@ -32239,7 +26660,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35222">
+<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="27587">
<summary>
Do not audit attempts to send and receive inetd_child_server packets.
</summary>
@@ -32250,7 +26671,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35237">
+<interface name="corenet_relabelto_inetd_child_server_packets" lineno="27602">
<summary>
Relabel packets to inetd_child_server the packet type.
</summary>
@@ -32260,85 +26681,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_innd_port" lineno="35259">
-<summary>
-Send and receive TCP traffic on the innd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_innd_port" lineno="35274">
-<summary>
-Send UDP traffic on the innd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35289">
-<summary>
-Do not audit attempts to send UDP traffic on the innd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_innd_port" lineno="35304">
-<summary>
-Receive UDP traffic on the innd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35319">
-<summary>
-Do not audit attempts to receive UDP traffic on the innd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_innd_port" lineno="35334">
-<summary>
-Send and receive UDP traffic on the innd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35350">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the innd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_innd_port" lineno="35365">
+<interface name="corenet_tcp_bind_innd_port" lineno="27624">
<summary>
Bind TCP sockets to the innd port.
</summary>
@@ -32349,7 +26692,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_innd_port" lineno="35385">
+<interface name="corenet_udp_bind_innd_port" lineno="27644">
<summary>
Bind UDP sockets to the innd port.
</summary>
@@ -32360,7 +26703,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_innd_port" lineno="35404">
+<interface name="corenet_tcp_connect_innd_port" lineno="27663">
<summary>
Make a TCP connection to the innd port.
</summary>
@@ -32370,7 +26713,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_innd_client_packets" lineno="35424">
+<interface name="corenet_send_innd_client_packets" lineno="27683">
<summary>
Send innd_client packets.
</summary>
@@ -32381,7 +26724,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35443">
+<interface name="corenet_dontaudit_send_innd_client_packets" lineno="27702">
<summary>
Do not audit attempts to send innd_client packets.
</summary>
@@ -32392,7 +26735,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_innd_client_packets" lineno="35462">
+<interface name="corenet_receive_innd_client_packets" lineno="27721">
<summary>
Receive innd_client packets.
</summary>
@@ -32403,7 +26746,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35481">
+<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="27740">
<summary>
Do not audit attempts to receive innd_client packets.
</summary>
@@ -32414,7 +26757,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_innd_client_packets" lineno="35500">
+<interface name="corenet_sendrecv_innd_client_packets" lineno="27759">
<summary>
Send and receive innd_client packets.
</summary>
@@ -32425,7 +26768,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35516">
+<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="27775">
<summary>
Do not audit attempts to send and receive innd_client packets.
</summary>
@@ -32436,7 +26779,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_innd_client_packets" lineno="35531">
+<interface name="corenet_relabelto_innd_client_packets" lineno="27790">
<summary>
Relabel packets to innd_client the packet type.
</summary>
@@ -32446,7 +26789,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_innd_server_packets" lineno="35551">
+<interface name="corenet_send_innd_server_packets" lineno="27810">
<summary>
Send innd_server packets.
</summary>
@@ -32457,7 +26800,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35570">
+<interface name="corenet_dontaudit_send_innd_server_packets" lineno="27829">
<summary>
Do not audit attempts to send innd_server packets.
</summary>
@@ -32468,7 +26811,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_innd_server_packets" lineno="35589">
+<interface name="corenet_receive_innd_server_packets" lineno="27848">
<summary>
Receive innd_server packets.
</summary>
@@ -32479,7 +26822,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35608">
+<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="27867">
<summary>
Do not audit attempts to receive innd_server packets.
</summary>
@@ -32490,7 +26833,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_innd_server_packets" lineno="35627">
+<interface name="corenet_sendrecv_innd_server_packets" lineno="27886">
<summary>
Send and receive innd_server packets.
</summary>
@@ -32501,7 +26844,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35643">
+<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="27902">
<summary>
Do not audit attempts to send and receive innd_server packets.
</summary>
@@ -32512,7 +26855,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_innd_server_packets" lineno="35658">
+<interface name="corenet_relabelto_innd_server_packets" lineno="27917">
<summary>
Relabel packets to innd_server the packet type.
</summary>
@@ -32522,85 +26865,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35680">
-<summary>
-Send and receive TCP traffic on the interwise port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_interwise_port" lineno="35695">
-<summary>
-Send UDP traffic on the interwise port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35710">
-<summary>
-Do not audit attempts to send UDP traffic on the interwise port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_interwise_port" lineno="35725">
-<summary>
-Receive UDP traffic on the interwise port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35740">
-<summary>
-Do not audit attempts to receive UDP traffic on the interwise port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_interwise_port" lineno="35755">
-<summary>
-Send and receive UDP traffic on the interwise port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35771">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the interwise port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_interwise_port" lineno="35786">
+<interface name="corenet_tcp_bind_interwise_port" lineno="27939">
<summary>
Bind TCP sockets to the interwise port.
</summary>
@@ -32611,7 +26876,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_interwise_port" lineno="35806">
+<interface name="corenet_udp_bind_interwise_port" lineno="27959">
<summary>
Bind UDP sockets to the interwise port.
</summary>
@@ -32622,7 +26887,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_interwise_port" lineno="35825">
+<interface name="corenet_tcp_connect_interwise_port" lineno="27978">
<summary>
Make a TCP connection to the interwise port.
</summary>
@@ -32632,7 +26897,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_interwise_client_packets" lineno="35845">
+<interface name="corenet_send_interwise_client_packets" lineno="27998">
<summary>
Send interwise_client packets.
</summary>
@@ -32643,7 +26908,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35864">
+<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="28017">
<summary>
Do not audit attempts to send interwise_client packets.
</summary>
@@ -32654,7 +26919,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_interwise_client_packets" lineno="35883">
+<interface name="corenet_receive_interwise_client_packets" lineno="28036">
<summary>
Receive interwise_client packets.
</summary>
@@ -32665,7 +26930,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35902">
+<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="28055">
<summary>
Do not audit attempts to receive interwise_client packets.
</summary>
@@ -32676,7 +26941,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_interwise_client_packets" lineno="35921">
+<interface name="corenet_sendrecv_interwise_client_packets" lineno="28074">
<summary>
Send and receive interwise_client packets.
</summary>
@@ -32687,7 +26952,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35937">
+<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="28090">
<summary>
Do not audit attempts to send and receive interwise_client packets.
</summary>
@@ -32698,7 +26963,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_interwise_client_packets" lineno="35952">
+<interface name="corenet_relabelto_interwise_client_packets" lineno="28105">
<summary>
Relabel packets to interwise_client the packet type.
</summary>
@@ -32708,7 +26973,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_interwise_server_packets" lineno="35972">
+<interface name="corenet_send_interwise_server_packets" lineno="28125">
<summary>
Send interwise_server packets.
</summary>
@@ -32719,7 +26984,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35991">
+<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="28144">
<summary>
Do not audit attempts to send interwise_server packets.
</summary>
@@ -32730,7 +26995,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_interwise_server_packets" lineno="36010">
+<interface name="corenet_receive_interwise_server_packets" lineno="28163">
<summary>
Receive interwise_server packets.
</summary>
@@ -32741,7 +27006,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="36029">
+<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="28182">
<summary>
Do not audit attempts to receive interwise_server packets.
</summary>
@@ -32752,7 +27017,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_interwise_server_packets" lineno="36048">
+<interface name="corenet_sendrecv_interwise_server_packets" lineno="28201">
<summary>
Send and receive interwise_server packets.
</summary>
@@ -32763,7 +27028,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="36064">
+<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="28217">
<summary>
Do not audit attempts to send and receive interwise_server packets.
</summary>
@@ -32774,7 +27039,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_interwise_server_packets" lineno="36079">
+<interface name="corenet_relabelto_interwise_server_packets" lineno="28232">
<summary>
Relabel packets to interwise_server the packet type.
</summary>
@@ -32784,85 +27049,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="36101">
-<summary>
-Send and receive TCP traffic on the ionixnetmon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ionixnetmon_port" lineno="36116">
-<summary>
-Send UDP traffic on the ionixnetmon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="36131">
-<summary>
-Do not audit attempts to send UDP traffic on the ionixnetmon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36146">
-<summary>
-Receive UDP traffic on the ionixnetmon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36161">
-<summary>
-Do not audit attempts to receive UDP traffic on the ionixnetmon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36176">
-<summary>
-Send and receive UDP traffic on the ionixnetmon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36192">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ionixnetmon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36207">
+<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="28254">
<summary>
Bind TCP sockets to the ionixnetmon port.
</summary>
@@ -32873,7 +27060,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36227">
+<interface name="corenet_udp_bind_ionixnetmon_port" lineno="28274">
<summary>
Bind UDP sockets to the ionixnetmon port.
</summary>
@@ -32884,7 +27071,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36246">
+<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="28293">
<summary>
Make a TCP connection to the ionixnetmon port.
</summary>
@@ -32894,7 +27081,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ionixnetmon_client_packets" lineno="36266">
+<interface name="corenet_send_ionixnetmon_client_packets" lineno="28313">
<summary>
Send ionixnetmon_client packets.
</summary>
@@ -32905,7 +27092,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36285">
+<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="28332">
<summary>
Do not audit attempts to send ionixnetmon_client packets.
</summary>
@@ -32916,7 +27103,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36304">
+<interface name="corenet_receive_ionixnetmon_client_packets" lineno="28351">
<summary>
Receive ionixnetmon_client packets.
</summary>
@@ -32927,7 +27114,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36323">
+<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="28370">
<summary>
Do not audit attempts to receive ionixnetmon_client packets.
</summary>
@@ -32938,7 +27125,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36342">
+<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="28389">
<summary>
Send and receive ionixnetmon_client packets.
</summary>
@@ -32949,7 +27136,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36358">
+<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="28405">
<summary>
Do not audit attempts to send and receive ionixnetmon_client packets.
</summary>
@@ -32960,7 +27147,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36373">
+<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="28420">
<summary>
Relabel packets to ionixnetmon_client the packet type.
</summary>
@@ -32970,7 +27157,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ionixnetmon_server_packets" lineno="36393">
+<interface name="corenet_send_ionixnetmon_server_packets" lineno="28440">
<summary>
Send ionixnetmon_server packets.
</summary>
@@ -32981,7 +27168,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36412">
+<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="28459">
<summary>
Do not audit attempts to send ionixnetmon_server packets.
</summary>
@@ -32992,7 +27179,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36431">
+<interface name="corenet_receive_ionixnetmon_server_packets" lineno="28478">
<summary>
Receive ionixnetmon_server packets.
</summary>
@@ -33003,7 +27190,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36450">
+<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="28497">
<summary>
Do not audit attempts to receive ionixnetmon_server packets.
</summary>
@@ -33014,7 +27201,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36469">
+<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="28516">
<summary>
Send and receive ionixnetmon_server packets.
</summary>
@@ -33025,7 +27212,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36485">
+<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="28532">
<summary>
Do not audit attempts to send and receive ionixnetmon_server packets.
</summary>
@@ -33036,7 +27223,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36500">
+<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="28547">
<summary>
Relabel packets to ionixnetmon_server the packet type.
</summary>
@@ -33046,85 +27233,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36522">
-<summary>
-Send and receive TCP traffic on the ipmi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ipmi_port" lineno="36537">
-<summary>
-Send UDP traffic on the ipmi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36552">
-<summary>
-Do not audit attempts to send UDP traffic on the ipmi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ipmi_port" lineno="36567">
-<summary>
-Receive UDP traffic on the ipmi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36582">
-<summary>
-Do not audit attempts to receive UDP traffic on the ipmi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36597">
-<summary>
-Send and receive UDP traffic on the ipmi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36613">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ipmi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ipmi_port" lineno="36628">
+<interface name="corenet_tcp_bind_ipmi_port" lineno="28569">
<summary>
Bind TCP sockets to the ipmi port.
</summary>
@@ -33135,7 +27244,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ipmi_port" lineno="36648">
+<interface name="corenet_udp_bind_ipmi_port" lineno="28589">
<summary>
Bind UDP sockets to the ipmi port.
</summary>
@@ -33146,7 +27255,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ipmi_port" lineno="36667">
+<interface name="corenet_tcp_connect_ipmi_port" lineno="28608">
<summary>
Make a TCP connection to the ipmi port.
</summary>
@@ -33156,7 +27265,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipmi_client_packets" lineno="36687">
+<interface name="corenet_send_ipmi_client_packets" lineno="28628">
<summary>
Send ipmi_client packets.
</summary>
@@ -33167,7 +27276,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36706">
+<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="28647">
<summary>
Do not audit attempts to send ipmi_client packets.
</summary>
@@ -33178,7 +27287,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipmi_client_packets" lineno="36725">
+<interface name="corenet_receive_ipmi_client_packets" lineno="28666">
<summary>
Receive ipmi_client packets.
</summary>
@@ -33189,7 +27298,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36744">
+<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="28685">
<summary>
Do not audit attempts to receive ipmi_client packets.
</summary>
@@ -33200,7 +27309,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36763">
+<interface name="corenet_sendrecv_ipmi_client_packets" lineno="28704">
<summary>
Send and receive ipmi_client packets.
</summary>
@@ -33211,7 +27320,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36779">
+<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="28720">
<summary>
Do not audit attempts to send and receive ipmi_client packets.
</summary>
@@ -33222,7 +27331,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipmi_client_packets" lineno="36794">
+<interface name="corenet_relabelto_ipmi_client_packets" lineno="28735">
<summary>
Relabel packets to ipmi_client the packet type.
</summary>
@@ -33232,7 +27341,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipmi_server_packets" lineno="36814">
+<interface name="corenet_send_ipmi_server_packets" lineno="28755">
<summary>
Send ipmi_server packets.
</summary>
@@ -33243,7 +27352,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36833">
+<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="28774">
<summary>
Do not audit attempts to send ipmi_server packets.
</summary>
@@ -33254,7 +27363,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipmi_server_packets" lineno="36852">
+<interface name="corenet_receive_ipmi_server_packets" lineno="28793">
<summary>
Receive ipmi_server packets.
</summary>
@@ -33265,7 +27374,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36871">
+<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="28812">
<summary>
Do not audit attempts to receive ipmi_server packets.
</summary>
@@ -33276,7 +27385,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36890">
+<interface name="corenet_sendrecv_ipmi_server_packets" lineno="28831">
<summary>
Send and receive ipmi_server packets.
</summary>
@@ -33287,7 +27396,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36906">
+<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="28847">
<summary>
Do not audit attempts to send and receive ipmi_server packets.
</summary>
@@ -33298,7 +27407,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipmi_server_packets" lineno="36921">
+<interface name="corenet_relabelto_ipmi_server_packets" lineno="28862">
<summary>
Relabel packets to ipmi_server the packet type.
</summary>
@@ -33308,85 +27417,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36943">
-<summary>
-Send and receive TCP traffic on the ipp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ipp_port" lineno="36958">
-<summary>
-Send UDP traffic on the ipp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36973">
-<summary>
-Do not audit attempts to send UDP traffic on the ipp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ipp_port" lineno="36988">
-<summary>
-Receive UDP traffic on the ipp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="37003">
-<summary>
-Do not audit attempts to receive UDP traffic on the ipp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ipp_port" lineno="37018">
-<summary>
-Send and receive UDP traffic on the ipp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="37034">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ipp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ipp_port" lineno="37049">
+<interface name="corenet_tcp_bind_ipp_port" lineno="28884">
<summary>
Bind TCP sockets to the ipp port.
</summary>
@@ -33397,7 +27428,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ipp_port" lineno="37069">
+<interface name="corenet_udp_bind_ipp_port" lineno="28904">
<summary>
Bind UDP sockets to the ipp port.
</summary>
@@ -33408,7 +27439,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ipp_port" lineno="37088">
+<interface name="corenet_tcp_connect_ipp_port" lineno="28923">
<summary>
Make a TCP connection to the ipp port.
</summary>
@@ -33418,7 +27449,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipp_client_packets" lineno="37108">
+<interface name="corenet_send_ipp_client_packets" lineno="28943">
<summary>
Send ipp_client packets.
</summary>
@@ -33429,7 +27460,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="37127">
+<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="28962">
<summary>
Do not audit attempts to send ipp_client packets.
</summary>
@@ -33440,7 +27471,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipp_client_packets" lineno="37146">
+<interface name="corenet_receive_ipp_client_packets" lineno="28981">
<summary>
Receive ipp_client packets.
</summary>
@@ -33451,7 +27482,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37165">
+<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="29000">
<summary>
Do not audit attempts to receive ipp_client packets.
</summary>
@@ -33462,7 +27493,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipp_client_packets" lineno="37184">
+<interface name="corenet_sendrecv_ipp_client_packets" lineno="29019">
<summary>
Send and receive ipp_client packets.
</summary>
@@ -33473,7 +27504,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37200">
+<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="29035">
<summary>
Do not audit attempts to send and receive ipp_client packets.
</summary>
@@ -33484,7 +27515,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipp_client_packets" lineno="37215">
+<interface name="corenet_relabelto_ipp_client_packets" lineno="29050">
<summary>
Relabel packets to ipp_client the packet type.
</summary>
@@ -33494,7 +27525,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipp_server_packets" lineno="37235">
+<interface name="corenet_send_ipp_server_packets" lineno="29070">
<summary>
Send ipp_server packets.
</summary>
@@ -33505,7 +27536,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37254">
+<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="29089">
<summary>
Do not audit attempts to send ipp_server packets.
</summary>
@@ -33516,7 +27547,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipp_server_packets" lineno="37273">
+<interface name="corenet_receive_ipp_server_packets" lineno="29108">
<summary>
Receive ipp_server packets.
</summary>
@@ -33527,7 +27558,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37292">
+<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="29127">
<summary>
Do not audit attempts to receive ipp_server packets.
</summary>
@@ -33538,7 +27569,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipp_server_packets" lineno="37311">
+<interface name="corenet_sendrecv_ipp_server_packets" lineno="29146">
<summary>
Send and receive ipp_server packets.
</summary>
@@ -33549,7 +27580,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37327">
+<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="29162">
<summary>
Do not audit attempts to send and receive ipp_server packets.
</summary>
@@ -33560,7 +27591,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipp_server_packets" lineno="37342">
+<interface name="corenet_relabelto_ipp_server_packets" lineno="29177">
<summary>
Relabel packets to ipp_server the packet type.
</summary>
@@ -33570,85 +27601,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37364">
-<summary>
-Send and receive TCP traffic on the ipsecnat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ipsecnat_port" lineno="37379">
-<summary>
-Send UDP traffic on the ipsecnat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37394">
-<summary>
-Do not audit attempts to send UDP traffic on the ipsecnat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ipsecnat_port" lineno="37409">
-<summary>
-Receive UDP traffic on the ipsecnat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37424">
-<summary>
-Do not audit attempts to receive UDP traffic on the ipsecnat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37439">
-<summary>
-Send and receive UDP traffic on the ipsecnat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37455">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ipsecnat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37470">
+<interface name="corenet_tcp_bind_ipsecnat_port" lineno="29199">
<summary>
Bind TCP sockets to the ipsecnat port.
</summary>
@@ -33659,7 +27612,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ipsecnat_port" lineno="37490">
+<interface name="corenet_udp_bind_ipsecnat_port" lineno="29219">
<summary>
Bind UDP sockets to the ipsecnat port.
</summary>
@@ -33670,7 +27623,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37509">
+<interface name="corenet_tcp_connect_ipsecnat_port" lineno="29238">
<summary>
Make a TCP connection to the ipsecnat port.
</summary>
@@ -33680,7 +27633,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipsecnat_client_packets" lineno="37529">
+<interface name="corenet_send_ipsecnat_client_packets" lineno="29258">
<summary>
Send ipsecnat_client packets.
</summary>
@@ -33691,7 +27644,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37548">
+<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="29277">
<summary>
Do not audit attempts to send ipsecnat_client packets.
</summary>
@@ -33702,7 +27655,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipsecnat_client_packets" lineno="37567">
+<interface name="corenet_receive_ipsecnat_client_packets" lineno="29296">
<summary>
Receive ipsecnat_client packets.
</summary>
@@ -33713,7 +27666,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37586">
+<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="29315">
<summary>
Do not audit attempts to receive ipsecnat_client packets.
</summary>
@@ -33724,7 +27677,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37605">
+<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="29334">
<summary>
Send and receive ipsecnat_client packets.
</summary>
@@ -33735,7 +27688,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37621">
+<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="29350">
<summary>
Do not audit attempts to send and receive ipsecnat_client packets.
</summary>
@@ -33746,7 +27699,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37636">
+<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="29365">
<summary>
Relabel packets to ipsecnat_client the packet type.
</summary>
@@ -33756,7 +27709,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipsecnat_server_packets" lineno="37656">
+<interface name="corenet_send_ipsecnat_server_packets" lineno="29385">
<summary>
Send ipsecnat_server packets.
</summary>
@@ -33767,7 +27720,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37675">
+<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="29404">
<summary>
Do not audit attempts to send ipsecnat_server packets.
</summary>
@@ -33778,7 +27731,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipsecnat_server_packets" lineno="37694">
+<interface name="corenet_receive_ipsecnat_server_packets" lineno="29423">
<summary>
Receive ipsecnat_server packets.
</summary>
@@ -33789,7 +27742,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37713">
+<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="29442">
<summary>
Do not audit attempts to receive ipsecnat_server packets.
</summary>
@@ -33800,7 +27753,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37732">
+<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="29461">
<summary>
Send and receive ipsecnat_server packets.
</summary>
@@ -33811,7 +27764,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37748">
+<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="29477">
<summary>
Do not audit attempts to send and receive ipsecnat_server packets.
</summary>
@@ -33822,7 +27775,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37763">
+<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="29492">
<summary>
Relabel packets to ipsecnat_server the packet type.
</summary>
@@ -33832,85 +27785,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37785">
-<summary>
-Send and receive TCP traffic on the ircd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ircd_port" lineno="37800">
-<summary>
-Send UDP traffic on the ircd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37815">
-<summary>
-Do not audit attempts to send UDP traffic on the ircd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ircd_port" lineno="37830">
-<summary>
-Receive UDP traffic on the ircd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37845">
-<summary>
-Do not audit attempts to receive UDP traffic on the ircd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ircd_port" lineno="37860">
-<summary>
-Send and receive UDP traffic on the ircd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37876">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ircd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ircd_port" lineno="37891">
+<interface name="corenet_tcp_bind_ircd_port" lineno="29514">
<summary>
Bind TCP sockets to the ircd port.
</summary>
@@ -33921,7 +27796,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ircd_port" lineno="37911">
+<interface name="corenet_udp_bind_ircd_port" lineno="29534">
<summary>
Bind UDP sockets to the ircd port.
</summary>
@@ -33932,7 +27807,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ircd_port" lineno="37930">
+<interface name="corenet_tcp_connect_ircd_port" lineno="29553">
<summary>
Make a TCP connection to the ircd port.
</summary>
@@ -33942,7 +27817,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ircd_client_packets" lineno="37950">
+<interface name="corenet_send_ircd_client_packets" lineno="29573">
<summary>
Send ircd_client packets.
</summary>
@@ -33953,7 +27828,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37969">
+<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="29592">
<summary>
Do not audit attempts to send ircd_client packets.
</summary>
@@ -33964,7 +27839,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ircd_client_packets" lineno="37988">
+<interface name="corenet_receive_ircd_client_packets" lineno="29611">
<summary>
Receive ircd_client packets.
</summary>
@@ -33975,7 +27850,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="38007">
+<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="29630">
<summary>
Do not audit attempts to receive ircd_client packets.
</summary>
@@ -33986,7 +27861,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ircd_client_packets" lineno="38026">
+<interface name="corenet_sendrecv_ircd_client_packets" lineno="29649">
<summary>
Send and receive ircd_client packets.
</summary>
@@ -33997,7 +27872,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="38042">
+<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="29665">
<summary>
Do not audit attempts to send and receive ircd_client packets.
</summary>
@@ -34008,7 +27883,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ircd_client_packets" lineno="38057">
+<interface name="corenet_relabelto_ircd_client_packets" lineno="29680">
<summary>
Relabel packets to ircd_client the packet type.
</summary>
@@ -34018,7 +27893,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ircd_server_packets" lineno="38077">
+<interface name="corenet_send_ircd_server_packets" lineno="29700">
<summary>
Send ircd_server packets.
</summary>
@@ -34029,7 +27904,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="38096">
+<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="29719">
<summary>
Do not audit attempts to send ircd_server packets.
</summary>
@@ -34040,7 +27915,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ircd_server_packets" lineno="38115">
+<interface name="corenet_receive_ircd_server_packets" lineno="29738">
<summary>
Receive ircd_server packets.
</summary>
@@ -34051,7 +27926,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="38134">
+<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="29757">
<summary>
Do not audit attempts to receive ircd_server packets.
</summary>
@@ -34062,7 +27937,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ircd_server_packets" lineno="38153">
+<interface name="corenet_sendrecv_ircd_server_packets" lineno="29776">
<summary>
Send and receive ircd_server packets.
</summary>
@@ -34073,7 +27948,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38169">
+<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="29792">
<summary>
Do not audit attempts to send and receive ircd_server packets.
</summary>
@@ -34084,7 +27959,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ircd_server_packets" lineno="38184">
+<interface name="corenet_relabelto_ircd_server_packets" lineno="29807">
<summary>
Relabel packets to ircd_server the packet type.
</summary>
@@ -34094,85 +27969,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38206">
-<summary>
-Send and receive TCP traffic on the isakmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_isakmp_port" lineno="38221">
-<summary>
-Send UDP traffic on the isakmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38236">
-<summary>
-Do not audit attempts to send UDP traffic on the isakmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_isakmp_port" lineno="38251">
-<summary>
-Receive UDP traffic on the isakmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38266">
-<summary>
-Do not audit attempts to receive UDP traffic on the isakmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38281">
-<summary>
-Send and receive UDP traffic on the isakmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38297">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the isakmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_isakmp_port" lineno="38312">
+<interface name="corenet_tcp_bind_isakmp_port" lineno="29829">
<summary>
Bind TCP sockets to the isakmp port.
</summary>
@@ -34183,7 +27980,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_isakmp_port" lineno="38332">
+<interface name="corenet_udp_bind_isakmp_port" lineno="29849">
<summary>
Bind UDP sockets to the isakmp port.
</summary>
@@ -34194,7 +27991,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_isakmp_port" lineno="38351">
+<interface name="corenet_tcp_connect_isakmp_port" lineno="29868">
<summary>
Make a TCP connection to the isakmp port.
</summary>
@@ -34204,7 +28001,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isakmp_client_packets" lineno="38371">
+<interface name="corenet_send_isakmp_client_packets" lineno="29888">
<summary>
Send isakmp_client packets.
</summary>
@@ -34215,7 +28012,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38390">
+<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="29907">
<summary>
Do not audit attempts to send isakmp_client packets.
</summary>
@@ -34226,7 +28023,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isakmp_client_packets" lineno="38409">
+<interface name="corenet_receive_isakmp_client_packets" lineno="29926">
<summary>
Receive isakmp_client packets.
</summary>
@@ -34237,7 +28034,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38428">
+<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="29945">
<summary>
Do not audit attempts to receive isakmp_client packets.
</summary>
@@ -34248,7 +28045,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38447">
+<interface name="corenet_sendrecv_isakmp_client_packets" lineno="29964">
<summary>
Send and receive isakmp_client packets.
</summary>
@@ -34259,7 +28056,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38463">
+<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="29980">
<summary>
Do not audit attempts to send and receive isakmp_client packets.
</summary>
@@ -34270,7 +28067,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isakmp_client_packets" lineno="38478">
+<interface name="corenet_relabelto_isakmp_client_packets" lineno="29995">
<summary>
Relabel packets to isakmp_client the packet type.
</summary>
@@ -34280,7 +28077,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isakmp_server_packets" lineno="38498">
+<interface name="corenet_send_isakmp_server_packets" lineno="30015">
<summary>
Send isakmp_server packets.
</summary>
@@ -34291,7 +28088,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38517">
+<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="30034">
<summary>
Do not audit attempts to send isakmp_server packets.
</summary>
@@ -34302,7 +28099,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isakmp_server_packets" lineno="38536">
+<interface name="corenet_receive_isakmp_server_packets" lineno="30053">
<summary>
Receive isakmp_server packets.
</summary>
@@ -34313,7 +28110,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38555">
+<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="30072">
<summary>
Do not audit attempts to receive isakmp_server packets.
</summary>
@@ -34324,7 +28121,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38574">
+<interface name="corenet_sendrecv_isakmp_server_packets" lineno="30091">
<summary>
Send and receive isakmp_server packets.
</summary>
@@ -34335,7 +28132,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38590">
+<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="30107">
<summary>
Do not audit attempts to send and receive isakmp_server packets.
</summary>
@@ -34346,7 +28143,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isakmp_server_packets" lineno="38605">
+<interface name="corenet_relabelto_isakmp_server_packets" lineno="30122">
<summary>
Relabel packets to isakmp_server the packet type.
</summary>
@@ -34356,85 +28153,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38627">
-<summary>
-Send and receive TCP traffic on the iscsi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_iscsi_port" lineno="38642">
-<summary>
-Send UDP traffic on the iscsi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38657">
-<summary>
-Do not audit attempts to send UDP traffic on the iscsi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_iscsi_port" lineno="38672">
-<summary>
-Receive UDP traffic on the iscsi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38687">
-<summary>
-Do not audit attempts to receive UDP traffic on the iscsi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38702">
-<summary>
-Send and receive UDP traffic on the iscsi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38718">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the iscsi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_iscsi_port" lineno="38733">
+<interface name="corenet_tcp_bind_iscsi_port" lineno="30144">
<summary>
Bind TCP sockets to the iscsi port.
</summary>
@@ -34445,7 +28164,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_iscsi_port" lineno="38753">
+<interface name="corenet_udp_bind_iscsi_port" lineno="30164">
<summary>
Bind UDP sockets to the iscsi port.
</summary>
@@ -34456,7 +28175,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_iscsi_port" lineno="38772">
+<interface name="corenet_tcp_connect_iscsi_port" lineno="30183">
<summary>
Make a TCP connection to the iscsi port.
</summary>
@@ -34466,7 +28185,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_iscsi_client_packets" lineno="38792">
+<interface name="corenet_send_iscsi_client_packets" lineno="30203">
<summary>
Send iscsi_client packets.
</summary>
@@ -34477,7 +28196,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38811">
+<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="30222">
<summary>
Do not audit attempts to send iscsi_client packets.
</summary>
@@ -34488,7 +28207,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_iscsi_client_packets" lineno="38830">
+<interface name="corenet_receive_iscsi_client_packets" lineno="30241">
<summary>
Receive iscsi_client packets.
</summary>
@@ -34499,7 +28218,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38849">
+<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="30260">
<summary>
Do not audit attempts to receive iscsi_client packets.
</summary>
@@ -34510,7 +28229,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38868">
+<interface name="corenet_sendrecv_iscsi_client_packets" lineno="30279">
<summary>
Send and receive iscsi_client packets.
</summary>
@@ -34521,7 +28240,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38884">
+<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="30295">
<summary>
Do not audit attempts to send and receive iscsi_client packets.
</summary>
@@ -34532,7 +28251,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_iscsi_client_packets" lineno="38899">
+<interface name="corenet_relabelto_iscsi_client_packets" lineno="30310">
<summary>
Relabel packets to iscsi_client the packet type.
</summary>
@@ -34542,7 +28261,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_iscsi_server_packets" lineno="38919">
+<interface name="corenet_send_iscsi_server_packets" lineno="30330">
<summary>
Send iscsi_server packets.
</summary>
@@ -34553,7 +28272,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38938">
+<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="30349">
<summary>
Do not audit attempts to send iscsi_server packets.
</summary>
@@ -34564,7 +28283,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_iscsi_server_packets" lineno="38957">
+<interface name="corenet_receive_iscsi_server_packets" lineno="30368">
<summary>
Receive iscsi_server packets.
</summary>
@@ -34575,7 +28294,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38976">
+<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="30387">
<summary>
Do not audit attempts to receive iscsi_server packets.
</summary>
@@ -34586,7 +28305,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38995">
+<interface name="corenet_sendrecv_iscsi_server_packets" lineno="30406">
<summary>
Send and receive iscsi_server packets.
</summary>
@@ -34597,7 +28316,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="39011">
+<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="30422">
<summary>
Do not audit attempts to send and receive iscsi_server packets.
</summary>
@@ -34608,7 +28327,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_iscsi_server_packets" lineno="39026">
+<interface name="corenet_relabelto_iscsi_server_packets" lineno="30437">
<summary>
Relabel packets to iscsi_server the packet type.
</summary>
@@ -34618,85 +28337,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_isns_port" lineno="39048">
-<summary>
-Send and receive TCP traffic on the isns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_isns_port" lineno="39063">
-<summary>
-Send UDP traffic on the isns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_isns_port" lineno="39078">
-<summary>
-Do not audit attempts to send UDP traffic on the isns port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_isns_port" lineno="39093">
-<summary>
-Receive UDP traffic on the isns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="39108">
-<summary>
-Do not audit attempts to receive UDP traffic on the isns port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_isns_port" lineno="39123">
-<summary>
-Send and receive UDP traffic on the isns port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="39139">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the isns port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_isns_port" lineno="39154">
+<interface name="corenet_tcp_bind_isns_port" lineno="30459">
<summary>
Bind TCP sockets to the isns port.
</summary>
@@ -34707,7 +28348,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_isns_port" lineno="39174">
+<interface name="corenet_udp_bind_isns_port" lineno="30479">
<summary>
Bind UDP sockets to the isns port.
</summary>
@@ -34718,7 +28359,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_isns_port" lineno="39193">
+<interface name="corenet_tcp_connect_isns_port" lineno="30498">
<summary>
Make a TCP connection to the isns port.
</summary>
@@ -34728,7 +28369,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isns_client_packets" lineno="39213">
+<interface name="corenet_send_isns_client_packets" lineno="30518">
<summary>
Send isns_client packets.
</summary>
@@ -34739,7 +28380,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39232">
+<interface name="corenet_dontaudit_send_isns_client_packets" lineno="30537">
<summary>
Do not audit attempts to send isns_client packets.
</summary>
@@ -34750,7 +28391,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isns_client_packets" lineno="39251">
+<interface name="corenet_receive_isns_client_packets" lineno="30556">
<summary>
Receive isns_client packets.
</summary>
@@ -34761,7 +28402,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39270">
+<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="30575">
<summary>
Do not audit attempts to receive isns_client packets.
</summary>
@@ -34772,7 +28413,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isns_client_packets" lineno="39289">
+<interface name="corenet_sendrecv_isns_client_packets" lineno="30594">
<summary>
Send and receive isns_client packets.
</summary>
@@ -34783,7 +28424,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39305">
+<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="30610">
<summary>
Do not audit attempts to send and receive isns_client packets.
</summary>
@@ -34794,7 +28435,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isns_client_packets" lineno="39320">
+<interface name="corenet_relabelto_isns_client_packets" lineno="30625">
<summary>
Relabel packets to isns_client the packet type.
</summary>
@@ -34804,7 +28445,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isns_server_packets" lineno="39340">
+<interface name="corenet_send_isns_server_packets" lineno="30645">
<summary>
Send isns_server packets.
</summary>
@@ -34815,7 +28456,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39359">
+<interface name="corenet_dontaudit_send_isns_server_packets" lineno="30664">
<summary>
Do not audit attempts to send isns_server packets.
</summary>
@@ -34826,7 +28467,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isns_server_packets" lineno="39378">
+<interface name="corenet_receive_isns_server_packets" lineno="30683">
<summary>
Receive isns_server packets.
</summary>
@@ -34837,7 +28478,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39397">
+<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="30702">
<summary>
Do not audit attempts to receive isns_server packets.
</summary>
@@ -34848,7 +28489,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isns_server_packets" lineno="39416">
+<interface name="corenet_sendrecv_isns_server_packets" lineno="30721">
<summary>
Send and receive isns_server packets.
</summary>
@@ -34859,7 +28500,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39432">
+<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="30737">
<summary>
Do not audit attempts to send and receive isns_server packets.
</summary>
@@ -34870,7 +28511,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isns_server_packets" lineno="39447">
+<interface name="corenet_relabelto_isns_server_packets" lineno="30752">
<summary>
Relabel packets to isns_server the packet type.
</summary>
@@ -34880,85 +28521,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39469">
-<summary>
-Send and receive TCP traffic on the jabber_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_jabber_client_port" lineno="39484">
-<summary>
-Send UDP traffic on the jabber_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39499">
-<summary>
-Do not audit attempts to send UDP traffic on the jabber_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_jabber_client_port" lineno="39514">
-<summary>
-Receive UDP traffic on the jabber_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39529">
-<summary>
-Do not audit attempts to receive UDP traffic on the jabber_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39544">
-<summary>
-Send and receive UDP traffic on the jabber_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39560">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the jabber_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_jabber_client_port" lineno="39575">
+<interface name="corenet_tcp_bind_jabber_client_port" lineno="30774">
<summary>
Bind TCP sockets to the jabber_client port.
</summary>
@@ -34969,7 +28532,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_jabber_client_port" lineno="39595">
+<interface name="corenet_udp_bind_jabber_client_port" lineno="30794">
<summary>
Bind UDP sockets to the jabber_client port.
</summary>
@@ -34980,7 +28543,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_jabber_client_port" lineno="39614">
+<interface name="corenet_tcp_connect_jabber_client_port" lineno="30813">
<summary>
Make a TCP connection to the jabber_client port.
</summary>
@@ -34990,7 +28553,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_client_client_packets" lineno="39634">
+<interface name="corenet_send_jabber_client_client_packets" lineno="30833">
<summary>
Send jabber_client_client packets.
</summary>
@@ -35001,7 +28564,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39653">
+<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="30852">
<summary>
Do not audit attempts to send jabber_client_client packets.
</summary>
@@ -35012,7 +28575,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_client_client_packets" lineno="39672">
+<interface name="corenet_receive_jabber_client_client_packets" lineno="30871">
<summary>
Receive jabber_client_client packets.
</summary>
@@ -35023,7 +28586,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39691">
+<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="30890">
<summary>
Do not audit attempts to receive jabber_client_client packets.
</summary>
@@ -35034,7 +28597,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39710">
+<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="30909">
<summary>
Send and receive jabber_client_client packets.
</summary>
@@ -35045,7 +28608,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39726">
+<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="30925">
<summary>
Do not audit attempts to send and receive jabber_client_client packets.
</summary>
@@ -35056,7 +28619,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39741">
+<interface name="corenet_relabelto_jabber_client_client_packets" lineno="30940">
<summary>
Relabel packets to jabber_client_client the packet type.
</summary>
@@ -35066,7 +28629,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_client_server_packets" lineno="39761">
+<interface name="corenet_send_jabber_client_server_packets" lineno="30960">
<summary>
Send jabber_client_server packets.
</summary>
@@ -35077,7 +28640,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39780">
+<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="30979">
<summary>
Do not audit attempts to send jabber_client_server packets.
</summary>
@@ -35088,7 +28651,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_client_server_packets" lineno="39799">
+<interface name="corenet_receive_jabber_client_server_packets" lineno="30998">
<summary>
Receive jabber_client_server packets.
</summary>
@@ -35099,7 +28662,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39818">
+<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="31017">
<summary>
Do not audit attempts to receive jabber_client_server packets.
</summary>
@@ -35110,7 +28673,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39837">
+<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="31036">
<summary>
Send and receive jabber_client_server packets.
</summary>
@@ -35121,7 +28684,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39853">
+<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="31052">
<summary>
Do not audit attempts to send and receive jabber_client_server packets.
</summary>
@@ -35132,7 +28695,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39868">
+<interface name="corenet_relabelto_jabber_client_server_packets" lineno="31067">
<summary>
Relabel packets to jabber_client_server the packet type.
</summary>
@@ -35142,85 +28705,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39890">
-<summary>
-Send and receive TCP traffic on the jabber_interserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_jabber_interserver_port" lineno="39905">
-<summary>
-Send UDP traffic on the jabber_interserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39920">
-<summary>
-Do not audit attempts to send UDP traffic on the jabber_interserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39935">
-<summary>
-Receive UDP traffic on the jabber_interserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39950">
-<summary>
-Do not audit attempts to receive UDP traffic on the jabber_interserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39965">
-<summary>
-Send and receive UDP traffic on the jabber_interserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39981">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the jabber_interserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39996">
+<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="31089">
<summary>
Bind TCP sockets to the jabber_interserver port.
</summary>
@@ -35231,7 +28716,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_jabber_interserver_port" lineno="40016">
+<interface name="corenet_udp_bind_jabber_interserver_port" lineno="31109">
<summary>
Bind UDP sockets to the jabber_interserver port.
</summary>
@@ -35242,7 +28727,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="40035">
+<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="31128">
<summary>
Make a TCP connection to the jabber_interserver port.
</summary>
@@ -35252,7 +28737,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_interserver_client_packets" lineno="40055">
+<interface name="corenet_send_jabber_interserver_client_packets" lineno="31148">
<summary>
Send jabber_interserver_client packets.
</summary>
@@ -35263,7 +28748,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="40074">
+<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="31167">
<summary>
Do not audit attempts to send jabber_interserver_client packets.
</summary>
@@ -35274,7 +28759,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_interserver_client_packets" lineno="40093">
+<interface name="corenet_receive_jabber_interserver_client_packets" lineno="31186">
<summary>
Receive jabber_interserver_client packets.
</summary>
@@ -35285,7 +28770,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="40112">
+<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="31205">
<summary>
Do not audit attempts to receive jabber_interserver_client packets.
</summary>
@@ -35296,7 +28781,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="40131">
+<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="31224">
<summary>
Send and receive jabber_interserver_client packets.
</summary>
@@ -35307,7 +28792,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40147">
+<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="31240">
<summary>
Do not audit attempts to send and receive jabber_interserver_client packets.
</summary>
@@ -35318,7 +28803,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40162">
+<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="31255">
<summary>
Relabel packets to jabber_interserver_client the packet type.
</summary>
@@ -35328,7 +28813,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_interserver_server_packets" lineno="40182">
+<interface name="corenet_send_jabber_interserver_server_packets" lineno="31275">
<summary>
Send jabber_interserver_server packets.
</summary>
@@ -35339,7 +28824,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40201">
+<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="31294">
<summary>
Do not audit attempts to send jabber_interserver_server packets.
</summary>
@@ -35350,7 +28835,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40220">
+<interface name="corenet_receive_jabber_interserver_server_packets" lineno="31313">
<summary>
Receive jabber_interserver_server packets.
</summary>
@@ -35361,7 +28846,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40239">
+<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="31332">
<summary>
Do not audit attempts to receive jabber_interserver_server packets.
</summary>
@@ -35372,7 +28857,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40258">
+<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="31351">
<summary>
Send and receive jabber_interserver_server packets.
</summary>
@@ -35383,7 +28868,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40274">
+<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="31367">
<summary>
Do not audit attempts to send and receive jabber_interserver_server packets.
</summary>
@@ -35394,7 +28879,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40289">
+<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="31382">
<summary>
Relabel packets to jabber_interserver_server the packet type.
</summary>
@@ -35404,85 +28889,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40311">
-<summary>
-Send and receive TCP traffic on the jboss_iiop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_jboss_iiop_port" lineno="40326">
-<summary>
-Send UDP traffic on the jboss_iiop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40341">
-<summary>
-Do not audit attempts to send UDP traffic on the jboss_iiop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40356">
-<summary>
-Receive UDP traffic on the jboss_iiop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40371">
-<summary>
-Do not audit attempts to receive UDP traffic on the jboss_iiop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40386">
-<summary>
-Send and receive UDP traffic on the jboss_iiop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40402">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the jboss_iiop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40417">
+<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="31404">
<summary>
Bind TCP sockets to the jboss_iiop port.
</summary>
@@ -35493,7 +28900,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40437">
+<interface name="corenet_udp_bind_jboss_iiop_port" lineno="31424">
<summary>
Bind UDP sockets to the jboss_iiop port.
</summary>
@@ -35504,7 +28911,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40456">
+<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="31443">
<summary>
Make a TCP connection to the jboss_iiop port.
</summary>
@@ -35514,7 +28921,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jboss_iiop_client_packets" lineno="40476">
+<interface name="corenet_send_jboss_iiop_client_packets" lineno="31463">
<summary>
Send jboss_iiop_client packets.
</summary>
@@ -35525,7 +28932,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40495">
+<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="31482">
<summary>
Do not audit attempts to send jboss_iiop_client packets.
</summary>
@@ -35536,7 +28943,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40514">
+<interface name="corenet_receive_jboss_iiop_client_packets" lineno="31501">
<summary>
Receive jboss_iiop_client packets.
</summary>
@@ -35547,7 +28954,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40533">
+<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="31520">
<summary>
Do not audit attempts to receive jboss_iiop_client packets.
</summary>
@@ -35558,7 +28965,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40552">
+<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="31539">
<summary>
Send and receive jboss_iiop_client packets.
</summary>
@@ -35569,7 +28976,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40568">
+<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="31555">
<summary>
Do not audit attempts to send and receive jboss_iiop_client packets.
</summary>
@@ -35580,7 +28987,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40583">
+<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="31570">
<summary>
Relabel packets to jboss_iiop_client the packet type.
</summary>
@@ -35590,7 +28997,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jboss_iiop_server_packets" lineno="40603">
+<interface name="corenet_send_jboss_iiop_server_packets" lineno="31590">
<summary>
Send jboss_iiop_server packets.
</summary>
@@ -35601,7 +29008,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40622">
+<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="31609">
<summary>
Do not audit attempts to send jboss_iiop_server packets.
</summary>
@@ -35612,7 +29019,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40641">
+<interface name="corenet_receive_jboss_iiop_server_packets" lineno="31628">
<summary>
Receive jboss_iiop_server packets.
</summary>
@@ -35623,7 +29030,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40660">
+<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="31647">
<summary>
Do not audit attempts to receive jboss_iiop_server packets.
</summary>
@@ -35634,7 +29041,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40679">
+<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="31666">
<summary>
Send and receive jboss_iiop_server packets.
</summary>
@@ -35645,7 +29052,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40695">
+<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="31682">
<summary>
Do not audit attempts to send and receive jboss_iiop_server packets.
</summary>
@@ -35656,7 +29063,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40710">
+<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="31697">
<summary>
Relabel packets to jboss_iiop_server the packet type.
</summary>
@@ -35666,85 +29073,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40732">
-<summary>
-Send and receive TCP traffic on the kerberos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_kerberos_port" lineno="40747">
-<summary>
-Send UDP traffic on the kerberos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40762">
-<summary>
-Do not audit attempts to send UDP traffic on the kerberos port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_kerberos_port" lineno="40777">
-<summary>
-Receive UDP traffic on the kerberos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40792">
-<summary>
-Do not audit attempts to receive UDP traffic on the kerberos port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40807">
-<summary>
-Send and receive UDP traffic on the kerberos port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40823">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the kerberos port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_kerberos_port" lineno="40838">
+<interface name="corenet_tcp_bind_kerberos_port" lineno="31719">
<summary>
Bind TCP sockets to the kerberos port.
</summary>
@@ -35755,7 +29084,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kerberos_port" lineno="40858">
+<interface name="corenet_udp_bind_kerberos_port" lineno="31739">
<summary>
Bind UDP sockets to the kerberos port.
</summary>
@@ -35766,7 +29095,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kerberos_port" lineno="40877">
+<interface name="corenet_tcp_connect_kerberos_port" lineno="31758">
<summary>
Make a TCP connection to the kerberos port.
</summary>
@@ -35776,7 +29105,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_client_packets" lineno="40897">
+<interface name="corenet_send_kerberos_client_packets" lineno="31778">
<summary>
Send kerberos_client packets.
</summary>
@@ -35787,7 +29116,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40916">
+<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="31797">
<summary>
Do not audit attempts to send kerberos_client packets.
</summary>
@@ -35798,7 +29127,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_client_packets" lineno="40935">
+<interface name="corenet_receive_kerberos_client_packets" lineno="31816">
<summary>
Receive kerberos_client packets.
</summary>
@@ -35809,7 +29138,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40954">
+<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="31835">
<summary>
Do not audit attempts to receive kerberos_client packets.
</summary>
@@ -35820,7 +29149,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40973">
+<interface name="corenet_sendrecv_kerberos_client_packets" lineno="31854">
<summary>
Send and receive kerberos_client packets.
</summary>
@@ -35831,7 +29160,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40989">
+<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="31870">
<summary>
Do not audit attempts to send and receive kerberos_client packets.
</summary>
@@ -35842,7 +29171,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_client_packets" lineno="41004">
+<interface name="corenet_relabelto_kerberos_client_packets" lineno="31885">
<summary>
Relabel packets to kerberos_client the packet type.
</summary>
@@ -35852,7 +29181,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_server_packets" lineno="41024">
+<interface name="corenet_send_kerberos_server_packets" lineno="31905">
<summary>
Send kerberos_server packets.
</summary>
@@ -35863,7 +29192,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="41043">
+<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="31924">
<summary>
Do not audit attempts to send kerberos_server packets.
</summary>
@@ -35874,7 +29203,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_server_packets" lineno="41062">
+<interface name="corenet_receive_kerberos_server_packets" lineno="31943">
<summary>
Receive kerberos_server packets.
</summary>
@@ -35885,7 +29214,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="41081">
+<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="31962">
<summary>
Do not audit attempts to receive kerberos_server packets.
</summary>
@@ -35896,7 +29225,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_server_packets" lineno="41100">
+<interface name="corenet_sendrecv_kerberos_server_packets" lineno="31981">
<summary>
Send and receive kerberos_server packets.
</summary>
@@ -35907,7 +29236,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="41116">
+<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="31997">
<summary>
Do not audit attempts to send and receive kerberos_server packets.
</summary>
@@ -35918,7 +29247,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_server_packets" lineno="41131">
+<interface name="corenet_relabelto_kerberos_server_packets" lineno="32012">
<summary>
Relabel packets to kerberos_server the packet type.
</summary>
@@ -35928,85 +29257,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41153">
-<summary>
-Send and receive TCP traffic on the kerberos_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_kerberos_admin_port" lineno="41168">
-<summary>
-Send UDP traffic on the kerberos_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41183">
-<summary>
-Do not audit attempts to send UDP traffic on the kerberos_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41198">
-<summary>
-Receive UDP traffic on the kerberos_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41213">
-<summary>
-Do not audit attempts to receive UDP traffic on the kerberos_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41228">
-<summary>
-Send and receive UDP traffic on the kerberos_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41244">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the kerberos_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41259">
+<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="32034">
<summary>
Bind TCP sockets to the kerberos_admin port.
</summary>
@@ -36017,7 +29268,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41279">
+<interface name="corenet_udp_bind_kerberos_admin_port" lineno="32054">
<summary>
Bind UDP sockets to the kerberos_admin port.
</summary>
@@ -36028,7 +29279,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41298">
+<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="32073">
<summary>
Make a TCP connection to the kerberos_admin port.
</summary>
@@ -36038,7 +29289,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_admin_client_packets" lineno="41318">
+<interface name="corenet_send_kerberos_admin_client_packets" lineno="32093">
<summary>
Send kerberos_admin_client packets.
</summary>
@@ -36049,7 +29300,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41337">
+<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="32112">
<summary>
Do not audit attempts to send kerberos_admin_client packets.
</summary>
@@ -36060,7 +29311,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41356">
+<interface name="corenet_receive_kerberos_admin_client_packets" lineno="32131">
<summary>
Receive kerberos_admin_client packets.
</summary>
@@ -36071,7 +29322,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41375">
+<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="32150">
<summary>
Do not audit attempts to receive kerberos_admin_client packets.
</summary>
@@ -36082,7 +29333,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41394">
+<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="32169">
<summary>
Send and receive kerberos_admin_client packets.
</summary>
@@ -36093,7 +29344,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41410">
+<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="32185">
<summary>
Do not audit attempts to send and receive kerberos_admin_client packets.
</summary>
@@ -36104,7 +29355,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41425">
+<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="32200">
<summary>
Relabel packets to kerberos_admin_client the packet type.
</summary>
@@ -36114,7 +29365,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_admin_server_packets" lineno="41445">
+<interface name="corenet_send_kerberos_admin_server_packets" lineno="32220">
<summary>
Send kerberos_admin_server packets.
</summary>
@@ -36125,7 +29376,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41464">
+<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="32239">
<summary>
Do not audit attempts to send kerberos_admin_server packets.
</summary>
@@ -36136,7 +29387,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41483">
+<interface name="corenet_receive_kerberos_admin_server_packets" lineno="32258">
<summary>
Receive kerberos_admin_server packets.
</summary>
@@ -36147,7 +29398,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41502">
+<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="32277">
<summary>
Do not audit attempts to receive kerberos_admin_server packets.
</summary>
@@ -36158,7 +29409,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41521">
+<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="32296">
<summary>
Send and receive kerberos_admin_server packets.
</summary>
@@ -36169,7 +29420,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41537">
+<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="32312">
<summary>
Do not audit attempts to send and receive kerberos_admin_server packets.
</summary>
@@ -36180,7 +29431,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41552">
+<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="32327">
<summary>
Relabel packets to kerberos_admin_server the packet type.
</summary>
@@ -36190,85 +29441,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41574">
-<summary>
-Send and receive TCP traffic on the kerberos_master port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_kerberos_master_port" lineno="41589">
-<summary>
-Send UDP traffic on the kerberos_master port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41604">
-<summary>
-Do not audit attempts to send UDP traffic on the kerberos_master port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_kerberos_master_port" lineno="41619">
-<summary>
-Receive UDP traffic on the kerberos_master port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41634">
-<summary>
-Do not audit attempts to receive UDP traffic on the kerberos_master port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41649">
-<summary>
-Send and receive UDP traffic on the kerberos_master port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41665">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the kerberos_master port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41680">
+<interface name="corenet_tcp_bind_kerberos_master_port" lineno="32349">
<summary>
Bind TCP sockets to the kerberos_master port.
</summary>
@@ -36279,7 +29452,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kerberos_master_port" lineno="41700">
+<interface name="corenet_udp_bind_kerberos_master_port" lineno="32369">
<summary>
Bind UDP sockets to the kerberos_master port.
</summary>
@@ -36290,7 +29463,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41719">
+<interface name="corenet_tcp_connect_kerberos_master_port" lineno="32388">
<summary>
Make a TCP connection to the kerberos_master port.
</summary>
@@ -36300,7 +29473,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_master_client_packets" lineno="41739">
+<interface name="corenet_send_kerberos_master_client_packets" lineno="32408">
<summary>
Send kerberos_master_client packets.
</summary>
@@ -36311,7 +29484,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41758">
+<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="32427">
<summary>
Do not audit attempts to send kerberos_master_client packets.
</summary>
@@ -36322,7 +29495,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_master_client_packets" lineno="41777">
+<interface name="corenet_receive_kerberos_master_client_packets" lineno="32446">
<summary>
Receive kerberos_master_client packets.
</summary>
@@ -36333,7 +29506,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41796">
+<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="32465">
<summary>
Do not audit attempts to receive kerberos_master_client packets.
</summary>
@@ -36344,7 +29517,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41815">
+<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="32484">
<summary>
Send and receive kerberos_master_client packets.
</summary>
@@ -36355,7 +29528,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41831">
+<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="32500">
<summary>
Do not audit attempts to send and receive kerberos_master_client packets.
</summary>
@@ -36366,7 +29539,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41846">
+<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="32515">
<summary>
Relabel packets to kerberos_master_client the packet type.
</summary>
@@ -36376,7 +29549,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_master_server_packets" lineno="41866">
+<interface name="corenet_send_kerberos_master_server_packets" lineno="32535">
<summary>
Send kerberos_master_server packets.
</summary>
@@ -36387,7 +29560,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41885">
+<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="32554">
<summary>
Do not audit attempts to send kerberos_master_server packets.
</summary>
@@ -36398,7 +29571,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_master_server_packets" lineno="41904">
+<interface name="corenet_receive_kerberos_master_server_packets" lineno="32573">
<summary>
Receive kerberos_master_server packets.
</summary>
@@ -36409,7 +29582,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41923">
+<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="32592">
<summary>
Do not audit attempts to receive kerberos_master_server packets.
</summary>
@@ -36420,7 +29593,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41942">
+<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="32611">
<summary>
Send and receive kerberos_master_server packets.
</summary>
@@ -36431,7 +29604,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41958">
+<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="32627">
<summary>
Do not audit attempts to send and receive kerberos_master_server packets.
</summary>
@@ -36442,7 +29615,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41973">
+<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="32642">
<summary>
Relabel packets to kerberos_master_server the packet type.
</summary>
@@ -36452,85 +29625,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41995">
-<summary>
-Send and receive TCP traffic on the kismet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_kismet_port" lineno="42010">
-<summary>
-Send UDP traffic on the kismet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="42025">
-<summary>
-Do not audit attempts to send UDP traffic on the kismet port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_kismet_port" lineno="42040">
-<summary>
-Receive UDP traffic on the kismet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="42055">
-<summary>
-Do not audit attempts to receive UDP traffic on the kismet port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_kismet_port" lineno="42070">
-<summary>
-Send and receive UDP traffic on the kismet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="42086">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the kismet port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_kismet_port" lineno="42101">
+<interface name="corenet_tcp_bind_kismet_port" lineno="32664">
<summary>
Bind TCP sockets to the kismet port.
</summary>
@@ -36541,7 +29636,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kismet_port" lineno="42121">
+<interface name="corenet_udp_bind_kismet_port" lineno="32684">
<summary>
Bind UDP sockets to the kismet port.
</summary>
@@ -36552,7 +29647,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kismet_port" lineno="42140">
+<interface name="corenet_tcp_connect_kismet_port" lineno="32703">
<summary>
Make a TCP connection to the kismet port.
</summary>
@@ -36562,7 +29657,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kismet_client_packets" lineno="42160">
+<interface name="corenet_send_kismet_client_packets" lineno="32723">
<summary>
Send kismet_client packets.
</summary>
@@ -36573,7 +29668,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42179">
+<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="32742">
<summary>
Do not audit attempts to send kismet_client packets.
</summary>
@@ -36584,7 +29679,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kismet_client_packets" lineno="42198">
+<interface name="corenet_receive_kismet_client_packets" lineno="32761">
<summary>
Receive kismet_client packets.
</summary>
@@ -36595,7 +29690,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42217">
+<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="32780">
<summary>
Do not audit attempts to receive kismet_client packets.
</summary>
@@ -36606,7 +29701,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kismet_client_packets" lineno="42236">
+<interface name="corenet_sendrecv_kismet_client_packets" lineno="32799">
<summary>
Send and receive kismet_client packets.
</summary>
@@ -36617,7 +29712,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42252">
+<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="32815">
<summary>
Do not audit attempts to send and receive kismet_client packets.
</summary>
@@ -36628,7 +29723,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kismet_client_packets" lineno="42267">
+<interface name="corenet_relabelto_kismet_client_packets" lineno="32830">
<summary>
Relabel packets to kismet_client the packet type.
</summary>
@@ -36638,7 +29733,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kismet_server_packets" lineno="42287">
+<interface name="corenet_send_kismet_server_packets" lineno="32850">
<summary>
Send kismet_server packets.
</summary>
@@ -36649,7 +29744,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42306">
+<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="32869">
<summary>
Do not audit attempts to send kismet_server packets.
</summary>
@@ -36660,7 +29755,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kismet_server_packets" lineno="42325">
+<interface name="corenet_receive_kismet_server_packets" lineno="32888">
<summary>
Receive kismet_server packets.
</summary>
@@ -36671,7 +29766,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42344">
+<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="32907">
<summary>
Do not audit attempts to receive kismet_server packets.
</summary>
@@ -36682,7 +29777,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kismet_server_packets" lineno="42363">
+<interface name="corenet_sendrecv_kismet_server_packets" lineno="32926">
<summary>
Send and receive kismet_server packets.
</summary>
@@ -36693,7 +29788,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42379">
+<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="32942">
<summary>
Do not audit attempts to send and receive kismet_server packets.
</summary>
@@ -36704,7 +29799,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kismet_server_packets" lineno="42394">
+<interface name="corenet_relabelto_kismet_server_packets" lineno="32957">
<summary>
Relabel packets to kismet_server the packet type.
</summary>
@@ -36714,85 +29809,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42416">
-<summary>
-Send and receive TCP traffic on the kdeconnect port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_kdeconnect_port" lineno="42431">
-<summary>
-Send UDP traffic on the kdeconnect port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42446">
-<summary>
-Do not audit attempts to send UDP traffic on the kdeconnect port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_kdeconnect_port" lineno="42461">
-<summary>
-Receive UDP traffic on the kdeconnect port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42476">
-<summary>
-Do not audit attempts to receive UDP traffic on the kdeconnect port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42491">
-<summary>
-Send and receive UDP traffic on the kdeconnect port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42507">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the kdeconnect port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42522">
+<interface name="corenet_tcp_bind_kdeconnect_port" lineno="32979">
<summary>
Bind TCP sockets to the kdeconnect port.
</summary>
@@ -36803,7 +29820,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kdeconnect_port" lineno="42542">
+<interface name="corenet_udp_bind_kdeconnect_port" lineno="32999">
<summary>
Bind UDP sockets to the kdeconnect port.
</summary>
@@ -36814,7 +29831,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42561">
+<interface name="corenet_tcp_connect_kdeconnect_port" lineno="33018">
<summary>
Make a TCP connection to the kdeconnect port.
</summary>
@@ -36824,7 +29841,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kdeconnect_client_packets" lineno="42581">
+<interface name="corenet_send_kdeconnect_client_packets" lineno="33038">
<summary>
Send kdeconnect_client packets.
</summary>
@@ -36835,7 +29852,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42600">
+<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="33057">
<summary>
Do not audit attempts to send kdeconnect_client packets.
</summary>
@@ -36846,7 +29863,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kdeconnect_client_packets" lineno="42619">
+<interface name="corenet_receive_kdeconnect_client_packets" lineno="33076">
<summary>
Receive kdeconnect_client packets.
</summary>
@@ -36857,7 +29874,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42638">
+<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="33095">
<summary>
Do not audit attempts to receive kdeconnect_client packets.
</summary>
@@ -36868,7 +29885,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42657">
+<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="33114">
<summary>
Send and receive kdeconnect_client packets.
</summary>
@@ -36879,7 +29896,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42673">
+<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="33130">
<summary>
Do not audit attempts to send and receive kdeconnect_client packets.
</summary>
@@ -36890,7 +29907,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42688">
+<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="33145">
<summary>
Relabel packets to kdeconnect_client the packet type.
</summary>
@@ -36900,7 +29917,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kdeconnect_server_packets" lineno="42708">
+<interface name="corenet_send_kdeconnect_server_packets" lineno="33165">
<summary>
Send kdeconnect_server packets.
</summary>
@@ -36911,7 +29928,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42727">
+<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="33184">
<summary>
Do not audit attempts to send kdeconnect_server packets.
</summary>
@@ -36922,7 +29939,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kdeconnect_server_packets" lineno="42746">
+<interface name="corenet_receive_kdeconnect_server_packets" lineno="33203">
<summary>
Receive kdeconnect_server packets.
</summary>
@@ -36933,7 +29950,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42765">
+<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="33222">
<summary>
Do not audit attempts to receive kdeconnect_server packets.
</summary>
@@ -36944,7 +29961,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42784">
+<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="33241">
<summary>
Send and receive kdeconnect_server packets.
</summary>
@@ -36955,7 +29972,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42800">
+<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="33257">
<summary>
Do not audit attempts to send and receive kdeconnect_server packets.
</summary>
@@ -36966,7 +29983,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42815">
+<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="33272">
<summary>
Relabel packets to kdeconnect_server the packet type.
</summary>
@@ -36976,85 +29993,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42837">
-<summary>
-Send and receive TCP traffic on the kprop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_kprop_port" lineno="42852">
-<summary>
-Send UDP traffic on the kprop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42867">
-<summary>
-Do not audit attempts to send UDP traffic on the kprop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_kprop_port" lineno="42882">
-<summary>
-Receive UDP traffic on the kprop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42897">
-<summary>
-Do not audit attempts to receive UDP traffic on the kprop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_kprop_port" lineno="42912">
-<summary>
-Send and receive UDP traffic on the kprop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42928">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the kprop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_kprop_port" lineno="42943">
+<interface name="corenet_tcp_bind_kprop_port" lineno="33294">
<summary>
Bind TCP sockets to the kprop port.
</summary>
@@ -37065,7 +30004,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kprop_port" lineno="42963">
+<interface name="corenet_udp_bind_kprop_port" lineno="33314">
<summary>
Bind UDP sockets to the kprop port.
</summary>
@@ -37076,7 +30015,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kprop_port" lineno="42982">
+<interface name="corenet_tcp_connect_kprop_port" lineno="33333">
<summary>
Make a TCP connection to the kprop port.
</summary>
@@ -37086,7 +30025,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kprop_client_packets" lineno="43002">
+<interface name="corenet_send_kprop_client_packets" lineno="33353">
<summary>
Send kprop_client packets.
</summary>
@@ -37097,7 +30036,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="43021">
+<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="33372">
<summary>
Do not audit attempts to send kprop_client packets.
</summary>
@@ -37108,7 +30047,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kprop_client_packets" lineno="43040">
+<interface name="corenet_receive_kprop_client_packets" lineno="33391">
<summary>
Receive kprop_client packets.
</summary>
@@ -37119,7 +30058,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="43059">
+<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="33410">
<summary>
Do not audit attempts to receive kprop_client packets.
</summary>
@@ -37130,7 +30069,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kprop_client_packets" lineno="43078">
+<interface name="corenet_sendrecv_kprop_client_packets" lineno="33429">
<summary>
Send and receive kprop_client packets.
</summary>
@@ -37141,7 +30080,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="43094">
+<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="33445">
<summary>
Do not audit attempts to send and receive kprop_client packets.
</summary>
@@ -37152,7 +30091,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kprop_client_packets" lineno="43109">
+<interface name="corenet_relabelto_kprop_client_packets" lineno="33460">
<summary>
Relabel packets to kprop_client the packet type.
</summary>
@@ -37162,7 +30101,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kprop_server_packets" lineno="43129">
+<interface name="corenet_send_kprop_server_packets" lineno="33480">
<summary>
Send kprop_server packets.
</summary>
@@ -37173,7 +30112,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43148">
+<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="33499">
<summary>
Do not audit attempts to send kprop_server packets.
</summary>
@@ -37184,7 +30123,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kprop_server_packets" lineno="43167">
+<interface name="corenet_receive_kprop_server_packets" lineno="33518">
<summary>
Receive kprop_server packets.
</summary>
@@ -37195,7 +30134,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43186">
+<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="33537">
<summary>
Do not audit attempts to receive kprop_server packets.
</summary>
@@ -37206,7 +30145,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kprop_server_packets" lineno="43205">
+<interface name="corenet_sendrecv_kprop_server_packets" lineno="33556">
<summary>
Send and receive kprop_server packets.
</summary>
@@ -37217,7 +30156,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43221">
+<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="33572">
<summary>
Do not audit attempts to send and receive kprop_server packets.
</summary>
@@ -37228,7 +30167,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kprop_server_packets" lineno="43236">
+<interface name="corenet_relabelto_kprop_server_packets" lineno="33587">
<summary>
Relabel packets to kprop_server the packet type.
</summary>
@@ -37238,85 +30177,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43258">
-<summary>
-Send and receive TCP traffic on the ktalkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ktalkd_port" lineno="43273">
-<summary>
-Send UDP traffic on the ktalkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43288">
-<summary>
-Do not audit attempts to send UDP traffic on the ktalkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ktalkd_port" lineno="43303">
-<summary>
-Receive UDP traffic on the ktalkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43318">
-<summary>
-Do not audit attempts to receive UDP traffic on the ktalkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43333">
-<summary>
-Send and receive UDP traffic on the ktalkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43349">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ktalkd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ktalkd_port" lineno="43364">
+<interface name="corenet_tcp_bind_ktalkd_port" lineno="33609">
<summary>
Bind TCP sockets to the ktalkd port.
</summary>
@@ -37327,7 +30188,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ktalkd_port" lineno="43384">
+<interface name="corenet_udp_bind_ktalkd_port" lineno="33629">
<summary>
Bind UDP sockets to the ktalkd port.
</summary>
@@ -37338,7 +30199,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ktalkd_port" lineno="43403">
+<interface name="corenet_tcp_connect_ktalkd_port" lineno="33648">
<summary>
Make a TCP connection to the ktalkd port.
</summary>
@@ -37348,7 +30209,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ktalkd_client_packets" lineno="43423">
+<interface name="corenet_send_ktalkd_client_packets" lineno="33668">
<summary>
Send ktalkd_client packets.
</summary>
@@ -37359,7 +30220,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43442">
+<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="33687">
<summary>
Do not audit attempts to send ktalkd_client packets.
</summary>
@@ -37370,7 +30231,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ktalkd_client_packets" lineno="43461">
+<interface name="corenet_receive_ktalkd_client_packets" lineno="33706">
<summary>
Receive ktalkd_client packets.
</summary>
@@ -37381,7 +30242,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43480">
+<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="33725">
<summary>
Do not audit attempts to receive ktalkd_client packets.
</summary>
@@ -37392,7 +30253,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43499">
+<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="33744">
<summary>
Send and receive ktalkd_client packets.
</summary>
@@ -37403,7 +30264,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43515">
+<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="33760">
<summary>
Do not audit attempts to send and receive ktalkd_client packets.
</summary>
@@ -37414,7 +30275,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43530">
+<interface name="corenet_relabelto_ktalkd_client_packets" lineno="33775">
<summary>
Relabel packets to ktalkd_client the packet type.
</summary>
@@ -37424,7 +30285,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ktalkd_server_packets" lineno="43550">
+<interface name="corenet_send_ktalkd_server_packets" lineno="33795">
<summary>
Send ktalkd_server packets.
</summary>
@@ -37435,7 +30296,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43569">
+<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="33814">
<summary>
Do not audit attempts to send ktalkd_server packets.
</summary>
@@ -37446,7 +30307,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ktalkd_server_packets" lineno="43588">
+<interface name="corenet_receive_ktalkd_server_packets" lineno="33833">
<summary>
Receive ktalkd_server packets.
</summary>
@@ -37457,7 +30318,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43607">
+<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="33852">
<summary>
Do not audit attempts to receive ktalkd_server packets.
</summary>
@@ -37468,7 +30329,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43626">
+<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="33871">
<summary>
Send and receive ktalkd_server packets.
</summary>
@@ -37479,7 +30340,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43642">
+<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="33887">
<summary>
Do not audit attempts to send and receive ktalkd_server packets.
</summary>
@@ -37490,7 +30351,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43657">
+<interface name="corenet_relabelto_ktalkd_server_packets" lineno="33902">
<summary>
Relabel packets to ktalkd_server the packet type.
</summary>
@@ -37500,53 +30361,52 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43679">
+<interface name="corenet_tcp_bind_kubernetes_port" lineno="33924">
<summary>
-Send and receive TCP traffic on the l2tp port.
+Bind TCP sockets to the kubernetes port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="both" weight="10"/>
+<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_send_l2tp_port" lineno="43694">
+<interface name="corenet_udp_bind_kubernetes_port" lineno="33944">
<summary>
-Send UDP traffic on the l2tp port.
+Bind UDP sockets to the kubernetes port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="write" weight="10"/>
+<infoflow type="none"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43709">
+<interface name="corenet_tcp_connect_kubernetes_port" lineno="33963">
<summary>
-Do not audit attempts to send UDP traffic on the l2tp port.
+Make a TCP connection to the kubernetes port.
</summary>
<param name="domain">
<summary>
-Domain to not audit.
+Domain allowed access.
</summary>
</param>
-<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_l2tp_port" lineno="43724">
+<interface name="corenet_send_kubernetes_client_packets" lineno="33983">
<summary>
-Receive UDP traffic on the l2tp port.
+Send kubernetes_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="read" weight="10"/>
+<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43739">
+<interface name="corenet_dontaudit_send_kubernetes_client_packets" lineno="34002">
<summary>
-Do not audit attempts to receive UDP traffic on the l2tp port.
+Do not audit attempts to send kubernetes_client packets.
</summary>
<param name="domain">
<summary>
@@ -37555,54 +30415,53 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43754">
+<interface name="corenet_receive_kubernetes_client_packets" lineno="34021">
<summary>
-Send and receive UDP traffic on the l2tp port.
+Receive kubernetes_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="both" weight="10"/>
+<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43770">
+<interface name="corenet_dontaudit_receive_kubernetes_client_packets" lineno="34040">
<summary>
-Do not audit attempts to send and receive
-UDP traffic on the l2tp port.
+Do not audit attempts to receive kubernetes_client packets.
</summary>
<param name="domain">
<summary>
-Domain to not audit.
+Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_l2tp_port" lineno="43785">
+<interface name="corenet_sendrecv_kubernetes_client_packets" lineno="34059">
<summary>
-Bind TCP sockets to the l2tp port.
+Send and receive kubernetes_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="none"/>
+<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_bind_l2tp_port" lineno="43805">
+<interface name="corenet_dontaudit_sendrecv_kubernetes_client_packets" lineno="34075">
<summary>
-Bind UDP sockets to the l2tp port.
+Do not audit attempts to send and receive kubernetes_client packets.
</summary>
<param name="domain">
<summary>
-Domain allowed access.
+Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_l2tp_port" lineno="43824">
+<interface name="corenet_relabelto_kubernetes_client_packets" lineno="34090">
<summary>
-Make a TCP connection to the l2tp port.
+Relabel packets to kubernetes_client the packet type.
</summary>
<param name="domain">
<summary>
@@ -37610,9 +30469,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_l2tp_client_packets" lineno="43844">
+<interface name="corenet_send_kubernetes_server_packets" lineno="34110">
<summary>
-Send l2tp_client packets.
+Send kubernetes_server packets.
</summary>
<param name="domain">
<summary>
@@ -37621,9 +30480,9 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43863">
+<interface name="corenet_dontaudit_send_kubernetes_server_packets" lineno="34129">
<summary>
-Do not audit attempts to send l2tp_client packets.
+Do not audit attempts to send kubernetes_server packets.
</summary>
<param name="domain">
<summary>
@@ -37632,9 +30491,9 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_l2tp_client_packets" lineno="43882">
+<interface name="corenet_receive_kubernetes_server_packets" lineno="34148">
<summary>
-Receive l2tp_client packets.
+Receive kubernetes_server packets.
</summary>
<param name="domain">
<summary>
@@ -37643,9 +30502,9 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43901">
+<interface name="corenet_dontaudit_receive_kubernetes_server_packets" lineno="34167">
<summary>
-Do not audit attempts to receive l2tp_client packets.
+Do not audit attempts to receive kubernetes_server packets.
</summary>
<param name="domain">
<summary>
@@ -37654,9 +30513,9 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43920">
+<interface name="corenet_sendrecv_kubernetes_server_packets" lineno="34186">
<summary>
-Send and receive l2tp_client packets.
+Send and receive kubernetes_server packets.
</summary>
<param name="domain">
<summary>
@@ -37665,9 +30524,9 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43936">
+<interface name="corenet_dontaudit_sendrecv_kubernetes_server_packets" lineno="34202">
<summary>
-Do not audit attempts to send and receive l2tp_client packets.
+Do not audit attempts to send and receive kubernetes_server packets.
</summary>
<param name="domain">
<summary>
@@ -37676,9 +30535,9 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_l2tp_client_packets" lineno="43951">
+<interface name="corenet_relabelto_kubernetes_server_packets" lineno="34217">
<summary>
-Relabel packets to l2tp_client the packet type.
+Relabel packets to kubernetes_server the packet type.
</summary>
<param name="domain">
<summary>
@@ -37686,96 +30545,117 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_l2tp_server_packets" lineno="43971">
+<interface name="corenet_tcp_bind_l2tp_port" lineno="34239">
<summary>
-Send l2tp_server packets.
+Bind TCP sockets to the l2tp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="write" weight="10"/>
+<infoflow type="none"/>
</interface>
-<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43990">
+<interface name="corenet_udp_bind_l2tp_port" lineno="34259">
<summary>
-Do not audit attempts to send l2tp_server packets.
+Bind UDP sockets to the l2tp port.
</summary>
<param name="domain">
<summary>
-Domain to not audit.
+Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_l2tp_server_packets" lineno="44009">
+<interface name="corenet_tcp_connect_l2tp_port" lineno="34278">
<summary>
-Receive l2tp_server packets.
+Make a TCP connection to the l2tp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="44028">
+<interface name="corenet_send_l2tp_client_packets" lineno="34298">
<summary>
-Do not audit attempts to receive l2tp_server packets.
+Send l2tp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
+<infoflow type="write" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="34317">
+<summary>
+Do not audit attempts to send l2tp_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_l2tp_server_packets" lineno="44047">
+<interface name="corenet_receive_l2tp_client_packets" lineno="34336">
<summary>
-Send and receive l2tp_server packets.
+Receive l2tp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="both" weight="10"/>
+<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="44063">
+<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="34355">
<summary>
-Do not audit attempts to send and receive l2tp_server packets.
+Do not audit attempts to receive l2tp_client packets.
</summary>
<param name="domain">
<summary>
-Domain to not audit.
+Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_l2tp_server_packets" lineno="44078">
+<interface name="corenet_sendrecv_l2tp_client_packets" lineno="34374">
<summary>
-Relabel packets to l2tp_server the packet type.
+Send and receive l2tp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
+<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_tcp_sendrecv_ldap_port" lineno="44100">
+<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="34390">
<summary>
-Send and receive TCP traffic on the ldap port.
+Do not audit attempts to send and receive l2tp_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_relabelto_l2tp_client_packets" lineno="34405">
+<summary>
+Relabel packets to l2tp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ldap_port" lineno="44115">
+<interface name="corenet_send_l2tp_server_packets" lineno="34425">
<summary>
-Send UDP traffic on the ldap port.
+Send l2tp_server packets.
</summary>
<param name="domain">
<summary>
@@ -37784,9 +30664,9 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="44130">
+<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="34444">
<summary>
-Do not audit attempts to send UDP traffic on the ldap port.
+Do not audit attempts to send l2tp_server packets.
</summary>
<param name="domain">
<summary>
@@ -37795,9 +30675,9 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ldap_port" lineno="44145">
+<interface name="corenet_receive_l2tp_server_packets" lineno="34463">
<summary>
-Receive UDP traffic on the ldap port.
+Receive l2tp_server packets.
</summary>
<param name="domain">
<summary>
@@ -37806,20 +30686,20 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44160">
+<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="34482">
<summary>
-Do not audit attempts to receive UDP traffic on the ldap port.
+Do not audit attempts to receive l2tp_server packets.
</summary>
<param name="domain">
<summary>
-Domain to not audit.
+Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ldap_port" lineno="44175">
+<interface name="corenet_sendrecv_l2tp_server_packets" lineno="34501">
<summary>
-Send and receive UDP traffic on the ldap port.
+Send and receive l2tp_server packets.
</summary>
<param name="domain">
<summary>
@@ -37828,10 +30708,9 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44191">
+<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="34517">
<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ldap port.
+Do not audit attempts to send and receive l2tp_server packets.
</summary>
<param name="domain">
<summary>
@@ -37840,7 +30719,17 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ldap_port" lineno="44206">
+<interface name="corenet_relabelto_l2tp_server_packets" lineno="34532">
+<summary>
+Relabel packets to l2tp_server the packet type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corenet_tcp_bind_ldap_port" lineno="34554">
<summary>
Bind TCP sockets to the ldap port.
</summary>
@@ -37851,7 +30740,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ldap_port" lineno="44226">
+<interface name="corenet_udp_bind_ldap_port" lineno="34574">
<summary>
Bind UDP sockets to the ldap port.
</summary>
@@ -37862,7 +30751,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ldap_port" lineno="44245">
+<interface name="corenet_tcp_connect_ldap_port" lineno="34593">
<summary>
Make a TCP connection to the ldap port.
</summary>
@@ -37872,7 +30761,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ldap_client_packets" lineno="44265">
+<interface name="corenet_send_ldap_client_packets" lineno="34613">
<summary>
Send ldap_client packets.
</summary>
@@ -37883,7 +30772,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44284">
+<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="34632">
<summary>
Do not audit attempts to send ldap_client packets.
</summary>
@@ -37894,7 +30783,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ldap_client_packets" lineno="44303">
+<interface name="corenet_receive_ldap_client_packets" lineno="34651">
<summary>
Receive ldap_client packets.
</summary>
@@ -37905,7 +30794,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44322">
+<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="34670">
<summary>
Do not audit attempts to receive ldap_client packets.
</summary>
@@ -37916,7 +30805,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ldap_client_packets" lineno="44341">
+<interface name="corenet_sendrecv_ldap_client_packets" lineno="34689">
<summary>
Send and receive ldap_client packets.
</summary>
@@ -37927,7 +30816,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44357">
+<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="34705">
<summary>
Do not audit attempts to send and receive ldap_client packets.
</summary>
@@ -37938,7 +30827,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ldap_client_packets" lineno="44372">
+<interface name="corenet_relabelto_ldap_client_packets" lineno="34720">
<summary>
Relabel packets to ldap_client the packet type.
</summary>
@@ -37948,7 +30837,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ldap_server_packets" lineno="44392">
+<interface name="corenet_send_ldap_server_packets" lineno="34740">
<summary>
Send ldap_server packets.
</summary>
@@ -37959,7 +30848,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44411">
+<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="34759">
<summary>
Do not audit attempts to send ldap_server packets.
</summary>
@@ -37970,7 +30859,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ldap_server_packets" lineno="44430">
+<interface name="corenet_receive_ldap_server_packets" lineno="34778">
<summary>
Receive ldap_server packets.
</summary>
@@ -37981,7 +30870,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44449">
+<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="34797">
<summary>
Do not audit attempts to receive ldap_server packets.
</summary>
@@ -37992,7 +30881,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ldap_server_packets" lineno="44468">
+<interface name="corenet_sendrecv_ldap_server_packets" lineno="34816">
<summary>
Send and receive ldap_server packets.
</summary>
@@ -38003,7 +30892,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44484">
+<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="34832">
<summary>
Do not audit attempts to send and receive ldap_server packets.
</summary>
@@ -38014,7 +30903,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ldap_server_packets" lineno="44499">
+<interface name="corenet_relabelto_ldap_server_packets" lineno="34847">
<summary>
Relabel packets to ldap_server the packet type.
</summary>
@@ -38024,85 +30913,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44521">
-<summary>
-Send and receive TCP traffic on the lirc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_lirc_port" lineno="44536">
-<summary>
-Send UDP traffic on the lirc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44551">
-<summary>
-Do not audit attempts to send UDP traffic on the lirc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_lirc_port" lineno="44566">
-<summary>
-Receive UDP traffic on the lirc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44581">
-<summary>
-Do not audit attempts to receive UDP traffic on the lirc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_lirc_port" lineno="44596">
-<summary>
-Send and receive UDP traffic on the lirc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44612">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the lirc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_lirc_port" lineno="44627">
+<interface name="corenet_tcp_bind_lirc_port" lineno="34869">
<summary>
Bind TCP sockets to the lirc port.
</summary>
@@ -38113,7 +30924,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_lirc_port" lineno="44647">
+<interface name="corenet_udp_bind_lirc_port" lineno="34889">
<summary>
Bind UDP sockets to the lirc port.
</summary>
@@ -38124,7 +30935,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_lirc_port" lineno="44666">
+<interface name="corenet_tcp_connect_lirc_port" lineno="34908">
<summary>
Make a TCP connection to the lirc port.
</summary>
@@ -38134,7 +30945,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lirc_client_packets" lineno="44686">
+<interface name="corenet_send_lirc_client_packets" lineno="34928">
<summary>
Send lirc_client packets.
</summary>
@@ -38145,7 +30956,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44705">
+<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="34947">
<summary>
Do not audit attempts to send lirc_client packets.
</summary>
@@ -38156,7 +30967,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lirc_client_packets" lineno="44724">
+<interface name="corenet_receive_lirc_client_packets" lineno="34966">
<summary>
Receive lirc_client packets.
</summary>
@@ -38167,7 +30978,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44743">
+<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="34985">
<summary>
Do not audit attempts to receive lirc_client packets.
</summary>
@@ -38178,7 +30989,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lirc_client_packets" lineno="44762">
+<interface name="corenet_sendrecv_lirc_client_packets" lineno="35004">
<summary>
Send and receive lirc_client packets.
</summary>
@@ -38189,7 +31000,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44778">
+<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="35020">
<summary>
Do not audit attempts to send and receive lirc_client packets.
</summary>
@@ -38200,7 +31011,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lirc_client_packets" lineno="44793">
+<interface name="corenet_relabelto_lirc_client_packets" lineno="35035">
<summary>
Relabel packets to lirc_client the packet type.
</summary>
@@ -38210,7 +31021,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lirc_server_packets" lineno="44813">
+<interface name="corenet_send_lirc_server_packets" lineno="35055">
<summary>
Send lirc_server packets.
</summary>
@@ -38221,7 +31032,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44832">
+<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="35074">
<summary>
Do not audit attempts to send lirc_server packets.
</summary>
@@ -38232,7 +31043,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lirc_server_packets" lineno="44851">
+<interface name="corenet_receive_lirc_server_packets" lineno="35093">
<summary>
Receive lirc_server packets.
</summary>
@@ -38243,7 +31054,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44870">
+<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="35112">
<summary>
Do not audit attempts to receive lirc_server packets.
</summary>
@@ -38254,7 +31065,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lirc_server_packets" lineno="44889">
+<interface name="corenet_sendrecv_lirc_server_packets" lineno="35131">
<summary>
Send and receive lirc_server packets.
</summary>
@@ -38265,7 +31076,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44905">
+<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="35147">
<summary>
Do not audit attempts to send and receive lirc_server packets.
</summary>
@@ -38276,7 +31087,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lirc_server_packets" lineno="44920">
+<interface name="corenet_relabelto_lirc_server_packets" lineno="35162">
<summary>
Relabel packets to lirc_server the packet type.
</summary>
@@ -38286,85 +31097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44942">
-<summary>
-Send and receive TCP traffic on the llmnr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_llmnr_port" lineno="44957">
-<summary>
-Send UDP traffic on the llmnr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44972">
-<summary>
-Do not audit attempts to send UDP traffic on the llmnr port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_llmnr_port" lineno="44987">
-<summary>
-Receive UDP traffic on the llmnr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="45002">
-<summary>
-Do not audit attempts to receive UDP traffic on the llmnr port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_llmnr_port" lineno="45017">
-<summary>
-Send and receive UDP traffic on the llmnr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="45033">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the llmnr port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_llmnr_port" lineno="45048">
+<interface name="corenet_tcp_bind_llmnr_port" lineno="35184">
<summary>
Bind TCP sockets to the llmnr port.
</summary>
@@ -38375,7 +31108,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_llmnr_port" lineno="45068">
+<interface name="corenet_udp_bind_llmnr_port" lineno="35204">
<summary>
Bind UDP sockets to the llmnr port.
</summary>
@@ -38386,7 +31119,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_llmnr_port" lineno="45087">
+<interface name="corenet_tcp_connect_llmnr_port" lineno="35223">
<summary>
Make a TCP connection to the llmnr port.
</summary>
@@ -38396,7 +31129,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_llmnr_client_packets" lineno="45107">
+<interface name="corenet_send_llmnr_client_packets" lineno="35243">
<summary>
Send llmnr_client packets.
</summary>
@@ -38407,7 +31140,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="45126">
+<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="35262">
<summary>
Do not audit attempts to send llmnr_client packets.
</summary>
@@ -38418,7 +31151,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_llmnr_client_packets" lineno="45145">
+<interface name="corenet_receive_llmnr_client_packets" lineno="35281">
<summary>
Receive llmnr_client packets.
</summary>
@@ -38429,7 +31162,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45164">
+<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="35300">
<summary>
Do not audit attempts to receive llmnr_client packets.
</summary>
@@ -38440,7 +31173,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45183">
+<interface name="corenet_sendrecv_llmnr_client_packets" lineno="35319">
<summary>
Send and receive llmnr_client packets.
</summary>
@@ -38451,7 +31184,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45199">
+<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="35335">
<summary>
Do not audit attempts to send and receive llmnr_client packets.
</summary>
@@ -38462,7 +31195,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_llmnr_client_packets" lineno="45214">
+<interface name="corenet_relabelto_llmnr_client_packets" lineno="35350">
<summary>
Relabel packets to llmnr_client the packet type.
</summary>
@@ -38472,7 +31205,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_llmnr_server_packets" lineno="45234">
+<interface name="corenet_send_llmnr_server_packets" lineno="35370">
<summary>
Send llmnr_server packets.
</summary>
@@ -38483,7 +31216,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45253">
+<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="35389">
<summary>
Do not audit attempts to send llmnr_server packets.
</summary>
@@ -38494,7 +31227,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_llmnr_server_packets" lineno="45272">
+<interface name="corenet_receive_llmnr_server_packets" lineno="35408">
<summary>
Receive llmnr_server packets.
</summary>
@@ -38505,7 +31238,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45291">
+<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="35427">
<summary>
Do not audit attempts to receive llmnr_server packets.
</summary>
@@ -38516,7 +31249,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45310">
+<interface name="corenet_sendrecv_llmnr_server_packets" lineno="35446">
<summary>
Send and receive llmnr_server packets.
</summary>
@@ -38527,7 +31260,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45326">
+<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="35462">
<summary>
Do not audit attempts to send and receive llmnr_server packets.
</summary>
@@ -38538,7 +31271,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_llmnr_server_packets" lineno="45341">
+<interface name="corenet_relabelto_llmnr_server_packets" lineno="35477">
<summary>
Relabel packets to llmnr_server the packet type.
</summary>
@@ -38548,85 +31281,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45363">
-<summary>
-Send and receive TCP traffic on the lmtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_lmtp_port" lineno="45378">
-<summary>
-Send UDP traffic on the lmtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45393">
-<summary>
-Do not audit attempts to send UDP traffic on the lmtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_lmtp_port" lineno="45408">
-<summary>
-Receive UDP traffic on the lmtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45423">
-<summary>
-Do not audit attempts to receive UDP traffic on the lmtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45438">
-<summary>
-Send and receive UDP traffic on the lmtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45454">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the lmtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_lmtp_port" lineno="45469">
+<interface name="corenet_tcp_bind_lmtp_port" lineno="35499">
<summary>
Bind TCP sockets to the lmtp port.
</summary>
@@ -38637,7 +31292,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_lmtp_port" lineno="45489">
+<interface name="corenet_udp_bind_lmtp_port" lineno="35519">
<summary>
Bind UDP sockets to the lmtp port.
</summary>
@@ -38648,7 +31303,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_lmtp_port" lineno="45508">
+<interface name="corenet_tcp_connect_lmtp_port" lineno="35538">
<summary>
Make a TCP connection to the lmtp port.
</summary>
@@ -38658,7 +31313,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lmtp_client_packets" lineno="45528">
+<interface name="corenet_send_lmtp_client_packets" lineno="35558">
<summary>
Send lmtp_client packets.
</summary>
@@ -38669,7 +31324,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45547">
+<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="35577">
<summary>
Do not audit attempts to send lmtp_client packets.
</summary>
@@ -38680,7 +31335,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lmtp_client_packets" lineno="45566">
+<interface name="corenet_receive_lmtp_client_packets" lineno="35596">
<summary>
Receive lmtp_client packets.
</summary>
@@ -38691,7 +31346,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45585">
+<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="35615">
<summary>
Do not audit attempts to receive lmtp_client packets.
</summary>
@@ -38702,7 +31357,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45604">
+<interface name="corenet_sendrecv_lmtp_client_packets" lineno="35634">
<summary>
Send and receive lmtp_client packets.
</summary>
@@ -38713,7 +31368,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45620">
+<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="35650">
<summary>
Do not audit attempts to send and receive lmtp_client packets.
</summary>
@@ -38724,7 +31379,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lmtp_client_packets" lineno="45635">
+<interface name="corenet_relabelto_lmtp_client_packets" lineno="35665">
<summary>
Relabel packets to lmtp_client the packet type.
</summary>
@@ -38734,7 +31389,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lmtp_server_packets" lineno="45655">
+<interface name="corenet_send_lmtp_server_packets" lineno="35685">
<summary>
Send lmtp_server packets.
</summary>
@@ -38745,7 +31400,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45674">
+<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="35704">
<summary>
Do not audit attempts to send lmtp_server packets.
</summary>
@@ -38756,7 +31411,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lmtp_server_packets" lineno="45693">
+<interface name="corenet_receive_lmtp_server_packets" lineno="35723">
<summary>
Receive lmtp_server packets.
</summary>
@@ -38767,7 +31422,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45712">
+<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="35742">
<summary>
Do not audit attempts to receive lmtp_server packets.
</summary>
@@ -38778,7 +31433,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45731">
+<interface name="corenet_sendrecv_lmtp_server_packets" lineno="35761">
<summary>
Send and receive lmtp_server packets.
</summary>
@@ -38789,7 +31444,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45747">
+<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="35777">
<summary>
Do not audit attempts to send and receive lmtp_server packets.
</summary>
@@ -38800,7 +31455,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lmtp_server_packets" lineno="45762">
+<interface name="corenet_relabelto_lmtp_server_packets" lineno="35792">
<summary>
Relabel packets to lmtp_server the packet type.
</summary>
@@ -38810,85 +31465,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45784">
-<summary>
-Send and receive TCP traffic on the lrrd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_lrrd_port" lineno="45799">
-<summary>
-Send UDP traffic on the lrrd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45814">
-<summary>
-Do not audit attempts to send UDP traffic on the lrrd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_lrrd_port" lineno="45829">
-<summary>
-Receive UDP traffic on the lrrd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45844">
-<summary>
-Do not audit attempts to receive UDP traffic on the lrrd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45859">
-<summary>
-Send and receive UDP traffic on the lrrd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45875">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the lrrd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_lrrd_port" lineno="45890">
+<interface name="corenet_tcp_bind_lrrd_port" lineno="35814">
<summary>
Bind TCP sockets to the lrrd port.
</summary>
@@ -38899,7 +31476,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_lrrd_port" lineno="45910">
+<interface name="corenet_udp_bind_lrrd_port" lineno="35834">
<summary>
Bind UDP sockets to the lrrd port.
</summary>
@@ -38910,7 +31487,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_lrrd_port" lineno="45929">
+<interface name="corenet_tcp_connect_lrrd_port" lineno="35853">
<summary>
Make a TCP connection to the lrrd port.
</summary>
@@ -38920,7 +31497,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lrrd_client_packets" lineno="45949">
+<interface name="corenet_send_lrrd_client_packets" lineno="35873">
<summary>
Send lrrd_client packets.
</summary>
@@ -38931,7 +31508,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45968">
+<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="35892">
<summary>
Do not audit attempts to send lrrd_client packets.
</summary>
@@ -38942,7 +31519,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lrrd_client_packets" lineno="45987">
+<interface name="corenet_receive_lrrd_client_packets" lineno="35911">
<summary>
Receive lrrd_client packets.
</summary>
@@ -38953,7 +31530,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="46006">
+<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="35930">
<summary>
Do not audit attempts to receive lrrd_client packets.
</summary>
@@ -38964,7 +31541,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lrrd_client_packets" lineno="46025">
+<interface name="corenet_sendrecv_lrrd_client_packets" lineno="35949">
<summary>
Send and receive lrrd_client packets.
</summary>
@@ -38975,7 +31552,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="46041">
+<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="35965">
<summary>
Do not audit attempts to send and receive lrrd_client packets.
</summary>
@@ -38986,7 +31563,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lrrd_client_packets" lineno="46056">
+<interface name="corenet_relabelto_lrrd_client_packets" lineno="35980">
<summary>
Relabel packets to lrrd_client the packet type.
</summary>
@@ -38996,7 +31573,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lrrd_server_packets" lineno="46076">
+<interface name="corenet_send_lrrd_server_packets" lineno="36000">
<summary>
Send lrrd_server packets.
</summary>
@@ -39007,7 +31584,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="46095">
+<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="36019">
<summary>
Do not audit attempts to send lrrd_server packets.
</summary>
@@ -39018,7 +31595,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lrrd_server_packets" lineno="46114">
+<interface name="corenet_receive_lrrd_server_packets" lineno="36038">
<summary>
Receive lrrd_server packets.
</summary>
@@ -39029,7 +31606,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="46133">
+<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="36057">
<summary>
Do not audit attempts to receive lrrd_server packets.
</summary>
@@ -39040,7 +31617,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46152">
+<interface name="corenet_sendrecv_lrrd_server_packets" lineno="36076">
<summary>
Send and receive lrrd_server packets.
</summary>
@@ -39051,7 +31628,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46168">
+<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="36092">
<summary>
Do not audit attempts to send and receive lrrd_server packets.
</summary>
@@ -39062,7 +31639,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lrrd_server_packets" lineno="46183">
+<interface name="corenet_relabelto_lrrd_server_packets" lineno="36107">
<summary>
Relabel packets to lrrd_server the packet type.
</summary>
@@ -39072,85 +31649,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mail_port" lineno="46205">
-<summary>
-Send and receive TCP traffic on the mail port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mail_port" lineno="46220">
-<summary>
-Send UDP traffic on the mail port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46235">
-<summary>
-Do not audit attempts to send UDP traffic on the mail port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mail_port" lineno="46250">
-<summary>
-Receive UDP traffic on the mail port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46265">
-<summary>
-Do not audit attempts to receive UDP traffic on the mail port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mail_port" lineno="46280">
-<summary>
-Send and receive UDP traffic on the mail port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46296">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mail port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mail_port" lineno="46311">
+<interface name="corenet_tcp_bind_mail_port" lineno="36129">
<summary>
Bind TCP sockets to the mail port.
</summary>
@@ -39161,7 +31660,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mail_port" lineno="46331">
+<interface name="corenet_udp_bind_mail_port" lineno="36149">
<summary>
Bind UDP sockets to the mail port.
</summary>
@@ -39172,7 +31671,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mail_port" lineno="46350">
+<interface name="corenet_tcp_connect_mail_port" lineno="36168">
<summary>
Make a TCP connection to the mail port.
</summary>
@@ -39182,7 +31681,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mail_client_packets" lineno="46370">
+<interface name="corenet_send_mail_client_packets" lineno="36188">
<summary>
Send mail_client packets.
</summary>
@@ -39193,7 +31692,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46389">
+<interface name="corenet_dontaudit_send_mail_client_packets" lineno="36207">
<summary>
Do not audit attempts to send mail_client packets.
</summary>
@@ -39204,7 +31703,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mail_client_packets" lineno="46408">
+<interface name="corenet_receive_mail_client_packets" lineno="36226">
<summary>
Receive mail_client packets.
</summary>
@@ -39215,7 +31714,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46427">
+<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="36245">
<summary>
Do not audit attempts to receive mail_client packets.
</summary>
@@ -39226,7 +31725,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mail_client_packets" lineno="46446">
+<interface name="corenet_sendrecv_mail_client_packets" lineno="36264">
<summary>
Send and receive mail_client packets.
</summary>
@@ -39237,7 +31736,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46462">
+<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="36280">
<summary>
Do not audit attempts to send and receive mail_client packets.
</summary>
@@ -39248,7 +31747,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mail_client_packets" lineno="46477">
+<interface name="corenet_relabelto_mail_client_packets" lineno="36295">
<summary>
Relabel packets to mail_client the packet type.
</summary>
@@ -39258,7 +31757,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mail_server_packets" lineno="46497">
+<interface name="corenet_send_mail_server_packets" lineno="36315">
<summary>
Send mail_server packets.
</summary>
@@ -39269,7 +31768,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46516">
+<interface name="corenet_dontaudit_send_mail_server_packets" lineno="36334">
<summary>
Do not audit attempts to send mail_server packets.
</summary>
@@ -39280,7 +31779,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mail_server_packets" lineno="46535">
+<interface name="corenet_receive_mail_server_packets" lineno="36353">
<summary>
Receive mail_server packets.
</summary>
@@ -39291,7 +31790,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46554">
+<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="36372">
<summary>
Do not audit attempts to receive mail_server packets.
</summary>
@@ -39302,7 +31801,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mail_server_packets" lineno="46573">
+<interface name="corenet_sendrecv_mail_server_packets" lineno="36391">
<summary>
Send and receive mail_server packets.
</summary>
@@ -39313,7 +31812,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46589">
+<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="36407">
<summary>
Do not audit attempts to send and receive mail_server packets.
</summary>
@@ -39324,7 +31823,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mail_server_packets" lineno="46604">
+<interface name="corenet_relabelto_mail_server_packets" lineno="36422">
<summary>
Relabel packets to mail_server the packet type.
</summary>
@@ -39334,85 +31833,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46626">
-<summary>
-Send and receive TCP traffic on the matahari port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_matahari_port" lineno="46641">
-<summary>
-Send UDP traffic on the matahari port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46656">
-<summary>
-Do not audit attempts to send UDP traffic on the matahari port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_matahari_port" lineno="46671">
-<summary>
-Receive UDP traffic on the matahari port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46686">
-<summary>
-Do not audit attempts to receive UDP traffic on the matahari port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_matahari_port" lineno="46701">
-<summary>
-Send and receive UDP traffic on the matahari port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46717">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the matahari port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_matahari_port" lineno="46732">
+<interface name="corenet_tcp_bind_matahari_port" lineno="36444">
<summary>
Bind TCP sockets to the matahari port.
</summary>
@@ -39423,7 +31844,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_matahari_port" lineno="46752">
+<interface name="corenet_udp_bind_matahari_port" lineno="36464">
<summary>
Bind UDP sockets to the matahari port.
</summary>
@@ -39434,7 +31855,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_matahari_port" lineno="46771">
+<interface name="corenet_tcp_connect_matahari_port" lineno="36483">
<summary>
Make a TCP connection to the matahari port.
</summary>
@@ -39444,7 +31865,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_matahari_client_packets" lineno="46791">
+<interface name="corenet_send_matahari_client_packets" lineno="36503">
<summary>
Send matahari_client packets.
</summary>
@@ -39455,7 +31876,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46810">
+<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="36522">
<summary>
Do not audit attempts to send matahari_client packets.
</summary>
@@ -39466,7 +31887,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_matahari_client_packets" lineno="46829">
+<interface name="corenet_receive_matahari_client_packets" lineno="36541">
<summary>
Receive matahari_client packets.
</summary>
@@ -39477,7 +31898,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46848">
+<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="36560">
<summary>
Do not audit attempts to receive matahari_client packets.
</summary>
@@ -39488,7 +31909,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_matahari_client_packets" lineno="46867">
+<interface name="corenet_sendrecv_matahari_client_packets" lineno="36579">
<summary>
Send and receive matahari_client packets.
</summary>
@@ -39499,7 +31920,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46883">
+<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="36595">
<summary>
Do not audit attempts to send and receive matahari_client packets.
</summary>
@@ -39510,7 +31931,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_matahari_client_packets" lineno="46898">
+<interface name="corenet_relabelto_matahari_client_packets" lineno="36610">
<summary>
Relabel packets to matahari_client the packet type.
</summary>
@@ -39520,7 +31941,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_matahari_server_packets" lineno="46918">
+<interface name="corenet_send_matahari_server_packets" lineno="36630">
<summary>
Send matahari_server packets.
</summary>
@@ -39531,7 +31952,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46937">
+<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="36649">
<summary>
Do not audit attempts to send matahari_server packets.
</summary>
@@ -39542,7 +31963,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_matahari_server_packets" lineno="46956">
+<interface name="corenet_receive_matahari_server_packets" lineno="36668">
<summary>
Receive matahari_server packets.
</summary>
@@ -39553,7 +31974,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46975">
+<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="36687">
<summary>
Do not audit attempts to receive matahari_server packets.
</summary>
@@ -39564,7 +31985,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_matahari_server_packets" lineno="46994">
+<interface name="corenet_sendrecv_matahari_server_packets" lineno="36706">
<summary>
Send and receive matahari_server packets.
</summary>
@@ -39575,7 +31996,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="47010">
+<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="36722">
<summary>
Do not audit attempts to send and receive matahari_server packets.
</summary>
@@ -39586,7 +32007,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_matahari_server_packets" lineno="47025">
+<interface name="corenet_relabelto_matahari_server_packets" lineno="36737">
<summary>
Relabel packets to matahari_server the packet type.
</summary>
@@ -39596,85 +32017,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_memcache_port" lineno="47047">
-<summary>
-Send and receive TCP traffic on the memcache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_memcache_port" lineno="47062">
-<summary>
-Send UDP traffic on the memcache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="47077">
-<summary>
-Do not audit attempts to send UDP traffic on the memcache port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_memcache_port" lineno="47092">
-<summary>
-Receive UDP traffic on the memcache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="47107">
-<summary>
-Do not audit attempts to receive UDP traffic on the memcache port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_memcache_port" lineno="47122">
-<summary>
-Send and receive UDP traffic on the memcache port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="47138">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the memcache port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_memcache_port" lineno="47153">
+<interface name="corenet_tcp_bind_memcache_port" lineno="36759">
<summary>
Bind TCP sockets to the memcache port.
</summary>
@@ -39685,7 +32028,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_memcache_port" lineno="47173">
+<interface name="corenet_udp_bind_memcache_port" lineno="36779">
<summary>
Bind UDP sockets to the memcache port.
</summary>
@@ -39696,7 +32039,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_memcache_port" lineno="47192">
+<interface name="corenet_tcp_connect_memcache_port" lineno="36798">
<summary>
Make a TCP connection to the memcache port.
</summary>
@@ -39706,7 +32049,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_memcache_client_packets" lineno="47212">
+<interface name="corenet_send_memcache_client_packets" lineno="36818">
<summary>
Send memcache_client packets.
</summary>
@@ -39717,7 +32060,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47231">
+<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="36837">
<summary>
Do not audit attempts to send memcache_client packets.
</summary>
@@ -39728,7 +32071,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_memcache_client_packets" lineno="47250">
+<interface name="corenet_receive_memcache_client_packets" lineno="36856">
<summary>
Receive memcache_client packets.
</summary>
@@ -39739,7 +32082,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47269">
+<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="36875">
<summary>
Do not audit attempts to receive memcache_client packets.
</summary>
@@ -39750,7 +32093,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_memcache_client_packets" lineno="47288">
+<interface name="corenet_sendrecv_memcache_client_packets" lineno="36894">
<summary>
Send and receive memcache_client packets.
</summary>
@@ -39761,7 +32104,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47304">
+<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="36910">
<summary>
Do not audit attempts to send and receive memcache_client packets.
</summary>
@@ -39772,7 +32115,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_memcache_client_packets" lineno="47319">
+<interface name="corenet_relabelto_memcache_client_packets" lineno="36925">
<summary>
Relabel packets to memcache_client the packet type.
</summary>
@@ -39782,7 +32125,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_memcache_server_packets" lineno="47339">
+<interface name="corenet_send_memcache_server_packets" lineno="36945">
<summary>
Send memcache_server packets.
</summary>
@@ -39793,7 +32136,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47358">
+<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="36964">
<summary>
Do not audit attempts to send memcache_server packets.
</summary>
@@ -39804,7 +32147,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_memcache_server_packets" lineno="47377">
+<interface name="corenet_receive_memcache_server_packets" lineno="36983">
<summary>
Receive memcache_server packets.
</summary>
@@ -39815,7 +32158,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47396">
+<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="37002">
<summary>
Do not audit attempts to receive memcache_server packets.
</summary>
@@ -39826,7 +32169,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_memcache_server_packets" lineno="47415">
+<interface name="corenet_sendrecv_memcache_server_packets" lineno="37021">
<summary>
Send and receive memcache_server packets.
</summary>
@@ -39837,7 +32180,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47431">
+<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="37037">
<summary>
Do not audit attempts to send and receive memcache_server packets.
</summary>
@@ -39848,7 +32191,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_memcache_server_packets" lineno="47446">
+<interface name="corenet_relabelto_memcache_server_packets" lineno="37052">
<summary>
Relabel packets to memcache_server the packet type.
</summary>
@@ -39858,85 +32201,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_milter_port" lineno="47468">
-<summary>
-Send and receive TCP traffic on the milter port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_milter_port" lineno="47483">
-<summary>
-Send UDP traffic on the milter port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47498">
-<summary>
-Do not audit attempts to send UDP traffic on the milter port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_milter_port" lineno="47513">
-<summary>
-Receive UDP traffic on the milter port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47528">
-<summary>
-Do not audit attempts to receive UDP traffic on the milter port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_milter_port" lineno="47543">
-<summary>
-Send and receive UDP traffic on the milter port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47559">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the milter port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_milter_port" lineno="47574">
+<interface name="corenet_tcp_bind_milter_port" lineno="37074">
<summary>
Bind TCP sockets to the milter port.
</summary>
@@ -39947,7 +32212,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_milter_port" lineno="47594">
+<interface name="corenet_udp_bind_milter_port" lineno="37094">
<summary>
Bind UDP sockets to the milter port.
</summary>
@@ -39958,7 +32223,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_milter_port" lineno="47613">
+<interface name="corenet_tcp_connect_milter_port" lineno="37113">
<summary>
Make a TCP connection to the milter port.
</summary>
@@ -39968,7 +32233,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_milter_client_packets" lineno="47633">
+<interface name="corenet_send_milter_client_packets" lineno="37133">
<summary>
Send milter_client packets.
</summary>
@@ -39979,7 +32244,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47652">
+<interface name="corenet_dontaudit_send_milter_client_packets" lineno="37152">
<summary>
Do not audit attempts to send milter_client packets.
</summary>
@@ -39990,7 +32255,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_milter_client_packets" lineno="47671">
+<interface name="corenet_receive_milter_client_packets" lineno="37171">
<summary>
Receive milter_client packets.
</summary>
@@ -40001,7 +32266,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47690">
+<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="37190">
<summary>
Do not audit attempts to receive milter_client packets.
</summary>
@@ -40012,7 +32277,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_milter_client_packets" lineno="47709">
+<interface name="corenet_sendrecv_milter_client_packets" lineno="37209">
<summary>
Send and receive milter_client packets.
</summary>
@@ -40023,7 +32288,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47725">
+<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="37225">
<summary>
Do not audit attempts to send and receive milter_client packets.
</summary>
@@ -40034,7 +32299,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_milter_client_packets" lineno="47740">
+<interface name="corenet_relabelto_milter_client_packets" lineno="37240">
<summary>
Relabel packets to milter_client the packet type.
</summary>
@@ -40044,7 +32309,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_milter_server_packets" lineno="47760">
+<interface name="corenet_send_milter_server_packets" lineno="37260">
<summary>
Send milter_server packets.
</summary>
@@ -40055,7 +32320,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47779">
+<interface name="corenet_dontaudit_send_milter_server_packets" lineno="37279">
<summary>
Do not audit attempts to send milter_server packets.
</summary>
@@ -40066,7 +32331,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_milter_server_packets" lineno="47798">
+<interface name="corenet_receive_milter_server_packets" lineno="37298">
<summary>
Receive milter_server packets.
</summary>
@@ -40077,7 +32342,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47817">
+<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="37317">
<summary>
Do not audit attempts to receive milter_server packets.
</summary>
@@ -40088,7 +32353,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_milter_server_packets" lineno="47836">
+<interface name="corenet_sendrecv_milter_server_packets" lineno="37336">
<summary>
Send and receive milter_server packets.
</summary>
@@ -40099,7 +32364,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47852">
+<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="37352">
<summary>
Do not audit attempts to send and receive milter_server packets.
</summary>
@@ -40110,7 +32375,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_milter_server_packets" lineno="47867">
+<interface name="corenet_relabelto_milter_server_packets" lineno="37367">
<summary>
Relabel packets to milter_server the packet type.
</summary>
@@ -40120,85 +32385,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47889">
-<summary>
-Send and receive TCP traffic on the mmcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mmcc_port" lineno="47904">
-<summary>
-Send UDP traffic on the mmcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47919">
-<summary>
-Do not audit attempts to send UDP traffic on the mmcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mmcc_port" lineno="47934">
-<summary>
-Receive UDP traffic on the mmcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47949">
-<summary>
-Do not audit attempts to receive UDP traffic on the mmcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47964">
-<summary>
-Send and receive UDP traffic on the mmcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47980">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mmcc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mmcc_port" lineno="47995">
+<interface name="corenet_tcp_bind_mmcc_port" lineno="37389">
<summary>
Bind TCP sockets to the mmcc port.
</summary>
@@ -40209,7 +32396,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mmcc_port" lineno="48015">
+<interface name="corenet_udp_bind_mmcc_port" lineno="37409">
<summary>
Bind UDP sockets to the mmcc port.
</summary>
@@ -40220,7 +32407,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mmcc_port" lineno="48034">
+<interface name="corenet_tcp_connect_mmcc_port" lineno="37428">
<summary>
Make a TCP connection to the mmcc port.
</summary>
@@ -40230,7 +32417,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mmcc_client_packets" lineno="48054">
+<interface name="corenet_send_mmcc_client_packets" lineno="37448">
<summary>
Send mmcc_client packets.
</summary>
@@ -40241,7 +32428,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="48073">
+<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="37467">
<summary>
Do not audit attempts to send mmcc_client packets.
</summary>
@@ -40252,7 +32439,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mmcc_client_packets" lineno="48092">
+<interface name="corenet_receive_mmcc_client_packets" lineno="37486">
<summary>
Receive mmcc_client packets.
</summary>
@@ -40263,7 +32450,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="48111">
+<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="37505">
<summary>
Do not audit attempts to receive mmcc_client packets.
</summary>
@@ -40274,7 +32461,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mmcc_client_packets" lineno="48130">
+<interface name="corenet_sendrecv_mmcc_client_packets" lineno="37524">
<summary>
Send and receive mmcc_client packets.
</summary>
@@ -40285,7 +32472,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48146">
+<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="37540">
<summary>
Do not audit attempts to send and receive mmcc_client packets.
</summary>
@@ -40296,7 +32483,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mmcc_client_packets" lineno="48161">
+<interface name="corenet_relabelto_mmcc_client_packets" lineno="37555">
<summary>
Relabel packets to mmcc_client the packet type.
</summary>
@@ -40306,7 +32493,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mmcc_server_packets" lineno="48181">
+<interface name="corenet_send_mmcc_server_packets" lineno="37575">
<summary>
Send mmcc_server packets.
</summary>
@@ -40317,7 +32504,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48200">
+<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="37594">
<summary>
Do not audit attempts to send mmcc_server packets.
</summary>
@@ -40328,7 +32515,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mmcc_server_packets" lineno="48219">
+<interface name="corenet_receive_mmcc_server_packets" lineno="37613">
<summary>
Receive mmcc_server packets.
</summary>
@@ -40339,7 +32526,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48238">
+<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="37632">
<summary>
Do not audit attempts to receive mmcc_server packets.
</summary>
@@ -40350,7 +32537,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48257">
+<interface name="corenet_sendrecv_mmcc_server_packets" lineno="37651">
<summary>
Send and receive mmcc_server packets.
</summary>
@@ -40361,7 +32548,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48273">
+<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="37667">
<summary>
Do not audit attempts to send and receive mmcc_server packets.
</summary>
@@ -40372,7 +32559,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mmcc_server_packets" lineno="48288">
+<interface name="corenet_relabelto_mmcc_server_packets" lineno="37682">
<summary>
Relabel packets to mmcc_server the packet type.
</summary>
@@ -40382,85 +32569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mon_port" lineno="48310">
-<summary>
-Send and receive TCP traffic on the mon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mon_port" lineno="48325">
-<summary>
-Send UDP traffic on the mon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48340">
-<summary>
-Do not audit attempts to send UDP traffic on the mon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mon_port" lineno="48355">
-<summary>
-Receive UDP traffic on the mon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48370">
-<summary>
-Do not audit attempts to receive UDP traffic on the mon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mon_port" lineno="48385">
-<summary>
-Send and receive UDP traffic on the mon port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48401">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mon port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mon_port" lineno="48416">
+<interface name="corenet_tcp_bind_mon_port" lineno="37704">
<summary>
Bind TCP sockets to the mon port.
</summary>
@@ -40471,7 +32580,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mon_port" lineno="48436">
+<interface name="corenet_udp_bind_mon_port" lineno="37724">
<summary>
Bind UDP sockets to the mon port.
</summary>
@@ -40482,7 +32591,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mon_port" lineno="48455">
+<interface name="corenet_tcp_connect_mon_port" lineno="37743">
<summary>
Make a TCP connection to the mon port.
</summary>
@@ -40492,7 +32601,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mon_client_packets" lineno="48475">
+<interface name="corenet_send_mon_client_packets" lineno="37763">
<summary>
Send mon_client packets.
</summary>
@@ -40503,7 +32612,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48494">
+<interface name="corenet_dontaudit_send_mon_client_packets" lineno="37782">
<summary>
Do not audit attempts to send mon_client packets.
</summary>
@@ -40514,7 +32623,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mon_client_packets" lineno="48513">
+<interface name="corenet_receive_mon_client_packets" lineno="37801">
<summary>
Receive mon_client packets.
</summary>
@@ -40525,7 +32634,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48532">
+<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="37820">
<summary>
Do not audit attempts to receive mon_client packets.
</summary>
@@ -40536,7 +32645,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mon_client_packets" lineno="48551">
+<interface name="corenet_sendrecv_mon_client_packets" lineno="37839">
<summary>
Send and receive mon_client packets.
</summary>
@@ -40547,7 +32656,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48567">
+<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="37855">
<summary>
Do not audit attempts to send and receive mon_client packets.
</summary>
@@ -40558,7 +32667,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mon_client_packets" lineno="48582">
+<interface name="corenet_relabelto_mon_client_packets" lineno="37870">
<summary>
Relabel packets to mon_client the packet type.
</summary>
@@ -40568,7 +32677,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mon_server_packets" lineno="48602">
+<interface name="corenet_send_mon_server_packets" lineno="37890">
<summary>
Send mon_server packets.
</summary>
@@ -40579,7 +32688,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48621">
+<interface name="corenet_dontaudit_send_mon_server_packets" lineno="37909">
<summary>
Do not audit attempts to send mon_server packets.
</summary>
@@ -40590,7 +32699,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mon_server_packets" lineno="48640">
+<interface name="corenet_receive_mon_server_packets" lineno="37928">
<summary>
Receive mon_server packets.
</summary>
@@ -40601,7 +32710,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48659">
+<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="37947">
<summary>
Do not audit attempts to receive mon_server packets.
</summary>
@@ -40612,7 +32721,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mon_server_packets" lineno="48678">
+<interface name="corenet_sendrecv_mon_server_packets" lineno="37966">
<summary>
Send and receive mon_server packets.
</summary>
@@ -40623,7 +32732,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48694">
+<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="37982">
<summary>
Do not audit attempts to send and receive mon_server packets.
</summary>
@@ -40634,7 +32743,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mon_server_packets" lineno="48709">
+<interface name="corenet_relabelto_mon_server_packets" lineno="37997">
<summary>
Relabel packets to mon_server the packet type.
</summary>
@@ -40644,85 +32753,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_monit_port" lineno="48731">
-<summary>
-Send and receive TCP traffic on the monit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_monit_port" lineno="48746">
-<summary>
-Send UDP traffic on the monit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48761">
-<summary>
-Do not audit attempts to send UDP traffic on the monit port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_monit_port" lineno="48776">
-<summary>
-Receive UDP traffic on the monit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48791">
-<summary>
-Do not audit attempts to receive UDP traffic on the monit port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_monit_port" lineno="48806">
-<summary>
-Send and receive UDP traffic on the monit port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48822">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the monit port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_monit_port" lineno="48837">
+<interface name="corenet_tcp_bind_monit_port" lineno="38019">
<summary>
Bind TCP sockets to the monit port.
</summary>
@@ -40733,7 +32764,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_monit_port" lineno="48857">
+<interface name="corenet_udp_bind_monit_port" lineno="38039">
<summary>
Bind UDP sockets to the monit port.
</summary>
@@ -40744,7 +32775,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_monit_port" lineno="48876">
+<interface name="corenet_tcp_connect_monit_port" lineno="38058">
<summary>
Make a TCP connection to the monit port.
</summary>
@@ -40754,7 +32785,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monit_client_packets" lineno="48896">
+<interface name="corenet_send_monit_client_packets" lineno="38078">
<summary>
Send monit_client packets.
</summary>
@@ -40765,7 +32796,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48915">
+<interface name="corenet_dontaudit_send_monit_client_packets" lineno="38097">
<summary>
Do not audit attempts to send monit_client packets.
</summary>
@@ -40776,7 +32807,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monit_client_packets" lineno="48934">
+<interface name="corenet_receive_monit_client_packets" lineno="38116">
<summary>
Receive monit_client packets.
</summary>
@@ -40787,7 +32818,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48953">
+<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="38135">
<summary>
Do not audit attempts to receive monit_client packets.
</summary>
@@ -40798,7 +32829,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monit_client_packets" lineno="48972">
+<interface name="corenet_sendrecv_monit_client_packets" lineno="38154">
<summary>
Send and receive monit_client packets.
</summary>
@@ -40809,7 +32840,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48988">
+<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="38170">
<summary>
Do not audit attempts to send and receive monit_client packets.
</summary>
@@ -40820,7 +32851,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monit_client_packets" lineno="49003">
+<interface name="corenet_relabelto_monit_client_packets" lineno="38185">
<summary>
Relabel packets to monit_client the packet type.
</summary>
@@ -40830,7 +32861,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monit_server_packets" lineno="49023">
+<interface name="corenet_send_monit_server_packets" lineno="38205">
<summary>
Send monit_server packets.
</summary>
@@ -40841,7 +32872,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monit_server_packets" lineno="49042">
+<interface name="corenet_dontaudit_send_monit_server_packets" lineno="38224">
<summary>
Do not audit attempts to send monit_server packets.
</summary>
@@ -40852,7 +32883,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monit_server_packets" lineno="49061">
+<interface name="corenet_receive_monit_server_packets" lineno="38243">
<summary>
Receive monit_server packets.
</summary>
@@ -40863,7 +32894,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="49080">
+<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="38262">
<summary>
Do not audit attempts to receive monit_server packets.
</summary>
@@ -40874,7 +32905,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monit_server_packets" lineno="49099">
+<interface name="corenet_sendrecv_monit_server_packets" lineno="38281">
<summary>
Send and receive monit_server packets.
</summary>
@@ -40885,7 +32916,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="49115">
+<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="38297">
<summary>
Do not audit attempts to send and receive monit_server packets.
</summary>
@@ -40896,7 +32927,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monit_server_packets" lineno="49130">
+<interface name="corenet_relabelto_monit_server_packets" lineno="38312">
<summary>
Relabel packets to monit_server the packet type.
</summary>
@@ -40906,85 +32937,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49152">
-<summary>
-Send and receive TCP traffic on the monopd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_monopd_port" lineno="49167">
-<summary>
-Send UDP traffic on the monopd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49182">
-<summary>
-Do not audit attempts to send UDP traffic on the monopd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_monopd_port" lineno="49197">
-<summary>
-Receive UDP traffic on the monopd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49212">
-<summary>
-Do not audit attempts to receive UDP traffic on the monopd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_monopd_port" lineno="49227">
-<summary>
-Send and receive UDP traffic on the monopd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49243">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the monopd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_monopd_port" lineno="49258">
+<interface name="corenet_tcp_bind_monopd_port" lineno="38334">
<summary>
Bind TCP sockets to the monopd port.
</summary>
@@ -40995,7 +32948,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_monopd_port" lineno="49278">
+<interface name="corenet_udp_bind_monopd_port" lineno="38354">
<summary>
Bind UDP sockets to the monopd port.
</summary>
@@ -41006,7 +32959,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_monopd_port" lineno="49297">
+<interface name="corenet_tcp_connect_monopd_port" lineno="38373">
<summary>
Make a TCP connection to the monopd port.
</summary>
@@ -41016,7 +32969,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monopd_client_packets" lineno="49317">
+<interface name="corenet_send_monopd_client_packets" lineno="38393">
<summary>
Send monopd_client packets.
</summary>
@@ -41027,7 +32980,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49336">
+<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="38412">
<summary>
Do not audit attempts to send monopd_client packets.
</summary>
@@ -41038,7 +32991,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monopd_client_packets" lineno="49355">
+<interface name="corenet_receive_monopd_client_packets" lineno="38431">
<summary>
Receive monopd_client packets.
</summary>
@@ -41049,7 +33002,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49374">
+<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="38450">
<summary>
Do not audit attempts to receive monopd_client packets.
</summary>
@@ -41060,7 +33013,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monopd_client_packets" lineno="49393">
+<interface name="corenet_sendrecv_monopd_client_packets" lineno="38469">
<summary>
Send and receive monopd_client packets.
</summary>
@@ -41071,7 +33024,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49409">
+<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="38485">
<summary>
Do not audit attempts to send and receive monopd_client packets.
</summary>
@@ -41082,7 +33035,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monopd_client_packets" lineno="49424">
+<interface name="corenet_relabelto_monopd_client_packets" lineno="38500">
<summary>
Relabel packets to monopd_client the packet type.
</summary>
@@ -41092,7 +33045,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monopd_server_packets" lineno="49444">
+<interface name="corenet_send_monopd_server_packets" lineno="38520">
<summary>
Send monopd_server packets.
</summary>
@@ -41103,7 +33056,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49463">
+<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="38539">
<summary>
Do not audit attempts to send monopd_server packets.
</summary>
@@ -41114,7 +33067,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monopd_server_packets" lineno="49482">
+<interface name="corenet_receive_monopd_server_packets" lineno="38558">
<summary>
Receive monopd_server packets.
</summary>
@@ -41125,7 +33078,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49501">
+<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="38577">
<summary>
Do not audit attempts to receive monopd_server packets.
</summary>
@@ -41136,7 +33089,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monopd_server_packets" lineno="49520">
+<interface name="corenet_sendrecv_monopd_server_packets" lineno="38596">
<summary>
Send and receive monopd_server packets.
</summary>
@@ -41147,7 +33100,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49536">
+<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="38612">
<summary>
Do not audit attempts to send and receive monopd_server packets.
</summary>
@@ -41158,7 +33111,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monopd_server_packets" lineno="49551">
+<interface name="corenet_relabelto_monopd_server_packets" lineno="38627">
<summary>
Relabel packets to monopd_server the packet type.
</summary>
@@ -41168,85 +33121,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49573">
-<summary>
-Send and receive TCP traffic on the mountd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mountd_port" lineno="49588">
-<summary>
-Send UDP traffic on the mountd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49603">
-<summary>
-Do not audit attempts to send UDP traffic on the mountd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mountd_port" lineno="49618">
-<summary>
-Receive UDP traffic on the mountd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49633">
-<summary>
-Do not audit attempts to receive UDP traffic on the mountd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mountd_port" lineno="49648">
-<summary>
-Send and receive UDP traffic on the mountd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49664">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mountd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mountd_port" lineno="49679">
+<interface name="corenet_tcp_bind_mountd_port" lineno="38649">
<summary>
Bind TCP sockets to the mountd port.
</summary>
@@ -41257,7 +33132,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mountd_port" lineno="49699">
+<interface name="corenet_udp_bind_mountd_port" lineno="38669">
<summary>
Bind UDP sockets to the mountd port.
</summary>
@@ -41268,7 +33143,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mountd_port" lineno="49718">
+<interface name="corenet_tcp_connect_mountd_port" lineno="38688">
<summary>
Make a TCP connection to the mountd port.
</summary>
@@ -41278,7 +33153,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mountd_client_packets" lineno="49738">
+<interface name="corenet_send_mountd_client_packets" lineno="38708">
<summary>
Send mountd_client packets.
</summary>
@@ -41289,7 +33164,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49757">
+<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="38727">
<summary>
Do not audit attempts to send mountd_client packets.
</summary>
@@ -41300,7 +33175,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mountd_client_packets" lineno="49776">
+<interface name="corenet_receive_mountd_client_packets" lineno="38746">
<summary>
Receive mountd_client packets.
</summary>
@@ -41311,7 +33186,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49795">
+<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="38765">
<summary>
Do not audit attempts to receive mountd_client packets.
</summary>
@@ -41322,7 +33197,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mountd_client_packets" lineno="49814">
+<interface name="corenet_sendrecv_mountd_client_packets" lineno="38784">
<summary>
Send and receive mountd_client packets.
</summary>
@@ -41333,7 +33208,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49830">
+<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="38800">
<summary>
Do not audit attempts to send and receive mountd_client packets.
</summary>
@@ -41344,7 +33219,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mountd_client_packets" lineno="49845">
+<interface name="corenet_relabelto_mountd_client_packets" lineno="38815">
<summary>
Relabel packets to mountd_client the packet type.
</summary>
@@ -41354,7 +33229,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mountd_server_packets" lineno="49865">
+<interface name="corenet_send_mountd_server_packets" lineno="38835">
<summary>
Send mountd_server packets.
</summary>
@@ -41365,7 +33240,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49884">
+<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="38854">
<summary>
Do not audit attempts to send mountd_server packets.
</summary>
@@ -41376,7 +33251,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mountd_server_packets" lineno="49903">
+<interface name="corenet_receive_mountd_server_packets" lineno="38873">
<summary>
Receive mountd_server packets.
</summary>
@@ -41387,7 +33262,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49922">
+<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="38892">
<summary>
Do not audit attempts to receive mountd_server packets.
</summary>
@@ -41398,7 +33273,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mountd_server_packets" lineno="49941">
+<interface name="corenet_sendrecv_mountd_server_packets" lineno="38911">
<summary>
Send and receive mountd_server packets.
</summary>
@@ -41409,7 +33284,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49957">
+<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="38927">
<summary>
Do not audit attempts to send and receive mountd_server packets.
</summary>
@@ -41420,7 +33295,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mountd_server_packets" lineno="49972">
+<interface name="corenet_relabelto_mountd_server_packets" lineno="38942">
<summary>
Relabel packets to mountd_server the packet type.
</summary>
@@ -41430,85 +33305,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49994">
-<summary>
-Send and receive TCP traffic on the movaz_ssc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_movaz_ssc_port" lineno="50009">
-<summary>
-Send UDP traffic on the movaz_ssc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="50024">
-<summary>
-Do not audit attempts to send UDP traffic on the movaz_ssc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_movaz_ssc_port" lineno="50039">
-<summary>
-Receive UDP traffic on the movaz_ssc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="50054">
-<summary>
-Do not audit attempts to receive UDP traffic on the movaz_ssc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="50069">
-<summary>
-Send and receive UDP traffic on the movaz_ssc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="50085">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the movaz_ssc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="50100">
+<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="38964">
<summary>
Bind TCP sockets to the movaz_ssc port.
</summary>
@@ -41519,7 +33316,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_movaz_ssc_port" lineno="50120">
+<interface name="corenet_udp_bind_movaz_ssc_port" lineno="38984">
<summary>
Bind UDP sockets to the movaz_ssc port.
</summary>
@@ -41530,7 +33327,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="50139">
+<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="39003">
<summary>
Make a TCP connection to the movaz_ssc port.
</summary>
@@ -41540,7 +33337,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_movaz_ssc_client_packets" lineno="50159">
+<interface name="corenet_send_movaz_ssc_client_packets" lineno="39023">
<summary>
Send movaz_ssc_client packets.
</summary>
@@ -41551,7 +33348,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50178">
+<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="39042">
<summary>
Do not audit attempts to send movaz_ssc_client packets.
</summary>
@@ -41562,7 +33359,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50197">
+<interface name="corenet_receive_movaz_ssc_client_packets" lineno="39061">
<summary>
Receive movaz_ssc_client packets.
</summary>
@@ -41573,7 +33370,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50216">
+<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="39080">
<summary>
Do not audit attempts to receive movaz_ssc_client packets.
</summary>
@@ -41584,7 +33381,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50235">
+<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="39099">
<summary>
Send and receive movaz_ssc_client packets.
</summary>
@@ -41595,7 +33392,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50251">
+<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="39115">
<summary>
Do not audit attempts to send and receive movaz_ssc_client packets.
</summary>
@@ -41606,7 +33403,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50266">
+<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="39130">
<summary>
Relabel packets to movaz_ssc_client the packet type.
</summary>
@@ -41616,7 +33413,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_movaz_ssc_server_packets" lineno="50286">
+<interface name="corenet_send_movaz_ssc_server_packets" lineno="39150">
<summary>
Send movaz_ssc_server packets.
</summary>
@@ -41627,7 +33424,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50305">
+<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="39169">
<summary>
Do not audit attempts to send movaz_ssc_server packets.
</summary>
@@ -41638,7 +33435,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50324">
+<interface name="corenet_receive_movaz_ssc_server_packets" lineno="39188">
<summary>
Receive movaz_ssc_server packets.
</summary>
@@ -41649,7 +33446,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50343">
+<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="39207">
<summary>
Do not audit attempts to receive movaz_ssc_server packets.
</summary>
@@ -41660,7 +33457,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50362">
+<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="39226">
<summary>
Send and receive movaz_ssc_server packets.
</summary>
@@ -41671,7 +33468,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50378">
+<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="39242">
<summary>
Do not audit attempts to send and receive movaz_ssc_server packets.
</summary>
@@ -41682,7 +33479,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50393">
+<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="39257">
<summary>
Relabel packets to movaz_ssc_server the packet type.
</summary>
@@ -41692,85 +33489,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50415">
-<summary>
-Send and receive TCP traffic on the mpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mpd_port" lineno="50430">
-<summary>
-Send UDP traffic on the mpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50445">
-<summary>
-Do not audit attempts to send UDP traffic on the mpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mpd_port" lineno="50460">
-<summary>
-Receive UDP traffic on the mpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50475">
-<summary>
-Do not audit attempts to receive UDP traffic on the mpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mpd_port" lineno="50490">
-<summary>
-Send and receive UDP traffic on the mpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50506">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mpd_port" lineno="50521">
+<interface name="corenet_tcp_bind_mpd_port" lineno="39279">
<summary>
Bind TCP sockets to the mpd port.
</summary>
@@ -41781,7 +33500,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mpd_port" lineno="50541">
+<interface name="corenet_udp_bind_mpd_port" lineno="39299">
<summary>
Bind UDP sockets to the mpd port.
</summary>
@@ -41792,7 +33511,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mpd_port" lineno="50560">
+<interface name="corenet_tcp_connect_mpd_port" lineno="39318">
<summary>
Make a TCP connection to the mpd port.
</summary>
@@ -41802,7 +33521,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mpd_client_packets" lineno="50580">
+<interface name="corenet_send_mpd_client_packets" lineno="39338">
<summary>
Send mpd_client packets.
</summary>
@@ -41813,7 +33532,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50599">
+<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="39357">
<summary>
Do not audit attempts to send mpd_client packets.
</summary>
@@ -41824,7 +33543,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mpd_client_packets" lineno="50618">
+<interface name="corenet_receive_mpd_client_packets" lineno="39376">
<summary>
Receive mpd_client packets.
</summary>
@@ -41835,7 +33554,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50637">
+<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="39395">
<summary>
Do not audit attempts to receive mpd_client packets.
</summary>
@@ -41846,7 +33565,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mpd_client_packets" lineno="50656">
+<interface name="corenet_sendrecv_mpd_client_packets" lineno="39414">
<summary>
Send and receive mpd_client packets.
</summary>
@@ -41857,7 +33576,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50672">
+<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="39430">
<summary>
Do not audit attempts to send and receive mpd_client packets.
</summary>
@@ -41868,7 +33587,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mpd_client_packets" lineno="50687">
+<interface name="corenet_relabelto_mpd_client_packets" lineno="39445">
<summary>
Relabel packets to mpd_client the packet type.
</summary>
@@ -41878,7 +33597,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mpd_server_packets" lineno="50707">
+<interface name="corenet_send_mpd_server_packets" lineno="39465">
<summary>
Send mpd_server packets.
</summary>
@@ -41889,7 +33608,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50726">
+<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="39484">
<summary>
Do not audit attempts to send mpd_server packets.
</summary>
@@ -41900,7 +33619,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mpd_server_packets" lineno="50745">
+<interface name="corenet_receive_mpd_server_packets" lineno="39503">
<summary>
Receive mpd_server packets.
</summary>
@@ -41911,7 +33630,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50764">
+<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="39522">
<summary>
Do not audit attempts to receive mpd_server packets.
</summary>
@@ -41922,7 +33641,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mpd_server_packets" lineno="50783">
+<interface name="corenet_sendrecv_mpd_server_packets" lineno="39541">
<summary>
Send and receive mpd_server packets.
</summary>
@@ -41933,7 +33652,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50799">
+<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="39557">
<summary>
Do not audit attempts to send and receive mpd_server packets.
</summary>
@@ -41944,7 +33663,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mpd_server_packets" lineno="50814">
+<interface name="corenet_relabelto_mpd_server_packets" lineno="39572">
<summary>
Relabel packets to mpd_server the packet type.
</summary>
@@ -41954,85 +33673,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50836">
-<summary>
-Send and receive TCP traffic on the msgsrvr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_msgsrvr_port" lineno="50851">
-<summary>
-Send UDP traffic on the msgsrvr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50866">
-<summary>
-Do not audit attempts to send UDP traffic on the msgsrvr port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_msgsrvr_port" lineno="50881">
-<summary>
-Receive UDP traffic on the msgsrvr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50896">
-<summary>
-Do not audit attempts to receive UDP traffic on the msgsrvr port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50911">
-<summary>
-Send and receive UDP traffic on the msgsrvr port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50927">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the msgsrvr port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50942">
+<interface name="corenet_tcp_bind_msgsrvr_port" lineno="39594">
<summary>
Bind TCP sockets to the msgsrvr port.
</summary>
@@ -42043,7 +33684,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_msgsrvr_port" lineno="50962">
+<interface name="corenet_udp_bind_msgsrvr_port" lineno="39614">
<summary>
Bind UDP sockets to the msgsrvr port.
</summary>
@@ -42054,7 +33695,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50981">
+<interface name="corenet_tcp_connect_msgsrvr_port" lineno="39633">
<summary>
Make a TCP connection to the msgsrvr port.
</summary>
@@ -42064,7 +33705,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msgsrvr_client_packets" lineno="51001">
+<interface name="corenet_send_msgsrvr_client_packets" lineno="39653">
<summary>
Send msgsrvr_client packets.
</summary>
@@ -42075,7 +33716,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="51020">
+<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="39672">
<summary>
Do not audit attempts to send msgsrvr_client packets.
</summary>
@@ -42086,7 +33727,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msgsrvr_client_packets" lineno="51039">
+<interface name="corenet_receive_msgsrvr_client_packets" lineno="39691">
<summary>
Receive msgsrvr_client packets.
</summary>
@@ -42097,7 +33738,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="51058">
+<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="39710">
<summary>
Do not audit attempts to receive msgsrvr_client packets.
</summary>
@@ -42108,7 +33749,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="51077">
+<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="39729">
<summary>
Send and receive msgsrvr_client packets.
</summary>
@@ -42119,7 +33760,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="51093">
+<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="39745">
<summary>
Do not audit attempts to send and receive msgsrvr_client packets.
</summary>
@@ -42130,7 +33771,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="51108">
+<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="39760">
<summary>
Relabel packets to msgsrvr_client the packet type.
</summary>
@@ -42140,7 +33781,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msgsrvr_server_packets" lineno="51128">
+<interface name="corenet_send_msgsrvr_server_packets" lineno="39780">
<summary>
Send msgsrvr_server packets.
</summary>
@@ -42151,7 +33792,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51147">
+<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="39799">
<summary>
Do not audit attempts to send msgsrvr_server packets.
</summary>
@@ -42162,7 +33803,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msgsrvr_server_packets" lineno="51166">
+<interface name="corenet_receive_msgsrvr_server_packets" lineno="39818">
<summary>
Receive msgsrvr_server packets.
</summary>
@@ -42173,7 +33814,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51185">
+<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="39837">
<summary>
Do not audit attempts to receive msgsrvr_server packets.
</summary>
@@ -42184,7 +33825,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51204">
+<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="39856">
<summary>
Send and receive msgsrvr_server packets.
</summary>
@@ -42195,7 +33836,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51220">
+<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="39872">
<summary>
Do not audit attempts to send and receive msgsrvr_server packets.
</summary>
@@ -42206,7 +33847,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51235">
+<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="39887">
<summary>
Relabel packets to msgsrvr_server the packet type.
</summary>
@@ -42216,85 +33857,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51257">
-<summary>
-Send and receive TCP traffic on the msnp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_msnp_port" lineno="51272">
-<summary>
-Send UDP traffic on the msnp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51287">
-<summary>
-Do not audit attempts to send UDP traffic on the msnp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_msnp_port" lineno="51302">
-<summary>
-Receive UDP traffic on the msnp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51317">
-<summary>
-Do not audit attempts to receive UDP traffic on the msnp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_msnp_port" lineno="51332">
-<summary>
-Send and receive UDP traffic on the msnp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51348">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the msnp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_msnp_port" lineno="51363">
+<interface name="corenet_tcp_bind_msnp_port" lineno="39909">
<summary>
Bind TCP sockets to the msnp port.
</summary>
@@ -42305,7 +33868,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_msnp_port" lineno="51383">
+<interface name="corenet_udp_bind_msnp_port" lineno="39929">
<summary>
Bind UDP sockets to the msnp port.
</summary>
@@ -42316,7 +33879,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_msnp_port" lineno="51402">
+<interface name="corenet_tcp_connect_msnp_port" lineno="39948">
<summary>
Make a TCP connection to the msnp port.
</summary>
@@ -42326,7 +33889,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msnp_client_packets" lineno="51422">
+<interface name="corenet_send_msnp_client_packets" lineno="39968">
<summary>
Send msnp_client packets.
</summary>
@@ -42337,7 +33900,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51441">
+<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="39987">
<summary>
Do not audit attempts to send msnp_client packets.
</summary>
@@ -42348,7 +33911,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msnp_client_packets" lineno="51460">
+<interface name="corenet_receive_msnp_client_packets" lineno="40006">
<summary>
Receive msnp_client packets.
</summary>
@@ -42359,7 +33922,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51479">
+<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="40025">
<summary>
Do not audit attempts to receive msnp_client packets.
</summary>
@@ -42370,7 +33933,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msnp_client_packets" lineno="51498">
+<interface name="corenet_sendrecv_msnp_client_packets" lineno="40044">
<summary>
Send and receive msnp_client packets.
</summary>
@@ -42381,7 +33944,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51514">
+<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="40060">
<summary>
Do not audit attempts to send and receive msnp_client packets.
</summary>
@@ -42392,7 +33955,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msnp_client_packets" lineno="51529">
+<interface name="corenet_relabelto_msnp_client_packets" lineno="40075">
<summary>
Relabel packets to msnp_client the packet type.
</summary>
@@ -42402,7 +33965,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msnp_server_packets" lineno="51549">
+<interface name="corenet_send_msnp_server_packets" lineno="40095">
<summary>
Send msnp_server packets.
</summary>
@@ -42413,7 +33976,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51568">
+<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="40114">
<summary>
Do not audit attempts to send msnp_server packets.
</summary>
@@ -42424,7 +33987,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msnp_server_packets" lineno="51587">
+<interface name="corenet_receive_msnp_server_packets" lineno="40133">
<summary>
Receive msnp_server packets.
</summary>
@@ -42435,7 +33998,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51606">
+<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="40152">
<summary>
Do not audit attempts to receive msnp_server packets.
</summary>
@@ -42446,7 +34009,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msnp_server_packets" lineno="51625">
+<interface name="corenet_sendrecv_msnp_server_packets" lineno="40171">
<summary>
Send and receive msnp_server packets.
</summary>
@@ -42457,7 +34020,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51641">
+<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="40187">
<summary>
Do not audit attempts to send and receive msnp_server packets.
</summary>
@@ -42468,7 +34031,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msnp_server_packets" lineno="51656">
+<interface name="corenet_relabelto_msnp_server_packets" lineno="40202">
<summary>
Relabel packets to msnp_server the packet type.
</summary>
@@ -42478,85 +34041,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51678">
-<summary>
-Send and receive TCP traffic on the mssql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mssql_port" lineno="51693">
-<summary>
-Send UDP traffic on the mssql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51708">
-<summary>
-Do not audit attempts to send UDP traffic on the mssql port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mssql_port" lineno="51723">
-<summary>
-Receive UDP traffic on the mssql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51738">
-<summary>
-Do not audit attempts to receive UDP traffic on the mssql port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mssql_port" lineno="51753">
-<summary>
-Send and receive UDP traffic on the mssql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51769">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mssql port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mssql_port" lineno="51784">
+<interface name="corenet_tcp_bind_mssql_port" lineno="40224">
<summary>
Bind TCP sockets to the mssql port.
</summary>
@@ -42567,7 +34052,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mssql_port" lineno="51804">
+<interface name="corenet_udp_bind_mssql_port" lineno="40244">
<summary>
Bind UDP sockets to the mssql port.
</summary>
@@ -42578,7 +34063,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mssql_port" lineno="51823">
+<interface name="corenet_tcp_connect_mssql_port" lineno="40263">
<summary>
Make a TCP connection to the mssql port.
</summary>
@@ -42588,7 +34073,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mssql_client_packets" lineno="51843">
+<interface name="corenet_send_mssql_client_packets" lineno="40283">
<summary>
Send mssql_client packets.
</summary>
@@ -42599,7 +34084,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51862">
+<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="40302">
<summary>
Do not audit attempts to send mssql_client packets.
</summary>
@@ -42610,7 +34095,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mssql_client_packets" lineno="51881">
+<interface name="corenet_receive_mssql_client_packets" lineno="40321">
<summary>
Receive mssql_client packets.
</summary>
@@ -42621,7 +34106,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51900">
+<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="40340">
<summary>
Do not audit attempts to receive mssql_client packets.
</summary>
@@ -42632,7 +34117,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mssql_client_packets" lineno="51919">
+<interface name="corenet_sendrecv_mssql_client_packets" lineno="40359">
<summary>
Send and receive mssql_client packets.
</summary>
@@ -42643,7 +34128,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51935">
+<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="40375">
<summary>
Do not audit attempts to send and receive mssql_client packets.
</summary>
@@ -42654,7 +34139,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mssql_client_packets" lineno="51950">
+<interface name="corenet_relabelto_mssql_client_packets" lineno="40390">
<summary>
Relabel packets to mssql_client the packet type.
</summary>
@@ -42664,7 +34149,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mssql_server_packets" lineno="51970">
+<interface name="corenet_send_mssql_server_packets" lineno="40410">
<summary>
Send mssql_server packets.
</summary>
@@ -42675,7 +34160,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51989">
+<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="40429">
<summary>
Do not audit attempts to send mssql_server packets.
</summary>
@@ -42686,7 +34171,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mssql_server_packets" lineno="52008">
+<interface name="corenet_receive_mssql_server_packets" lineno="40448">
<summary>
Receive mssql_server packets.
</summary>
@@ -42697,7 +34182,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="52027">
+<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="40467">
<summary>
Do not audit attempts to receive mssql_server packets.
</summary>
@@ -42708,7 +34193,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mssql_server_packets" lineno="52046">
+<interface name="corenet_sendrecv_mssql_server_packets" lineno="40486">
<summary>
Send and receive mssql_server packets.
</summary>
@@ -42719,7 +34204,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="52062">
+<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="40502">
<summary>
Do not audit attempts to send and receive mssql_server packets.
</summary>
@@ -42730,7 +34215,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mssql_server_packets" lineno="52077">
+<interface name="corenet_relabelto_mssql_server_packets" lineno="40517">
<summary>
Relabel packets to mssql_server the packet type.
</summary>
@@ -42740,85 +34225,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="52099">
-<summary>
-Send and receive TCP traffic on the ms_streaming port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ms_streaming_port" lineno="52114">
-<summary>
-Send UDP traffic on the ms_streaming port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="52129">
-<summary>
-Do not audit attempts to send UDP traffic on the ms_streaming port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ms_streaming_port" lineno="52144">
-<summary>
-Receive UDP traffic on the ms_streaming port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52159">
-<summary>
-Do not audit attempts to receive UDP traffic on the ms_streaming port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52174">
-<summary>
-Send and receive UDP traffic on the ms_streaming port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52190">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ms_streaming port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52205">
+<interface name="corenet_tcp_bind_ms_streaming_port" lineno="40539">
<summary>
Bind TCP sockets to the ms_streaming port.
</summary>
@@ -42829,7 +34236,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ms_streaming_port" lineno="52225">
+<interface name="corenet_udp_bind_ms_streaming_port" lineno="40559">
<summary>
Bind UDP sockets to the ms_streaming port.
</summary>
@@ -42840,7 +34247,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52244">
+<interface name="corenet_tcp_connect_ms_streaming_port" lineno="40578">
<summary>
Make a TCP connection to the ms_streaming port.
</summary>
@@ -42850,7 +34257,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ms_streaming_client_packets" lineno="52264">
+<interface name="corenet_send_ms_streaming_client_packets" lineno="40598">
<summary>
Send ms_streaming_client packets.
</summary>
@@ -42861,7 +34268,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52283">
+<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="40617">
<summary>
Do not audit attempts to send ms_streaming_client packets.
</summary>
@@ -42872,7 +34279,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ms_streaming_client_packets" lineno="52302">
+<interface name="corenet_receive_ms_streaming_client_packets" lineno="40636">
<summary>
Receive ms_streaming_client packets.
</summary>
@@ -42883,7 +34290,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52321">
+<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="40655">
<summary>
Do not audit attempts to receive ms_streaming_client packets.
</summary>
@@ -42894,7 +34301,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52340">
+<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="40674">
<summary>
Send and receive ms_streaming_client packets.
</summary>
@@ -42905,7 +34312,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52356">
+<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="40690">
<summary>
Do not audit attempts to send and receive ms_streaming_client packets.
</summary>
@@ -42916,7 +34323,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52371">
+<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="40705">
<summary>
Relabel packets to ms_streaming_client the packet type.
</summary>
@@ -42926,7 +34333,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ms_streaming_server_packets" lineno="52391">
+<interface name="corenet_send_ms_streaming_server_packets" lineno="40725">
<summary>
Send ms_streaming_server packets.
</summary>
@@ -42937,7 +34344,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52410">
+<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="40744">
<summary>
Do not audit attempts to send ms_streaming_server packets.
</summary>
@@ -42948,7 +34355,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ms_streaming_server_packets" lineno="52429">
+<interface name="corenet_receive_ms_streaming_server_packets" lineno="40763">
<summary>
Receive ms_streaming_server packets.
</summary>
@@ -42959,7 +34366,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52448">
+<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="40782">
<summary>
Do not audit attempts to receive ms_streaming_server packets.
</summary>
@@ -42970,7 +34377,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52467">
+<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="40801">
<summary>
Send and receive ms_streaming_server packets.
</summary>
@@ -42981,7 +34388,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52483">
+<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="40817">
<summary>
Do not audit attempts to send and receive ms_streaming_server packets.
</summary>
@@ -42992,7 +34399,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52498">
+<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="40832">
<summary>
Relabel packets to ms_streaming_server the packet type.
</summary>
@@ -43002,85 +34409,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_munin_port" lineno="52520">
-<summary>
-Send and receive TCP traffic on the munin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_munin_port" lineno="52535">
-<summary>
-Send UDP traffic on the munin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52550">
-<summary>
-Do not audit attempts to send UDP traffic on the munin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_munin_port" lineno="52565">
-<summary>
-Receive UDP traffic on the munin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52580">
-<summary>
-Do not audit attempts to receive UDP traffic on the munin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_munin_port" lineno="52595">
-<summary>
-Send and receive UDP traffic on the munin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52611">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the munin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_munin_port" lineno="52626">
+<interface name="corenet_tcp_bind_munin_port" lineno="40854">
<summary>
Bind TCP sockets to the munin port.
</summary>
@@ -43091,7 +34420,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_munin_port" lineno="52646">
+<interface name="corenet_udp_bind_munin_port" lineno="40874">
<summary>
Bind UDP sockets to the munin port.
</summary>
@@ -43102,7 +34431,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_munin_port" lineno="52665">
+<interface name="corenet_tcp_connect_munin_port" lineno="40893">
<summary>
Make a TCP connection to the munin port.
</summary>
@@ -43112,7 +34441,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_munin_client_packets" lineno="52685">
+<interface name="corenet_send_munin_client_packets" lineno="40913">
<summary>
Send munin_client packets.
</summary>
@@ -43123,7 +34452,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52704">
+<interface name="corenet_dontaudit_send_munin_client_packets" lineno="40932">
<summary>
Do not audit attempts to send munin_client packets.
</summary>
@@ -43134,7 +34463,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_munin_client_packets" lineno="52723">
+<interface name="corenet_receive_munin_client_packets" lineno="40951">
<summary>
Receive munin_client packets.
</summary>
@@ -43145,7 +34474,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52742">
+<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="40970">
<summary>
Do not audit attempts to receive munin_client packets.
</summary>
@@ -43156,7 +34485,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_munin_client_packets" lineno="52761">
+<interface name="corenet_sendrecv_munin_client_packets" lineno="40989">
<summary>
Send and receive munin_client packets.
</summary>
@@ -43167,7 +34496,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52777">
+<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="41005">
<summary>
Do not audit attempts to send and receive munin_client packets.
</summary>
@@ -43178,7 +34507,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_munin_client_packets" lineno="52792">
+<interface name="corenet_relabelto_munin_client_packets" lineno="41020">
<summary>
Relabel packets to munin_client the packet type.
</summary>
@@ -43188,7 +34517,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_munin_server_packets" lineno="52812">
+<interface name="corenet_send_munin_server_packets" lineno="41040">
<summary>
Send munin_server packets.
</summary>
@@ -43199,7 +34528,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52831">
+<interface name="corenet_dontaudit_send_munin_server_packets" lineno="41059">
<summary>
Do not audit attempts to send munin_server packets.
</summary>
@@ -43210,7 +34539,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_munin_server_packets" lineno="52850">
+<interface name="corenet_receive_munin_server_packets" lineno="41078">
<summary>
Receive munin_server packets.
</summary>
@@ -43221,7 +34550,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52869">
+<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="41097">
<summary>
Do not audit attempts to receive munin_server packets.
</summary>
@@ -43232,7 +34561,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_munin_server_packets" lineno="52888">
+<interface name="corenet_sendrecv_munin_server_packets" lineno="41116">
<summary>
Send and receive munin_server packets.
</summary>
@@ -43243,7 +34572,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52904">
+<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="41132">
<summary>
Do not audit attempts to send and receive munin_server packets.
</summary>
@@ -43254,7 +34583,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_munin_server_packets" lineno="52919">
+<interface name="corenet_relabelto_munin_server_packets" lineno="41147">
<summary>
Relabel packets to munin_server the packet type.
</summary>
@@ -43264,85 +34593,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52941">
-<summary>
-Send and receive TCP traffic on the mxi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mxi_port" lineno="52956">
-<summary>
-Send UDP traffic on the mxi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52971">
-<summary>
-Do not audit attempts to send UDP traffic on the mxi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mxi_port" lineno="52986">
-<summary>
-Receive UDP traffic on the mxi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="53001">
-<summary>
-Do not audit attempts to receive UDP traffic on the mxi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mxi_port" lineno="53016">
-<summary>
-Send and receive UDP traffic on the mxi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="53032">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mxi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mxi_port" lineno="53047">
+<interface name="corenet_tcp_bind_mxi_port" lineno="41169">
<summary>
Bind TCP sockets to the mxi port.
</summary>
@@ -43353,7 +34604,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mxi_port" lineno="53067">
+<interface name="corenet_udp_bind_mxi_port" lineno="41189">
<summary>
Bind UDP sockets to the mxi port.
</summary>
@@ -43364,7 +34615,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mxi_port" lineno="53086">
+<interface name="corenet_tcp_connect_mxi_port" lineno="41208">
<summary>
Make a TCP connection to the mxi port.
</summary>
@@ -43374,7 +34625,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mxi_client_packets" lineno="53106">
+<interface name="corenet_send_mxi_client_packets" lineno="41228">
<summary>
Send mxi_client packets.
</summary>
@@ -43385,7 +34636,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="53125">
+<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="41247">
<summary>
Do not audit attempts to send mxi_client packets.
</summary>
@@ -43396,7 +34647,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mxi_client_packets" lineno="53144">
+<interface name="corenet_receive_mxi_client_packets" lineno="41266">
<summary>
Receive mxi_client packets.
</summary>
@@ -43407,7 +34658,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53163">
+<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="41285">
<summary>
Do not audit attempts to receive mxi_client packets.
</summary>
@@ -43418,7 +34669,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mxi_client_packets" lineno="53182">
+<interface name="corenet_sendrecv_mxi_client_packets" lineno="41304">
<summary>
Send and receive mxi_client packets.
</summary>
@@ -43429,7 +34680,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53198">
+<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="41320">
<summary>
Do not audit attempts to send and receive mxi_client packets.
</summary>
@@ -43440,7 +34691,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mxi_client_packets" lineno="53213">
+<interface name="corenet_relabelto_mxi_client_packets" lineno="41335">
<summary>
Relabel packets to mxi_client the packet type.
</summary>
@@ -43450,7 +34701,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mxi_server_packets" lineno="53233">
+<interface name="corenet_send_mxi_server_packets" lineno="41355">
<summary>
Send mxi_server packets.
</summary>
@@ -43461,7 +34712,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53252">
+<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="41374">
<summary>
Do not audit attempts to send mxi_server packets.
</summary>
@@ -43472,7 +34723,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mxi_server_packets" lineno="53271">
+<interface name="corenet_receive_mxi_server_packets" lineno="41393">
<summary>
Receive mxi_server packets.
</summary>
@@ -43483,7 +34734,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53290">
+<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="41412">
<summary>
Do not audit attempts to receive mxi_server packets.
</summary>
@@ -43494,7 +34745,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mxi_server_packets" lineno="53309">
+<interface name="corenet_sendrecv_mxi_server_packets" lineno="41431">
<summary>
Send and receive mxi_server packets.
</summary>
@@ -43505,7 +34756,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53325">
+<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="41447">
<summary>
Do not audit attempts to send and receive mxi_server packets.
</summary>
@@ -43516,7 +34767,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mxi_server_packets" lineno="53340">
+<interface name="corenet_relabelto_mxi_server_packets" lineno="41462">
<summary>
Relabel packets to mxi_server the packet type.
</summary>
@@ -43526,85 +34777,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53362">
-<summary>
-Send and receive TCP traffic on the mysqld port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mysqld_port" lineno="53377">
-<summary>
-Send UDP traffic on the mysqld port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53392">
-<summary>
-Do not audit attempts to send UDP traffic on the mysqld port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mysqld_port" lineno="53407">
-<summary>
-Receive UDP traffic on the mysqld port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53422">
-<summary>
-Do not audit attempts to receive UDP traffic on the mysqld port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53437">
-<summary>
-Send and receive UDP traffic on the mysqld port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53453">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mysqld port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mysqld_port" lineno="53468">
+<interface name="corenet_tcp_bind_mysqld_port" lineno="41484">
<summary>
Bind TCP sockets to the mysqld port.
</summary>
@@ -43615,7 +34788,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mysqld_port" lineno="53488">
+<interface name="corenet_udp_bind_mysqld_port" lineno="41504">
<summary>
Bind UDP sockets to the mysqld port.
</summary>
@@ -43626,7 +34799,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mysqld_port" lineno="53507">
+<interface name="corenet_tcp_connect_mysqld_port" lineno="41523">
<summary>
Make a TCP connection to the mysqld port.
</summary>
@@ -43636,7 +34809,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqld_client_packets" lineno="53527">
+<interface name="corenet_send_mysqld_client_packets" lineno="41543">
<summary>
Send mysqld_client packets.
</summary>
@@ -43647,7 +34820,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53546">
+<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="41562">
<summary>
Do not audit attempts to send mysqld_client packets.
</summary>
@@ -43658,7 +34831,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqld_client_packets" lineno="53565">
+<interface name="corenet_receive_mysqld_client_packets" lineno="41581">
<summary>
Receive mysqld_client packets.
</summary>
@@ -43669,7 +34842,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53584">
+<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="41600">
<summary>
Do not audit attempts to receive mysqld_client packets.
</summary>
@@ -43680,7 +34853,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53603">
+<interface name="corenet_sendrecv_mysqld_client_packets" lineno="41619">
<summary>
Send and receive mysqld_client packets.
</summary>
@@ -43691,7 +34864,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53619">
+<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="41635">
<summary>
Do not audit attempts to send and receive mysqld_client packets.
</summary>
@@ -43702,7 +34875,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqld_client_packets" lineno="53634">
+<interface name="corenet_relabelto_mysqld_client_packets" lineno="41650">
<summary>
Relabel packets to mysqld_client the packet type.
</summary>
@@ -43712,7 +34885,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqld_server_packets" lineno="53654">
+<interface name="corenet_send_mysqld_server_packets" lineno="41670">
<summary>
Send mysqld_server packets.
</summary>
@@ -43723,7 +34896,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53673">
+<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="41689">
<summary>
Do not audit attempts to send mysqld_server packets.
</summary>
@@ -43734,7 +34907,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqld_server_packets" lineno="53692">
+<interface name="corenet_receive_mysqld_server_packets" lineno="41708">
<summary>
Receive mysqld_server packets.
</summary>
@@ -43745,7 +34918,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53711">
+<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="41727">
<summary>
Do not audit attempts to receive mysqld_server packets.
</summary>
@@ -43756,7 +34929,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53730">
+<interface name="corenet_sendrecv_mysqld_server_packets" lineno="41746">
<summary>
Send and receive mysqld_server packets.
</summary>
@@ -43767,7 +34940,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53746">
+<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="41762">
<summary>
Do not audit attempts to send and receive mysqld_server packets.
</summary>
@@ -43778,7 +34951,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqld_server_packets" lineno="53761">
+<interface name="corenet_relabelto_mysqld_server_packets" lineno="41777">
<summary>
Relabel packets to mysqld_server the packet type.
</summary>
@@ -43788,85 +34961,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53783">
-<summary>
-Send and receive TCP traffic on the mysqlmanagerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53798">
-<summary>
-Send UDP traffic on the mysqlmanagerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53813">
-<summary>
-Do not audit attempts to send UDP traffic on the mysqlmanagerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53828">
-<summary>
-Receive UDP traffic on the mysqlmanagerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53843">
-<summary>
-Do not audit attempts to receive UDP traffic on the mysqlmanagerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53858">
-<summary>
-Send and receive UDP traffic on the mysqlmanagerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53874">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the mysqlmanagerd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53889">
+<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="41799">
<summary>
Bind TCP sockets to the mysqlmanagerd port.
</summary>
@@ -43877,7 +34972,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53909">
+<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="41819">
<summary>
Bind UDP sockets to the mysqlmanagerd port.
</summary>
@@ -43888,7 +34983,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53928">
+<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="41838">
<summary>
Make a TCP connection to the mysqlmanagerd port.
</summary>
@@ -43898,7 +34993,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53948">
+<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="41858">
<summary>
Send mysqlmanagerd_client packets.
</summary>
@@ -43909,7 +35004,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53967">
+<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="41877">
<summary>
Do not audit attempts to send mysqlmanagerd_client packets.
</summary>
@@ -43920,7 +35015,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53986">
+<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="41896">
<summary>
Receive mysqlmanagerd_client packets.
</summary>
@@ -43931,7 +35026,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="54005">
+<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="41915">
<summary>
Do not audit attempts to receive mysqlmanagerd_client packets.
</summary>
@@ -43942,7 +35037,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="54024">
+<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="41934">
<summary>
Send and receive mysqlmanagerd_client packets.
</summary>
@@ -43953,7 +35048,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="54040">
+<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="41950">
<summary>
Do not audit attempts to send and receive mysqlmanagerd_client packets.
</summary>
@@ -43964,7 +35059,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="54055">
+<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="41965">
<summary>
Relabel packets to mysqlmanagerd_client the packet type.
</summary>
@@ -43974,7 +35069,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="54075">
+<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="41985">
<summary>
Send mysqlmanagerd_server packets.
</summary>
@@ -43985,7 +35080,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="54094">
+<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="42004">
<summary>
Do not audit attempts to send mysqlmanagerd_server packets.
</summary>
@@ -43996,7 +35091,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="54113">
+<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="42023">
<summary>
Receive mysqlmanagerd_server packets.
</summary>
@@ -44007,7 +35102,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="54132">
+<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="42042">
<summary>
Do not audit attempts to receive mysqlmanagerd_server packets.
</summary>
@@ -44018,7 +35113,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54151">
+<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="42061">
<summary>
Send and receive mysqlmanagerd_server packets.
</summary>
@@ -44029,7 +35124,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54167">
+<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="42077">
<summary>
Do not audit attempts to send and receive mysqlmanagerd_server packets.
</summary>
@@ -44040,7 +35135,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54182">
+<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="42092">
<summary>
Relabel packets to mysqlmanagerd_server the packet type.
</summary>
@@ -44050,85 +35145,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54204">
-<summary>
-Send and receive TCP traffic on the nessus port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_nessus_port" lineno="54219">
-<summary>
-Send UDP traffic on the nessus port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54234">
-<summary>
-Do not audit attempts to send UDP traffic on the nessus port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_nessus_port" lineno="54249">
-<summary>
-Receive UDP traffic on the nessus port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54264">
-<summary>
-Do not audit attempts to receive UDP traffic on the nessus port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_nessus_port" lineno="54279">
-<summary>
-Send and receive UDP traffic on the nessus port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54295">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the nessus port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_nessus_port" lineno="54310">
+<interface name="corenet_tcp_bind_nessus_port" lineno="42114">
<summary>
Bind TCP sockets to the nessus port.
</summary>
@@ -44139,7 +35156,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nessus_port" lineno="54330">
+<interface name="corenet_udp_bind_nessus_port" lineno="42134">
<summary>
Bind UDP sockets to the nessus port.
</summary>
@@ -44150,7 +35167,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nessus_port" lineno="54349">
+<interface name="corenet_tcp_connect_nessus_port" lineno="42153">
<summary>
Make a TCP connection to the nessus port.
</summary>
@@ -44160,7 +35177,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nessus_client_packets" lineno="54369">
+<interface name="corenet_send_nessus_client_packets" lineno="42173">
<summary>
Send nessus_client packets.
</summary>
@@ -44171,7 +35188,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54388">
+<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="42192">
<summary>
Do not audit attempts to send nessus_client packets.
</summary>
@@ -44182,7 +35199,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nessus_client_packets" lineno="54407">
+<interface name="corenet_receive_nessus_client_packets" lineno="42211">
<summary>
Receive nessus_client packets.
</summary>
@@ -44193,7 +35210,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54426">
+<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="42230">
<summary>
Do not audit attempts to receive nessus_client packets.
</summary>
@@ -44204,7 +35221,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nessus_client_packets" lineno="54445">
+<interface name="corenet_sendrecv_nessus_client_packets" lineno="42249">
<summary>
Send and receive nessus_client packets.
</summary>
@@ -44215,7 +35232,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54461">
+<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="42265">
<summary>
Do not audit attempts to send and receive nessus_client packets.
</summary>
@@ -44226,7 +35243,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nessus_client_packets" lineno="54476">
+<interface name="corenet_relabelto_nessus_client_packets" lineno="42280">
<summary>
Relabel packets to nessus_client the packet type.
</summary>
@@ -44236,7 +35253,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nessus_server_packets" lineno="54496">
+<interface name="corenet_send_nessus_server_packets" lineno="42300">
<summary>
Send nessus_server packets.
</summary>
@@ -44247,7 +35264,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54515">
+<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="42319">
<summary>
Do not audit attempts to send nessus_server packets.
</summary>
@@ -44258,7 +35275,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nessus_server_packets" lineno="54534">
+<interface name="corenet_receive_nessus_server_packets" lineno="42338">
<summary>
Receive nessus_server packets.
</summary>
@@ -44269,7 +35286,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54553">
+<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="42357">
<summary>
Do not audit attempts to receive nessus_server packets.
</summary>
@@ -44280,7 +35297,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nessus_server_packets" lineno="54572">
+<interface name="corenet_sendrecv_nessus_server_packets" lineno="42376">
<summary>
Send and receive nessus_server packets.
</summary>
@@ -44291,7 +35308,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54588">
+<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="42392">
<summary>
Do not audit attempts to send and receive nessus_server packets.
</summary>
@@ -44302,7 +35319,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nessus_server_packets" lineno="54603">
+<interface name="corenet_relabelto_nessus_server_packets" lineno="42407">
<summary>
Relabel packets to nessus_server the packet type.
</summary>
@@ -44312,85 +35329,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_netport_port" lineno="54625">
-<summary>
-Send and receive TCP traffic on the netport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_netport_port" lineno="54640">
-<summary>
-Send UDP traffic on the netport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54655">
-<summary>
-Do not audit attempts to send UDP traffic on the netport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_netport_port" lineno="54670">
-<summary>
-Receive UDP traffic on the netport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54685">
-<summary>
-Do not audit attempts to receive UDP traffic on the netport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_netport_port" lineno="54700">
-<summary>
-Send and receive UDP traffic on the netport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54716">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the netport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_netport_port" lineno="54731">
+<interface name="corenet_tcp_bind_netport_port" lineno="42429">
<summary>
Bind TCP sockets to the netport port.
</summary>
@@ -44401,7 +35340,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_netport_port" lineno="54751">
+<interface name="corenet_udp_bind_netport_port" lineno="42449">
<summary>
Bind UDP sockets to the netport port.
</summary>
@@ -44412,7 +35351,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_netport_port" lineno="54770">
+<interface name="corenet_tcp_connect_netport_port" lineno="42468">
<summary>
Make a TCP connection to the netport port.
</summary>
@@ -44422,7 +35361,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netport_client_packets" lineno="54790">
+<interface name="corenet_send_netport_client_packets" lineno="42488">
<summary>
Send netport_client packets.
</summary>
@@ -44433,7 +35372,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54809">
+<interface name="corenet_dontaudit_send_netport_client_packets" lineno="42507">
<summary>
Do not audit attempts to send netport_client packets.
</summary>
@@ -44444,7 +35383,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netport_client_packets" lineno="54828">
+<interface name="corenet_receive_netport_client_packets" lineno="42526">
<summary>
Receive netport_client packets.
</summary>
@@ -44455,7 +35394,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54847">
+<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="42545">
<summary>
Do not audit attempts to receive netport_client packets.
</summary>
@@ -44466,7 +35405,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netport_client_packets" lineno="54866">
+<interface name="corenet_sendrecv_netport_client_packets" lineno="42564">
<summary>
Send and receive netport_client packets.
</summary>
@@ -44477,7 +35416,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54882">
+<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="42580">
<summary>
Do not audit attempts to send and receive netport_client packets.
</summary>
@@ -44488,7 +35427,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netport_client_packets" lineno="54897">
+<interface name="corenet_relabelto_netport_client_packets" lineno="42595">
<summary>
Relabel packets to netport_client the packet type.
</summary>
@@ -44498,7 +35437,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netport_server_packets" lineno="54917">
+<interface name="corenet_send_netport_server_packets" lineno="42615">
<summary>
Send netport_server packets.
</summary>
@@ -44509,7 +35448,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54936">
+<interface name="corenet_dontaudit_send_netport_server_packets" lineno="42634">
<summary>
Do not audit attempts to send netport_server packets.
</summary>
@@ -44520,7 +35459,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netport_server_packets" lineno="54955">
+<interface name="corenet_receive_netport_server_packets" lineno="42653">
<summary>
Receive netport_server packets.
</summary>
@@ -44531,7 +35470,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54974">
+<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="42672">
<summary>
Do not audit attempts to receive netport_server packets.
</summary>
@@ -44542,7 +35481,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netport_server_packets" lineno="54993">
+<interface name="corenet_sendrecv_netport_server_packets" lineno="42691">
<summary>
Send and receive netport_server packets.
</summary>
@@ -44553,7 +35492,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="55009">
+<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="42707">
<summary>
Do not audit attempts to send and receive netport_server packets.
</summary>
@@ -44564,7 +35503,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netport_server_packets" lineno="55024">
+<interface name="corenet_relabelto_netport_server_packets" lineno="42722">
<summary>
Relabel packets to netport_server the packet type.
</summary>
@@ -44574,85 +35513,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="55046">
-<summary>
-Send and receive TCP traffic on the netsupport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_netsupport_port" lineno="55061">
-<summary>
-Send UDP traffic on the netsupport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="55076">
-<summary>
-Do not audit attempts to send UDP traffic on the netsupport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_netsupport_port" lineno="55091">
-<summary>
-Receive UDP traffic on the netsupport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="55106">
-<summary>
-Do not audit attempts to receive UDP traffic on the netsupport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_netsupport_port" lineno="55121">
-<summary>
-Send and receive UDP traffic on the netsupport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="55137">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the netsupport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_netsupport_port" lineno="55152">
+<interface name="corenet_tcp_bind_netsupport_port" lineno="42744">
<summary>
Bind TCP sockets to the netsupport port.
</summary>
@@ -44663,7 +35524,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_netsupport_port" lineno="55172">
+<interface name="corenet_udp_bind_netsupport_port" lineno="42764">
<summary>
Bind UDP sockets to the netsupport port.
</summary>
@@ -44674,7 +35535,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_netsupport_port" lineno="55191">
+<interface name="corenet_tcp_connect_netsupport_port" lineno="42783">
<summary>
Make a TCP connection to the netsupport port.
</summary>
@@ -44684,7 +35545,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netsupport_client_packets" lineno="55211">
+<interface name="corenet_send_netsupport_client_packets" lineno="42803">
<summary>
Send netsupport_client packets.
</summary>
@@ -44695,7 +35556,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55230">
+<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="42822">
<summary>
Do not audit attempts to send netsupport_client packets.
</summary>
@@ -44706,7 +35567,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netsupport_client_packets" lineno="55249">
+<interface name="corenet_receive_netsupport_client_packets" lineno="42841">
<summary>
Receive netsupport_client packets.
</summary>
@@ -44717,7 +35578,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55268">
+<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="42860">
<summary>
Do not audit attempts to receive netsupport_client packets.
</summary>
@@ -44728,7 +35589,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55287">
+<interface name="corenet_sendrecv_netsupport_client_packets" lineno="42879">
<summary>
Send and receive netsupport_client packets.
</summary>
@@ -44739,7 +35600,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55303">
+<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="42895">
<summary>
Do not audit attempts to send and receive netsupport_client packets.
</summary>
@@ -44750,7 +35611,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netsupport_client_packets" lineno="55318">
+<interface name="corenet_relabelto_netsupport_client_packets" lineno="42910">
<summary>
Relabel packets to netsupport_client the packet type.
</summary>
@@ -44760,7 +35621,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netsupport_server_packets" lineno="55338">
+<interface name="corenet_send_netsupport_server_packets" lineno="42930">
<summary>
Send netsupport_server packets.
</summary>
@@ -44771,7 +35632,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55357">
+<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="42949">
<summary>
Do not audit attempts to send netsupport_server packets.
</summary>
@@ -44782,7 +35643,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netsupport_server_packets" lineno="55376">
+<interface name="corenet_receive_netsupport_server_packets" lineno="42968">
<summary>
Receive netsupport_server packets.
</summary>
@@ -44793,7 +35654,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55395">
+<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="42987">
<summary>
Do not audit attempts to receive netsupport_server packets.
</summary>
@@ -44804,7 +35665,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55414">
+<interface name="corenet_sendrecv_netsupport_server_packets" lineno="43006">
<summary>
Send and receive netsupport_server packets.
</summary>
@@ -44815,7 +35676,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55430">
+<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="43022">
<summary>
Do not audit attempts to send and receive netsupport_server packets.
</summary>
@@ -44826,7 +35687,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netsupport_server_packets" lineno="55445">
+<interface name="corenet_relabelto_netsupport_server_packets" lineno="43037">
<summary>
Relabel packets to netsupport_server the packet type.
</summary>
@@ -44836,85 +35697,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55467">
-<summary>
-Send and receive TCP traffic on the nfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_nfs_port" lineno="55482">
-<summary>
-Send UDP traffic on the nfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55497">
-<summary>
-Do not audit attempts to send UDP traffic on the nfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_nfs_port" lineno="55512">
-<summary>
-Receive UDP traffic on the nfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55527">
-<summary>
-Do not audit attempts to receive UDP traffic on the nfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_nfs_port" lineno="55542">
-<summary>
-Send and receive UDP traffic on the nfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55558">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the nfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_nfs_port" lineno="55573">
+<interface name="corenet_tcp_bind_nfs_port" lineno="43059">
<summary>
Bind TCP sockets to the nfs port.
</summary>
@@ -44925,7 +35708,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nfs_port" lineno="55593">
+<interface name="corenet_udp_bind_nfs_port" lineno="43079">
<summary>
Bind UDP sockets to the nfs port.
</summary>
@@ -44936,7 +35719,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nfs_port" lineno="55612">
+<interface name="corenet_tcp_connect_nfs_port" lineno="43098">
<summary>
Make a TCP connection to the nfs port.
</summary>
@@ -44946,7 +35729,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfs_client_packets" lineno="55632">
+<interface name="corenet_send_nfs_client_packets" lineno="43118">
<summary>
Send nfs_client packets.
</summary>
@@ -44957,7 +35740,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55651">
+<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="43137">
<summary>
Do not audit attempts to send nfs_client packets.
</summary>
@@ -44968,7 +35751,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfs_client_packets" lineno="55670">
+<interface name="corenet_receive_nfs_client_packets" lineno="43156">
<summary>
Receive nfs_client packets.
</summary>
@@ -44979,7 +35762,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55689">
+<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="43175">
<summary>
Do not audit attempts to receive nfs_client packets.
</summary>
@@ -44990,7 +35773,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfs_client_packets" lineno="55708">
+<interface name="corenet_sendrecv_nfs_client_packets" lineno="43194">
<summary>
Send and receive nfs_client packets.
</summary>
@@ -45001,7 +35784,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55724">
+<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="43210">
<summary>
Do not audit attempts to send and receive nfs_client packets.
</summary>
@@ -45012,7 +35795,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfs_client_packets" lineno="55739">
+<interface name="corenet_relabelto_nfs_client_packets" lineno="43225">
<summary>
Relabel packets to nfs_client the packet type.
</summary>
@@ -45022,7 +35805,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfs_server_packets" lineno="55759">
+<interface name="corenet_send_nfs_server_packets" lineno="43245">
<summary>
Send nfs_server packets.
</summary>
@@ -45033,7 +35816,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55778">
+<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="43264">
<summary>
Do not audit attempts to send nfs_server packets.
</summary>
@@ -45044,7 +35827,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfs_server_packets" lineno="55797">
+<interface name="corenet_receive_nfs_server_packets" lineno="43283">
<summary>
Receive nfs_server packets.
</summary>
@@ -45055,7 +35838,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55816">
+<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="43302">
<summary>
Do not audit attempts to receive nfs_server packets.
</summary>
@@ -45066,7 +35849,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfs_server_packets" lineno="55835">
+<interface name="corenet_sendrecv_nfs_server_packets" lineno="43321">
<summary>
Send and receive nfs_server packets.
</summary>
@@ -45077,7 +35860,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55851">
+<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="43337">
<summary>
Do not audit attempts to send and receive nfs_server packets.
</summary>
@@ -45088,7 +35871,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfs_server_packets" lineno="55866">
+<interface name="corenet_relabelto_nfs_server_packets" lineno="43352">
<summary>
Relabel packets to nfs_server the packet type.
</summary>
@@ -45098,85 +35881,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55888">
-<summary>
-Send and receive TCP traffic on the nfsrdma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_nfsrdma_port" lineno="55903">
-<summary>
-Send UDP traffic on the nfsrdma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55918">
-<summary>
-Do not audit attempts to send UDP traffic on the nfsrdma port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_nfsrdma_port" lineno="55933">
-<summary>
-Receive UDP traffic on the nfsrdma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55948">
-<summary>
-Do not audit attempts to receive UDP traffic on the nfsrdma port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55963">
-<summary>
-Send and receive UDP traffic on the nfsrdma port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55979">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the nfsrdma port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55994">
+<interface name="corenet_tcp_bind_nfsrdma_port" lineno="43374">
<summary>
Bind TCP sockets to the nfsrdma port.
</summary>
@@ -45187,7 +35892,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nfsrdma_port" lineno="56014">
+<interface name="corenet_udp_bind_nfsrdma_port" lineno="43394">
<summary>
Bind UDP sockets to the nfsrdma port.
</summary>
@@ -45198,7 +35903,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nfsrdma_port" lineno="56033">
+<interface name="corenet_tcp_connect_nfsrdma_port" lineno="43413">
<summary>
Make a TCP connection to the nfsrdma port.
</summary>
@@ -45208,7 +35913,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfsrdma_client_packets" lineno="56053">
+<interface name="corenet_send_nfsrdma_client_packets" lineno="43433">
<summary>
Send nfsrdma_client packets.
</summary>
@@ -45219,7 +35924,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="56072">
+<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="43452">
<summary>
Do not audit attempts to send nfsrdma_client packets.
</summary>
@@ -45230,7 +35935,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfsrdma_client_packets" lineno="56091">
+<interface name="corenet_receive_nfsrdma_client_packets" lineno="43471">
<summary>
Receive nfsrdma_client packets.
</summary>
@@ -45241,7 +35946,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="56110">
+<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="43490">
<summary>
Do not audit attempts to receive nfsrdma_client packets.
</summary>
@@ -45252,7 +35957,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="56129">
+<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="43509">
<summary>
Send and receive nfsrdma_client packets.
</summary>
@@ -45263,7 +35968,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56145">
+<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="43525">
<summary>
Do not audit attempts to send and receive nfsrdma_client packets.
</summary>
@@ -45274,7 +35979,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56160">
+<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="43540">
<summary>
Relabel packets to nfsrdma_client the packet type.
</summary>
@@ -45284,7 +35989,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfsrdma_server_packets" lineno="56180">
+<interface name="corenet_send_nfsrdma_server_packets" lineno="43560">
<summary>
Send nfsrdma_server packets.
</summary>
@@ -45295,7 +36000,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56199">
+<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="43579">
<summary>
Do not audit attempts to send nfsrdma_server packets.
</summary>
@@ -45306,7 +36011,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfsrdma_server_packets" lineno="56218">
+<interface name="corenet_receive_nfsrdma_server_packets" lineno="43598">
<summary>
Receive nfsrdma_server packets.
</summary>
@@ -45317,7 +36022,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56237">
+<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="43617">
<summary>
Do not audit attempts to receive nfsrdma_server packets.
</summary>
@@ -45328,7 +36033,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56256">
+<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="43636">
<summary>
Send and receive nfsrdma_server packets.
</summary>
@@ -45339,7 +36044,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56272">
+<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="43652">
<summary>
Do not audit attempts to send and receive nfsrdma_server packets.
</summary>
@@ -45350,7 +36055,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56287">
+<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="43667">
<summary>
Relabel packets to nfsrdma_server the packet type.
</summary>
@@ -45360,85 +36065,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56309">
-<summary>
-Send and receive TCP traffic on the nmbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_nmbd_port" lineno="56324">
-<summary>
-Send UDP traffic on the nmbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56339">
-<summary>
-Do not audit attempts to send UDP traffic on the nmbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_nmbd_port" lineno="56354">
-<summary>
-Receive UDP traffic on the nmbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56369">
-<summary>
-Do not audit attempts to receive UDP traffic on the nmbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56384">
-<summary>
-Send and receive UDP traffic on the nmbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56400">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the nmbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_nmbd_port" lineno="56415">
+<interface name="corenet_tcp_bind_nmbd_port" lineno="43689">
<summary>
Bind TCP sockets to the nmbd port.
</summary>
@@ -45449,7 +36076,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nmbd_port" lineno="56435">
+<interface name="corenet_udp_bind_nmbd_port" lineno="43709">
<summary>
Bind UDP sockets to the nmbd port.
</summary>
@@ -45460,7 +36087,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nmbd_port" lineno="56454">
+<interface name="corenet_tcp_connect_nmbd_port" lineno="43728">
<summary>
Make a TCP connection to the nmbd port.
</summary>
@@ -45470,7 +36097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nmbd_client_packets" lineno="56474">
+<interface name="corenet_send_nmbd_client_packets" lineno="43748">
<summary>
Send nmbd_client packets.
</summary>
@@ -45481,7 +36108,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56493">
+<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="43767">
<summary>
Do not audit attempts to send nmbd_client packets.
</summary>
@@ -45492,7 +36119,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nmbd_client_packets" lineno="56512">
+<interface name="corenet_receive_nmbd_client_packets" lineno="43786">
<summary>
Receive nmbd_client packets.
</summary>
@@ -45503,7 +36130,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56531">
+<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="43805">
<summary>
Do not audit attempts to receive nmbd_client packets.
</summary>
@@ -45514,7 +36141,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56550">
+<interface name="corenet_sendrecv_nmbd_client_packets" lineno="43824">
<summary>
Send and receive nmbd_client packets.
</summary>
@@ -45525,7 +36152,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56566">
+<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="43840">
<summary>
Do not audit attempts to send and receive nmbd_client packets.
</summary>
@@ -45536,7 +36163,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nmbd_client_packets" lineno="56581">
+<interface name="corenet_relabelto_nmbd_client_packets" lineno="43855">
<summary>
Relabel packets to nmbd_client the packet type.
</summary>
@@ -45546,7 +36173,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nmbd_server_packets" lineno="56601">
+<interface name="corenet_send_nmbd_server_packets" lineno="43875">
<summary>
Send nmbd_server packets.
</summary>
@@ -45557,7 +36184,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56620">
+<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="43894">
<summary>
Do not audit attempts to send nmbd_server packets.
</summary>
@@ -45568,7 +36195,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nmbd_server_packets" lineno="56639">
+<interface name="corenet_receive_nmbd_server_packets" lineno="43913">
<summary>
Receive nmbd_server packets.
</summary>
@@ -45579,7 +36206,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56658">
+<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="43932">
<summary>
Do not audit attempts to receive nmbd_server packets.
</summary>
@@ -45590,7 +36217,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56677">
+<interface name="corenet_sendrecv_nmbd_server_packets" lineno="43951">
<summary>
Send and receive nmbd_server packets.
</summary>
@@ -45601,7 +36228,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56693">
+<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="43967">
<summary>
Do not audit attempts to send and receive nmbd_server packets.
</summary>
@@ -45612,7 +36239,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nmbd_server_packets" lineno="56708">
+<interface name="corenet_relabelto_nmbd_server_packets" lineno="43982">
<summary>
Relabel packets to nmbd_server the packet type.
</summary>
@@ -45622,85 +36249,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56730">
-<summary>
-Send and receive TCP traffic on the ntop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ntop_port" lineno="56745">
-<summary>
-Send UDP traffic on the ntop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56760">
-<summary>
-Do not audit attempts to send UDP traffic on the ntop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ntop_port" lineno="56775">
-<summary>
-Receive UDP traffic on the ntop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56790">
-<summary>
-Do not audit attempts to receive UDP traffic on the ntop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ntop_port" lineno="56805">
-<summary>
-Send and receive UDP traffic on the ntop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56821">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ntop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ntop_port" lineno="56836">
+<interface name="corenet_tcp_bind_ntop_port" lineno="44004">
<summary>
Bind TCP sockets to the ntop port.
</summary>
@@ -45711,7 +36260,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ntop_port" lineno="56856">
+<interface name="corenet_udp_bind_ntop_port" lineno="44024">
<summary>
Bind UDP sockets to the ntop port.
</summary>
@@ -45722,7 +36271,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ntop_port" lineno="56875">
+<interface name="corenet_tcp_connect_ntop_port" lineno="44043">
<summary>
Make a TCP connection to the ntop port.
</summary>
@@ -45732,7 +36281,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntop_client_packets" lineno="56895">
+<interface name="corenet_send_ntop_client_packets" lineno="44063">
<summary>
Send ntop_client packets.
</summary>
@@ -45743,7 +36292,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56914">
+<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="44082">
<summary>
Do not audit attempts to send ntop_client packets.
</summary>
@@ -45754,7 +36303,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntop_client_packets" lineno="56933">
+<interface name="corenet_receive_ntop_client_packets" lineno="44101">
<summary>
Receive ntop_client packets.
</summary>
@@ -45765,7 +36314,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56952">
+<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="44120">
<summary>
Do not audit attempts to receive ntop_client packets.
</summary>
@@ -45776,7 +36325,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntop_client_packets" lineno="56971">
+<interface name="corenet_sendrecv_ntop_client_packets" lineno="44139">
<summary>
Send and receive ntop_client packets.
</summary>
@@ -45787,7 +36336,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56987">
+<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="44155">
<summary>
Do not audit attempts to send and receive ntop_client packets.
</summary>
@@ -45798,7 +36347,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntop_client_packets" lineno="57002">
+<interface name="corenet_relabelto_ntop_client_packets" lineno="44170">
<summary>
Relabel packets to ntop_client the packet type.
</summary>
@@ -45808,7 +36357,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntop_server_packets" lineno="57022">
+<interface name="corenet_send_ntop_server_packets" lineno="44190">
<summary>
Send ntop_server packets.
</summary>
@@ -45819,7 +36368,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="57041">
+<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="44209">
<summary>
Do not audit attempts to send ntop_server packets.
</summary>
@@ -45830,7 +36379,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntop_server_packets" lineno="57060">
+<interface name="corenet_receive_ntop_server_packets" lineno="44228">
<summary>
Receive ntop_server packets.
</summary>
@@ -45841,7 +36390,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="57079">
+<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="44247">
<summary>
Do not audit attempts to receive ntop_server packets.
</summary>
@@ -45852,7 +36401,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntop_server_packets" lineno="57098">
+<interface name="corenet_sendrecv_ntop_server_packets" lineno="44266">
<summary>
Send and receive ntop_server packets.
</summary>
@@ -45863,7 +36412,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="57114">
+<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="44282">
<summary>
Do not audit attempts to send and receive ntop_server packets.
</summary>
@@ -45874,7 +36423,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntop_server_packets" lineno="57129">
+<interface name="corenet_relabelto_ntop_server_packets" lineno="44297">
<summary>
Relabel packets to ntop_server the packet type.
</summary>
@@ -45884,85 +36433,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57151">
-<summary>
-Send and receive TCP traffic on the ntp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ntp_port" lineno="57166">
-<summary>
-Send UDP traffic on the ntp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57181">
-<summary>
-Do not audit attempts to send UDP traffic on the ntp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ntp_port" lineno="57196">
-<summary>
-Receive UDP traffic on the ntp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57211">
-<summary>
-Do not audit attempts to receive UDP traffic on the ntp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ntp_port" lineno="57226">
-<summary>
-Send and receive UDP traffic on the ntp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57242">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ntp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ntp_port" lineno="57257">
+<interface name="corenet_tcp_bind_ntp_port" lineno="44319">
<summary>
Bind TCP sockets to the ntp port.
</summary>
@@ -45973,7 +36444,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ntp_port" lineno="57277">
+<interface name="corenet_udp_bind_ntp_port" lineno="44339">
<summary>
Bind UDP sockets to the ntp port.
</summary>
@@ -45984,7 +36455,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ntp_port" lineno="57296">
+<interface name="corenet_tcp_connect_ntp_port" lineno="44358">
<summary>
Make a TCP connection to the ntp port.
</summary>
@@ -45994,7 +36465,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntp_client_packets" lineno="57316">
+<interface name="corenet_send_ntp_client_packets" lineno="44378">
<summary>
Send ntp_client packets.
</summary>
@@ -46005,7 +36476,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57335">
+<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="44397">
<summary>
Do not audit attempts to send ntp_client packets.
</summary>
@@ -46016,7 +36487,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntp_client_packets" lineno="57354">
+<interface name="corenet_receive_ntp_client_packets" lineno="44416">
<summary>
Receive ntp_client packets.
</summary>
@@ -46027,7 +36498,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57373">
+<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="44435">
<summary>
Do not audit attempts to receive ntp_client packets.
</summary>
@@ -46038,7 +36509,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntp_client_packets" lineno="57392">
+<interface name="corenet_sendrecv_ntp_client_packets" lineno="44454">
<summary>
Send and receive ntp_client packets.
</summary>
@@ -46049,7 +36520,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57408">
+<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="44470">
<summary>
Do not audit attempts to send and receive ntp_client packets.
</summary>
@@ -46060,7 +36531,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntp_client_packets" lineno="57423">
+<interface name="corenet_relabelto_ntp_client_packets" lineno="44485">
<summary>
Relabel packets to ntp_client the packet type.
</summary>
@@ -46070,7 +36541,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntp_server_packets" lineno="57443">
+<interface name="corenet_send_ntp_server_packets" lineno="44505">
<summary>
Send ntp_server packets.
</summary>
@@ -46081,7 +36552,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57462">
+<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="44524">
<summary>
Do not audit attempts to send ntp_server packets.
</summary>
@@ -46092,7 +36563,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntp_server_packets" lineno="57481">
+<interface name="corenet_receive_ntp_server_packets" lineno="44543">
<summary>
Receive ntp_server packets.
</summary>
@@ -46103,7 +36574,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57500">
+<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="44562">
<summary>
Do not audit attempts to receive ntp_server packets.
</summary>
@@ -46114,7 +36585,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntp_server_packets" lineno="57519">
+<interface name="corenet_sendrecv_ntp_server_packets" lineno="44581">
<summary>
Send and receive ntp_server packets.
</summary>
@@ -46125,7 +36596,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57535">
+<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="44597">
<summary>
Do not audit attempts to send and receive ntp_server packets.
</summary>
@@ -46136,7 +36607,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntp_server_packets" lineno="57550">
+<interface name="corenet_relabelto_ntp_server_packets" lineno="44612">
<summary>
Relabel packets to ntp_server the packet type.
</summary>
@@ -46146,85 +36617,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ntske_port" lineno="57572">
-<summary>
-Send and receive TCP traffic on the ntske port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ntske_port" lineno="57587">
-<summary>
-Send UDP traffic on the ntske port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ntske_port" lineno="57602">
-<summary>
-Do not audit attempts to send UDP traffic on the ntske port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ntske_port" lineno="57617">
-<summary>
-Receive UDP traffic on the ntske port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ntske_port" lineno="57632">
-<summary>
-Do not audit attempts to receive UDP traffic on the ntske port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ntske_port" lineno="57647">
-<summary>
-Send and receive UDP traffic on the ntske port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntske_port" lineno="57663">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ntske port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ntske_port" lineno="57678">
+<interface name="corenet_tcp_bind_ntske_port" lineno="44634">
<summary>
Bind TCP sockets to the ntske port.
</summary>
@@ -46235,7 +36628,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ntske_port" lineno="57698">
+<interface name="corenet_udp_bind_ntske_port" lineno="44654">
<summary>
Bind UDP sockets to the ntske port.
</summary>
@@ -46246,7 +36639,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ntske_port" lineno="57717">
+<interface name="corenet_tcp_connect_ntske_port" lineno="44673">
<summary>
Make a TCP connection to the ntske port.
</summary>
@@ -46256,7 +36649,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntske_client_packets" lineno="57737">
+<interface name="corenet_send_ntske_client_packets" lineno="44693">
<summary>
Send ntske_client packets.
</summary>
@@ -46267,7 +36660,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="57756">
+<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="44712">
<summary>
Do not audit attempts to send ntske_client packets.
</summary>
@@ -46278,7 +36671,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntske_client_packets" lineno="57775">
+<interface name="corenet_receive_ntske_client_packets" lineno="44731">
<summary>
Receive ntske_client packets.
</summary>
@@ -46289,7 +36682,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="57794">
+<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="44750">
<summary>
Do not audit attempts to receive ntske_client packets.
</summary>
@@ -46300,7 +36693,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntske_client_packets" lineno="57813">
+<interface name="corenet_sendrecv_ntske_client_packets" lineno="44769">
<summary>
Send and receive ntske_client packets.
</summary>
@@ -46311,7 +36704,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="57829">
+<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="44785">
<summary>
Do not audit attempts to send and receive ntske_client packets.
</summary>
@@ -46322,7 +36715,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntske_client_packets" lineno="57844">
+<interface name="corenet_relabelto_ntske_client_packets" lineno="44800">
<summary>
Relabel packets to ntske_client the packet type.
</summary>
@@ -46332,7 +36725,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntske_server_packets" lineno="57864">
+<interface name="corenet_send_ntske_server_packets" lineno="44820">
<summary>
Send ntske_server packets.
</summary>
@@ -46343,7 +36736,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="57883">
+<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="44839">
<summary>
Do not audit attempts to send ntske_server packets.
</summary>
@@ -46354,7 +36747,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntske_server_packets" lineno="57902">
+<interface name="corenet_receive_ntske_server_packets" lineno="44858">
<summary>
Receive ntske_server packets.
</summary>
@@ -46365,7 +36758,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="57921">
+<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="44877">
<summary>
Do not audit attempts to receive ntske_server packets.
</summary>
@@ -46376,7 +36769,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntske_server_packets" lineno="57940">
+<interface name="corenet_sendrecv_ntske_server_packets" lineno="44896">
<summary>
Send and receive ntske_server packets.
</summary>
@@ -46387,7 +36780,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="57956">
+<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="44912">
<summary>
Do not audit attempts to send and receive ntske_server packets.
</summary>
@@ -46398,7 +36791,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntske_server_packets" lineno="57971">
+<interface name="corenet_relabelto_ntske_server_packets" lineno="44927">
<summary>
Relabel packets to ntske_server the packet type.
</summary>
@@ -46408,85 +36801,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57993">
-<summary>
-Send and receive TCP traffic on the oa_system port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_oa_system_port" lineno="58008">
-<summary>
-Send UDP traffic on the oa_system port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="58023">
-<summary>
-Do not audit attempts to send UDP traffic on the oa_system port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_oa_system_port" lineno="58038">
-<summary>
-Receive UDP traffic on the oa_system port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="58053">
-<summary>
-Do not audit attempts to receive UDP traffic on the oa_system port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_oa_system_port" lineno="58068">
-<summary>
-Send and receive UDP traffic on the oa_system port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="58084">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the oa_system port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_oa_system_port" lineno="58099">
+<interface name="corenet_tcp_bind_oa_system_port" lineno="44949">
<summary>
Bind TCP sockets to the oa_system port.
</summary>
@@ -46497,7 +36812,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_oa_system_port" lineno="58119">
+<interface name="corenet_udp_bind_oa_system_port" lineno="44969">
<summary>
Bind UDP sockets to the oa_system port.
</summary>
@@ -46508,7 +36823,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_oa_system_port" lineno="58138">
+<interface name="corenet_tcp_connect_oa_system_port" lineno="44988">
<summary>
Make a TCP connection to the oa_system port.
</summary>
@@ -46518,7 +36833,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oa_system_client_packets" lineno="58158">
+<interface name="corenet_send_oa_system_client_packets" lineno="45008">
<summary>
Send oa_system_client packets.
</summary>
@@ -46529,7 +36844,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="58177">
+<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="45027">
<summary>
Do not audit attempts to send oa_system_client packets.
</summary>
@@ -46540,7 +36855,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oa_system_client_packets" lineno="58196">
+<interface name="corenet_receive_oa_system_client_packets" lineno="45046">
<summary>
Receive oa_system_client packets.
</summary>
@@ -46551,7 +36866,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="58215">
+<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="45065">
<summary>
Do not audit attempts to receive oa_system_client packets.
</summary>
@@ -46562,7 +36877,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oa_system_client_packets" lineno="58234">
+<interface name="corenet_sendrecv_oa_system_client_packets" lineno="45084">
<summary>
Send and receive oa_system_client packets.
</summary>
@@ -46573,7 +36888,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="58250">
+<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="45100">
<summary>
Do not audit attempts to send and receive oa_system_client packets.
</summary>
@@ -46584,7 +36899,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oa_system_client_packets" lineno="58265">
+<interface name="corenet_relabelto_oa_system_client_packets" lineno="45115">
<summary>
Relabel packets to oa_system_client the packet type.
</summary>
@@ -46594,7 +36909,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oa_system_server_packets" lineno="58285">
+<interface name="corenet_send_oa_system_server_packets" lineno="45135">
<summary>
Send oa_system_server packets.
</summary>
@@ -46605,7 +36920,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="58304">
+<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="45154">
<summary>
Do not audit attempts to send oa_system_server packets.
</summary>
@@ -46616,7 +36931,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oa_system_server_packets" lineno="58323">
+<interface name="corenet_receive_oa_system_server_packets" lineno="45173">
<summary>
Receive oa_system_server packets.
</summary>
@@ -46627,7 +36942,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="58342">
+<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="45192">
<summary>
Do not audit attempts to receive oa_system_server packets.
</summary>
@@ -46638,7 +36953,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oa_system_server_packets" lineno="58361">
+<interface name="corenet_sendrecv_oa_system_server_packets" lineno="45211">
<summary>
Send and receive oa_system_server packets.
</summary>
@@ -46649,7 +36964,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="58377">
+<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="45227">
<summary>
Do not audit attempts to send and receive oa_system_server packets.
</summary>
@@ -46660,7 +36975,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oa_system_server_packets" lineno="58392">
+<interface name="corenet_relabelto_oa_system_server_packets" lineno="45242">
<summary>
Relabel packets to oa_system_server the packet type.
</summary>
@@ -46670,85 +36985,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="58414">
-<summary>
-Send and receive TCP traffic on the oracledb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_oracledb_port" lineno="58429">
-<summary>
-Send UDP traffic on the oracledb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58444">
-<summary>
-Do not audit attempts to send UDP traffic on the oracledb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_oracledb_port" lineno="58459">
-<summary>
-Receive UDP traffic on the oracledb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58474">
-<summary>
-Do not audit attempts to receive UDP traffic on the oracledb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58489">
-<summary>
-Send and receive UDP traffic on the oracledb port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58505">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the oracledb port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_oracledb_port" lineno="58520">
+<interface name="corenet_tcp_bind_oracledb_port" lineno="45264">
<summary>
Bind TCP sockets to the oracledb port.
</summary>
@@ -46759,7 +36996,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_oracledb_port" lineno="58540">
+<interface name="corenet_udp_bind_oracledb_port" lineno="45284">
<summary>
Bind UDP sockets to the oracledb port.
</summary>
@@ -46770,7 +37007,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_oracledb_port" lineno="58559">
+<interface name="corenet_tcp_connect_oracledb_port" lineno="45303">
<summary>
Make a TCP connection to the oracledb port.
</summary>
@@ -46780,7 +37017,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oracledb_client_packets" lineno="58579">
+<interface name="corenet_send_oracledb_client_packets" lineno="45323">
<summary>
Send oracledb_client packets.
</summary>
@@ -46791,7 +37028,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58598">
+<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="45342">
<summary>
Do not audit attempts to send oracledb_client packets.
</summary>
@@ -46802,7 +37039,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oracledb_client_packets" lineno="58617">
+<interface name="corenet_receive_oracledb_client_packets" lineno="45361">
<summary>
Receive oracledb_client packets.
</summary>
@@ -46813,7 +37050,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58636">
+<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="45380">
<summary>
Do not audit attempts to receive oracledb_client packets.
</summary>
@@ -46824,7 +37061,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58655">
+<interface name="corenet_sendrecv_oracledb_client_packets" lineno="45399">
<summary>
Send and receive oracledb_client packets.
</summary>
@@ -46835,7 +37072,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58671">
+<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="45415">
<summary>
Do not audit attempts to send and receive oracledb_client packets.
</summary>
@@ -46846,7 +37083,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oracledb_client_packets" lineno="58686">
+<interface name="corenet_relabelto_oracledb_client_packets" lineno="45430">
<summary>
Relabel packets to oracledb_client the packet type.
</summary>
@@ -46856,7 +37093,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oracledb_server_packets" lineno="58706">
+<interface name="corenet_send_oracledb_server_packets" lineno="45450">
<summary>
Send oracledb_server packets.
</summary>
@@ -46867,7 +37104,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58725">
+<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="45469">
<summary>
Do not audit attempts to send oracledb_server packets.
</summary>
@@ -46878,7 +37115,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oracledb_server_packets" lineno="58744">
+<interface name="corenet_receive_oracledb_server_packets" lineno="45488">
<summary>
Receive oracledb_server packets.
</summary>
@@ -46889,7 +37126,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58763">
+<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="45507">
<summary>
Do not audit attempts to receive oracledb_server packets.
</summary>
@@ -46900,7 +37137,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58782">
+<interface name="corenet_sendrecv_oracledb_server_packets" lineno="45526">
<summary>
Send and receive oracledb_server packets.
</summary>
@@ -46911,7 +37148,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58798">
+<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="45542">
<summary>
Do not audit attempts to send and receive oracledb_server packets.
</summary>
@@ -46922,7 +37159,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oracledb_server_packets" lineno="58813">
+<interface name="corenet_relabelto_oracledb_server_packets" lineno="45557">
<summary>
Relabel packets to oracledb_server the packet type.
</summary>
@@ -46932,85 +37169,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58835">
-<summary>
-Send and receive TCP traffic on the ocsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ocsp_port" lineno="58850">
-<summary>
-Send UDP traffic on the ocsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58865">
-<summary>
-Do not audit attempts to send UDP traffic on the ocsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ocsp_port" lineno="58880">
-<summary>
-Receive UDP traffic on the ocsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58895">
-<summary>
-Do not audit attempts to receive UDP traffic on the ocsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58910">
-<summary>
-Send and receive UDP traffic on the ocsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58926">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ocsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ocsp_port" lineno="58941">
+<interface name="corenet_tcp_bind_ocsp_port" lineno="45579">
<summary>
Bind TCP sockets to the ocsp port.
</summary>
@@ -47021,7 +37180,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ocsp_port" lineno="58961">
+<interface name="corenet_udp_bind_ocsp_port" lineno="45599">
<summary>
Bind UDP sockets to the ocsp port.
</summary>
@@ -47032,7 +37191,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ocsp_port" lineno="58980">
+<interface name="corenet_tcp_connect_ocsp_port" lineno="45618">
<summary>
Make a TCP connection to the ocsp port.
</summary>
@@ -47042,7 +37201,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ocsp_client_packets" lineno="59000">
+<interface name="corenet_send_ocsp_client_packets" lineno="45638">
<summary>
Send ocsp_client packets.
</summary>
@@ -47053,7 +37212,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="59019">
+<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="45657">
<summary>
Do not audit attempts to send ocsp_client packets.
</summary>
@@ -47064,7 +37223,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ocsp_client_packets" lineno="59038">
+<interface name="corenet_receive_ocsp_client_packets" lineno="45676">
<summary>
Receive ocsp_client packets.
</summary>
@@ -47075,7 +37234,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="59057">
+<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="45695">
<summary>
Do not audit attempts to receive ocsp_client packets.
</summary>
@@ -47086,7 +37245,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ocsp_client_packets" lineno="59076">
+<interface name="corenet_sendrecv_ocsp_client_packets" lineno="45714">
<summary>
Send and receive ocsp_client packets.
</summary>
@@ -47097,7 +37256,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="59092">
+<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="45730">
<summary>
Do not audit attempts to send and receive ocsp_client packets.
</summary>
@@ -47108,7 +37267,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ocsp_client_packets" lineno="59107">
+<interface name="corenet_relabelto_ocsp_client_packets" lineno="45745">
<summary>
Relabel packets to ocsp_client the packet type.
</summary>
@@ -47118,7 +37277,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ocsp_server_packets" lineno="59127">
+<interface name="corenet_send_ocsp_server_packets" lineno="45765">
<summary>
Send ocsp_server packets.
</summary>
@@ -47129,7 +37288,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="59146">
+<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="45784">
<summary>
Do not audit attempts to send ocsp_server packets.
</summary>
@@ -47140,7 +37299,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ocsp_server_packets" lineno="59165">
+<interface name="corenet_receive_ocsp_server_packets" lineno="45803">
<summary>
Receive ocsp_server packets.
</summary>
@@ -47151,7 +37310,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="59184">
+<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="45822">
<summary>
Do not audit attempts to receive ocsp_server packets.
</summary>
@@ -47162,7 +37321,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ocsp_server_packets" lineno="59203">
+<interface name="corenet_sendrecv_ocsp_server_packets" lineno="45841">
<summary>
Send and receive ocsp_server packets.
</summary>
@@ -47173,7 +37332,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="59219">
+<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="45857">
<summary>
Do not audit attempts to send and receive ocsp_server packets.
</summary>
@@ -47184,7 +37343,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ocsp_server_packets" lineno="59234">
+<interface name="corenet_relabelto_ocsp_server_packets" lineno="45872">
<summary>
Relabel packets to ocsp_server the packet type.
</summary>
@@ -47194,85 +37353,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="59256">
-<summary>
-Send and receive TCP traffic on the openhpid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_openhpid_port" lineno="59271">
-<summary>
-Send UDP traffic on the openhpid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="59286">
-<summary>
-Do not audit attempts to send UDP traffic on the openhpid port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_openhpid_port" lineno="59301">
-<summary>
-Receive UDP traffic on the openhpid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="59316">
-<summary>
-Do not audit attempts to receive UDP traffic on the openhpid port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_openhpid_port" lineno="59331">
-<summary>
-Send and receive UDP traffic on the openhpid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="59347">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the openhpid port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_openhpid_port" lineno="59362">
+<interface name="corenet_tcp_bind_openhpid_port" lineno="45894">
<summary>
Bind TCP sockets to the openhpid port.
</summary>
@@ -47283,7 +37364,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_openhpid_port" lineno="59382">
+<interface name="corenet_udp_bind_openhpid_port" lineno="45914">
<summary>
Bind UDP sockets to the openhpid port.
</summary>
@@ -47294,7 +37375,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_openhpid_port" lineno="59401">
+<interface name="corenet_tcp_connect_openhpid_port" lineno="45933">
<summary>
Make a TCP connection to the openhpid port.
</summary>
@@ -47304,7 +37385,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openhpid_client_packets" lineno="59421">
+<interface name="corenet_send_openhpid_client_packets" lineno="45953">
<summary>
Send openhpid_client packets.
</summary>
@@ -47315,7 +37396,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59440">
+<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="45972">
<summary>
Do not audit attempts to send openhpid_client packets.
</summary>
@@ -47326,7 +37407,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openhpid_client_packets" lineno="59459">
+<interface name="corenet_receive_openhpid_client_packets" lineno="45991">
<summary>
Receive openhpid_client packets.
</summary>
@@ -47337,7 +37418,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59478">
+<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="46010">
<summary>
Do not audit attempts to receive openhpid_client packets.
</summary>
@@ -47348,7 +37429,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59497">
+<interface name="corenet_sendrecv_openhpid_client_packets" lineno="46029">
<summary>
Send and receive openhpid_client packets.
</summary>
@@ -47359,7 +37440,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59513">
+<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="46045">
<summary>
Do not audit attempts to send and receive openhpid_client packets.
</summary>
@@ -47370,7 +37451,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openhpid_client_packets" lineno="59528">
+<interface name="corenet_relabelto_openhpid_client_packets" lineno="46060">
<summary>
Relabel packets to openhpid_client the packet type.
</summary>
@@ -47380,7 +37461,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openhpid_server_packets" lineno="59548">
+<interface name="corenet_send_openhpid_server_packets" lineno="46080">
<summary>
Send openhpid_server packets.
</summary>
@@ -47391,7 +37472,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59567">
+<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="46099">
<summary>
Do not audit attempts to send openhpid_server packets.
</summary>
@@ -47402,7 +37483,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openhpid_server_packets" lineno="59586">
+<interface name="corenet_receive_openhpid_server_packets" lineno="46118">
<summary>
Receive openhpid_server packets.
</summary>
@@ -47413,7 +37494,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59605">
+<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="46137">
<summary>
Do not audit attempts to receive openhpid_server packets.
</summary>
@@ -47424,7 +37505,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59624">
+<interface name="corenet_sendrecv_openhpid_server_packets" lineno="46156">
<summary>
Send and receive openhpid_server packets.
</summary>
@@ -47435,7 +37516,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59640">
+<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="46172">
<summary>
Do not audit attempts to send and receive openhpid_server packets.
</summary>
@@ -47446,7 +37527,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openhpid_server_packets" lineno="59655">
+<interface name="corenet_relabelto_openhpid_server_packets" lineno="46187">
<summary>
Relabel packets to openhpid_server the packet type.
</summary>
@@ -47456,85 +37537,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59677">
-<summary>
-Send and receive TCP traffic on the openvpn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_openvpn_port" lineno="59692">
-<summary>
-Send UDP traffic on the openvpn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59707">
-<summary>
-Do not audit attempts to send UDP traffic on the openvpn port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_openvpn_port" lineno="59722">
-<summary>
-Receive UDP traffic on the openvpn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59737">
-<summary>
-Do not audit attempts to receive UDP traffic on the openvpn port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59752">
-<summary>
-Send and receive UDP traffic on the openvpn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59768">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the openvpn port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_openvpn_port" lineno="59783">
+<interface name="corenet_tcp_bind_openvpn_port" lineno="46209">
<summary>
Bind TCP sockets to the openvpn port.
</summary>
@@ -47545,7 +37548,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_openvpn_port" lineno="59803">
+<interface name="corenet_udp_bind_openvpn_port" lineno="46229">
<summary>
Bind UDP sockets to the openvpn port.
</summary>
@@ -47556,7 +37559,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_openvpn_port" lineno="59822">
+<interface name="corenet_tcp_connect_openvpn_port" lineno="46248">
<summary>
Make a TCP connection to the openvpn port.
</summary>
@@ -47566,7 +37569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openvpn_client_packets" lineno="59842">
+<interface name="corenet_send_openvpn_client_packets" lineno="46268">
<summary>
Send openvpn_client packets.
</summary>
@@ -47577,7 +37580,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59861">
+<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="46287">
<summary>
Do not audit attempts to send openvpn_client packets.
</summary>
@@ -47588,7 +37591,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openvpn_client_packets" lineno="59880">
+<interface name="corenet_receive_openvpn_client_packets" lineno="46306">
<summary>
Receive openvpn_client packets.
</summary>
@@ -47599,7 +37602,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59899">
+<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="46325">
<summary>
Do not audit attempts to receive openvpn_client packets.
</summary>
@@ -47610,7 +37613,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59918">
+<interface name="corenet_sendrecv_openvpn_client_packets" lineno="46344">
<summary>
Send and receive openvpn_client packets.
</summary>
@@ -47621,7 +37624,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59934">
+<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="46360">
<summary>
Do not audit attempts to send and receive openvpn_client packets.
</summary>
@@ -47632,7 +37635,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openvpn_client_packets" lineno="59949">
+<interface name="corenet_relabelto_openvpn_client_packets" lineno="46375">
<summary>
Relabel packets to openvpn_client the packet type.
</summary>
@@ -47642,7 +37645,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openvpn_server_packets" lineno="59969">
+<interface name="corenet_send_openvpn_server_packets" lineno="46395">
<summary>
Send openvpn_server packets.
</summary>
@@ -47653,7 +37656,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59988">
+<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="46414">
<summary>
Do not audit attempts to send openvpn_server packets.
</summary>
@@ -47664,7 +37667,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openvpn_server_packets" lineno="60007">
+<interface name="corenet_receive_openvpn_server_packets" lineno="46433">
<summary>
Receive openvpn_server packets.
</summary>
@@ -47675,7 +37678,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="60026">
+<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="46452">
<summary>
Do not audit attempts to receive openvpn_server packets.
</summary>
@@ -47686,7 +37689,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openvpn_server_packets" lineno="60045">
+<interface name="corenet_sendrecv_openvpn_server_packets" lineno="46471">
<summary>
Send and receive openvpn_server packets.
</summary>
@@ -47697,7 +37700,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="60061">
+<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="46487">
<summary>
Do not audit attempts to send and receive openvpn_server packets.
</summary>
@@ -47708,7 +37711,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openvpn_server_packets" lineno="60076">
+<interface name="corenet_relabelto_openvpn_server_packets" lineno="46502">
<summary>
Relabel packets to openvpn_server the packet type.
</summary>
@@ -47718,85 +37721,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pdps_port" lineno="60098">
-<summary>
-Send and receive TCP traffic on the pdps port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pdps_port" lineno="60113">
-<summary>
-Send UDP traffic on the pdps port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="60128">
-<summary>
-Do not audit attempts to send UDP traffic on the pdps port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pdps_port" lineno="60143">
-<summary>
-Receive UDP traffic on the pdps port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="60158">
-<summary>
-Do not audit attempts to receive UDP traffic on the pdps port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pdps_port" lineno="60173">
-<summary>
-Send and receive UDP traffic on the pdps port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="60189">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pdps port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pdps_port" lineno="60204">
+<interface name="corenet_tcp_bind_pdps_port" lineno="46524">
<summary>
Bind TCP sockets to the pdps port.
</summary>
@@ -47807,7 +37732,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pdps_port" lineno="60224">
+<interface name="corenet_udp_bind_pdps_port" lineno="46544">
<summary>
Bind UDP sockets to the pdps port.
</summary>
@@ -47818,7 +37743,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pdps_port" lineno="60243">
+<interface name="corenet_tcp_connect_pdps_port" lineno="46563">
<summary>
Make a TCP connection to the pdps port.
</summary>
@@ -47828,7 +37753,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pdps_client_packets" lineno="60263">
+<interface name="corenet_send_pdps_client_packets" lineno="46583">
<summary>
Send pdps_client packets.
</summary>
@@ -47839,7 +37764,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="60282">
+<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="46602">
<summary>
Do not audit attempts to send pdps_client packets.
</summary>
@@ -47850,7 +37775,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pdps_client_packets" lineno="60301">
+<interface name="corenet_receive_pdps_client_packets" lineno="46621">
<summary>
Receive pdps_client packets.
</summary>
@@ -47861,7 +37786,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="60320">
+<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="46640">
<summary>
Do not audit attempts to receive pdps_client packets.
</summary>
@@ -47872,7 +37797,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pdps_client_packets" lineno="60339">
+<interface name="corenet_sendrecv_pdps_client_packets" lineno="46659">
<summary>
Send and receive pdps_client packets.
</summary>
@@ -47883,7 +37808,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="60355">
+<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="46675">
<summary>
Do not audit attempts to send and receive pdps_client packets.
</summary>
@@ -47894,7 +37819,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pdps_client_packets" lineno="60370">
+<interface name="corenet_relabelto_pdps_client_packets" lineno="46690">
<summary>
Relabel packets to pdps_client the packet type.
</summary>
@@ -47904,7 +37829,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pdps_server_packets" lineno="60390">
+<interface name="corenet_send_pdps_server_packets" lineno="46710">
<summary>
Send pdps_server packets.
</summary>
@@ -47915,7 +37840,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="60409">
+<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="46729">
<summary>
Do not audit attempts to send pdps_server packets.
</summary>
@@ -47926,7 +37851,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pdps_server_packets" lineno="60428">
+<interface name="corenet_receive_pdps_server_packets" lineno="46748">
<summary>
Receive pdps_server packets.
</summary>
@@ -47937,7 +37862,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60447">
+<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="46767">
<summary>
Do not audit attempts to receive pdps_server packets.
</summary>
@@ -47948,7 +37873,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pdps_server_packets" lineno="60466">
+<interface name="corenet_sendrecv_pdps_server_packets" lineno="46786">
<summary>
Send and receive pdps_server packets.
</summary>
@@ -47959,7 +37884,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60482">
+<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="46802">
<summary>
Do not audit attempts to send and receive pdps_server packets.
</summary>
@@ -47970,7 +37895,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pdps_server_packets" lineno="60497">
+<interface name="corenet_relabelto_pdps_server_packets" lineno="46817">
<summary>
Relabel packets to pdps_server the packet type.
</summary>
@@ -47980,85 +37905,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60519">
-<summary>
-Send and receive TCP traffic on the pegasus_http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pegasus_http_port" lineno="60534">
-<summary>
-Send UDP traffic on the pegasus_http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60549">
-<summary>
-Do not audit attempts to send UDP traffic on the pegasus_http port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pegasus_http_port" lineno="60564">
-<summary>
-Receive UDP traffic on the pegasus_http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60579">
-<summary>
-Do not audit attempts to receive UDP traffic on the pegasus_http port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60594">
-<summary>
-Send and receive UDP traffic on the pegasus_http port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60610">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pegasus_http port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60625">
+<interface name="corenet_tcp_bind_pegasus_http_port" lineno="46839">
<summary>
Bind TCP sockets to the pegasus_http port.
</summary>
@@ -48069,7 +37916,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pegasus_http_port" lineno="60645">
+<interface name="corenet_udp_bind_pegasus_http_port" lineno="46859">
<summary>
Bind UDP sockets to the pegasus_http port.
</summary>
@@ -48080,7 +37927,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60664">
+<interface name="corenet_tcp_connect_pegasus_http_port" lineno="46878">
<summary>
Make a TCP connection to the pegasus_http port.
</summary>
@@ -48090,7 +37937,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_http_client_packets" lineno="60684">
+<interface name="corenet_send_pegasus_http_client_packets" lineno="46898">
<summary>
Send pegasus_http_client packets.
</summary>
@@ -48101,7 +37948,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60703">
+<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="46917">
<summary>
Do not audit attempts to send pegasus_http_client packets.
</summary>
@@ -48112,7 +37959,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_http_client_packets" lineno="60722">
+<interface name="corenet_receive_pegasus_http_client_packets" lineno="46936">
<summary>
Receive pegasus_http_client packets.
</summary>
@@ -48123,7 +37970,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60741">
+<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="46955">
<summary>
Do not audit attempts to receive pegasus_http_client packets.
</summary>
@@ -48134,7 +37981,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60760">
+<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="46974">
<summary>
Send and receive pegasus_http_client packets.
</summary>
@@ -48145,7 +37992,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60776">
+<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="46990">
<summary>
Do not audit attempts to send and receive pegasus_http_client packets.
</summary>
@@ -48156,7 +38003,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60791">
+<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="47005">
<summary>
Relabel packets to pegasus_http_client the packet type.
</summary>
@@ -48166,7 +38013,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_http_server_packets" lineno="60811">
+<interface name="corenet_send_pegasus_http_server_packets" lineno="47025">
<summary>
Send pegasus_http_server packets.
</summary>
@@ -48177,7 +38024,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60830">
+<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="47044">
<summary>
Do not audit attempts to send pegasus_http_server packets.
</summary>
@@ -48188,7 +38035,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_http_server_packets" lineno="60849">
+<interface name="corenet_receive_pegasus_http_server_packets" lineno="47063">
<summary>
Receive pegasus_http_server packets.
</summary>
@@ -48199,7 +38046,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60868">
+<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="47082">
<summary>
Do not audit attempts to receive pegasus_http_server packets.
</summary>
@@ -48210,7 +38057,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60887">
+<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="47101">
<summary>
Send and receive pegasus_http_server packets.
</summary>
@@ -48221,7 +38068,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60903">
+<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="47117">
<summary>
Do not audit attempts to send and receive pegasus_http_server packets.
</summary>
@@ -48232,7 +38079,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60918">
+<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="47132">
<summary>
Relabel packets to pegasus_http_server the packet type.
</summary>
@@ -48242,85 +38089,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60940">
-<summary>
-Send and receive TCP traffic on the pegasus_https port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pegasus_https_port" lineno="60955">
-<summary>
-Send UDP traffic on the pegasus_https port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60970">
-<summary>
-Do not audit attempts to send UDP traffic on the pegasus_https port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pegasus_https_port" lineno="60985">
-<summary>
-Receive UDP traffic on the pegasus_https port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="61000">
-<summary>
-Do not audit attempts to receive UDP traffic on the pegasus_https port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="61015">
-<summary>
-Send and receive UDP traffic on the pegasus_https port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="61031">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pegasus_https port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pegasus_https_port" lineno="61046">
+<interface name="corenet_tcp_bind_pegasus_https_port" lineno="47154">
<summary>
Bind TCP sockets to the pegasus_https port.
</summary>
@@ -48331,7 +38100,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pegasus_https_port" lineno="61066">
+<interface name="corenet_udp_bind_pegasus_https_port" lineno="47174">
<summary>
Bind UDP sockets to the pegasus_https port.
</summary>
@@ -48342,7 +38111,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pegasus_https_port" lineno="61085">
+<interface name="corenet_tcp_connect_pegasus_https_port" lineno="47193">
<summary>
Make a TCP connection to the pegasus_https port.
</summary>
@@ -48352,7 +38121,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_https_client_packets" lineno="61105">
+<interface name="corenet_send_pegasus_https_client_packets" lineno="47213">
<summary>
Send pegasus_https_client packets.
</summary>
@@ -48363,7 +38132,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="61124">
+<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="47232">
<summary>
Do not audit attempts to send pegasus_https_client packets.
</summary>
@@ -48374,7 +38143,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_https_client_packets" lineno="61143">
+<interface name="corenet_receive_pegasus_https_client_packets" lineno="47251">
<summary>
Receive pegasus_https_client packets.
</summary>
@@ -48385,7 +38154,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="61162">
+<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="47270">
<summary>
Do not audit attempts to receive pegasus_https_client packets.
</summary>
@@ -48396,7 +38165,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="61181">
+<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="47289">
<summary>
Send and receive pegasus_https_client packets.
</summary>
@@ -48407,7 +38176,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="61197">
+<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="47305">
<summary>
Do not audit attempts to send and receive pegasus_https_client packets.
</summary>
@@ -48418,7 +38187,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="61212">
+<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="47320">
<summary>
Relabel packets to pegasus_https_client the packet type.
</summary>
@@ -48428,7 +38197,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_https_server_packets" lineno="61232">
+<interface name="corenet_send_pegasus_https_server_packets" lineno="47340">
<summary>
Send pegasus_https_server packets.
</summary>
@@ -48439,7 +38208,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="61251">
+<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="47359">
<summary>
Do not audit attempts to send pegasus_https_server packets.
</summary>
@@ -48450,7 +38219,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_https_server_packets" lineno="61270">
+<interface name="corenet_receive_pegasus_https_server_packets" lineno="47378">
<summary>
Receive pegasus_https_server packets.
</summary>
@@ -48461,7 +38230,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="61289">
+<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="47397">
<summary>
Do not audit attempts to receive pegasus_https_server packets.
</summary>
@@ -48472,7 +38241,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="61308">
+<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="47416">
<summary>
Send and receive pegasus_https_server packets.
</summary>
@@ -48483,7 +38252,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="61324">
+<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="47432">
<summary>
Do not audit attempts to send and receive pegasus_https_server packets.
</summary>
@@ -48494,7 +38263,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="61339">
+<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="47447">
<summary>
Relabel packets to pegasus_https_server the packet type.
</summary>
@@ -48504,85 +38273,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="61361">
-<summary>
-Send and receive TCP traffic on the pgpkeyserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pgpkeyserver_port" lineno="61376">
-<summary>
-Send UDP traffic on the pgpkeyserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="61391">
-<summary>
-Do not audit attempts to send UDP traffic on the pgpkeyserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="61406">
-<summary>
-Receive UDP traffic on the pgpkeyserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="61421">
-<summary>
-Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="61436">
-<summary>
-Send and receive UDP traffic on the pgpkeyserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61452">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pgpkeyserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61467">
+<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="47469">
<summary>
Bind TCP sockets to the pgpkeyserver port.
</summary>
@@ -48593,7 +38284,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61487">
+<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="47489">
<summary>
Bind UDP sockets to the pgpkeyserver port.
</summary>
@@ -48604,7 +38295,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61506">
+<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="47508">
<summary>
Make a TCP connection to the pgpkeyserver port.
</summary>
@@ -48614,7 +38305,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61526">
+<interface name="corenet_send_pgpkeyserver_client_packets" lineno="47528">
<summary>
Send pgpkeyserver_client packets.
</summary>
@@ -48625,7 +38316,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61545">
+<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="47547">
<summary>
Do not audit attempts to send pgpkeyserver_client packets.
</summary>
@@ -48636,7 +38327,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61564">
+<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="47566">
<summary>
Receive pgpkeyserver_client packets.
</summary>
@@ -48647,7 +38338,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61583">
+<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="47585">
<summary>
Do not audit attempts to receive pgpkeyserver_client packets.
</summary>
@@ -48658,7 +38349,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61602">
+<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="47604">
<summary>
Send and receive pgpkeyserver_client packets.
</summary>
@@ -48669,7 +38360,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61618">
+<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="47620">
<summary>
Do not audit attempts to send and receive pgpkeyserver_client packets.
</summary>
@@ -48680,7 +38371,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61633">
+<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="47635">
<summary>
Relabel packets to pgpkeyserver_client the packet type.
</summary>
@@ -48690,7 +38381,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61653">
+<interface name="corenet_send_pgpkeyserver_server_packets" lineno="47655">
<summary>
Send pgpkeyserver_server packets.
</summary>
@@ -48701,7 +38392,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61672">
+<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="47674">
<summary>
Do not audit attempts to send pgpkeyserver_server packets.
</summary>
@@ -48712,7 +38403,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61691">
+<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="47693">
<summary>
Receive pgpkeyserver_server packets.
</summary>
@@ -48723,7 +38414,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61710">
+<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="47712">
<summary>
Do not audit attempts to receive pgpkeyserver_server packets.
</summary>
@@ -48734,7 +38425,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61729">
+<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="47731">
<summary>
Send and receive pgpkeyserver_server packets.
</summary>
@@ -48745,7 +38436,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61745">
+<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="47747">
<summary>
Do not audit attempts to send and receive pgpkeyserver_server packets.
</summary>
@@ -48756,7 +38447,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61760">
+<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="47762">
<summary>
Relabel packets to pgpkeyserver_server the packet type.
</summary>
@@ -48766,85 +38457,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61782">
-<summary>
-Send and receive TCP traffic on the pingd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pingd_port" lineno="61797">
-<summary>
-Send UDP traffic on the pingd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61812">
-<summary>
-Do not audit attempts to send UDP traffic on the pingd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pingd_port" lineno="61827">
-<summary>
-Receive UDP traffic on the pingd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61842">
-<summary>
-Do not audit attempts to receive UDP traffic on the pingd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pingd_port" lineno="61857">
-<summary>
-Send and receive UDP traffic on the pingd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61873">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pingd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pingd_port" lineno="61888">
+<interface name="corenet_tcp_bind_pingd_port" lineno="47784">
<summary>
Bind TCP sockets to the pingd port.
</summary>
@@ -48855,7 +38468,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pingd_port" lineno="61908">
+<interface name="corenet_udp_bind_pingd_port" lineno="47804">
<summary>
Bind UDP sockets to the pingd port.
</summary>
@@ -48866,7 +38479,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pingd_port" lineno="61927">
+<interface name="corenet_tcp_connect_pingd_port" lineno="47823">
<summary>
Make a TCP connection to the pingd port.
</summary>
@@ -48876,7 +38489,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pingd_client_packets" lineno="61947">
+<interface name="corenet_send_pingd_client_packets" lineno="47843">
<summary>
Send pingd_client packets.
</summary>
@@ -48887,7 +38500,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61966">
+<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="47862">
<summary>
Do not audit attempts to send pingd_client packets.
</summary>
@@ -48898,7 +38511,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pingd_client_packets" lineno="61985">
+<interface name="corenet_receive_pingd_client_packets" lineno="47881">
<summary>
Receive pingd_client packets.
</summary>
@@ -48909,7 +38522,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="62004">
+<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="47900">
<summary>
Do not audit attempts to receive pingd_client packets.
</summary>
@@ -48920,7 +38533,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pingd_client_packets" lineno="62023">
+<interface name="corenet_sendrecv_pingd_client_packets" lineno="47919">
<summary>
Send and receive pingd_client packets.
</summary>
@@ -48931,7 +38544,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="62039">
+<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="47935">
<summary>
Do not audit attempts to send and receive pingd_client packets.
</summary>
@@ -48942,7 +38555,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pingd_client_packets" lineno="62054">
+<interface name="corenet_relabelto_pingd_client_packets" lineno="47950">
<summary>
Relabel packets to pingd_client the packet type.
</summary>
@@ -48952,7 +38565,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pingd_server_packets" lineno="62074">
+<interface name="corenet_send_pingd_server_packets" lineno="47970">
<summary>
Send pingd_server packets.
</summary>
@@ -48963,7 +38576,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="62093">
+<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="47989">
<summary>
Do not audit attempts to send pingd_server packets.
</summary>
@@ -48974,7 +38587,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pingd_server_packets" lineno="62112">
+<interface name="corenet_receive_pingd_server_packets" lineno="48008">
<summary>
Receive pingd_server packets.
</summary>
@@ -48985,7 +38598,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="62131">
+<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="48027">
<summary>
Do not audit attempts to receive pingd_server packets.
</summary>
@@ -48996,7 +38609,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pingd_server_packets" lineno="62150">
+<interface name="corenet_sendrecv_pingd_server_packets" lineno="48046">
<summary>
Send and receive pingd_server packets.
</summary>
@@ -49007,7 +38620,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="62166">
+<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="48062">
<summary>
Do not audit attempts to send and receive pingd_server packets.
</summary>
@@ -49018,7 +38631,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pingd_server_packets" lineno="62181">
+<interface name="corenet_relabelto_pingd_server_packets" lineno="48077">
<summary>
Relabel packets to pingd_server the packet type.
</summary>
@@ -49028,85 +38641,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="62203">
-<summary>
-Send and receive TCP traffic on the pktcable_cops port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pktcable_cops_port" lineno="62218">
-<summary>
-Send UDP traffic on the pktcable_cops port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="62233">
-<summary>
-Do not audit attempts to send UDP traffic on the pktcable_cops port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pktcable_cops_port" lineno="62248">
-<summary>
-Receive UDP traffic on the pktcable_cops port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="62263">
-<summary>
-Do not audit attempts to receive UDP traffic on the pktcable_cops port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="62278">
-<summary>
-Send and receive UDP traffic on the pktcable_cops port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="62294">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pktcable_cops port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="62309">
+<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="48099">
<summary>
Bind TCP sockets to the pktcable_cops port.
</summary>
@@ -49117,7 +38652,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pktcable_cops_port" lineno="62329">
+<interface name="corenet_udp_bind_pktcable_cops_port" lineno="48119">
<summary>
Bind UDP sockets to the pktcable_cops port.
</summary>
@@ -49128,7 +38663,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="62348">
+<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="48138">
<summary>
Make a TCP connection to the pktcable_cops port.
</summary>
@@ -49138,7 +38673,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pktcable_cops_client_packets" lineno="62368">
+<interface name="corenet_send_pktcable_cops_client_packets" lineno="48158">
<summary>
Send pktcable_cops_client packets.
</summary>
@@ -49149,7 +38684,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="62387">
+<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="48177">
<summary>
Do not audit attempts to send pktcable_cops_client packets.
</summary>
@@ -49160,7 +38695,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pktcable_cops_client_packets" lineno="62406">
+<interface name="corenet_receive_pktcable_cops_client_packets" lineno="48196">
<summary>
Receive pktcable_cops_client packets.
</summary>
@@ -49171,7 +38706,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="62425">
+<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="48215">
<summary>
Do not audit attempts to receive pktcable_cops_client packets.
</summary>
@@ -49182,7 +38717,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62444">
+<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="48234">
<summary>
Send and receive pktcable_cops_client packets.
</summary>
@@ -49193,7 +38728,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62460">
+<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="48250">
<summary>
Do not audit attempts to send and receive pktcable_cops_client packets.
</summary>
@@ -49204,7 +38739,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62475">
+<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="48265">
<summary>
Relabel packets to pktcable_cops_client the packet type.
</summary>
@@ -49214,7 +38749,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pktcable_cops_server_packets" lineno="62495">
+<interface name="corenet_send_pktcable_cops_server_packets" lineno="48285">
<summary>
Send pktcable_cops_server packets.
</summary>
@@ -49225,7 +38760,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62514">
+<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="48304">
<summary>
Do not audit attempts to send pktcable_cops_server packets.
</summary>
@@ -49236,7 +38771,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62533">
+<interface name="corenet_receive_pktcable_cops_server_packets" lineno="48323">
<summary>
Receive pktcable_cops_server packets.
</summary>
@@ -49247,7 +38782,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62552">
+<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="48342">
<summary>
Do not audit attempts to receive pktcable_cops_server packets.
</summary>
@@ -49258,7 +38793,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62571">
+<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="48361">
<summary>
Send and receive pktcable_cops_server packets.
</summary>
@@ -49269,7 +38804,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62587">
+<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="48377">
<summary>
Do not audit attempts to send and receive pktcable_cops_server packets.
</summary>
@@ -49280,7 +38815,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62602">
+<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="48392">
<summary>
Relabel packets to pktcable_cops_server the packet type.
</summary>
@@ -49290,85 +38825,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pop_port" lineno="62624">
-<summary>
-Send and receive TCP traffic on the pop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pop_port" lineno="62639">
-<summary>
-Send UDP traffic on the pop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62654">
-<summary>
-Do not audit attempts to send UDP traffic on the pop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pop_port" lineno="62669">
-<summary>
-Receive UDP traffic on the pop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62684">
-<summary>
-Do not audit attempts to receive UDP traffic on the pop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pop_port" lineno="62699">
-<summary>
-Send and receive UDP traffic on the pop port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62715">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pop port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pop_port" lineno="62730">
+<interface name="corenet_tcp_bind_pop_port" lineno="48414">
<summary>
Bind TCP sockets to the pop port.
</summary>
@@ -49379,7 +38836,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pop_port" lineno="62750">
+<interface name="corenet_udp_bind_pop_port" lineno="48434">
<summary>
Bind UDP sockets to the pop port.
</summary>
@@ -49390,7 +38847,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pop_port" lineno="62769">
+<interface name="corenet_tcp_connect_pop_port" lineno="48453">
<summary>
Make a TCP connection to the pop port.
</summary>
@@ -49400,7 +38857,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pop_client_packets" lineno="62789">
+<interface name="corenet_send_pop_client_packets" lineno="48473">
<summary>
Send pop_client packets.
</summary>
@@ -49411,7 +38868,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62808">
+<interface name="corenet_dontaudit_send_pop_client_packets" lineno="48492">
<summary>
Do not audit attempts to send pop_client packets.
</summary>
@@ -49422,7 +38879,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pop_client_packets" lineno="62827">
+<interface name="corenet_receive_pop_client_packets" lineno="48511">
<summary>
Receive pop_client packets.
</summary>
@@ -49433,7 +38890,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62846">
+<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="48530">
<summary>
Do not audit attempts to receive pop_client packets.
</summary>
@@ -49444,7 +38901,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pop_client_packets" lineno="62865">
+<interface name="corenet_sendrecv_pop_client_packets" lineno="48549">
<summary>
Send and receive pop_client packets.
</summary>
@@ -49455,7 +38912,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62881">
+<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="48565">
<summary>
Do not audit attempts to send and receive pop_client packets.
</summary>
@@ -49466,7 +38923,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pop_client_packets" lineno="62896">
+<interface name="corenet_relabelto_pop_client_packets" lineno="48580">
<summary>
Relabel packets to pop_client the packet type.
</summary>
@@ -49476,7 +38933,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pop_server_packets" lineno="62916">
+<interface name="corenet_send_pop_server_packets" lineno="48600">
<summary>
Send pop_server packets.
</summary>
@@ -49487,7 +38944,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62935">
+<interface name="corenet_dontaudit_send_pop_server_packets" lineno="48619">
<summary>
Do not audit attempts to send pop_server packets.
</summary>
@@ -49498,7 +38955,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pop_server_packets" lineno="62954">
+<interface name="corenet_receive_pop_server_packets" lineno="48638">
<summary>
Receive pop_server packets.
</summary>
@@ -49509,7 +38966,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62973">
+<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="48657">
<summary>
Do not audit attempts to receive pop_server packets.
</summary>
@@ -49520,7 +38977,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pop_server_packets" lineno="62992">
+<interface name="corenet_sendrecv_pop_server_packets" lineno="48676">
<summary>
Send and receive pop_server packets.
</summary>
@@ -49531,7 +38988,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="63008">
+<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="48692">
<summary>
Do not audit attempts to send and receive pop_server packets.
</summary>
@@ -49542,7 +38999,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pop_server_packets" lineno="63023">
+<interface name="corenet_relabelto_pop_server_packets" lineno="48707">
<summary>
Relabel packets to pop_server the packet type.
</summary>
@@ -49552,85 +39009,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_portmap_port" lineno="63045">
-<summary>
-Send and receive TCP traffic on the portmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_portmap_port" lineno="63060">
-<summary>
-Send UDP traffic on the portmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="63075">
-<summary>
-Do not audit attempts to send UDP traffic on the portmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_portmap_port" lineno="63090">
-<summary>
-Receive UDP traffic on the portmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="63105">
-<summary>
-Do not audit attempts to receive UDP traffic on the portmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_portmap_port" lineno="63120">
-<summary>
-Send and receive UDP traffic on the portmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="63136">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the portmap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_portmap_port" lineno="63151">
+<interface name="corenet_tcp_bind_portmap_port" lineno="48729">
<summary>
Bind TCP sockets to the portmap port.
</summary>
@@ -49641,7 +39020,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_portmap_port" lineno="63171">
+<interface name="corenet_udp_bind_portmap_port" lineno="48749">
<summary>
Bind UDP sockets to the portmap port.
</summary>
@@ -49652,7 +39031,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_portmap_port" lineno="63190">
+<interface name="corenet_tcp_connect_portmap_port" lineno="48768">
<summary>
Make a TCP connection to the portmap port.
</summary>
@@ -49662,7 +39041,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_portmap_client_packets" lineno="63210">
+<interface name="corenet_send_portmap_client_packets" lineno="48788">
<summary>
Send portmap_client packets.
</summary>
@@ -49673,7 +39052,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="63229">
+<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="48807">
<summary>
Do not audit attempts to send portmap_client packets.
</summary>
@@ -49684,7 +39063,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_portmap_client_packets" lineno="63248">
+<interface name="corenet_receive_portmap_client_packets" lineno="48826">
<summary>
Receive portmap_client packets.
</summary>
@@ -49695,7 +39074,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="63267">
+<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="48845">
<summary>
Do not audit attempts to receive portmap_client packets.
</summary>
@@ -49706,7 +39085,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_portmap_client_packets" lineno="63286">
+<interface name="corenet_sendrecv_portmap_client_packets" lineno="48864">
<summary>
Send and receive portmap_client packets.
</summary>
@@ -49717,7 +39096,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="63302">
+<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="48880">
<summary>
Do not audit attempts to send and receive portmap_client packets.
</summary>
@@ -49728,7 +39107,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_portmap_client_packets" lineno="63317">
+<interface name="corenet_relabelto_portmap_client_packets" lineno="48895">
<summary>
Relabel packets to portmap_client the packet type.
</summary>
@@ -49738,7 +39117,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_portmap_server_packets" lineno="63337">
+<interface name="corenet_send_portmap_server_packets" lineno="48915">
<summary>
Send portmap_server packets.
</summary>
@@ -49749,7 +39128,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="63356">
+<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="48934">
<summary>
Do not audit attempts to send portmap_server packets.
</summary>
@@ -49760,7 +39139,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_portmap_server_packets" lineno="63375">
+<interface name="corenet_receive_portmap_server_packets" lineno="48953">
<summary>
Receive portmap_server packets.
</summary>
@@ -49771,7 +39150,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="63394">
+<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="48972">
<summary>
Do not audit attempts to receive portmap_server packets.
</summary>
@@ -49782,7 +39161,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_portmap_server_packets" lineno="63413">
+<interface name="corenet_sendrecv_portmap_server_packets" lineno="48991">
<summary>
Send and receive portmap_server packets.
</summary>
@@ -49793,7 +39172,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="63429">
+<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="49007">
<summary>
Do not audit attempts to send and receive portmap_server packets.
</summary>
@@ -49804,7 +39183,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_portmap_server_packets" lineno="63444">
+<interface name="corenet_relabelto_portmap_server_packets" lineno="49022">
<summary>
Relabel packets to portmap_server the packet type.
</summary>
@@ -49814,85 +39193,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63466">
-<summary>
-Send and receive TCP traffic on the postfix_policyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_postfix_policyd_port" lineno="63481">
-<summary>
-Send UDP traffic on the postfix_policyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63496">
-<summary>
-Do not audit attempts to send UDP traffic on the postfix_policyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63511">
-<summary>
-Receive UDP traffic on the postfix_policyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63526">
-<summary>
-Do not audit attempts to receive UDP traffic on the postfix_policyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63541">
-<summary>
-Send and receive UDP traffic on the postfix_policyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63557">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the postfix_policyd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63572">
+<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="49044">
<summary>
Bind TCP sockets to the postfix_policyd port.
</summary>
@@ -49903,7 +39204,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63592">
+<interface name="corenet_udp_bind_postfix_policyd_port" lineno="49064">
<summary>
Bind UDP sockets to the postfix_policyd port.
</summary>
@@ -49914,7 +39215,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63611">
+<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="49083">
<summary>
Make a TCP connection to the postfix_policyd port.
</summary>
@@ -49924,7 +39225,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postfix_policyd_client_packets" lineno="63631">
+<interface name="corenet_send_postfix_policyd_client_packets" lineno="49103">
<summary>
Send postfix_policyd_client packets.
</summary>
@@ -49935,7 +39236,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63650">
+<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="49122">
<summary>
Do not audit attempts to send postfix_policyd_client packets.
</summary>
@@ -49946,7 +39247,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63669">
+<interface name="corenet_receive_postfix_policyd_client_packets" lineno="49141">
<summary>
Receive postfix_policyd_client packets.
</summary>
@@ -49957,7 +39258,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63688">
+<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="49160">
<summary>
Do not audit attempts to receive postfix_policyd_client packets.
</summary>
@@ -49968,7 +39269,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63707">
+<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="49179">
<summary>
Send and receive postfix_policyd_client packets.
</summary>
@@ -49979,7 +39280,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63723">
+<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="49195">
<summary>
Do not audit attempts to send and receive postfix_policyd_client packets.
</summary>
@@ -49990,7 +39291,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63738">
+<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="49210">
<summary>
Relabel packets to postfix_policyd_client the packet type.
</summary>
@@ -50000,7 +39301,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postfix_policyd_server_packets" lineno="63758">
+<interface name="corenet_send_postfix_policyd_server_packets" lineno="49230">
<summary>
Send postfix_policyd_server packets.
</summary>
@@ -50011,7 +39312,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63777">
+<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="49249">
<summary>
Do not audit attempts to send postfix_policyd_server packets.
</summary>
@@ -50022,7 +39323,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63796">
+<interface name="corenet_receive_postfix_policyd_server_packets" lineno="49268">
<summary>
Receive postfix_policyd_server packets.
</summary>
@@ -50033,7 +39334,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63815">
+<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="49287">
<summary>
Do not audit attempts to receive postfix_policyd_server packets.
</summary>
@@ -50044,7 +39345,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63834">
+<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="49306">
<summary>
Send and receive postfix_policyd_server packets.
</summary>
@@ -50055,7 +39356,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63850">
+<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="49322">
<summary>
Do not audit attempts to send and receive postfix_policyd_server packets.
</summary>
@@ -50066,7 +39367,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63865">
+<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="49337">
<summary>
Relabel packets to postfix_policyd_server the packet type.
</summary>
@@ -50076,85 +39377,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63887">
-<summary>
-Send and receive TCP traffic on the postgresql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_postgresql_port" lineno="63902">
-<summary>
-Send UDP traffic on the postgresql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63917">
-<summary>
-Do not audit attempts to send UDP traffic on the postgresql port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_postgresql_port" lineno="63932">
-<summary>
-Receive UDP traffic on the postgresql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63947">
-<summary>
-Do not audit attempts to receive UDP traffic on the postgresql port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63962">
-<summary>
-Send and receive UDP traffic on the postgresql port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63978">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the postgresql port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_postgresql_port" lineno="63993">
+<interface name="corenet_tcp_bind_postgresql_port" lineno="49359">
<summary>
Bind TCP sockets to the postgresql port.
</summary>
@@ -50165,7 +39388,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_postgresql_port" lineno="64013">
+<interface name="corenet_udp_bind_postgresql_port" lineno="49379">
<summary>
Bind UDP sockets to the postgresql port.
</summary>
@@ -50176,7 +39399,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_postgresql_port" lineno="64032">
+<interface name="corenet_tcp_connect_postgresql_port" lineno="49398">
<summary>
Make a TCP connection to the postgresql port.
</summary>
@@ -50186,7 +39409,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgresql_client_packets" lineno="64052">
+<interface name="corenet_send_postgresql_client_packets" lineno="49418">
<summary>
Send postgresql_client packets.
</summary>
@@ -50197,7 +39420,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="64071">
+<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="49437">
<summary>
Do not audit attempts to send postgresql_client packets.
</summary>
@@ -50208,7 +39431,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgresql_client_packets" lineno="64090">
+<interface name="corenet_receive_postgresql_client_packets" lineno="49456">
<summary>
Receive postgresql_client packets.
</summary>
@@ -50219,7 +39442,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="64109">
+<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="49475">
<summary>
Do not audit attempts to receive postgresql_client packets.
</summary>
@@ -50230,7 +39453,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgresql_client_packets" lineno="64128">
+<interface name="corenet_sendrecv_postgresql_client_packets" lineno="49494">
<summary>
Send and receive postgresql_client packets.
</summary>
@@ -50241,7 +39464,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="64144">
+<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="49510">
<summary>
Do not audit attempts to send and receive postgresql_client packets.
</summary>
@@ -50252,7 +39475,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgresql_client_packets" lineno="64159">
+<interface name="corenet_relabelto_postgresql_client_packets" lineno="49525">
<summary>
Relabel packets to postgresql_client the packet type.
</summary>
@@ -50262,7 +39485,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgresql_server_packets" lineno="64179">
+<interface name="corenet_send_postgresql_server_packets" lineno="49545">
<summary>
Send postgresql_server packets.
</summary>
@@ -50273,7 +39496,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="64198">
+<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="49564">
<summary>
Do not audit attempts to send postgresql_server packets.
</summary>
@@ -50284,7 +39507,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgresql_server_packets" lineno="64217">
+<interface name="corenet_receive_postgresql_server_packets" lineno="49583">
<summary>
Receive postgresql_server packets.
</summary>
@@ -50295,7 +39518,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="64236">
+<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="49602">
<summary>
Do not audit attempts to receive postgresql_server packets.
</summary>
@@ -50306,7 +39529,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgresql_server_packets" lineno="64255">
+<interface name="corenet_sendrecv_postgresql_server_packets" lineno="49621">
<summary>
Send and receive postgresql_server packets.
</summary>
@@ -50317,7 +39540,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="64271">
+<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="49637">
<summary>
Do not audit attempts to send and receive postgresql_server packets.
</summary>
@@ -50328,7 +39551,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgresql_server_packets" lineno="64286">
+<interface name="corenet_relabelto_postgresql_server_packets" lineno="49652">
<summary>
Relabel packets to postgresql_server the packet type.
</summary>
@@ -50338,85 +39561,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="64308">
-<summary>
-Send and receive TCP traffic on the postgrey port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_postgrey_port" lineno="64323">
-<summary>
-Send UDP traffic on the postgrey port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="64338">
-<summary>
-Do not audit attempts to send UDP traffic on the postgrey port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_postgrey_port" lineno="64353">
-<summary>
-Receive UDP traffic on the postgrey port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="64368">
-<summary>
-Do not audit attempts to receive UDP traffic on the postgrey port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_postgrey_port" lineno="64383">
-<summary>
-Send and receive UDP traffic on the postgrey port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="64399">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the postgrey port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_postgrey_port" lineno="64414">
+<interface name="corenet_tcp_bind_postgrey_port" lineno="49674">
<summary>
Bind TCP sockets to the postgrey port.
</summary>
@@ -50427,7 +39572,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_postgrey_port" lineno="64434">
+<interface name="corenet_udp_bind_postgrey_port" lineno="49694">
<summary>
Bind UDP sockets to the postgrey port.
</summary>
@@ -50438,7 +39583,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_postgrey_port" lineno="64453">
+<interface name="corenet_tcp_connect_postgrey_port" lineno="49713">
<summary>
Make a TCP connection to the postgrey port.
</summary>
@@ -50448,7 +39593,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgrey_client_packets" lineno="64473">
+<interface name="corenet_send_postgrey_client_packets" lineno="49733">
<summary>
Send postgrey_client packets.
</summary>
@@ -50459,7 +39604,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64492">
+<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="49752">
<summary>
Do not audit attempts to send postgrey_client packets.
</summary>
@@ -50470,7 +39615,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgrey_client_packets" lineno="64511">
+<interface name="corenet_receive_postgrey_client_packets" lineno="49771">
<summary>
Receive postgrey_client packets.
</summary>
@@ -50481,7 +39626,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64530">
+<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="49790">
<summary>
Do not audit attempts to receive postgrey_client packets.
</summary>
@@ -50492,7 +39637,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64549">
+<interface name="corenet_sendrecv_postgrey_client_packets" lineno="49809">
<summary>
Send and receive postgrey_client packets.
</summary>
@@ -50503,7 +39648,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64565">
+<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="49825">
<summary>
Do not audit attempts to send and receive postgrey_client packets.
</summary>
@@ -50514,7 +39659,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgrey_client_packets" lineno="64580">
+<interface name="corenet_relabelto_postgrey_client_packets" lineno="49840">
<summary>
Relabel packets to postgrey_client the packet type.
</summary>
@@ -50524,7 +39669,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgrey_server_packets" lineno="64600">
+<interface name="corenet_send_postgrey_server_packets" lineno="49860">
<summary>
Send postgrey_server packets.
</summary>
@@ -50535,7 +39680,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64619">
+<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="49879">
<summary>
Do not audit attempts to send postgrey_server packets.
</summary>
@@ -50546,7 +39691,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgrey_server_packets" lineno="64638">
+<interface name="corenet_receive_postgrey_server_packets" lineno="49898">
<summary>
Receive postgrey_server packets.
</summary>
@@ -50557,7 +39702,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64657">
+<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="49917">
<summary>
Do not audit attempts to receive postgrey_server packets.
</summary>
@@ -50568,7 +39713,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64676">
+<interface name="corenet_sendrecv_postgrey_server_packets" lineno="49936">
<summary>
Send and receive postgrey_server packets.
</summary>
@@ -50579,7 +39724,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64692">
+<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="49952">
<summary>
Do not audit attempts to send and receive postgrey_server packets.
</summary>
@@ -50590,7 +39735,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgrey_server_packets" lineno="64707">
+<interface name="corenet_relabelto_postgrey_server_packets" lineno="49967">
<summary>
Relabel packets to postgrey_server the packet type.
</summary>
@@ -50600,85 +39745,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64729">
-<summary>
-Send and receive TCP traffic on the pptp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pptp_port" lineno="64744">
-<summary>
-Send UDP traffic on the pptp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64759">
-<summary>
-Do not audit attempts to send UDP traffic on the pptp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pptp_port" lineno="64774">
-<summary>
-Receive UDP traffic on the pptp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64789">
-<summary>
-Do not audit attempts to receive UDP traffic on the pptp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pptp_port" lineno="64804">
-<summary>
-Send and receive UDP traffic on the pptp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64820">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pptp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pptp_port" lineno="64835">
+<interface name="corenet_tcp_bind_pptp_port" lineno="49989">
<summary>
Bind TCP sockets to the pptp port.
</summary>
@@ -50689,7 +39756,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pptp_port" lineno="64855">
+<interface name="corenet_udp_bind_pptp_port" lineno="50009">
<summary>
Bind UDP sockets to the pptp port.
</summary>
@@ -50700,7 +39767,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pptp_port" lineno="64874">
+<interface name="corenet_tcp_connect_pptp_port" lineno="50028">
<summary>
Make a TCP connection to the pptp port.
</summary>
@@ -50710,7 +39777,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pptp_client_packets" lineno="64894">
+<interface name="corenet_send_pptp_client_packets" lineno="50048">
<summary>
Send pptp_client packets.
</summary>
@@ -50721,7 +39788,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64913">
+<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="50067">
<summary>
Do not audit attempts to send pptp_client packets.
</summary>
@@ -50732,7 +39799,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pptp_client_packets" lineno="64932">
+<interface name="corenet_receive_pptp_client_packets" lineno="50086">
<summary>
Receive pptp_client packets.
</summary>
@@ -50743,7 +39810,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64951">
+<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="50105">
<summary>
Do not audit attempts to receive pptp_client packets.
</summary>
@@ -50754,7 +39821,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pptp_client_packets" lineno="64970">
+<interface name="corenet_sendrecv_pptp_client_packets" lineno="50124">
<summary>
Send and receive pptp_client packets.
</summary>
@@ -50765,7 +39832,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64986">
+<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="50140">
<summary>
Do not audit attempts to send and receive pptp_client packets.
</summary>
@@ -50776,7 +39843,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pptp_client_packets" lineno="65001">
+<interface name="corenet_relabelto_pptp_client_packets" lineno="50155">
<summary>
Relabel packets to pptp_client the packet type.
</summary>
@@ -50786,7 +39853,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pptp_server_packets" lineno="65021">
+<interface name="corenet_send_pptp_server_packets" lineno="50175">
<summary>
Send pptp_server packets.
</summary>
@@ -50797,7 +39864,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="65040">
+<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="50194">
<summary>
Do not audit attempts to send pptp_server packets.
</summary>
@@ -50808,7 +39875,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pptp_server_packets" lineno="65059">
+<interface name="corenet_receive_pptp_server_packets" lineno="50213">
<summary>
Receive pptp_server packets.
</summary>
@@ -50819,7 +39886,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="65078">
+<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="50232">
<summary>
Do not audit attempts to receive pptp_server packets.
</summary>
@@ -50830,7 +39897,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pptp_server_packets" lineno="65097">
+<interface name="corenet_sendrecv_pptp_server_packets" lineno="50251">
<summary>
Send and receive pptp_server packets.
</summary>
@@ -50841,7 +39908,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="65113">
+<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="50267">
<summary>
Do not audit attempts to send and receive pptp_server packets.
</summary>
@@ -50852,7 +39919,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pptp_server_packets" lineno="65128">
+<interface name="corenet_relabelto_pptp_server_packets" lineno="50282">
<summary>
Relabel packets to pptp_server the packet type.
</summary>
@@ -50862,85 +39929,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_prelude_port" lineno="65150">
-<summary>
-Send and receive TCP traffic on the prelude port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_prelude_port" lineno="65165">
-<summary>
-Send UDP traffic on the prelude port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="65180">
-<summary>
-Do not audit attempts to send UDP traffic on the prelude port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_prelude_port" lineno="65195">
-<summary>
-Receive UDP traffic on the prelude port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="65210">
-<summary>
-Do not audit attempts to receive UDP traffic on the prelude port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_prelude_port" lineno="65225">
-<summary>
-Send and receive UDP traffic on the prelude port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="65241">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the prelude port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_prelude_port" lineno="65256">
+<interface name="corenet_tcp_bind_prelude_port" lineno="50304">
<summary>
Bind TCP sockets to the prelude port.
</summary>
@@ -50951,7 +39940,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_prelude_port" lineno="65276">
+<interface name="corenet_udp_bind_prelude_port" lineno="50324">
<summary>
Bind UDP sockets to the prelude port.
</summary>
@@ -50962,7 +39951,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_prelude_port" lineno="65295">
+<interface name="corenet_tcp_connect_prelude_port" lineno="50343">
<summary>
Make a TCP connection to the prelude port.
</summary>
@@ -50972,7 +39961,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_prelude_client_packets" lineno="65315">
+<interface name="corenet_send_prelude_client_packets" lineno="50363">
<summary>
Send prelude_client packets.
</summary>
@@ -50983,7 +39972,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="65334">
+<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="50382">
<summary>
Do not audit attempts to send prelude_client packets.
</summary>
@@ -50994,7 +39983,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_prelude_client_packets" lineno="65353">
+<interface name="corenet_receive_prelude_client_packets" lineno="50401">
<summary>
Receive prelude_client packets.
</summary>
@@ -51005,7 +39994,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="65372">
+<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="50420">
<summary>
Do not audit attempts to receive prelude_client packets.
</summary>
@@ -51016,7 +40005,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_prelude_client_packets" lineno="65391">
+<interface name="corenet_sendrecv_prelude_client_packets" lineno="50439">
<summary>
Send and receive prelude_client packets.
</summary>
@@ -51027,7 +40016,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="65407">
+<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="50455">
<summary>
Do not audit attempts to send and receive prelude_client packets.
</summary>
@@ -51038,7 +40027,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_prelude_client_packets" lineno="65422">
+<interface name="corenet_relabelto_prelude_client_packets" lineno="50470">
<summary>
Relabel packets to prelude_client the packet type.
</summary>
@@ -51048,7 +40037,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_prelude_server_packets" lineno="65442">
+<interface name="corenet_send_prelude_server_packets" lineno="50490">
<summary>
Send prelude_server packets.
</summary>
@@ -51059,7 +40048,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65461">
+<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="50509">
<summary>
Do not audit attempts to send prelude_server packets.
</summary>
@@ -51070,7 +40059,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_prelude_server_packets" lineno="65480">
+<interface name="corenet_receive_prelude_server_packets" lineno="50528">
<summary>
Receive prelude_server packets.
</summary>
@@ -51081,7 +40070,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65499">
+<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="50547">
<summary>
Do not audit attempts to receive prelude_server packets.
</summary>
@@ -51092,7 +40081,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_prelude_server_packets" lineno="65518">
+<interface name="corenet_sendrecv_prelude_server_packets" lineno="50566">
<summary>
Send and receive prelude_server packets.
</summary>
@@ -51103,7 +40092,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65534">
+<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="50582">
<summary>
Do not audit attempts to send and receive prelude_server packets.
</summary>
@@ -51114,7 +40103,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_prelude_server_packets" lineno="65549">
+<interface name="corenet_relabelto_prelude_server_packets" lineno="50597">
<summary>
Relabel packets to prelude_server the packet type.
</summary>
@@ -51124,85 +40113,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_presence_port" lineno="65571">
-<summary>
-Send and receive TCP traffic on the presence port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_presence_port" lineno="65586">
-<summary>
-Send UDP traffic on the presence port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65601">
-<summary>
-Do not audit attempts to send UDP traffic on the presence port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_presence_port" lineno="65616">
-<summary>
-Receive UDP traffic on the presence port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65631">
-<summary>
-Do not audit attempts to receive UDP traffic on the presence port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_presence_port" lineno="65646">
-<summary>
-Send and receive UDP traffic on the presence port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65662">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the presence port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_presence_port" lineno="65677">
+<interface name="corenet_tcp_bind_presence_port" lineno="50619">
<summary>
Bind TCP sockets to the presence port.
</summary>
@@ -51213,7 +40124,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_presence_port" lineno="65697">
+<interface name="corenet_udp_bind_presence_port" lineno="50639">
<summary>
Bind UDP sockets to the presence port.
</summary>
@@ -51224,7 +40135,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_presence_port" lineno="65716">
+<interface name="corenet_tcp_connect_presence_port" lineno="50658">
<summary>
Make a TCP connection to the presence port.
</summary>
@@ -51234,7 +40145,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_presence_client_packets" lineno="65736">
+<interface name="corenet_send_presence_client_packets" lineno="50678">
<summary>
Send presence_client packets.
</summary>
@@ -51245,7 +40156,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65755">
+<interface name="corenet_dontaudit_send_presence_client_packets" lineno="50697">
<summary>
Do not audit attempts to send presence_client packets.
</summary>
@@ -51256,7 +40167,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_presence_client_packets" lineno="65774">
+<interface name="corenet_receive_presence_client_packets" lineno="50716">
<summary>
Receive presence_client packets.
</summary>
@@ -51267,7 +40178,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65793">
+<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="50735">
<summary>
Do not audit attempts to receive presence_client packets.
</summary>
@@ -51278,7 +40189,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_presence_client_packets" lineno="65812">
+<interface name="corenet_sendrecv_presence_client_packets" lineno="50754">
<summary>
Send and receive presence_client packets.
</summary>
@@ -51289,7 +40200,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65828">
+<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="50770">
<summary>
Do not audit attempts to send and receive presence_client packets.
</summary>
@@ -51300,7 +40211,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_presence_client_packets" lineno="65843">
+<interface name="corenet_relabelto_presence_client_packets" lineno="50785">
<summary>
Relabel packets to presence_client the packet type.
</summary>
@@ -51310,7 +40221,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_presence_server_packets" lineno="65863">
+<interface name="corenet_send_presence_server_packets" lineno="50805">
<summary>
Send presence_server packets.
</summary>
@@ -51321,7 +40232,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65882">
+<interface name="corenet_dontaudit_send_presence_server_packets" lineno="50824">
<summary>
Do not audit attempts to send presence_server packets.
</summary>
@@ -51332,7 +40243,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_presence_server_packets" lineno="65901">
+<interface name="corenet_receive_presence_server_packets" lineno="50843">
<summary>
Receive presence_server packets.
</summary>
@@ -51343,7 +40254,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65920">
+<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="50862">
<summary>
Do not audit attempts to receive presence_server packets.
</summary>
@@ -51354,7 +40265,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_presence_server_packets" lineno="65939">
+<interface name="corenet_sendrecv_presence_server_packets" lineno="50881">
<summary>
Send and receive presence_server packets.
</summary>
@@ -51365,7 +40276,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65955">
+<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="50897">
<summary>
Do not audit attempts to send and receive presence_server packets.
</summary>
@@ -51376,7 +40287,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_presence_server_packets" lineno="65970">
+<interface name="corenet_relabelto_presence_server_packets" lineno="50912">
<summary>
Relabel packets to presence_server the packet type.
</summary>
@@ -51386,85 +40297,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_printer_port" lineno="65992">
-<summary>
-Send and receive TCP traffic on the printer port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_printer_port" lineno="66007">
-<summary>
-Send UDP traffic on the printer port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_printer_port" lineno="66022">
-<summary>
-Do not audit attempts to send UDP traffic on the printer port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_printer_port" lineno="66037">
-<summary>
-Receive UDP traffic on the printer port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="66052">
-<summary>
-Do not audit attempts to receive UDP traffic on the printer port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_printer_port" lineno="66067">
-<summary>
-Send and receive UDP traffic on the printer port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="66083">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the printer port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_printer_port" lineno="66098">
+<interface name="corenet_tcp_bind_printer_port" lineno="50934">
<summary>
Bind TCP sockets to the printer port.
</summary>
@@ -51475,7 +40308,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_printer_port" lineno="66118">
+<interface name="corenet_udp_bind_printer_port" lineno="50954">
<summary>
Bind UDP sockets to the printer port.
</summary>
@@ -51486,7 +40319,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_printer_port" lineno="66137">
+<interface name="corenet_tcp_connect_printer_port" lineno="50973">
<summary>
Make a TCP connection to the printer port.
</summary>
@@ -51496,7 +40329,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_printer_client_packets" lineno="66157">
+<interface name="corenet_send_printer_client_packets" lineno="50993">
<summary>
Send printer_client packets.
</summary>
@@ -51507,7 +40340,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_printer_client_packets" lineno="66176">
+<interface name="corenet_dontaudit_send_printer_client_packets" lineno="51012">
<summary>
Do not audit attempts to send printer_client packets.
</summary>
@@ -51518,7 +40351,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_printer_client_packets" lineno="66195">
+<interface name="corenet_receive_printer_client_packets" lineno="51031">
<summary>
Receive printer_client packets.
</summary>
@@ -51529,7 +40362,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="66214">
+<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="51050">
<summary>
Do not audit attempts to receive printer_client packets.
</summary>
@@ -51540,7 +40373,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_printer_client_packets" lineno="66233">
+<interface name="corenet_sendrecv_printer_client_packets" lineno="51069">
<summary>
Send and receive printer_client packets.
</summary>
@@ -51551,7 +40384,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="66249">
+<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="51085">
<summary>
Do not audit attempts to send and receive printer_client packets.
</summary>
@@ -51562,7 +40395,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_printer_client_packets" lineno="66264">
+<interface name="corenet_relabelto_printer_client_packets" lineno="51100">
<summary>
Relabel packets to printer_client the packet type.
</summary>
@@ -51572,7 +40405,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_printer_server_packets" lineno="66284">
+<interface name="corenet_send_printer_server_packets" lineno="51120">
<summary>
Send printer_server packets.
</summary>
@@ -51583,7 +40416,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_printer_server_packets" lineno="66303">
+<interface name="corenet_dontaudit_send_printer_server_packets" lineno="51139">
<summary>
Do not audit attempts to send printer_server packets.
</summary>
@@ -51594,7 +40427,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_printer_server_packets" lineno="66322">
+<interface name="corenet_receive_printer_server_packets" lineno="51158">
<summary>
Receive printer_server packets.
</summary>
@@ -51605,7 +40438,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="66341">
+<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="51177">
<summary>
Do not audit attempts to receive printer_server packets.
</summary>
@@ -51616,7 +40449,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_printer_server_packets" lineno="66360">
+<interface name="corenet_sendrecv_printer_server_packets" lineno="51196">
<summary>
Send and receive printer_server packets.
</summary>
@@ -51627,7 +40460,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="66376">
+<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="51212">
<summary>
Do not audit attempts to send and receive printer_server packets.
</summary>
@@ -51638,7 +40471,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_printer_server_packets" lineno="66391">
+<interface name="corenet_relabelto_printer_server_packets" lineno="51227">
<summary>
Relabel packets to printer_server the packet type.
</summary>
@@ -51648,85 +40481,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ptal_port" lineno="66413">
-<summary>
-Send and receive TCP traffic on the ptal port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ptal_port" lineno="66428">
-<summary>
-Send UDP traffic on the ptal port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66443">
-<summary>
-Do not audit attempts to send UDP traffic on the ptal port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ptal_port" lineno="66458">
-<summary>
-Receive UDP traffic on the ptal port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66473">
-<summary>
-Do not audit attempts to receive UDP traffic on the ptal port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ptal_port" lineno="66488">
-<summary>
-Send and receive UDP traffic on the ptal port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66504">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ptal port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ptal_port" lineno="66519">
+<interface name="corenet_tcp_bind_ptal_port" lineno="51249">
<summary>
Bind TCP sockets to the ptal port.
</summary>
@@ -51737,7 +40492,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ptal_port" lineno="66539">
+<interface name="corenet_udp_bind_ptal_port" lineno="51269">
<summary>
Bind UDP sockets to the ptal port.
</summary>
@@ -51748,7 +40503,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ptal_port" lineno="66558">
+<interface name="corenet_tcp_connect_ptal_port" lineno="51288">
<summary>
Make a TCP connection to the ptal port.
</summary>
@@ -51758,7 +40513,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ptal_client_packets" lineno="66578">
+<interface name="corenet_send_ptal_client_packets" lineno="51308">
<summary>
Send ptal_client packets.
</summary>
@@ -51769,7 +40524,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66597">
+<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="51327">
<summary>
Do not audit attempts to send ptal_client packets.
</summary>
@@ -51780,7 +40535,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ptal_client_packets" lineno="66616">
+<interface name="corenet_receive_ptal_client_packets" lineno="51346">
<summary>
Receive ptal_client packets.
</summary>
@@ -51791,7 +40546,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66635">
+<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="51365">
<summary>
Do not audit attempts to receive ptal_client packets.
</summary>
@@ -51802,7 +40557,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ptal_client_packets" lineno="66654">
+<interface name="corenet_sendrecv_ptal_client_packets" lineno="51384">
<summary>
Send and receive ptal_client packets.
</summary>
@@ -51813,7 +40568,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66670">
+<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="51400">
<summary>
Do not audit attempts to send and receive ptal_client packets.
</summary>
@@ -51824,7 +40579,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ptal_client_packets" lineno="66685">
+<interface name="corenet_relabelto_ptal_client_packets" lineno="51415">
<summary>
Relabel packets to ptal_client the packet type.
</summary>
@@ -51834,7 +40589,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ptal_server_packets" lineno="66705">
+<interface name="corenet_send_ptal_server_packets" lineno="51435">
<summary>
Send ptal_server packets.
</summary>
@@ -51845,7 +40600,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66724">
+<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="51454">
<summary>
Do not audit attempts to send ptal_server packets.
</summary>
@@ -51856,7 +40611,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ptal_server_packets" lineno="66743">
+<interface name="corenet_receive_ptal_server_packets" lineno="51473">
<summary>
Receive ptal_server packets.
</summary>
@@ -51867,7 +40622,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66762">
+<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="51492">
<summary>
Do not audit attempts to receive ptal_server packets.
</summary>
@@ -51878,7 +40633,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ptal_server_packets" lineno="66781">
+<interface name="corenet_sendrecv_ptal_server_packets" lineno="51511">
<summary>
Send and receive ptal_server packets.
</summary>
@@ -51889,7 +40644,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66797">
+<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="51527">
<summary>
Do not audit attempts to send and receive ptal_server packets.
</summary>
@@ -51900,7 +40655,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ptal_server_packets" lineno="66812">
+<interface name="corenet_relabelto_ptal_server_packets" lineno="51542">
<summary>
Relabel packets to ptal_server the packet type.
</summary>
@@ -51910,85 +40665,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66834">
-<summary>
-Send and receive TCP traffic on the pulseaudio port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pulseaudio_port" lineno="66849">
-<summary>
-Send UDP traffic on the pulseaudio port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66864">
-<summary>
-Do not audit attempts to send UDP traffic on the pulseaudio port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pulseaudio_port" lineno="66879">
-<summary>
-Receive UDP traffic on the pulseaudio port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66894">
-<summary>
-Do not audit attempts to receive UDP traffic on the pulseaudio port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66909">
-<summary>
-Send and receive UDP traffic on the pulseaudio port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66925">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pulseaudio port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66940">
+<interface name="corenet_tcp_bind_pulseaudio_port" lineno="51564">
<summary>
Bind TCP sockets to the pulseaudio port.
</summary>
@@ -51999,7 +40676,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pulseaudio_port" lineno="66960">
+<interface name="corenet_udp_bind_pulseaudio_port" lineno="51584">
<summary>
Bind UDP sockets to the pulseaudio port.
</summary>
@@ -52010,7 +40687,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66979">
+<interface name="corenet_tcp_connect_pulseaudio_port" lineno="51603">
<summary>
Make a TCP connection to the pulseaudio port.
</summary>
@@ -52020,7 +40697,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pulseaudio_client_packets" lineno="66999">
+<interface name="corenet_send_pulseaudio_client_packets" lineno="51623">
<summary>
Send pulseaudio_client packets.
</summary>
@@ -52031,7 +40708,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="67018">
+<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="51642">
<summary>
Do not audit attempts to send pulseaudio_client packets.
</summary>
@@ -52042,7 +40719,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pulseaudio_client_packets" lineno="67037">
+<interface name="corenet_receive_pulseaudio_client_packets" lineno="51661">
<summary>
Receive pulseaudio_client packets.
</summary>
@@ -52053,7 +40730,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="67056">
+<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="51680">
<summary>
Do not audit attempts to receive pulseaudio_client packets.
</summary>
@@ -52064,7 +40741,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="67075">
+<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="51699">
<summary>
Send and receive pulseaudio_client packets.
</summary>
@@ -52075,7 +40752,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="67091">
+<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="51715">
<summary>
Do not audit attempts to send and receive pulseaudio_client packets.
</summary>
@@ -52086,7 +40763,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="67106">
+<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="51730">
<summary>
Relabel packets to pulseaudio_client the packet type.
</summary>
@@ -52096,7 +40773,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pulseaudio_server_packets" lineno="67126">
+<interface name="corenet_send_pulseaudio_server_packets" lineno="51750">
<summary>
Send pulseaudio_server packets.
</summary>
@@ -52107,7 +40784,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="67145">
+<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="51769">
<summary>
Do not audit attempts to send pulseaudio_server packets.
</summary>
@@ -52118,7 +40795,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pulseaudio_server_packets" lineno="67164">
+<interface name="corenet_receive_pulseaudio_server_packets" lineno="51788">
<summary>
Receive pulseaudio_server packets.
</summary>
@@ -52129,7 +40806,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="67183">
+<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="51807">
<summary>
Do not audit attempts to receive pulseaudio_server packets.
</summary>
@@ -52140,7 +40817,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="67202">
+<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="51826">
<summary>
Send and receive pulseaudio_server packets.
</summary>
@@ -52151,7 +40828,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="67218">
+<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="51842">
<summary>
Do not audit attempts to send and receive pulseaudio_server packets.
</summary>
@@ -52162,7 +40839,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="67233">
+<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="51857">
<summary>
Relabel packets to pulseaudio_server the packet type.
</summary>
@@ -52172,85 +40849,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_puppet_port" lineno="67255">
-<summary>
-Send and receive TCP traffic on the puppet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_puppet_port" lineno="67270">
-<summary>
-Send UDP traffic on the puppet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="67285">
-<summary>
-Do not audit attempts to send UDP traffic on the puppet port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_puppet_port" lineno="67300">
-<summary>
-Receive UDP traffic on the puppet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="67315">
-<summary>
-Do not audit attempts to receive UDP traffic on the puppet port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_puppet_port" lineno="67330">
-<summary>
-Send and receive UDP traffic on the puppet port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="67346">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the puppet port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_puppet_port" lineno="67361">
+<interface name="corenet_tcp_bind_puppet_port" lineno="51879">
<summary>
Bind TCP sockets to the puppet port.
</summary>
@@ -52261,7 +40860,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_puppet_port" lineno="67381">
+<interface name="corenet_udp_bind_puppet_port" lineno="51899">
<summary>
Bind UDP sockets to the puppet port.
</summary>
@@ -52272,7 +40871,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_puppet_port" lineno="67400">
+<interface name="corenet_tcp_connect_puppet_port" lineno="51918">
<summary>
Make a TCP connection to the puppet port.
</summary>
@@ -52282,7 +40881,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppet_client_packets" lineno="67420">
+<interface name="corenet_send_puppet_client_packets" lineno="51938">
<summary>
Send puppet_client packets.
</summary>
@@ -52293,7 +40892,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67439">
+<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="51957">
<summary>
Do not audit attempts to send puppet_client packets.
</summary>
@@ -52304,7 +40903,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppet_client_packets" lineno="67458">
+<interface name="corenet_receive_puppet_client_packets" lineno="51976">
<summary>
Receive puppet_client packets.
</summary>
@@ -52315,7 +40914,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67477">
+<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="51995">
<summary>
Do not audit attempts to receive puppet_client packets.
</summary>
@@ -52326,7 +40925,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppet_client_packets" lineno="67496">
+<interface name="corenet_sendrecv_puppet_client_packets" lineno="52014">
<summary>
Send and receive puppet_client packets.
</summary>
@@ -52337,7 +40936,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67512">
+<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="52030">
<summary>
Do not audit attempts to send and receive puppet_client packets.
</summary>
@@ -52348,7 +40947,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppet_client_packets" lineno="67527">
+<interface name="corenet_relabelto_puppet_client_packets" lineno="52045">
<summary>
Relabel packets to puppet_client the packet type.
</summary>
@@ -52358,7 +40957,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppet_server_packets" lineno="67547">
+<interface name="corenet_send_puppet_server_packets" lineno="52065">
<summary>
Send puppet_server packets.
</summary>
@@ -52369,7 +40968,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67566">
+<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="52084">
<summary>
Do not audit attempts to send puppet_server packets.
</summary>
@@ -52380,7 +40979,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppet_server_packets" lineno="67585">
+<interface name="corenet_receive_puppet_server_packets" lineno="52103">
<summary>
Receive puppet_server packets.
</summary>
@@ -52391,7 +40990,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67604">
+<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="52122">
<summary>
Do not audit attempts to receive puppet_server packets.
</summary>
@@ -52402,7 +41001,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppet_server_packets" lineno="67623">
+<interface name="corenet_sendrecv_puppet_server_packets" lineno="52141">
<summary>
Send and receive puppet_server packets.
</summary>
@@ -52413,7 +41012,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67639">
+<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="52157">
<summary>
Do not audit attempts to send and receive puppet_server packets.
</summary>
@@ -52424,7 +41023,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppet_server_packets" lineno="67654">
+<interface name="corenet_relabelto_puppet_server_packets" lineno="52172">
<summary>
Relabel packets to puppet_server the packet type.
</summary>
@@ -52434,85 +41033,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67676">
-<summary>
-Send and receive TCP traffic on the puppetclient port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_puppetclient_port" lineno="67691">
-<summary>
-Send UDP traffic on the puppetclient port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67706">
-<summary>
-Do not audit attempts to send UDP traffic on the puppetclient port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_puppetclient_port" lineno="67721">
-<summary>
-Receive UDP traffic on the puppetclient port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67736">
-<summary>
-Do not audit attempts to receive UDP traffic on the puppetclient port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67751">
-<summary>
-Send and receive UDP traffic on the puppetclient port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67767">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the puppetclient port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_puppetclient_port" lineno="67782">
+<interface name="corenet_tcp_bind_puppetclient_port" lineno="52194">
<summary>
Bind TCP sockets to the puppetclient port.
</summary>
@@ -52523,7 +41044,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_puppetclient_port" lineno="67802">
+<interface name="corenet_udp_bind_puppetclient_port" lineno="52214">
<summary>
Bind UDP sockets to the puppetclient port.
</summary>
@@ -52534,7 +41055,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_puppetclient_port" lineno="67821">
+<interface name="corenet_tcp_connect_puppetclient_port" lineno="52233">
<summary>
Make a TCP connection to the puppetclient port.
</summary>
@@ -52544,7 +41065,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppetclient_client_packets" lineno="67841">
+<interface name="corenet_send_puppetclient_client_packets" lineno="52253">
<summary>
Send puppetclient_client packets.
</summary>
@@ -52555,7 +41076,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67860">
+<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="52272">
<summary>
Do not audit attempts to send puppetclient_client packets.
</summary>
@@ -52566,7 +41087,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppetclient_client_packets" lineno="67879">
+<interface name="corenet_receive_puppetclient_client_packets" lineno="52291">
<summary>
Receive puppetclient_client packets.
</summary>
@@ -52577,7 +41098,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67898">
+<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="52310">
<summary>
Do not audit attempts to receive puppetclient_client packets.
</summary>
@@ -52588,7 +41109,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67917">
+<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="52329">
<summary>
Send and receive puppetclient_client packets.
</summary>
@@ -52599,7 +41120,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67933">
+<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="52345">
<summary>
Do not audit attempts to send and receive puppetclient_client packets.
</summary>
@@ -52610,7 +41131,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67948">
+<interface name="corenet_relabelto_puppetclient_client_packets" lineno="52360">
<summary>
Relabel packets to puppetclient_client the packet type.
</summary>
@@ -52620,7 +41141,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppetclient_server_packets" lineno="67968">
+<interface name="corenet_send_puppetclient_server_packets" lineno="52380">
<summary>
Send puppetclient_server packets.
</summary>
@@ -52631,7 +41152,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67987">
+<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="52399">
<summary>
Do not audit attempts to send puppetclient_server packets.
</summary>
@@ -52642,7 +41163,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppetclient_server_packets" lineno="68006">
+<interface name="corenet_receive_puppetclient_server_packets" lineno="52418">
<summary>
Receive puppetclient_server packets.
</summary>
@@ -52653,7 +41174,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="68025">
+<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="52437">
<summary>
Do not audit attempts to receive puppetclient_server packets.
</summary>
@@ -52664,7 +41185,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="68044">
+<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="52456">
<summary>
Send and receive puppetclient_server packets.
</summary>
@@ -52675,7 +41196,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="68060">
+<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="52472">
<summary>
Do not audit attempts to send and receive puppetclient_server packets.
</summary>
@@ -52686,7 +41207,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppetclient_server_packets" lineno="68075">
+<interface name="corenet_relabelto_puppetclient_server_packets" lineno="52487">
<summary>
Relabel packets to puppetclient_server the packet type.
</summary>
@@ -52696,85 +41217,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pxe_port" lineno="68097">
-<summary>
-Send and receive TCP traffic on the pxe port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pxe_port" lineno="68112">
-<summary>
-Send UDP traffic on the pxe port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="68127">
-<summary>
-Do not audit attempts to send UDP traffic on the pxe port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pxe_port" lineno="68142">
-<summary>
-Receive UDP traffic on the pxe port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="68157">
-<summary>
-Do not audit attempts to receive UDP traffic on the pxe port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pxe_port" lineno="68172">
-<summary>
-Send and receive UDP traffic on the pxe port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="68188">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pxe port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pxe_port" lineno="68203">
+<interface name="corenet_tcp_bind_pxe_port" lineno="52509">
<summary>
Bind TCP sockets to the pxe port.
</summary>
@@ -52785,7 +41228,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pxe_port" lineno="68223">
+<interface name="corenet_udp_bind_pxe_port" lineno="52529">
<summary>
Bind UDP sockets to the pxe port.
</summary>
@@ -52796,7 +41239,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pxe_port" lineno="68242">
+<interface name="corenet_tcp_connect_pxe_port" lineno="52548">
<summary>
Make a TCP connection to the pxe port.
</summary>
@@ -52806,7 +41249,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pxe_client_packets" lineno="68262">
+<interface name="corenet_send_pxe_client_packets" lineno="52568">
<summary>
Send pxe_client packets.
</summary>
@@ -52817,7 +41260,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="68281">
+<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="52587">
<summary>
Do not audit attempts to send pxe_client packets.
</summary>
@@ -52828,7 +41271,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pxe_client_packets" lineno="68300">
+<interface name="corenet_receive_pxe_client_packets" lineno="52606">
<summary>
Receive pxe_client packets.
</summary>
@@ -52839,7 +41282,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="68319">
+<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="52625">
<summary>
Do not audit attempts to receive pxe_client packets.
</summary>
@@ -52850,7 +41293,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pxe_client_packets" lineno="68338">
+<interface name="corenet_sendrecv_pxe_client_packets" lineno="52644">
<summary>
Send and receive pxe_client packets.
</summary>
@@ -52861,7 +41304,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="68354">
+<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="52660">
<summary>
Do not audit attempts to send and receive pxe_client packets.
</summary>
@@ -52872,7 +41315,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pxe_client_packets" lineno="68369">
+<interface name="corenet_relabelto_pxe_client_packets" lineno="52675">
<summary>
Relabel packets to pxe_client the packet type.
</summary>
@@ -52882,7 +41325,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pxe_server_packets" lineno="68389">
+<interface name="corenet_send_pxe_server_packets" lineno="52695">
<summary>
Send pxe_server packets.
</summary>
@@ -52893,7 +41336,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="68408">
+<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="52714">
<summary>
Do not audit attempts to send pxe_server packets.
</summary>
@@ -52904,7 +41347,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pxe_server_packets" lineno="68427">
+<interface name="corenet_receive_pxe_server_packets" lineno="52733">
<summary>
Receive pxe_server packets.
</summary>
@@ -52915,7 +41358,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68446">
+<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="52752">
<summary>
Do not audit attempts to receive pxe_server packets.
</summary>
@@ -52926,7 +41369,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pxe_server_packets" lineno="68465">
+<interface name="corenet_sendrecv_pxe_server_packets" lineno="52771">
<summary>
Send and receive pxe_server packets.
</summary>
@@ -52937,7 +41380,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68481">
+<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="52787">
<summary>
Do not audit attempts to send and receive pxe_server packets.
</summary>
@@ -52948,7 +41391,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pxe_server_packets" lineno="68496">
+<interface name="corenet_relabelto_pxe_server_packets" lineno="52802">
<summary>
Relabel packets to pxe_server the packet type.
</summary>
@@ -52958,85 +41401,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68518">
-<summary>
-Send and receive TCP traffic on the pyzor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_pyzor_port" lineno="68533">
-<summary>
-Send UDP traffic on the pyzor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68548">
-<summary>
-Do not audit attempts to send UDP traffic on the pyzor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_pyzor_port" lineno="68563">
-<summary>
-Receive UDP traffic on the pyzor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68578">
-<summary>
-Do not audit attempts to receive UDP traffic on the pyzor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68593">
-<summary>
-Send and receive UDP traffic on the pyzor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68609">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the pyzor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_pyzor_port" lineno="68624">
+<interface name="corenet_tcp_bind_pyzor_port" lineno="52824">
<summary>
Bind TCP sockets to the pyzor port.
</summary>
@@ -53047,7 +41412,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pyzor_port" lineno="68644">
+<interface name="corenet_udp_bind_pyzor_port" lineno="52844">
<summary>
Bind UDP sockets to the pyzor port.
</summary>
@@ -53058,7 +41423,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pyzor_port" lineno="68663">
+<interface name="corenet_tcp_connect_pyzor_port" lineno="52863">
<summary>
Make a TCP connection to the pyzor port.
</summary>
@@ -53068,7 +41433,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pyzor_client_packets" lineno="68683">
+<interface name="corenet_send_pyzor_client_packets" lineno="52883">
<summary>
Send pyzor_client packets.
</summary>
@@ -53079,7 +41444,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68702">
+<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="52902">
<summary>
Do not audit attempts to send pyzor_client packets.
</summary>
@@ -53090,7 +41455,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pyzor_client_packets" lineno="68721">
+<interface name="corenet_receive_pyzor_client_packets" lineno="52921">
<summary>
Receive pyzor_client packets.
</summary>
@@ -53101,7 +41466,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68740">
+<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="52940">
<summary>
Do not audit attempts to receive pyzor_client packets.
</summary>
@@ -53112,7 +41477,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68759">
+<interface name="corenet_sendrecv_pyzor_client_packets" lineno="52959">
<summary>
Send and receive pyzor_client packets.
</summary>
@@ -53123,7 +41488,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68775">
+<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="52975">
<summary>
Do not audit attempts to send and receive pyzor_client packets.
</summary>
@@ -53134,7 +41499,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pyzor_client_packets" lineno="68790">
+<interface name="corenet_relabelto_pyzor_client_packets" lineno="52990">
<summary>
Relabel packets to pyzor_client the packet type.
</summary>
@@ -53144,7 +41509,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pyzor_server_packets" lineno="68810">
+<interface name="corenet_send_pyzor_server_packets" lineno="53010">
<summary>
Send pyzor_server packets.
</summary>
@@ -53155,7 +41520,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68829">
+<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="53029">
<summary>
Do not audit attempts to send pyzor_server packets.
</summary>
@@ -53166,7 +41531,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pyzor_server_packets" lineno="68848">
+<interface name="corenet_receive_pyzor_server_packets" lineno="53048">
<summary>
Receive pyzor_server packets.
</summary>
@@ -53177,7 +41542,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68867">
+<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="53067">
<summary>
Do not audit attempts to receive pyzor_server packets.
</summary>
@@ -53188,7 +41553,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68886">
+<interface name="corenet_sendrecv_pyzor_server_packets" lineno="53086">
<summary>
Send and receive pyzor_server packets.
</summary>
@@ -53199,7 +41564,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68902">
+<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="53102">
<summary>
Do not audit attempts to send and receive pyzor_server packets.
</summary>
@@ -53210,7 +41575,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pyzor_server_packets" lineno="68917">
+<interface name="corenet_relabelto_pyzor_server_packets" lineno="53117">
<summary>
Relabel packets to pyzor_server the packet type.
</summary>
@@ -53220,85 +41585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68939">
-<summary>
-Send and receive TCP traffic on the radacct port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_radacct_port" lineno="68954">
-<summary>
-Send UDP traffic on the radacct port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68969">
-<summary>
-Do not audit attempts to send UDP traffic on the radacct port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_radacct_port" lineno="68984">
-<summary>
-Receive UDP traffic on the radacct port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68999">
-<summary>
-Do not audit attempts to receive UDP traffic on the radacct port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_radacct_port" lineno="69014">
-<summary>
-Send and receive UDP traffic on the radacct port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="69030">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the radacct port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_radacct_port" lineno="69045">
+<interface name="corenet_tcp_bind_radacct_port" lineno="53139">
<summary>
Bind TCP sockets to the radacct port.
</summary>
@@ -53309,7 +41596,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_radacct_port" lineno="69065">
+<interface name="corenet_udp_bind_radacct_port" lineno="53159">
<summary>
Bind UDP sockets to the radacct port.
</summary>
@@ -53320,7 +41607,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_radacct_port" lineno="69084">
+<interface name="corenet_tcp_connect_radacct_port" lineno="53178">
<summary>
Make a TCP connection to the radacct port.
</summary>
@@ -53330,7 +41617,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radacct_client_packets" lineno="69104">
+<interface name="corenet_send_radacct_client_packets" lineno="53198">
<summary>
Send radacct_client packets.
</summary>
@@ -53341,7 +41628,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="69123">
+<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="53217">
<summary>
Do not audit attempts to send radacct_client packets.
</summary>
@@ -53352,7 +41639,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radacct_client_packets" lineno="69142">
+<interface name="corenet_receive_radacct_client_packets" lineno="53236">
<summary>
Receive radacct_client packets.
</summary>
@@ -53363,7 +41650,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="69161">
+<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="53255">
<summary>
Do not audit attempts to receive radacct_client packets.
</summary>
@@ -53374,7 +41661,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radacct_client_packets" lineno="69180">
+<interface name="corenet_sendrecv_radacct_client_packets" lineno="53274">
<summary>
Send and receive radacct_client packets.
</summary>
@@ -53385,7 +41672,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="69196">
+<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="53290">
<summary>
Do not audit attempts to send and receive radacct_client packets.
</summary>
@@ -53396,7 +41683,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radacct_client_packets" lineno="69211">
+<interface name="corenet_relabelto_radacct_client_packets" lineno="53305">
<summary>
Relabel packets to radacct_client the packet type.
</summary>
@@ -53406,7 +41693,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radacct_server_packets" lineno="69231">
+<interface name="corenet_send_radacct_server_packets" lineno="53325">
<summary>
Send radacct_server packets.
</summary>
@@ -53417,7 +41704,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="69250">
+<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="53344">
<summary>
Do not audit attempts to send radacct_server packets.
</summary>
@@ -53428,7 +41715,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radacct_server_packets" lineno="69269">
+<interface name="corenet_receive_radacct_server_packets" lineno="53363">
<summary>
Receive radacct_server packets.
</summary>
@@ -53439,7 +41726,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="69288">
+<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="53382">
<summary>
Do not audit attempts to receive radacct_server packets.
</summary>
@@ -53450,7 +41737,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radacct_server_packets" lineno="69307">
+<interface name="corenet_sendrecv_radacct_server_packets" lineno="53401">
<summary>
Send and receive radacct_server packets.
</summary>
@@ -53461,7 +41748,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="69323">
+<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="53417">
<summary>
Do not audit attempts to send and receive radacct_server packets.
</summary>
@@ -53472,7 +41759,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radacct_server_packets" lineno="69338">
+<interface name="corenet_relabelto_radacct_server_packets" lineno="53432">
<summary>
Relabel packets to radacct_server the packet type.
</summary>
@@ -53482,85 +41769,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_radius_port" lineno="69360">
-<summary>
-Send and receive TCP traffic on the radius port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_radius_port" lineno="69375">
-<summary>
-Send UDP traffic on the radius port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_radius_port" lineno="69390">
-<summary>
-Do not audit attempts to send UDP traffic on the radius port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_radius_port" lineno="69405">
-<summary>
-Receive UDP traffic on the radius port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="69420">
-<summary>
-Do not audit attempts to receive UDP traffic on the radius port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_radius_port" lineno="69435">
-<summary>
-Send and receive UDP traffic on the radius port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69451">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the radius port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_radius_port" lineno="69466">
+<interface name="corenet_tcp_bind_radius_port" lineno="53454">
<summary>
Bind TCP sockets to the radius port.
</summary>
@@ -53571,7 +41780,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_radius_port" lineno="69486">
+<interface name="corenet_udp_bind_radius_port" lineno="53474">
<summary>
Bind UDP sockets to the radius port.
</summary>
@@ -53582,7 +41791,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_radius_port" lineno="69505">
+<interface name="corenet_tcp_connect_radius_port" lineno="53493">
<summary>
Make a TCP connection to the radius port.
</summary>
@@ -53592,7 +41801,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radius_client_packets" lineno="69525">
+<interface name="corenet_send_radius_client_packets" lineno="53513">
<summary>
Send radius_client packets.
</summary>
@@ -53603,7 +41812,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69544">
+<interface name="corenet_dontaudit_send_radius_client_packets" lineno="53532">
<summary>
Do not audit attempts to send radius_client packets.
</summary>
@@ -53614,7 +41823,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radius_client_packets" lineno="69563">
+<interface name="corenet_receive_radius_client_packets" lineno="53551">
<summary>
Receive radius_client packets.
</summary>
@@ -53625,7 +41834,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69582">
+<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="53570">
<summary>
Do not audit attempts to receive radius_client packets.
</summary>
@@ -53636,7 +41845,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radius_client_packets" lineno="69601">
+<interface name="corenet_sendrecv_radius_client_packets" lineno="53589">
<summary>
Send and receive radius_client packets.
</summary>
@@ -53647,7 +41856,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69617">
+<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="53605">
<summary>
Do not audit attempts to send and receive radius_client packets.
</summary>
@@ -53658,7 +41867,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radius_client_packets" lineno="69632">
+<interface name="corenet_relabelto_radius_client_packets" lineno="53620">
<summary>
Relabel packets to radius_client the packet type.
</summary>
@@ -53668,7 +41877,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radius_server_packets" lineno="69652">
+<interface name="corenet_send_radius_server_packets" lineno="53640">
<summary>
Send radius_server packets.
</summary>
@@ -53679,7 +41888,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69671">
+<interface name="corenet_dontaudit_send_radius_server_packets" lineno="53659">
<summary>
Do not audit attempts to send radius_server packets.
</summary>
@@ -53690,7 +41899,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radius_server_packets" lineno="69690">
+<interface name="corenet_receive_radius_server_packets" lineno="53678">
<summary>
Receive radius_server packets.
</summary>
@@ -53701,7 +41910,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69709">
+<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="53697">
<summary>
Do not audit attempts to receive radius_server packets.
</summary>
@@ -53712,7 +41921,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radius_server_packets" lineno="69728">
+<interface name="corenet_sendrecv_radius_server_packets" lineno="53716">
<summary>
Send and receive radius_server packets.
</summary>
@@ -53723,7 +41932,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69744">
+<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="53732">
<summary>
Do not audit attempts to send and receive radius_server packets.
</summary>
@@ -53734,7 +41943,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radius_server_packets" lineno="69759">
+<interface name="corenet_relabelto_radius_server_packets" lineno="53747">
<summary>
Relabel packets to radius_server the packet type.
</summary>
@@ -53744,85 +41953,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69781">
-<summary>
-Send and receive TCP traffic on the radsec port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_radsec_port" lineno="69796">
-<summary>
-Send UDP traffic on the radsec port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69811">
-<summary>
-Do not audit attempts to send UDP traffic on the radsec port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_radsec_port" lineno="69826">
-<summary>
-Receive UDP traffic on the radsec port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69841">
-<summary>
-Do not audit attempts to receive UDP traffic on the radsec port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_radsec_port" lineno="69856">
-<summary>
-Send and receive UDP traffic on the radsec port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69872">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the radsec port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_radsec_port" lineno="69887">
+<interface name="corenet_tcp_bind_radsec_port" lineno="53769">
<summary>
Bind TCP sockets to the radsec port.
</summary>
@@ -53833,7 +41964,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_radsec_port" lineno="69907">
+<interface name="corenet_udp_bind_radsec_port" lineno="53789">
<summary>
Bind UDP sockets to the radsec port.
</summary>
@@ -53844,7 +41975,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_radsec_port" lineno="69926">
+<interface name="corenet_tcp_connect_radsec_port" lineno="53808">
<summary>
Make a TCP connection to the radsec port.
</summary>
@@ -53854,7 +41985,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radsec_client_packets" lineno="69946">
+<interface name="corenet_send_radsec_client_packets" lineno="53828">
<summary>
Send radsec_client packets.
</summary>
@@ -53865,7 +41996,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69965">
+<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="53847">
<summary>
Do not audit attempts to send radsec_client packets.
</summary>
@@ -53876,7 +42007,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radsec_client_packets" lineno="69984">
+<interface name="corenet_receive_radsec_client_packets" lineno="53866">
<summary>
Receive radsec_client packets.
</summary>
@@ -53887,7 +42018,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="70003">
+<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="53885">
<summary>
Do not audit attempts to receive radsec_client packets.
</summary>
@@ -53898,7 +42029,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radsec_client_packets" lineno="70022">
+<interface name="corenet_sendrecv_radsec_client_packets" lineno="53904">
<summary>
Send and receive radsec_client packets.
</summary>
@@ -53909,7 +42040,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="70038">
+<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="53920">
<summary>
Do not audit attempts to send and receive radsec_client packets.
</summary>
@@ -53920,7 +42051,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radsec_client_packets" lineno="70053">
+<interface name="corenet_relabelto_radsec_client_packets" lineno="53935">
<summary>
Relabel packets to radsec_client the packet type.
</summary>
@@ -53930,7 +42061,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radsec_server_packets" lineno="70073">
+<interface name="corenet_send_radsec_server_packets" lineno="53955">
<summary>
Send radsec_server packets.
</summary>
@@ -53941,7 +42072,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="70092">
+<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="53974">
<summary>
Do not audit attempts to send radsec_server packets.
</summary>
@@ -53952,7 +42083,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radsec_server_packets" lineno="70111">
+<interface name="corenet_receive_radsec_server_packets" lineno="53993">
<summary>
Receive radsec_server packets.
</summary>
@@ -53963,7 +42094,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="70130">
+<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="54012">
<summary>
Do not audit attempts to receive radsec_server packets.
</summary>
@@ -53974,7 +42105,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radsec_server_packets" lineno="70149">
+<interface name="corenet_sendrecv_radsec_server_packets" lineno="54031">
<summary>
Send and receive radsec_server packets.
</summary>
@@ -53985,7 +42116,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="70165">
+<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="54047">
<summary>
Do not audit attempts to send and receive radsec_server packets.
</summary>
@@ -53996,7 +42127,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radsec_server_packets" lineno="70180">
+<interface name="corenet_relabelto_radsec_server_packets" lineno="54062">
<summary>
Relabel packets to radsec_server the packet type.
</summary>
@@ -54006,85 +42137,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_razor_port" lineno="70202">
-<summary>
-Send and receive TCP traffic on the razor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_razor_port" lineno="70217">
-<summary>
-Send UDP traffic on the razor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_razor_port" lineno="70232">
-<summary>
-Do not audit attempts to send UDP traffic on the razor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_razor_port" lineno="70247">
-<summary>
-Receive UDP traffic on the razor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="70262">
-<summary>
-Do not audit attempts to receive UDP traffic on the razor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_razor_port" lineno="70277">
-<summary>
-Send and receive UDP traffic on the razor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="70293">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the razor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_razor_port" lineno="70308">
+<interface name="corenet_tcp_bind_razor_port" lineno="54084">
<summary>
Bind TCP sockets to the razor port.
</summary>
@@ -54095,7 +42148,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_razor_port" lineno="70328">
+<interface name="corenet_udp_bind_razor_port" lineno="54104">
<summary>
Bind UDP sockets to the razor port.
</summary>
@@ -54106,7 +42159,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_razor_port" lineno="70347">
+<interface name="corenet_tcp_connect_razor_port" lineno="54123">
<summary>
Make a TCP connection to the razor port.
</summary>
@@ -54116,7 +42169,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_razor_client_packets" lineno="70367">
+<interface name="corenet_send_razor_client_packets" lineno="54143">
<summary>
Send razor_client packets.
</summary>
@@ -54127,7 +42180,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_razor_client_packets" lineno="70386">
+<interface name="corenet_dontaudit_send_razor_client_packets" lineno="54162">
<summary>
Do not audit attempts to send razor_client packets.
</summary>
@@ -54138,7 +42191,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_razor_client_packets" lineno="70405">
+<interface name="corenet_receive_razor_client_packets" lineno="54181">
<summary>
Receive razor_client packets.
</summary>
@@ -54149,7 +42202,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="70424">
+<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="54200">
<summary>
Do not audit attempts to receive razor_client packets.
</summary>
@@ -54160,7 +42213,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_razor_client_packets" lineno="70443">
+<interface name="corenet_sendrecv_razor_client_packets" lineno="54219">
<summary>
Send and receive razor_client packets.
</summary>
@@ -54171,7 +42224,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70459">
+<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="54235">
<summary>
Do not audit attempts to send and receive razor_client packets.
</summary>
@@ -54182,7 +42235,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_razor_client_packets" lineno="70474">
+<interface name="corenet_relabelto_razor_client_packets" lineno="54250">
<summary>
Relabel packets to razor_client the packet type.
</summary>
@@ -54192,7 +42245,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_razor_server_packets" lineno="70494">
+<interface name="corenet_send_razor_server_packets" lineno="54270">
<summary>
Send razor_server packets.
</summary>
@@ -54203,7 +42256,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70513">
+<interface name="corenet_dontaudit_send_razor_server_packets" lineno="54289">
<summary>
Do not audit attempts to send razor_server packets.
</summary>
@@ -54214,7 +42267,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_razor_server_packets" lineno="70532">
+<interface name="corenet_receive_razor_server_packets" lineno="54308">
<summary>
Receive razor_server packets.
</summary>
@@ -54225,7 +42278,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70551">
+<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="54327">
<summary>
Do not audit attempts to receive razor_server packets.
</summary>
@@ -54236,7 +42289,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_razor_server_packets" lineno="70570">
+<interface name="corenet_sendrecv_razor_server_packets" lineno="54346">
<summary>
Send and receive razor_server packets.
</summary>
@@ -54247,7 +42300,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70586">
+<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="54362">
<summary>
Do not audit attempts to send and receive razor_server packets.
</summary>
@@ -54258,7 +42311,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_razor_server_packets" lineno="70601">
+<interface name="corenet_relabelto_razor_server_packets" lineno="54377">
<summary>
Relabel packets to razor_server the packet type.
</summary>
@@ -54268,85 +42321,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_redis_port" lineno="70623">
-<summary>
-Send and receive TCP traffic on the redis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_redis_port" lineno="70638">
-<summary>
-Send UDP traffic on the redis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70653">
-<summary>
-Do not audit attempts to send UDP traffic on the redis port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_redis_port" lineno="70668">
-<summary>
-Receive UDP traffic on the redis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70683">
-<summary>
-Do not audit attempts to receive UDP traffic on the redis port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_redis_port" lineno="70698">
-<summary>
-Send and receive UDP traffic on the redis port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70714">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the redis port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_redis_port" lineno="70729">
+<interface name="corenet_tcp_bind_redis_port" lineno="54399">
<summary>
Bind TCP sockets to the redis port.
</summary>
@@ -54357,7 +42332,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_redis_port" lineno="70749">
+<interface name="corenet_udp_bind_redis_port" lineno="54419">
<summary>
Bind UDP sockets to the redis port.
</summary>
@@ -54368,7 +42343,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_redis_port" lineno="70768">
+<interface name="corenet_tcp_connect_redis_port" lineno="54438">
<summary>
Make a TCP connection to the redis port.
</summary>
@@ -54378,7 +42353,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_redis_client_packets" lineno="70788">
+<interface name="corenet_send_redis_client_packets" lineno="54458">
<summary>
Send redis_client packets.
</summary>
@@ -54389,7 +42364,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70807">
+<interface name="corenet_dontaudit_send_redis_client_packets" lineno="54477">
<summary>
Do not audit attempts to send redis_client packets.
</summary>
@@ -54400,7 +42375,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_redis_client_packets" lineno="70826">
+<interface name="corenet_receive_redis_client_packets" lineno="54496">
<summary>
Receive redis_client packets.
</summary>
@@ -54411,7 +42386,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70845">
+<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="54515">
<summary>
Do not audit attempts to receive redis_client packets.
</summary>
@@ -54422,7 +42397,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_redis_client_packets" lineno="70864">
+<interface name="corenet_sendrecv_redis_client_packets" lineno="54534">
<summary>
Send and receive redis_client packets.
</summary>
@@ -54433,7 +42408,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70880">
+<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="54550">
<summary>
Do not audit attempts to send and receive redis_client packets.
</summary>
@@ -54444,7 +42419,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_redis_client_packets" lineno="70895">
+<interface name="corenet_relabelto_redis_client_packets" lineno="54565">
<summary>
Relabel packets to redis_client the packet type.
</summary>
@@ -54454,7 +42429,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_redis_server_packets" lineno="70915">
+<interface name="corenet_send_redis_server_packets" lineno="54585">
<summary>
Send redis_server packets.
</summary>
@@ -54465,7 +42440,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70934">
+<interface name="corenet_dontaudit_send_redis_server_packets" lineno="54604">
<summary>
Do not audit attempts to send redis_server packets.
</summary>
@@ -54476,7 +42451,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_redis_server_packets" lineno="70953">
+<interface name="corenet_receive_redis_server_packets" lineno="54623">
<summary>
Receive redis_server packets.
</summary>
@@ -54487,7 +42462,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70972">
+<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="54642">
<summary>
Do not audit attempts to receive redis_server packets.
</summary>
@@ -54498,7 +42473,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_redis_server_packets" lineno="70991">
+<interface name="corenet_sendrecv_redis_server_packets" lineno="54661">
<summary>
Send and receive redis_server packets.
</summary>
@@ -54509,7 +42484,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="71007">
+<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="54677">
<summary>
Do not audit attempts to send and receive redis_server packets.
</summary>
@@ -54520,7 +42495,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_redis_server_packets" lineno="71022">
+<interface name="corenet_relabelto_redis_server_packets" lineno="54692">
<summary>
Relabel packets to redis_server the packet type.
</summary>
@@ -54530,85 +42505,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_repository_port" lineno="71044">
-<summary>
-Send and receive TCP traffic on the repository port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_repository_port" lineno="71059">
-<summary>
-Send UDP traffic on the repository port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_repository_port" lineno="71074">
-<summary>
-Do not audit attempts to send UDP traffic on the repository port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_repository_port" lineno="71089">
-<summary>
-Receive UDP traffic on the repository port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="71104">
-<summary>
-Do not audit attempts to receive UDP traffic on the repository port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_repository_port" lineno="71119">
-<summary>
-Send and receive UDP traffic on the repository port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="71135">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the repository port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_repository_port" lineno="71150">
+<interface name="corenet_tcp_bind_repository_port" lineno="54714">
<summary>
Bind TCP sockets to the repository port.
</summary>
@@ -54619,7 +42516,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_repository_port" lineno="71170">
+<interface name="corenet_udp_bind_repository_port" lineno="54734">
<summary>
Bind UDP sockets to the repository port.
</summary>
@@ -54630,7 +42527,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_repository_port" lineno="71189">
+<interface name="corenet_tcp_connect_repository_port" lineno="54753">
<summary>
Make a TCP connection to the repository port.
</summary>
@@ -54640,7 +42537,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_repository_client_packets" lineno="71209">
+<interface name="corenet_send_repository_client_packets" lineno="54773">
<summary>
Send repository_client packets.
</summary>
@@ -54651,7 +42548,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_repository_client_packets" lineno="71228">
+<interface name="corenet_dontaudit_send_repository_client_packets" lineno="54792">
<summary>
Do not audit attempts to send repository_client packets.
</summary>
@@ -54662,7 +42559,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_repository_client_packets" lineno="71247">
+<interface name="corenet_receive_repository_client_packets" lineno="54811">
<summary>
Receive repository_client packets.
</summary>
@@ -54673,7 +42570,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="71266">
+<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="54830">
<summary>
Do not audit attempts to receive repository_client packets.
</summary>
@@ -54684,7 +42581,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_repository_client_packets" lineno="71285">
+<interface name="corenet_sendrecv_repository_client_packets" lineno="54849">
<summary>
Send and receive repository_client packets.
</summary>
@@ -54695,7 +42592,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="71301">
+<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="54865">
<summary>
Do not audit attempts to send and receive repository_client packets.
</summary>
@@ -54706,7 +42603,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_repository_client_packets" lineno="71316">
+<interface name="corenet_relabelto_repository_client_packets" lineno="54880">
<summary>
Relabel packets to repository_client the packet type.
</summary>
@@ -54716,7 +42613,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_repository_server_packets" lineno="71336">
+<interface name="corenet_send_repository_server_packets" lineno="54900">
<summary>
Send repository_server packets.
</summary>
@@ -54727,7 +42624,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_repository_server_packets" lineno="71355">
+<interface name="corenet_dontaudit_send_repository_server_packets" lineno="54919">
<summary>
Do not audit attempts to send repository_server packets.
</summary>
@@ -54738,7 +42635,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_repository_server_packets" lineno="71374">
+<interface name="corenet_receive_repository_server_packets" lineno="54938">
<summary>
Receive repository_server packets.
</summary>
@@ -54749,7 +42646,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="71393">
+<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="54957">
<summary>
Do not audit attempts to receive repository_server packets.
</summary>
@@ -54760,7 +42657,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_repository_server_packets" lineno="71412">
+<interface name="corenet_sendrecv_repository_server_packets" lineno="54976">
<summary>
Send and receive repository_server packets.
</summary>
@@ -54771,7 +42668,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="71428">
+<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="54992">
<summary>
Do not audit attempts to send and receive repository_server packets.
</summary>
@@ -54782,7 +42679,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_repository_server_packets" lineno="71443">
+<interface name="corenet_relabelto_repository_server_packets" lineno="55007">
<summary>
Relabel packets to repository_server the packet type.
</summary>
@@ -54792,85 +42689,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71465">
-<summary>
-Send and receive TCP traffic on the ricci port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ricci_port" lineno="71480">
-<summary>
-Send UDP traffic on the ricci port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71495">
-<summary>
-Do not audit attempts to send UDP traffic on the ricci port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ricci_port" lineno="71510">
-<summary>
-Receive UDP traffic on the ricci port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71525">
-<summary>
-Do not audit attempts to receive UDP traffic on the ricci port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ricci_port" lineno="71540">
-<summary>
-Send and receive UDP traffic on the ricci port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71556">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ricci port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ricci_port" lineno="71571">
+<interface name="corenet_tcp_bind_ricci_port" lineno="55029">
<summary>
Bind TCP sockets to the ricci port.
</summary>
@@ -54881,7 +42700,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ricci_port" lineno="71591">
+<interface name="corenet_udp_bind_ricci_port" lineno="55049">
<summary>
Bind UDP sockets to the ricci port.
</summary>
@@ -54892,7 +42711,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ricci_port" lineno="71610">
+<interface name="corenet_tcp_connect_ricci_port" lineno="55068">
<summary>
Make a TCP connection to the ricci port.
</summary>
@@ -54902,7 +42721,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_client_packets" lineno="71630">
+<interface name="corenet_send_ricci_client_packets" lineno="55088">
<summary>
Send ricci_client packets.
</summary>
@@ -54913,7 +42732,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71649">
+<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="55107">
<summary>
Do not audit attempts to send ricci_client packets.
</summary>
@@ -54924,7 +42743,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_client_packets" lineno="71668">
+<interface name="corenet_receive_ricci_client_packets" lineno="55126">
<summary>
Receive ricci_client packets.
</summary>
@@ -54935,7 +42754,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71687">
+<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="55145">
<summary>
Do not audit attempts to receive ricci_client packets.
</summary>
@@ -54946,7 +42765,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_client_packets" lineno="71706">
+<interface name="corenet_sendrecv_ricci_client_packets" lineno="55164">
<summary>
Send and receive ricci_client packets.
</summary>
@@ -54957,7 +42776,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71722">
+<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="55180">
<summary>
Do not audit attempts to send and receive ricci_client packets.
</summary>
@@ -54968,7 +42787,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_client_packets" lineno="71737">
+<interface name="corenet_relabelto_ricci_client_packets" lineno="55195">
<summary>
Relabel packets to ricci_client the packet type.
</summary>
@@ -54978,7 +42797,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_server_packets" lineno="71757">
+<interface name="corenet_send_ricci_server_packets" lineno="55215">
<summary>
Send ricci_server packets.
</summary>
@@ -54989,7 +42808,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71776">
+<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="55234">
<summary>
Do not audit attempts to send ricci_server packets.
</summary>
@@ -55000,7 +42819,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_server_packets" lineno="71795">
+<interface name="corenet_receive_ricci_server_packets" lineno="55253">
<summary>
Receive ricci_server packets.
</summary>
@@ -55011,7 +42830,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71814">
+<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="55272">
<summary>
Do not audit attempts to receive ricci_server packets.
</summary>
@@ -55022,7 +42841,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_server_packets" lineno="71833">
+<interface name="corenet_sendrecv_ricci_server_packets" lineno="55291">
<summary>
Send and receive ricci_server packets.
</summary>
@@ -55033,7 +42852,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71849">
+<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="55307">
<summary>
Do not audit attempts to send and receive ricci_server packets.
</summary>
@@ -55044,7 +42863,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_server_packets" lineno="71864">
+<interface name="corenet_relabelto_ricci_server_packets" lineno="55322">
<summary>
Relabel packets to ricci_server the packet type.
</summary>
@@ -55054,85 +42873,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71886">
-<summary>
-Send and receive TCP traffic on the ricci_modcluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71901">
-<summary>
-Send UDP traffic on the ricci_modcluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71916">
-<summary>
-Do not audit attempts to send UDP traffic on the ricci_modcluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71931">
-<summary>
-Receive UDP traffic on the ricci_modcluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71946">
-<summary>
-Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71961">
-<summary>
-Send and receive UDP traffic on the ricci_modcluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71977">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ricci_modcluster port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71992">
+<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="55344">
<summary>
Bind TCP sockets to the ricci_modcluster port.
</summary>
@@ -55143,7 +42884,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="72012">
+<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="55364">
<summary>
Bind UDP sockets to the ricci_modcluster port.
</summary>
@@ -55154,7 +42895,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="72031">
+<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="55383">
<summary>
Make a TCP connection to the ricci_modcluster port.
</summary>
@@ -55164,7 +42905,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_modcluster_client_packets" lineno="72051">
+<interface name="corenet_send_ricci_modcluster_client_packets" lineno="55403">
<summary>
Send ricci_modcluster_client packets.
</summary>
@@ -55175,7 +42916,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="72070">
+<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="55422">
<summary>
Do not audit attempts to send ricci_modcluster_client packets.
</summary>
@@ -55186,7 +42927,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="72089">
+<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="55441">
<summary>
Receive ricci_modcluster_client packets.
</summary>
@@ -55197,7 +42938,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="72108">
+<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="55460">
<summary>
Do not audit attempts to receive ricci_modcluster_client packets.
</summary>
@@ -55208,7 +42949,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="72127">
+<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="55479">
<summary>
Send and receive ricci_modcluster_client packets.
</summary>
@@ -55219,7 +42960,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="72143">
+<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="55495">
<summary>
Do not audit attempts to send and receive ricci_modcluster_client packets.
</summary>
@@ -55230,7 +42971,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="72158">
+<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="55510">
<summary>
Relabel packets to ricci_modcluster_client the packet type.
</summary>
@@ -55240,7 +42981,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_modcluster_server_packets" lineno="72178">
+<interface name="corenet_send_ricci_modcluster_server_packets" lineno="55530">
<summary>
Send ricci_modcluster_server packets.
</summary>
@@ -55251,7 +42992,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="72197">
+<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="55549">
<summary>
Do not audit attempts to send ricci_modcluster_server packets.
</summary>
@@ -55262,7 +43003,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="72216">
+<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="55568">
<summary>
Receive ricci_modcluster_server packets.
</summary>
@@ -55273,7 +43014,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="72235">
+<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="55587">
<summary>
Do not audit attempts to receive ricci_modcluster_server packets.
</summary>
@@ -55284,7 +43025,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="72254">
+<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="55606">
<summary>
Send and receive ricci_modcluster_server packets.
</summary>
@@ -55295,7 +43036,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="72270">
+<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="55622">
<summary>
Do not audit attempts to send and receive ricci_modcluster_server packets.
</summary>
@@ -55306,7 +43047,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="72285">
+<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="55637">
<summary>
Relabel packets to ricci_modcluster_server the packet type.
</summary>
@@ -55316,85 +43057,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="72307">
-<summary>
-Send and receive TCP traffic on the rlogind port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_rlogind_port" lineno="72322">
-<summary>
-Send UDP traffic on the rlogind port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="72337">
-<summary>
-Do not audit attempts to send UDP traffic on the rlogind port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_rlogind_port" lineno="72352">
-<summary>
-Receive UDP traffic on the rlogind port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="72367">
-<summary>
-Do not audit attempts to receive UDP traffic on the rlogind port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_rlogind_port" lineno="72382">
-<summary>
-Send and receive UDP traffic on the rlogind port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="72398">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the rlogind port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_rlogind_port" lineno="72413">
+<interface name="corenet_tcp_bind_rlogind_port" lineno="55659">
<summary>
Bind TCP sockets to the rlogind port.
</summary>
@@ -55405,7 +43068,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rlogind_port" lineno="72433">
+<interface name="corenet_udp_bind_rlogind_port" lineno="55679">
<summary>
Bind UDP sockets to the rlogind port.
</summary>
@@ -55416,7 +43079,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rlogind_port" lineno="72452">
+<interface name="corenet_tcp_connect_rlogind_port" lineno="55698">
<summary>
Make a TCP connection to the rlogind port.
</summary>
@@ -55426,7 +43089,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rlogind_client_packets" lineno="72472">
+<interface name="corenet_send_rlogind_client_packets" lineno="55718">
<summary>
Send rlogind_client packets.
</summary>
@@ -55437,7 +43100,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72491">
+<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="55737">
<summary>
Do not audit attempts to send rlogind_client packets.
</summary>
@@ -55448,7 +43111,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rlogind_client_packets" lineno="72510">
+<interface name="corenet_receive_rlogind_client_packets" lineno="55756">
<summary>
Receive rlogind_client packets.
</summary>
@@ -55459,7 +43122,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72529">
+<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="55775">
<summary>
Do not audit attempts to receive rlogind_client packets.
</summary>
@@ -55470,7 +43133,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72548">
+<interface name="corenet_sendrecv_rlogind_client_packets" lineno="55794">
<summary>
Send and receive rlogind_client packets.
</summary>
@@ -55481,7 +43144,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72564">
+<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="55810">
<summary>
Do not audit attempts to send and receive rlogind_client packets.
</summary>
@@ -55492,7 +43155,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rlogind_client_packets" lineno="72579">
+<interface name="corenet_relabelto_rlogind_client_packets" lineno="55825">
<summary>
Relabel packets to rlogind_client the packet type.
</summary>
@@ -55502,7 +43165,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rlogind_server_packets" lineno="72599">
+<interface name="corenet_send_rlogind_server_packets" lineno="55845">
<summary>
Send rlogind_server packets.
</summary>
@@ -55513,7 +43176,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72618">
+<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="55864">
<summary>
Do not audit attempts to send rlogind_server packets.
</summary>
@@ -55524,7 +43187,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rlogind_server_packets" lineno="72637">
+<interface name="corenet_receive_rlogind_server_packets" lineno="55883">
<summary>
Receive rlogind_server packets.
</summary>
@@ -55535,7 +43198,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72656">
+<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="55902">
<summary>
Do not audit attempts to receive rlogind_server packets.
</summary>
@@ -55546,7 +43209,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72675">
+<interface name="corenet_sendrecv_rlogind_server_packets" lineno="55921">
<summary>
Send and receive rlogind_server packets.
</summary>
@@ -55557,7 +43220,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72691">
+<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="55937">
<summary>
Do not audit attempts to send and receive rlogind_server packets.
</summary>
@@ -55568,7 +43231,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rlogind_server_packets" lineno="72706">
+<interface name="corenet_relabelto_rlogind_server_packets" lineno="55952">
<summary>
Relabel packets to rlogind_server the packet type.
</summary>
@@ -55578,85 +43241,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72728">
-<summary>
-Send and receive TCP traffic on the rndc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_rndc_port" lineno="72743">
-<summary>
-Send UDP traffic on the rndc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72758">
-<summary>
-Do not audit attempts to send UDP traffic on the rndc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_rndc_port" lineno="72773">
-<summary>
-Receive UDP traffic on the rndc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72788">
-<summary>
-Do not audit attempts to receive UDP traffic on the rndc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_rndc_port" lineno="72803">
-<summary>
-Send and receive UDP traffic on the rndc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72819">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the rndc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_rndc_port" lineno="72834">
+<interface name="corenet_tcp_bind_rndc_port" lineno="55974">
<summary>
Bind TCP sockets to the rndc port.
</summary>
@@ -55667,7 +43252,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rndc_port" lineno="72854">
+<interface name="corenet_udp_bind_rndc_port" lineno="55994">
<summary>
Bind UDP sockets to the rndc port.
</summary>
@@ -55678,7 +43263,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rndc_port" lineno="72873">
+<interface name="corenet_tcp_connect_rndc_port" lineno="56013">
<summary>
Make a TCP connection to the rndc port.
</summary>
@@ -55688,7 +43273,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rndc_client_packets" lineno="72893">
+<interface name="corenet_send_rndc_client_packets" lineno="56033">
<summary>
Send rndc_client packets.
</summary>
@@ -55699,7 +43284,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72912">
+<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="56052">
<summary>
Do not audit attempts to send rndc_client packets.
</summary>
@@ -55710,7 +43295,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rndc_client_packets" lineno="72931">
+<interface name="corenet_receive_rndc_client_packets" lineno="56071">
<summary>
Receive rndc_client packets.
</summary>
@@ -55721,7 +43306,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72950">
+<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="56090">
<summary>
Do not audit attempts to receive rndc_client packets.
</summary>
@@ -55732,7 +43317,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rndc_client_packets" lineno="72969">
+<interface name="corenet_sendrecv_rndc_client_packets" lineno="56109">
<summary>
Send and receive rndc_client packets.
</summary>
@@ -55743,7 +43328,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72985">
+<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="56125">
<summary>
Do not audit attempts to send and receive rndc_client packets.
</summary>
@@ -55754,7 +43339,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rndc_client_packets" lineno="73000">
+<interface name="corenet_relabelto_rndc_client_packets" lineno="56140">
<summary>
Relabel packets to rndc_client the packet type.
</summary>
@@ -55764,7 +43349,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rndc_server_packets" lineno="73020">
+<interface name="corenet_send_rndc_server_packets" lineno="56160">
<summary>
Send rndc_server packets.
</summary>
@@ -55775,7 +43360,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="73039">
+<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="56179">
<summary>
Do not audit attempts to send rndc_server packets.
</summary>
@@ -55786,7 +43371,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rndc_server_packets" lineno="73058">
+<interface name="corenet_receive_rndc_server_packets" lineno="56198">
<summary>
Receive rndc_server packets.
</summary>
@@ -55797,7 +43382,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="73077">
+<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="56217">
<summary>
Do not audit attempts to receive rndc_server packets.
</summary>
@@ -55808,7 +43393,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rndc_server_packets" lineno="73096">
+<interface name="corenet_sendrecv_rndc_server_packets" lineno="56236">
<summary>
Send and receive rndc_server packets.
</summary>
@@ -55819,7 +43404,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="73112">
+<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="56252">
<summary>
Do not audit attempts to send and receive rndc_server packets.
</summary>
@@ -55830,7 +43415,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rndc_server_packets" lineno="73127">
+<interface name="corenet_relabelto_rndc_server_packets" lineno="56267">
<summary>
Relabel packets to rndc_server the packet type.
</summary>
@@ -55840,85 +43425,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_router_port" lineno="73149">
-<summary>
-Send and receive TCP traffic on the router port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_router_port" lineno="73164">
-<summary>
-Send UDP traffic on the router port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_router_port" lineno="73179">
-<summary>
-Do not audit attempts to send UDP traffic on the router port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_router_port" lineno="73194">
-<summary>
-Receive UDP traffic on the router port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_router_port" lineno="73209">
-<summary>
-Do not audit attempts to receive UDP traffic on the router port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_router_port" lineno="73224">
-<summary>
-Send and receive UDP traffic on the router port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="73240">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the router port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_router_port" lineno="73255">
+<interface name="corenet_tcp_bind_router_port" lineno="56289">
<summary>
Bind TCP sockets to the router port.
</summary>
@@ -55929,7 +43436,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_router_port" lineno="73275">
+<interface name="corenet_udp_bind_router_port" lineno="56309">
<summary>
Bind UDP sockets to the router port.
</summary>
@@ -55940,7 +43447,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_router_port" lineno="73294">
+<interface name="corenet_tcp_connect_router_port" lineno="56328">
<summary>
Make a TCP connection to the router port.
</summary>
@@ -55950,7 +43457,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_router_client_packets" lineno="73314">
+<interface name="corenet_send_router_client_packets" lineno="56348">
<summary>
Send router_client packets.
</summary>
@@ -55961,7 +43468,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_router_client_packets" lineno="73333">
+<interface name="corenet_dontaudit_send_router_client_packets" lineno="56367">
<summary>
Do not audit attempts to send router_client packets.
</summary>
@@ -55972,7 +43479,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_router_client_packets" lineno="73352">
+<interface name="corenet_receive_router_client_packets" lineno="56386">
<summary>
Receive router_client packets.
</summary>
@@ -55983,7 +43490,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_router_client_packets" lineno="73371">
+<interface name="corenet_dontaudit_receive_router_client_packets" lineno="56405">
<summary>
Do not audit attempts to receive router_client packets.
</summary>
@@ -55994,7 +43501,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_router_client_packets" lineno="73390">
+<interface name="corenet_sendrecv_router_client_packets" lineno="56424">
<summary>
Send and receive router_client packets.
</summary>
@@ -56005,7 +43512,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="73406">
+<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="56440">
<summary>
Do not audit attempts to send and receive router_client packets.
</summary>
@@ -56016,7 +43523,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_router_client_packets" lineno="73421">
+<interface name="corenet_relabelto_router_client_packets" lineno="56455">
<summary>
Relabel packets to router_client the packet type.
</summary>
@@ -56026,7 +43533,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_router_server_packets" lineno="73441">
+<interface name="corenet_send_router_server_packets" lineno="56475">
<summary>
Send router_server packets.
</summary>
@@ -56037,7 +43544,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_router_server_packets" lineno="73460">
+<interface name="corenet_dontaudit_send_router_server_packets" lineno="56494">
<summary>
Do not audit attempts to send router_server packets.
</summary>
@@ -56048,7 +43555,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_router_server_packets" lineno="73479">
+<interface name="corenet_receive_router_server_packets" lineno="56513">
<summary>
Receive router_server packets.
</summary>
@@ -56059,7 +43566,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73498">
+<interface name="corenet_dontaudit_receive_router_server_packets" lineno="56532">
<summary>
Do not audit attempts to receive router_server packets.
</summary>
@@ -56070,7 +43577,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_router_server_packets" lineno="73517">
+<interface name="corenet_sendrecv_router_server_packets" lineno="56551">
<summary>
Send and receive router_server packets.
</summary>
@@ -56081,7 +43588,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73533">
+<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="56567">
<summary>
Do not audit attempts to send and receive router_server packets.
</summary>
@@ -56092,7 +43599,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_router_server_packets" lineno="73548">
+<interface name="corenet_relabelto_router_server_packets" lineno="56582">
<summary>
Relabel packets to router_server the packet type.
</summary>
@@ -56102,85 +43609,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73570">
-<summary>
-Send and receive TCP traffic on the rsh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_rsh_port" lineno="73585">
-<summary>
-Send UDP traffic on the rsh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73600">
-<summary>
-Do not audit attempts to send UDP traffic on the rsh port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_rsh_port" lineno="73615">
-<summary>
-Receive UDP traffic on the rsh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73630">
-<summary>
-Do not audit attempts to receive UDP traffic on the rsh port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_rsh_port" lineno="73645">
-<summary>
-Send and receive UDP traffic on the rsh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73661">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the rsh port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_rsh_port" lineno="73676">
+<interface name="corenet_tcp_bind_rsh_port" lineno="56604">
<summary>
Bind TCP sockets to the rsh port.
</summary>
@@ -56191,7 +43620,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rsh_port" lineno="73696">
+<interface name="corenet_udp_bind_rsh_port" lineno="56624">
<summary>
Bind UDP sockets to the rsh port.
</summary>
@@ -56202,7 +43631,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rsh_port" lineno="73715">
+<interface name="corenet_tcp_connect_rsh_port" lineno="56643">
<summary>
Make a TCP connection to the rsh port.
</summary>
@@ -56212,7 +43641,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsh_client_packets" lineno="73735">
+<interface name="corenet_send_rsh_client_packets" lineno="56663">
<summary>
Send rsh_client packets.
</summary>
@@ -56223,7 +43652,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73754">
+<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="56682">
<summary>
Do not audit attempts to send rsh_client packets.
</summary>
@@ -56234,7 +43663,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsh_client_packets" lineno="73773">
+<interface name="corenet_receive_rsh_client_packets" lineno="56701">
<summary>
Receive rsh_client packets.
</summary>
@@ -56245,7 +43674,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73792">
+<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="56720">
<summary>
Do not audit attempts to receive rsh_client packets.
</summary>
@@ -56256,7 +43685,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsh_client_packets" lineno="73811">
+<interface name="corenet_sendrecv_rsh_client_packets" lineno="56739">
<summary>
Send and receive rsh_client packets.
</summary>
@@ -56267,7 +43696,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73827">
+<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="56755">
<summary>
Do not audit attempts to send and receive rsh_client packets.
</summary>
@@ -56278,7 +43707,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsh_client_packets" lineno="73842">
+<interface name="corenet_relabelto_rsh_client_packets" lineno="56770">
<summary>
Relabel packets to rsh_client the packet type.
</summary>
@@ -56288,7 +43717,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsh_server_packets" lineno="73862">
+<interface name="corenet_send_rsh_server_packets" lineno="56790">
<summary>
Send rsh_server packets.
</summary>
@@ -56299,7 +43728,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73881">
+<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="56809">
<summary>
Do not audit attempts to send rsh_server packets.
</summary>
@@ -56310,7 +43739,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsh_server_packets" lineno="73900">
+<interface name="corenet_receive_rsh_server_packets" lineno="56828">
<summary>
Receive rsh_server packets.
</summary>
@@ -56321,7 +43750,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73919">
+<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="56847">
<summary>
Do not audit attempts to receive rsh_server packets.
</summary>
@@ -56332,7 +43761,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsh_server_packets" lineno="73938">
+<interface name="corenet_sendrecv_rsh_server_packets" lineno="56866">
<summary>
Send and receive rsh_server packets.
</summary>
@@ -56343,7 +43772,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73954">
+<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="56882">
<summary>
Do not audit attempts to send and receive rsh_server packets.
</summary>
@@ -56354,7 +43783,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsh_server_packets" lineno="73969">
+<interface name="corenet_relabelto_rsh_server_packets" lineno="56897">
<summary>
Relabel packets to rsh_server the packet type.
</summary>
@@ -56364,85 +43793,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73991">
-<summary>
-Send and receive TCP traffic on the rsync port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_rsync_port" lineno="74006">
-<summary>
-Send UDP traffic on the rsync port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="74021">
-<summary>
-Do not audit attempts to send UDP traffic on the rsync port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_rsync_port" lineno="74036">
-<summary>
-Receive UDP traffic on the rsync port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="74051">
-<summary>
-Do not audit attempts to receive UDP traffic on the rsync port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_rsync_port" lineno="74066">
-<summary>
-Send and receive UDP traffic on the rsync port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="74082">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the rsync port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_rsync_port" lineno="74097">
+<interface name="corenet_tcp_bind_rsync_port" lineno="56919">
<summary>
Bind TCP sockets to the rsync port.
</summary>
@@ -56453,7 +43804,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rsync_port" lineno="74117">
+<interface name="corenet_udp_bind_rsync_port" lineno="56939">
<summary>
Bind UDP sockets to the rsync port.
</summary>
@@ -56464,7 +43815,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rsync_port" lineno="74136">
+<interface name="corenet_tcp_connect_rsync_port" lineno="56958">
<summary>
Make a TCP connection to the rsync port.
</summary>
@@ -56474,7 +43825,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsync_client_packets" lineno="74156">
+<interface name="corenet_send_rsync_client_packets" lineno="56978">
<summary>
Send rsync_client packets.
</summary>
@@ -56485,7 +43836,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="74175">
+<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="56997">
<summary>
Do not audit attempts to send rsync_client packets.
</summary>
@@ -56496,7 +43847,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsync_client_packets" lineno="74194">
+<interface name="corenet_receive_rsync_client_packets" lineno="57016">
<summary>
Receive rsync_client packets.
</summary>
@@ -56507,7 +43858,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="74213">
+<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="57035">
<summary>
Do not audit attempts to receive rsync_client packets.
</summary>
@@ -56518,7 +43869,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsync_client_packets" lineno="74232">
+<interface name="corenet_sendrecv_rsync_client_packets" lineno="57054">
<summary>
Send and receive rsync_client packets.
</summary>
@@ -56529,7 +43880,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="74248">
+<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="57070">
<summary>
Do not audit attempts to send and receive rsync_client packets.
</summary>
@@ -56540,7 +43891,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsync_client_packets" lineno="74263">
+<interface name="corenet_relabelto_rsync_client_packets" lineno="57085">
<summary>
Relabel packets to rsync_client the packet type.
</summary>
@@ -56550,7 +43901,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsync_server_packets" lineno="74283">
+<interface name="corenet_send_rsync_server_packets" lineno="57105">
<summary>
Send rsync_server packets.
</summary>
@@ -56561,7 +43912,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="74302">
+<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="57124">
<summary>
Do not audit attempts to send rsync_server packets.
</summary>
@@ -56572,7 +43923,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsync_server_packets" lineno="74321">
+<interface name="corenet_receive_rsync_server_packets" lineno="57143">
<summary>
Receive rsync_server packets.
</summary>
@@ -56583,7 +43934,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="74340">
+<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="57162">
<summary>
Do not audit attempts to receive rsync_server packets.
</summary>
@@ -56594,7 +43945,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsync_server_packets" lineno="74359">
+<interface name="corenet_sendrecv_rsync_server_packets" lineno="57181">
<summary>
Send and receive rsync_server packets.
</summary>
@@ -56605,7 +43956,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="74375">
+<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="57197">
<summary>
Do not audit attempts to send and receive rsync_server packets.
</summary>
@@ -56616,7 +43967,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsync_server_packets" lineno="74390">
+<interface name="corenet_relabelto_rsync_server_packets" lineno="57212">
<summary>
Relabel packets to rsync_server the packet type.
</summary>
@@ -56626,85 +43977,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="74412">
-<summary>
-Send and receive TCP traffic on the rtorrent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_rtorrent_port" lineno="74427">
-<summary>
-Send UDP traffic on the rtorrent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74442">
-<summary>
-Do not audit attempts to send UDP traffic on the rtorrent port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_rtorrent_port" lineno="74457">
-<summary>
-Receive UDP traffic on the rtorrent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74472">
-<summary>
-Do not audit attempts to receive UDP traffic on the rtorrent port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74487">
-<summary>
-Send and receive UDP traffic on the rtorrent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74503">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the rtorrent port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_rtorrent_port" lineno="74518">
+<interface name="corenet_tcp_bind_rtorrent_port" lineno="57234">
<summary>
Bind TCP sockets to the rtorrent port.
</summary>
@@ -56715,7 +43988,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rtorrent_port" lineno="74538">
+<interface name="corenet_udp_bind_rtorrent_port" lineno="57254">
<summary>
Bind UDP sockets to the rtorrent port.
</summary>
@@ -56726,7 +43999,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rtorrent_port" lineno="74557">
+<interface name="corenet_tcp_connect_rtorrent_port" lineno="57273">
<summary>
Make a TCP connection to the rtorrent port.
</summary>
@@ -56736,7 +44009,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtorrent_client_packets" lineno="74577">
+<interface name="corenet_send_rtorrent_client_packets" lineno="57293">
<summary>
Send rtorrent_client packets.
</summary>
@@ -56747,7 +44020,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74596">
+<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="57312">
<summary>
Do not audit attempts to send rtorrent_client packets.
</summary>
@@ -56758,7 +44031,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtorrent_client_packets" lineno="74615">
+<interface name="corenet_receive_rtorrent_client_packets" lineno="57331">
<summary>
Receive rtorrent_client packets.
</summary>
@@ -56769,7 +44042,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74634">
+<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="57350">
<summary>
Do not audit attempts to receive rtorrent_client packets.
</summary>
@@ -56780,7 +44053,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74653">
+<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="57369">
<summary>
Send and receive rtorrent_client packets.
</summary>
@@ -56791,7 +44064,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74669">
+<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="57385">
<summary>
Do not audit attempts to send and receive rtorrent_client packets.
</summary>
@@ -56802,7 +44075,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74684">
+<interface name="corenet_relabelto_rtorrent_client_packets" lineno="57400">
<summary>
Relabel packets to rtorrent_client the packet type.
</summary>
@@ -56812,7 +44085,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtorrent_server_packets" lineno="74704">
+<interface name="corenet_send_rtorrent_server_packets" lineno="57420">
<summary>
Send rtorrent_server packets.
</summary>
@@ -56823,7 +44096,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74723">
+<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="57439">
<summary>
Do not audit attempts to send rtorrent_server packets.
</summary>
@@ -56834,7 +44107,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtorrent_server_packets" lineno="74742">
+<interface name="corenet_receive_rtorrent_server_packets" lineno="57458">
<summary>
Receive rtorrent_server packets.
</summary>
@@ -56845,7 +44118,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74761">
+<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="57477">
<summary>
Do not audit attempts to receive rtorrent_server packets.
</summary>
@@ -56856,7 +44129,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74780">
+<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="57496">
<summary>
Send and receive rtorrent_server packets.
</summary>
@@ -56867,7 +44140,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74796">
+<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="57512">
<summary>
Do not audit attempts to send and receive rtorrent_server packets.
</summary>
@@ -56878,7 +44151,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74811">
+<interface name="corenet_relabelto_rtorrent_server_packets" lineno="57527">
<summary>
Relabel packets to rtorrent_server the packet type.
</summary>
@@ -56888,85 +44161,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74833">
-<summary>
-Send and receive TCP traffic on the rtsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_rtsp_port" lineno="74848">
-<summary>
-Send UDP traffic on the rtsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74863">
-<summary>
-Do not audit attempts to send UDP traffic on the rtsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_rtsp_port" lineno="74878">
-<summary>
-Receive UDP traffic on the rtsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74893">
-<summary>
-Do not audit attempts to receive UDP traffic on the rtsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74908">
-<summary>
-Send and receive UDP traffic on the rtsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74924">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the rtsp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_rtsp_port" lineno="74939">
+<interface name="corenet_tcp_bind_rtsp_port" lineno="57549">
<summary>
Bind TCP sockets to the rtsp port.
</summary>
@@ -56977,7 +44172,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rtsp_port" lineno="74959">
+<interface name="corenet_udp_bind_rtsp_port" lineno="57569">
<summary>
Bind UDP sockets to the rtsp port.
</summary>
@@ -56988,7 +44183,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rtsp_port" lineno="74978">
+<interface name="corenet_tcp_connect_rtsp_port" lineno="57588">
<summary>
Make a TCP connection to the rtsp port.
</summary>
@@ -56998,7 +44193,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtsp_client_packets" lineno="74998">
+<interface name="corenet_send_rtsp_client_packets" lineno="57608">
<summary>
Send rtsp_client packets.
</summary>
@@ -57009,7 +44204,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="75017">
+<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="57627">
<summary>
Do not audit attempts to send rtsp_client packets.
</summary>
@@ -57020,7 +44215,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtsp_client_packets" lineno="75036">
+<interface name="corenet_receive_rtsp_client_packets" lineno="57646">
<summary>
Receive rtsp_client packets.
</summary>
@@ -57031,7 +44226,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="75055">
+<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="57665">
<summary>
Do not audit attempts to receive rtsp_client packets.
</summary>
@@ -57042,7 +44237,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtsp_client_packets" lineno="75074">
+<interface name="corenet_sendrecv_rtsp_client_packets" lineno="57684">
<summary>
Send and receive rtsp_client packets.
</summary>
@@ -57053,7 +44248,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="75090">
+<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="57700">
<summary>
Do not audit attempts to send and receive rtsp_client packets.
</summary>
@@ -57064,7 +44259,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtsp_client_packets" lineno="75105">
+<interface name="corenet_relabelto_rtsp_client_packets" lineno="57715">
<summary>
Relabel packets to rtsp_client the packet type.
</summary>
@@ -57074,7 +44269,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtsp_server_packets" lineno="75125">
+<interface name="corenet_send_rtsp_server_packets" lineno="57735">
<summary>
Send rtsp_server packets.
</summary>
@@ -57085,7 +44280,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="75144">
+<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="57754">
<summary>
Do not audit attempts to send rtsp_server packets.
</summary>
@@ -57096,7 +44291,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtsp_server_packets" lineno="75163">
+<interface name="corenet_receive_rtsp_server_packets" lineno="57773">
<summary>
Receive rtsp_server packets.
</summary>
@@ -57107,7 +44302,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="75182">
+<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="57792">
<summary>
Do not audit attempts to receive rtsp_server packets.
</summary>
@@ -57118,7 +44313,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtsp_server_packets" lineno="75201">
+<interface name="corenet_sendrecv_rtsp_server_packets" lineno="57811">
<summary>
Send and receive rtsp_server packets.
</summary>
@@ -57129,7 +44324,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="75217">
+<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="57827">
<summary>
Do not audit attempts to send and receive rtsp_server packets.
</summary>
@@ -57140,7 +44335,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtsp_server_packets" lineno="75232">
+<interface name="corenet_relabelto_rtsp_server_packets" lineno="57842">
<summary>
Relabel packets to rtsp_server the packet type.
</summary>
@@ -57150,85 +44345,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rwho_port" lineno="75254">
-<summary>
-Send and receive TCP traffic on the rwho port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_rwho_port" lineno="75269">
-<summary>
-Send UDP traffic on the rwho port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="75284">
-<summary>
-Do not audit attempts to send UDP traffic on the rwho port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_rwho_port" lineno="75299">
-<summary>
-Receive UDP traffic on the rwho port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="75314">
-<summary>
-Do not audit attempts to receive UDP traffic on the rwho port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_rwho_port" lineno="75329">
-<summary>
-Send and receive UDP traffic on the rwho port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="75345">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the rwho port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_rwho_port" lineno="75360">
+<interface name="corenet_tcp_bind_rwho_port" lineno="57864">
<summary>
Bind TCP sockets to the rwho port.
</summary>
@@ -57239,7 +44356,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rwho_port" lineno="75380">
+<interface name="corenet_udp_bind_rwho_port" lineno="57884">
<summary>
Bind UDP sockets to the rwho port.
</summary>
@@ -57250,7 +44367,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rwho_port" lineno="75399">
+<interface name="corenet_tcp_connect_rwho_port" lineno="57903">
<summary>
Make a TCP connection to the rwho port.
</summary>
@@ -57260,7 +44377,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rwho_client_packets" lineno="75419">
+<interface name="corenet_send_rwho_client_packets" lineno="57923">
<summary>
Send rwho_client packets.
</summary>
@@ -57271,7 +44388,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="75438">
+<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="57942">
<summary>
Do not audit attempts to send rwho_client packets.
</summary>
@@ -57282,7 +44399,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rwho_client_packets" lineno="75457">
+<interface name="corenet_receive_rwho_client_packets" lineno="57961">
<summary>
Receive rwho_client packets.
</summary>
@@ -57293,7 +44410,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75476">
+<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="57980">
<summary>
Do not audit attempts to receive rwho_client packets.
</summary>
@@ -57304,7 +44421,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rwho_client_packets" lineno="75495">
+<interface name="corenet_sendrecv_rwho_client_packets" lineno="57999">
<summary>
Send and receive rwho_client packets.
</summary>
@@ -57315,7 +44432,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75511">
+<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="58015">
<summary>
Do not audit attempts to send and receive rwho_client packets.
</summary>
@@ -57326,7 +44443,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rwho_client_packets" lineno="75526">
+<interface name="corenet_relabelto_rwho_client_packets" lineno="58030">
<summary>
Relabel packets to rwho_client the packet type.
</summary>
@@ -57336,7 +44453,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rwho_server_packets" lineno="75546">
+<interface name="corenet_send_rwho_server_packets" lineno="58050">
<summary>
Send rwho_server packets.
</summary>
@@ -57347,7 +44464,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75565">
+<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="58069">
<summary>
Do not audit attempts to send rwho_server packets.
</summary>
@@ -57358,7 +44475,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rwho_server_packets" lineno="75584">
+<interface name="corenet_receive_rwho_server_packets" lineno="58088">
<summary>
Receive rwho_server packets.
</summary>
@@ -57369,7 +44486,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75603">
+<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="58107">
<summary>
Do not audit attempts to receive rwho_server packets.
</summary>
@@ -57380,7 +44497,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rwho_server_packets" lineno="75622">
+<interface name="corenet_sendrecv_rwho_server_packets" lineno="58126">
<summary>
Send and receive rwho_server packets.
</summary>
@@ -57391,7 +44508,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75638">
+<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="58142">
<summary>
Do not audit attempts to send and receive rwho_server packets.
</summary>
@@ -57402,7 +44519,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rwho_server_packets" lineno="75653">
+<interface name="corenet_relabelto_rwho_server_packets" lineno="58157">
<summary>
Relabel packets to rwho_server the packet type.
</summary>
@@ -57412,85 +44529,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_salt_port" lineno="75675">
-<summary>
-Send and receive TCP traffic on the salt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_salt_port" lineno="75690">
-<summary>
-Send UDP traffic on the salt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75705">
-<summary>
-Do not audit attempts to send UDP traffic on the salt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_salt_port" lineno="75720">
-<summary>
-Receive UDP traffic on the salt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75735">
-<summary>
-Do not audit attempts to receive UDP traffic on the salt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_salt_port" lineno="75750">
-<summary>
-Send and receive UDP traffic on the salt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75766">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the salt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_salt_port" lineno="75781">
+<interface name="corenet_tcp_bind_salt_port" lineno="58179">
<summary>
Bind TCP sockets to the salt port.
</summary>
@@ -57501,7 +44540,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_salt_port" lineno="75801">
+<interface name="corenet_udp_bind_salt_port" lineno="58199">
<summary>
Bind UDP sockets to the salt port.
</summary>
@@ -57512,7 +44551,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_salt_port" lineno="75820">
+<interface name="corenet_tcp_connect_salt_port" lineno="58218">
<summary>
Make a TCP connection to the salt port.
</summary>
@@ -57522,7 +44561,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_salt_client_packets" lineno="75840">
+<interface name="corenet_send_salt_client_packets" lineno="58238">
<summary>
Send salt_client packets.
</summary>
@@ -57533,7 +44572,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75859">
+<interface name="corenet_dontaudit_send_salt_client_packets" lineno="58257">
<summary>
Do not audit attempts to send salt_client packets.
</summary>
@@ -57544,7 +44583,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_salt_client_packets" lineno="75878">
+<interface name="corenet_receive_salt_client_packets" lineno="58276">
<summary>
Receive salt_client packets.
</summary>
@@ -57555,7 +44594,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75897">
+<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="58295">
<summary>
Do not audit attempts to receive salt_client packets.
</summary>
@@ -57566,7 +44605,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_salt_client_packets" lineno="75916">
+<interface name="corenet_sendrecv_salt_client_packets" lineno="58314">
<summary>
Send and receive salt_client packets.
</summary>
@@ -57577,7 +44616,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75932">
+<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="58330">
<summary>
Do not audit attempts to send and receive salt_client packets.
</summary>
@@ -57588,7 +44627,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_salt_client_packets" lineno="75947">
+<interface name="corenet_relabelto_salt_client_packets" lineno="58345">
<summary>
Relabel packets to salt_client the packet type.
</summary>
@@ -57598,7 +44637,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_salt_server_packets" lineno="75967">
+<interface name="corenet_send_salt_server_packets" lineno="58365">
<summary>
Send salt_server packets.
</summary>
@@ -57609,7 +44648,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75986">
+<interface name="corenet_dontaudit_send_salt_server_packets" lineno="58384">
<summary>
Do not audit attempts to send salt_server packets.
</summary>
@@ -57620,7 +44659,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_salt_server_packets" lineno="76005">
+<interface name="corenet_receive_salt_server_packets" lineno="58403">
<summary>
Receive salt_server packets.
</summary>
@@ -57631,7 +44670,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="76024">
+<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="58422">
<summary>
Do not audit attempts to receive salt_server packets.
</summary>
@@ -57642,7 +44681,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_salt_server_packets" lineno="76043">
+<interface name="corenet_sendrecv_salt_server_packets" lineno="58441">
<summary>
Send and receive salt_server packets.
</summary>
@@ -57653,7 +44692,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="76059">
+<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="58457">
<summary>
Do not audit attempts to send and receive salt_server packets.
</summary>
@@ -57664,7 +44703,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_salt_server_packets" lineno="76074">
+<interface name="corenet_relabelto_salt_server_packets" lineno="58472">
<summary>
Relabel packets to salt_server the packet type.
</summary>
@@ -57674,85 +44713,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sap_port" lineno="76096">
-<summary>
-Send and receive TCP traffic on the sap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_sap_port" lineno="76111">
-<summary>
-Send UDP traffic on the sap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_sap_port" lineno="76126">
-<summary>
-Do not audit attempts to send UDP traffic on the sap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_sap_port" lineno="76141">
-<summary>
-Receive UDP traffic on the sap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="76156">
-<summary>
-Do not audit attempts to receive UDP traffic on the sap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_sap_port" lineno="76171">
-<summary>
-Send and receive UDP traffic on the sap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="76187">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the sap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_sap_port" lineno="76202">
+<interface name="corenet_tcp_bind_sap_port" lineno="58494">
<summary>
Bind TCP sockets to the sap port.
</summary>
@@ -57763,7 +44724,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sap_port" lineno="76222">
+<interface name="corenet_udp_bind_sap_port" lineno="58514">
<summary>
Bind UDP sockets to the sap port.
</summary>
@@ -57774,7 +44735,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sap_port" lineno="76241">
+<interface name="corenet_tcp_connect_sap_port" lineno="58533">
<summary>
Make a TCP connection to the sap port.
</summary>
@@ -57784,7 +44745,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sap_client_packets" lineno="76261">
+<interface name="corenet_send_sap_client_packets" lineno="58553">
<summary>
Send sap_client packets.
</summary>
@@ -57795,7 +44756,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sap_client_packets" lineno="76280">
+<interface name="corenet_dontaudit_send_sap_client_packets" lineno="58572">
<summary>
Do not audit attempts to send sap_client packets.
</summary>
@@ -57806,7 +44767,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sap_client_packets" lineno="76299">
+<interface name="corenet_receive_sap_client_packets" lineno="58591">
<summary>
Receive sap_client packets.
</summary>
@@ -57817,7 +44778,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="76318">
+<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="58610">
<summary>
Do not audit attempts to receive sap_client packets.
</summary>
@@ -57828,7 +44789,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sap_client_packets" lineno="76337">
+<interface name="corenet_sendrecv_sap_client_packets" lineno="58629">
<summary>
Send and receive sap_client packets.
</summary>
@@ -57839,7 +44800,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="76353">
+<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="58645">
<summary>
Do not audit attempts to send and receive sap_client packets.
</summary>
@@ -57850,7 +44811,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sap_client_packets" lineno="76368">
+<interface name="corenet_relabelto_sap_client_packets" lineno="58660">
<summary>
Relabel packets to sap_client the packet type.
</summary>
@@ -57860,7 +44821,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sap_server_packets" lineno="76388">
+<interface name="corenet_send_sap_server_packets" lineno="58680">
<summary>
Send sap_server packets.
</summary>
@@ -57871,7 +44832,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sap_server_packets" lineno="76407">
+<interface name="corenet_dontaudit_send_sap_server_packets" lineno="58699">
<summary>
Do not audit attempts to send sap_server packets.
</summary>
@@ -57882,7 +44843,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sap_server_packets" lineno="76426">
+<interface name="corenet_receive_sap_server_packets" lineno="58718">
<summary>
Receive sap_server packets.
</summary>
@@ -57893,7 +44854,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76445">
+<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="58737">
<summary>
Do not audit attempts to receive sap_server packets.
</summary>
@@ -57904,7 +44865,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sap_server_packets" lineno="76464">
+<interface name="corenet_sendrecv_sap_server_packets" lineno="58756">
<summary>
Send and receive sap_server packets.
</summary>
@@ -57915,7 +44876,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76480">
+<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="58772">
<summary>
Do not audit attempts to send and receive sap_server packets.
</summary>
@@ -57926,7 +44887,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sap_server_packets" lineno="76495">
+<interface name="corenet_relabelto_sap_server_packets" lineno="58787">
<summary>
Relabel packets to sap_server the packet type.
</summary>
@@ -57936,85 +44897,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76517">
-<summary>
-Send and receive TCP traffic on the servistaitsm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_servistaitsm_port" lineno="76532">
-<summary>
-Send UDP traffic on the servistaitsm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76547">
-<summary>
-Do not audit attempts to send UDP traffic on the servistaitsm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_servistaitsm_port" lineno="76562">
-<summary>
-Receive UDP traffic on the servistaitsm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76577">
-<summary>
-Do not audit attempts to receive UDP traffic on the servistaitsm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76592">
-<summary>
-Send and receive UDP traffic on the servistaitsm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76608">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the servistaitsm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76623">
+<interface name="corenet_tcp_bind_servistaitsm_port" lineno="58809">
<summary>
Bind TCP sockets to the servistaitsm port.
</summary>
@@ -58025,7 +44908,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_servistaitsm_port" lineno="76643">
+<interface name="corenet_udp_bind_servistaitsm_port" lineno="58829">
<summary>
Bind UDP sockets to the servistaitsm port.
</summary>
@@ -58036,7 +44919,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76662">
+<interface name="corenet_tcp_connect_servistaitsm_port" lineno="58848">
<summary>
Make a TCP connection to the servistaitsm port.
</summary>
@@ -58046,7 +44929,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_servistaitsm_client_packets" lineno="76682">
+<interface name="corenet_send_servistaitsm_client_packets" lineno="58868">
<summary>
Send servistaitsm_client packets.
</summary>
@@ -58057,7 +44940,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76701">
+<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="58887">
<summary>
Do not audit attempts to send servistaitsm_client packets.
</summary>
@@ -58068,7 +44951,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_servistaitsm_client_packets" lineno="76720">
+<interface name="corenet_receive_servistaitsm_client_packets" lineno="58906">
<summary>
Receive servistaitsm_client packets.
</summary>
@@ -58079,7 +44962,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76739">
+<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="58925">
<summary>
Do not audit attempts to receive servistaitsm_client packets.
</summary>
@@ -58090,7 +44973,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76758">
+<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="58944">
<summary>
Send and receive servistaitsm_client packets.
</summary>
@@ -58101,7 +44984,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76774">
+<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="58960">
<summary>
Do not audit attempts to send and receive servistaitsm_client packets.
</summary>
@@ -58112,7 +44995,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76789">
+<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="58975">
<summary>
Relabel packets to servistaitsm_client the packet type.
</summary>
@@ -58122,7 +45005,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_servistaitsm_server_packets" lineno="76809">
+<interface name="corenet_send_servistaitsm_server_packets" lineno="58995">
<summary>
Send servistaitsm_server packets.
</summary>
@@ -58133,7 +45016,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76828">
+<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="59014">
<summary>
Do not audit attempts to send servistaitsm_server packets.
</summary>
@@ -58144,7 +45027,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_servistaitsm_server_packets" lineno="76847">
+<interface name="corenet_receive_servistaitsm_server_packets" lineno="59033">
<summary>
Receive servistaitsm_server packets.
</summary>
@@ -58155,7 +45038,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76866">
+<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="59052">
<summary>
Do not audit attempts to receive servistaitsm_server packets.
</summary>
@@ -58166,7 +45049,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76885">
+<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="59071">
<summary>
Send and receive servistaitsm_server packets.
</summary>
@@ -58177,7 +45060,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76901">
+<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="59087">
<summary>
Do not audit attempts to send and receive servistaitsm_server packets.
</summary>
@@ -58188,7 +45071,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76916">
+<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="59102">
<summary>
Relabel packets to servistaitsm_server the packet type.
</summary>
@@ -58198,85 +45081,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76938">
-<summary>
-Send and receive TCP traffic on the sieve port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_sieve_port" lineno="76953">
-<summary>
-Send UDP traffic on the sieve port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76968">
-<summary>
-Do not audit attempts to send UDP traffic on the sieve port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_sieve_port" lineno="76983">
-<summary>
-Receive UDP traffic on the sieve port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76998">
-<summary>
-Do not audit attempts to receive UDP traffic on the sieve port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_sieve_port" lineno="77013">
-<summary>
-Send and receive UDP traffic on the sieve port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="77029">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the sieve port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_sieve_port" lineno="77044">
+<interface name="corenet_tcp_bind_sieve_port" lineno="59124">
<summary>
Bind TCP sockets to the sieve port.
</summary>
@@ -58287,7 +45092,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sieve_port" lineno="77064">
+<interface name="corenet_udp_bind_sieve_port" lineno="59144">
<summary>
Bind UDP sockets to the sieve port.
</summary>
@@ -58298,7 +45103,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sieve_port" lineno="77083">
+<interface name="corenet_tcp_connect_sieve_port" lineno="59163">
<summary>
Make a TCP connection to the sieve port.
</summary>
@@ -58308,7 +45113,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sieve_client_packets" lineno="77103">
+<interface name="corenet_send_sieve_client_packets" lineno="59183">
<summary>
Send sieve_client packets.
</summary>
@@ -58319,7 +45124,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="77122">
+<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="59202">
<summary>
Do not audit attempts to send sieve_client packets.
</summary>
@@ -58330,7 +45135,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sieve_client_packets" lineno="77141">
+<interface name="corenet_receive_sieve_client_packets" lineno="59221">
<summary>
Receive sieve_client packets.
</summary>
@@ -58341,7 +45146,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="77160">
+<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="59240">
<summary>
Do not audit attempts to receive sieve_client packets.
</summary>
@@ -58352,7 +45157,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sieve_client_packets" lineno="77179">
+<interface name="corenet_sendrecv_sieve_client_packets" lineno="59259">
<summary>
Send and receive sieve_client packets.
</summary>
@@ -58363,7 +45168,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="77195">
+<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="59275">
<summary>
Do not audit attempts to send and receive sieve_client packets.
</summary>
@@ -58374,7 +45179,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sieve_client_packets" lineno="77210">
+<interface name="corenet_relabelto_sieve_client_packets" lineno="59290">
<summary>
Relabel packets to sieve_client the packet type.
</summary>
@@ -58384,7 +45189,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sieve_server_packets" lineno="77230">
+<interface name="corenet_send_sieve_server_packets" lineno="59310">
<summary>
Send sieve_server packets.
</summary>
@@ -58395,7 +45200,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="77249">
+<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="59329">
<summary>
Do not audit attempts to send sieve_server packets.
</summary>
@@ -58406,7 +45211,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sieve_server_packets" lineno="77268">
+<interface name="corenet_receive_sieve_server_packets" lineno="59348">
<summary>
Receive sieve_server packets.
</summary>
@@ -58417,7 +45222,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="77287">
+<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="59367">
<summary>
Do not audit attempts to receive sieve_server packets.
</summary>
@@ -58428,7 +45233,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sieve_server_packets" lineno="77306">
+<interface name="corenet_sendrecv_sieve_server_packets" lineno="59386">
<summary>
Send and receive sieve_server packets.
</summary>
@@ -58439,7 +45244,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="77322">
+<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="59402">
<summary>
Do not audit attempts to send and receive sieve_server packets.
</summary>
@@ -58450,7 +45255,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sieve_server_packets" lineno="77337">
+<interface name="corenet_relabelto_sieve_server_packets" lineno="59417">
<summary>
Relabel packets to sieve_server the packet type.
</summary>
@@ -58460,85 +45265,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sip_port" lineno="77359">
-<summary>
-Send and receive TCP traffic on the sip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_sip_port" lineno="77374">
-<summary>
-Send UDP traffic on the sip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_sip_port" lineno="77389">
-<summary>
-Do not audit attempts to send UDP traffic on the sip port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_sip_port" lineno="77404">
-<summary>
-Receive UDP traffic on the sip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="77419">
-<summary>
-Do not audit attempts to receive UDP traffic on the sip port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_sip_port" lineno="77434">
-<summary>
-Send and receive UDP traffic on the sip port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77450">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the sip port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_sip_port" lineno="77465">
+<interface name="corenet_tcp_bind_sip_port" lineno="59439">
<summary>
Bind TCP sockets to the sip port.
</summary>
@@ -58549,7 +45276,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sip_port" lineno="77485">
+<interface name="corenet_udp_bind_sip_port" lineno="59459">
<summary>
Bind UDP sockets to the sip port.
</summary>
@@ -58560,7 +45287,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sip_port" lineno="77504">
+<interface name="corenet_tcp_connect_sip_port" lineno="59478">
<summary>
Make a TCP connection to the sip port.
</summary>
@@ -58570,7 +45297,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sip_client_packets" lineno="77524">
+<interface name="corenet_send_sip_client_packets" lineno="59498">
<summary>
Send sip_client packets.
</summary>
@@ -58581,7 +45308,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77543">
+<interface name="corenet_dontaudit_send_sip_client_packets" lineno="59517">
<summary>
Do not audit attempts to send sip_client packets.
</summary>
@@ -58592,7 +45319,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sip_client_packets" lineno="77562">
+<interface name="corenet_receive_sip_client_packets" lineno="59536">
<summary>
Receive sip_client packets.
</summary>
@@ -58603,7 +45330,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77581">
+<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="59555">
<summary>
Do not audit attempts to receive sip_client packets.
</summary>
@@ -58614,7 +45341,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sip_client_packets" lineno="77600">
+<interface name="corenet_sendrecv_sip_client_packets" lineno="59574">
<summary>
Send and receive sip_client packets.
</summary>
@@ -58625,7 +45352,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77616">
+<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="59590">
<summary>
Do not audit attempts to send and receive sip_client packets.
</summary>
@@ -58636,7 +45363,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sip_client_packets" lineno="77631">
+<interface name="corenet_relabelto_sip_client_packets" lineno="59605">
<summary>
Relabel packets to sip_client the packet type.
</summary>
@@ -58646,7 +45373,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sip_server_packets" lineno="77651">
+<interface name="corenet_send_sip_server_packets" lineno="59625">
<summary>
Send sip_server packets.
</summary>
@@ -58657,7 +45384,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77670">
+<interface name="corenet_dontaudit_send_sip_server_packets" lineno="59644">
<summary>
Do not audit attempts to send sip_server packets.
</summary>
@@ -58668,7 +45395,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sip_server_packets" lineno="77689">
+<interface name="corenet_receive_sip_server_packets" lineno="59663">
<summary>
Receive sip_server packets.
</summary>
@@ -58679,7 +45406,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77708">
+<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="59682">
<summary>
Do not audit attempts to receive sip_server packets.
</summary>
@@ -58690,7 +45417,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sip_server_packets" lineno="77727">
+<interface name="corenet_sendrecv_sip_server_packets" lineno="59701">
<summary>
Send and receive sip_server packets.
</summary>
@@ -58701,7 +45428,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77743">
+<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="59717">
<summary>
Do not audit attempts to send and receive sip_server packets.
</summary>
@@ -58712,7 +45439,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sip_server_packets" lineno="77758">
+<interface name="corenet_relabelto_sip_server_packets" lineno="59732">
<summary>
Relabel packets to sip_server the packet type.
</summary>
@@ -58722,85 +45449,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77780">
-<summary>
-Send and receive TCP traffic on the sixxsconfig port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_sixxsconfig_port" lineno="77795">
-<summary>
-Send UDP traffic on the sixxsconfig port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77810">
-<summary>
-Do not audit attempts to send UDP traffic on the sixxsconfig port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77825">
-<summary>
-Receive UDP traffic on the sixxsconfig port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77840">
-<summary>
-Do not audit attempts to receive UDP traffic on the sixxsconfig port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77855">
-<summary>
-Send and receive UDP traffic on the sixxsconfig port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77871">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the sixxsconfig port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77886">
+<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="59754">
<summary>
Bind TCP sockets to the sixxsconfig port.
</summary>
@@ -58811,7 +45460,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77906">
+<interface name="corenet_udp_bind_sixxsconfig_port" lineno="59774">
<summary>
Bind UDP sockets to the sixxsconfig port.
</summary>
@@ -58822,7 +45471,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77925">
+<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="59793">
<summary>
Make a TCP connection to the sixxsconfig port.
</summary>
@@ -58832,7 +45481,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sixxsconfig_client_packets" lineno="77945">
+<interface name="corenet_send_sixxsconfig_client_packets" lineno="59813">
<summary>
Send sixxsconfig_client packets.
</summary>
@@ -58843,7 +45492,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77964">
+<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="59832">
<summary>
Do not audit attempts to send sixxsconfig_client packets.
</summary>
@@ -58854,7 +45503,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77983">
+<interface name="corenet_receive_sixxsconfig_client_packets" lineno="59851">
<summary>
Receive sixxsconfig_client packets.
</summary>
@@ -58865,7 +45514,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="78002">
+<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="59870">
<summary>
Do not audit attempts to receive sixxsconfig_client packets.
</summary>
@@ -58876,7 +45525,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="78021">
+<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="59889">
<summary>
Send and receive sixxsconfig_client packets.
</summary>
@@ -58887,7 +45536,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="78037">
+<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="59905">
<summary>
Do not audit attempts to send and receive sixxsconfig_client packets.
</summary>
@@ -58898,7 +45547,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="78052">
+<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="59920">
<summary>
Relabel packets to sixxsconfig_client the packet type.
</summary>
@@ -58908,7 +45557,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sixxsconfig_server_packets" lineno="78072">
+<interface name="corenet_send_sixxsconfig_server_packets" lineno="59940">
<summary>
Send sixxsconfig_server packets.
</summary>
@@ -58919,7 +45568,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="78091">
+<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="59959">
<summary>
Do not audit attempts to send sixxsconfig_server packets.
</summary>
@@ -58930,7 +45579,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sixxsconfig_server_packets" lineno="78110">
+<interface name="corenet_receive_sixxsconfig_server_packets" lineno="59978">
<summary>
Receive sixxsconfig_server packets.
</summary>
@@ -58941,7 +45590,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="78129">
+<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="59997">
<summary>
Do not audit attempts to receive sixxsconfig_server packets.
</summary>
@@ -58952,7 +45601,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="78148">
+<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="60016">
<summary>
Send and receive sixxsconfig_server packets.
</summary>
@@ -58963,7 +45612,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="78164">
+<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="60032">
<summary>
Do not audit attempts to send and receive sixxsconfig_server packets.
</summary>
@@ -58974,7 +45623,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="78179">
+<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="60047">
<summary>
Relabel packets to sixxsconfig_server the packet type.
</summary>
@@ -58984,85 +45633,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_smbd_port" lineno="78201">
-<summary>
-Send and receive TCP traffic on the smbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_smbd_port" lineno="78216">
-<summary>
-Send UDP traffic on the smbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="78231">
-<summary>
-Do not audit attempts to send UDP traffic on the smbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_smbd_port" lineno="78246">
-<summary>
-Receive UDP traffic on the smbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="78261">
-<summary>
-Do not audit attempts to receive UDP traffic on the smbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_smbd_port" lineno="78276">
-<summary>
-Send and receive UDP traffic on the smbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="78292">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the smbd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_smbd_port" lineno="78307">
+<interface name="corenet_tcp_bind_smbd_port" lineno="60069">
<summary>
Bind TCP sockets to the smbd port.
</summary>
@@ -59073,7 +45644,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_smbd_port" lineno="78327">
+<interface name="corenet_udp_bind_smbd_port" lineno="60089">
<summary>
Bind UDP sockets to the smbd port.
</summary>
@@ -59084,7 +45655,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_smbd_port" lineno="78346">
+<interface name="corenet_tcp_connect_smbd_port" lineno="60108">
<summary>
Make a TCP connection to the smbd port.
</summary>
@@ -59094,7 +45665,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smbd_client_packets" lineno="78366">
+<interface name="corenet_send_smbd_client_packets" lineno="60128">
<summary>
Send smbd_client packets.
</summary>
@@ -59105,7 +45676,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="78385">
+<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="60147">
<summary>
Do not audit attempts to send smbd_client packets.
</summary>
@@ -59116,7 +45687,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smbd_client_packets" lineno="78404">
+<interface name="corenet_receive_smbd_client_packets" lineno="60166">
<summary>
Receive smbd_client packets.
</summary>
@@ -59127,7 +45698,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="78423">
+<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="60185">
<summary>
Do not audit attempts to receive smbd_client packets.
</summary>
@@ -59138,7 +45709,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smbd_client_packets" lineno="78442">
+<interface name="corenet_sendrecv_smbd_client_packets" lineno="60204">
<summary>
Send and receive smbd_client packets.
</summary>
@@ -59149,7 +45720,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78458">
+<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="60220">
<summary>
Do not audit attempts to send and receive smbd_client packets.
</summary>
@@ -59160,7 +45731,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smbd_client_packets" lineno="78473">
+<interface name="corenet_relabelto_smbd_client_packets" lineno="60235">
<summary>
Relabel packets to smbd_client the packet type.
</summary>
@@ -59170,7 +45741,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smbd_server_packets" lineno="78493">
+<interface name="corenet_send_smbd_server_packets" lineno="60255">
<summary>
Send smbd_server packets.
</summary>
@@ -59181,7 +45752,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78512">
+<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="60274">
<summary>
Do not audit attempts to send smbd_server packets.
</summary>
@@ -59192,7 +45763,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smbd_server_packets" lineno="78531">
+<interface name="corenet_receive_smbd_server_packets" lineno="60293">
<summary>
Receive smbd_server packets.
</summary>
@@ -59203,7 +45774,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78550">
+<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="60312">
<summary>
Do not audit attempts to receive smbd_server packets.
</summary>
@@ -59214,7 +45785,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smbd_server_packets" lineno="78569">
+<interface name="corenet_sendrecv_smbd_server_packets" lineno="60331">
<summary>
Send and receive smbd_server packets.
</summary>
@@ -59225,7 +45796,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78585">
+<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="60347">
<summary>
Do not audit attempts to send and receive smbd_server packets.
</summary>
@@ -59236,7 +45807,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smbd_server_packets" lineno="78600">
+<interface name="corenet_relabelto_smbd_server_packets" lineno="60362">
<summary>
Relabel packets to smbd_server the packet type.
</summary>
@@ -59246,85 +45817,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78622">
-<summary>
-Send and receive TCP traffic on the smtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_smtp_port" lineno="78637">
-<summary>
-Send UDP traffic on the smtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78652">
-<summary>
-Do not audit attempts to send UDP traffic on the smtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_smtp_port" lineno="78667">
-<summary>
-Receive UDP traffic on the smtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78682">
-<summary>
-Do not audit attempts to receive UDP traffic on the smtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_smtp_port" lineno="78697">
-<summary>
-Send and receive UDP traffic on the smtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78713">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the smtp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_smtp_port" lineno="78728">
+<interface name="corenet_tcp_bind_smtp_port" lineno="60384">
<summary>
Bind TCP sockets to the smtp port.
</summary>
@@ -59335,7 +45828,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_smtp_port" lineno="78748">
+<interface name="corenet_udp_bind_smtp_port" lineno="60404">
<summary>
Bind UDP sockets to the smtp port.
</summary>
@@ -59346,7 +45839,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_smtp_port" lineno="78767">
+<interface name="corenet_tcp_connect_smtp_port" lineno="60423">
<summary>
Make a TCP connection to the smtp port.
</summary>
@@ -59356,7 +45849,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smtp_client_packets" lineno="78787">
+<interface name="corenet_send_smtp_client_packets" lineno="60443">
<summary>
Send smtp_client packets.
</summary>
@@ -59367,7 +45860,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78806">
+<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="60462">
<summary>
Do not audit attempts to send smtp_client packets.
</summary>
@@ -59378,7 +45871,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smtp_client_packets" lineno="78825">
+<interface name="corenet_receive_smtp_client_packets" lineno="60481">
<summary>
Receive smtp_client packets.
</summary>
@@ -59389,7 +45882,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78844">
+<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="60500">
<summary>
Do not audit attempts to receive smtp_client packets.
</summary>
@@ -59400,7 +45893,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smtp_client_packets" lineno="78863">
+<interface name="corenet_sendrecv_smtp_client_packets" lineno="60519">
<summary>
Send and receive smtp_client packets.
</summary>
@@ -59411,7 +45904,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78879">
+<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="60535">
<summary>
Do not audit attempts to send and receive smtp_client packets.
</summary>
@@ -59422,7 +45915,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smtp_client_packets" lineno="78894">
+<interface name="corenet_relabelto_smtp_client_packets" lineno="60550">
<summary>
Relabel packets to smtp_client the packet type.
</summary>
@@ -59432,7 +45925,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smtp_server_packets" lineno="78914">
+<interface name="corenet_send_smtp_server_packets" lineno="60570">
<summary>
Send smtp_server packets.
</summary>
@@ -59443,7 +45936,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78933">
+<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="60589">
<summary>
Do not audit attempts to send smtp_server packets.
</summary>
@@ -59454,7 +45947,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smtp_server_packets" lineno="78952">
+<interface name="corenet_receive_smtp_server_packets" lineno="60608">
<summary>
Receive smtp_server packets.
</summary>
@@ -59465,7 +45958,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78971">
+<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="60627">
<summary>
Do not audit attempts to receive smtp_server packets.
</summary>
@@ -59476,7 +45969,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smtp_server_packets" lineno="78990">
+<interface name="corenet_sendrecv_smtp_server_packets" lineno="60646">
<summary>
Send and receive smtp_server packets.
</summary>
@@ -59487,7 +45980,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="79006">
+<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="60662">
<summary>
Do not audit attempts to send and receive smtp_server packets.
</summary>
@@ -59498,7 +45991,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smtp_server_packets" lineno="79021">
+<interface name="corenet_relabelto_smtp_server_packets" lineno="60677">
<summary>
Relabel packets to smtp_server the packet type.
</summary>
@@ -59508,85 +46001,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_snmp_port" lineno="79043">
-<summary>
-Send and receive TCP traffic on the snmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_snmp_port" lineno="79058">
-<summary>
-Send UDP traffic on the snmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="79073">
-<summary>
-Do not audit attempts to send UDP traffic on the snmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_snmp_port" lineno="79088">
-<summary>
-Receive UDP traffic on the snmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="79103">
-<summary>
-Do not audit attempts to receive UDP traffic on the snmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_snmp_port" lineno="79118">
-<summary>
-Send and receive UDP traffic on the snmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="79134">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the snmp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_snmp_port" lineno="79149">
+<interface name="corenet_tcp_bind_snmp_port" lineno="60699">
<summary>
Bind TCP sockets to the snmp port.
</summary>
@@ -59597,7 +46012,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_snmp_port" lineno="79169">
+<interface name="corenet_udp_bind_snmp_port" lineno="60719">
<summary>
Bind UDP sockets to the snmp port.
</summary>
@@ -59608,7 +46023,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_snmp_port" lineno="79188">
+<interface name="corenet_tcp_connect_snmp_port" lineno="60738">
<summary>
Make a TCP connection to the snmp port.
</summary>
@@ -59618,7 +46033,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_snmp_client_packets" lineno="79208">
+<interface name="corenet_send_snmp_client_packets" lineno="60758">
<summary>
Send snmp_client packets.
</summary>
@@ -59629,7 +46044,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="79227">
+<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="60777">
<summary>
Do not audit attempts to send snmp_client packets.
</summary>
@@ -59640,7 +46055,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_snmp_client_packets" lineno="79246">
+<interface name="corenet_receive_snmp_client_packets" lineno="60796">
<summary>
Receive snmp_client packets.
</summary>
@@ -59651,7 +46066,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="79265">
+<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="60815">
<summary>
Do not audit attempts to receive snmp_client packets.
</summary>
@@ -59662,7 +46077,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_snmp_client_packets" lineno="79284">
+<interface name="corenet_sendrecv_snmp_client_packets" lineno="60834">
<summary>
Send and receive snmp_client packets.
</summary>
@@ -59673,7 +46088,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="79300">
+<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="60850">
<summary>
Do not audit attempts to send and receive snmp_client packets.
</summary>
@@ -59684,7 +46099,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_snmp_client_packets" lineno="79315">
+<interface name="corenet_relabelto_snmp_client_packets" lineno="60865">
<summary>
Relabel packets to snmp_client the packet type.
</summary>
@@ -59694,7 +46109,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_snmp_server_packets" lineno="79335">
+<interface name="corenet_send_snmp_server_packets" lineno="60885">
<summary>
Send snmp_server packets.
</summary>
@@ -59705,7 +46120,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="79354">
+<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="60904">
<summary>
Do not audit attempts to send snmp_server packets.
</summary>
@@ -59716,7 +46131,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_snmp_server_packets" lineno="79373">
+<interface name="corenet_receive_snmp_server_packets" lineno="60923">
<summary>
Receive snmp_server packets.
</summary>
@@ -59727,7 +46142,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="79392">
+<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="60942">
<summary>
Do not audit attempts to receive snmp_server packets.
</summary>
@@ -59738,7 +46153,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_snmp_server_packets" lineno="79411">
+<interface name="corenet_sendrecv_snmp_server_packets" lineno="60961">
<summary>
Send and receive snmp_server packets.
</summary>
@@ -59749,7 +46164,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="79427">
+<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="60977">
<summary>
Do not audit attempts to send and receive snmp_server packets.
</summary>
@@ -59760,7 +46175,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_snmp_server_packets" lineno="79442">
+<interface name="corenet_relabelto_snmp_server_packets" lineno="60992">
<summary>
Relabel packets to snmp_server the packet type.
</summary>
@@ -59770,85 +46185,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_socks_port" lineno="79464">
-<summary>
-Send and receive TCP traffic on the socks port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_socks_port" lineno="79479">
-<summary>
-Send UDP traffic on the socks port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79494">
-<summary>
-Do not audit attempts to send UDP traffic on the socks port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_socks_port" lineno="79509">
-<summary>
-Receive UDP traffic on the socks port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79524">
-<summary>
-Do not audit attempts to receive UDP traffic on the socks port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_socks_port" lineno="79539">
-<summary>
-Send and receive UDP traffic on the socks port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79555">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the socks port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_socks_port" lineno="79570">
+<interface name="corenet_tcp_bind_socks_port" lineno="61014">
<summary>
Bind TCP sockets to the socks port.
</summary>
@@ -59859,7 +46196,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_socks_port" lineno="79590">
+<interface name="corenet_udp_bind_socks_port" lineno="61034">
<summary>
Bind UDP sockets to the socks port.
</summary>
@@ -59870,7 +46207,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_socks_port" lineno="79609">
+<interface name="corenet_tcp_connect_socks_port" lineno="61053">
<summary>
Make a TCP connection to the socks port.
</summary>
@@ -59880,7 +46217,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_socks_client_packets" lineno="79629">
+<interface name="corenet_send_socks_client_packets" lineno="61073">
<summary>
Send socks_client packets.
</summary>
@@ -59891,7 +46228,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79648">
+<interface name="corenet_dontaudit_send_socks_client_packets" lineno="61092">
<summary>
Do not audit attempts to send socks_client packets.
</summary>
@@ -59902,7 +46239,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_socks_client_packets" lineno="79667">
+<interface name="corenet_receive_socks_client_packets" lineno="61111">
<summary>
Receive socks_client packets.
</summary>
@@ -59913,7 +46250,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79686">
+<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="61130">
<summary>
Do not audit attempts to receive socks_client packets.
</summary>
@@ -59924,7 +46261,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_socks_client_packets" lineno="79705">
+<interface name="corenet_sendrecv_socks_client_packets" lineno="61149">
<summary>
Send and receive socks_client packets.
</summary>
@@ -59935,7 +46272,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79721">
+<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="61165">
<summary>
Do not audit attempts to send and receive socks_client packets.
</summary>
@@ -59946,7 +46283,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_socks_client_packets" lineno="79736">
+<interface name="corenet_relabelto_socks_client_packets" lineno="61180">
<summary>
Relabel packets to socks_client the packet type.
</summary>
@@ -59956,7 +46293,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_socks_server_packets" lineno="79756">
+<interface name="corenet_send_socks_server_packets" lineno="61200">
<summary>
Send socks_server packets.
</summary>
@@ -59967,7 +46304,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79775">
+<interface name="corenet_dontaudit_send_socks_server_packets" lineno="61219">
<summary>
Do not audit attempts to send socks_server packets.
</summary>
@@ -59978,7 +46315,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_socks_server_packets" lineno="79794">
+<interface name="corenet_receive_socks_server_packets" lineno="61238">
<summary>
Receive socks_server packets.
</summary>
@@ -59989,7 +46326,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79813">
+<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="61257">
<summary>
Do not audit attempts to receive socks_server packets.
</summary>
@@ -60000,7 +46337,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_socks_server_packets" lineno="79832">
+<interface name="corenet_sendrecv_socks_server_packets" lineno="61276">
<summary>
Send and receive socks_server packets.
</summary>
@@ -60011,7 +46348,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79848">
+<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="61292">
<summary>
Do not audit attempts to send and receive socks_server packets.
</summary>
@@ -60022,7 +46359,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_socks_server_packets" lineno="79863">
+<interface name="corenet_relabelto_socks_server_packets" lineno="61307">
<summary>
Relabel packets to socks_server the packet type.
</summary>
@@ -60032,85 +46369,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79885">
-<summary>
-Send and receive TCP traffic on the soundd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_soundd_port" lineno="79900">
-<summary>
-Send UDP traffic on the soundd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79915">
-<summary>
-Do not audit attempts to send UDP traffic on the soundd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_soundd_port" lineno="79930">
-<summary>
-Receive UDP traffic on the soundd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79945">
-<summary>
-Do not audit attempts to receive UDP traffic on the soundd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_soundd_port" lineno="79960">
-<summary>
-Send and receive UDP traffic on the soundd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79976">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the soundd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_soundd_port" lineno="79991">
+<interface name="corenet_tcp_bind_soundd_port" lineno="61329">
<summary>
Bind TCP sockets to the soundd port.
</summary>
@@ -60121,7 +46380,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_soundd_port" lineno="80011">
+<interface name="corenet_udp_bind_soundd_port" lineno="61349">
<summary>
Bind UDP sockets to the soundd port.
</summary>
@@ -60132,7 +46391,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_soundd_port" lineno="80030">
+<interface name="corenet_tcp_connect_soundd_port" lineno="61368">
<summary>
Make a TCP connection to the soundd port.
</summary>
@@ -60142,7 +46401,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_soundd_client_packets" lineno="80050">
+<interface name="corenet_send_soundd_client_packets" lineno="61388">
<summary>
Send soundd_client packets.
</summary>
@@ -60153,7 +46412,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="80069">
+<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="61407">
<summary>
Do not audit attempts to send soundd_client packets.
</summary>
@@ -60164,7 +46423,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_soundd_client_packets" lineno="80088">
+<interface name="corenet_receive_soundd_client_packets" lineno="61426">
<summary>
Receive soundd_client packets.
</summary>
@@ -60175,7 +46434,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="80107">
+<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="61445">
<summary>
Do not audit attempts to receive soundd_client packets.
</summary>
@@ -60186,7 +46445,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_soundd_client_packets" lineno="80126">
+<interface name="corenet_sendrecv_soundd_client_packets" lineno="61464">
<summary>
Send and receive soundd_client packets.
</summary>
@@ -60197,7 +46456,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="80142">
+<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="61480">
<summary>
Do not audit attempts to send and receive soundd_client packets.
</summary>
@@ -60208,7 +46467,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_soundd_client_packets" lineno="80157">
+<interface name="corenet_relabelto_soundd_client_packets" lineno="61495">
<summary>
Relabel packets to soundd_client the packet type.
</summary>
@@ -60218,7 +46477,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_soundd_server_packets" lineno="80177">
+<interface name="corenet_send_soundd_server_packets" lineno="61515">
<summary>
Send soundd_server packets.
</summary>
@@ -60229,7 +46488,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="80196">
+<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="61534">
<summary>
Do not audit attempts to send soundd_server packets.
</summary>
@@ -60240,7 +46499,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_soundd_server_packets" lineno="80215">
+<interface name="corenet_receive_soundd_server_packets" lineno="61553">
<summary>
Receive soundd_server packets.
</summary>
@@ -60251,7 +46510,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="80234">
+<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="61572">
<summary>
Do not audit attempts to receive soundd_server packets.
</summary>
@@ -60262,7 +46521,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_soundd_server_packets" lineno="80253">
+<interface name="corenet_sendrecv_soundd_server_packets" lineno="61591">
<summary>
Send and receive soundd_server packets.
</summary>
@@ -60273,7 +46532,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="80269">
+<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="61607">
<summary>
Do not audit attempts to send and receive soundd_server packets.
</summary>
@@ -60284,7 +46543,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_soundd_server_packets" lineno="80284">
+<interface name="corenet_relabelto_soundd_server_packets" lineno="61622">
<summary>
Relabel packets to soundd_server the packet type.
</summary>
@@ -60294,85 +46553,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_spamd_port" lineno="80306">
-<summary>
-Send and receive TCP traffic on the spamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_spamd_port" lineno="80321">
-<summary>
-Send UDP traffic on the spamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="80336">
-<summary>
-Do not audit attempts to send UDP traffic on the spamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_spamd_port" lineno="80351">
-<summary>
-Receive UDP traffic on the spamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="80366">
-<summary>
-Do not audit attempts to receive UDP traffic on the spamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_spamd_port" lineno="80381">
-<summary>
-Send and receive UDP traffic on the spamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="80397">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the spamd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_spamd_port" lineno="80412">
+<interface name="corenet_tcp_bind_spamd_port" lineno="61644">
<summary>
Bind TCP sockets to the spamd port.
</summary>
@@ -60383,7 +46564,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_spamd_port" lineno="80432">
+<interface name="corenet_udp_bind_spamd_port" lineno="61664">
<summary>
Bind UDP sockets to the spamd port.
</summary>
@@ -60394,7 +46575,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_spamd_port" lineno="80451">
+<interface name="corenet_tcp_connect_spamd_port" lineno="61683">
<summary>
Make a TCP connection to the spamd port.
</summary>
@@ -60404,7 +46585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_spamd_client_packets" lineno="80471">
+<interface name="corenet_send_spamd_client_packets" lineno="61703">
<summary>
Send spamd_client packets.
</summary>
@@ -60415,7 +46596,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80490">
+<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="61722">
<summary>
Do not audit attempts to send spamd_client packets.
</summary>
@@ -60426,7 +46607,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_spamd_client_packets" lineno="80509">
+<interface name="corenet_receive_spamd_client_packets" lineno="61741">
<summary>
Receive spamd_client packets.
</summary>
@@ -60437,7 +46618,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80528">
+<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="61760">
<summary>
Do not audit attempts to receive spamd_client packets.
</summary>
@@ -60448,7 +46629,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_spamd_client_packets" lineno="80547">
+<interface name="corenet_sendrecv_spamd_client_packets" lineno="61779">
<summary>
Send and receive spamd_client packets.
</summary>
@@ -60459,7 +46640,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80563">
+<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="61795">
<summary>
Do not audit attempts to send and receive spamd_client packets.
</summary>
@@ -60470,7 +46651,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_spamd_client_packets" lineno="80578">
+<interface name="corenet_relabelto_spamd_client_packets" lineno="61810">
<summary>
Relabel packets to spamd_client the packet type.
</summary>
@@ -60480,7 +46661,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_spamd_server_packets" lineno="80598">
+<interface name="corenet_send_spamd_server_packets" lineno="61830">
<summary>
Send spamd_server packets.
</summary>
@@ -60491,7 +46672,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80617">
+<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="61849">
<summary>
Do not audit attempts to send spamd_server packets.
</summary>
@@ -60502,7 +46683,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_spamd_server_packets" lineno="80636">
+<interface name="corenet_receive_spamd_server_packets" lineno="61868">
<summary>
Receive spamd_server packets.
</summary>
@@ -60513,7 +46694,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80655">
+<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="61887">
<summary>
Do not audit attempts to receive spamd_server packets.
</summary>
@@ -60524,7 +46705,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_spamd_server_packets" lineno="80674">
+<interface name="corenet_sendrecv_spamd_server_packets" lineno="61906">
<summary>
Send and receive spamd_server packets.
</summary>
@@ -60535,7 +46716,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80690">
+<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="61922">
<summary>
Do not audit attempts to send and receive spamd_server packets.
</summary>
@@ -60546,7 +46727,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_spamd_server_packets" lineno="80705">
+<interface name="corenet_relabelto_spamd_server_packets" lineno="61937">
<summary>
Relabel packets to spamd_server the packet type.
</summary>
@@ -60556,85 +46737,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_speech_port" lineno="80727">
-<summary>
-Send and receive TCP traffic on the speech port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_speech_port" lineno="80742">
-<summary>
-Send UDP traffic on the speech port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80757">
-<summary>
-Do not audit attempts to send UDP traffic on the speech port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_speech_port" lineno="80772">
-<summary>
-Receive UDP traffic on the speech port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80787">
-<summary>
-Do not audit attempts to receive UDP traffic on the speech port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_speech_port" lineno="80802">
-<summary>
-Send and receive UDP traffic on the speech port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80818">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the speech port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_speech_port" lineno="80833">
+<interface name="corenet_tcp_bind_speech_port" lineno="61959">
<summary>
Bind TCP sockets to the speech port.
</summary>
@@ -60645,7 +46748,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_speech_port" lineno="80853">
+<interface name="corenet_udp_bind_speech_port" lineno="61979">
<summary>
Bind UDP sockets to the speech port.
</summary>
@@ -60656,7 +46759,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_speech_port" lineno="80872">
+<interface name="corenet_tcp_connect_speech_port" lineno="61998">
<summary>
Make a TCP connection to the speech port.
</summary>
@@ -60666,7 +46769,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_speech_client_packets" lineno="80892">
+<interface name="corenet_send_speech_client_packets" lineno="62018">
<summary>
Send speech_client packets.
</summary>
@@ -60677,7 +46780,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80911">
+<interface name="corenet_dontaudit_send_speech_client_packets" lineno="62037">
<summary>
Do not audit attempts to send speech_client packets.
</summary>
@@ -60688,7 +46791,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_speech_client_packets" lineno="80930">
+<interface name="corenet_receive_speech_client_packets" lineno="62056">
<summary>
Receive speech_client packets.
</summary>
@@ -60699,7 +46802,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80949">
+<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="62075">
<summary>
Do not audit attempts to receive speech_client packets.
</summary>
@@ -60710,7 +46813,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_speech_client_packets" lineno="80968">
+<interface name="corenet_sendrecv_speech_client_packets" lineno="62094">
<summary>
Send and receive speech_client packets.
</summary>
@@ -60721,7 +46824,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80984">
+<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="62110">
<summary>
Do not audit attempts to send and receive speech_client packets.
</summary>
@@ -60732,7 +46835,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_speech_client_packets" lineno="80999">
+<interface name="corenet_relabelto_speech_client_packets" lineno="62125">
<summary>
Relabel packets to speech_client the packet type.
</summary>
@@ -60742,7 +46845,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_speech_server_packets" lineno="81019">
+<interface name="corenet_send_speech_server_packets" lineno="62145">
<summary>
Send speech_server packets.
</summary>
@@ -60753,7 +46856,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_speech_server_packets" lineno="81038">
+<interface name="corenet_dontaudit_send_speech_server_packets" lineno="62164">
<summary>
Do not audit attempts to send speech_server packets.
</summary>
@@ -60764,7 +46867,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_speech_server_packets" lineno="81057">
+<interface name="corenet_receive_speech_server_packets" lineno="62183">
<summary>
Receive speech_server packets.
</summary>
@@ -60775,7 +46878,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="81076">
+<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="62202">
<summary>
Do not audit attempts to receive speech_server packets.
</summary>
@@ -60786,7 +46889,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_speech_server_packets" lineno="81095">
+<interface name="corenet_sendrecv_speech_server_packets" lineno="62221">
<summary>
Send and receive speech_server packets.
</summary>
@@ -60797,7 +46900,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="81111">
+<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="62237">
<summary>
Do not audit attempts to send and receive speech_server packets.
</summary>
@@ -60808,7 +46911,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_speech_server_packets" lineno="81126">
+<interface name="corenet_relabelto_speech_server_packets" lineno="62252">
<summary>
Relabel packets to speech_server the packet type.
</summary>
@@ -60818,85 +46921,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_squid_port" lineno="81148">
-<summary>
-Send and receive TCP traffic on the squid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_squid_port" lineno="81163">
-<summary>
-Send UDP traffic on the squid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_squid_port" lineno="81178">
-<summary>
-Do not audit attempts to send UDP traffic on the squid port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_squid_port" lineno="81193">
-<summary>
-Receive UDP traffic on the squid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="81208">
-<summary>
-Do not audit attempts to receive UDP traffic on the squid port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_squid_port" lineno="81223">
-<summary>
-Send and receive UDP traffic on the squid port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="81239">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the squid port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_squid_port" lineno="81254">
+<interface name="corenet_tcp_bind_squid_port" lineno="62274">
<summary>
Bind TCP sockets to the squid port.
</summary>
@@ -60907,7 +46932,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_squid_port" lineno="81274">
+<interface name="corenet_udp_bind_squid_port" lineno="62294">
<summary>
Bind UDP sockets to the squid port.
</summary>
@@ -60918,7 +46943,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_squid_port" lineno="81293">
+<interface name="corenet_tcp_connect_squid_port" lineno="62313">
<summary>
Make a TCP connection to the squid port.
</summary>
@@ -60928,7 +46953,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_squid_client_packets" lineno="81313">
+<interface name="corenet_send_squid_client_packets" lineno="62333">
<summary>
Send squid_client packets.
</summary>
@@ -60939,7 +46964,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_squid_client_packets" lineno="81332">
+<interface name="corenet_dontaudit_send_squid_client_packets" lineno="62352">
<summary>
Do not audit attempts to send squid_client packets.
</summary>
@@ -60950,7 +46975,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_squid_client_packets" lineno="81351">
+<interface name="corenet_receive_squid_client_packets" lineno="62371">
<summary>
Receive squid_client packets.
</summary>
@@ -60961,7 +46986,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="81370">
+<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="62390">
<summary>
Do not audit attempts to receive squid_client packets.
</summary>
@@ -60972,7 +46997,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_squid_client_packets" lineno="81389">
+<interface name="corenet_sendrecv_squid_client_packets" lineno="62409">
<summary>
Send and receive squid_client packets.
</summary>
@@ -60983,7 +47008,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="81405">
+<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="62425">
<summary>
Do not audit attempts to send and receive squid_client packets.
</summary>
@@ -60994,7 +47019,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_squid_client_packets" lineno="81420">
+<interface name="corenet_relabelto_squid_client_packets" lineno="62440">
<summary>
Relabel packets to squid_client the packet type.
</summary>
@@ -61004,7 +47029,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_squid_server_packets" lineno="81440">
+<interface name="corenet_send_squid_server_packets" lineno="62460">
<summary>
Send squid_server packets.
</summary>
@@ -61015,7 +47040,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81459">
+<interface name="corenet_dontaudit_send_squid_server_packets" lineno="62479">
<summary>
Do not audit attempts to send squid_server packets.
</summary>
@@ -61026,7 +47051,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_squid_server_packets" lineno="81478">
+<interface name="corenet_receive_squid_server_packets" lineno="62498">
<summary>
Receive squid_server packets.
</summary>
@@ -61037,7 +47062,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81497">
+<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="62517">
<summary>
Do not audit attempts to receive squid_server packets.
</summary>
@@ -61048,7 +47073,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_squid_server_packets" lineno="81516">
+<interface name="corenet_sendrecv_squid_server_packets" lineno="62536">
<summary>
Send and receive squid_server packets.
</summary>
@@ -61059,7 +47084,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81532">
+<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="62552">
<summary>
Do not audit attempts to send and receive squid_server packets.
</summary>
@@ -61070,7 +47095,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_squid_server_packets" lineno="81547">
+<interface name="corenet_relabelto_squid_server_packets" lineno="62567">
<summary>
Relabel packets to squid_server the packet type.
</summary>
@@ -61080,85 +47105,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81569">
-<summary>
-Send and receive TCP traffic on the ssdp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ssdp_port" lineno="81584">
-<summary>
-Send UDP traffic on the ssdp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81599">
-<summary>
-Do not audit attempts to send UDP traffic on the ssdp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ssdp_port" lineno="81614">
-<summary>
-Receive UDP traffic on the ssdp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81629">
-<summary>
-Do not audit attempts to receive UDP traffic on the ssdp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81644">
-<summary>
-Send and receive UDP traffic on the ssdp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81660">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ssdp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ssdp_port" lineno="81675">
+<interface name="corenet_tcp_bind_ssdp_port" lineno="62589">
<summary>
Bind TCP sockets to the ssdp port.
</summary>
@@ -61169,7 +47116,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ssdp_port" lineno="81695">
+<interface name="corenet_udp_bind_ssdp_port" lineno="62609">
<summary>
Bind UDP sockets to the ssdp port.
</summary>
@@ -61180,7 +47127,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ssdp_port" lineno="81714">
+<interface name="corenet_tcp_connect_ssdp_port" lineno="62628">
<summary>
Make a TCP connection to the ssdp port.
</summary>
@@ -61190,7 +47137,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssdp_client_packets" lineno="81734">
+<interface name="corenet_send_ssdp_client_packets" lineno="62648">
<summary>
Send ssdp_client packets.
</summary>
@@ -61201,7 +47148,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81753">
+<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="62667">
<summary>
Do not audit attempts to send ssdp_client packets.
</summary>
@@ -61212,7 +47159,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssdp_client_packets" lineno="81772">
+<interface name="corenet_receive_ssdp_client_packets" lineno="62686">
<summary>
Receive ssdp_client packets.
</summary>
@@ -61223,7 +47170,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81791">
+<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="62705">
<summary>
Do not audit attempts to receive ssdp_client packets.
</summary>
@@ -61234,7 +47181,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81810">
+<interface name="corenet_sendrecv_ssdp_client_packets" lineno="62724">
<summary>
Send and receive ssdp_client packets.
</summary>
@@ -61245,7 +47192,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81826">
+<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="62740">
<summary>
Do not audit attempts to send and receive ssdp_client packets.
</summary>
@@ -61256,7 +47203,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssdp_client_packets" lineno="81841">
+<interface name="corenet_relabelto_ssdp_client_packets" lineno="62755">
<summary>
Relabel packets to ssdp_client the packet type.
</summary>
@@ -61266,7 +47213,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssdp_server_packets" lineno="81861">
+<interface name="corenet_send_ssdp_server_packets" lineno="62775">
<summary>
Send ssdp_server packets.
</summary>
@@ -61277,7 +47224,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81880">
+<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="62794">
<summary>
Do not audit attempts to send ssdp_server packets.
</summary>
@@ -61288,7 +47235,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssdp_server_packets" lineno="81899">
+<interface name="corenet_receive_ssdp_server_packets" lineno="62813">
<summary>
Receive ssdp_server packets.
</summary>
@@ -61299,7 +47246,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81918">
+<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="62832">
<summary>
Do not audit attempts to receive ssdp_server packets.
</summary>
@@ -61310,7 +47257,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81937">
+<interface name="corenet_sendrecv_ssdp_server_packets" lineno="62851">
<summary>
Send and receive ssdp_server packets.
</summary>
@@ -61321,7 +47268,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81953">
+<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="62867">
<summary>
Do not audit attempts to send and receive ssdp_server packets.
</summary>
@@ -61332,7 +47279,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssdp_server_packets" lineno="81968">
+<interface name="corenet_relabelto_ssdp_server_packets" lineno="62882">
<summary>
Relabel packets to ssdp_server the packet type.
</summary>
@@ -61342,85 +47289,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81990">
-<summary>
-Send and receive TCP traffic on the ssh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ssh_port" lineno="82005">
-<summary>
-Send UDP traffic on the ssh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="82020">
-<summary>
-Do not audit attempts to send UDP traffic on the ssh port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ssh_port" lineno="82035">
-<summary>
-Receive UDP traffic on the ssh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="82050">
-<summary>
-Do not audit attempts to receive UDP traffic on the ssh port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ssh_port" lineno="82065">
-<summary>
-Send and receive UDP traffic on the ssh port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="82081">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ssh port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ssh_port" lineno="82096">
+<interface name="corenet_tcp_bind_ssh_port" lineno="62904">
<summary>
Bind TCP sockets to the ssh port.
</summary>
@@ -61431,7 +47300,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ssh_port" lineno="82116">
+<interface name="corenet_udp_bind_ssh_port" lineno="62924">
<summary>
Bind UDP sockets to the ssh port.
</summary>
@@ -61442,7 +47311,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ssh_port" lineno="82135">
+<interface name="corenet_tcp_connect_ssh_port" lineno="62943">
<summary>
Make a TCP connection to the ssh port.
</summary>
@@ -61452,7 +47321,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssh_client_packets" lineno="82155">
+<interface name="corenet_send_ssh_client_packets" lineno="62963">
<summary>
Send ssh_client packets.
</summary>
@@ -61463,7 +47332,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="82174">
+<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="62982">
<summary>
Do not audit attempts to send ssh_client packets.
</summary>
@@ -61474,7 +47343,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssh_client_packets" lineno="82193">
+<interface name="corenet_receive_ssh_client_packets" lineno="63001">
<summary>
Receive ssh_client packets.
</summary>
@@ -61485,7 +47354,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="82212">
+<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="63020">
<summary>
Do not audit attempts to receive ssh_client packets.
</summary>
@@ -61496,7 +47365,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssh_client_packets" lineno="82231">
+<interface name="corenet_sendrecv_ssh_client_packets" lineno="63039">
<summary>
Send and receive ssh_client packets.
</summary>
@@ -61507,7 +47376,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="82247">
+<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="63055">
<summary>
Do not audit attempts to send and receive ssh_client packets.
</summary>
@@ -61518,7 +47387,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssh_client_packets" lineno="82262">
+<interface name="corenet_relabelto_ssh_client_packets" lineno="63070">
<summary>
Relabel packets to ssh_client the packet type.
</summary>
@@ -61528,7 +47397,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssh_server_packets" lineno="82282">
+<interface name="corenet_send_ssh_server_packets" lineno="63090">
<summary>
Send ssh_server packets.
</summary>
@@ -61539,7 +47408,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="82301">
+<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="63109">
<summary>
Do not audit attempts to send ssh_server packets.
</summary>
@@ -61550,7 +47419,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssh_server_packets" lineno="82320">
+<interface name="corenet_receive_ssh_server_packets" lineno="63128">
<summary>
Receive ssh_server packets.
</summary>
@@ -61561,7 +47430,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="82339">
+<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="63147">
<summary>
Do not audit attempts to receive ssh_server packets.
</summary>
@@ -61572,7 +47441,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssh_server_packets" lineno="82358">
+<interface name="corenet_sendrecv_ssh_server_packets" lineno="63166">
<summary>
Send and receive ssh_server packets.
</summary>
@@ -61583,7 +47452,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="82374">
+<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="63182">
<summary>
Do not audit attempts to send and receive ssh_server packets.
</summary>
@@ -61594,7 +47463,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssh_server_packets" lineno="82389">
+<interface name="corenet_relabelto_ssh_server_packets" lineno="63197">
<summary>
Relabel packets to ssh_server the packet type.
</summary>
@@ -61604,85 +47473,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="82411">
-<summary>
-Send and receive TCP traffic on the stunnel port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_stunnel_port" lineno="82426">
-<summary>
-Send UDP traffic on the stunnel port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82441">
-<summary>
-Do not audit attempts to send UDP traffic on the stunnel port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_stunnel_port" lineno="82456">
-<summary>
-Receive UDP traffic on the stunnel port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82471">
-<summary>
-Do not audit attempts to receive UDP traffic on the stunnel port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82486">
-<summary>
-Send and receive UDP traffic on the stunnel port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82502">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the stunnel port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_stunnel_port" lineno="82517">
+<interface name="corenet_tcp_bind_stunnel_port" lineno="63219">
<summary>
Bind TCP sockets to the stunnel port.
</summary>
@@ -61693,7 +47484,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_stunnel_port" lineno="82537">
+<interface name="corenet_udp_bind_stunnel_port" lineno="63239">
<summary>
Bind UDP sockets to the stunnel port.
</summary>
@@ -61704,7 +47495,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_stunnel_port" lineno="82556">
+<interface name="corenet_tcp_connect_stunnel_port" lineno="63258">
<summary>
Make a TCP connection to the stunnel port.
</summary>
@@ -61714,7 +47505,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_stunnel_client_packets" lineno="82576">
+<interface name="corenet_send_stunnel_client_packets" lineno="63278">
<summary>
Send stunnel_client packets.
</summary>
@@ -61725,7 +47516,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82595">
+<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="63297">
<summary>
Do not audit attempts to send stunnel_client packets.
</summary>
@@ -61736,7 +47527,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_stunnel_client_packets" lineno="82614">
+<interface name="corenet_receive_stunnel_client_packets" lineno="63316">
<summary>
Receive stunnel_client packets.
</summary>
@@ -61747,7 +47538,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82633">
+<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="63335">
<summary>
Do not audit attempts to receive stunnel_client packets.
</summary>
@@ -61758,7 +47549,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82652">
+<interface name="corenet_sendrecv_stunnel_client_packets" lineno="63354">
<summary>
Send and receive stunnel_client packets.
</summary>
@@ -61769,7 +47560,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82668">
+<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="63370">
<summary>
Do not audit attempts to send and receive stunnel_client packets.
</summary>
@@ -61780,7 +47571,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_stunnel_client_packets" lineno="82683">
+<interface name="corenet_relabelto_stunnel_client_packets" lineno="63385">
<summary>
Relabel packets to stunnel_client the packet type.
</summary>
@@ -61790,7 +47581,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_stunnel_server_packets" lineno="82703">
+<interface name="corenet_send_stunnel_server_packets" lineno="63405">
<summary>
Send stunnel_server packets.
</summary>
@@ -61801,7 +47592,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82722">
+<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="63424">
<summary>
Do not audit attempts to send stunnel_server packets.
</summary>
@@ -61812,7 +47603,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_stunnel_server_packets" lineno="82741">
+<interface name="corenet_receive_stunnel_server_packets" lineno="63443">
<summary>
Receive stunnel_server packets.
</summary>
@@ -61823,7 +47614,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82760">
+<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="63462">
<summary>
Do not audit attempts to receive stunnel_server packets.
</summary>
@@ -61834,7 +47625,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82779">
+<interface name="corenet_sendrecv_stunnel_server_packets" lineno="63481">
<summary>
Send and receive stunnel_server packets.
</summary>
@@ -61845,7 +47636,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82795">
+<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="63497">
<summary>
Do not audit attempts to send and receive stunnel_server packets.
</summary>
@@ -61856,7 +47647,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_stunnel_server_packets" lineno="82810">
+<interface name="corenet_relabelto_stunnel_server_packets" lineno="63512">
<summary>
Relabel packets to stunnel_server the packet type.
</summary>
@@ -61866,85 +47657,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_svn_port" lineno="82832">
-<summary>
-Send and receive TCP traffic on the svn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_svn_port" lineno="82847">
-<summary>
-Send UDP traffic on the svn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82862">
-<summary>
-Do not audit attempts to send UDP traffic on the svn port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_svn_port" lineno="82877">
-<summary>
-Receive UDP traffic on the svn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82892">
-<summary>
-Do not audit attempts to receive UDP traffic on the svn port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_svn_port" lineno="82907">
-<summary>
-Send and receive UDP traffic on the svn port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82923">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the svn port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_svn_port" lineno="82938">
+<interface name="corenet_tcp_bind_svn_port" lineno="63534">
<summary>
Bind TCP sockets to the svn port.
</summary>
@@ -61955,7 +47668,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_svn_port" lineno="82958">
+<interface name="corenet_udp_bind_svn_port" lineno="63554">
<summary>
Bind UDP sockets to the svn port.
</summary>
@@ -61966,7 +47679,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_svn_port" lineno="82977">
+<interface name="corenet_tcp_connect_svn_port" lineno="63573">
<summary>
Make a TCP connection to the svn port.
</summary>
@@ -61976,7 +47689,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svn_client_packets" lineno="82997">
+<interface name="corenet_send_svn_client_packets" lineno="63593">
<summary>
Send svn_client packets.
</summary>
@@ -61987,7 +47700,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svn_client_packets" lineno="83016">
+<interface name="corenet_dontaudit_send_svn_client_packets" lineno="63612">
<summary>
Do not audit attempts to send svn_client packets.
</summary>
@@ -61998,7 +47711,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svn_client_packets" lineno="83035">
+<interface name="corenet_receive_svn_client_packets" lineno="63631">
<summary>
Receive svn_client packets.
</summary>
@@ -62009,7 +47722,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="83054">
+<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="63650">
<summary>
Do not audit attempts to receive svn_client packets.
</summary>
@@ -62020,7 +47733,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svn_client_packets" lineno="83073">
+<interface name="corenet_sendrecv_svn_client_packets" lineno="63669">
<summary>
Send and receive svn_client packets.
</summary>
@@ -62031,7 +47744,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="83089">
+<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="63685">
<summary>
Do not audit attempts to send and receive svn_client packets.
</summary>
@@ -62042,7 +47755,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svn_client_packets" lineno="83104">
+<interface name="corenet_relabelto_svn_client_packets" lineno="63700">
<summary>
Relabel packets to svn_client the packet type.
</summary>
@@ -62052,7 +47765,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svn_server_packets" lineno="83124">
+<interface name="corenet_send_svn_server_packets" lineno="63720">
<summary>
Send svn_server packets.
</summary>
@@ -62063,7 +47776,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svn_server_packets" lineno="83143">
+<interface name="corenet_dontaudit_send_svn_server_packets" lineno="63739">
<summary>
Do not audit attempts to send svn_server packets.
</summary>
@@ -62074,7 +47787,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svn_server_packets" lineno="83162">
+<interface name="corenet_receive_svn_server_packets" lineno="63758">
<summary>
Receive svn_server packets.
</summary>
@@ -62085,7 +47798,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="83181">
+<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="63777">
<summary>
Do not audit attempts to receive svn_server packets.
</summary>
@@ -62096,7 +47809,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svn_server_packets" lineno="83200">
+<interface name="corenet_sendrecv_svn_server_packets" lineno="63796">
<summary>
Send and receive svn_server packets.
</summary>
@@ -62107,7 +47820,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="83216">
+<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="63812">
<summary>
Do not audit attempts to send and receive svn_server packets.
</summary>
@@ -62118,7 +47831,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svn_server_packets" lineno="83231">
+<interface name="corenet_relabelto_svn_server_packets" lineno="63827">
<summary>
Relabel packets to svn_server the packet type.
</summary>
@@ -62128,85 +47841,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="83253">
-<summary>
-Send and receive TCP traffic on the svrloc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_svrloc_port" lineno="83268">
-<summary>
-Send UDP traffic on the svrloc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="83283">
-<summary>
-Do not audit attempts to send UDP traffic on the svrloc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_svrloc_port" lineno="83298">
-<summary>
-Receive UDP traffic on the svrloc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="83313">
-<summary>
-Do not audit attempts to receive UDP traffic on the svrloc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_svrloc_port" lineno="83328">
-<summary>
-Send and receive UDP traffic on the svrloc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="83344">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the svrloc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_svrloc_port" lineno="83359">
+<interface name="corenet_tcp_bind_svrloc_port" lineno="63849">
<summary>
Bind TCP sockets to the svrloc port.
</summary>
@@ -62217,7 +47852,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_svrloc_port" lineno="83379">
+<interface name="corenet_udp_bind_svrloc_port" lineno="63869">
<summary>
Bind UDP sockets to the svrloc port.
</summary>
@@ -62228,7 +47863,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_svrloc_port" lineno="83398">
+<interface name="corenet_tcp_connect_svrloc_port" lineno="63888">
<summary>
Make a TCP connection to the svrloc port.
</summary>
@@ -62238,7 +47873,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svrloc_client_packets" lineno="83418">
+<interface name="corenet_send_svrloc_client_packets" lineno="63908">
<summary>
Send svrloc_client packets.
</summary>
@@ -62249,7 +47884,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="83437">
+<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="63927">
<summary>
Do not audit attempts to send svrloc_client packets.
</summary>
@@ -62260,7 +47895,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svrloc_client_packets" lineno="83456">
+<interface name="corenet_receive_svrloc_client_packets" lineno="63946">
<summary>
Receive svrloc_client packets.
</summary>
@@ -62271,7 +47906,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83475">
+<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="63965">
<summary>
Do not audit attempts to receive svrloc_client packets.
</summary>
@@ -62282,7 +47917,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83494">
+<interface name="corenet_sendrecv_svrloc_client_packets" lineno="63984">
<summary>
Send and receive svrloc_client packets.
</summary>
@@ -62293,7 +47928,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83510">
+<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="64000">
<summary>
Do not audit attempts to send and receive svrloc_client packets.
</summary>
@@ -62304,7 +47939,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svrloc_client_packets" lineno="83525">
+<interface name="corenet_relabelto_svrloc_client_packets" lineno="64015">
<summary>
Relabel packets to svrloc_client the packet type.
</summary>
@@ -62314,7 +47949,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svrloc_server_packets" lineno="83545">
+<interface name="corenet_send_svrloc_server_packets" lineno="64035">
<summary>
Send svrloc_server packets.
</summary>
@@ -62325,7 +47960,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83564">
+<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="64054">
<summary>
Do not audit attempts to send svrloc_server packets.
</summary>
@@ -62336,7 +47971,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svrloc_server_packets" lineno="83583">
+<interface name="corenet_receive_svrloc_server_packets" lineno="64073">
<summary>
Receive svrloc_server packets.
</summary>
@@ -62347,7 +47982,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83602">
+<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="64092">
<summary>
Do not audit attempts to receive svrloc_server packets.
</summary>
@@ -62358,7 +47993,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83621">
+<interface name="corenet_sendrecv_svrloc_server_packets" lineno="64111">
<summary>
Send and receive svrloc_server packets.
</summary>
@@ -62369,7 +48004,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83637">
+<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="64127">
<summary>
Do not audit attempts to send and receive svrloc_server packets.
</summary>
@@ -62380,7 +48015,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svrloc_server_packets" lineno="83652">
+<interface name="corenet_relabelto_svrloc_server_packets" lineno="64142">
<summary>
Relabel packets to svrloc_server the packet type.
</summary>
@@ -62390,85 +48025,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_swat_port" lineno="83674">
-<summary>
-Send and receive TCP traffic on the swat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_swat_port" lineno="83689">
-<summary>
-Send UDP traffic on the swat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83704">
-<summary>
-Do not audit attempts to send UDP traffic on the swat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_swat_port" lineno="83719">
-<summary>
-Receive UDP traffic on the swat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83734">
-<summary>
-Do not audit attempts to receive UDP traffic on the swat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_swat_port" lineno="83749">
-<summary>
-Send and receive UDP traffic on the swat port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83765">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the swat port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_swat_port" lineno="83780">
+<interface name="corenet_tcp_bind_swat_port" lineno="64164">
<summary>
Bind TCP sockets to the swat port.
</summary>
@@ -62479,7 +48036,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_swat_port" lineno="83800">
+<interface name="corenet_udp_bind_swat_port" lineno="64184">
<summary>
Bind UDP sockets to the swat port.
</summary>
@@ -62490,7 +48047,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_swat_port" lineno="83819">
+<interface name="corenet_tcp_connect_swat_port" lineno="64203">
<summary>
Make a TCP connection to the swat port.
</summary>
@@ -62500,7 +48057,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_swat_client_packets" lineno="83839">
+<interface name="corenet_send_swat_client_packets" lineno="64223">
<summary>
Send swat_client packets.
</summary>
@@ -62511,7 +48068,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83858">
+<interface name="corenet_dontaudit_send_swat_client_packets" lineno="64242">
<summary>
Do not audit attempts to send swat_client packets.
</summary>
@@ -62522,7 +48079,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_swat_client_packets" lineno="83877">
+<interface name="corenet_receive_swat_client_packets" lineno="64261">
<summary>
Receive swat_client packets.
</summary>
@@ -62533,7 +48090,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83896">
+<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="64280">
<summary>
Do not audit attempts to receive swat_client packets.
</summary>
@@ -62544,7 +48101,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_swat_client_packets" lineno="83915">
+<interface name="corenet_sendrecv_swat_client_packets" lineno="64299">
<summary>
Send and receive swat_client packets.
</summary>
@@ -62555,7 +48112,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83931">
+<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="64315">
<summary>
Do not audit attempts to send and receive swat_client packets.
</summary>
@@ -62566,7 +48123,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_swat_client_packets" lineno="83946">
+<interface name="corenet_relabelto_swat_client_packets" lineno="64330">
<summary>
Relabel packets to swat_client the packet type.
</summary>
@@ -62576,7 +48133,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_swat_server_packets" lineno="83966">
+<interface name="corenet_send_swat_server_packets" lineno="64350">
<summary>
Send swat_server packets.
</summary>
@@ -62587,7 +48144,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83985">
+<interface name="corenet_dontaudit_send_swat_server_packets" lineno="64369">
<summary>
Do not audit attempts to send swat_server packets.
</summary>
@@ -62598,7 +48155,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_swat_server_packets" lineno="84004">
+<interface name="corenet_receive_swat_server_packets" lineno="64388">
<summary>
Receive swat_server packets.
</summary>
@@ -62609,7 +48166,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="84023">
+<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="64407">
<summary>
Do not audit attempts to receive swat_server packets.
</summary>
@@ -62620,7 +48177,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_swat_server_packets" lineno="84042">
+<interface name="corenet_sendrecv_swat_server_packets" lineno="64426">
<summary>
Send and receive swat_server packets.
</summary>
@@ -62631,7 +48188,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="84058">
+<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="64442">
<summary>
Do not audit attempts to send and receive swat_server packets.
</summary>
@@ -62642,7 +48199,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_swat_server_packets" lineno="84073">
+<interface name="corenet_relabelto_swat_server_packets" lineno="64457">
<summary>
Relabel packets to swat_server the packet type.
</summary>
@@ -62652,85 +48209,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="84095">
-<summary>
-Send and receive TCP traffic on the syncthing port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_syncthing_port" lineno="84110">
-<summary>
-Send UDP traffic on the syncthing port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="84125">
-<summary>
-Do not audit attempts to send UDP traffic on the syncthing port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_syncthing_port" lineno="84140">
-<summary>
-Receive UDP traffic on the syncthing port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="84155">
-<summary>
-Do not audit attempts to receive UDP traffic on the syncthing port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_syncthing_port" lineno="84170">
-<summary>
-Send and receive UDP traffic on the syncthing port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="84186">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the syncthing port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_syncthing_port" lineno="84201">
+<interface name="corenet_tcp_bind_syncthing_port" lineno="64479">
<summary>
Bind TCP sockets to the syncthing port.
</summary>
@@ -62741,7 +48220,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syncthing_port" lineno="84221">
+<interface name="corenet_udp_bind_syncthing_port" lineno="64499">
<summary>
Bind UDP sockets to the syncthing port.
</summary>
@@ -62752,7 +48231,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syncthing_port" lineno="84240">
+<interface name="corenet_tcp_connect_syncthing_port" lineno="64518">
<summary>
Make a TCP connection to the syncthing port.
</summary>
@@ -62762,7 +48241,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_client_packets" lineno="84260">
+<interface name="corenet_send_syncthing_client_packets" lineno="64538">
<summary>
Send syncthing_client packets.
</summary>
@@ -62773,7 +48252,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="84279">
+<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="64557">
<summary>
Do not audit attempts to send syncthing_client packets.
</summary>
@@ -62784,7 +48263,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_client_packets" lineno="84298">
+<interface name="corenet_receive_syncthing_client_packets" lineno="64576">
<summary>
Receive syncthing_client packets.
</summary>
@@ -62795,7 +48274,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="84317">
+<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="64595">
<summary>
Do not audit attempts to receive syncthing_client packets.
</summary>
@@ -62806,7 +48285,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_client_packets" lineno="84336">
+<interface name="corenet_sendrecv_syncthing_client_packets" lineno="64614">
<summary>
Send and receive syncthing_client packets.
</summary>
@@ -62817,7 +48296,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="84352">
+<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="64630">
<summary>
Do not audit attempts to send and receive syncthing_client packets.
</summary>
@@ -62828,7 +48307,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_client_packets" lineno="84367">
+<interface name="corenet_relabelto_syncthing_client_packets" lineno="64645">
<summary>
Relabel packets to syncthing_client the packet type.
</summary>
@@ -62838,7 +48317,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_server_packets" lineno="84387">
+<interface name="corenet_send_syncthing_server_packets" lineno="64665">
<summary>
Send syncthing_server packets.
</summary>
@@ -62849,7 +48328,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="84406">
+<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="64684">
<summary>
Do not audit attempts to send syncthing_server packets.
</summary>
@@ -62860,7 +48339,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_server_packets" lineno="84425">
+<interface name="corenet_receive_syncthing_server_packets" lineno="64703">
<summary>
Receive syncthing_server packets.
</summary>
@@ -62871,7 +48350,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84444">
+<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="64722">
<summary>
Do not audit attempts to receive syncthing_server packets.
</summary>
@@ -62882,7 +48361,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84463">
+<interface name="corenet_sendrecv_syncthing_server_packets" lineno="64741">
<summary>
Send and receive syncthing_server packets.
</summary>
@@ -62893,7 +48372,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84479">
+<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="64757">
<summary>
Do not audit attempts to send and receive syncthing_server packets.
</summary>
@@ -62904,7 +48383,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_server_packets" lineno="84494">
+<interface name="corenet_relabelto_syncthing_server_packets" lineno="64772">
<summary>
Relabel packets to syncthing_server the packet type.
</summary>
@@ -62914,85 +48393,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84516">
-<summary>
-Send and receive TCP traffic on the syncthing_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_syncthing_admin_port" lineno="84531">
-<summary>
-Send UDP traffic on the syncthing_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84546">
-<summary>
-Do not audit attempts to send UDP traffic on the syncthing_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84561">
-<summary>
-Receive UDP traffic on the syncthing_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84576">
-<summary>
-Do not audit attempts to receive UDP traffic on the syncthing_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84591">
-<summary>
-Send and receive UDP traffic on the syncthing_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84607">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the syncthing_admin port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84622">
+<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="64794">
<summary>
Bind TCP sockets to the syncthing_admin port.
</summary>
@@ -63003,7 +48404,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84642">
+<interface name="corenet_udp_bind_syncthing_admin_port" lineno="64814">
<summary>
Bind UDP sockets to the syncthing_admin port.
</summary>
@@ -63014,7 +48415,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84661">
+<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="64833">
<summary>
Make a TCP connection to the syncthing_admin port.
</summary>
@@ -63024,7 +48425,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_admin_client_packets" lineno="84681">
+<interface name="corenet_send_syncthing_admin_client_packets" lineno="64853">
<summary>
Send syncthing_admin_client packets.
</summary>
@@ -63035,7 +48436,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84700">
+<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="64872">
<summary>
Do not audit attempts to send syncthing_admin_client packets.
</summary>
@@ -63046,7 +48447,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84719">
+<interface name="corenet_receive_syncthing_admin_client_packets" lineno="64891">
<summary>
Receive syncthing_admin_client packets.
</summary>
@@ -63057,7 +48458,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84738">
+<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="64910">
<summary>
Do not audit attempts to receive syncthing_admin_client packets.
</summary>
@@ -63068,7 +48469,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84757">
+<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="64929">
<summary>
Send and receive syncthing_admin_client packets.
</summary>
@@ -63079,7 +48480,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84773">
+<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="64945">
<summary>
Do not audit attempts to send and receive syncthing_admin_client packets.
</summary>
@@ -63090,7 +48491,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84788">
+<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="64960">
<summary>
Relabel packets to syncthing_admin_client the packet type.
</summary>
@@ -63100,7 +48501,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_admin_server_packets" lineno="84808">
+<interface name="corenet_send_syncthing_admin_server_packets" lineno="64980">
<summary>
Send syncthing_admin_server packets.
</summary>
@@ -63111,7 +48512,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84827">
+<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="64999">
<summary>
Do not audit attempts to send syncthing_admin_server packets.
</summary>
@@ -63122,7 +48523,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84846">
+<interface name="corenet_receive_syncthing_admin_server_packets" lineno="65018">
<summary>
Receive syncthing_admin_server packets.
</summary>
@@ -63133,7 +48534,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84865">
+<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="65037">
<summary>
Do not audit attempts to receive syncthing_admin_server packets.
</summary>
@@ -63144,7 +48545,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84884">
+<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="65056">
<summary>
Send and receive syncthing_admin_server packets.
</summary>
@@ -63155,7 +48556,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84900">
+<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="65072">
<summary>
Do not audit attempts to send and receive syncthing_admin_server packets.
</summary>
@@ -63166,7 +48567,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84915">
+<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="65087">
<summary>
Relabel packets to syncthing_admin_server the packet type.
</summary>
@@ -63176,85 +48577,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84937">
-<summary>
-Send and receive TCP traffic on the syncthing_discovery port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84952">
-<summary>
-Send UDP traffic on the syncthing_discovery port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84967">
-<summary>
-Do not audit attempts to send UDP traffic on the syncthing_discovery port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84982">
-<summary>
-Receive UDP traffic on the syncthing_discovery port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84997">
-<summary>
-Do not audit attempts to receive UDP traffic on the syncthing_discovery port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="85012">
-<summary>
-Send and receive UDP traffic on the syncthing_discovery port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="85028">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the syncthing_discovery port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="85043">
+<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="65109">
<summary>
Bind TCP sockets to the syncthing_discovery port.
</summary>
@@ -63265,7 +48588,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="85063">
+<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="65129">
<summary>
Bind UDP sockets to the syncthing_discovery port.
</summary>
@@ -63276,7 +48599,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="85082">
+<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="65148">
<summary>
Make a TCP connection to the syncthing_discovery port.
</summary>
@@ -63286,7 +48609,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_discovery_client_packets" lineno="85102">
+<interface name="corenet_send_syncthing_discovery_client_packets" lineno="65168">
<summary>
Send syncthing_discovery_client packets.
</summary>
@@ -63297,7 +48620,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="85121">
+<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="65187">
<summary>
Do not audit attempts to send syncthing_discovery_client packets.
</summary>
@@ -63308,7 +48631,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="85140">
+<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="65206">
<summary>
Receive syncthing_discovery_client packets.
</summary>
@@ -63319,7 +48642,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="85159">
+<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="65225">
<summary>
Do not audit attempts to receive syncthing_discovery_client packets.
</summary>
@@ -63330,7 +48653,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="85178">
+<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="65244">
<summary>
Send and receive syncthing_discovery_client packets.
</summary>
@@ -63341,7 +48664,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="85194">
+<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="65260">
<summary>
Do not audit attempts to send and receive syncthing_discovery_client packets.
</summary>
@@ -63352,7 +48675,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="85209">
+<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="65275">
<summary>
Relabel packets to syncthing_discovery_client the packet type.
</summary>
@@ -63362,7 +48685,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_discovery_server_packets" lineno="85229">
+<interface name="corenet_send_syncthing_discovery_server_packets" lineno="65295">
<summary>
Send syncthing_discovery_server packets.
</summary>
@@ -63373,7 +48696,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="85248">
+<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="65314">
<summary>
Do not audit attempts to send syncthing_discovery_server packets.
</summary>
@@ -63384,7 +48707,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="85267">
+<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="65333">
<summary>
Receive syncthing_discovery_server packets.
</summary>
@@ -63395,7 +48718,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="85286">
+<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="65352">
<summary>
Do not audit attempts to receive syncthing_discovery_server packets.
</summary>
@@ -63406,7 +48729,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="85305">
+<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="65371">
<summary>
Send and receive syncthing_discovery_server packets.
</summary>
@@ -63417,7 +48740,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="85321">
+<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="65387">
<summary>
Do not audit attempts to send and receive syncthing_discovery_server packets.
</summary>
@@ -63428,7 +48751,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="85336">
+<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="65402">
<summary>
Relabel packets to syncthing_discovery_server the packet type.
</summary>
@@ -63438,85 +48761,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="85358">
-<summary>
-Send and receive TCP traffic on the sype_transport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_sype_transport_port" lineno="85373">
-<summary>
-Send UDP traffic on the sype_transport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="85388">
-<summary>
-Do not audit attempts to send UDP traffic on the sype_transport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_sype_transport_port" lineno="85403">
-<summary>
-Receive UDP traffic on the sype_transport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="85418">
-<summary>
-Do not audit attempts to receive UDP traffic on the sype_transport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="85433">
-<summary>
-Send and receive UDP traffic on the sype_transport port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85449">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the sype_transport port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_sype_transport_port" lineno="85464">
+<interface name="corenet_tcp_bind_sype_transport_port" lineno="65424">
<summary>
Bind TCP sockets to the sype_transport port.
</summary>
@@ -63527,7 +48772,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sype_transport_port" lineno="85484">
+<interface name="corenet_udp_bind_sype_transport_port" lineno="65444">
<summary>
Bind UDP sockets to the sype_transport port.
</summary>
@@ -63538,7 +48783,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sype_transport_port" lineno="85503">
+<interface name="corenet_tcp_connect_sype_transport_port" lineno="65463">
<summary>
Make a TCP connection to the sype_transport port.
</summary>
@@ -63548,7 +48793,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sype_transport_client_packets" lineno="85523">
+<interface name="corenet_send_sype_transport_client_packets" lineno="65483">
<summary>
Send sype_transport_client packets.
</summary>
@@ -63559,7 +48804,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85542">
+<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="65502">
<summary>
Do not audit attempts to send sype_transport_client packets.
</summary>
@@ -63570,7 +48815,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sype_transport_client_packets" lineno="85561">
+<interface name="corenet_receive_sype_transport_client_packets" lineno="65521">
<summary>
Receive sype_transport_client packets.
</summary>
@@ -63581,7 +48826,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85580">
+<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="65540">
<summary>
Do not audit attempts to receive sype_transport_client packets.
</summary>
@@ -63592,7 +48837,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85599">
+<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="65559">
<summary>
Send and receive sype_transport_client packets.
</summary>
@@ -63603,7 +48848,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85615">
+<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="65575">
<summary>
Do not audit attempts to send and receive sype_transport_client packets.
</summary>
@@ -63614,7 +48859,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85630">
+<interface name="corenet_relabelto_sype_transport_client_packets" lineno="65590">
<summary>
Relabel packets to sype_transport_client the packet type.
</summary>
@@ -63624,7 +48869,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sype_transport_server_packets" lineno="85650">
+<interface name="corenet_send_sype_transport_server_packets" lineno="65610">
<summary>
Send sype_transport_server packets.
</summary>
@@ -63635,7 +48880,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85669">
+<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="65629">
<summary>
Do not audit attempts to send sype_transport_server packets.
</summary>
@@ -63646,7 +48891,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sype_transport_server_packets" lineno="85688">
+<interface name="corenet_receive_sype_transport_server_packets" lineno="65648">
<summary>
Receive sype_transport_server packets.
</summary>
@@ -63657,7 +48902,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85707">
+<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="65667">
<summary>
Do not audit attempts to receive sype_transport_server packets.
</summary>
@@ -63668,7 +48913,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85726">
+<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="65686">
<summary>
Send and receive sype_transport_server packets.
</summary>
@@ -63679,7 +48924,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85742">
+<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="65702">
<summary>
Do not audit attempts to send and receive sype_transport_server packets.
</summary>
@@ -63690,7 +48935,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85757">
+<interface name="corenet_relabelto_sype_transport_server_packets" lineno="65717">
<summary>
Relabel packets to sype_transport_server the packet type.
</summary>
@@ -63700,85 +48945,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85779">
-<summary>
-Send and receive TCP traffic on the syslogd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_syslogd_port" lineno="85794">
-<summary>
-Send UDP traffic on the syslogd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85809">
-<summary>
-Do not audit attempts to send UDP traffic on the syslogd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_syslogd_port" lineno="85824">
-<summary>
-Receive UDP traffic on the syslogd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85839">
-<summary>
-Do not audit attempts to receive UDP traffic on the syslogd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85854">
-<summary>
-Send and receive UDP traffic on the syslogd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85870">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the syslogd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_syslogd_port" lineno="85885">
+<interface name="corenet_tcp_bind_syslogd_port" lineno="65739">
<summary>
Bind TCP sockets to the syslogd port.
</summary>
@@ -63789,7 +48956,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syslogd_port" lineno="85905">
+<interface name="corenet_udp_bind_syslogd_port" lineno="65759">
<summary>
Bind UDP sockets to the syslogd port.
</summary>
@@ -63800,7 +48967,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syslogd_port" lineno="85924">
+<interface name="corenet_tcp_connect_syslogd_port" lineno="65778">
<summary>
Make a TCP connection to the syslogd port.
</summary>
@@ -63810,7 +48977,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslogd_client_packets" lineno="85944">
+<interface name="corenet_send_syslogd_client_packets" lineno="65798">
<summary>
Send syslogd_client packets.
</summary>
@@ -63821,7 +48988,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85963">
+<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="65817">
<summary>
Do not audit attempts to send syslogd_client packets.
</summary>
@@ -63832,7 +48999,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslogd_client_packets" lineno="85982">
+<interface name="corenet_receive_syslogd_client_packets" lineno="65836">
<summary>
Receive syslogd_client packets.
</summary>
@@ -63843,7 +49010,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="86001">
+<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="65855">
<summary>
Do not audit attempts to receive syslogd_client packets.
</summary>
@@ -63854,7 +49021,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslogd_client_packets" lineno="86020">
+<interface name="corenet_sendrecv_syslogd_client_packets" lineno="65874">
<summary>
Send and receive syslogd_client packets.
</summary>
@@ -63865,7 +49032,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="86036">
+<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="65890">
<summary>
Do not audit attempts to send and receive syslogd_client packets.
</summary>
@@ -63876,7 +49043,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslogd_client_packets" lineno="86051">
+<interface name="corenet_relabelto_syslogd_client_packets" lineno="65905">
<summary>
Relabel packets to syslogd_client the packet type.
</summary>
@@ -63886,7 +49053,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslogd_server_packets" lineno="86071">
+<interface name="corenet_send_syslogd_server_packets" lineno="65925">
<summary>
Send syslogd_server packets.
</summary>
@@ -63897,7 +49064,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="86090">
+<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="65944">
<summary>
Do not audit attempts to send syslogd_server packets.
</summary>
@@ -63908,7 +49075,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslogd_server_packets" lineno="86109">
+<interface name="corenet_receive_syslogd_server_packets" lineno="65963">
<summary>
Receive syslogd_server packets.
</summary>
@@ -63919,7 +49086,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="86128">
+<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="65982">
<summary>
Do not audit attempts to receive syslogd_server packets.
</summary>
@@ -63930,7 +49097,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslogd_server_packets" lineno="86147">
+<interface name="corenet_sendrecv_syslogd_server_packets" lineno="66001">
<summary>
Send and receive syslogd_server packets.
</summary>
@@ -63941,7 +49108,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="86163">
+<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="66017">
<summary>
Do not audit attempts to send and receive syslogd_server packets.
</summary>
@@ -63952,7 +49119,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslogd_server_packets" lineno="86178">
+<interface name="corenet_relabelto_syslogd_server_packets" lineno="66032">
<summary>
Relabel packets to syslogd_server the packet type.
</summary>
@@ -63962,85 +49129,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="86200">
-<summary>
-Send and receive TCP traffic on the syslog_tls port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_syslog_tls_port" lineno="86215">
-<summary>
-Send UDP traffic on the syslog_tls port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="86230">
-<summary>
-Do not audit attempts to send UDP traffic on the syslog_tls port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_syslog_tls_port" lineno="86245">
-<summary>
-Receive UDP traffic on the syslog_tls port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="86260">
-<summary>
-Do not audit attempts to receive UDP traffic on the syslog_tls port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="86275">
-<summary>
-Send and receive UDP traffic on the syslog_tls port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="86291">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the syslog_tls port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_syslog_tls_port" lineno="86306">
+<interface name="corenet_tcp_bind_syslog_tls_port" lineno="66054">
<summary>
Bind TCP sockets to the syslog_tls port.
</summary>
@@ -64051,7 +49140,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syslog_tls_port" lineno="86326">
+<interface name="corenet_udp_bind_syslog_tls_port" lineno="66074">
<summary>
Bind UDP sockets to the syslog_tls port.
</summary>
@@ -64062,7 +49151,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syslog_tls_port" lineno="86345">
+<interface name="corenet_tcp_connect_syslog_tls_port" lineno="66093">
<summary>
Make a TCP connection to the syslog_tls port.
</summary>
@@ -64072,7 +49161,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslog_tls_client_packets" lineno="86365">
+<interface name="corenet_send_syslog_tls_client_packets" lineno="66113">
<summary>
Send syslog_tls_client packets.
</summary>
@@ -64083,7 +49172,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="86384">
+<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="66132">
<summary>
Do not audit attempts to send syslog_tls_client packets.
</summary>
@@ -64094,7 +49183,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslog_tls_client_packets" lineno="86403">
+<interface name="corenet_receive_syslog_tls_client_packets" lineno="66151">
<summary>
Receive syslog_tls_client packets.
</summary>
@@ -64105,7 +49194,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="86422">
+<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="66170">
<summary>
Do not audit attempts to receive syslog_tls_client packets.
</summary>
@@ -64116,7 +49205,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86441">
+<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="66189">
<summary>
Send and receive syslog_tls_client packets.
</summary>
@@ -64127,7 +49216,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86457">
+<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="66205">
<summary>
Do not audit attempts to send and receive syslog_tls_client packets.
</summary>
@@ -64138,7 +49227,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86472">
+<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="66220">
<summary>
Relabel packets to syslog_tls_client the packet type.
</summary>
@@ -64148,7 +49237,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslog_tls_server_packets" lineno="86492">
+<interface name="corenet_send_syslog_tls_server_packets" lineno="66240">
<summary>
Send syslog_tls_server packets.
</summary>
@@ -64159,7 +49248,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86511">
+<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="66259">
<summary>
Do not audit attempts to send syslog_tls_server packets.
</summary>
@@ -64170,7 +49259,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslog_tls_server_packets" lineno="86530">
+<interface name="corenet_receive_syslog_tls_server_packets" lineno="66278">
<summary>
Receive syslog_tls_server packets.
</summary>
@@ -64181,7 +49270,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86549">
+<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="66297">
<summary>
Do not audit attempts to receive syslog_tls_server packets.
</summary>
@@ -64192,7 +49281,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86568">
+<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="66316">
<summary>
Send and receive syslog_tls_server packets.
</summary>
@@ -64203,7 +49292,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86584">
+<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="66332">
<summary>
Do not audit attempts to send and receive syslog_tls_server packets.
</summary>
@@ -64214,7 +49303,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86599">
+<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="66347">
<summary>
Relabel packets to syslog_tls_server the packet type.
</summary>
@@ -64224,85 +49313,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86621">
-<summary>
-Send and receive TCP traffic on the tcs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_tcs_port" lineno="86636">
-<summary>
-Send UDP traffic on the tcs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86651">
-<summary>
-Do not audit attempts to send UDP traffic on the tcs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_tcs_port" lineno="86666">
-<summary>
-Receive UDP traffic on the tcs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86681">
-<summary>
-Do not audit attempts to receive UDP traffic on the tcs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_tcs_port" lineno="86696">
-<summary>
-Send and receive UDP traffic on the tcs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86712">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the tcs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_tcs_port" lineno="86727">
+<interface name="corenet_tcp_bind_tcs_port" lineno="66369">
<summary>
Bind TCP sockets to the tcs port.
</summary>
@@ -64313,7 +49324,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_tcs_port" lineno="86747">
+<interface name="corenet_udp_bind_tcs_port" lineno="66389">
<summary>
Bind UDP sockets to the tcs port.
</summary>
@@ -64324,7 +49335,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_tcs_port" lineno="86766">
+<interface name="corenet_tcp_connect_tcs_port" lineno="66408">
<summary>
Make a TCP connection to the tcs port.
</summary>
@@ -64334,7 +49345,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tcs_client_packets" lineno="86786">
+<interface name="corenet_send_tcs_client_packets" lineno="66428">
<summary>
Send tcs_client packets.
</summary>
@@ -64345,7 +49356,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86805">
+<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="66447">
<summary>
Do not audit attempts to send tcs_client packets.
</summary>
@@ -64356,7 +49367,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tcs_client_packets" lineno="86824">
+<interface name="corenet_receive_tcs_client_packets" lineno="66466">
<summary>
Receive tcs_client packets.
</summary>
@@ -64367,7 +49378,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86843">
+<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="66485">
<summary>
Do not audit attempts to receive tcs_client packets.
</summary>
@@ -64378,7 +49389,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tcs_client_packets" lineno="86862">
+<interface name="corenet_sendrecv_tcs_client_packets" lineno="66504">
<summary>
Send and receive tcs_client packets.
</summary>
@@ -64389,7 +49400,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86878">
+<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="66520">
<summary>
Do not audit attempts to send and receive tcs_client packets.
</summary>
@@ -64400,7 +49411,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tcs_client_packets" lineno="86893">
+<interface name="corenet_relabelto_tcs_client_packets" lineno="66535">
<summary>
Relabel packets to tcs_client the packet type.
</summary>
@@ -64410,7 +49421,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tcs_server_packets" lineno="86913">
+<interface name="corenet_send_tcs_server_packets" lineno="66555">
<summary>
Send tcs_server packets.
</summary>
@@ -64421,7 +49432,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86932">
+<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="66574">
<summary>
Do not audit attempts to send tcs_server packets.
</summary>
@@ -64432,7 +49443,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tcs_server_packets" lineno="86951">
+<interface name="corenet_receive_tcs_server_packets" lineno="66593">
<summary>
Receive tcs_server packets.
</summary>
@@ -64443,7 +49454,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86970">
+<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="66612">
<summary>
Do not audit attempts to receive tcs_server packets.
</summary>
@@ -64454,7 +49465,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tcs_server_packets" lineno="86989">
+<interface name="corenet_sendrecv_tcs_server_packets" lineno="66631">
<summary>
Send and receive tcs_server packets.
</summary>
@@ -64465,7 +49476,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="87005">
+<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="66647">
<summary>
Do not audit attempts to send and receive tcs_server packets.
</summary>
@@ -64476,7 +49487,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tcs_server_packets" lineno="87020">
+<interface name="corenet_relabelto_tcs_server_packets" lineno="66662">
<summary>
Relabel packets to tcs_server the packet type.
</summary>
@@ -64486,85 +49497,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="87042">
-<summary>
-Send and receive TCP traffic on the telnetd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_telnetd_port" lineno="87057">
-<summary>
-Send UDP traffic on the telnetd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="87072">
-<summary>
-Do not audit attempts to send UDP traffic on the telnetd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_telnetd_port" lineno="87087">
-<summary>
-Receive UDP traffic on the telnetd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="87102">
-<summary>
-Do not audit attempts to receive UDP traffic on the telnetd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_telnetd_port" lineno="87117">
-<summary>
-Send and receive UDP traffic on the telnetd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="87133">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the telnetd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_telnetd_port" lineno="87148">
+<interface name="corenet_tcp_bind_telnetd_port" lineno="66684">
<summary>
Bind TCP sockets to the telnetd port.
</summary>
@@ -64575,7 +49508,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_telnetd_port" lineno="87168">
+<interface name="corenet_udp_bind_telnetd_port" lineno="66704">
<summary>
Bind UDP sockets to the telnetd port.
</summary>
@@ -64586,7 +49519,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_telnetd_port" lineno="87187">
+<interface name="corenet_tcp_connect_telnetd_port" lineno="66723">
<summary>
Make a TCP connection to the telnetd port.
</summary>
@@ -64596,7 +49529,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_telnetd_client_packets" lineno="87207">
+<interface name="corenet_send_telnetd_client_packets" lineno="66743">
<summary>
Send telnetd_client packets.
</summary>
@@ -64607,7 +49540,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="87226">
+<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="66762">
<summary>
Do not audit attempts to send telnetd_client packets.
</summary>
@@ -64618,7 +49551,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_telnetd_client_packets" lineno="87245">
+<interface name="corenet_receive_telnetd_client_packets" lineno="66781">
<summary>
Receive telnetd_client packets.
</summary>
@@ -64629,7 +49562,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="87264">
+<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="66800">
<summary>
Do not audit attempts to receive telnetd_client packets.
</summary>
@@ -64640,7 +49573,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_telnetd_client_packets" lineno="87283">
+<interface name="corenet_sendrecv_telnetd_client_packets" lineno="66819">
<summary>
Send and receive telnetd_client packets.
</summary>
@@ -64651,7 +49584,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="87299">
+<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="66835">
<summary>
Do not audit attempts to send and receive telnetd_client packets.
</summary>
@@ -64662,7 +49595,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_telnetd_client_packets" lineno="87314">
+<interface name="corenet_relabelto_telnetd_client_packets" lineno="66850">
<summary>
Relabel packets to telnetd_client the packet type.
</summary>
@@ -64672,7 +49605,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_telnetd_server_packets" lineno="87334">
+<interface name="corenet_send_telnetd_server_packets" lineno="66870">
<summary>
Send telnetd_server packets.
</summary>
@@ -64683,7 +49616,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="87353">
+<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="66889">
<summary>
Do not audit attempts to send telnetd_server packets.
</summary>
@@ -64694,7 +49627,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_telnetd_server_packets" lineno="87372">
+<interface name="corenet_receive_telnetd_server_packets" lineno="66908">
<summary>
Receive telnetd_server packets.
</summary>
@@ -64705,7 +49638,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="87391">
+<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="66927">
<summary>
Do not audit attempts to receive telnetd_server packets.
</summary>
@@ -64716,7 +49649,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_telnetd_server_packets" lineno="87410">
+<interface name="corenet_sendrecv_telnetd_server_packets" lineno="66946">
<summary>
Send and receive telnetd_server packets.
</summary>
@@ -64727,7 +49660,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="87426">
+<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="66962">
<summary>
Do not audit attempts to send and receive telnetd_server packets.
</summary>
@@ -64738,7 +49671,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_telnetd_server_packets" lineno="87441">
+<interface name="corenet_relabelto_telnetd_server_packets" lineno="66977">
<summary>
Relabel packets to telnetd_server the packet type.
</summary>
@@ -64748,85 +49681,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87463">
-<summary>
-Send and receive TCP traffic on the tftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_tftp_port" lineno="87478">
-<summary>
-Send UDP traffic on the tftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87493">
-<summary>
-Do not audit attempts to send UDP traffic on the tftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_tftp_port" lineno="87508">
-<summary>
-Receive UDP traffic on the tftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87523">
-<summary>
-Do not audit attempts to receive UDP traffic on the tftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_tftp_port" lineno="87538">
-<summary>
-Send and receive UDP traffic on the tftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87554">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the tftp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_tftp_port" lineno="87569">
+<interface name="corenet_tcp_bind_tftp_port" lineno="66999">
<summary>
Bind TCP sockets to the tftp port.
</summary>
@@ -64837,7 +49692,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_tftp_port" lineno="87589">
+<interface name="corenet_udp_bind_tftp_port" lineno="67019">
<summary>
Bind UDP sockets to the tftp port.
</summary>
@@ -64848,7 +49703,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_tftp_port" lineno="87608">
+<interface name="corenet_tcp_connect_tftp_port" lineno="67038">
<summary>
Make a TCP connection to the tftp port.
</summary>
@@ -64858,7 +49713,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tftp_client_packets" lineno="87628">
+<interface name="corenet_send_tftp_client_packets" lineno="67058">
<summary>
Send tftp_client packets.
</summary>
@@ -64869,7 +49724,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87647">
+<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="67077">
<summary>
Do not audit attempts to send tftp_client packets.
</summary>
@@ -64880,7 +49735,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tftp_client_packets" lineno="87666">
+<interface name="corenet_receive_tftp_client_packets" lineno="67096">
<summary>
Receive tftp_client packets.
</summary>
@@ -64891,7 +49746,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87685">
+<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="67115">
<summary>
Do not audit attempts to receive tftp_client packets.
</summary>
@@ -64902,7 +49757,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tftp_client_packets" lineno="87704">
+<interface name="corenet_sendrecv_tftp_client_packets" lineno="67134">
<summary>
Send and receive tftp_client packets.
</summary>
@@ -64913,7 +49768,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87720">
+<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="67150">
<summary>
Do not audit attempts to send and receive tftp_client packets.
</summary>
@@ -64924,7 +49779,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tftp_client_packets" lineno="87735">
+<interface name="corenet_relabelto_tftp_client_packets" lineno="67165">
<summary>
Relabel packets to tftp_client the packet type.
</summary>
@@ -64934,7 +49789,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tftp_server_packets" lineno="87755">
+<interface name="corenet_send_tftp_server_packets" lineno="67185">
<summary>
Send tftp_server packets.
</summary>
@@ -64945,7 +49800,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87774">
+<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="67204">
<summary>
Do not audit attempts to send tftp_server packets.
</summary>
@@ -64956,7 +49811,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tftp_server_packets" lineno="87793">
+<interface name="corenet_receive_tftp_server_packets" lineno="67223">
<summary>
Receive tftp_server packets.
</summary>
@@ -64967,7 +49822,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87812">
+<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="67242">
<summary>
Do not audit attempts to receive tftp_server packets.
</summary>
@@ -64978,7 +49833,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tftp_server_packets" lineno="87831">
+<interface name="corenet_sendrecv_tftp_server_packets" lineno="67261">
<summary>
Send and receive tftp_server packets.
</summary>
@@ -64989,7 +49844,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87847">
+<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="67277">
<summary>
Do not audit attempts to send and receive tftp_server packets.
</summary>
@@ -65000,7 +49855,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tftp_server_packets" lineno="87862">
+<interface name="corenet_relabelto_tftp_server_packets" lineno="67292">
<summary>
Relabel packets to tftp_server the packet type.
</summary>
@@ -65010,85 +49865,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_tor_port" lineno="87884">
-<summary>
-Send and receive TCP traffic on the tor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_tor_port" lineno="87899">
-<summary>
-Send UDP traffic on the tor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87914">
-<summary>
-Do not audit attempts to send UDP traffic on the tor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_tor_port" lineno="87929">
-<summary>
-Receive UDP traffic on the tor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87944">
-<summary>
-Do not audit attempts to receive UDP traffic on the tor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_tor_port" lineno="87959">
-<summary>
-Send and receive UDP traffic on the tor port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87975">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the tor port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_tor_port" lineno="87990">
+<interface name="corenet_tcp_bind_tor_port" lineno="67314">
<summary>
Bind TCP sockets to the tor port.
</summary>
@@ -65099,7 +49876,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_tor_port" lineno="88010">
+<interface name="corenet_udp_bind_tor_port" lineno="67334">
<summary>
Bind UDP sockets to the tor port.
</summary>
@@ -65110,7 +49887,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_tor_port" lineno="88029">
+<interface name="corenet_tcp_connect_tor_port" lineno="67353">
<summary>
Make a TCP connection to the tor port.
</summary>
@@ -65120,7 +49897,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tor_client_packets" lineno="88049">
+<interface name="corenet_send_tor_client_packets" lineno="67373">
<summary>
Send tor_client packets.
</summary>
@@ -65131,7 +49908,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tor_client_packets" lineno="88068">
+<interface name="corenet_dontaudit_send_tor_client_packets" lineno="67392">
<summary>
Do not audit attempts to send tor_client packets.
</summary>
@@ -65142,7 +49919,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tor_client_packets" lineno="88087">
+<interface name="corenet_receive_tor_client_packets" lineno="67411">
<summary>
Receive tor_client packets.
</summary>
@@ -65153,7 +49930,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="88106">
+<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="67430">
<summary>
Do not audit attempts to receive tor_client packets.
</summary>
@@ -65164,7 +49941,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tor_client_packets" lineno="88125">
+<interface name="corenet_sendrecv_tor_client_packets" lineno="67449">
<summary>
Send and receive tor_client packets.
</summary>
@@ -65175,7 +49952,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="88141">
+<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="67465">
<summary>
Do not audit attempts to send and receive tor_client packets.
</summary>
@@ -65186,7 +49963,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tor_client_packets" lineno="88156">
+<interface name="corenet_relabelto_tor_client_packets" lineno="67480">
<summary>
Relabel packets to tor_client the packet type.
</summary>
@@ -65196,7 +49973,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tor_server_packets" lineno="88176">
+<interface name="corenet_send_tor_server_packets" lineno="67500">
<summary>
Send tor_server packets.
</summary>
@@ -65207,7 +49984,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tor_server_packets" lineno="88195">
+<interface name="corenet_dontaudit_send_tor_server_packets" lineno="67519">
<summary>
Do not audit attempts to send tor_server packets.
</summary>
@@ -65218,7 +49995,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tor_server_packets" lineno="88214">
+<interface name="corenet_receive_tor_server_packets" lineno="67538">
<summary>
Receive tor_server packets.
</summary>
@@ -65229,7 +50006,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="88233">
+<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="67557">
<summary>
Do not audit attempts to receive tor_server packets.
</summary>
@@ -65240,7 +50017,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tor_server_packets" lineno="88252">
+<interface name="corenet_sendrecv_tor_server_packets" lineno="67576">
<summary>
Send and receive tor_server packets.
</summary>
@@ -65251,7 +50028,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="88268">
+<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="67592">
<summary>
Do not audit attempts to send and receive tor_server packets.
</summary>
@@ -65262,7 +50039,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tor_server_packets" lineno="88283">
+<interface name="corenet_relabelto_tor_server_packets" lineno="67607">
<summary>
Relabel packets to tor_server the packet type.
</summary>
@@ -65272,85 +50049,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="88305">
-<summary>
-Send and receive TCP traffic on the traceroute port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_traceroute_port" lineno="88320">
-<summary>
-Send UDP traffic on the traceroute port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="88335">
-<summary>
-Do not audit attempts to send UDP traffic on the traceroute port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_traceroute_port" lineno="88350">
-<summary>
-Receive UDP traffic on the traceroute port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="88365">
-<summary>
-Do not audit attempts to receive UDP traffic on the traceroute port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_traceroute_port" lineno="88380">
-<summary>
-Send and receive UDP traffic on the traceroute port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="88396">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the traceroute port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_traceroute_port" lineno="88411">
+<interface name="corenet_tcp_bind_traceroute_port" lineno="67629">
<summary>
Bind TCP sockets to the traceroute port.
</summary>
@@ -65361,7 +50060,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_traceroute_port" lineno="88431">
+<interface name="corenet_udp_bind_traceroute_port" lineno="67649">
<summary>
Bind UDP sockets to the traceroute port.
</summary>
@@ -65372,7 +50071,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_traceroute_port" lineno="88450">
+<interface name="corenet_tcp_connect_traceroute_port" lineno="67668">
<summary>
Make a TCP connection to the traceroute port.
</summary>
@@ -65382,7 +50081,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_traceroute_client_packets" lineno="88470">
+<interface name="corenet_send_traceroute_client_packets" lineno="67688">
<summary>
Send traceroute_client packets.
</summary>
@@ -65393,7 +50092,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88489">
+<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="67707">
<summary>
Do not audit attempts to send traceroute_client packets.
</summary>
@@ -65404,7 +50103,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_traceroute_client_packets" lineno="88508">
+<interface name="corenet_receive_traceroute_client_packets" lineno="67726">
<summary>
Receive traceroute_client packets.
</summary>
@@ -65415,7 +50114,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88527">
+<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="67745">
<summary>
Do not audit attempts to receive traceroute_client packets.
</summary>
@@ -65426,7 +50125,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88546">
+<interface name="corenet_sendrecv_traceroute_client_packets" lineno="67764">
<summary>
Send and receive traceroute_client packets.
</summary>
@@ -65437,7 +50136,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88562">
+<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="67780">
<summary>
Do not audit attempts to send and receive traceroute_client packets.
</summary>
@@ -65448,7 +50147,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_traceroute_client_packets" lineno="88577">
+<interface name="corenet_relabelto_traceroute_client_packets" lineno="67795">
<summary>
Relabel packets to traceroute_client the packet type.
</summary>
@@ -65458,7 +50157,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_traceroute_server_packets" lineno="88597">
+<interface name="corenet_send_traceroute_server_packets" lineno="67815">
<summary>
Send traceroute_server packets.
</summary>
@@ -65469,7 +50168,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88616">
+<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="67834">
<summary>
Do not audit attempts to send traceroute_server packets.
</summary>
@@ -65480,7 +50179,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_traceroute_server_packets" lineno="88635">
+<interface name="corenet_receive_traceroute_server_packets" lineno="67853">
<summary>
Receive traceroute_server packets.
</summary>
@@ -65491,7 +50190,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88654">
+<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="67872">
<summary>
Do not audit attempts to receive traceroute_server packets.
</summary>
@@ -65502,7 +50201,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88673">
+<interface name="corenet_sendrecv_traceroute_server_packets" lineno="67891">
<summary>
Send and receive traceroute_server packets.
</summary>
@@ -65513,7 +50212,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88689">
+<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="67907">
<summary>
Do not audit attempts to send and receive traceroute_server packets.
</summary>
@@ -65524,7 +50223,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_traceroute_server_packets" lineno="88704">
+<interface name="corenet_relabelto_traceroute_server_packets" lineno="67922">
<summary>
Relabel packets to traceroute_server the packet type.
</summary>
@@ -65534,85 +50233,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88726">
-<summary>
-Send and receive TCP traffic on the transproxy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_transproxy_port" lineno="88741">
-<summary>
-Send UDP traffic on the transproxy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88756">
-<summary>
-Do not audit attempts to send UDP traffic on the transproxy port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_transproxy_port" lineno="88771">
-<summary>
-Receive UDP traffic on the transproxy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88786">
-<summary>
-Do not audit attempts to receive UDP traffic on the transproxy port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88801">
-<summary>
-Send and receive UDP traffic on the transproxy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88817">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the transproxy port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_transproxy_port" lineno="88832">
+<interface name="corenet_tcp_bind_transproxy_port" lineno="67944">
<summary>
Bind TCP sockets to the transproxy port.
</summary>
@@ -65623,7 +50244,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_transproxy_port" lineno="88852">
+<interface name="corenet_udp_bind_transproxy_port" lineno="67964">
<summary>
Bind UDP sockets to the transproxy port.
</summary>
@@ -65634,7 +50255,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_transproxy_port" lineno="88871">
+<interface name="corenet_tcp_connect_transproxy_port" lineno="67983">
<summary>
Make a TCP connection to the transproxy port.
</summary>
@@ -65644,7 +50265,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_transproxy_client_packets" lineno="88891">
+<interface name="corenet_send_transproxy_client_packets" lineno="68003">
<summary>
Send transproxy_client packets.
</summary>
@@ -65655,7 +50276,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88910">
+<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="68022">
<summary>
Do not audit attempts to send transproxy_client packets.
</summary>
@@ -65666,7 +50287,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_transproxy_client_packets" lineno="88929">
+<interface name="corenet_receive_transproxy_client_packets" lineno="68041">
<summary>
Receive transproxy_client packets.
</summary>
@@ -65677,7 +50298,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88948">
+<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="68060">
<summary>
Do not audit attempts to receive transproxy_client packets.
</summary>
@@ -65688,7 +50309,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88967">
+<interface name="corenet_sendrecv_transproxy_client_packets" lineno="68079">
<summary>
Send and receive transproxy_client packets.
</summary>
@@ -65699,7 +50320,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88983">
+<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="68095">
<summary>
Do not audit attempts to send and receive transproxy_client packets.
</summary>
@@ -65710,7 +50331,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_transproxy_client_packets" lineno="88998">
+<interface name="corenet_relabelto_transproxy_client_packets" lineno="68110">
<summary>
Relabel packets to transproxy_client the packet type.
</summary>
@@ -65720,7 +50341,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_transproxy_server_packets" lineno="89018">
+<interface name="corenet_send_transproxy_server_packets" lineno="68130">
<summary>
Send transproxy_server packets.
</summary>
@@ -65731,7 +50352,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="89037">
+<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="68149">
<summary>
Do not audit attempts to send transproxy_server packets.
</summary>
@@ -65742,7 +50363,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_transproxy_server_packets" lineno="89056">
+<interface name="corenet_receive_transproxy_server_packets" lineno="68168">
<summary>
Receive transproxy_server packets.
</summary>
@@ -65753,7 +50374,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="89075">
+<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="68187">
<summary>
Do not audit attempts to receive transproxy_server packets.
</summary>
@@ -65764,7 +50385,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_transproxy_server_packets" lineno="89094">
+<interface name="corenet_sendrecv_transproxy_server_packets" lineno="68206">
<summary>
Send and receive transproxy_server packets.
</summary>
@@ -65775,7 +50396,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="89110">
+<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="68222">
<summary>
Do not audit attempts to send and receive transproxy_server packets.
</summary>
@@ -65786,7 +50407,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_transproxy_server_packets" lineno="89125">
+<interface name="corenet_relabelto_transproxy_server_packets" lineno="68237">
<summary>
Relabel packets to transproxy_server the packet type.
</summary>
@@ -65796,85 +50417,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="89147">
-<summary>
-Send and receive TCP traffic on the trisoap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_trisoap_port" lineno="89162">
-<summary>
-Send UDP traffic on the trisoap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="89177">
-<summary>
-Do not audit attempts to send UDP traffic on the trisoap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_trisoap_port" lineno="89192">
-<summary>
-Receive UDP traffic on the trisoap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="89207">
-<summary>
-Do not audit attempts to receive UDP traffic on the trisoap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_trisoap_port" lineno="89222">
-<summary>
-Send and receive UDP traffic on the trisoap port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="89238">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the trisoap port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_trisoap_port" lineno="89253">
+<interface name="corenet_tcp_bind_trisoap_port" lineno="68259">
<summary>
Bind TCP sockets to the trisoap port.
</summary>
@@ -65885,7 +50428,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_trisoap_port" lineno="89273">
+<interface name="corenet_udp_bind_trisoap_port" lineno="68279">
<summary>
Bind UDP sockets to the trisoap port.
</summary>
@@ -65896,7 +50439,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_trisoap_port" lineno="89292">
+<interface name="corenet_tcp_connect_trisoap_port" lineno="68298">
<summary>
Make a TCP connection to the trisoap port.
</summary>
@@ -65906,7 +50449,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trisoap_client_packets" lineno="89312">
+<interface name="corenet_send_trisoap_client_packets" lineno="68318">
<summary>
Send trisoap_client packets.
</summary>
@@ -65917,7 +50460,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="89331">
+<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="68337">
<summary>
Do not audit attempts to send trisoap_client packets.
</summary>
@@ -65928,7 +50471,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trisoap_client_packets" lineno="89350">
+<interface name="corenet_receive_trisoap_client_packets" lineno="68356">
<summary>
Receive trisoap_client packets.
</summary>
@@ -65939,7 +50482,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="89369">
+<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="68375">
<summary>
Do not audit attempts to receive trisoap_client packets.
</summary>
@@ -65950,7 +50493,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trisoap_client_packets" lineno="89388">
+<interface name="corenet_sendrecv_trisoap_client_packets" lineno="68394">
<summary>
Send and receive trisoap_client packets.
</summary>
@@ -65961,7 +50504,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="89404">
+<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="68410">
<summary>
Do not audit attempts to send and receive trisoap_client packets.
</summary>
@@ -65972,7 +50515,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trisoap_client_packets" lineno="89419">
+<interface name="corenet_relabelto_trisoap_client_packets" lineno="68425">
<summary>
Relabel packets to trisoap_client the packet type.
</summary>
@@ -65982,7 +50525,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trisoap_server_packets" lineno="89439">
+<interface name="corenet_send_trisoap_server_packets" lineno="68445">
<summary>
Send trisoap_server packets.
</summary>
@@ -65993,7 +50536,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89458">
+<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="68464">
<summary>
Do not audit attempts to send trisoap_server packets.
</summary>
@@ -66004,7 +50547,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trisoap_server_packets" lineno="89477">
+<interface name="corenet_receive_trisoap_server_packets" lineno="68483">
<summary>
Receive trisoap_server packets.
</summary>
@@ -66015,7 +50558,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89496">
+<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="68502">
<summary>
Do not audit attempts to receive trisoap_server packets.
</summary>
@@ -66026,7 +50569,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89515">
+<interface name="corenet_sendrecv_trisoap_server_packets" lineno="68521">
<summary>
Send and receive trisoap_server packets.
</summary>
@@ -66037,7 +50580,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89531">
+<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="68537">
<summary>
Do not audit attempts to send and receive trisoap_server packets.
</summary>
@@ -66048,7 +50591,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trisoap_server_packets" lineno="89546">
+<interface name="corenet_relabelto_trisoap_server_packets" lineno="68552">
<summary>
Relabel packets to trisoap_server the packet type.
</summary>
@@ -66058,85 +50601,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89568">
-<summary>
-Send and receive TCP traffic on the trivnet1 port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_trivnet1_port" lineno="89583">
-<summary>
-Send UDP traffic on the trivnet1 port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89598">
-<summary>
-Do not audit attempts to send UDP traffic on the trivnet1 port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_trivnet1_port" lineno="89613">
-<summary>
-Receive UDP traffic on the trivnet1 port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89628">
-<summary>
-Do not audit attempts to receive UDP traffic on the trivnet1 port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89643">
-<summary>
-Send and receive UDP traffic on the trivnet1 port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89659">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the trivnet1 port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_trivnet1_port" lineno="89674">
+<interface name="corenet_tcp_bind_trivnet1_port" lineno="68574">
<summary>
Bind TCP sockets to the trivnet1 port.
</summary>
@@ -66147,7 +50612,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_trivnet1_port" lineno="89694">
+<interface name="corenet_udp_bind_trivnet1_port" lineno="68594">
<summary>
Bind UDP sockets to the trivnet1 port.
</summary>
@@ -66158,7 +50623,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_trivnet1_port" lineno="89713">
+<interface name="corenet_tcp_connect_trivnet1_port" lineno="68613">
<summary>
Make a TCP connection to the trivnet1 port.
</summary>
@@ -66168,7 +50633,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trivnet1_client_packets" lineno="89733">
+<interface name="corenet_send_trivnet1_client_packets" lineno="68633">
<summary>
Send trivnet1_client packets.
</summary>
@@ -66179,7 +50644,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89752">
+<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="68652">
<summary>
Do not audit attempts to send trivnet1_client packets.
</summary>
@@ -66190,7 +50655,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trivnet1_client_packets" lineno="89771">
+<interface name="corenet_receive_trivnet1_client_packets" lineno="68671">
<summary>
Receive trivnet1_client packets.
</summary>
@@ -66201,7 +50666,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89790">
+<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="68690">
<summary>
Do not audit attempts to receive trivnet1_client packets.
</summary>
@@ -66212,7 +50677,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89809">
+<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="68709">
<summary>
Send and receive trivnet1_client packets.
</summary>
@@ -66223,7 +50688,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89825">
+<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="68725">
<summary>
Do not audit attempts to send and receive trivnet1_client packets.
</summary>
@@ -66234,7 +50699,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89840">
+<interface name="corenet_relabelto_trivnet1_client_packets" lineno="68740">
<summary>
Relabel packets to trivnet1_client the packet type.
</summary>
@@ -66244,7 +50709,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trivnet1_server_packets" lineno="89860">
+<interface name="corenet_send_trivnet1_server_packets" lineno="68760">
<summary>
Send trivnet1_server packets.
</summary>
@@ -66255,7 +50720,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89879">
+<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="68779">
<summary>
Do not audit attempts to send trivnet1_server packets.
</summary>
@@ -66266,7 +50731,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trivnet1_server_packets" lineno="89898">
+<interface name="corenet_receive_trivnet1_server_packets" lineno="68798">
<summary>
Receive trivnet1_server packets.
</summary>
@@ -66277,7 +50742,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89917">
+<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="68817">
<summary>
Do not audit attempts to receive trivnet1_server packets.
</summary>
@@ -66288,7 +50753,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89936">
+<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="68836">
<summary>
Send and receive trivnet1_server packets.
</summary>
@@ -66299,7 +50764,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89952">
+<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="68852">
<summary>
Do not audit attempts to send and receive trivnet1_server packets.
</summary>
@@ -66310,7 +50775,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89967">
+<interface name="corenet_relabelto_trivnet1_server_packets" lineno="68867">
<summary>
Relabel packets to trivnet1_server the packet type.
</summary>
@@ -66320,85 +50785,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ups_port" lineno="89989">
-<summary>
-Send and receive TCP traffic on the ups port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_ups_port" lineno="90004">
-<summary>
-Send UDP traffic on the ups port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_ups_port" lineno="90019">
-<summary>
-Do not audit attempts to send UDP traffic on the ups port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_ups_port" lineno="90034">
-<summary>
-Receive UDP traffic on the ups port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="90049">
-<summary>
-Do not audit attempts to receive UDP traffic on the ups port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_ups_port" lineno="90064">
-<summary>
-Send and receive UDP traffic on the ups port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="90080">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the ups port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_ups_port" lineno="90095">
+<interface name="corenet_tcp_bind_ups_port" lineno="68889">
<summary>
Bind TCP sockets to the ups port.
</summary>
@@ -66409,7 +50796,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ups_port" lineno="90115">
+<interface name="corenet_udp_bind_ups_port" lineno="68909">
<summary>
Bind UDP sockets to the ups port.
</summary>
@@ -66420,7 +50807,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ups_port" lineno="90134">
+<interface name="corenet_tcp_connect_ups_port" lineno="68928">
<summary>
Make a TCP connection to the ups port.
</summary>
@@ -66430,7 +50817,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ups_client_packets" lineno="90154">
+<interface name="corenet_send_ups_client_packets" lineno="68948">
<summary>
Send ups_client packets.
</summary>
@@ -66441,7 +50828,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ups_client_packets" lineno="90173">
+<interface name="corenet_dontaudit_send_ups_client_packets" lineno="68967">
<summary>
Do not audit attempts to send ups_client packets.
</summary>
@@ -66452,7 +50839,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ups_client_packets" lineno="90192">
+<interface name="corenet_receive_ups_client_packets" lineno="68986">
<summary>
Receive ups_client packets.
</summary>
@@ -66463,7 +50850,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="90211">
+<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="69005">
<summary>
Do not audit attempts to receive ups_client packets.
</summary>
@@ -66474,7 +50861,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ups_client_packets" lineno="90230">
+<interface name="corenet_sendrecv_ups_client_packets" lineno="69024">
<summary>
Send and receive ups_client packets.
</summary>
@@ -66485,7 +50872,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="90246">
+<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="69040">
<summary>
Do not audit attempts to send and receive ups_client packets.
</summary>
@@ -66496,7 +50883,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ups_client_packets" lineno="90261">
+<interface name="corenet_relabelto_ups_client_packets" lineno="69055">
<summary>
Relabel packets to ups_client the packet type.
</summary>
@@ -66506,7 +50893,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ups_server_packets" lineno="90281">
+<interface name="corenet_send_ups_server_packets" lineno="69075">
<summary>
Send ups_server packets.
</summary>
@@ -66517,7 +50904,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ups_server_packets" lineno="90300">
+<interface name="corenet_dontaudit_send_ups_server_packets" lineno="69094">
<summary>
Do not audit attempts to send ups_server packets.
</summary>
@@ -66528,7 +50915,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ups_server_packets" lineno="90319">
+<interface name="corenet_receive_ups_server_packets" lineno="69113">
<summary>
Receive ups_server packets.
</summary>
@@ -66539,7 +50926,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="90338">
+<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="69132">
<summary>
Do not audit attempts to receive ups_server packets.
</summary>
@@ -66550,7 +50937,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ups_server_packets" lineno="90357">
+<interface name="corenet_sendrecv_ups_server_packets" lineno="69151">
<summary>
Send and receive ups_server packets.
</summary>
@@ -66561,7 +50948,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="90373">
+<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="69167">
<summary>
Do not audit attempts to send and receive ups_server packets.
</summary>
@@ -66572,7 +50959,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ups_server_packets" lineno="90388">
+<interface name="corenet_relabelto_ups_server_packets" lineno="69182">
<summary>
Relabel packets to ups_server the packet type.
</summary>
@@ -66582,85 +50969,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="90410">
-<summary>
-Send and receive TCP traffic on the utcpserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_utcpserver_port" lineno="90425">
-<summary>
-Send UDP traffic on the utcpserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90440">
-<summary>
-Do not audit attempts to send UDP traffic on the utcpserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_utcpserver_port" lineno="90455">
-<summary>
-Receive UDP traffic on the utcpserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90470">
-<summary>
-Do not audit attempts to receive UDP traffic on the utcpserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90485">
-<summary>
-Send and receive UDP traffic on the utcpserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90501">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the utcpserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_utcpserver_port" lineno="90516">
+<interface name="corenet_tcp_bind_utcpserver_port" lineno="69204">
<summary>
Bind TCP sockets to the utcpserver port.
</summary>
@@ -66671,7 +50980,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_utcpserver_port" lineno="90536">
+<interface name="corenet_udp_bind_utcpserver_port" lineno="69224">
<summary>
Bind UDP sockets to the utcpserver port.
</summary>
@@ -66682,7 +50991,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_utcpserver_port" lineno="90555">
+<interface name="corenet_tcp_connect_utcpserver_port" lineno="69243">
<summary>
Make a TCP connection to the utcpserver port.
</summary>
@@ -66692,7 +51001,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_utcpserver_client_packets" lineno="90575">
+<interface name="corenet_send_utcpserver_client_packets" lineno="69263">
<summary>
Send utcpserver_client packets.
</summary>
@@ -66703,7 +51012,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90594">
+<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="69282">
<summary>
Do not audit attempts to send utcpserver_client packets.
</summary>
@@ -66714,7 +51023,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_utcpserver_client_packets" lineno="90613">
+<interface name="corenet_receive_utcpserver_client_packets" lineno="69301">
<summary>
Receive utcpserver_client packets.
</summary>
@@ -66725,7 +51034,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90632">
+<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="69320">
<summary>
Do not audit attempts to receive utcpserver_client packets.
</summary>
@@ -66736,7 +51045,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90651">
+<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="69339">
<summary>
Send and receive utcpserver_client packets.
</summary>
@@ -66747,7 +51056,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90667">
+<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="69355">
<summary>
Do not audit attempts to send and receive utcpserver_client packets.
</summary>
@@ -66758,7 +51067,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90682">
+<interface name="corenet_relabelto_utcpserver_client_packets" lineno="69370">
<summary>
Relabel packets to utcpserver_client the packet type.
</summary>
@@ -66768,7 +51077,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_utcpserver_server_packets" lineno="90702">
+<interface name="corenet_send_utcpserver_server_packets" lineno="69390">
<summary>
Send utcpserver_server packets.
</summary>
@@ -66779,7 +51088,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90721">
+<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="69409">
<summary>
Do not audit attempts to send utcpserver_server packets.
</summary>
@@ -66790,7 +51099,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_utcpserver_server_packets" lineno="90740">
+<interface name="corenet_receive_utcpserver_server_packets" lineno="69428">
<summary>
Receive utcpserver_server packets.
</summary>
@@ -66801,7 +51110,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90759">
+<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="69447">
<summary>
Do not audit attempts to receive utcpserver_server packets.
</summary>
@@ -66812,7 +51121,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90778">
+<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="69466">
<summary>
Send and receive utcpserver_server packets.
</summary>
@@ -66823,7 +51132,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90794">
+<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="69482">
<summary>
Do not audit attempts to send and receive utcpserver_server packets.
</summary>
@@ -66834,7 +51143,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90809">
+<interface name="corenet_relabelto_utcpserver_server_packets" lineno="69497">
<summary>
Relabel packets to utcpserver_server the packet type.
</summary>
@@ -66844,85 +51153,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90831">
-<summary>
-Send and receive TCP traffic on the uucpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_uucpd_port" lineno="90846">
-<summary>
-Send UDP traffic on the uucpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90861">
-<summary>
-Do not audit attempts to send UDP traffic on the uucpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_uucpd_port" lineno="90876">
-<summary>
-Receive UDP traffic on the uucpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90891">
-<summary>
-Do not audit attempts to receive UDP traffic on the uucpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90906">
-<summary>
-Send and receive UDP traffic on the uucpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90922">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the uucpd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_uucpd_port" lineno="90937">
+<interface name="corenet_tcp_bind_uucpd_port" lineno="69519">
<summary>
Bind TCP sockets to the uucpd port.
</summary>
@@ -66933,7 +51164,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_uucpd_port" lineno="90957">
+<interface name="corenet_udp_bind_uucpd_port" lineno="69539">
<summary>
Bind UDP sockets to the uucpd port.
</summary>
@@ -66944,7 +51175,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_uucpd_port" lineno="90976">
+<interface name="corenet_tcp_connect_uucpd_port" lineno="69558">
<summary>
Make a TCP connection to the uucpd port.
</summary>
@@ -66954,7 +51185,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_uucpd_client_packets" lineno="90996">
+<interface name="corenet_send_uucpd_client_packets" lineno="69578">
<summary>
Send uucpd_client packets.
</summary>
@@ -66965,7 +51196,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="91015">
+<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="69597">
<summary>
Do not audit attempts to send uucpd_client packets.
</summary>
@@ -66976,7 +51207,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_uucpd_client_packets" lineno="91034">
+<interface name="corenet_receive_uucpd_client_packets" lineno="69616">
<summary>
Receive uucpd_client packets.
</summary>
@@ -66987,7 +51218,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="91053">
+<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="69635">
<summary>
Do not audit attempts to receive uucpd_client packets.
</summary>
@@ -66998,7 +51229,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_uucpd_client_packets" lineno="91072">
+<interface name="corenet_sendrecv_uucpd_client_packets" lineno="69654">
<summary>
Send and receive uucpd_client packets.
</summary>
@@ -67009,7 +51240,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="91088">
+<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="69670">
<summary>
Do not audit attempts to send and receive uucpd_client packets.
</summary>
@@ -67020,7 +51251,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_uucpd_client_packets" lineno="91103">
+<interface name="corenet_relabelto_uucpd_client_packets" lineno="69685">
<summary>
Relabel packets to uucpd_client the packet type.
</summary>
@@ -67030,7 +51261,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_uucpd_server_packets" lineno="91123">
+<interface name="corenet_send_uucpd_server_packets" lineno="69705">
<summary>
Send uucpd_server packets.
</summary>
@@ -67041,7 +51272,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="91142">
+<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="69724">
<summary>
Do not audit attempts to send uucpd_server packets.
</summary>
@@ -67052,7 +51283,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_uucpd_server_packets" lineno="91161">
+<interface name="corenet_receive_uucpd_server_packets" lineno="69743">
<summary>
Receive uucpd_server packets.
</summary>
@@ -67063,7 +51294,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="91180">
+<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="69762">
<summary>
Do not audit attempts to receive uucpd_server packets.
</summary>
@@ -67074,7 +51305,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_uucpd_server_packets" lineno="91199">
+<interface name="corenet_sendrecv_uucpd_server_packets" lineno="69781">
<summary>
Send and receive uucpd_server packets.
</summary>
@@ -67085,7 +51316,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="91215">
+<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="69797">
<summary>
Do not audit attempts to send and receive uucpd_server packets.
</summary>
@@ -67096,7 +51327,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_uucpd_server_packets" lineno="91230">
+<interface name="corenet_relabelto_uucpd_server_packets" lineno="69812">
<summary>
Relabel packets to uucpd_server the packet type.
</summary>
@@ -67106,85 +51337,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="91252">
-<summary>
-Send and receive TCP traffic on the varnishd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_varnishd_port" lineno="91267">
-<summary>
-Send UDP traffic on the varnishd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="91282">
-<summary>
-Do not audit attempts to send UDP traffic on the varnishd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_varnishd_port" lineno="91297">
-<summary>
-Receive UDP traffic on the varnishd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="91312">
-<summary>
-Do not audit attempts to receive UDP traffic on the varnishd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_varnishd_port" lineno="91327">
-<summary>
-Send and receive UDP traffic on the varnishd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="91343">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the varnishd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_varnishd_port" lineno="91358">
+<interface name="corenet_tcp_bind_varnishd_port" lineno="69834">
<summary>
Bind TCP sockets to the varnishd port.
</summary>
@@ -67195,7 +51348,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_varnishd_port" lineno="91378">
+<interface name="corenet_udp_bind_varnishd_port" lineno="69854">
<summary>
Bind UDP sockets to the varnishd port.
</summary>
@@ -67206,7 +51359,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_varnishd_port" lineno="91397">
+<interface name="corenet_tcp_connect_varnishd_port" lineno="69873">
<summary>
Make a TCP connection to the varnishd port.
</summary>
@@ -67216,7 +51369,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_varnishd_client_packets" lineno="91417">
+<interface name="corenet_send_varnishd_client_packets" lineno="69893">
<summary>
Send varnishd_client packets.
</summary>
@@ -67227,7 +51380,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="91436">
+<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="69912">
<summary>
Do not audit attempts to send varnishd_client packets.
</summary>
@@ -67238,7 +51391,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_varnishd_client_packets" lineno="91455">
+<interface name="corenet_receive_varnishd_client_packets" lineno="69931">
<summary>
Receive varnishd_client packets.
</summary>
@@ -67249,7 +51402,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91474">
+<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="69950">
<summary>
Do not audit attempts to receive varnishd_client packets.
</summary>
@@ -67260,7 +51413,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91493">
+<interface name="corenet_sendrecv_varnishd_client_packets" lineno="69969">
<summary>
Send and receive varnishd_client packets.
</summary>
@@ -67271,7 +51424,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91509">
+<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="69985">
<summary>
Do not audit attempts to send and receive varnishd_client packets.
</summary>
@@ -67282,7 +51435,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_varnishd_client_packets" lineno="91524">
+<interface name="corenet_relabelto_varnishd_client_packets" lineno="70000">
<summary>
Relabel packets to varnishd_client the packet type.
</summary>
@@ -67292,7 +51445,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_varnishd_server_packets" lineno="91544">
+<interface name="corenet_send_varnishd_server_packets" lineno="70020">
<summary>
Send varnishd_server packets.
</summary>
@@ -67303,7 +51456,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91563">
+<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="70039">
<summary>
Do not audit attempts to send varnishd_server packets.
</summary>
@@ -67314,7 +51467,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_varnishd_server_packets" lineno="91582">
+<interface name="corenet_receive_varnishd_server_packets" lineno="70058">
<summary>
Receive varnishd_server packets.
</summary>
@@ -67325,7 +51478,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91601">
+<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="70077">
<summary>
Do not audit attempts to receive varnishd_server packets.
</summary>
@@ -67336,7 +51489,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91620">
+<interface name="corenet_sendrecv_varnishd_server_packets" lineno="70096">
<summary>
Send and receive varnishd_server packets.
</summary>
@@ -67347,7 +51500,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91636">
+<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="70112">
<summary>
Do not audit attempts to send and receive varnishd_server packets.
</summary>
@@ -67358,7 +51511,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_varnishd_server_packets" lineno="91651">
+<interface name="corenet_relabelto_varnishd_server_packets" lineno="70127">
<summary>
Relabel packets to varnishd_server the packet type.
</summary>
@@ -67368,85 +51521,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_virt_port" lineno="91673">
-<summary>
-Send and receive TCP traffic on the virt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_virt_port" lineno="91688">
-<summary>
-Send UDP traffic on the virt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91703">
-<summary>
-Do not audit attempts to send UDP traffic on the virt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_virt_port" lineno="91718">
-<summary>
-Receive UDP traffic on the virt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91733">
-<summary>
-Do not audit attempts to receive UDP traffic on the virt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_virt_port" lineno="91748">
-<summary>
-Send and receive UDP traffic on the virt port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91764">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the virt port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_virt_port" lineno="91779">
+<interface name="corenet_tcp_bind_virt_port" lineno="70149">
<summary>
Bind TCP sockets to the virt port.
</summary>
@@ -67457,7 +51532,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_virt_port" lineno="91799">
+<interface name="corenet_udp_bind_virt_port" lineno="70169">
<summary>
Bind UDP sockets to the virt port.
</summary>
@@ -67468,7 +51543,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_virt_port" lineno="91818">
+<interface name="corenet_tcp_connect_virt_port" lineno="70188">
<summary>
Make a TCP connection to the virt port.
</summary>
@@ -67478,7 +51553,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_client_packets" lineno="91838">
+<interface name="corenet_send_virt_client_packets" lineno="70208">
<summary>
Send virt_client packets.
</summary>
@@ -67489,7 +51564,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91857">
+<interface name="corenet_dontaudit_send_virt_client_packets" lineno="70227">
<summary>
Do not audit attempts to send virt_client packets.
</summary>
@@ -67500,7 +51575,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_client_packets" lineno="91876">
+<interface name="corenet_receive_virt_client_packets" lineno="70246">
<summary>
Receive virt_client packets.
</summary>
@@ -67511,7 +51586,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91895">
+<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="70265">
<summary>
Do not audit attempts to receive virt_client packets.
</summary>
@@ -67522,7 +51597,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_client_packets" lineno="91914">
+<interface name="corenet_sendrecv_virt_client_packets" lineno="70284">
<summary>
Send and receive virt_client packets.
</summary>
@@ -67533,7 +51608,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91930">
+<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="70300">
<summary>
Do not audit attempts to send and receive virt_client packets.
</summary>
@@ -67544,7 +51619,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_client_packets" lineno="91945">
+<interface name="corenet_relabelto_virt_client_packets" lineno="70315">
<summary>
Relabel packets to virt_client the packet type.
</summary>
@@ -67554,7 +51629,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_server_packets" lineno="91965">
+<interface name="corenet_send_virt_server_packets" lineno="70335">
<summary>
Send virt_server packets.
</summary>
@@ -67565,7 +51640,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91984">
+<interface name="corenet_dontaudit_send_virt_server_packets" lineno="70354">
<summary>
Do not audit attempts to send virt_server packets.
</summary>
@@ -67576,7 +51651,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_server_packets" lineno="92003">
+<interface name="corenet_receive_virt_server_packets" lineno="70373">
<summary>
Receive virt_server packets.
</summary>
@@ -67587,7 +51662,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="92022">
+<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="70392">
<summary>
Do not audit attempts to receive virt_server packets.
</summary>
@@ -67598,7 +51673,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_server_packets" lineno="92041">
+<interface name="corenet_sendrecv_virt_server_packets" lineno="70411">
<summary>
Send and receive virt_server packets.
</summary>
@@ -67609,7 +51684,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="92057">
+<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="70427">
<summary>
Do not audit attempts to send and receive virt_server packets.
</summary>
@@ -67620,7 +51695,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_server_packets" lineno="92072">
+<interface name="corenet_relabelto_virt_server_packets" lineno="70442">
<summary>
Relabel packets to virt_server the packet type.
</summary>
@@ -67630,85 +51705,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="92094">
-<summary>
-Send and receive TCP traffic on the virtual_places port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_virtual_places_port" lineno="92109">
-<summary>
-Send UDP traffic on the virtual_places port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="92124">
-<summary>
-Do not audit attempts to send UDP traffic on the virtual_places port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_virtual_places_port" lineno="92139">
-<summary>
-Receive UDP traffic on the virtual_places port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="92154">
-<summary>
-Do not audit attempts to receive UDP traffic on the virtual_places port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="92169">
-<summary>
-Send and receive UDP traffic on the virtual_places port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="92185">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the virtual_places port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_virtual_places_port" lineno="92200">
+<interface name="corenet_tcp_bind_virtual_places_port" lineno="70464">
<summary>
Bind TCP sockets to the virtual_places port.
</summary>
@@ -67719,7 +51716,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_virtual_places_port" lineno="92220">
+<interface name="corenet_udp_bind_virtual_places_port" lineno="70484">
<summary>
Bind UDP sockets to the virtual_places port.
</summary>
@@ -67730,7 +51727,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_virtual_places_port" lineno="92239">
+<interface name="corenet_tcp_connect_virtual_places_port" lineno="70503">
<summary>
Make a TCP connection to the virtual_places port.
</summary>
@@ -67740,7 +51737,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virtual_places_client_packets" lineno="92259">
+<interface name="corenet_send_virtual_places_client_packets" lineno="70523">
<summary>
Send virtual_places_client packets.
</summary>
@@ -67751,7 +51748,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="92278">
+<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="70542">
<summary>
Do not audit attempts to send virtual_places_client packets.
</summary>
@@ -67762,7 +51759,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virtual_places_client_packets" lineno="92297">
+<interface name="corenet_receive_virtual_places_client_packets" lineno="70561">
<summary>
Receive virtual_places_client packets.
</summary>
@@ -67773,7 +51770,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="92316">
+<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="70580">
<summary>
Do not audit attempts to receive virtual_places_client packets.
</summary>
@@ -67784,7 +51781,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="92335">
+<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="70599">
<summary>
Send and receive virtual_places_client packets.
</summary>
@@ -67795,7 +51792,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="92351">
+<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="70615">
<summary>
Do not audit attempts to send and receive virtual_places_client packets.
</summary>
@@ -67806,7 +51803,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virtual_places_client_packets" lineno="92366">
+<interface name="corenet_relabelto_virtual_places_client_packets" lineno="70630">
<summary>
Relabel packets to virtual_places_client the packet type.
</summary>
@@ -67816,7 +51813,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virtual_places_server_packets" lineno="92386">
+<interface name="corenet_send_virtual_places_server_packets" lineno="70650">
<summary>
Send virtual_places_server packets.
</summary>
@@ -67827,7 +51824,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="92405">
+<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="70669">
<summary>
Do not audit attempts to send virtual_places_server packets.
</summary>
@@ -67838,7 +51835,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virtual_places_server_packets" lineno="92424">
+<interface name="corenet_receive_virtual_places_server_packets" lineno="70688">
<summary>
Receive virtual_places_server packets.
</summary>
@@ -67849,7 +51846,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92443">
+<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="70707">
<summary>
Do not audit attempts to receive virtual_places_server packets.
</summary>
@@ -67860,7 +51857,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92462">
+<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="70726">
<summary>
Send and receive virtual_places_server packets.
</summary>
@@ -67871,7 +51868,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92478">
+<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="70742">
<summary>
Do not audit attempts to send and receive virtual_places_server packets.
</summary>
@@ -67882,7 +51879,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92493">
+<interface name="corenet_relabelto_virtual_places_server_packets" lineno="70757">
<summary>
Relabel packets to virtual_places_server the packet type.
</summary>
@@ -67892,85 +51889,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92515">
-<summary>
-Send and receive TCP traffic on the virt_migration port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_virt_migration_port" lineno="92530">
-<summary>
-Send UDP traffic on the virt_migration port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92545">
-<summary>
-Do not audit attempts to send UDP traffic on the virt_migration port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_virt_migration_port" lineno="92560">
-<summary>
-Receive UDP traffic on the virt_migration port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92575">
-<summary>
-Do not audit attempts to receive UDP traffic on the virt_migration port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92590">
-<summary>
-Send and receive UDP traffic on the virt_migration port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92606">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the virt_migration port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_virt_migration_port" lineno="92621">
+<interface name="corenet_tcp_bind_virt_migration_port" lineno="70779">
<summary>
Bind TCP sockets to the virt_migration port.
</summary>
@@ -67981,7 +51900,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_virt_migration_port" lineno="92641">
+<interface name="corenet_udp_bind_virt_migration_port" lineno="70799">
<summary>
Bind UDP sockets to the virt_migration port.
</summary>
@@ -67992,7 +51911,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_virt_migration_port" lineno="92660">
+<interface name="corenet_tcp_connect_virt_migration_port" lineno="70818">
<summary>
Make a TCP connection to the virt_migration port.
</summary>
@@ -68002,7 +51921,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_migration_client_packets" lineno="92680">
+<interface name="corenet_send_virt_migration_client_packets" lineno="70838">
<summary>
Send virt_migration_client packets.
</summary>
@@ -68013,7 +51932,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92699">
+<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="70857">
<summary>
Do not audit attempts to send virt_migration_client packets.
</summary>
@@ -68024,7 +51943,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_migration_client_packets" lineno="92718">
+<interface name="corenet_receive_virt_migration_client_packets" lineno="70876">
<summary>
Receive virt_migration_client packets.
</summary>
@@ -68035,7 +51954,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92737">
+<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="70895">
<summary>
Do not audit attempts to receive virt_migration_client packets.
</summary>
@@ -68046,7 +51965,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92756">
+<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="70914">
<summary>
Send and receive virt_migration_client packets.
</summary>
@@ -68057,7 +51976,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92772">
+<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="70930">
<summary>
Do not audit attempts to send and receive virt_migration_client packets.
</summary>
@@ -68068,7 +51987,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92787">
+<interface name="corenet_relabelto_virt_migration_client_packets" lineno="70945">
<summary>
Relabel packets to virt_migration_client the packet type.
</summary>
@@ -68078,7 +51997,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_migration_server_packets" lineno="92807">
+<interface name="corenet_send_virt_migration_server_packets" lineno="70965">
<summary>
Send virt_migration_server packets.
</summary>
@@ -68089,7 +52008,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92826">
+<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="70984">
<summary>
Do not audit attempts to send virt_migration_server packets.
</summary>
@@ -68100,7 +52019,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_migration_server_packets" lineno="92845">
+<interface name="corenet_receive_virt_migration_server_packets" lineno="71003">
<summary>
Receive virt_migration_server packets.
</summary>
@@ -68111,7 +52030,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92864">
+<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="71022">
<summary>
Do not audit attempts to receive virt_migration_server packets.
</summary>
@@ -68122,7 +52041,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92883">
+<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="71041">
<summary>
Send and receive virt_migration_server packets.
</summary>
@@ -68133,7 +52052,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92899">
+<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="71057">
<summary>
Do not audit attempts to send and receive virt_migration_server packets.
</summary>
@@ -68144,7 +52063,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92914">
+<interface name="corenet_relabelto_virt_migration_server_packets" lineno="71072">
<summary>
Relabel packets to virt_migration_server the packet type.
</summary>
@@ -68154,85 +52073,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92936">
-<summary>
-Send and receive TCP traffic on the vnc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_vnc_port" lineno="92951">
-<summary>
-Send UDP traffic on the vnc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92966">
-<summary>
-Do not audit attempts to send UDP traffic on the vnc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_vnc_port" lineno="92981">
-<summary>
-Receive UDP traffic on the vnc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92996">
-<summary>
-Do not audit attempts to receive UDP traffic on the vnc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_vnc_port" lineno="93011">
-<summary>
-Send and receive UDP traffic on the vnc port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="93027">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the vnc port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_vnc_port" lineno="93042">
+<interface name="corenet_tcp_bind_vnc_port" lineno="71094">
<summary>
Bind TCP sockets to the vnc port.
</summary>
@@ -68243,7 +52084,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_vnc_port" lineno="93062">
+<interface name="corenet_udp_bind_vnc_port" lineno="71114">
<summary>
Bind UDP sockets to the vnc port.
</summary>
@@ -68254,7 +52095,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_vnc_port" lineno="93081">
+<interface name="corenet_tcp_connect_vnc_port" lineno="71133">
<summary>
Make a TCP connection to the vnc port.
</summary>
@@ -68264,7 +52105,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_vnc_client_packets" lineno="93101">
+<interface name="corenet_send_vnc_client_packets" lineno="71153">
<summary>
Send vnc_client packets.
</summary>
@@ -68275,7 +52116,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="93120">
+<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="71172">
<summary>
Do not audit attempts to send vnc_client packets.
</summary>
@@ -68286,7 +52127,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_vnc_client_packets" lineno="93139">
+<interface name="corenet_receive_vnc_client_packets" lineno="71191">
<summary>
Receive vnc_client packets.
</summary>
@@ -68297,7 +52138,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="93158">
+<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="71210">
<summary>
Do not audit attempts to receive vnc_client packets.
</summary>
@@ -68308,7 +52149,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_vnc_client_packets" lineno="93177">
+<interface name="corenet_sendrecv_vnc_client_packets" lineno="71229">
<summary>
Send and receive vnc_client packets.
</summary>
@@ -68319,7 +52160,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="93193">
+<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="71245">
<summary>
Do not audit attempts to send and receive vnc_client packets.
</summary>
@@ -68330,7 +52171,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_vnc_client_packets" lineno="93208">
+<interface name="corenet_relabelto_vnc_client_packets" lineno="71260">
<summary>
Relabel packets to vnc_client the packet type.
</summary>
@@ -68340,7 +52181,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_vnc_server_packets" lineno="93228">
+<interface name="corenet_send_vnc_server_packets" lineno="71280">
<summary>
Send vnc_server packets.
</summary>
@@ -68351,7 +52192,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="93247">
+<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="71299">
<summary>
Do not audit attempts to send vnc_server packets.
</summary>
@@ -68362,7 +52203,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_vnc_server_packets" lineno="93266">
+<interface name="corenet_receive_vnc_server_packets" lineno="71318">
<summary>
Receive vnc_server packets.
</summary>
@@ -68373,7 +52214,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="93285">
+<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="71337">
<summary>
Do not audit attempts to receive vnc_server packets.
</summary>
@@ -68384,7 +52225,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_vnc_server_packets" lineno="93304">
+<interface name="corenet_sendrecv_vnc_server_packets" lineno="71356">
<summary>
Send and receive vnc_server packets.
</summary>
@@ -68395,7 +52236,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="93320">
+<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="71372">
<summary>
Do not audit attempts to send and receive vnc_server packets.
</summary>
@@ -68406,7 +52247,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_vnc_server_packets" lineno="93335">
+<interface name="corenet_relabelto_vnc_server_packets" lineno="71387">
<summary>
Relabel packets to vnc_server the packet type.
</summary>
@@ -68416,85 +52257,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_wccp_port" lineno="93357">
-<summary>
-Send and receive TCP traffic on the wccp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_wccp_port" lineno="93372">
-<summary>
-Send UDP traffic on the wccp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="93387">
-<summary>
-Do not audit attempts to send UDP traffic on the wccp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_wccp_port" lineno="93402">
-<summary>
-Receive UDP traffic on the wccp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="93417">
-<summary>
-Do not audit attempts to receive UDP traffic on the wccp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_wccp_port" lineno="93432">
-<summary>
-Send and receive UDP traffic on the wccp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93448">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the wccp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_wccp_port" lineno="93463">
+<interface name="corenet_tcp_bind_wccp_port" lineno="71409">
<summary>
Bind TCP sockets to the wccp port.
</summary>
@@ -68505,7 +52268,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_wccp_port" lineno="93483">
+<interface name="corenet_udp_bind_wccp_port" lineno="71429">
<summary>
Bind UDP sockets to the wccp port.
</summary>
@@ -68516,7 +52279,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_wccp_port" lineno="93502">
+<interface name="corenet_tcp_connect_wccp_port" lineno="71448">
<summary>
Make a TCP connection to the wccp port.
</summary>
@@ -68526,7 +52289,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wccp_client_packets" lineno="93522">
+<interface name="corenet_send_wccp_client_packets" lineno="71468">
<summary>
Send wccp_client packets.
</summary>
@@ -68537,7 +52300,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93541">
+<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="71487">
<summary>
Do not audit attempts to send wccp_client packets.
</summary>
@@ -68548,7 +52311,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wccp_client_packets" lineno="93560">
+<interface name="corenet_receive_wccp_client_packets" lineno="71506">
<summary>
Receive wccp_client packets.
</summary>
@@ -68559,7 +52322,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93579">
+<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="71525">
<summary>
Do not audit attempts to receive wccp_client packets.
</summary>
@@ -68570,7 +52333,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wccp_client_packets" lineno="93598">
+<interface name="corenet_sendrecv_wccp_client_packets" lineno="71544">
<summary>
Send and receive wccp_client packets.
</summary>
@@ -68581,7 +52344,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93614">
+<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="71560">
<summary>
Do not audit attempts to send and receive wccp_client packets.
</summary>
@@ -68592,7 +52355,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wccp_client_packets" lineno="93629">
+<interface name="corenet_relabelto_wccp_client_packets" lineno="71575">
<summary>
Relabel packets to wccp_client the packet type.
</summary>
@@ -68602,7 +52365,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wccp_server_packets" lineno="93649">
+<interface name="corenet_send_wccp_server_packets" lineno="71595">
<summary>
Send wccp_server packets.
</summary>
@@ -68613,7 +52376,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93668">
+<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="71614">
<summary>
Do not audit attempts to send wccp_server packets.
</summary>
@@ -68624,7 +52387,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wccp_server_packets" lineno="93687">
+<interface name="corenet_receive_wccp_server_packets" lineno="71633">
<summary>
Receive wccp_server packets.
</summary>
@@ -68635,7 +52398,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93706">
+<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="71652">
<summary>
Do not audit attempts to receive wccp_server packets.
</summary>
@@ -68646,7 +52409,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wccp_server_packets" lineno="93725">
+<interface name="corenet_sendrecv_wccp_server_packets" lineno="71671">
<summary>
Send and receive wccp_server packets.
</summary>
@@ -68657,7 +52420,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93741">
+<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="71687">
<summary>
Do not audit attempts to send and receive wccp_server packets.
</summary>
@@ -68668,7 +52431,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wccp_server_packets" lineno="93756">
+<interface name="corenet_relabelto_wccp_server_packets" lineno="71702">
<summary>
Relabel packets to wccp_server the packet type.
</summary>
@@ -68678,85 +52441,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_websm_port" lineno="93778">
-<summary>
-Send and receive TCP traffic on the websm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_websm_port" lineno="93793">
-<summary>
-Send UDP traffic on the websm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93808">
-<summary>
-Do not audit attempts to send UDP traffic on the websm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_websm_port" lineno="93823">
-<summary>
-Receive UDP traffic on the websm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93838">
-<summary>
-Do not audit attempts to receive UDP traffic on the websm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_websm_port" lineno="93853">
-<summary>
-Send and receive UDP traffic on the websm port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93869">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the websm port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_websm_port" lineno="93884">
+<interface name="corenet_tcp_bind_websm_port" lineno="71724">
<summary>
Bind TCP sockets to the websm port.
</summary>
@@ -68767,7 +52452,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_websm_port" lineno="93904">
+<interface name="corenet_udp_bind_websm_port" lineno="71744">
<summary>
Bind UDP sockets to the websm port.
</summary>
@@ -68778,7 +52463,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_websm_port" lineno="93923">
+<interface name="corenet_tcp_connect_websm_port" lineno="71763">
<summary>
Make a TCP connection to the websm port.
</summary>
@@ -68788,7 +52473,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_websm_client_packets" lineno="93943">
+<interface name="corenet_send_websm_client_packets" lineno="71783">
<summary>
Send websm_client packets.
</summary>
@@ -68799,7 +52484,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93962">
+<interface name="corenet_dontaudit_send_websm_client_packets" lineno="71802">
<summary>
Do not audit attempts to send websm_client packets.
</summary>
@@ -68810,7 +52495,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_websm_client_packets" lineno="93981">
+<interface name="corenet_receive_websm_client_packets" lineno="71821">
<summary>
Receive websm_client packets.
</summary>
@@ -68821,7 +52506,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="94000">
+<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="71840">
<summary>
Do not audit attempts to receive websm_client packets.
</summary>
@@ -68832,7 +52517,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_websm_client_packets" lineno="94019">
+<interface name="corenet_sendrecv_websm_client_packets" lineno="71859">
<summary>
Send and receive websm_client packets.
</summary>
@@ -68843,7 +52528,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="94035">
+<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="71875">
<summary>
Do not audit attempts to send and receive websm_client packets.
</summary>
@@ -68854,7 +52539,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_websm_client_packets" lineno="94050">
+<interface name="corenet_relabelto_websm_client_packets" lineno="71890">
<summary>
Relabel packets to websm_client the packet type.
</summary>
@@ -68864,7 +52549,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_websm_server_packets" lineno="94070">
+<interface name="corenet_send_websm_server_packets" lineno="71910">
<summary>
Send websm_server packets.
</summary>
@@ -68875,7 +52560,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_websm_server_packets" lineno="94089">
+<interface name="corenet_dontaudit_send_websm_server_packets" lineno="71929">
<summary>
Do not audit attempts to send websm_server packets.
</summary>
@@ -68886,7 +52571,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_websm_server_packets" lineno="94108">
+<interface name="corenet_receive_websm_server_packets" lineno="71948">
<summary>
Receive websm_server packets.
</summary>
@@ -68897,7 +52582,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="94127">
+<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="71967">
<summary>
Do not audit attempts to receive websm_server packets.
</summary>
@@ -68908,7 +52593,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_websm_server_packets" lineno="94146">
+<interface name="corenet_sendrecv_websm_server_packets" lineno="71986">
<summary>
Send and receive websm_server packets.
</summary>
@@ -68919,7 +52604,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="94162">
+<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="72002">
<summary>
Do not audit attempts to send and receive websm_server packets.
</summary>
@@ -68930,7 +52615,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_websm_server_packets" lineno="94177">
+<interface name="corenet_relabelto_websm_server_packets" lineno="72017">
<summary>
Relabel packets to websm_server the packet type.
</summary>
@@ -68940,85 +52625,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_whois_port" lineno="94199">
-<summary>
-Send and receive TCP traffic on the whois port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_whois_port" lineno="94214">
-<summary>
-Send UDP traffic on the whois port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_whois_port" lineno="94229">
-<summary>
-Do not audit attempts to send UDP traffic on the whois port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_whois_port" lineno="94244">
-<summary>
-Receive UDP traffic on the whois port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="94259">
-<summary>
-Do not audit attempts to receive UDP traffic on the whois port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_whois_port" lineno="94274">
-<summary>
-Send and receive UDP traffic on the whois port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="94290">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the whois port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_whois_port" lineno="94305">
+<interface name="corenet_tcp_bind_whois_port" lineno="72039">
<summary>
Bind TCP sockets to the whois port.
</summary>
@@ -69029,7 +52636,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_whois_port" lineno="94325">
+<interface name="corenet_udp_bind_whois_port" lineno="72059">
<summary>
Bind UDP sockets to the whois port.
</summary>
@@ -69040,7 +52647,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_whois_port" lineno="94344">
+<interface name="corenet_tcp_connect_whois_port" lineno="72078">
<summary>
Make a TCP connection to the whois port.
</summary>
@@ -69050,7 +52657,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_whois_client_packets" lineno="94364">
+<interface name="corenet_send_whois_client_packets" lineno="72098">
<summary>
Send whois_client packets.
</summary>
@@ -69061,7 +52668,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_whois_client_packets" lineno="94383">
+<interface name="corenet_dontaudit_send_whois_client_packets" lineno="72117">
<summary>
Do not audit attempts to send whois_client packets.
</summary>
@@ -69072,7 +52679,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_whois_client_packets" lineno="94402">
+<interface name="corenet_receive_whois_client_packets" lineno="72136">
<summary>
Receive whois_client packets.
</summary>
@@ -69083,7 +52690,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="94421">
+<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="72155">
<summary>
Do not audit attempts to receive whois_client packets.
</summary>
@@ -69094,7 +52701,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_whois_client_packets" lineno="94440">
+<interface name="corenet_sendrecv_whois_client_packets" lineno="72174">
<summary>
Send and receive whois_client packets.
</summary>
@@ -69105,7 +52712,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94456">
+<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="72190">
<summary>
Do not audit attempts to send and receive whois_client packets.
</summary>
@@ -69116,7 +52723,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_whois_client_packets" lineno="94471">
+<interface name="corenet_relabelto_whois_client_packets" lineno="72205">
<summary>
Relabel packets to whois_client the packet type.
</summary>
@@ -69126,7 +52733,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_whois_server_packets" lineno="94491">
+<interface name="corenet_send_whois_server_packets" lineno="72225">
<summary>
Send whois_server packets.
</summary>
@@ -69137,7 +52744,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94510">
+<interface name="corenet_dontaudit_send_whois_server_packets" lineno="72244">
<summary>
Do not audit attempts to send whois_server packets.
</summary>
@@ -69148,7 +52755,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_whois_server_packets" lineno="94529">
+<interface name="corenet_receive_whois_server_packets" lineno="72263">
<summary>
Receive whois_server packets.
</summary>
@@ -69159,7 +52766,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94548">
+<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="72282">
<summary>
Do not audit attempts to receive whois_server packets.
</summary>
@@ -69170,7 +52777,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_whois_server_packets" lineno="94567">
+<interface name="corenet_sendrecv_whois_server_packets" lineno="72301">
<summary>
Send and receive whois_server packets.
</summary>
@@ -69181,7 +52788,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94583">
+<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="72317">
<summary>
Do not audit attempts to send and receive whois_server packets.
</summary>
@@ -69192,7 +52799,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_whois_server_packets" lineno="94598">
+<interface name="corenet_relabelto_whois_server_packets" lineno="72332">
<summary>
Relabel packets to whois_server the packet type.
</summary>
@@ -69202,85 +52809,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94620">
-<summary>
-Send and receive TCP traffic on the winshadow port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_winshadow_port" lineno="94635">
-<summary>
-Send UDP traffic on the winshadow port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94650">
-<summary>
-Do not audit attempts to send UDP traffic on the winshadow port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_winshadow_port" lineno="94665">
-<summary>
-Receive UDP traffic on the winshadow port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94680">
-<summary>
-Do not audit attempts to receive UDP traffic on the winshadow port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94695">
-<summary>
-Send and receive UDP traffic on the winshadow port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94711">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the winshadow port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_winshadow_port" lineno="94726">
+<interface name="corenet_tcp_bind_winshadow_port" lineno="72354">
<summary>
Bind TCP sockets to the winshadow port.
</summary>
@@ -69291,7 +52820,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_winshadow_port" lineno="94746">
+<interface name="corenet_udp_bind_winshadow_port" lineno="72374">
<summary>
Bind UDP sockets to the winshadow port.
</summary>
@@ -69302,7 +52831,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_winshadow_port" lineno="94765">
+<interface name="corenet_tcp_connect_winshadow_port" lineno="72393">
<summary>
Make a TCP connection to the winshadow port.
</summary>
@@ -69312,7 +52841,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_winshadow_client_packets" lineno="94785">
+<interface name="corenet_send_winshadow_client_packets" lineno="72413">
<summary>
Send winshadow_client packets.
</summary>
@@ -69323,7 +52852,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94804">
+<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="72432">
<summary>
Do not audit attempts to send winshadow_client packets.
</summary>
@@ -69334,7 +52863,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_winshadow_client_packets" lineno="94823">
+<interface name="corenet_receive_winshadow_client_packets" lineno="72451">
<summary>
Receive winshadow_client packets.
</summary>
@@ -69345,7 +52874,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94842">
+<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="72470">
<summary>
Do not audit attempts to receive winshadow_client packets.
</summary>
@@ -69356,7 +52885,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94861">
+<interface name="corenet_sendrecv_winshadow_client_packets" lineno="72489">
<summary>
Send and receive winshadow_client packets.
</summary>
@@ -69367,7 +52896,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94877">
+<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="72505">
<summary>
Do not audit attempts to send and receive winshadow_client packets.
</summary>
@@ -69378,7 +52907,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_winshadow_client_packets" lineno="94892">
+<interface name="corenet_relabelto_winshadow_client_packets" lineno="72520">
<summary>
Relabel packets to winshadow_client the packet type.
</summary>
@@ -69388,7 +52917,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_winshadow_server_packets" lineno="94912">
+<interface name="corenet_send_winshadow_server_packets" lineno="72540">
<summary>
Send winshadow_server packets.
</summary>
@@ -69399,7 +52928,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94931">
+<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="72559">
<summary>
Do not audit attempts to send winshadow_server packets.
</summary>
@@ -69410,7 +52939,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_winshadow_server_packets" lineno="94950">
+<interface name="corenet_receive_winshadow_server_packets" lineno="72578">
<summary>
Receive winshadow_server packets.
</summary>
@@ -69421,7 +52950,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94969">
+<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="72597">
<summary>
Do not audit attempts to receive winshadow_server packets.
</summary>
@@ -69432,7 +52961,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94988">
+<interface name="corenet_sendrecv_winshadow_server_packets" lineno="72616">
<summary>
Send and receive winshadow_server packets.
</summary>
@@ -69443,7 +52972,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="95004">
+<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="72632">
<summary>
Do not audit attempts to send and receive winshadow_server packets.
</summary>
@@ -69454,7 +52983,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_winshadow_server_packets" lineno="95019">
+<interface name="corenet_relabelto_winshadow_server_packets" lineno="72647">
<summary>
Relabel packets to winshadow_server the packet type.
</summary>
@@ -69464,85 +52993,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="95041">
-<summary>
-Send and receive TCP traffic on the wsdapi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_wsdapi_port" lineno="95056">
-<summary>
-Send UDP traffic on the wsdapi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="95071">
-<summary>
-Do not audit attempts to send UDP traffic on the wsdapi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_wsdapi_port" lineno="95086">
-<summary>
-Receive UDP traffic on the wsdapi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="95101">
-<summary>
-Do not audit attempts to receive UDP traffic on the wsdapi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="95116">
-<summary>
-Send and receive UDP traffic on the wsdapi port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="95132">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the wsdapi port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_wsdapi_port" lineno="95147">
+<interface name="corenet_tcp_bind_wsdapi_port" lineno="72669">
<summary>
Bind TCP sockets to the wsdapi port.
</summary>
@@ -69553,7 +53004,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_wsdapi_port" lineno="95167">
+<interface name="corenet_udp_bind_wsdapi_port" lineno="72689">
<summary>
Bind UDP sockets to the wsdapi port.
</summary>
@@ -69564,7 +53015,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_wsdapi_port" lineno="95186">
+<interface name="corenet_tcp_connect_wsdapi_port" lineno="72708">
<summary>
Make a TCP connection to the wsdapi port.
</summary>
@@ -69574,7 +53025,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsdapi_client_packets" lineno="95206">
+<interface name="corenet_send_wsdapi_client_packets" lineno="72728">
<summary>
Send wsdapi_client packets.
</summary>
@@ -69585,7 +53036,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="95225">
+<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="72747">
<summary>
Do not audit attempts to send wsdapi_client packets.
</summary>
@@ -69596,7 +53047,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsdapi_client_packets" lineno="95244">
+<interface name="corenet_receive_wsdapi_client_packets" lineno="72766">
<summary>
Receive wsdapi_client packets.
</summary>
@@ -69607,7 +53058,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="95263">
+<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="72785">
<summary>
Do not audit attempts to receive wsdapi_client packets.
</summary>
@@ -69618,7 +53069,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="95282">
+<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="72804">
<summary>
Send and receive wsdapi_client packets.
</summary>
@@ -69629,7 +53080,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="95298">
+<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="72820">
<summary>
Do not audit attempts to send and receive wsdapi_client packets.
</summary>
@@ -69640,7 +53091,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsdapi_client_packets" lineno="95313">
+<interface name="corenet_relabelto_wsdapi_client_packets" lineno="72835">
<summary>
Relabel packets to wsdapi_client the packet type.
</summary>
@@ -69650,7 +53101,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsdapi_server_packets" lineno="95333">
+<interface name="corenet_send_wsdapi_server_packets" lineno="72855">
<summary>
Send wsdapi_server packets.
</summary>
@@ -69661,7 +53112,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="95352">
+<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="72874">
<summary>
Do not audit attempts to send wsdapi_server packets.
</summary>
@@ -69672,7 +53123,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsdapi_server_packets" lineno="95371">
+<interface name="corenet_receive_wsdapi_server_packets" lineno="72893">
<summary>
Receive wsdapi_server packets.
</summary>
@@ -69683,7 +53134,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="95390">
+<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="72912">
<summary>
Do not audit attempts to receive wsdapi_server packets.
</summary>
@@ -69694,7 +53145,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="95409">
+<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="72931">
<summary>
Send and receive wsdapi_server packets.
</summary>
@@ -69705,7 +53156,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="95425">
+<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="72947">
<summary>
Do not audit attempts to send and receive wsdapi_server packets.
</summary>
@@ -69716,7 +53167,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95440">
+<interface name="corenet_relabelto_wsdapi_server_packets" lineno="72962">
<summary>
Relabel packets to wsdapi_server the packet type.
</summary>
@@ -69726,85 +53177,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95462">
-<summary>
-Send and receive TCP traffic on the wsicopy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_wsicopy_port" lineno="95477">
-<summary>
-Send UDP traffic on the wsicopy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95492">
-<summary>
-Do not audit attempts to send UDP traffic on the wsicopy port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_wsicopy_port" lineno="95507">
-<summary>
-Receive UDP traffic on the wsicopy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95522">
-<summary>
-Do not audit attempts to receive UDP traffic on the wsicopy port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95537">
-<summary>
-Send and receive UDP traffic on the wsicopy port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95553">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the wsicopy port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_wsicopy_port" lineno="95568">
+<interface name="corenet_tcp_bind_wsicopy_port" lineno="72984">
<summary>
Bind TCP sockets to the wsicopy port.
</summary>
@@ -69815,7 +53188,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_wsicopy_port" lineno="95588">
+<interface name="corenet_udp_bind_wsicopy_port" lineno="73004">
<summary>
Bind UDP sockets to the wsicopy port.
</summary>
@@ -69826,7 +53199,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_wsicopy_port" lineno="95607">
+<interface name="corenet_tcp_connect_wsicopy_port" lineno="73023">
<summary>
Make a TCP connection to the wsicopy port.
</summary>
@@ -69836,7 +53209,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsicopy_client_packets" lineno="95627">
+<interface name="corenet_send_wsicopy_client_packets" lineno="73043">
<summary>
Send wsicopy_client packets.
</summary>
@@ -69847,7 +53220,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95646">
+<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="73062">
<summary>
Do not audit attempts to send wsicopy_client packets.
</summary>
@@ -69858,7 +53231,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsicopy_client_packets" lineno="95665">
+<interface name="corenet_receive_wsicopy_client_packets" lineno="73081">
<summary>
Receive wsicopy_client packets.
</summary>
@@ -69869,7 +53242,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95684">
+<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="73100">
<summary>
Do not audit attempts to receive wsicopy_client packets.
</summary>
@@ -69880,7 +53253,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95703">
+<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="73119">
<summary>
Send and receive wsicopy_client packets.
</summary>
@@ -69891,7 +53264,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95719">
+<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="73135">
<summary>
Do not audit attempts to send and receive wsicopy_client packets.
</summary>
@@ -69902,7 +53275,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95734">
+<interface name="corenet_relabelto_wsicopy_client_packets" lineno="73150">
<summary>
Relabel packets to wsicopy_client the packet type.
</summary>
@@ -69912,7 +53285,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsicopy_server_packets" lineno="95754">
+<interface name="corenet_send_wsicopy_server_packets" lineno="73170">
<summary>
Send wsicopy_server packets.
</summary>
@@ -69923,7 +53296,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95773">
+<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="73189">
<summary>
Do not audit attempts to send wsicopy_server packets.
</summary>
@@ -69934,7 +53307,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsicopy_server_packets" lineno="95792">
+<interface name="corenet_receive_wsicopy_server_packets" lineno="73208">
<summary>
Receive wsicopy_server packets.
</summary>
@@ -69945,7 +53318,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95811">
+<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="73227">
<summary>
Do not audit attempts to receive wsicopy_server packets.
</summary>
@@ -69956,7 +53329,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95830">
+<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="73246">
<summary>
Send and receive wsicopy_server packets.
</summary>
@@ -69967,7 +53340,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95846">
+<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="73262">
<summary>
Do not audit attempts to send and receive wsicopy_server packets.
</summary>
@@ -69978,7 +53351,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95861">
+<interface name="corenet_relabelto_wsicopy_server_packets" lineno="73277">
<summary>
Relabel packets to wsicopy_server the packet type.
</summary>
@@ -69988,85 +53361,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95883">
-<summary>
-Send and receive TCP traffic on the xdmcp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_xdmcp_port" lineno="95898">
-<summary>
-Send UDP traffic on the xdmcp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95913">
-<summary>
-Do not audit attempts to send UDP traffic on the xdmcp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_xdmcp_port" lineno="95928">
-<summary>
-Receive UDP traffic on the xdmcp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95943">
-<summary>
-Do not audit attempts to receive UDP traffic on the xdmcp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95958">
-<summary>
-Send and receive UDP traffic on the xdmcp port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95974">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the xdmcp port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_xdmcp_port" lineno="95989">
+<interface name="corenet_tcp_bind_xdmcp_port" lineno="73299">
<summary>
Bind TCP sockets to the xdmcp port.
</summary>
@@ -70077,7 +53372,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xdmcp_port" lineno="96009">
+<interface name="corenet_udp_bind_xdmcp_port" lineno="73319">
<summary>
Bind UDP sockets to the xdmcp port.
</summary>
@@ -70088,7 +53383,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xdmcp_port" lineno="96028">
+<interface name="corenet_tcp_connect_xdmcp_port" lineno="73338">
<summary>
Make a TCP connection to the xdmcp port.
</summary>
@@ -70098,7 +53393,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xdmcp_client_packets" lineno="96048">
+<interface name="corenet_send_xdmcp_client_packets" lineno="73358">
<summary>
Send xdmcp_client packets.
</summary>
@@ -70109,7 +53404,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="96067">
+<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="73377">
<summary>
Do not audit attempts to send xdmcp_client packets.
</summary>
@@ -70120,7 +53415,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xdmcp_client_packets" lineno="96086">
+<interface name="corenet_receive_xdmcp_client_packets" lineno="73396">
<summary>
Receive xdmcp_client packets.
</summary>
@@ -70131,7 +53426,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="96105">
+<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="73415">
<summary>
Do not audit attempts to receive xdmcp_client packets.
</summary>
@@ -70142,7 +53437,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="96124">
+<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="73434">
<summary>
Send and receive xdmcp_client packets.
</summary>
@@ -70153,7 +53448,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="96140">
+<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="73450">
<summary>
Do not audit attempts to send and receive xdmcp_client packets.
</summary>
@@ -70164,7 +53459,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xdmcp_client_packets" lineno="96155">
+<interface name="corenet_relabelto_xdmcp_client_packets" lineno="73465">
<summary>
Relabel packets to xdmcp_client the packet type.
</summary>
@@ -70174,7 +53469,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xdmcp_server_packets" lineno="96175">
+<interface name="corenet_send_xdmcp_server_packets" lineno="73485">
<summary>
Send xdmcp_server packets.
</summary>
@@ -70185,7 +53480,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="96194">
+<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="73504">
<summary>
Do not audit attempts to send xdmcp_server packets.
</summary>
@@ -70196,7 +53491,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xdmcp_server_packets" lineno="96213">
+<interface name="corenet_receive_xdmcp_server_packets" lineno="73523">
<summary>
Receive xdmcp_server packets.
</summary>
@@ -70207,7 +53502,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="96232">
+<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="73542">
<summary>
Do not audit attempts to receive xdmcp_server packets.
</summary>
@@ -70218,7 +53513,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="96251">
+<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="73561">
<summary>
Send and receive xdmcp_server packets.
</summary>
@@ -70229,7 +53524,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="96267">
+<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="73577">
<summary>
Do not audit attempts to send and receive xdmcp_server packets.
</summary>
@@ -70240,7 +53535,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xdmcp_server_packets" lineno="96282">
+<interface name="corenet_relabelto_xdmcp_server_packets" lineno="73592">
<summary>
Relabel packets to xdmcp_server the packet type.
</summary>
@@ -70250,85 +53545,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xen_port" lineno="96304">
-<summary>
-Send and receive TCP traffic on the xen port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_xen_port" lineno="96319">
-<summary>
-Send UDP traffic on the xen port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_xen_port" lineno="96334">
-<summary>
-Do not audit attempts to send UDP traffic on the xen port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_xen_port" lineno="96349">
-<summary>
-Receive UDP traffic on the xen port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="96364">
-<summary>
-Do not audit attempts to receive UDP traffic on the xen port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_xen_port" lineno="96379">
-<summary>
-Send and receive UDP traffic on the xen port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="96395">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the xen port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_xen_port" lineno="96410">
+<interface name="corenet_tcp_bind_xen_port" lineno="73614">
<summary>
Bind TCP sockets to the xen port.
</summary>
@@ -70339,7 +53556,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xen_port" lineno="96430">
+<interface name="corenet_udp_bind_xen_port" lineno="73634">
<summary>
Bind UDP sockets to the xen port.
</summary>
@@ -70350,7 +53567,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xen_port" lineno="96449">
+<interface name="corenet_tcp_connect_xen_port" lineno="73653">
<summary>
Make a TCP connection to the xen port.
</summary>
@@ -70360,7 +53577,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xen_client_packets" lineno="96469">
+<interface name="corenet_send_xen_client_packets" lineno="73673">
<summary>
Send xen_client packets.
</summary>
@@ -70371,7 +53588,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96488">
+<interface name="corenet_dontaudit_send_xen_client_packets" lineno="73692">
<summary>
Do not audit attempts to send xen_client packets.
</summary>
@@ -70382,7 +53599,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xen_client_packets" lineno="96507">
+<interface name="corenet_receive_xen_client_packets" lineno="73711">
<summary>
Receive xen_client packets.
</summary>
@@ -70393,7 +53610,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96526">
+<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="73730">
<summary>
Do not audit attempts to receive xen_client packets.
</summary>
@@ -70404,7 +53621,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xen_client_packets" lineno="96545">
+<interface name="corenet_sendrecv_xen_client_packets" lineno="73749">
<summary>
Send and receive xen_client packets.
</summary>
@@ -70415,7 +53632,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96561">
+<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="73765">
<summary>
Do not audit attempts to send and receive xen_client packets.
</summary>
@@ -70426,7 +53643,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xen_client_packets" lineno="96576">
+<interface name="corenet_relabelto_xen_client_packets" lineno="73780">
<summary>
Relabel packets to xen_client the packet type.
</summary>
@@ -70436,7 +53653,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xen_server_packets" lineno="96596">
+<interface name="corenet_send_xen_server_packets" lineno="73800">
<summary>
Send xen_server packets.
</summary>
@@ -70447,7 +53664,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96615">
+<interface name="corenet_dontaudit_send_xen_server_packets" lineno="73819">
<summary>
Do not audit attempts to send xen_server packets.
</summary>
@@ -70458,7 +53675,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xen_server_packets" lineno="96634">
+<interface name="corenet_receive_xen_server_packets" lineno="73838">
<summary>
Receive xen_server packets.
</summary>
@@ -70469,7 +53686,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96653">
+<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="73857">
<summary>
Do not audit attempts to receive xen_server packets.
</summary>
@@ -70480,7 +53697,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xen_server_packets" lineno="96672">
+<interface name="corenet_sendrecv_xen_server_packets" lineno="73876">
<summary>
Send and receive xen_server packets.
</summary>
@@ -70491,7 +53708,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96688">
+<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="73892">
<summary>
Do not audit attempts to send and receive xen_server packets.
</summary>
@@ -70502,7 +53719,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xen_server_packets" lineno="96703">
+<interface name="corenet_relabelto_xen_server_packets" lineno="73907">
<summary>
Relabel packets to xen_server the packet type.
</summary>
@@ -70512,85 +53729,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96725">
-<summary>
-Send and receive TCP traffic on the xfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_xfs_port" lineno="96740">
-<summary>
-Send UDP traffic on the xfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96755">
-<summary>
-Do not audit attempts to send UDP traffic on the xfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_xfs_port" lineno="96770">
-<summary>
-Receive UDP traffic on the xfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96785">
-<summary>
-Do not audit attempts to receive UDP traffic on the xfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_xfs_port" lineno="96800">
-<summary>
-Send and receive UDP traffic on the xfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96816">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the xfs port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_xfs_port" lineno="96831">
+<interface name="corenet_tcp_bind_xfs_port" lineno="73929">
<summary>
Bind TCP sockets to the xfs port.
</summary>
@@ -70601,7 +53740,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xfs_port" lineno="96851">
+<interface name="corenet_udp_bind_xfs_port" lineno="73949">
<summary>
Bind UDP sockets to the xfs port.
</summary>
@@ -70612,7 +53751,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xfs_port" lineno="96870">
+<interface name="corenet_tcp_connect_xfs_port" lineno="73968">
<summary>
Make a TCP connection to the xfs port.
</summary>
@@ -70622,7 +53761,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xfs_client_packets" lineno="96890">
+<interface name="corenet_send_xfs_client_packets" lineno="73988">
<summary>
Send xfs_client packets.
</summary>
@@ -70633,7 +53772,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96909">
+<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="74007">
<summary>
Do not audit attempts to send xfs_client packets.
</summary>
@@ -70644,7 +53783,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xfs_client_packets" lineno="96928">
+<interface name="corenet_receive_xfs_client_packets" lineno="74026">
<summary>
Receive xfs_client packets.
</summary>
@@ -70655,7 +53794,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96947">
+<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="74045">
<summary>
Do not audit attempts to receive xfs_client packets.
</summary>
@@ -70666,7 +53805,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xfs_client_packets" lineno="96966">
+<interface name="corenet_sendrecv_xfs_client_packets" lineno="74064">
<summary>
Send and receive xfs_client packets.
</summary>
@@ -70677,7 +53816,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96982">
+<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="74080">
<summary>
Do not audit attempts to send and receive xfs_client packets.
</summary>
@@ -70688,7 +53827,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xfs_client_packets" lineno="96997">
+<interface name="corenet_relabelto_xfs_client_packets" lineno="74095">
<summary>
Relabel packets to xfs_client the packet type.
</summary>
@@ -70698,7 +53837,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xfs_server_packets" lineno="97017">
+<interface name="corenet_send_xfs_server_packets" lineno="74115">
<summary>
Send xfs_server packets.
</summary>
@@ -70709,7 +53848,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="97036">
+<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="74134">
<summary>
Do not audit attempts to send xfs_server packets.
</summary>
@@ -70720,7 +53859,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xfs_server_packets" lineno="97055">
+<interface name="corenet_receive_xfs_server_packets" lineno="74153">
<summary>
Receive xfs_server packets.
</summary>
@@ -70731,7 +53870,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="97074">
+<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="74172">
<summary>
Do not audit attempts to receive xfs_server packets.
</summary>
@@ -70742,7 +53881,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xfs_server_packets" lineno="97093">
+<interface name="corenet_sendrecv_xfs_server_packets" lineno="74191">
<summary>
Send and receive xfs_server packets.
</summary>
@@ -70753,7 +53892,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="97109">
+<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="74207">
<summary>
Do not audit attempts to send and receive xfs_server packets.
</summary>
@@ -70764,7 +53903,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xfs_server_packets" lineno="97124">
+<interface name="corenet_relabelto_xfs_server_packets" lineno="74222">
<summary>
Relabel packets to xfs_server the packet type.
</summary>
@@ -70774,85 +53913,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xserver_port" lineno="97146">
-<summary>
-Send and receive TCP traffic on the xserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_xserver_port" lineno="97161">
-<summary>
-Send UDP traffic on the xserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="97176">
-<summary>
-Do not audit attempts to send UDP traffic on the xserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_xserver_port" lineno="97191">
-<summary>
-Receive UDP traffic on the xserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="97206">
-<summary>
-Do not audit attempts to receive UDP traffic on the xserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_xserver_port" lineno="97221">
-<summary>
-Send and receive UDP traffic on the xserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="97237">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the xserver port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_xserver_port" lineno="97252">
+<interface name="corenet_tcp_bind_xserver_port" lineno="74244">
<summary>
Bind TCP sockets to the xserver port.
</summary>
@@ -70863,7 +53924,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xserver_port" lineno="97272">
+<interface name="corenet_udp_bind_xserver_port" lineno="74264">
<summary>
Bind UDP sockets to the xserver port.
</summary>
@@ -70874,7 +53935,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xserver_port" lineno="97291">
+<interface name="corenet_tcp_connect_xserver_port" lineno="74283">
<summary>
Make a TCP connection to the xserver port.
</summary>
@@ -70884,7 +53945,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xserver_client_packets" lineno="97311">
+<interface name="corenet_send_xserver_client_packets" lineno="74303">
<summary>
Send xserver_client packets.
</summary>
@@ -70895,7 +53956,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="97330">
+<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="74322">
<summary>
Do not audit attempts to send xserver_client packets.
</summary>
@@ -70906,7 +53967,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xserver_client_packets" lineno="97349">
+<interface name="corenet_receive_xserver_client_packets" lineno="74341">
<summary>
Receive xserver_client packets.
</summary>
@@ -70917,7 +53978,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="97368">
+<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="74360">
<summary>
Do not audit attempts to receive xserver_client packets.
</summary>
@@ -70928,7 +53989,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xserver_client_packets" lineno="97387">
+<interface name="corenet_sendrecv_xserver_client_packets" lineno="74379">
<summary>
Send and receive xserver_client packets.
</summary>
@@ -70939,7 +54000,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="97403">
+<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="74395">
<summary>
Do not audit attempts to send and receive xserver_client packets.
</summary>
@@ -70950,7 +54011,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xserver_client_packets" lineno="97418">
+<interface name="corenet_relabelto_xserver_client_packets" lineno="74410">
<summary>
Relabel packets to xserver_client the packet type.
</summary>
@@ -70960,7 +54021,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xserver_server_packets" lineno="97438">
+<interface name="corenet_send_xserver_server_packets" lineno="74430">
<summary>
Send xserver_server packets.
</summary>
@@ -70971,7 +54032,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97457">
+<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="74449">
<summary>
Do not audit attempts to send xserver_server packets.
</summary>
@@ -70982,7 +54043,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xserver_server_packets" lineno="97476">
+<interface name="corenet_receive_xserver_server_packets" lineno="74468">
<summary>
Receive xserver_server packets.
</summary>
@@ -70993,7 +54054,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97495">
+<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="74487">
<summary>
Do not audit attempts to receive xserver_server packets.
</summary>
@@ -71004,7 +54065,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xserver_server_packets" lineno="97514">
+<interface name="corenet_sendrecv_xserver_server_packets" lineno="74506">
<summary>
Send and receive xserver_server packets.
</summary>
@@ -71015,7 +54076,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97530">
+<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="74522">
<summary>
Do not audit attempts to send and receive xserver_server packets.
</summary>
@@ -71026,7 +54087,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xserver_server_packets" lineno="97545">
+<interface name="corenet_relabelto_xserver_server_packets" lineno="74537">
<summary>
Relabel packets to xserver_server the packet type.
</summary>
@@ -71036,85 +54097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97567">
-<summary>
-Send and receive TCP traffic on the zarafa port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zarafa_port" lineno="97582">
-<summary>
-Send UDP traffic on the zarafa port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97597">
-<summary>
-Do not audit attempts to send UDP traffic on the zarafa port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zarafa_port" lineno="97612">
-<summary>
-Receive UDP traffic on the zarafa port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97627">
-<summary>
-Do not audit attempts to receive UDP traffic on the zarafa port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97642">
-<summary>
-Send and receive UDP traffic on the zarafa port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97658">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zarafa port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zarafa_port" lineno="97673">
+<interface name="corenet_tcp_bind_zarafa_port" lineno="74559">
<summary>
Bind TCP sockets to the zarafa port.
</summary>
@@ -71125,7 +54108,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zarafa_port" lineno="97693">
+<interface name="corenet_udp_bind_zarafa_port" lineno="74579">
<summary>
Bind UDP sockets to the zarafa port.
</summary>
@@ -71136,7 +54119,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zarafa_port" lineno="97712">
+<interface name="corenet_tcp_connect_zarafa_port" lineno="74598">
<summary>
Make a TCP connection to the zarafa port.
</summary>
@@ -71146,7 +54129,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zarafa_client_packets" lineno="97732">
+<interface name="corenet_send_zarafa_client_packets" lineno="74618">
<summary>
Send zarafa_client packets.
</summary>
@@ -71157,7 +54140,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97751">
+<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="74637">
<summary>
Do not audit attempts to send zarafa_client packets.
</summary>
@@ -71168,7 +54151,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zarafa_client_packets" lineno="97770">
+<interface name="corenet_receive_zarafa_client_packets" lineno="74656">
<summary>
Receive zarafa_client packets.
</summary>
@@ -71179,7 +54162,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97789">
+<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="74675">
<summary>
Do not audit attempts to receive zarafa_client packets.
</summary>
@@ -71190,7 +54173,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97808">
+<interface name="corenet_sendrecv_zarafa_client_packets" lineno="74694">
<summary>
Send and receive zarafa_client packets.
</summary>
@@ -71201,7 +54184,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97824">
+<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="74710">
<summary>
Do not audit attempts to send and receive zarafa_client packets.
</summary>
@@ -71212,7 +54195,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zarafa_client_packets" lineno="97839">
+<interface name="corenet_relabelto_zarafa_client_packets" lineno="74725">
<summary>
Relabel packets to zarafa_client the packet type.
</summary>
@@ -71222,7 +54205,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zarafa_server_packets" lineno="97859">
+<interface name="corenet_send_zarafa_server_packets" lineno="74745">
<summary>
Send zarafa_server packets.
</summary>
@@ -71233,7 +54216,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97878">
+<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="74764">
<summary>
Do not audit attempts to send zarafa_server packets.
</summary>
@@ -71244,7 +54227,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zarafa_server_packets" lineno="97897">
+<interface name="corenet_receive_zarafa_server_packets" lineno="74783">
<summary>
Receive zarafa_server packets.
</summary>
@@ -71255,7 +54238,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97916">
+<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="74802">
<summary>
Do not audit attempts to receive zarafa_server packets.
</summary>
@@ -71266,7 +54249,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97935">
+<interface name="corenet_sendrecv_zarafa_server_packets" lineno="74821">
<summary>
Send and receive zarafa_server packets.
</summary>
@@ -71277,7 +54260,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97951">
+<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="74837">
<summary>
Do not audit attempts to send and receive zarafa_server packets.
</summary>
@@ -71288,7 +54271,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zarafa_server_packets" lineno="97966">
+<interface name="corenet_relabelto_zarafa_server_packets" lineno="74852">
<summary>
Relabel packets to zarafa_server the packet type.
</summary>
@@ -71298,85 +54281,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97988">
-<summary>
-Send and receive TCP traffic on the zabbix port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zabbix_port" lineno="98003">
-<summary>
-Send UDP traffic on the zabbix port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="98018">
-<summary>
-Do not audit attempts to send UDP traffic on the zabbix port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zabbix_port" lineno="98033">
-<summary>
-Receive UDP traffic on the zabbix port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="98048">
-<summary>
-Do not audit attempts to receive UDP traffic on the zabbix port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zabbix_port" lineno="98063">
-<summary>
-Send and receive UDP traffic on the zabbix port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="98079">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zabbix port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zabbix_port" lineno="98094">
+<interface name="corenet_tcp_bind_zabbix_port" lineno="74874">
<summary>
Bind TCP sockets to the zabbix port.
</summary>
@@ -71387,7 +54292,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zabbix_port" lineno="98114">
+<interface name="corenet_udp_bind_zabbix_port" lineno="74894">
<summary>
Bind UDP sockets to the zabbix port.
</summary>
@@ -71398,7 +54303,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zabbix_port" lineno="98133">
+<interface name="corenet_tcp_connect_zabbix_port" lineno="74913">
<summary>
Make a TCP connection to the zabbix port.
</summary>
@@ -71408,7 +54313,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_client_packets" lineno="98153">
+<interface name="corenet_send_zabbix_client_packets" lineno="74933">
<summary>
Send zabbix_client packets.
</summary>
@@ -71419,7 +54324,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="98172">
+<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="74952">
<summary>
Do not audit attempts to send zabbix_client packets.
</summary>
@@ -71430,7 +54335,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_client_packets" lineno="98191">
+<interface name="corenet_receive_zabbix_client_packets" lineno="74971">
<summary>
Receive zabbix_client packets.
</summary>
@@ -71441,7 +54346,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="98210">
+<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="74990">
<summary>
Do not audit attempts to receive zabbix_client packets.
</summary>
@@ -71452,7 +54357,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_client_packets" lineno="98229">
+<interface name="corenet_sendrecv_zabbix_client_packets" lineno="75009">
<summary>
Send and receive zabbix_client packets.
</summary>
@@ -71463,7 +54368,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="98245">
+<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="75025">
<summary>
Do not audit attempts to send and receive zabbix_client packets.
</summary>
@@ -71474,7 +54379,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_client_packets" lineno="98260">
+<interface name="corenet_relabelto_zabbix_client_packets" lineno="75040">
<summary>
Relabel packets to zabbix_client the packet type.
</summary>
@@ -71484,7 +54389,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_server_packets" lineno="98280">
+<interface name="corenet_send_zabbix_server_packets" lineno="75060">
<summary>
Send zabbix_server packets.
</summary>
@@ -71495,7 +54400,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="98299">
+<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="75079">
<summary>
Do not audit attempts to send zabbix_server packets.
</summary>
@@ -71506,7 +54411,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_server_packets" lineno="98318">
+<interface name="corenet_receive_zabbix_server_packets" lineno="75098">
<summary>
Receive zabbix_server packets.
</summary>
@@ -71517,7 +54422,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="98337">
+<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="75117">
<summary>
Do not audit attempts to receive zabbix_server packets.
</summary>
@@ -71528,7 +54433,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_server_packets" lineno="98356">
+<interface name="corenet_sendrecv_zabbix_server_packets" lineno="75136">
<summary>
Send and receive zabbix_server packets.
</summary>
@@ -71539,7 +54444,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="98372">
+<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="75152">
<summary>
Do not audit attempts to send and receive zabbix_server packets.
</summary>
@@ -71550,7 +54455,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_server_packets" lineno="98387">
+<interface name="corenet_relabelto_zabbix_server_packets" lineno="75167">
<summary>
Relabel packets to zabbix_server the packet type.
</summary>
@@ -71560,85 +54465,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="98409">
-<summary>
-Send and receive TCP traffic on the zabbix_agent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zabbix_agent_port" lineno="98424">
-<summary>
-Send UDP traffic on the zabbix_agent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98439">
-<summary>
-Do not audit attempts to send UDP traffic on the zabbix_agent port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98454">
-<summary>
-Receive UDP traffic on the zabbix_agent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98469">
-<summary>
-Do not audit attempts to receive UDP traffic on the zabbix_agent port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98484">
-<summary>
-Send and receive UDP traffic on the zabbix_agent port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98500">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zabbix_agent port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98515">
+<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="75189">
<summary>
Bind TCP sockets to the zabbix_agent port.
</summary>
@@ -71649,7 +54476,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98535">
+<interface name="corenet_udp_bind_zabbix_agent_port" lineno="75209">
<summary>
Bind UDP sockets to the zabbix_agent port.
</summary>
@@ -71660,7 +54487,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98554">
+<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="75228">
<summary>
Make a TCP connection to the zabbix_agent port.
</summary>
@@ -71670,7 +54497,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_agent_client_packets" lineno="98574">
+<interface name="corenet_send_zabbix_agent_client_packets" lineno="75248">
<summary>
Send zabbix_agent_client packets.
</summary>
@@ -71681,7 +54508,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98593">
+<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="75267">
<summary>
Do not audit attempts to send zabbix_agent_client packets.
</summary>
@@ -71692,7 +54519,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98612">
+<interface name="corenet_receive_zabbix_agent_client_packets" lineno="75286">
<summary>
Receive zabbix_agent_client packets.
</summary>
@@ -71703,7 +54530,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98631">
+<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="75305">
<summary>
Do not audit attempts to receive zabbix_agent_client packets.
</summary>
@@ -71714,7 +54541,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98650">
+<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="75324">
<summary>
Send and receive zabbix_agent_client packets.
</summary>
@@ -71725,7 +54552,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98666">
+<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="75340">
<summary>
Do not audit attempts to send and receive zabbix_agent_client packets.
</summary>
@@ -71736,7 +54563,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98681">
+<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="75355">
<summary>
Relabel packets to zabbix_agent_client the packet type.
</summary>
@@ -71746,7 +54573,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_agent_server_packets" lineno="98701">
+<interface name="corenet_send_zabbix_agent_server_packets" lineno="75375">
<summary>
Send zabbix_agent_server packets.
</summary>
@@ -71757,7 +54584,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98720">
+<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="75394">
<summary>
Do not audit attempts to send zabbix_agent_server packets.
</summary>
@@ -71768,7 +54595,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98739">
+<interface name="corenet_receive_zabbix_agent_server_packets" lineno="75413">
<summary>
Receive zabbix_agent_server packets.
</summary>
@@ -71779,7 +54606,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98758">
+<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="75432">
<summary>
Do not audit attempts to receive zabbix_agent_server packets.
</summary>
@@ -71790,7 +54617,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98777">
+<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="75451">
<summary>
Send and receive zabbix_agent_server packets.
</summary>
@@ -71801,7 +54628,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98793">
+<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="75467">
<summary>
Do not audit attempts to send and receive zabbix_agent_server packets.
</summary>
@@ -71812,7 +54639,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98808">
+<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="75482">
<summary>
Relabel packets to zabbix_agent_server the packet type.
</summary>
@@ -71822,85 +54649,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98830">
-<summary>
-Send and receive TCP traffic on the zookeeper_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zookeeper_client_port" lineno="98845">
-<summary>
-Send UDP traffic on the zookeeper_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98860">
-<summary>
-Do not audit attempts to send UDP traffic on the zookeeper_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98875">
-<summary>
-Receive UDP traffic on the zookeeper_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98890">
-<summary>
-Do not audit attempts to receive UDP traffic on the zookeeper_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98905">
-<summary>
-Send and receive UDP traffic on the zookeeper_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98921">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zookeeper_client port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98936">
+<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="75504">
<summary>
Bind TCP sockets to the zookeeper_client port.
</summary>
@@ -71911,7 +54660,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98956">
+<interface name="corenet_udp_bind_zookeeper_client_port" lineno="75524">
<summary>
Bind UDP sockets to the zookeeper_client port.
</summary>
@@ -71922,7 +54671,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98975">
+<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="75543">
<summary>
Make a TCP connection to the zookeeper_client port.
</summary>
@@ -71932,7 +54681,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_client_client_packets" lineno="98995">
+<interface name="corenet_send_zookeeper_client_client_packets" lineno="75563">
<summary>
Send zookeeper_client_client packets.
</summary>
@@ -71943,7 +54692,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="99014">
+<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="75582">
<summary>
Do not audit attempts to send zookeeper_client_client packets.
</summary>
@@ -71954,7 +54703,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_client_client_packets" lineno="99033">
+<interface name="corenet_receive_zookeeper_client_client_packets" lineno="75601">
<summary>
Receive zookeeper_client_client packets.
</summary>
@@ -71965,7 +54714,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="99052">
+<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="75620">
<summary>
Do not audit attempts to receive zookeeper_client_client packets.
</summary>
@@ -71976,7 +54725,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="99071">
+<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="75639">
<summary>
Send and receive zookeeper_client_client packets.
</summary>
@@ -71987,7 +54736,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="99087">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="75655">
<summary>
Do not audit attempts to send and receive zookeeper_client_client packets.
</summary>
@@ -71998,7 +54747,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="99102">
+<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="75670">
<summary>
Relabel packets to zookeeper_client_client the packet type.
</summary>
@@ -72008,7 +54757,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_client_server_packets" lineno="99122">
+<interface name="corenet_send_zookeeper_client_server_packets" lineno="75690">
<summary>
Send zookeeper_client_server packets.
</summary>
@@ -72019,7 +54768,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="99141">
+<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="75709">
<summary>
Do not audit attempts to send zookeeper_client_server packets.
</summary>
@@ -72030,7 +54779,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_client_server_packets" lineno="99160">
+<interface name="corenet_receive_zookeeper_client_server_packets" lineno="75728">
<summary>
Receive zookeeper_client_server packets.
</summary>
@@ -72041,7 +54790,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="99179">
+<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="75747">
<summary>
Do not audit attempts to receive zookeeper_client_server packets.
</summary>
@@ -72052,7 +54801,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="99198">
+<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="75766">
<summary>
Send and receive zookeeper_client_server packets.
</summary>
@@ -72063,7 +54812,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="99214">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="75782">
<summary>
Do not audit attempts to send and receive zookeeper_client_server packets.
</summary>
@@ -72074,7 +54823,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="99229">
+<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="75797">
<summary>
Relabel packets to zookeeper_client_server the packet type.
</summary>
@@ -72084,85 +54833,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="99251">
-<summary>
-Send and receive TCP traffic on the zookeeper_election port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zookeeper_election_port" lineno="99266">
-<summary>
-Send UDP traffic on the zookeeper_election port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="99281">
-<summary>
-Do not audit attempts to send UDP traffic on the zookeeper_election port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zookeeper_election_port" lineno="99296">
-<summary>
-Receive UDP traffic on the zookeeper_election port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="99311">
-<summary>
-Do not audit attempts to receive UDP traffic on the zookeeper_election port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="99326">
-<summary>
-Send and receive UDP traffic on the zookeeper_election port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="99342">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zookeeper_election port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="99357">
+<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="75819">
<summary>
Bind TCP sockets to the zookeeper_election port.
</summary>
@@ -72173,7 +54844,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zookeeper_election_port" lineno="99377">
+<interface name="corenet_udp_bind_zookeeper_election_port" lineno="75839">
<summary>
Bind UDP sockets to the zookeeper_election port.
</summary>
@@ -72184,7 +54855,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="99396">
+<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="75858">
<summary>
Make a TCP connection to the zookeeper_election port.
</summary>
@@ -72194,7 +54865,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_election_client_packets" lineno="99416">
+<interface name="corenet_send_zookeeper_election_client_packets" lineno="75878">
<summary>
Send zookeeper_election_client packets.
</summary>
@@ -72205,7 +54876,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="99435">
+<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="75897">
<summary>
Do not audit attempts to send zookeeper_election_client packets.
</summary>
@@ -72216,7 +54887,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99454">
+<interface name="corenet_receive_zookeeper_election_client_packets" lineno="75916">
<summary>
Receive zookeeper_election_client packets.
</summary>
@@ -72227,7 +54898,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99473">
+<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="75935">
<summary>
Do not audit attempts to receive zookeeper_election_client packets.
</summary>
@@ -72238,7 +54909,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99492">
+<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="75954">
<summary>
Send and receive zookeeper_election_client packets.
</summary>
@@ -72249,7 +54920,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99508">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="75970">
<summary>
Do not audit attempts to send and receive zookeeper_election_client packets.
</summary>
@@ -72260,7 +54931,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99523">
+<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="75985">
<summary>
Relabel packets to zookeeper_election_client the packet type.
</summary>
@@ -72270,7 +54941,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_election_server_packets" lineno="99543">
+<interface name="corenet_send_zookeeper_election_server_packets" lineno="76005">
<summary>
Send zookeeper_election_server packets.
</summary>
@@ -72281,7 +54952,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99562">
+<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="76024">
<summary>
Do not audit attempts to send zookeeper_election_server packets.
</summary>
@@ -72292,7 +54963,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99581">
+<interface name="corenet_receive_zookeeper_election_server_packets" lineno="76043">
<summary>
Receive zookeeper_election_server packets.
</summary>
@@ -72303,7 +54974,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99600">
+<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="76062">
<summary>
Do not audit attempts to receive zookeeper_election_server packets.
</summary>
@@ -72314,7 +54985,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99619">
+<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="76081">
<summary>
Send and receive zookeeper_election_server packets.
</summary>
@@ -72325,7 +54996,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99635">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="76097">
<summary>
Do not audit attempts to send and receive zookeeper_election_server packets.
</summary>
@@ -72336,7 +55007,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99650">
+<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="76112">
<summary>
Relabel packets to zookeeper_election_server the packet type.
</summary>
@@ -72346,85 +55017,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99672">
-<summary>
-Send and receive TCP traffic on the zookeeper_leader port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99687">
-<summary>
-Send UDP traffic on the zookeeper_leader port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99702">
-<summary>
-Do not audit attempts to send UDP traffic on the zookeeper_leader port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99717">
-<summary>
-Receive UDP traffic on the zookeeper_leader port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99732">
-<summary>
-Do not audit attempts to receive UDP traffic on the zookeeper_leader port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99747">
-<summary>
-Send and receive UDP traffic on the zookeeper_leader port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99763">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zookeeper_leader port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99778">
+<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="76134">
<summary>
Bind TCP sockets to the zookeeper_leader port.
</summary>
@@ -72435,7 +55028,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99798">
+<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="76154">
<summary>
Bind UDP sockets to the zookeeper_leader port.
</summary>
@@ -72446,7 +55039,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99817">
+<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="76173">
<summary>
Make a TCP connection to the zookeeper_leader port.
</summary>
@@ -72456,7 +55049,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99837">
+<interface name="corenet_send_zookeeper_leader_client_packets" lineno="76193">
<summary>
Send zookeeper_leader_client packets.
</summary>
@@ -72467,7 +55060,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99856">
+<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="76212">
<summary>
Do not audit attempts to send zookeeper_leader_client packets.
</summary>
@@ -72478,7 +55071,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99875">
+<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="76231">
<summary>
Receive zookeeper_leader_client packets.
</summary>
@@ -72489,7 +55082,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99894">
+<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="76250">
<summary>
Do not audit attempts to receive zookeeper_leader_client packets.
</summary>
@@ -72500,7 +55093,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99913">
+<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="76269">
<summary>
Send and receive zookeeper_leader_client packets.
</summary>
@@ -72511,7 +55104,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99929">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="76285">
<summary>
Do not audit attempts to send and receive zookeeper_leader_client packets.
</summary>
@@ -72522,7 +55115,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99944">
+<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="76300">
<summary>
Relabel packets to zookeeper_leader_client the packet type.
</summary>
@@ -72532,7 +55125,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99964">
+<interface name="corenet_send_zookeeper_leader_server_packets" lineno="76320">
<summary>
Send zookeeper_leader_server packets.
</summary>
@@ -72543,7 +55136,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99983">
+<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="76339">
<summary>
Do not audit attempts to send zookeeper_leader_server packets.
</summary>
@@ -72554,7 +55147,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="100002">
+<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="76358">
<summary>
Receive zookeeper_leader_server packets.
</summary>
@@ -72565,7 +55158,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="100021">
+<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="76377">
<summary>
Do not audit attempts to receive zookeeper_leader_server packets.
</summary>
@@ -72576,7 +55169,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="100040">
+<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="76396">
<summary>
Send and receive zookeeper_leader_server packets.
</summary>
@@ -72587,7 +55180,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="100056">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="76412">
<summary>
Do not audit attempts to send and receive zookeeper_leader_server packets.
</summary>
@@ -72598,7 +55191,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="100071">
+<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="76427">
<summary>
Relabel packets to zookeeper_leader_server the packet type.
</summary>
@@ -72608,85 +55201,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zebra_port" lineno="100093">
-<summary>
-Send and receive TCP traffic on the zebra port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zebra_port" lineno="100108">
-<summary>
-Send UDP traffic on the zebra port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="100123">
-<summary>
-Do not audit attempts to send UDP traffic on the zebra port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zebra_port" lineno="100138">
-<summary>
-Receive UDP traffic on the zebra port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="100153">
-<summary>
-Do not audit attempts to receive UDP traffic on the zebra port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zebra_port" lineno="100168">
-<summary>
-Send and receive UDP traffic on the zebra port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="100184">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zebra port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zebra_port" lineno="100199">
+<interface name="corenet_tcp_bind_zebra_port" lineno="76449">
<summary>
Bind TCP sockets to the zebra port.
</summary>
@@ -72697,7 +55212,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zebra_port" lineno="100219">
+<interface name="corenet_udp_bind_zebra_port" lineno="76469">
<summary>
Bind UDP sockets to the zebra port.
</summary>
@@ -72708,7 +55223,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zebra_port" lineno="100238">
+<interface name="corenet_tcp_connect_zebra_port" lineno="76488">
<summary>
Make a TCP connection to the zebra port.
</summary>
@@ -72718,7 +55233,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zebra_client_packets" lineno="100258">
+<interface name="corenet_send_zebra_client_packets" lineno="76508">
<summary>
Send zebra_client packets.
</summary>
@@ -72729,7 +55244,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="100277">
+<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="76527">
<summary>
Do not audit attempts to send zebra_client packets.
</summary>
@@ -72740,7 +55255,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zebra_client_packets" lineno="100296">
+<interface name="corenet_receive_zebra_client_packets" lineno="76546">
<summary>
Receive zebra_client packets.
</summary>
@@ -72751,7 +55266,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="100315">
+<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="76565">
<summary>
Do not audit attempts to receive zebra_client packets.
</summary>
@@ -72762,7 +55277,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zebra_client_packets" lineno="100334">
+<interface name="corenet_sendrecv_zebra_client_packets" lineno="76584">
<summary>
Send and receive zebra_client packets.
</summary>
@@ -72773,7 +55288,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="100350">
+<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="76600">
<summary>
Do not audit attempts to send and receive zebra_client packets.
</summary>
@@ -72784,7 +55299,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zebra_client_packets" lineno="100365">
+<interface name="corenet_relabelto_zebra_client_packets" lineno="76615">
<summary>
Relabel packets to zebra_client the packet type.
</summary>
@@ -72794,7 +55309,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zebra_server_packets" lineno="100385">
+<interface name="corenet_send_zebra_server_packets" lineno="76635">
<summary>
Send zebra_server packets.
</summary>
@@ -72805,7 +55320,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="100404">
+<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="76654">
<summary>
Do not audit attempts to send zebra_server packets.
</summary>
@@ -72816,7 +55331,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zebra_server_packets" lineno="100423">
+<interface name="corenet_receive_zebra_server_packets" lineno="76673">
<summary>
Receive zebra_server packets.
</summary>
@@ -72827,7 +55342,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100442">
+<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="76692">
<summary>
Do not audit attempts to receive zebra_server packets.
</summary>
@@ -72838,7 +55353,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zebra_server_packets" lineno="100461">
+<interface name="corenet_sendrecv_zebra_server_packets" lineno="76711">
<summary>
Send and receive zebra_server packets.
</summary>
@@ -72849,7 +55364,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100477">
+<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="76727">
<summary>
Do not audit attempts to send and receive zebra_server packets.
</summary>
@@ -72860,7 +55375,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zebra_server_packets" lineno="100492">
+<interface name="corenet_relabelto_zebra_server_packets" lineno="76742">
<summary>
Relabel packets to zebra_server the packet type.
</summary>
@@ -72870,85 +55385,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zented_port" lineno="100514">
-<summary>
-Send and receive TCP traffic on the zented port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zented_port" lineno="100529">
-<summary>
-Send UDP traffic on the zented port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100544">
-<summary>
-Do not audit attempts to send UDP traffic on the zented port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zented_port" lineno="100559">
-<summary>
-Receive UDP traffic on the zented port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100574">
-<summary>
-Do not audit attempts to receive UDP traffic on the zented port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zented_port" lineno="100589">
-<summary>
-Send and receive UDP traffic on the zented port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100605">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zented port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zented_port" lineno="100620">
+<interface name="corenet_tcp_bind_zented_port" lineno="76764">
<summary>
Bind TCP sockets to the zented port.
</summary>
@@ -72959,7 +55396,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zented_port" lineno="100640">
+<interface name="corenet_udp_bind_zented_port" lineno="76784">
<summary>
Bind UDP sockets to the zented port.
</summary>
@@ -72970,7 +55407,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zented_port" lineno="100659">
+<interface name="corenet_tcp_connect_zented_port" lineno="76803">
<summary>
Make a TCP connection to the zented port.
</summary>
@@ -72980,7 +55417,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zented_client_packets" lineno="100679">
+<interface name="corenet_send_zented_client_packets" lineno="76823">
<summary>
Send zented_client packets.
</summary>
@@ -72991,7 +55428,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100698">
+<interface name="corenet_dontaudit_send_zented_client_packets" lineno="76842">
<summary>
Do not audit attempts to send zented_client packets.
</summary>
@@ -73002,7 +55439,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zented_client_packets" lineno="100717">
+<interface name="corenet_receive_zented_client_packets" lineno="76861">
<summary>
Receive zented_client packets.
</summary>
@@ -73013,7 +55450,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100736">
+<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="76880">
<summary>
Do not audit attempts to receive zented_client packets.
</summary>
@@ -73024,7 +55461,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zented_client_packets" lineno="100755">
+<interface name="corenet_sendrecv_zented_client_packets" lineno="76899">
<summary>
Send and receive zented_client packets.
</summary>
@@ -73035,7 +55472,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100771">
+<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="76915">
<summary>
Do not audit attempts to send and receive zented_client packets.
</summary>
@@ -73046,7 +55483,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zented_client_packets" lineno="100786">
+<interface name="corenet_relabelto_zented_client_packets" lineno="76930">
<summary>
Relabel packets to zented_client the packet type.
</summary>
@@ -73056,7 +55493,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zented_server_packets" lineno="100806">
+<interface name="corenet_send_zented_server_packets" lineno="76950">
<summary>
Send zented_server packets.
</summary>
@@ -73067,7 +55504,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100825">
+<interface name="corenet_dontaudit_send_zented_server_packets" lineno="76969">
<summary>
Do not audit attempts to send zented_server packets.
</summary>
@@ -73078,7 +55515,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zented_server_packets" lineno="100844">
+<interface name="corenet_receive_zented_server_packets" lineno="76988">
<summary>
Receive zented_server packets.
</summary>
@@ -73089,7 +55526,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100863">
+<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="77007">
<summary>
Do not audit attempts to receive zented_server packets.
</summary>
@@ -73100,7 +55537,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zented_server_packets" lineno="100882">
+<interface name="corenet_sendrecv_zented_server_packets" lineno="77026">
<summary>
Send and receive zented_server packets.
</summary>
@@ -73111,7 +55548,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100898">
+<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="77042">
<summary>
Do not audit attempts to send and receive zented_server packets.
</summary>
@@ -73122,7 +55559,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zented_server_packets" lineno="100913">
+<interface name="corenet_relabelto_zented_server_packets" lineno="77057">
<summary>
Relabel packets to zented_server the packet type.
</summary>
@@ -73132,85 +55569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zope_port" lineno="100935">
-<summary>
-Send and receive TCP traffic on the zope port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_zope_port" lineno="100950">
-<summary>
-Send UDP traffic on the zope port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100965">
-<summary>
-Do not audit attempts to send UDP traffic on the zope port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_zope_port" lineno="100980">
-<summary>
-Receive UDP traffic on the zope port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100995">
-<summary>
-Do not audit attempts to receive UDP traffic on the zope port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_zope_port" lineno="101010">
-<summary>
-Send and receive UDP traffic on the zope port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="101026">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the zope port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_zope_port" lineno="101041">
+<interface name="corenet_tcp_bind_zope_port" lineno="77079">
<summary>
Bind TCP sockets to the zope port.
</summary>
@@ -73221,7 +55580,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zope_port" lineno="101061">
+<interface name="corenet_udp_bind_zope_port" lineno="77099">
<summary>
Bind UDP sockets to the zope port.
</summary>
@@ -73232,7 +55591,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zope_port" lineno="101080">
+<interface name="corenet_tcp_connect_zope_port" lineno="77118">
<summary>
Make a TCP connection to the zope port.
</summary>
@@ -73242,7 +55601,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zope_client_packets" lineno="101100">
+<interface name="corenet_send_zope_client_packets" lineno="77138">
<summary>
Send zope_client packets.
</summary>
@@ -73253,7 +55612,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zope_client_packets" lineno="101119">
+<interface name="corenet_dontaudit_send_zope_client_packets" lineno="77157">
<summary>
Do not audit attempts to send zope_client packets.
</summary>
@@ -73264,7 +55623,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zope_client_packets" lineno="101138">
+<interface name="corenet_receive_zope_client_packets" lineno="77176">
<summary>
Receive zope_client packets.
</summary>
@@ -73275,7 +55634,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="101157">
+<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="77195">
<summary>
Do not audit attempts to receive zope_client packets.
</summary>
@@ -73286,7 +55645,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zope_client_packets" lineno="101176">
+<interface name="corenet_sendrecv_zope_client_packets" lineno="77214">
<summary>
Send and receive zope_client packets.
</summary>
@@ -73297,7 +55656,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="101192">
+<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="77230">
<summary>
Do not audit attempts to send and receive zope_client packets.
</summary>
@@ -73308,7 +55667,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zope_client_packets" lineno="101207">
+<interface name="corenet_relabelto_zope_client_packets" lineno="77245">
<summary>
Relabel packets to zope_client the packet type.
</summary>
@@ -73318,7 +55677,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zope_server_packets" lineno="101227">
+<interface name="corenet_send_zope_server_packets" lineno="77265">
<summary>
Send zope_server packets.
</summary>
@@ -73329,7 +55688,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zope_server_packets" lineno="101246">
+<interface name="corenet_dontaudit_send_zope_server_packets" lineno="77284">
<summary>
Do not audit attempts to send zope_server packets.
</summary>
@@ -73340,7 +55699,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zope_server_packets" lineno="101265">
+<interface name="corenet_receive_zope_server_packets" lineno="77303">
<summary>
Receive zope_server packets.
</summary>
@@ -73351,7 +55710,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="101284">
+<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="77322">
<summary>
Do not audit attempts to receive zope_server packets.
</summary>
@@ -73362,7 +55721,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zope_server_packets" lineno="101303">
+<interface name="corenet_sendrecv_zope_server_packets" lineno="77341">
<summary>
Send and receive zope_server packets.
</summary>
@@ -73373,7 +55732,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="101319">
+<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="77357">
<summary>
Do not audit attempts to send and receive zope_server packets.
</summary>
@@ -73384,7 +55743,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zope_server_packets" lineno="101334">
+<interface name="corenet_relabelto_zope_server_packets" lineno="77372">
<summary>
Relabel packets to zope_server the packet type.
</summary>
@@ -73394,7 +55753,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lo_if" lineno="101357">
+<interface name="corenet_tcp_sendrecv_lo_if" lineno="77395">
<summary>
Send and receive TCP network traffic on the lo interface.
</summary>
@@ -73405,7 +55764,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_lo_if" lineno="101376">
+<interface name="corenet_udp_send_lo_if" lineno="77414">
<summary>
Send UDP network traffic on the lo interface.
</summary>
@@ -73416,7 +55775,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_udp_receive_lo_if" lineno="101395">
+<interface name="corenet_udp_receive_lo_if" lineno="77433">
<summary>
Receive UDP network traffic on the lo interface.
</summary>
@@ -73427,7 +55786,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_udp_sendrecv_lo_if" lineno="101414">
+<interface name="corenet_udp_sendrecv_lo_if" lineno="77452">
<summary>
Send and receive UDP network traffic on the lo interface.
</summary>
@@ -73438,7 +55797,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_raw_send_lo_if" lineno="101430">
+<interface name="corenet_raw_send_lo_if" lineno="77468">
<summary>
Send raw IP packets on the lo interface.
</summary>
@@ -73449,7 +55808,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_raw_receive_lo_if" lineno="101449">
+<interface name="corenet_raw_receive_lo_if" lineno="77487">
<summary>
Receive raw IP packets on the lo interface.
</summary>
@@ -73460,7 +55819,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_raw_sendrecv_lo_if" lineno="101468">
+<interface name="corenet_raw_sendrecv_lo_if" lineno="77506">
<summary>
Send and receive raw IP packets on the lo interface.
</summary>
@@ -74829,7 +57188,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_kmsg" lineno="2417">
+<interface name="dev_rw_infiniband" lineno="2417">
+<summary>
+Allow read/write access to InfiniBand devices.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_read_kmsg" lineno="2435">
<summary>
Read the kernel messages
</summary>
@@ -74839,7 +57208,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_kmsg" lineno="2435">
+<interface name="dev_dontaudit_read_kmsg" lineno="2453">
<summary>
Do not audit attempts to read the kernel messages
</summary>
@@ -74849,7 +57218,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_kmsg" lineno="2453">
+<interface name="dev_write_kmsg" lineno="2471">
<summary>
Write to the kernel messages device
</summary>
@@ -74859,7 +57228,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_kmsg" lineno="2471">
+<interface name="dev_rw_kmsg" lineno="2489">
<summary>
Read and write to the kernel messages device
</summary>
@@ -74869,7 +57238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mounton_kmsg" lineno="2489">
+<interface name="dev_mounton_kmsg" lineno="2507">
<summary>
Mount on the kernel messages device
</summary>
@@ -74879,7 +57248,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_ksm_dev" lineno="2507">
+<interface name="dev_getattr_ksm_dev" lineno="2525">
<summary>
Get the attributes of the ksm devices.
</summary>
@@ -74889,7 +57258,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_ksm_dev" lineno="2525">
+<interface name="dev_setattr_ksm_dev" lineno="2543">
<summary>
Set the attributes of the ksm devices.
</summary>
@@ -74899,7 +57268,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_ksm" lineno="2543">
+<interface name="dev_read_ksm" lineno="2561">
<summary>
Read the ksm devices.
</summary>
@@ -74909,7 +57278,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_ksm" lineno="2561">
+<interface name="dev_rw_ksm" lineno="2579">
<summary>
Read and write to ksm devices.
</summary>
@@ -74919,7 +57288,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_kvm_dev" lineno="2579">
+<interface name="dev_getattr_kvm_dev" lineno="2597">
<summary>
Get the attributes of the kvm devices.
</summary>
@@ -74929,7 +57298,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_kvm_dev" lineno="2597">
+<interface name="dev_setattr_kvm_dev" lineno="2615">
<summary>
Set the attributes of the kvm devices.
</summary>
@@ -74939,7 +57308,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_kvm" lineno="2615">
+<interface name="dev_read_kvm" lineno="2633">
<summary>
Read the kvm devices.
</summary>
@@ -74949,7 +57318,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_kvm" lineno="2633">
+<interface name="dev_rw_kvm" lineno="2651">
<summary>
Read and write to kvm devices.
</summary>
@@ -74959,7 +57328,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_lirc" lineno="2651">
+<interface name="dev_read_lirc" lineno="2669">
<summary>
Read the lirc device.
</summary>
@@ -74969,7 +57338,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_lirc" lineno="2669">
+<interface name="dev_rw_lirc" lineno="2687">
<summary>
Read and write the lirc device.
</summary>
@@ -74979,7 +57348,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_filetrans_lirc" lineno="2693">
+<interface name="dev_filetrans_lirc" lineno="2711">
<summary>
Automatic type transition to the type
for lirc device nodes when created in /dev.
@@ -74995,7 +57364,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dev_rw_loop_control" lineno="2711">
+<interface name="dev_rw_loop_control" lineno="2729">
<summary>
Read and write the loop-control device.
</summary>
@@ -75005,7 +57374,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_lvm_control" lineno="2729">
+<interface name="dev_getattr_lvm_control" lineno="2747">
<summary>
Get the attributes of the lvm comtrol device.
</summary>
@@ -75015,7 +57384,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_lvm_control" lineno="2747">
+<interface name="dev_read_lvm_control" lineno="2765">
<summary>
Read the lvm comtrol device.
</summary>
@@ -75025,7 +57394,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_lvm_control" lineno="2765">
+<interface name="dev_rw_lvm_control" lineno="2783">
<summary>
Read and write the lvm control device.
</summary>
@@ -75035,7 +57404,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_rw_lvm_control" lineno="2783">
+<interface name="dev_dontaudit_rw_lvm_control" lineno="2801">
<summary>
Do not audit attempts to read and write lvm control device.
</summary>
@@ -75045,7 +57414,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_delete_lvm_control_dev" lineno="2801">
+<interface name="dev_delete_lvm_control_dev" lineno="2819">
<summary>
Delete the lvm control device.
</summary>
@@ -75055,7 +57424,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_memory_dev" lineno="2819">
+<interface name="dev_dontaudit_getattr_memory_dev" lineno="2837">
<summary>
dontaudit getattr raw memory devices (e.g. /dev/mem).
</summary>
@@ -75065,7 +57434,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_raw_memory" lineno="2840">
+<interface name="dev_read_raw_memory" lineno="2858">
<summary>
Read raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -75078,7 +57447,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_raw_memory_cond" lineno="2870">
+<interface name="dev_read_raw_memory_cond" lineno="2888">
<summary>
Read raw memory devices (e.g. /dev/mem) if a tunable is set.
This is extremely dangerous as it can bypass the
@@ -75096,7 +57465,7 @@ Tunable to depend on
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_raw_memory" lineno="2897">
+<interface name="dev_dontaudit_read_raw_memory" lineno="2915">
<summary>
Do not audit attempts to read raw memory devices
(e.g. /dev/mem).
@@ -75110,7 +57479,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_raw_memory" lineno="2918">
+<interface name="dev_write_raw_memory" lineno="2936">
<summary>
Write raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -75123,7 +57492,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_raw_memory_cond" lineno="2948">
+<interface name="dev_write_raw_memory_cond" lineno="2966">
<summary>
Write raw memory devices (e.g. /dev/mem) if a tunable is set.
This is extremely dangerous as it can bypass the
@@ -75141,7 +57510,7 @@ Tunable to depend on
</summary>
</param>
</interface>
-<interface name="dev_rx_raw_memory" lineno="2974">
+<interface name="dev_rx_raw_memory" lineno="2992">
<summary>
Read and execute raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -75154,7 +57523,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_wx_raw_memory" lineno="2996">
+<interface name="dev_wx_raw_memory" lineno="3014">
<summary>
Write and execute raw memory devices (e.g. /dev/mem).
This is extremely dangerous as it can bypass the
@@ -75167,7 +57536,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_wx_raw_memory_cond" lineno="3023">
+<interface name="dev_wx_raw_memory_cond" lineno="3041">
<summary>
Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set.
This is extremely dangerous as it can bypass the
@@ -75185,7 +57554,7 @@ Tunable to depend on
</summary>
</param>
</interface>
-<interface name="dev_getattr_misc_dev" lineno="3046">
+<interface name="dev_getattr_misc_dev" lineno="3064">
<summary>
Get the attributes of miscellaneous devices.
</summary>
@@ -75195,7 +57564,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_misc_dev" lineno="3065">
+<interface name="dev_dontaudit_getattr_misc_dev" lineno="3083">
<summary>
Do not audit attempts to get the attributes
of miscellaneous devices.
@@ -75206,7 +57575,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_misc_dev" lineno="3083">
+<interface name="dev_setattr_misc_dev" lineno="3101">
<summary>
Set the attributes of miscellaneous devices.
</summary>
@@ -75216,7 +57585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_misc_dev" lineno="3102">
+<interface name="dev_dontaudit_setattr_misc_dev" lineno="3120">
<summary>
Do not audit attempts to set the attributes
of miscellaneous devices.
@@ -75227,7 +57596,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_misc" lineno="3120">
+<interface name="dev_read_misc" lineno="3138">
<summary>
Read miscellaneous devices.
</summary>
@@ -75237,7 +57606,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_misc" lineno="3138">
+<interface name="dev_write_misc" lineno="3156">
<summary>
Write miscellaneous devices.
</summary>
@@ -75247,7 +57616,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_rw_misc" lineno="3156">
+<interface name="dev_dontaudit_rw_misc" lineno="3174">
<summary>
Do not audit attempts to read and write miscellaneous devices.
</summary>
@@ -75257,7 +57626,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_modem_dev" lineno="3174">
+<interface name="dev_getattr_modem_dev" lineno="3192">
<summary>
Get the attributes of the modem devices.
</summary>
@@ -75267,7 +57636,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_modem_dev" lineno="3192">
+<interface name="dev_setattr_modem_dev" lineno="3210">
<summary>
Set the attributes of the modem devices.
</summary>
@@ -75277,7 +57646,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_modem" lineno="3210">
+<interface name="dev_read_modem" lineno="3228">
<summary>
Read the modem devices.
</summary>
@@ -75287,7 +57656,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_modem" lineno="3228">
+<interface name="dev_rw_modem" lineno="3246">
<summary>
Read and write to modem devices.
</summary>
@@ -75297,7 +57666,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_mouse_dev" lineno="3246">
+<interface name="dev_getattr_mouse_dev" lineno="3264">
<summary>
Get the attributes of the mouse devices.
</summary>
@@ -75307,7 +57676,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_mouse_dev" lineno="3264">
+<interface name="dev_setattr_mouse_dev" lineno="3282">
<summary>
Set the attributes of the mouse devices.
</summary>
@@ -75317,7 +57686,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_mouse" lineno="3282">
+<interface name="dev_read_mouse" lineno="3300">
<summary>
Read the mouse devices.
</summary>
@@ -75327,7 +57696,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_mouse" lineno="3300">
+<interface name="dev_rw_mouse" lineno="3318">
<summary>
Read and write to mouse devices.
</summary>
@@ -75337,7 +57706,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_mtrr_dev" lineno="3319">
+<interface name="dev_getattr_mtrr_dev" lineno="3337">
<summary>
Get the attributes of the memory type range
registers (MTRR) device.
@@ -75348,7 +57717,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_write_mtrr" lineno="3339">
+<interface name="dev_dontaudit_write_mtrr" lineno="3357">
<summary>
Do not audit attempts to write the memory type
range registers (MTRR).
@@ -75359,7 +57728,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_mtrr" lineno="3358">
+<interface name="dev_rw_mtrr" lineno="3376">
<summary>
Read and write the memory type range registers (MTRR).
</summary>
@@ -75369,37 +57738,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_netcontrol_dev" lineno="3377">
-<summary>
-Get the attributes of the network control device (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dev_read_netcontrol" lineno="3392">
-<summary>
-Read the network control identity. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dev_rw_netcontrol" lineno="3407">
-<summary>
-Read and write the the network control device. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dev_getattr_null_dev" lineno="3422">
+<interface name="dev_getattr_null_dev" lineno="3395">
<summary>
Get the attributes of the null device nodes.
</summary>
@@ -75409,7 +57748,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_null_dev" lineno="3440">
+<interface name="dev_setattr_null_dev" lineno="3413">
<summary>
Set the attributes of the null device nodes.
</summary>
@@ -75419,7 +57758,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_null_dev" lineno="3459">
+<interface name="dev_dontaudit_setattr_null_dev" lineno="3432">
<summary>
Do not audit attempts to set the attributes of
the null device nodes.
@@ -75430,7 +57769,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_delete_null" lineno="3477">
+<interface name="dev_delete_null" lineno="3450">
<summary>
Delete the null device (/dev/null).
</summary>
@@ -75440,7 +57779,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_null" lineno="3495">
+<interface name="dev_rw_null" lineno="3468">
<summary>
Read and write to the null device (/dev/null).
</summary>
@@ -75450,7 +57789,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_null_dev" lineno="3513">
+<interface name="dev_create_null_dev" lineno="3486">
<summary>
Create the null device (/dev/null).
</summary>
@@ -75460,7 +57799,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_null_service" lineno="3532">
+<interface name="dev_manage_null_service" lineno="3505">
<summary>
Manage services with script type null_device_t for when
/lib/systemd/system/something.service is a link to /dev/null
@@ -75471,7 +57810,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3552">
+<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3525">
<summary>
Do not audit attempts to get the attributes
of the BIOS non-volatile RAM device.
@@ -75482,7 +57821,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_nvram" lineno="3570">
+<interface name="dev_rw_nvram" lineno="3543">
<summary>
Read and write BIOS non-volatile RAM.
</summary>
@@ -75492,7 +57831,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_printer_dev" lineno="3588">
+<interface name="dev_getattr_printer_dev" lineno="3561">
<summary>
Get the attributes of the printer device nodes.
</summary>
@@ -75502,7 +57841,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_printer_dev" lineno="3606">
+<interface name="dev_setattr_printer_dev" lineno="3579">
<summary>
Set the attributes of the printer device nodes.
</summary>
@@ -75512,7 +57851,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_append_printer" lineno="3625">
+<interface name="dev_append_printer" lineno="3598">
<summary>
Append the printer device.
</summary>
@@ -75522,7 +57861,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_printer" lineno="3643">
+<interface name="dev_rw_printer" lineno="3616">
<summary>
Read and write the printer device.
</summary>
@@ -75532,7 +57871,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_pmqos_dev" lineno="3661">
+<interface name="dev_getattr_pmqos_dev" lineno="3634">
<summary>
Get the attributes of PM QoS devices
</summary>
@@ -75542,7 +57881,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_pmqos" lineno="3679">
+<interface name="dev_read_pmqos" lineno="3652">
<summary>
Read the PM QoS devices.
</summary>
@@ -75552,7 +57891,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_pmqos" lineno="3697">
+<interface name="dev_rw_pmqos" lineno="3670">
<summary>
Read and write the the PM QoS devices.
</summary>
@@ -75562,7 +57901,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_qemu_dev" lineno="3716">
+<interface name="dev_getattr_qemu_dev" lineno="3689">
<summary>
Get the attributes of the QEMU
microcode and id interfaces.
@@ -75573,7 +57912,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_qemu_dev" lineno="3735">
+<interface name="dev_setattr_qemu_dev" lineno="3708">
<summary>
Set the attributes of the QEMU
microcode and id interfaces.
@@ -75584,7 +57923,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_qemu" lineno="3753">
+<interface name="dev_read_qemu" lineno="3726">
<summary>
Read the QEMU device
</summary>
@@ -75594,7 +57933,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_qemu" lineno="3771">
+<interface name="dev_rw_qemu" lineno="3744">
<summary>
Read and write the the QEMU device.
</summary>
@@ -75604,7 +57943,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_rand" lineno="3805">
+<interface name="dev_read_rand" lineno="3778">
<summary>
Read from random number generator
devices (e.g., /dev/random).
@@ -75630,7 +57969,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_dontaudit_read_rand" lineno="3824">
+<interface name="dev_dontaudit_read_rand" lineno="3797">
<summary>
Do not audit attempts to read from random
number generator devices (e.g., /dev/random)
@@ -75641,7 +57980,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_append_rand" lineno="3843">
+<interface name="dev_dontaudit_append_rand" lineno="3816">
<summary>
Do not audit attempts to append to random
number generator devices (e.g., /dev/random)
@@ -75652,7 +57991,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_rand" lineno="3863">
+<interface name="dev_write_rand" lineno="3836">
<summary>
Write to the random device (e.g., /dev/random). This adds
entropy used to generate the random data read from the
@@ -75664,7 +58003,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_rand_dev" lineno="3881">
+<interface name="dev_create_rand_dev" lineno="3854">
<summary>
Create the random device (/dev/random).
</summary>
@@ -75674,7 +58013,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_realtime_clock" lineno="3899">
+<interface name="dev_read_realtime_clock" lineno="3872">
<summary>
Read the realtime clock (/dev/rtc).
</summary>
@@ -75684,7 +58023,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_realtime_clock" lineno="3917">
+<interface name="dev_write_realtime_clock" lineno="3890">
<summary>
Set the realtime clock (/dev/rtc).
</summary>
@@ -75694,7 +58033,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_realtime_clock" lineno="3937">
+<interface name="dev_rw_realtime_clock" lineno="3910">
<summary>
Read and set the realtime clock (/dev/rtc).
</summary>
@@ -75704,7 +58043,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_scanner_dev" lineno="3952">
+<interface name="dev_getattr_scanner_dev" lineno="3925">
<summary>
Get the attributes of the scanner device.
</summary>
@@ -75714,7 +58053,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3971">
+<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3944">
<summary>
Do not audit attempts to get the attributes of
the scanner device.
@@ -75725,7 +58064,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_scanner_dev" lineno="3989">
+<interface name="dev_setattr_scanner_dev" lineno="3962">
<summary>
Set the attributes of the scanner device.
</summary>
@@ -75735,7 +58074,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_scanner_dev" lineno="4008">
+<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3981">
<summary>
Do not audit attempts to set the attributes of
the scanner device.
@@ -75746,7 +58085,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_scanner" lineno="4026">
+<interface name="dev_rw_scanner" lineno="3999">
<summary>
Read and write the scanner device.
</summary>
@@ -75756,7 +58095,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_sound_dev" lineno="4044">
+<interface name="dev_getattr_sound_dev" lineno="4017">
<summary>
Get the attributes of the sound devices.
</summary>
@@ -75766,7 +58105,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_sound_dev" lineno="4062">
+<interface name="dev_setattr_sound_dev" lineno="4035">
<summary>
Set the attributes of the sound devices.
</summary>
@@ -75776,7 +58115,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_sound" lineno="4080">
+<interface name="dev_read_sound" lineno="4053">
<summary>
Read the sound devices.
</summary>
@@ -75786,7 +58125,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_sound" lineno="4099">
+<interface name="dev_write_sound" lineno="4072">
<summary>
Write the sound devices.
</summary>
@@ -75796,7 +58135,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_sound_mixer" lineno="4118">
+<interface name="dev_read_sound_mixer" lineno="4091">
<summary>
Read the sound mixer devices.
</summary>
@@ -75806,7 +58145,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_sound_mixer" lineno="4137">
+<interface name="dev_write_sound_mixer" lineno="4110">
<summary>
Write the sound mixer devices.
</summary>
@@ -75816,7 +58155,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_power_mgmt_dev" lineno="4156">
+<interface name="dev_getattr_power_mgmt_dev" lineno="4129">
<summary>
Get the attributes of the the power management device.
</summary>
@@ -75826,7 +58165,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_power_mgmt_dev" lineno="4174">
+<interface name="dev_setattr_power_mgmt_dev" lineno="4147">
<summary>
Set the attributes of the the power management device.
</summary>
@@ -75836,7 +58175,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_power_management" lineno="4192">
+<interface name="dev_rw_power_management" lineno="4165">
<summary>
Read and write the the power management device.
</summary>
@@ -75846,7 +58185,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_smartcard_dev" lineno="4210">
+<interface name="dev_getattr_smartcard_dev" lineno="4183">
<summary>
Getattr on smartcard devices
</summary>
@@ -75856,7 +58195,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4229">
+<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4202">
<summary>
dontaudit getattr on smartcard devices
</summary>
@@ -75866,7 +58205,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_smartcard" lineno="4248">
+<interface name="dev_rw_smartcard" lineno="4221">
<summary>
Read and write smartcard devices.
</summary>
@@ -75876,7 +58215,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_smartcard" lineno="4266">
+<interface name="dev_manage_smartcard" lineno="4239">
<summary>
Create, read, write, and delete smartcard devices.
</summary>
@@ -75886,7 +58225,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_sysdig" lineno="4284">
+<interface name="dev_rw_sysdig" lineno="4257">
<summary>
Read, write and map the sysdig device.
</summary>
@@ -75896,7 +58235,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mounton_sysfs" lineno="4303">
+<interface name="dev_mounton_sysfs" lineno="4276">
<summary>
Mount a filesystem on sysfs. (Deprecated)
</summary>
@@ -75906,7 +58245,7 @@ Domain allow access.
</summary>
</param>
</interface>
-<interface name="dev_associate_sysfs" lineno="4318">
+<interface name="dev_associate_sysfs" lineno="4291">
<summary>
Associate a file to a sysfs filesystem.
</summary>
@@ -75916,7 +58255,7 @@ The type of the file to be associated to sysfs.
</summary>
</param>
</interface>
-<interface name="dev_getattr_sysfs_dirs" lineno="4336">
+<interface name="dev_getattr_sysfs_dirs" lineno="4309">
<summary>
Get the attributes of sysfs directories.
</summary>
@@ -75926,7 +58265,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_sysfs" lineno="4354">
+<interface name="dev_getattr_sysfs" lineno="4327">
<summary>
Get the attributes of sysfs filesystem
</summary>
@@ -75936,7 +58275,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mount_sysfs" lineno="4372">
+<interface name="dev_mount_sysfs" lineno="4345">
<summary>
mount a sysfs filesystem
</summary>
@@ -75946,7 +58285,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_remount_sysfs" lineno="4390">
+<interface name="dev_remount_sysfs" lineno="4363">
<summary>
Remount a sysfs filesystem.
</summary>
@@ -75956,7 +58295,7 @@ Domain allow access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_sysfs" lineno="4408">
+<interface name="dev_dontaudit_getattr_sysfs" lineno="4381">
<summary>
Do not audit getting the attributes of sysfs filesystem
</summary>
@@ -75966,7 +58305,7 @@ Domain to dontaudit access from
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_sysfs" lineno="4426">
+<interface name="dev_dontaudit_read_sysfs" lineno="4399">
<summary>
Dont audit attempts to read hardware state information
</summary>
@@ -75976,7 +58315,7 @@ Domain for which the attempts do not need to be audited
</summary>
</param>
</interface>
-<interface name="dev_mounton_sysfs_dirs" lineno="4446">
+<interface name="dev_mounton_sysfs_dirs" lineno="4419">
<summary>
Mount on sysfs directories.
</summary>
@@ -75986,7 +58325,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_search_sysfs" lineno="4464">
+<interface name="dev_search_sysfs" lineno="4437">
<summary>
Search the sysfs directories.
</summary>
@@ -75996,7 +58335,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_search_sysfs" lineno="4482">
+<interface name="dev_dontaudit_search_sysfs" lineno="4455">
<summary>
Do not audit attempts to search sysfs.
</summary>
@@ -76006,7 +58345,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_list_sysfs" lineno="4500">
+<interface name="dev_list_sysfs" lineno="4473">
<summary>
List the contents of the sysfs directories.
</summary>
@@ -76016,7 +58355,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_sysfs_dirs" lineno="4519">
+<interface name="dev_write_sysfs_dirs" lineno="4492">
<summary>
Write in a sysfs directories.
</summary>
@@ -76026,7 +58365,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4537">
+<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4510">
<summary>
Do not audit attempts to write in a sysfs directory.
</summary>
@@ -76036,7 +58375,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_write_sysfs_files" lineno="4555">
+<interface name="dev_dontaudit_write_sysfs_files" lineno="4528">
<summary>
Do not audit attempts to write to a sysfs file.
</summary>
@@ -76046,7 +58385,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_manage_sysfs_dirs" lineno="4574">
+<interface name="dev_manage_sysfs_dirs" lineno="4547">
<summary>
Create, read, write, and delete sysfs
directories.
@@ -76057,7 +58396,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_sysfs" lineno="4601">
+<interface name="dev_read_sysfs" lineno="4574">
<summary>
Read hardware state information.
</summary>
@@ -76076,7 +58415,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_write_sysfs" lineno="4629">
+<interface name="dev_write_sysfs" lineno="4602">
<summary>
Write to hardware state information.
</summary>
@@ -76093,7 +58432,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_rw_sysfs" lineno="4648">
+<interface name="dev_rw_sysfs" lineno="4621">
<summary>
Allow caller to modify hardware state information.
</summary>
@@ -76103,7 +58442,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_sysfs_files" lineno="4669">
+<interface name="dev_create_sysfs_files" lineno="4642">
<summary>
Add a sysfs file
</summary>
@@ -76113,7 +58452,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_sysfs_dirs" lineno="4687">
+<interface name="dev_relabel_sysfs_dirs" lineno="4660">
<summary>
Relabel hardware state directories.
</summary>
@@ -76123,7 +58462,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_all_sysfs" lineno="4705">
+<interface name="dev_relabel_all_sysfs" lineno="4678">
<summary>
Relabel from/to all sysfs types.
</summary>
@@ -76133,7 +58472,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_all_sysfs" lineno="4725">
+<interface name="dev_setattr_all_sysfs" lineno="4698">
<summary>
Set the attributes of sysfs files, directories and symlinks.
</summary>
@@ -76143,7 +58482,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_tpm" lineno="4745">
+<interface name="dev_rw_tpm" lineno="4718">
<summary>
Read and write the TPM device.
</summary>
@@ -76153,7 +58492,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_urand" lineno="4786">
+<interface name="dev_read_urand" lineno="4759">
<summary>
Read from pseudo random number generator devices (e.g., /dev/urandom).
</summary>
@@ -76186,7 +58525,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_dontaudit_read_urand" lineno="4805">
+<interface name="dev_dontaudit_read_urand" lineno="4778">
<summary>
Do not audit attempts to read from pseudo
random devices (e.g., /dev/urandom)
@@ -76197,7 +58536,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_urand" lineno="4824">
+<interface name="dev_write_urand" lineno="4797">
<summary>
Write to the pseudo random device (e.g., /dev/urandom). This
sets the random number generator seed.
@@ -76208,7 +58547,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_urand_dev" lineno="4842">
+<interface name="dev_create_urand_dev" lineno="4815">
<summary>
Create the urandom device (/dev/urandom).
</summary>
@@ -76218,7 +58557,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_generic_usb_dev" lineno="4860">
+<interface name="dev_setattr_urand_dev" lineno="4833">
+<summary>
+Set attributes on the urandom device (/dev/urandom).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_getattr_generic_usb_dev" lineno="4851">
<summary>
Getattr generic the USB devices.
</summary>
@@ -76228,7 +58577,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_generic_usb_dev" lineno="4878">
+<interface name="dev_setattr_generic_usb_dev" lineno="4869">
<summary>
Setattr generic the USB devices.
</summary>
@@ -76238,7 +58587,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_generic_usb_dev" lineno="4896">
+<interface name="dev_read_generic_usb_dev" lineno="4887">
<summary>
Read generic the USB devices.
</summary>
@@ -76248,7 +58597,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_generic_usb_dev" lineno="4914">
+<interface name="dev_rw_generic_usb_dev" lineno="4905">
<summary>
Read and write generic the USB devices.
</summary>
@@ -76258,7 +58607,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_generic_usb_dev" lineno="4932">
+<interface name="dev_relabel_generic_usb_dev" lineno="4923">
<summary>
Relabel generic the USB devices.
</summary>
@@ -76268,7 +58617,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_usbmon_dev" lineno="4950">
+<interface name="dev_read_usbmon_dev" lineno="4941">
<summary>
Read USB monitor devices.
</summary>
@@ -76278,7 +58627,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_usbmon_dev" lineno="4968">
+<interface name="dev_write_usbmon_dev" lineno="4959">
<summary>
Write USB monitor devices.
</summary>
@@ -76288,7 +58637,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mount_usbfs" lineno="4986">
+<interface name="dev_mount_usbfs" lineno="4977">
<summary>
Mount a usbfs filesystem.
</summary>
@@ -76298,7 +58647,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_associate_usbfs" lineno="5004">
+<interface name="dev_associate_usbfs" lineno="4995">
<summary>
Associate a file to a usbfs filesystem.
</summary>
@@ -76308,7 +58657,7 @@ The type of the file to be associated to usbfs.
</summary>
</param>
</interface>
-<interface name="dev_getattr_usbfs_dirs" lineno="5022">
+<interface name="dev_getattr_usbfs_dirs" lineno="5013">
<summary>
Get the attributes of a directory in the usb filesystem.
</summary>
@@ -76318,7 +58667,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5041">
+<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5032">
<summary>
Do not audit attempts to get the attributes
of a directory in the usb filesystem.
@@ -76329,7 +58678,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_search_usbfs" lineno="5059">
+<interface name="dev_search_usbfs" lineno="5050">
<summary>
Search the directory containing USB hardware information.
</summary>
@@ -76339,7 +58688,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_list_usbfs" lineno="5077">
+<interface name="dev_list_usbfs" lineno="5068">
<summary>
Allow caller to get a list of usb hardware.
</summary>
@@ -76349,7 +58698,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_usbfs_files" lineno="5098">
+<interface name="dev_setattr_usbfs_files" lineno="5089">
<summary>
Set the attributes of usbfs filesystem.
</summary>
@@ -76359,7 +58708,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_usbfs" lineno="5118">
+<interface name="dev_read_usbfs" lineno="5109">
<summary>
Read USB hardware information using
the usbfs filesystem interface.
@@ -76370,7 +58719,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_usbfs" lineno="5138">
+<interface name="dev_rw_usbfs" lineno="5129">
<summary>
Allow caller to modify usb hardware configuration files.
</summary>
@@ -76380,7 +58729,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_video_dev" lineno="5158">
+<interface name="dev_getattr_video_dev" lineno="5149">
<summary>
Get the attributes of video4linux devices.
</summary>
@@ -76390,7 +58739,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_userio_dev" lineno="5176">
+<interface name="dev_rw_userio_dev" lineno="5167">
<summary>
Read and write userio device.
</summary>
@@ -76400,7 +58749,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_video_dev" lineno="5195">
+<interface name="dev_dontaudit_getattr_video_dev" lineno="5186">
<summary>
Do not audit attempts to get the attributes
of video4linux device nodes.
@@ -76411,7 +58760,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_video_dev" lineno="5213">
+<interface name="dev_setattr_video_dev" lineno="5204">
<summary>
Set the attributes of video4linux device nodes.
</summary>
@@ -76421,7 +58770,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_video_dev" lineno="5232">
+<interface name="dev_dontaudit_setattr_video_dev" lineno="5223">
<summary>
Do not audit attempts to set the attributes
of video4linux device nodes.
@@ -76432,7 +58781,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_video_dev" lineno="5250">
+<interface name="dev_read_video_dev" lineno="5241">
<summary>
Read the video4linux devices.
</summary>
@@ -76442,7 +58791,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_video_dev" lineno="5268">
+<interface name="dev_write_video_dev" lineno="5259">
<summary>
Write the video4linux devices.
</summary>
@@ -76452,7 +58801,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_vfio_dev" lineno="5286">
+<interface name="dev_rw_vfio_dev" lineno="5277">
<summary>
Read and write vfio devices.
</summary>
@@ -76462,7 +58811,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabelfrom_vfio_dev" lineno="5304">
+<interface name="dev_relabelfrom_vfio_dev" lineno="5295">
<summary>
Relabel vfio devices.
</summary>
@@ -76472,7 +58821,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_vhost" lineno="5322">
+<interface name="dev_rw_vhost" lineno="5313">
<summary>
Allow read/write the vhost devices
</summary>
@@ -76482,7 +58831,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_vmware" lineno="5340">
+<interface name="dev_rw_vmware" lineno="5331">
<summary>
Read and write VMWare devices.
</summary>
@@ -76492,7 +58841,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rwx_vmware" lineno="5358">
+<interface name="dev_rwx_vmware" lineno="5349">
<summary>
Read, write, and mmap VMWare devices.
</summary>
@@ -76502,7 +58851,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_watchdog" lineno="5377">
+<interface name="dev_read_watchdog" lineno="5368">
<summary>
Read from watchdog devices.
</summary>
@@ -76512,7 +58861,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_watchdog" lineno="5395">
+<interface name="dev_write_watchdog" lineno="5386">
<summary>
Write to watchdog devices.
</summary>
@@ -76522,7 +58871,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_wireless" lineno="5413">
+<interface name="dev_read_wireless" lineno="5404">
<summary>
Read the wireless device.
</summary>
@@ -76532,7 +58881,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_wireless" lineno="5431">
+<interface name="dev_rw_wireless" lineno="5422">
<summary>
Read and write the the wireless device.
</summary>
@@ -76542,7 +58891,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_wireless" lineno="5449">
+<interface name="dev_manage_wireless" lineno="5440">
<summary>
manage the wireless device.
</summary>
@@ -76552,7 +58901,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_xen" lineno="5467">
+<interface name="dev_rw_xen" lineno="5458">
<summary>
Read and write Xen devices.
</summary>
@@ -76562,7 +58911,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_xen" lineno="5486">
+<interface name="dev_manage_xen" lineno="5477">
<summary>
Create, read, write, and delete Xen devices.
</summary>
@@ -76572,7 +58921,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_filetrans_xen" lineno="5510">
+<interface name="dev_filetrans_xen" lineno="5501">
<summary>
Automatic type transition to the type
for xen device nodes when created in /dev.
@@ -76588,7 +58937,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dev_getattr_xserver_misc_dev" lineno="5528">
+<interface name="dev_getattr_xserver_misc_dev" lineno="5519">
<summary>
Get the attributes of X server miscellaneous devices.
</summary>
@@ -76598,7 +58947,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_xserver_misc_dev" lineno="5546">
+<interface name="dev_setattr_xserver_misc_dev" lineno="5537">
<summary>
Set the attributes of X server miscellaneous devices.
</summary>
@@ -76608,7 +58957,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_xserver_misc" lineno="5564">
+<interface name="dev_rw_xserver_misc" lineno="5555">
<summary>
Read and write X server miscellaneous devices.
</summary>
@@ -76618,7 +58967,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_map_xserver_misc" lineno="5582">
+<interface name="dev_map_xserver_misc" lineno="5573">
<summary>
Map X server miscellaneous devices.
</summary>
@@ -76628,7 +58977,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_zero" lineno="5600">
+<interface name="dev_rw_zero" lineno="5591">
<summary>
Read and write to the zero device (/dev/zero).
</summary>
@@ -76638,7 +58987,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rwx_zero" lineno="5618">
+<interface name="dev_rwx_zero" lineno="5609">
<summary>
Read, write, and execute the zero device (/dev/zero).
</summary>
@@ -76648,7 +58997,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_execmod_zero" lineno="5637">
+<interface name="dev_execmod_zero" lineno="5628">
<summary>
Execmod the zero device (/dev/zero).
</summary>
@@ -76658,7 +59007,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_zero_dev" lineno="5656">
+<interface name="dev_create_zero_dev" lineno="5647">
<summary>
Create the zero device (/dev/zero).
</summary>
@@ -76668,7 +59017,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_cpu_online" lineno="5679">
+<interface name="dev_read_cpu_online" lineno="5670">
<summary>
Read cpu online hardware state information
</summary>
@@ -76683,7 +59032,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_unconfined" lineno="5699">
+<interface name="dev_unconfined" lineno="5690">
<summary>
Unconfined access to devices.
</summary>
@@ -76693,7 +59042,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_cpu_online" lineno="5719">
+<interface name="dev_relabel_cpu_online" lineno="5710">
<summary>
Relabel cpu online hardware state information.
</summary>
@@ -76703,7 +59052,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_usbmon_dev" lineno="5738">
+<interface name="dev_dontaudit_read_usbmon_dev" lineno="5729">
<summary>
Dont audit attempts to read usbmon devices
</summary>
@@ -77806,46 +60155,7 @@ Type to be used for mount points.
</summary>
</param>
</interface>
-<interface name="files_pid_file" lineno="231">
-<summary>
-Make the specified type usable for
-runtime process ID files. (Deprecated)
-</summary>
-<desc>
-<p>
-Make the specified type usable for runtime process ID files,
-typically found in /var/run.
-This will also make the type usable for files, making
-calls to files_type() redundant. Failure to use this interface
-for a PID file type may result in problems with starting
-or stopping services.
-</p>
-<p>
-Related interfaces:
-</p>
-<ul>
-<li>files_runtime_filetrans()</li>
-</ul>
-<p>
-Example usage with a domain that can create and
-write its PID file with a private PID file type in the
-/var/run directory:
-</p>
-<p>
-type mypidfile_t;
-files_runtime_file(mypidfile_t)
-allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
-files_runtime_filetrans(mydomain_t, mypidfile_t, file)
-</p>
-</desc>
-<param name="type">
-<summary>
-Type to be used for PID files.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="files_runtime_file" lineno="275">
+<interface name="files_runtime_file" lineno="231">
<summary>
Make the specified type usable for
runtime process ID files.
@@ -77884,7 +60194,7 @@ Type to be used for PID files.
</param>
<infoflow type="none"/>
</interface>
-<interface name="files_config_file" lineno="315">
+<interface name="files_config_file" lineno="271">
<summary>
Make the specified type a
configuration file.
@@ -77915,7 +60225,7 @@ Type to be used as a configuration file.
</param>
<infoflow type="none"/>
</interface>
-<interface name="files_poly" lineno="335">
+<interface name="files_poly" lineno="291">
<summary>
Make the specified type a
polyinstantiated directory.
@@ -77927,7 +60237,7 @@ polyinstantiated directory.
</summary>
</param>
</interface>
-<interface name="files_poly_parent" lineno="356">
+<interface name="files_poly_parent" lineno="312">
<summary>
Make the specified type a parent
of a polyinstantiated directory.
@@ -77939,7 +60249,7 @@ parent directory.
</summary>
</param>
</interface>
-<interface name="files_poly_member" lineno="377">
+<interface name="files_poly_member" lineno="333">
<summary>
Make the specified type a
polyinstantiation member directory.
@@ -77951,7 +60261,7 @@ member directory.
</summary>
</param>
</interface>
-<interface name="files_poly_member_tmp" lineno="404">
+<interface name="files_poly_member_tmp" lineno="360">
<summary>
Make the domain use the specified
type of polyinstantiated directory.
@@ -77969,7 +60279,7 @@ member directory.
</summary>
</param>
</interface>
-<interface name="files_tmp_file" lineno="451">
+<interface name="files_tmp_file" lineno="407">
<summary>
Make the specified type a file
used for temporary files.
@@ -78008,7 +60318,7 @@ temporary file.
</param>
<infoflow type="none"/>
</interface>
-<interface name="files_tmpfs_file" lineno="472">
+<interface name="files_tmpfs_file" lineno="428">
<summary>
Transform the type into a file, for use on a
virtual memory filesystem (tmpfs).
@@ -78019,7 +60329,7 @@ The type to be transformed.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_dirs" lineno="491">
+<interface name="files_getattr_all_dirs" lineno="447">
<summary>
Get the attributes of all directories.
</summary>
@@ -78029,7 +60339,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_dirs" lineno="510">
+<interface name="files_dontaudit_getattr_all_dirs" lineno="466">
<summary>
Do not audit attempts to get the attributes
of all directories.
@@ -78040,7 +60350,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_non_security" lineno="528">
+<interface name="files_list_non_security" lineno="484">
<summary>
List all non-security directories.
</summary>
@@ -78050,7 +60360,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_non_security" lineno="547">
+<interface name="files_dontaudit_list_non_security" lineno="503">
<summary>
Do not audit attempts to list all
non-security directories.
@@ -78061,7 +60371,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_mounton_non_security" lineno="566">
+<interface name="files_mounton_non_security" lineno="522">
<summary>
Mount a filesystem on all non-security
directories and files.
@@ -78072,7 +60382,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_non_security_dirs" lineno="585">
+<interface name="files_write_non_security_dirs" lineno="541">
<summary>
Allow attempts to modify any directory
</summary>
@@ -78082,7 +60392,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_non_security_dirs" lineno="603">
+<interface name="files_manage_non_security_dirs" lineno="559">
<summary>
Allow attempts to manage non-security directories
</summary>
@@ -78092,7 +60402,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_non_security_dirs" lineno="621">
+<interface name="files_create_non_security_dirs" lineno="577">
+<summary>
+Create non-security directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_relabel_non_security_dirs" lineno="595">
<summary>
Relabel from/to non-security directories.
</summary>
@@ -78102,7 +60422,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_files" lineno="639">
+<interface name="files_getattr_all_files" lineno="613">
<summary>
Get the attributes of all files.
</summary>
@@ -78112,7 +60432,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_files" lineno="659">
+<interface name="files_dontaudit_getattr_all_files" lineno="633">
<summary>
Do not audit attempts to get the attributes
of all files.
@@ -78123,7 +60443,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_files" lineno="678">
+<interface name="files_dontaudit_getattr_non_security_files" lineno="652">
<summary>
Do not audit attempts to get the attributes
of non security files.
@@ -78134,7 +60454,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_non_security_files" lineno="697">
+<interface name="files_manage_non_security_files" lineno="671">
<summary>
Create, read, write, and delete all non-security files.
</summary>
@@ -78145,7 +60465,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_non_security_files" lineno="716">
+<interface name="files_relabel_non_security_files" lineno="690">
<summary>
Relabel from/to all non-security files.
</summary>
@@ -78156,7 +60476,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_all_files" lineno="734">
+<interface name="files_read_all_files" lineno="708">
<summary>
Read all files.
</summary>
@@ -78166,7 +60486,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_execmod_all_files" lineno="765">
+<interface name="files_execmod_all_files" lineno="739">
<summary>
Allow shared library text relocations in all files.
</summary>
@@ -78184,7 +60504,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_non_security_files" lineno="784">
+<interface name="files_read_non_security_files" lineno="758">
<summary>
Read all non-security files.
</summary>
@@ -78195,7 +60515,29 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_all_dirs_except" lineno="810">
+<interface name="files_write_non_security_files" lineno="778">
+<summary>
+Write all non-security files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="files_create_non_security_files" lineno="798">
+<summary>
+Create all non-security files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="files_read_all_dirs_except" lineno="824">
<summary>
Read all directories on the filesystem, except
the listed exceptions.
@@ -78212,7 +60554,7 @@ must be negated by the caller.
</summary>
</param>
</interface>
-<interface name="files_read_all_files_except" lineno="835">
+<interface name="files_read_all_files_except" lineno="849">
<summary>
Read all files on the filesystem, except
the listed exceptions.
@@ -78229,7 +60571,7 @@ must be negated by the caller.
</summary>
</param>
</interface>
-<interface name="files_read_all_symlinks_except" lineno="860">
+<interface name="files_read_all_symlinks_except" lineno="874">
<summary>
Read all symbolic links on the filesystem, except
the listed exceptions.
@@ -78246,7 +60588,7 @@ must be negated by the caller.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_symlinks" lineno="878">
+<interface name="files_getattr_all_symlinks" lineno="892">
<summary>
Get the attributes of all symbolic links.
</summary>
@@ -78256,7 +60598,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_symlinks" lineno="897">
+<interface name="files_dontaudit_getattr_all_symlinks" lineno="911">
<summary>
Do not audit attempts to get the attributes
of all symbolic links.
@@ -78267,7 +60609,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_all_symlinks" lineno="915">
+<interface name="files_dontaudit_read_all_symlinks" lineno="929">
<summary>
Do not audit attempts to read all symbolic links.
</summary>
@@ -78277,7 +60619,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="934">
+<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="948">
<summary>
Do not audit attempts to get the attributes
of non security symbolic links.
@@ -78288,7 +60630,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="953">
+<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="967">
<summary>
Do not audit attempts to get the attributes
of non security block devices.
@@ -78299,7 +60641,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="972">
+<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="986">
<summary>
Do not audit attempts to get the attributes
of non security character devices.
@@ -78310,7 +60652,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_symlinks" lineno="991">
+<interface name="files_read_all_symlinks" lineno="1005">
<summary>
Read all symbolic links.
</summary>
@@ -78321,7 +60663,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_all_pipes" lineno="1010">
+<interface name="files_getattr_all_pipes" lineno="1024">
<summary>
Get the attributes of all named pipes.
</summary>
@@ -78331,7 +60673,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_pipes" lineno="1030">
+<interface name="files_dontaudit_getattr_all_pipes" lineno="1044">
<summary>
Do not audit attempts to get the attributes
of all named pipes.
@@ -78342,7 +60684,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1049">
+<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1063">
<summary>
Do not audit attempts to get the attributes
of non security named pipes.
@@ -78353,7 +60695,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_sockets" lineno="1067">
+<interface name="files_getattr_all_sockets" lineno="1081">
<summary>
Get the attributes of all named sockets.
</summary>
@@ -78363,7 +60705,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_sockets" lineno="1087">
+<interface name="files_dontaudit_getattr_all_sockets" lineno="1101">
<summary>
Do not audit attempts to get the attributes
of all named sockets.
@@ -78374,7 +60716,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1106">
+<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1120">
<summary>
Do not audit attempts to get the attributes
of non security named sockets.
@@ -78385,7 +60727,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_blk_files" lineno="1124">
+<interface name="files_read_all_blk_files" lineno="1138">
<summary>
Read all block nodes with file types.
</summary>
@@ -78395,7 +60737,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_all_chr_files" lineno="1142">
+<interface name="files_read_all_chr_files" lineno="1156">
<summary>
Read all character nodes with file types.
</summary>
@@ -78405,7 +60747,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_files" lineno="1168">
+<interface name="files_relabel_all_files" lineno="1182">
<summary>
Relabel all files on the filesystem, except
the listed exceptions.
@@ -78423,7 +60765,7 @@ must be negated by the caller.
</param>
<rolecap/>
</interface>
-<interface name="files_rw_all_files" lineno="1206">
+<interface name="files_rw_all_files" lineno="1220">
<summary>
rw all files on the filesystem, except
the listed exceptions.
@@ -78441,7 +60783,7 @@ must be negated by the caller.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_files" lineno="1232">
+<interface name="files_manage_all_files" lineno="1246">
<summary>
Manage all files on the filesystem, except
the listed exceptions.
@@ -78459,7 +60801,7 @@ must be negated by the caller.
</param>
<rolecap/>
</interface>
-<interface name="files_search_all" lineno="1255">
+<interface name="files_search_all" lineno="1269">
<summary>
Search the contents of all directories on
extended attribute filesystems.
@@ -78470,7 +60812,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_all" lineno="1274">
+<interface name="files_list_all" lineno="1288">
<summary>
List the contents of all directories on
extended attribute filesystems.
@@ -78481,7 +60823,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_files_as" lineno="1292">
+<interface name="files_create_all_files_as" lineno="1306">
<summary>
Create all files as is.
</summary>
@@ -78491,7 +60833,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_all_dirs" lineno="1312">
+<interface name="files_dontaudit_search_all_dirs" lineno="1326">
<summary>
Do not audit attempts to search the
contents of any directories on extended
@@ -78503,7 +60845,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_file_type_fs" lineno="1335">
+<interface name="files_getattr_all_file_type_fs" lineno="1349">
<summary>
Get the attributes of all filesystems
with the type of a file.
@@ -78514,7 +60856,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_all_file_type_fs" lineno="1353">
+<interface name="files_relabelto_all_file_type_fs" lineno="1367">
<summary>
Relabel a filesystem to the type of a file.
</summary>
@@ -78524,7 +60866,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_file_type_fs" lineno="1371">
+<interface name="files_relabel_all_file_type_fs" lineno="1385">
<summary>
Relabel a filesystem to and from the type of a file.
</summary>
@@ -78534,7 +60876,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mount_all_file_type_fs" lineno="1389">
+<interface name="files_mount_all_file_type_fs" lineno="1403">
<summary>
Mount all filesystems with the type of a file.
</summary>
@@ -78544,7 +60886,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_unmount_all_file_type_fs" lineno="1407">
+<interface name="files_unmount_all_file_type_fs" lineno="1421">
<summary>
Unmount all filesystems with the type of a file.
</summary>
@@ -78554,7 +60896,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_non_auth_dirs" lineno="1426">
+<interface name="files_list_non_auth_dirs" lineno="1440">
<summary>
Read all non-authentication related
directories.
@@ -78565,7 +60907,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_non_auth_files" lineno="1445">
+<interface name="files_read_non_auth_files" lineno="1459">
<summary>
Read all non-authentication related
files.
@@ -78576,7 +60918,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_non_auth_symlinks" lineno="1464">
+<interface name="files_read_non_auth_symlinks" lineno="1478">
<summary>
Read all non-authentication related
symbolic links.
@@ -78587,7 +60929,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_non_auth_files" lineno="1482">
+<interface name="files_rw_non_auth_files" lineno="1496">
<summary>
rw non-authentication related files.
</summary>
@@ -78597,7 +60939,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_non_auth_files" lineno="1502">
+<interface name="files_manage_non_auth_files" lineno="1516">
<summary>
Manage non-authentication related
files.
@@ -78609,7 +60951,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_map_non_auth_files" lineno="1526">
+<interface name="files_map_non_auth_files" lineno="1540">
<summary>
Mmap non-authentication related
files.
@@ -78621,7 +60963,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_non_auth_files" lineno="1546">
+<interface name="files_relabel_non_auth_files" lineno="1560">
<summary>
Relabel all non-authentication related
files.
@@ -78633,7 +60975,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_config_dirs" lineno="1579">
+<interface name="files_manage_config_dirs" lineno="1593">
<summary>
Manage all configuration directories on filesystem
</summary>
@@ -78644,7 +60986,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_relabel_config_dirs" lineno="1598">
+<interface name="files_relabel_config_dirs" lineno="1612">
<summary>
Relabel configuration directories
</summary>
@@ -78655,7 +60997,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_dontaudit_relabel_config_dirs" lineno="1617">
+<interface name="files_dontaudit_relabel_config_dirs" lineno="1631">
<summary>
Do not audit attempts to relabel configuration directories
</summary>
@@ -78666,7 +61008,7 @@ Domain not to audit.
</param>
</interface>
-<interface name="files_read_config_files" lineno="1635">
+<interface name="files_read_config_files" lineno="1649">
<summary>
Read config files in /etc.
</summary>
@@ -78676,7 +61018,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_config_files" lineno="1656">
+<interface name="files_manage_config_files" lineno="1670">
<summary>
Manage all configuration files on filesystem
</summary>
@@ -78687,7 +61029,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_relabel_config_files" lineno="1675">
+<interface name="files_relabel_config_files" lineno="1689">
<summary>
Relabel configuration files
</summary>
@@ -78698,7 +61040,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_dontaudit_relabel_config_files" lineno="1694">
+<interface name="files_dontaudit_relabel_config_files" lineno="1708">
<summary>
Do not audit attempts to relabel configuration files
</summary>
@@ -78709,7 +61051,7 @@ Domain not to audit.
</param>
</interface>
-<interface name="files_mounton_all_mountpoints" lineno="1712">
+<interface name="files_mounton_all_mountpoints" lineno="1726">
<summary>
Mount a filesystem on all mount points.
</summary>
@@ -78719,7 +61061,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_mountpoints" lineno="1733">
+<interface name="files_getattr_all_mountpoints" lineno="1747">
<summary>
Get the attributes of all mount points.
</summary>
@@ -78729,7 +61071,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_all_mountpoints" lineno="1751">
+<interface name="files_setattr_all_mountpoints" lineno="1765">
<summary>
Set the attributes of all mount points.
</summary>
@@ -78739,7 +61081,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1769">
+<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1783">
<summary>
Do not audit attempts to set the attributes on all mount points.
</summary>
@@ -78749,7 +61091,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_all_mountpoints" lineno="1787">
+<interface name="files_search_all_mountpoints" lineno="1801">
<summary>
Search all mount points.
</summary>
@@ -78759,7 +61101,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_all_mountpoints" lineno="1805">
+<interface name="files_dontaudit_search_all_mountpoints" lineno="1819">
<summary>
Do not audit searching of all mount points.
</summary>
@@ -78769,7 +61111,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_all_mountpoints" lineno="1823">
+<interface name="files_list_all_mountpoints" lineno="1837">
<summary>
List all mount points.
</summary>
@@ -78779,7 +61121,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_all_mountpoints" lineno="1841">
+<interface name="files_dontaudit_list_all_mountpoints" lineno="1855">
<summary>
Do not audit listing of all mount points.
</summary>
@@ -78789,7 +61131,27 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_write_all_mountpoints" lineno="1859">
+<interface name="files_watch_all_mountpoints" lineno="1873">
+<summary>
+Watch all mountpoints.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_watch_all_mount_perm" lineno="1891">
+<summary>
+Watch all mountpoints.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_write_all_mountpoints" lineno="1909">
<summary>
Check if all mountpoints are writable.
</summary>
@@ -78799,7 +61161,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_all_mountpoints" lineno="1877">
+<interface name="files_dontaudit_write_all_mountpoints" lineno="1927">
<summary>
Do not audit attempts to write to mount points.
</summary>
@@ -78809,7 +61171,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_root" lineno="1895">
+<interface name="files_list_root" lineno="1945">
<summary>
List the contents of the root directory.
</summary>
@@ -78819,7 +61181,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_root_symlinks" lineno="1915">
+<interface name="files_delete_root_symlinks" lineno="1965">
<summary>
Delete symbolic links in the
root directory.
@@ -78830,7 +61192,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_root_dirs" lineno="1933">
+<interface name="files_dontaudit_write_root_dirs" lineno="1983">
<summary>
Do not audit attempts to write to / dirs.
</summary>
@@ -78840,7 +61202,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_root_dir" lineno="1952">
+<interface name="files_dontaudit_rw_root_dir" lineno="2002">
<summary>
Do not audit attempts to write
files in the root directory.
@@ -78851,7 +61213,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_watch_root_dirs" lineno="1970">
+<interface name="files_watch_root_dirs" lineno="2020">
<summary>
Watch the root directory.
</summary>
@@ -78861,7 +61223,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_root_filetrans" lineno="2004">
+<interface name="files_root_filetrans" lineno="2054">
<summary>
Create an object in the root directory, with a private
type using a type transition.
@@ -78887,7 +61249,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_root_files" lineno="2023">
+<interface name="files_dontaudit_read_root_files" lineno="2073">
<summary>
Do not audit attempts to read files in
the root directory.
@@ -78898,7 +61260,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_root_files" lineno="2042">
+<interface name="files_dontaudit_rw_root_files" lineno="2092">
<summary>
Do not audit attempts to read or write
files in the root directory.
@@ -78909,7 +61271,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_root_chr_files" lineno="2061">
+<interface name="files_dontaudit_rw_root_chr_files" lineno="2111">
<summary>
Do not audit attempts to read or write
character device nodes in the root directory.
@@ -78920,7 +61282,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_delete_root_chr_files" lineno="2080">
+<interface name="files_delete_root_chr_files" lineno="2130">
<summary>
Delete character device nodes in
the root directory.
@@ -78931,7 +61293,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_root_files" lineno="2098">
+<interface name="files_delete_root_files" lineno="2148">
<summary>
Delete files in the root directory.
</summary>
@@ -78941,7 +61303,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_root_files" lineno="2116">
+<interface name="files_exec_root_files" lineno="2166">
<summary>
Execute files in the root directory.
</summary>
@@ -78951,7 +61313,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_root_dir_entry" lineno="2134">
+<interface name="files_delete_root_dir_entry" lineno="2184">
<summary>
Remove entries from the root directory.
</summary>
@@ -78961,7 +61323,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_root_dir" lineno="2152">
+<interface name="files_manage_root_dir" lineno="2202">
<summary>
Manage the root directory.
</summary>
@@ -78971,7 +61333,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_rootfs" lineno="2171">
+<interface name="files_getattr_rootfs" lineno="2221">
<summary>
Get the attributes of a rootfs
file system.
@@ -78982,7 +61344,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_associate_rootfs" lineno="2189">
+<interface name="files_associate_rootfs" lineno="2239">
<summary>
Associate to root file system.
</summary>
@@ -78992,7 +61354,7 @@ Type of the file to associate.
</summary>
</param>
</interface>
-<interface name="files_relabel_rootfs" lineno="2207">
+<interface name="files_relabel_rootfs" lineno="2257">
<summary>
Relabel to and from rootfs file system.
</summary>
@@ -79002,7 +61364,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_unmount_rootfs" lineno="2225">
+<interface name="files_unmount_rootfs" lineno="2275">
<summary>
Unmount a rootfs filesystem.
</summary>
@@ -79012,7 +61374,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_root" lineno="2243">
+<interface name="files_mounton_root" lineno="2293">
<summary>
Mount on the root directory (/)
</summary>
@@ -79022,7 +61384,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_boot_fs" lineno="2262">
+<interface name="files_getattr_boot_fs" lineno="2312">
<summary>
Get the attributes of a filesystem
mounted on /boot.
@@ -79033,7 +61395,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_remount_boot" lineno="2280">
+<interface name="files_remount_boot" lineno="2330">
<summary>
Remount a filesystem mounted on /boot.
</summary>
@@ -79043,7 +61405,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_boot_dirs" lineno="2298">
+<interface name="files_getattr_boot_dirs" lineno="2348">
<summary>
Get attributes of the /boot directory.
</summary>
@@ -79053,7 +61415,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_boot_dirs" lineno="2317">
+<interface name="files_dontaudit_getattr_boot_dirs" lineno="2367">
<summary>
Do not audit attempts to get attributes
of the /boot directory.
@@ -79064,7 +61426,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_boot" lineno="2335">
+<interface name="files_search_boot" lineno="2385">
<summary>
Search the /boot directory.
</summary>
@@ -79074,7 +61436,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_boot" lineno="2353">
+<interface name="files_dontaudit_search_boot" lineno="2403">
<summary>
Do not audit attempts to search the /boot directory.
</summary>
@@ -79084,7 +61446,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_boot" lineno="2371">
+<interface name="files_list_boot" lineno="2421">
<summary>
List the /boot directory.
</summary>
@@ -79094,7 +61456,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_boot" lineno="2389">
+<interface name="files_dontaudit_list_boot" lineno="2439">
<summary>
Do not audit attempts to list the /boot directory.
</summary>
@@ -79104,7 +61466,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_boot_dirs" lineno="2407">
+<interface name="files_create_boot_dirs" lineno="2457">
<summary>
Create directories in /boot
</summary>
@@ -79114,7 +61476,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_boot_dirs" lineno="2426">
+<interface name="files_manage_boot_dirs" lineno="2476">
<summary>
Create, read, write, and delete
directories in /boot.
@@ -79125,7 +61487,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_boot_filetrans" lineno="2460">
+<interface name="files_boot_filetrans" lineno="2510">
<summary>
Create a private type object in boot
with an automatic type transition
@@ -79151,7 +61513,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_read_boot_files" lineno="2479">
+<interface name="files_read_boot_files" lineno="2529">
<summary>
read files in the /boot directory.
</summary>
@@ -79162,7 +61524,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_boot_files" lineno="2499">
+<interface name="files_manage_boot_files" lineno="2549">
<summary>
Create, read, write, and delete files
in the /boot directory.
@@ -79174,7 +61536,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabelfrom_boot_files" lineno="2517">
+<interface name="files_relabelfrom_boot_files" lineno="2567">
<summary>
Relabel from files in the /boot directory.
</summary>
@@ -79184,7 +61546,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_boot_symlinks" lineno="2535">
+<interface name="files_read_boot_symlinks" lineno="2585">
<summary>
Read symbolic links in the /boot directory.
</summary>
@@ -79194,7 +61556,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_boot_symlinks" lineno="2554">
+<interface name="files_rw_boot_symlinks" lineno="2604">
<summary>
Read and write symbolic links
in the /boot directory.
@@ -79205,7 +61567,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_boot_symlinks" lineno="2574">
+<interface name="files_manage_boot_symlinks" lineno="2624">
<summary>
Create, read, write, and delete symbolic links
in the /boot directory.
@@ -79216,7 +61578,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_kernel_img" lineno="2592">
+<interface name="files_read_kernel_img" lineno="2642">
<summary>
Read kernel files in the /boot directory.
</summary>
@@ -79226,7 +61588,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_kernel_img" lineno="2613">
+<interface name="files_create_kernel_img" lineno="2663">
<summary>
Install a kernel into the /boot directory.
</summary>
@@ -79237,7 +61599,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_delete_kernel" lineno="2633">
+<interface name="files_delete_kernel" lineno="2683">
<summary>
Delete a kernel from /boot.
</summary>
@@ -79248,7 +61610,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_default_dirs" lineno="2651">
+<interface name="files_getattr_default_dirs" lineno="2701">
<summary>
Getattr of directories with the default file type.
</summary>
@@ -79258,7 +61620,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_default_dirs" lineno="2670">
+<interface name="files_dontaudit_getattr_default_dirs" lineno="2720">
<summary>
Do not audit attempts to get the attributes of
directories with the default file type.
@@ -79269,7 +61631,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_default" lineno="2688">
+<interface name="files_search_default" lineno="2738">
<summary>
Search the contents of directories with the default file type.
</summary>
@@ -79279,7 +61641,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_default" lineno="2706">
+<interface name="files_list_default" lineno="2756">
<summary>
List contents of directories with the default file type.
</summary>
@@ -79289,7 +61651,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_default" lineno="2725">
+<interface name="files_dontaudit_list_default" lineno="2775">
<summary>
Do not audit attempts to list contents of
directories with the default file type.
@@ -79300,7 +61662,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_default_dirs" lineno="2744">
+<interface name="files_manage_default_dirs" lineno="2794">
<summary>
Create, read, write, and delete directories with
the default file type.
@@ -79311,7 +61673,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_default" lineno="2762">
+<interface name="files_mounton_default" lineno="2812">
<summary>
Mount a filesystem on a directory with the default file type.
</summary>
@@ -79321,7 +61683,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_default_files" lineno="2781">
+<interface name="files_dontaudit_getattr_default_files" lineno="2831">
<summary>
Do not audit attempts to get the attributes of
files with the default file type.
@@ -79332,7 +61694,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_default_files" lineno="2799">
+<interface name="files_read_default_files" lineno="2849">
<summary>
Read files with the default file type.
</summary>
@@ -79342,7 +61704,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_default_files" lineno="2818">
+<interface name="files_dontaudit_read_default_files" lineno="2868">
<summary>
Do not audit attempts to read files
with the default file type.
@@ -79353,7 +61715,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_default_files" lineno="2837">
+<interface name="files_manage_default_files" lineno="2887">
<summary>
Create, read, write, and delete files with
the default file type.
@@ -79364,7 +61726,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_default_symlinks" lineno="2855">
+<interface name="files_read_default_symlinks" lineno="2905">
<summary>
Read symbolic links with the default file type.
</summary>
@@ -79374,7 +61736,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_default_sockets" lineno="2873">
+<interface name="files_read_default_sockets" lineno="2923">
<summary>
Read sockets with the default file type.
</summary>
@@ -79384,7 +61746,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_default_pipes" lineno="2891">
+<interface name="files_read_default_pipes" lineno="2941">
<summary>
Read named pipes with the default file type.
</summary>
@@ -79394,7 +61756,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_etc" lineno="2909">
+<interface name="files_search_etc" lineno="2959">
<summary>
Search the contents of /etc directories.
</summary>
@@ -79404,7 +61766,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_etc_dirs" lineno="2927">
+<interface name="files_setattr_etc_dirs" lineno="2977">
<summary>
Set the attributes of the /etc directories.
</summary>
@@ -79414,7 +61776,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_etc" lineno="2945">
+<interface name="files_list_etc" lineno="2995">
<summary>
List the contents of /etc directories.
</summary>
@@ -79424,7 +61786,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_etc_dirs" lineno="2963">
+<interface name="files_dontaudit_write_etc_dirs" lineno="3013">
<summary>
Do not audit attempts to write to /etc dirs.
</summary>
@@ -79434,7 +61796,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_rw_etc_dirs" lineno="2981">
+<interface name="files_rw_etc_dirs" lineno="3031">
<summary>
Add and remove entries from /etc directories.
</summary>
@@ -79444,7 +61806,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_etc_dirs" lineno="3000">
+<interface name="files_manage_etc_dirs" lineno="3050">
<summary>
Manage generic directories in /etc
</summary>
@@ -79455,7 +61817,7 @@ Domain allowed access
</param>
</interface>
-<interface name="files_relabelto_etc_dirs" lineno="3018">
+<interface name="files_relabelto_etc_dirs" lineno="3068">
<summary>
Relabel directories to etc_t.
</summary>
@@ -79465,7 +61827,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_etc_dirs" lineno="3037">
+<interface name="files_mounton_etc_dirs" lineno="3087">
<summary>
Mount a filesystem on the
etc directories.
@@ -79476,7 +61838,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_etc_dirs" lineno="3055">
+<interface name="files_remount_etc" lineno="3105">
+<summary>
+Remount etc filesystems.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_watch_etc_dirs" lineno="3123">
<summary>
Watch /etc directories
</summary>
@@ -79486,7 +61858,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_etc_files" lineno="3107">
+<interface name="files_read_etc_files" lineno="3175">
<summary>
Read generic files in /etc.
</summary>
@@ -79530,7 +61902,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_map_etc_files" lineno="3139">
+<interface name="files_map_etc_files" lineno="3207">
<summary>
Map generic files in /etc.
</summary>
@@ -79552,7 +61924,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_dontaudit_write_etc_files" lineno="3157">
+<interface name="files_dontaudit_write_etc_files" lineno="3225">
<summary>
Do not audit attempts to write generic files in /etc.
</summary>
@@ -79562,7 +61934,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_etc_files" lineno="3176">
+<interface name="files_rw_etc_files" lineno="3244">
<summary>
Read and write generic files in /etc.
</summary>
@@ -79573,7 +61945,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_etc_files" lineno="3198">
+<interface name="files_manage_etc_files" lineno="3266">
<summary>
Create, read, write, and delete generic
files in /etc.
@@ -79585,7 +61957,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_manage_etc_files" lineno="3219">
+<interface name="files_dontaudit_manage_etc_files" lineno="3287">
<summary>
Do not audit attempts to create, read, write,
and delete generic files in /etc.
@@ -79597,7 +61969,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="files_delete_etc_files" lineno="3237">
+<interface name="files_delete_etc_files" lineno="3305">
<summary>
Delete system configuration files in /etc.
</summary>
@@ -79607,7 +61979,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_etc_files" lineno="3255">
+<interface name="files_exec_etc_files" lineno="3323">
<summary>
Execute generic files in /etc.
</summary>
@@ -79617,7 +61989,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_etc_files" lineno="3275">
+<interface name="files_watch_etc_files" lineno="3343">
<summary>
Watch /etc files.
</summary>
@@ -79627,7 +61999,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_get_etc_unit_status" lineno="3293">
+<interface name="files_get_etc_unit_status" lineno="3361">
<summary>
Get etc_t service status.
</summary>
@@ -79637,7 +62009,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_start_etc_service" lineno="3312">
+<interface name="files_start_etc_service" lineno="3380">
<summary>
start etc_t service
</summary>
@@ -79647,7 +62019,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_stop_etc_service" lineno="3331">
+<interface name="files_stop_etc_service" lineno="3399">
<summary>
stop etc_t service
</summary>
@@ -79657,7 +62029,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_etc_files" lineno="3350">
+<interface name="files_relabel_etc_files" lineno="3418">
<summary>
Relabel from and to generic files in /etc.
</summary>
@@ -79667,7 +62039,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_etc_symlinks" lineno="3369">
+<interface name="files_read_etc_symlinks" lineno="3437">
<summary>
Read symbolic links in /etc.
</summary>
@@ -79677,7 +62049,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_etc_symlinks" lineno="3387">
+<interface name="files_watch_etc_symlinks" lineno="3455">
<summary>
Watch /etc symlinks
</summary>
@@ -79687,7 +62059,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_etc_symlinks" lineno="3405">
+<interface name="files_manage_etc_symlinks" lineno="3473">
<summary>
Create, read, write, and delete symbolic links in /etc.
</summary>
@@ -79697,7 +62069,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_etc_filetrans" lineno="3439">
+<interface name="files_etc_filetrans" lineno="3507">
<summary>
Create objects in /etc with a private
type using a type_transition.
@@ -79723,7 +62095,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_create_boot_flag" lineno="3469">
+<interface name="files_create_boot_flag" lineno="3537">
<summary>
Create a boot flag.
</summary>
@@ -79745,7 +62117,7 @@ The name of the object being created.
</param>
<rolecap/>
</interface>
-<interface name="files_delete_boot_flag" lineno="3495">
+<interface name="files_delete_boot_flag" lineno="3563">
<summary>
Delete a boot flag.
</summary>
@@ -79762,7 +62134,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_etc_runtime_dirs" lineno="3514">
+<interface name="files_getattr_etc_runtime_dirs" lineno="3582">
<summary>
Get the attributes of the
etc_runtime directories.
@@ -79773,7 +62145,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_etc_runtime_dirs" lineno="3533">
+<interface name="files_mounton_etc_runtime_dirs" lineno="3601">
<summary>
Mount a filesystem on the
etc_runtime directories.
@@ -79784,7 +62156,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_etc_runtime_dirs" lineno="3551">
+<interface name="files_relabelto_etc_runtime_dirs" lineno="3619">
<summary>
Relabel to etc_runtime_t dirs.
</summary>
@@ -79794,7 +62166,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3569">
+<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3637">
<summary>
Do not audit attempts to set the attributes of the etc_runtime files
</summary>
@@ -79804,7 +62176,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_etc_runtime_files" lineno="3607">
+<interface name="files_read_etc_runtime_files" lineno="3675">
<summary>
Read files in /etc that are dynamically
created on boot, such as mtab.
@@ -79834,7 +62206,7 @@ Domain allowed access.
<infoflow type="read" weight="10" />
<rolecap/>
</interface>
-<interface name="files_dontaudit_read_etc_runtime_files" lineno="3629">
+<interface name="files_dontaudit_read_etc_runtime_files" lineno="3697">
<summary>
Do not audit attempts to read files
in /etc that are dynamically
@@ -79846,7 +62218,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_etc_files" lineno="3648">
+<interface name="files_dontaudit_read_etc_files" lineno="3716">
<summary>
Do not audit attempts to read files
in /etc
@@ -79857,7 +62229,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_etc_runtime_files" lineno="3667">
+<interface name="files_dontaudit_write_etc_runtime_files" lineno="3735">
<summary>
Do not audit attempts to write
etc runtime files.
@@ -79868,7 +62240,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_rw_etc_runtime_files" lineno="3687">
+<interface name="files_rw_etc_runtime_files" lineno="3755">
<summary>
Read and write files in /etc that are dynamically
created on boot, such as mtab.
@@ -79880,7 +62252,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_etc_runtime_files" lineno="3709">
+<interface name="files_manage_etc_runtime_files" lineno="3777">
<summary>
Create, read, write, and delete files in
/etc that are dynamically created on boot,
@@ -79893,7 +62265,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabelto_etc_runtime_files" lineno="3727">
+<interface name="files_relabelto_etc_runtime_files" lineno="3795">
<summary>
Relabel to etc_runtime_t files.
</summary>
@@ -79903,7 +62275,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_etc_filetrans_etc_runtime" lineno="3756">
+<interface name="files_etc_filetrans_etc_runtime" lineno="3824">
<summary>
Create, etc runtime objects with an automatic
type transition.
@@ -79924,7 +62296,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_getattr_home_dir" lineno="3775">
+<interface name="files_getattr_home_dir" lineno="3843">
<summary>
Get the attributes of the home directories root
(/home).
@@ -79935,7 +62307,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_home_dir" lineno="3796">
+<interface name="files_dontaudit_getattr_home_dir" lineno="3864">
<summary>
Do not audit attempts to get the
attributes of the home directories root
@@ -79947,7 +62319,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_home" lineno="3815">
+<interface name="files_search_home" lineno="3883">
<summary>
Search home directories root (/home).
</summary>
@@ -79957,7 +62329,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_home" lineno="3835">
+<interface name="files_dontaudit_search_home" lineno="3903">
<summary>
Do not audit attempts to search
home directories root (/home).
@@ -79968,7 +62340,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_home" lineno="3855">
+<interface name="files_dontaudit_list_home" lineno="3923">
<summary>
Do not audit attempts to list
home directories root (/home).
@@ -79979,7 +62351,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_home" lineno="3874">
+<interface name="files_list_home" lineno="3942">
<summary>
Get listing of home directories.
</summary>
@@ -79989,7 +62361,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_home" lineno="3893">
+<interface name="files_relabelto_home" lineno="3961">
<summary>
Relabel to user home root (/home).
</summary>
@@ -79999,7 +62371,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelfrom_home" lineno="3911">
+<interface name="files_relabelfrom_home" lineno="3979">
<summary>
Relabel from user home root (/home).
</summary>
@@ -80009,7 +62381,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_home" lineno="3929">
+<interface name="files_watch_home" lineno="3997">
<summary>
Watch the user home root (/home).
</summary>
@@ -80019,7 +62391,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_home_filetrans" lineno="3962">
+<interface name="files_home_filetrans" lineno="4030">
<summary>
Create objects in /home.
</summary>
@@ -80044,7 +62416,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_getattr_lost_found_dirs" lineno="3980">
+<interface name="files_getattr_lost_found_dirs" lineno="4048">
<summary>
Get the attributes of lost+found directories.
</summary>
@@ -80054,7 +62426,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3999">
+<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="4067">
<summary>
Do not audit attempts to get the attributes of
lost+found directories.
@@ -80065,7 +62437,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_lost_found" lineno="4017">
+<interface name="files_list_lost_found" lineno="4085">
<summary>
List the contents of lost+found directories.
</summary>
@@ -80075,7 +62447,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_lost_found" lineno="4037">
+<interface name="files_manage_lost_found" lineno="4105">
<summary>
Create, read, write, and delete objects in
lost+found directories.
@@ -80087,7 +62459,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_search_mnt" lineno="4059">
+<interface name="files_search_mnt" lineno="4127">
<summary>
Search the contents of /mnt.
</summary>
@@ -80097,7 +62469,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_mnt" lineno="4077">
+<interface name="files_dontaudit_search_mnt" lineno="4145">
<summary>
Do not audit attempts to search /mnt.
</summary>
@@ -80107,7 +62479,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_mnt" lineno="4095">
+<interface name="files_list_mnt" lineno="4163">
<summary>
List the contents of /mnt.
</summary>
@@ -80117,7 +62489,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_mnt" lineno="4113">
+<interface name="files_dontaudit_list_mnt" lineno="4181">
<summary>
Do not audit attempts to list the contents of /mnt.
</summary>
@@ -80127,7 +62499,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_mnt" lineno="4131">
+<interface name="files_mounton_mnt" lineno="4199">
<summary>
Mount a filesystem on /mnt.
</summary>
@@ -80137,7 +62509,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_mnt_dirs" lineno="4150">
+<interface name="files_manage_mnt_dirs" lineno="4218">
<summary>
Create, read, write, and delete directories in /mnt.
</summary>
@@ -80148,7 +62520,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_mnt_files" lineno="4168">
+<interface name="files_manage_mnt_files" lineno="4236">
<summary>
Create, read, write, and delete files in /mnt.
</summary>
@@ -80158,7 +62530,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_mnt_files" lineno="4186">
+<interface name="files_read_mnt_files" lineno="4254">
<summary>
read files in /mnt.
</summary>
@@ -80168,7 +62540,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_mnt_symlinks" lineno="4204">
+<interface name="files_read_mnt_symlinks" lineno="4272">
<summary>
Read symbolic links in /mnt.
</summary>
@@ -80178,7 +62550,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_mnt_symlinks" lineno="4222">
+<interface name="files_manage_mnt_symlinks" lineno="4290">
<summary>
Create, read, write, and delete symbolic links in /mnt.
</summary>
@@ -80188,7 +62560,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_kernel_modules" lineno="4240">
+<interface name="files_search_kernel_modules" lineno="4308">
<summary>
Search the contents of the kernel module directories.
</summary>
@@ -80198,7 +62570,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_kernel_modules" lineno="4259">
+<interface name="files_list_kernel_modules" lineno="4327">
<summary>
List the contents of the kernel module directories.
</summary>
@@ -80208,7 +62580,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_kernel_modules" lineno="4278">
+<interface name="files_getattr_kernel_modules" lineno="4346">
<summary>
Get the attributes of kernel module files.
</summary>
@@ -80218,7 +62590,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_kernel_modules" lineno="4296">
+<interface name="files_read_kernel_modules" lineno="4364">
<summary>
Read kernel module files.
</summary>
@@ -80228,7 +62600,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mmap_read_kernel_modules" lineno="4316">
+<interface name="files_mmap_read_kernel_modules" lineno="4384">
<summary>
Read and mmap kernel module files.
</summary>
@@ -80238,7 +62610,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_kernel_modules" lineno="4337">
+<interface name="files_write_kernel_modules" lineno="4405">
<summary>
Write kernel module files.
</summary>
@@ -80248,7 +62620,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_kernel_modules" lineno="4356">
+<interface name="files_delete_kernel_modules" lineno="4424">
<summary>
Delete kernel module files.
</summary>
@@ -80258,7 +62630,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_kernel_modules" lineno="4376">
+<interface name="files_manage_kernel_modules" lineno="4444">
<summary>
Create, read, write, and delete
kernel module files.
@@ -80270,7 +62642,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_kernel_modules" lineno="4396">
+<interface name="files_relabel_kernel_modules" lineno="4464">
<summary>
Relabel from and to kernel module files.
</summary>
@@ -80280,7 +62652,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_kernel_modules_filetrans" lineno="4431">
+<interface name="files_mounton_kernel_modules_dirs" lineno="4483">
+<summary>
+Mount on kernel module directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_kernel_modules_filetrans" lineno="4517">
<summary>
Create objects in the kernel module directories
with a private type via an automatic type transition.
@@ -80306,7 +62688,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_load_kernel_modules" lineno="4449">
+<interface name="files_load_kernel_modules" lineno="4535">
<summary>
Load kernel module files.
</summary>
@@ -80316,7 +62698,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_load_kernel_modules" lineno="4468">
+<interface name="files_dontaudit_load_kernel_modules" lineno="4554">
<summary>
Load kernel module files.
</summary>
@@ -80326,7 +62708,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_world_readable" lineno="4488">
+<interface name="files_list_world_readable" lineno="4574">
<summary>
List world-readable directories.
</summary>
@@ -80337,7 +62719,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_world_readable_files" lineno="4507">
+<interface name="files_read_world_readable_files" lineno="4593">
<summary>
Read world-readable files.
</summary>
@@ -80348,7 +62730,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_world_readable_symlinks" lineno="4526">
+<interface name="files_read_world_readable_symlinks" lineno="4612">
<summary>
Read world-readable symbolic links.
</summary>
@@ -80359,7 +62741,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_world_readable_pipes" lineno="4544">
+<interface name="files_read_world_readable_pipes" lineno="4630">
<summary>
Read world-readable named pipes.
</summary>
@@ -80369,7 +62751,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_world_readable_sockets" lineno="4562">
+<interface name="files_read_world_readable_sockets" lineno="4648">
<summary>
Read world-readable sockets.
</summary>
@@ -80379,7 +62761,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_associate_tmp" lineno="4582">
+<interface name="files_associate_tmp" lineno="4668">
<summary>
Allow the specified type to associate
to a filesystem with the type of the
@@ -80391,7 +62773,7 @@ Type of the file to associate.
</summary>
</param>
</interface>
-<interface name="files_getattr_tmp_dirs" lineno="4600">
+<interface name="files_getattr_tmp_dirs" lineno="4686">
<summary>
Get the attributes of the tmp directory (/tmp).
</summary>
@@ -80401,7 +62783,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4619">
+<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4705">
<summary>
Do not audit attempts to get the
attributes of the tmp directory (/tmp).
@@ -80412,7 +62794,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_tmp" lineno="4637">
+<interface name="files_search_tmp" lineno="4723">
<summary>
Search the tmp directory (/tmp).
</summary>
@@ -80422,7 +62804,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_tmp" lineno="4655">
+<interface name="files_dontaudit_search_tmp" lineno="4741">
<summary>
Do not audit attempts to search the tmp directory (/tmp).
</summary>
@@ -80432,7 +62814,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_tmp" lineno="4673">
+<interface name="files_list_tmp" lineno="4759">
<summary>
Read the tmp directory (/tmp).
</summary>
@@ -80442,7 +62824,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_tmp" lineno="4691">
+<interface name="files_dontaudit_list_tmp" lineno="4777">
<summary>
Do not audit listing of the tmp directory (/tmp).
</summary>
@@ -80452,7 +62834,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="files_delete_tmp_dir_entry" lineno="4709">
+<interface name="files_delete_tmp_dir_entry" lineno="4795">
<summary>
Remove entries from the tmp directory.
</summary>
@@ -80462,7 +62844,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_tmp_files" lineno="4727">
+<interface name="files_read_generic_tmp_files" lineno="4813">
<summary>
Read files in the tmp directory (/tmp).
</summary>
@@ -80472,7 +62854,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_tmp_dirs" lineno="4745">
+<interface name="files_manage_generic_tmp_dirs" lineno="4831">
<summary>
Manage temporary directories in /tmp.
</summary>
@@ -80482,7 +62864,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_generic_tmp_dirs" lineno="4763">
+<interface name="files_relabel_generic_tmp_dirs" lineno="4849">
<summary>
Relabel temporary directories in /tmp.
</summary>
@@ -80492,7 +62874,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_tmp_files" lineno="4781">
+<interface name="files_manage_generic_tmp_files" lineno="4867">
<summary>
Manage temporary files and directories in /tmp.
</summary>
@@ -80502,7 +62884,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_tmp_symlinks" lineno="4799">
+<interface name="files_read_generic_tmp_symlinks" lineno="4885">
<summary>
Read symbolic links in the tmp directory (/tmp).
</summary>
@@ -80512,7 +62894,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_generic_tmp_sockets" lineno="4817">
+<interface name="files_rw_generic_tmp_sockets" lineno="4903">
<summary>
Read and write generic named sockets in the tmp directory (/tmp).
</summary>
@@ -80522,7 +62904,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_tmp" lineno="4835">
+<interface name="files_mounton_tmp" lineno="4921">
<summary>
Mount filesystems in the tmp directory (/tmp)
</summary>
@@ -80532,7 +62914,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_all_tmp_dirs" lineno="4853">
+<interface name="files_setattr_all_tmp_dirs" lineno="4939">
<summary>
Set the attributes of all tmp directories.
</summary>
@@ -80542,7 +62924,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_all_tmp" lineno="4871">
+<interface name="files_list_all_tmp" lineno="4957">
<summary>
List all tmp directories.
</summary>
@@ -80552,7 +62934,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_tmp_dirs" lineno="4891">
+<interface name="files_relabel_all_tmp_dirs" lineno="4977">
<summary>
Relabel to and from all temporary
directory types.
@@ -80564,7 +62946,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4912">
+<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4998">
<summary>
Do not audit attempts to get the attributes
of all tmp files.
@@ -80575,7 +62957,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_tmp_files" lineno="4931">
+<interface name="files_getattr_all_tmp_files" lineno="5017">
<summary>
Allow attempts to get the attributes
of all tmp files.
@@ -80586,7 +62968,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_tmp_files" lineno="4951">
+<interface name="files_relabel_all_tmp_files" lineno="5037">
<summary>
Relabel to and from all temporary
file types.
@@ -80598,7 +62980,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4972">
+<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="5058">
<summary>
Do not audit attempts to get the attributes
of all tmp sock_file.
@@ -80609,7 +62991,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_tmp_files" lineno="4990">
+<interface name="files_read_all_tmp_files" lineno="5076">
<summary>
Read all tmp files.
</summary>
@@ -80619,7 +63001,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_tmp_filetrans" lineno="5024">
+<interface name="files_tmp_filetrans" lineno="5110">
<summary>
Create an object in the tmp directories, with a private
type using a type transition.
@@ -80645,7 +63027,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_purge_tmp" lineno="5042">
+<interface name="files_purge_tmp" lineno="5128">
<summary>
Delete the contents of /tmp.
</summary>
@@ -80655,7 +63037,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_tmpfs_files" lineno="5065">
+<interface name="files_getattr_all_tmpfs_files" lineno="5151">
<summary>
Get the attributes of all tmpfs files.
</summary>
@@ -80665,7 +63047,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_usr_dirs" lineno="5084">
+<interface name="files_setattr_usr_dirs" lineno="5170">
<summary>
Set the attributes of the /usr directory.
</summary>
@@ -80675,7 +63057,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_usr" lineno="5102">
+<interface name="files_search_usr" lineno="5188">
<summary>
Search the content of /usr.
</summary>
@@ -80685,7 +63067,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_usr" lineno="5121">
+<interface name="files_list_usr" lineno="5207">
<summary>
List the contents of generic
directories in /usr.
@@ -80696,7 +63078,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_usr_dirs" lineno="5139">
+<interface name="files_dontaudit_write_usr_dirs" lineno="5225">
<summary>
Do not audit write of /usr dirs
</summary>
@@ -80706,7 +63088,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_rw_usr_dirs" lineno="5157">
+<interface name="files_rw_usr_dirs" lineno="5243">
<summary>
Add and remove entries from /usr directories.
</summary>
@@ -80716,7 +63098,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_usr_dirs" lineno="5176">
+<interface name="files_dontaudit_rw_usr_dirs" lineno="5262">
<summary>
Do not audit attempts to add and remove
entries from /usr directories.
@@ -80727,7 +63109,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_delete_usr_dirs" lineno="5194">
+<interface name="files_delete_usr_dirs" lineno="5280">
<summary>
Delete generic directories in /usr in the caller domain.
</summary>
@@ -80737,7 +63119,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_usr_dirs" lineno="5212">
+<interface name="files_watch_usr_dirs" lineno="5298">
<summary>
Watch generic directories in /usr.
</summary>
@@ -80747,7 +63129,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_usr_files" lineno="5230">
+<interface name="files_delete_usr_files" lineno="5316">
<summary>
Delete generic files in /usr in the caller domain.
</summary>
@@ -80757,7 +63139,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_usr_files" lineno="5248">
+<interface name="files_getattr_usr_files" lineno="5334">
<summary>
Get the attributes of files in /usr.
</summary>
@@ -80767,7 +63149,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_map_usr_files" lineno="5267">
+<interface name="files_map_usr_files" lineno="5353">
<summary>
Map generic files in /usr.
</summary>
@@ -80778,7 +63160,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_read_usr_files" lineno="5303">
+<interface name="files_read_usr_files" lineno="5389">
<summary>
Read generic files in /usr.
</summary>
@@ -80806,7 +63188,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_exec_usr_files" lineno="5323">
+<interface name="files_exec_usr_files" lineno="5409">
<summary>
Execute generic programs in /usr in the caller domain.
</summary>
@@ -80816,7 +63198,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_usr_files" lineno="5343">
+<interface name="files_dontaudit_write_usr_files" lineno="5429">
<summary>
dontaudit write of /usr files
</summary>
@@ -80826,7 +63208,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_usr_files" lineno="5361">
+<interface name="files_manage_usr_files" lineno="5447">
<summary>
Create, read, write, and delete files in the /usr directory.
</summary>
@@ -80836,7 +63218,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_usr_files" lineno="5379">
+<interface name="files_relabelto_usr_files" lineno="5465">
<summary>
Relabel a file to the type used in /usr.
</summary>
@@ -80846,7 +63228,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelfrom_usr_files" lineno="5397">
+<interface name="files_relabelfrom_usr_files" lineno="5483">
<summary>
Relabel a file from the type used in /usr.
</summary>
@@ -80856,7 +63238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_usr_symlinks" lineno="5415">
+<interface name="files_read_usr_symlinks" lineno="5501">
<summary>
Read symbolic links in /usr.
</summary>
@@ -80866,7 +63248,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_usr_filetrans" lineno="5448">
+<interface name="files_usr_filetrans" lineno="5534">
<summary>
Create objects in the /usr directory
</summary>
@@ -80891,7 +63273,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_search_src" lineno="5466">
+<interface name="files_search_src" lineno="5552">
<summary>
Search directories in /usr/src.
</summary>
@@ -80901,7 +63283,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_src" lineno="5484">
+<interface name="files_dontaudit_search_src" lineno="5570">
<summary>
Do not audit attempts to search /usr/src.
</summary>
@@ -80911,7 +63293,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_usr_src_files" lineno="5502">
+<interface name="files_getattr_usr_src_files" lineno="5588">
<summary>
Get the attributes of files in /usr/src.
</summary>
@@ -80921,7 +63303,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_usr_src_files" lineno="5523">
+<interface name="files_read_usr_src_files" lineno="5609">
<summary>
Read files in /usr/src.
</summary>
@@ -80931,7 +63313,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_usr_src_files" lineno="5544">
+<interface name="files_exec_usr_src_files" lineno="5630">
<summary>
Execute programs in /usr/src in the caller domain.
</summary>
@@ -80941,7 +63323,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_kernel_symbol_table" lineno="5564">
+<interface name="files_create_kernel_symbol_table" lineno="5650">
<summary>
Install a system.map into the /boot directory.
</summary>
@@ -80951,7 +63333,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_kernel_symbol_table" lineno="5583">
+<interface name="files_read_kernel_symbol_table" lineno="5669">
<summary>
Read system.map in the /boot directory.
</summary>
@@ -80961,7 +63343,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_kernel_symbol_table" lineno="5602">
+<interface name="files_delete_kernel_symbol_table" lineno="5688">
<summary>
Delete a system.map in the /boot directory.
</summary>
@@ -80971,7 +63353,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_var" lineno="5621">
+<interface name="files_search_var" lineno="5707">
<summary>
Search the contents of /var.
</summary>
@@ -80981,7 +63363,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_var_dirs" lineno="5639">
+<interface name="files_dontaudit_write_var_dirs" lineno="5725">
<summary>
Do not audit attempts to write to /var.
</summary>
@@ -80991,7 +63373,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_write_var_dirs" lineno="5657">
+<interface name="files_write_var_dirs" lineno="5743">
<summary>
Allow attempts to write to /var.dirs
</summary>
@@ -81001,7 +63383,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_var" lineno="5676">
+<interface name="files_dontaudit_search_var" lineno="5762">
<summary>
Do not audit attempts to search
the contents of /var.
@@ -81012,7 +63394,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_var" lineno="5694">
+<interface name="files_list_var" lineno="5780">
<summary>
List the contents of /var.
</summary>
@@ -81022,7 +63404,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_var" lineno="5713">
+<interface name="files_dontaudit_list_var" lineno="5799">
<summary>
Do not audit attempts to list
the contents of /var.
@@ -81033,7 +63415,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_var_dirs" lineno="5732">
+<interface name="files_manage_var_dirs" lineno="5818">
<summary>
Create, read, write, and delete directories
in the /var directory.
@@ -81044,7 +63426,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_var_dirs" lineno="5750">
+<interface name="files_relabel_var_dirs" lineno="5836">
<summary>
relabelto/from var directories
</summary>
@@ -81054,7 +63436,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_var_files" lineno="5768">
+<interface name="files_read_var_files" lineno="5854">
<summary>
Read files in the /var directory.
</summary>
@@ -81064,7 +63446,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_append_var_files" lineno="5786">
+<interface name="files_append_var_files" lineno="5872">
<summary>
Append files in the /var directory.
</summary>
@@ -81074,7 +63456,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_var_files" lineno="5804">
+<interface name="files_rw_var_files" lineno="5890">
<summary>
Read and write files in the /var directory.
</summary>
@@ -81084,7 +63466,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_var_files" lineno="5823">
+<interface name="files_dontaudit_rw_var_files" lineno="5909">
<summary>
Do not audit attempts to read and write
files in the /var directory.
@@ -81095,7 +63477,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_var_files" lineno="5841">
+<interface name="files_manage_var_files" lineno="5927">
<summary>
Create, read, write, and delete files in the /var directory.
</summary>
@@ -81105,7 +63487,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_var_symlinks" lineno="5859">
+<interface name="files_read_var_symlinks" lineno="5945">
<summary>
Read symbolic links in the /var directory.
</summary>
@@ -81115,7 +63497,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_var_symlinks" lineno="5878">
+<interface name="files_manage_var_symlinks" lineno="5964">
<summary>
Create, read, write, and delete symbolic
links in the /var directory.
@@ -81126,7 +63508,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_var_filetrans" lineno="5911">
+<interface name="files_var_filetrans" lineno="5997">
<summary>
Create objects in the /var directory
</summary>
@@ -81151,7 +63533,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_getattr_var_lib_dirs" lineno="5929">
+<interface name="files_getattr_var_lib_dirs" lineno="6015">
<summary>
Get the attributes of the /var/lib directory.
</summary>
@@ -81161,7 +63543,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_var_lib" lineno="5961">
+<interface name="files_search_var_lib" lineno="6047">
<summary>
Search the /var/lib directory.
</summary>
@@ -81185,7 +63567,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="5"/>
</interface>
-<interface name="files_dontaudit_search_var_lib" lineno="5981">
+<interface name="files_dontaudit_search_var_lib" lineno="6067">
<summary>
Do not audit attempts to search the
contents of /var/lib.
@@ -81197,7 +63579,7 @@ Domain to not audit.
</param>
<infoflow type="read" weight="5"/>
</interface>
-<interface name="files_list_var_lib" lineno="5999">
+<interface name="files_list_var_lib" lineno="6085">
<summary>
List the contents of the /var/lib directory.
</summary>
@@ -81207,7 +63589,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_var_lib_dirs" lineno="6017">
+<interface name="files_rw_var_lib_dirs" lineno="6103">
<summary>
Read-write /var/lib directories
</summary>
@@ -81217,7 +63599,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_var_lib_dirs" lineno="6035">
+<interface name="files_manage_var_lib_dirs" lineno="6121">
<summary>
manage var_lib_t dirs
</summary>
@@ -81227,7 +63609,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_var_lib_dirs" lineno="6054">
+<interface name="files_relabel_var_lib_dirs" lineno="6140">
<summary>
relabel var_lib_t dirs
</summary>
@@ -81237,7 +63619,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_var_lib_filetrans" lineno="6088">
+<interface name="files_var_lib_filetrans" lineno="6174">
<summary>
Create objects in the /var/lib directory
</summary>
@@ -81262,7 +63644,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_read_var_lib_files" lineno="6107">
+<interface name="files_read_var_lib_files" lineno="6193">
<summary>
Read generic files in /var/lib.
</summary>
@@ -81272,7 +63654,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_var_lib_symlinks" lineno="6126">
+<interface name="files_read_var_lib_symlinks" lineno="6212">
<summary>
Read generic symbolic links in /var/lib
</summary>
@@ -81282,7 +63664,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_urandom_seed" lineno="6148">
+<interface name="files_manage_urandom_seed" lineno="6234">
<summary>
Create, read, write, and delete the
pseudorandom number generator seed.
@@ -81293,7 +63675,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_mounttab" lineno="6168">
+<interface name="files_manage_mounttab" lineno="6254">
<summary>
Allow domain to manage mount tables
necessary for rpcd, nfsd, etc.
@@ -81304,7 +63686,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_lock_dirs" lineno="6187">
+<interface name="files_setattr_lock_dirs" lineno="6273">
<summary>
Set the attributes of the generic lock directories.
</summary>
@@ -81314,7 +63696,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_locks" lineno="6205">
+<interface name="files_search_locks" lineno="6291">
<summary>
Search the locks directory (/var/lock).
</summary>
@@ -81324,7 +63706,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_locks" lineno="6225">
+<interface name="files_dontaudit_search_locks" lineno="6311">
<summary>
Do not audit attempts to search the
locks directory (/var/lock).
@@ -81335,7 +63717,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_locks" lineno="6244">
+<interface name="files_list_locks" lineno="6330">
<summary>
List generic lock directories.
</summary>
@@ -81345,7 +63727,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_check_write_lock_dirs" lineno="6263">
+<interface name="files_check_write_lock_dirs" lineno="6349">
<summary>
Test write access on lock directories.
</summary>
@@ -81355,7 +63737,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_add_entry_lock_dirs" lineno="6282">
+<interface name="files_add_entry_lock_dirs" lineno="6368">
<summary>
Add entries in the /var/lock directories.
</summary>
@@ -81365,7 +63747,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_lock_dirs" lineno="6302">
+<interface name="files_rw_lock_dirs" lineno="6388">
<summary>
Add and remove entries in the /var/lock
directories.
@@ -81376,7 +63758,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_lock_dirs" lineno="6321">
+<interface name="files_create_lock_dirs" lineno="6407">
<summary>
Create lock directories
</summary>
@@ -81386,7 +63768,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_relabel_all_lock_dirs" lineno="6342">
+<interface name="files_relabel_all_lock_dirs" lineno="6428">
<summary>
Relabel to and from all lock directory types.
</summary>
@@ -81397,7 +63779,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_generic_locks" lineno="6363">
+<interface name="files_getattr_generic_locks" lineno="6449">
<summary>
Get the attributes of generic lock files.
</summary>
@@ -81407,7 +63789,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_generic_locks" lineno="6384">
+<interface name="files_delete_generic_locks" lineno="6470">
<summary>
Delete generic lock files.
</summary>
@@ -81417,7 +63799,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_locks" lineno="6405">
+<interface name="files_manage_generic_locks" lineno="6491">
<summary>
Create, read, write, and delete generic
lock files.
@@ -81428,7 +63810,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_locks" lineno="6427">
+<interface name="files_delete_all_locks" lineno="6513">
<summary>
Delete all lock files.
</summary>
@@ -81439,7 +63821,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_all_locks" lineno="6448">
+<interface name="files_read_all_locks" lineno="6534">
<summary>
Read all lock files.
</summary>
@@ -81449,7 +63831,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_all_locks" lineno="6471">
+<interface name="files_manage_all_locks" lineno="6557">
<summary>
manage all lock files.
</summary>
@@ -81459,7 +63841,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_locks" lineno="6494">
+<interface name="files_relabel_all_locks" lineno="6580">
<summary>
Relabel from/to all lock files.
</summary>
@@ -81469,7 +63851,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_lock_filetrans" lineno="6533">
+<interface name="files_lock_filetrans" lineno="6619">
<summary>
Create an object in the locks directory, with a private
type using a type transition.
@@ -81495,91 +63877,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_pid_dirs" lineno="6554">
-<summary>
-Do not audit attempts to get the attributes
-of the /var/run directory. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="files_mounton_pid_dirs" lineno="6569">
-<summary>
-mounton a /var/run directory. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_setattr_pid_dirs" lineno="6584">
-<summary>
-Set the attributes of the /var/run directory. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_search_pids" lineno="6600">
-<summary>
-Search the contents of runtime process
-ID directories (/var/run). (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_dontaudit_search_pids" lineno="6616">
-<summary>
-Do not audit attempts to search
-the /var/run directory. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="files_list_pids" lineno="6632">
-<summary>
-List the contents of the runtime process
-ID directories (/var/run). (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_check_write_pid_dirs" lineno="6647">
-<summary>
-Check write access on /var/run directories. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_create_pid_dirs" lineno="6662">
-<summary>
-Create a /var/run directory. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6678">
+<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6640">
<summary>
Do not audit attempts to get the attributes
of the /var/run directory.
@@ -81590,7 +63888,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_mounton_runtime_dirs" lineno="6697">
+<interface name="files_mounton_runtime_dirs" lineno="6659">
<summary>
mounton a /var/run directory.
</summary>
@@ -81600,7 +63898,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_runtime_dirs" lineno="6715">
+<interface name="files_setattr_runtime_dirs" lineno="6677">
<summary>
Set the attributes of the /var/run directory.
</summary>
@@ -81610,7 +63908,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_runtime" lineno="6735">
+<interface name="files_search_runtime" lineno="6697">
<summary>
Search the contents of runtime process
ID directories (/var/run).
@@ -81621,7 +63919,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_runtime" lineno="6755">
+<interface name="files_dontaudit_search_runtime" lineno="6717">
<summary>
Do not audit attempts to search
the /var/run directory.
@@ -81632,7 +63930,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_runtime" lineno="6775">
+<interface name="files_list_runtime" lineno="6737">
<summary>
List the contents of the runtime process
ID directories (/var/run).
@@ -81643,7 +63941,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_check_write_runtime_dirs" lineno="6794">
+<interface name="files_check_write_runtime_dirs" lineno="6756">
<summary>
Check write access on /var/run directories.
</summary>
@@ -81653,7 +63951,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_runtime_dirs" lineno="6812">
+<interface name="files_create_runtime_dirs" lineno="6774">
<summary>
Create a /var/run directory.
</summary>
@@ -81663,7 +63961,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_runtime_dirs" lineno="6830">
+<interface name="files_watch_runtime_dirs" lineno="6792">
<summary>
Watch /var/run directories.
</summary>
@@ -81673,208 +63971,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_pids" lineno="6848">
-<summary>
-Read generic process ID files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_write_generic_pid_pipes" lineno="6863">
-<summary>
-Write named generic process ID pipes. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_pid_filetrans" lineno="6920">
-<summary>
-Create an object in the process ID directory, with a private type. (Deprecated)
-</summary>
-<desc>
-<p>
-Create an object in the process ID directory (e.g., /var/run)
-with a private type. Typically this is used for creating
-private PID files in /var/run with the private type instead
-of the general PID file type. To accomplish this goal,
-either the program must be SELinux-aware, or use this interface.
-</p>
-<p>
-Related interfaces:
-</p>
-<ul>
-<li>files_runtime_file()</li>
-</ul>
-<p>
-Example usage with a domain that can create and
-write its PID file with a private PID file type in the
-/var/run directory:
-</p>
-<p>
-type mypidfile_t;
-files_runtime_file(mypidfile_t)
-allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
-files_runtime_filetrans(mydomain_t, mypidfile_t, file)
-</p>
-</desc>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="private type">
-<summary>
-The type of the object to be created.
-</summary>
-</param>
-<param name="object">
-<summary>
-The object class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="files_pid_filetrans_lock_dir" lineno="6940">
-<summary>
-Create a generic lock directory within the run directories. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="files_rw_generic_pids" lineno="6955">
-<summary>
-Read and write generic process ID files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_dontaudit_getattr_all_pids" lineno="6971">
-<summary>
-Do not audit attempts to get the attributes of
-daemon runtime data files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="files_dontaudit_write_all_pids" lineno="6986">
-<summary>
-Do not audit attempts to write to daemon runtime data files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="files_dontaudit_ioctl_all_pids" lineno="7001">
-<summary>
-Do not audit attempts to ioctl daemon runtime data files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="files_manage_all_pid_dirs" lineno="7017">
-<summary>
-manage all pidfile directories
-in the /var/run directory. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_read_all_pids" lineno="7033">
-<summary>
-Read all process ID files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="files_exec_generic_pid_files" lineno="7048">
-<summary>
-Execute generic programs in /var/run in the caller domain. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_relabel_all_pid_files" lineno="7063">
-<summary>
-Relabel all pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_delete_all_pids" lineno="7079">
-<summary>
-Delete all process IDs. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="files_create_all_pid_sockets" lineno="7098">
-<summary>
-Create all pid sockets. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_create_all_pid_pipes" lineno="7113">
-<summary>
-Create all pid named pipes. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_read_runtime_files" lineno="7128">
+<interface name="files_read_runtime_files" lineno="6810">
<summary>
Read generic runtime files.
</summary>
@@ -81884,7 +63981,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_runtime" lineno="7148">
+<interface name="files_exec_runtime" lineno="6830">
<summary>
Execute generic programs in /var/run in the caller domain.
</summary>
@@ -81894,7 +63991,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_runtime_files" lineno="7166">
+<interface name="files_rw_runtime_files" lineno="6848">
<summary>
Read and write generic runtime files.
</summary>
@@ -81904,7 +64001,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_runtime_symlinks" lineno="7186">
+<interface name="files_delete_runtime_symlinks" lineno="6868">
<summary>
Delete generic runtime symlinks.
</summary>
@@ -81914,7 +64011,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_runtime_pipes" lineno="7204">
+<interface name="files_write_runtime_pipes" lineno="6886">
<summary>
Write named generic runtime pipes.
</summary>
@@ -81924,7 +64021,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_runtime_dirs" lineno="7224">
+<interface name="files_delete_all_runtime_dirs" lineno="6906">
<summary>
Delete all runtime dirs.
</summary>
@@ -81935,7 +64032,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_runtime_dirs" lineno="7242">
+<interface name="files_manage_all_runtime_dirs" lineno="6924">
<summary>
Create, read, write, and delete all runtime directories.
</summary>
@@ -81945,7 +64042,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_runtime_dirs" lineno="7260">
+<interface name="files_relabel_all_runtime_dirs" lineno="6942">
<summary>
Relabel all runtime directories.
</summary>
@@ -81955,7 +64052,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7279">
+<interface name="files_dontaudit_getattr_all_runtime_files" lineno="6961">
<summary>
Do not audit attempts to get the attributes of
all runtime data files.
@@ -81966,7 +64063,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_runtime_files" lineno="7300">
+<interface name="files_read_all_runtime_files" lineno="6982">
<summary>
Read all runtime files.
</summary>
@@ -81977,7 +64074,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7321">
+<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7003">
<summary>
Do not audit attempts to ioctl all runtime files.
</summary>
@@ -81987,7 +64084,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_all_runtime_files" lineno="7341">
+<interface name="files_dontaudit_write_all_runtime_files" lineno="7023">
<summary>
Do not audit attempts to write to all runtime files.
</summary>
@@ -81997,7 +64094,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_delete_all_runtime_files" lineno="7362">
+<interface name="files_delete_all_runtime_files" lineno="7044">
<summary>
Delete all runtime files.
</summary>
@@ -82008,7 +64105,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_runtime_files" lineno="7381">
+<interface name="files_manage_all_runtime_files" lineno="7063">
<summary>
Create, read, write and delete all
var_run (pid) files
@@ -82019,7 +64116,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_runtime_files" lineno="7399">
+<interface name="files_relabel_all_runtime_files" lineno="7081">
<summary>
Relabel all runtime files.
</summary>
@@ -82029,7 +64126,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_runtime_symlinks" lineno="7418">
+<interface name="files_delete_all_runtime_symlinks" lineno="7100">
<summary>
Delete all runtime symlinks.
</summary>
@@ -82040,7 +64137,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_runtime_symlinks" lineno="7437">
+<interface name="files_manage_all_runtime_symlinks" lineno="7119">
<summary>
Create, read, write and delete all
var_run (pid) symbolic links.
@@ -82051,7 +64148,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_runtime_symlinks" lineno="7455">
+<interface name="files_relabel_all_runtime_symlinks" lineno="7137">
<summary>
Relabel all runtime symbolic links.
</summary>
@@ -82061,7 +64158,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_runtime_pipes" lineno="7473">
+<interface name="files_create_all_runtime_pipes" lineno="7155">
<summary>
Create all runtime named pipes
</summary>
@@ -82071,7 +64168,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_runtime_pipes" lineno="7492">
+<interface name="files_delete_all_runtime_pipes" lineno="7174">
<summary>
Delete all runtime named pipes
</summary>
@@ -82081,7 +64178,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_runtime_sockets" lineno="7511">
+<interface name="files_create_all_runtime_sockets" lineno="7193">
<summary>
Create all runtime sockets.
</summary>
@@ -82091,7 +64188,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_runtime_sockets" lineno="7529">
+<interface name="files_delete_all_runtime_sockets" lineno="7211">
<summary>
Delete all runtime sockets.
</summary>
@@ -82101,7 +64198,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_runtime_sockets" lineno="7547">
+<interface name="files_relabel_all_runtime_sockets" lineno="7229">
<summary>
Relabel all runtime named sockets.
</summary>
@@ -82111,7 +64208,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_runtime_filetrans" lineno="7607">
+<interface name="files_runtime_filetrans" lineno="7289">
<summary>
Create an object in the /run directory, with a private type.
</summary>
@@ -82163,7 +64260,7 @@ The name of the object being created.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="files_runtime_filetrans_lock_dir" lineno="7632">
+<interface name="files_runtime_filetrans_lock_dir" lineno="7314">
<summary>
Create a generic lock directory within the run directories.
</summary>
@@ -82178,7 +64275,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_create_all_spool_sockets" lineno="7650">
+<interface name="files_create_all_spool_sockets" lineno="7332">
<summary>
Create all spool sockets
</summary>
@@ -82188,7 +64285,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_spool_sockets" lineno="7668">
+<interface name="files_delete_all_spool_sockets" lineno="7350">
<summary>
Delete all spool sockets
</summary>
@@ -82198,58 +64295,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_pid_dirs" lineno="7686">
-<summary>
-Delete all process ID directories. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_manage_all_pids" lineno="7702">
-<summary>
-Create, read, write and delete all
-var_run (pid) content (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_relabel_all_pid_dirs" lineno="7719">
-<summary>
-Relabel to/from all var_run (pid) directories (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_relabel_all_pid_sock_files" lineno="7734">
-<summary>
-Relabel to/from all var_run (pid) socket files (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_relabel_all_pids" lineno="7749">
-<summary>
-Relabel to/from all var_run (pid) files and directories (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="files_mounton_all_poly_members" lineno="7767">
+<interface name="files_mounton_all_poly_members" lineno="7369">
<summary>
Mount filesystems on all polyinstantiation
member directories.
@@ -82260,7 +64306,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_spool" lineno="7786">
+<interface name="files_search_spool" lineno="7388">
<summary>
Search the contents of generic spool
directories (/var/spool).
@@ -82271,7 +64317,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_spool" lineno="7805">
+<interface name="files_dontaudit_search_spool" lineno="7407">
<summary>
Do not audit attempts to search generic
spool directories.
@@ -82282,7 +64328,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_spool" lineno="7824">
+<interface name="files_list_spool" lineno="7426">
<summary>
List the contents of generic spool
(/var/spool) directories.
@@ -82293,7 +64339,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_spool_dirs" lineno="7843">
+<interface name="files_manage_generic_spool_dirs" lineno="7445">
<summary>
Create, read, write, and delete generic
spool directories (/var/spool).
@@ -82304,7 +64350,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_spool" lineno="7862">
+<interface name="files_read_generic_spool" lineno="7464">
<summary>
Read generic spool files.
</summary>
@@ -82314,7 +64360,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_spool" lineno="7882">
+<interface name="files_manage_generic_spool" lineno="7484">
<summary>
Create, read, write, and delete generic
spool files.
@@ -82325,7 +64371,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_spool_filetrans" lineno="7918">
+<interface name="files_spool_filetrans" lineno="7520">
<summary>
Create objects in the spool directory
with a private type with a type transition.
@@ -82352,7 +64398,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_polyinstantiate_all" lineno="7938">
+<interface name="files_polyinstantiate_all" lineno="7540">
<summary>
Allow access to manage all polyinstantiated
directories on the system.
@@ -82363,7 +64409,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_unconfined" lineno="7992">
+<interface name="files_unconfined" lineno="7594">
<summary>
Unconfined access to files.
</summary>
@@ -82373,7 +64419,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_etc_runtime_lnk_files" lineno="8014">
+<interface name="files_manage_etc_runtime_lnk_files" lineno="7616">
<summary>
Create, read, write, and delete symbolic links in
/etc that are dynamically created on boot.
@@ -82385,7 +64431,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_read_etc_runtime" lineno="8032">
+<interface name="files_dontaudit_read_etc_runtime" lineno="7634">
<summary>
Do not audit attempts to read etc_runtime resources
</summary>
@@ -82395,7 +64441,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_src" lineno="8050">
+<interface name="files_list_src" lineno="7652">
<summary>
List usr/src files
</summary>
@@ -82405,7 +64451,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_read_src_files" lineno="8068">
+<interface name="files_read_src_files" lineno="7670">
<summary>
Read usr/src files
</summary>
@@ -82415,7 +64461,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_manage_src_files" lineno="8086">
+<interface name="files_manage_src_files" lineno="7688">
<summary>
Manage /usr/src files
</summary>
@@ -82425,7 +64471,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_lib_filetrans_kernel_modules" lineno="8117">
+<interface name="files_lib_filetrans_kernel_modules" lineno="7719">
<summary>
Create a resource in the generic lib location
with an automatic type transition towards the kernel modules
@@ -82447,7 +64493,7 @@ Optional name of the resource
</summary>
</param>
</interface>
-<interface name="files_read_etc_runtime" lineno="8135">
+<interface name="files_read_etc_runtime" lineno="7737">
<summary>
Read etc runtime resources
</summary>
@@ -82457,7 +64503,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_relabel_all_non_security_file_types" lineno="8157">
+<interface name="files_relabel_all_non_security_file_types" lineno="7759">
<summary>
Allow relabel from and to non-security types
</summary>
@@ -82468,7 +64514,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_non_security_file_types" lineno="8187">
+<interface name="files_manage_all_non_security_file_types" lineno="7789">
<summary>
Manage non-security-sensitive resource types
</summary>
@@ -82479,7 +64525,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_all_pidfiles" lineno="8209">
+<interface name="files_relabel_all_pidfiles" lineno="7811">
<summary>
Allow relabeling from and to any pidfile associated type
</summary>
@@ -82897,7 +64943,37 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_mount_cgroup" lineno="672">
+<interface name="fs_mount_bpf" lineno="672">
+<summary>
+Mount a bpf filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_create_bpf_dirs" lineno="690">
+<summary>
+Create bpf directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_manage_bpf_files" lineno="708">
+<summary>
+Manage bpf files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_mount_cgroup" lineno="726">
<summary>
Mount cgroup filesystems.
</summary>
@@ -82907,7 +64983,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_cgroup" lineno="690">
+<interface name="fs_remount_cgroup" lineno="744">
<summary>
Remount cgroup filesystems.
</summary>
@@ -82917,7 +64993,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_cgroup" lineno="708">
+<interface name="fs_unmount_cgroup" lineno="762">
<summary>
Unmount cgroup filesystems.
</summary>
@@ -82927,7 +65003,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_cgroup" lineno="726">
+<interface name="fs_getattr_cgroup" lineno="780">
<summary>
Get attributes of cgroup filesystems.
</summary>
@@ -82937,7 +65013,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_cgroup_dirs" lineno="744">
+<interface name="fs_search_cgroup_dirs" lineno="798">
<summary>
Search cgroup directories.
</summary>
@@ -82947,7 +65023,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_cgroup_dirs" lineno="764">
+<interface name="fs_list_cgroup_dirs" lineno="818">
<summary>
list cgroup directories.
</summary>
@@ -82957,7 +65033,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_ioctl_cgroup_dirs" lineno="783">
+<interface name="fs_ioctl_cgroup_dirs" lineno="837">
<summary>
Ioctl cgroup directories.
</summary>
@@ -82967,7 +65043,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_delete_cgroup_dirs" lineno="802">
+<interface name="fs_delete_cgroup_dirs" lineno="856">
<summary>
Delete cgroup directories.
</summary>
@@ -82977,7 +65053,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_cgroup_dirs" lineno="821">
+<interface name="fs_manage_cgroup_dirs" lineno="875">
<summary>
Manage cgroup directories.
</summary>
@@ -82987,7 +65063,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_cgroup_dirs" lineno="841">
+<interface name="fs_relabel_cgroup_dirs" lineno="895">
<summary>
Relabel cgroup directories.
</summary>
@@ -82997,7 +65073,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_cgroup_files" lineno="859">
+<interface name="fs_getattr_cgroup_files" lineno="913">
<summary>
Get attributes of cgroup files.
</summary>
@@ -83007,7 +65083,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cgroup_files" lineno="879">
+<interface name="fs_read_cgroup_files" lineno="933">
<summary>
Read cgroup files.
</summary>
@@ -83017,7 +65093,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_watch_cgroup_files" lineno="900">
+<interface name="fs_watch_cgroup_files" lineno="954">
<summary>
Watch cgroup files.
</summary>
@@ -83027,7 +65103,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_create_cgroup_links" lineno="919">
+<interface name="fs_create_cgroup_links" lineno="973">
<summary>
Create cgroup lnk_files.
</summary>
@@ -83037,7 +65113,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_write_cgroup_files" lineno="939">
+<interface name="fs_write_cgroup_files" lineno="993">
<summary>
Write cgroup files.
</summary>
@@ -83047,7 +65123,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_cgroup_files" lineno="958">
+<interface name="fs_rw_cgroup_files" lineno="1012">
<summary>
Read and write cgroup files.
</summary>
@@ -83057,7 +65133,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_rw_cgroup_files" lineno="980">
+<interface name="fs_dontaudit_rw_cgroup_files" lineno="1034">
<summary>
Do not audit attempts to open,
get attributes, read and write
@@ -83069,7 +65145,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_cgroup_files" lineno="998">
+<interface name="fs_manage_cgroup_files" lineno="1052">
<summary>
Manage cgroup files.
</summary>
@@ -83079,7 +65155,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_cgroup_symlinks" lineno="1018">
+<interface name="fs_relabel_cgroup_symlinks" lineno="1072">
<summary>
Relabel cgroup symbolic links.
</summary>
@@ -83089,7 +65165,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mounton_cgroup" lineno="1036">
+<interface name="fs_watch_cgroup_dirs" lineno="1090">
+<summary>
+Watch cgroup directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_mounton_cgroup" lineno="1108">
<summary>
Mount on cgroup directories.
</summary>
@@ -83099,7 +65185,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_cgroup_filetrans" lineno="1070">
+<interface name="fs_cgroup_filetrans" lineno="1142">
<summary>
Create an object in a cgroup tmpfs filesystem, with a private
type using a type transition.
@@ -83125,7 +65211,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_cifs_dirs" lineno="1091">
+<interface name="fs_dontaudit_list_cifs_dirs" lineno="1163">
<summary>
Do not audit attempts to read
dirs on a CIFS or SMB filesystem.
@@ -83136,7 +65222,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mount_cifs" lineno="1109">
+<interface name="fs_mount_cifs" lineno="1181">
<summary>
Mount a CIFS or SMB network filesystem.
</summary>
@@ -83146,7 +65232,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_cifs" lineno="1128">
+<interface name="fs_remount_cifs" lineno="1200">
<summary>
Remount a CIFS or SMB network filesystem.
This allows some mount options to be changed.
@@ -83157,7 +65243,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_cifs" lineno="1146">
+<interface name="fs_unmount_cifs" lineno="1218">
<summary>
Unmount a CIFS or SMB network filesystem.
</summary>
@@ -83167,7 +65253,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_cifs" lineno="1166">
+<interface name="fs_getattr_cifs" lineno="1238">
<summary>
Get the attributes of a CIFS or
SMB network filesystem.
@@ -83179,7 +65265,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_search_cifs" lineno="1184">
+<interface name="fs_search_cifs" lineno="1256">
<summary>
Search directories on a CIFS or SMB filesystem.
</summary>
@@ -83189,7 +65275,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_cifs" lineno="1203">
+<interface name="fs_list_cifs" lineno="1275">
<summary>
List the contents of directories on a
CIFS or SMB filesystem.
@@ -83200,7 +65286,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_cifs" lineno="1222">
+<interface name="fs_dontaudit_list_cifs" lineno="1294">
<summary>
Do not audit attempts to list the contents
of directories on a CIFS or SMB filesystem.
@@ -83211,7 +65297,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mounton_cifs" lineno="1240">
+<interface name="fs_mounton_cifs" lineno="1312">
<summary>
Mounton a CIFS filesystem.
</summary>
@@ -83221,7 +65307,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_files" lineno="1259">
+<interface name="fs_read_cifs_files" lineno="1331">
<summary>
Read files on a CIFS or SMB filesystem.
</summary>
@@ -83232,7 +65318,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_read_all_inherited_image_files" lineno="1279">
+<interface name="fs_read_all_inherited_image_files" lineno="1351">
<summary>
Read all inherited filesystem image files.
</summary>
@@ -83243,7 +65329,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_read_all_image_files" lineno="1298">
+<interface name="fs_read_all_image_files" lineno="1370">
<summary>
Read all filesystem image files.
</summary>
@@ -83254,7 +65340,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_mmap_read_all_image_files" lineno="1317">
+<interface name="fs_mmap_read_all_image_files" lineno="1389">
<summary>
Mmap-read all filesystem image files.
</summary>
@@ -83265,7 +65351,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_rw_all_image_files" lineno="1336">
+<interface name="fs_rw_all_image_files" lineno="1408">
<summary>
Read and write all filesystem image files.
</summary>
@@ -83276,7 +65362,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_mmap_rw_all_image_files" lineno="1355">
+<interface name="fs_mmap_rw_all_image_files" lineno="1427">
<summary>
Mmap-Read-write all filesystem image files.
</summary>
@@ -83287,7 +65373,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_write_all_image_files" lineno="1374">
+<interface name="fs_dontaudit_write_all_image_files" lineno="1446">
<summary>
Do not audit attempts to write all filesystem image files.
</summary>
@@ -83298,7 +65384,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_noxattr_fs" lineno="1394">
+<interface name="fs_getattr_noxattr_fs" lineno="1466">
<summary>
Get the attributes of filesystems that
do not have extended attribute support.
@@ -83310,7 +65396,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_list_noxattr_fs" lineno="1412">
+<interface name="fs_list_noxattr_fs" lineno="1484">
<summary>
Read all noxattrfs directories.
</summary>
@@ -83320,7 +65406,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_noxattr_fs" lineno="1431">
+<interface name="fs_dontaudit_list_noxattr_fs" lineno="1503">
<summary>
Do not audit attempts to list all
noxattrfs directories.
@@ -83331,7 +65417,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_noxattr_fs_dirs" lineno="1449">
+<interface name="fs_manage_noxattr_fs_dirs" lineno="1521">
<summary>
Create, read, write, and delete all noxattrfs directories.
</summary>
@@ -83341,7 +65427,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_noxattr_fs_files" lineno="1467">
+<interface name="fs_read_noxattr_fs_files" lineno="1539">
<summary>
Read all noxattrfs files.
</summary>
@@ -83351,7 +65437,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1487">
+<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1559">
<summary>
Do not audit attempts to read all
noxattrfs files.
@@ -83362,7 +65448,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1505">
+<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1577">
<summary>
Dont audit attempts to write to noxattrfs files.
</summary>
@@ -83372,7 +65458,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_noxattr_fs_files" lineno="1523">
+<interface name="fs_manage_noxattr_fs_files" lineno="1595">
<summary>
Create, read, write, and delete all noxattrfs files.
</summary>
@@ -83382,7 +65468,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_noxattr_fs_symlinks" lineno="1542">
+<interface name="fs_read_noxattr_fs_symlinks" lineno="1614">
<summary>
Read all noxattrfs symbolic links.
</summary>
@@ -83392,7 +65478,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_noxattr_fs_symlinks" lineno="1561">
+<interface name="fs_manage_noxattr_fs_symlinks" lineno="1633">
<summary>
Manage all noxattrfs symbolic links.
</summary>
@@ -83402,7 +65488,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_noxattr_fs" lineno="1581">
+<interface name="fs_relabelfrom_noxattr_fs" lineno="1653">
<summary>
Relabel all objects from filesystems that
do not support extended attributes.
@@ -83413,7 +65499,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_cifs_files" lineno="1607">
+<interface name="fs_dontaudit_read_cifs_files" lineno="1679">
<summary>
Do not audit attempts to read
files on a CIFS or SMB filesystem.
@@ -83424,7 +65510,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_append_cifs_files" lineno="1627">
+<interface name="fs_append_cifs_files" lineno="1699">
<summary>
Append files
on a CIFS filesystem.
@@ -83436,7 +65522,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_append_cifs_files" lineno="1647">
+<interface name="fs_dontaudit_append_cifs_files" lineno="1719">
<summary>
dontaudit Append files
on a CIFS filesystem.
@@ -83448,7 +65534,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_rw_cifs_files" lineno="1666">
+<interface name="fs_dontaudit_rw_cifs_files" lineno="1738">
<summary>
Do not audit attempts to read or
write files on a CIFS or SMB filesystem.
@@ -83459,7 +65545,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_symlinks" lineno="1684">
+<interface name="fs_read_cifs_symlinks" lineno="1756">
<summary>
Read symbolic links on a CIFS or SMB filesystem.
</summary>
@@ -83469,7 +65555,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_named_pipes" lineno="1704">
+<interface name="fs_read_cifs_named_pipes" lineno="1776">
<summary>
Read named pipes
on a CIFS or SMB network filesystem.
@@ -83480,7 +65566,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_named_sockets" lineno="1723">
+<interface name="fs_read_cifs_named_sockets" lineno="1795">
<summary>
Read named sockets
on a CIFS or SMB network filesystem.
@@ -83491,7 +65577,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_exec_cifs_files" lineno="1744">
+<interface name="fs_exec_cifs_files" lineno="1816">
<summary>
Execute files on a CIFS or SMB
network filesystem, in the caller
@@ -83504,7 +65590,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_cifs_dirs" lineno="1765">
+<interface name="fs_manage_cifs_dirs" lineno="1837">
<summary>
Create, read, write, and delete directories
on a CIFS or SMB network filesystem.
@@ -83516,7 +65602,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1785">
+<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1857">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -83528,7 +65614,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_files" lineno="1805">
+<interface name="fs_manage_cifs_files" lineno="1877">
<summary>
Create, read, write, and delete files
on a CIFS or SMB network filesystem.
@@ -83540,7 +65626,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_cifs_files" lineno="1825">
+<interface name="fs_dontaudit_manage_cifs_files" lineno="1897">
<summary>
Do not audit attempts to create, read,
write, and delete files
@@ -83552,7 +65638,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_symlinks" lineno="1844">
+<interface name="fs_manage_cifs_symlinks" lineno="1916">
<summary>
Create, read, write, and delete symbolic links
on a CIFS or SMB network filesystem.
@@ -83563,7 +65649,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_named_pipes" lineno="1863">
+<interface name="fs_manage_cifs_named_pipes" lineno="1935">
<summary>
Create, read, write, and delete named pipes
on a CIFS or SMB network filesystem.
@@ -83574,7 +65660,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_named_sockets" lineno="1882">
+<interface name="fs_manage_cifs_named_sockets" lineno="1954">
<summary>
Create, read, write, and delete named sockets
on a CIFS or SMB network filesystem.
@@ -83585,7 +65671,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_cifs_domtrans" lineno="1925">
+<interface name="fs_cifs_domtrans" lineno="1997">
<summary>
Execute a file on a CIFS or SMB filesystem
in the specified domain.
@@ -83620,7 +65706,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="fs_manage_configfs_dirs" lineno="1945">
+<interface name="fs_manage_configfs_dirs" lineno="2017">
<summary>
Create, read, write, and delete dirs
on a configfs filesystem.
@@ -83631,7 +65717,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_configfs_files" lineno="1964">
+<interface name="fs_manage_configfs_files" lineno="2036">
<summary>
Create, read, write, and delete files
on a configfs filesystem.
@@ -83642,7 +65728,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_dos_fs" lineno="1983">
+<interface name="fs_mount_dos_fs" lineno="2055">
<summary>
Mount a DOS filesystem, such as
FAT32 or NTFS.
@@ -83653,7 +65739,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_dos_fs" lineno="2003">
+<interface name="fs_remount_dos_fs" lineno="2075">
<summary>
Remount a DOS filesystem, such as
FAT32 or NTFS. This allows
@@ -83665,7 +65751,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_dos_fs" lineno="2022">
+<interface name="fs_unmount_dos_fs" lineno="2094">
<summary>
Unmount a DOS filesystem, such as
FAT32 or NTFS.
@@ -83676,7 +65762,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_dos_fs" lineno="2042">
+<interface name="fs_getattr_dos_fs" lineno="2114">
<summary>
Get the attributes of a DOS
filesystem, such as FAT32 or NTFS.
@@ -83688,7 +65774,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_relabelfrom_dos_fs" lineno="2061">
+<interface name="fs_relabelfrom_dos_fs" lineno="2133">
<summary>
Allow changing of the label of a
DOS filesystem using the context= mount option.
@@ -83699,7 +65785,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_dos_dirs" lineno="2079">
+<interface name="fs_getattr_dos_dirs" lineno="2151">
<summary>
Get attributes of directories on a dosfs filesystem.
</summary>
@@ -83709,7 +65795,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_dos" lineno="2097">
+<interface name="fs_search_dos" lineno="2169">
<summary>
Search dosfs filesystem.
</summary>
@@ -83719,7 +65805,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_dos" lineno="2115">
+<interface name="fs_list_dos" lineno="2187">
<summary>
List dirs DOS filesystem.
</summary>
@@ -83729,7 +65815,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_dos_dirs" lineno="2134">
+<interface name="fs_manage_dos_dirs" lineno="2206">
<summary>
Create, read, write, and delete dirs
on a DOS filesystem.
@@ -83740,7 +65826,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_dos_files" lineno="2152">
+<interface name="fs_read_dos_files" lineno="2224">
<summary>
Read files on a DOS filesystem.
</summary>
@@ -83750,7 +65836,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mmap_read_dos_files" lineno="2170">
+<interface name="fs_mmap_read_dos_files" lineno="2242">
<summary>
Read and map files on a DOS filesystem.
</summary>
@@ -83760,7 +65846,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_dos_files" lineno="2190">
+<interface name="fs_manage_dos_files" lineno="2262">
<summary>
Create, read, write, and delete files
on a DOS filesystem.
@@ -83771,7 +65857,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_ecryptfs" lineno="2208">
+<interface name="fs_list_ecryptfs" lineno="2280">
<summary>
Read symbolic links on an eCryptfs filesystem.
</summary>
@@ -83781,7 +65867,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_ecryptfs_dirs" lineno="2229">
+<interface name="fs_manage_ecryptfs_dirs" lineno="2301">
<summary>
Create, read, write, and delete directories
on an eCryptfs filesystem.
@@ -83793,7 +65879,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_ecryptfs_files" lineno="2249">
+<interface name="fs_manage_ecryptfs_files" lineno="2321">
<summary>
Create, read, write, and delete files
on an eCryptfs filesystem.
@@ -83805,7 +65891,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_ecryptfs_named_sockets" lineno="2268">
+<interface name="fs_manage_ecryptfs_named_sockets" lineno="2340">
<summary>
Create, read, write, and delete named sockets
on an eCryptfs filesystem.
@@ -83816,7 +65902,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_efivarfs" lineno="2286">
+<interface name="fs_getattr_efivarfs" lineno="2358">
<summary>
Get the attributes of efivarfs filesystems.
</summary>
@@ -83826,7 +65912,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_efivars" lineno="2304">
+<interface name="fs_list_efivars" lineno="2376">
<summary>
List dirs in efivarfs filesystem.
</summary>
@@ -83836,7 +65922,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_efivarfs_files" lineno="2324">
+<interface name="fs_read_efivarfs_files" lineno="2396">
<summary>
Read files in efivarfs
- contains Linux Kernel configuration options for UEFI systems
@@ -83848,7 +65934,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_efivarfs_files" lineno="2344">
+<interface name="fs_manage_efivarfs_files" lineno="2416">
<summary>
Create, read, write, and delete files
on a efivarfs filesystem.
@@ -83860,7 +65946,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_fusefs" lineno="2362">
+<interface name="fs_getattr_fusefs" lineno="2434">
<summary>
stat a FUSE filesystem
</summary>
@@ -83870,7 +65956,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_fusefs" lineno="2380">
+<interface name="fs_mount_fusefs" lineno="2452">
<summary>
Mount a FUSE filesystem.
</summary>
@@ -83880,7 +65966,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_fusefs" lineno="2398">
+<interface name="fs_unmount_fusefs" lineno="2470">
<summary>
Unmount a FUSE filesystem.
</summary>
@@ -83890,7 +65976,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_fusefs" lineno="2416">
+<interface name="fs_remount_fusefs" lineno="2488">
<summary>
Remount a FUSE filesystem.
</summary>
@@ -83900,7 +65986,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mounton_fusefs" lineno="2434">
+<interface name="fs_mounton_fusefs" lineno="2506">
<summary>
Mounton a FUSEFS filesystem.
</summary>
@@ -83910,7 +65996,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_fusefs_entry_type" lineno="2453">
+<interface name="fs_fusefs_entry_type" lineno="2525">
<summary>
Make FUSEFS files an entrypoint for the
specified domain.
@@ -83921,7 +66007,7 @@ The domain for which fusefs_t is an entrypoint.
</summary>
</param>
</interface>
-<interface name="fs_fusefs_domtrans" lineno="2486">
+<interface name="fs_fusefs_domtrans" lineno="2558">
<summary>
Execute FUSEFS files in a specified domain.
</summary>
@@ -83946,7 +66032,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="fs_search_fusefs" lineno="2506">
+<interface name="fs_search_fusefs" lineno="2578">
<summary>
Search directories
on a FUSEFS filesystem.
@@ -83958,7 +66044,19 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_list_fusefs" lineno="2525">
+<interface name="fs_list_fusefs" lineno="2598">
+<summary>
+List the contents of directories
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_dontaudit_list_fusefs" lineno="2617">
<summary>
Do not audit attempts to list the contents
of directories on a FUSEFS filesystem.
@@ -83969,7 +66067,19 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_fusefs_dirs" lineno="2545">
+<interface name="fs_setattr_fusefs_dirs" lineno="2637">
+<summary>
+Set the attributes of directories
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_fusefs_dirs" lineno="2657">
<summary>
Create, read, write, and delete directories
on a FUSEFS filesystem.
@@ -83981,7 +66091,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2565">
+<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2677">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -83993,7 +66103,19 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_fusefs_files" lineno="2584">
+<interface name="fs_getattr_fusefs_files" lineno="2697">
+<summary>
+Get the attributes of files on a
+FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_read_fusefs_files" lineno="2716">
<summary>
Read, a FUSEFS filesystem.
</summary>
@@ -84004,7 +66126,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_exec_fusefs_files" lineno="2603">
+<interface name="fs_exec_fusefs_files" lineno="2735">
<summary>
Execute files on a FUSEFS filesystem.
</summary>
@@ -84015,7 +66137,19 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_fusefs_files" lineno="2623">
+<interface name="fs_setattr_fusefs_files" lineno="2755">
+<summary>
+Set the attributes of files on a
+FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_fusefs_files" lineno="2775">
<summary>
Create, read, write, and delete files
on a FUSEFS filesystem.
@@ -84027,7 +66161,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_fusefs_files" lineno="2643">
+<interface name="fs_dontaudit_manage_fusefs_files" lineno="2795">
<summary>
Do not audit attempts to create,
read, write, and delete files
@@ -84039,7 +66173,19 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_fusefs_symlinks" lineno="2661">
+<interface name="fs_getattr_fusefs_symlinks" lineno="2815">
+<summary>
+Get the attributes of symlinks
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_read_fusefs_symlinks" lineno="2833">
<summary>
Read symbolic links on a FUSEFS filesystem.
</summary>
@@ -84049,7 +66195,19 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_fusefs_symlinks" lineno="2681">
+<interface name="fs_setattr_fusefs_symlinks" lineno="2854">
+<summary>
+Set the attributes of symlinks
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_fusefs_symlinks" lineno="2873">
<summary>
Manage symlinks on a FUSEFS filesystem.
</summary>
@@ -84060,7 +66218,115 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_hugetlbfs" lineno="2700">
+<interface name="fs_getattr_fusefs_fifo_files" lineno="2893">
+<summary>
+Get the attributes of named pipes
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_setattr_fusefs_fifo_files" lineno="2913">
+<summary>
+Set the attributes of named pipes
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_fusefs_fifo_files" lineno="2933">
+<summary>
+Manage named pipes on a FUSEFS
+filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_getattr_fusefs_sock_files" lineno="2953">
+<summary>
+Get the attributes of named sockets
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_setattr_fusefs_sock_files" lineno="2973">
+<summary>
+Set the attributes of named sockets
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_fusefs_sock_files" lineno="2993">
+<summary>
+Manage named sockets on a FUSEFS
+filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_getattr_fusefs_chr_files" lineno="3013">
+<summary>
+Get the attributes of character files
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_setattr_fusefs_chr_files" lineno="3033">
+<summary>
+Set the attributes of character files
+on a FUSEFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_manage_fusefs_chr_files" lineno="3053">
+<summary>
+Manage character files on a FUSEFS
+filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_getattr_hugetlbfs" lineno="3072">
<summary>
Get the attributes of an hugetlbfs
filesystem.
@@ -84071,7 +66337,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_hugetlbfs" lineno="2718">
+<interface name="fs_list_hugetlbfs" lineno="3090">
<summary>
List hugetlbfs.
</summary>
@@ -84081,7 +66347,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_hugetlbfs_dirs" lineno="2736">
+<interface name="fs_manage_hugetlbfs_dirs" lineno="3108">
<summary>
Manage hugetlbfs dirs.
</summary>
@@ -84091,7 +66357,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2754">
+<interface name="fs_rw_inherited_hugetlbfs_files" lineno="3126">
<summary>
Read and write inherited hugetlbfs files.
</summary>
@@ -84101,7 +66367,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_hugetlbfs_files" lineno="2772">
+<interface name="fs_rw_hugetlbfs_files" lineno="3144">
<summary>
Read and write hugetlbfs files.
</summary>
@@ -84111,7 +66377,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2790">
+<interface name="fs_mmap_rw_hugetlbfs_files" lineno="3162">
<summary>
Read, map and write hugetlbfs files.
</summary>
@@ -84121,7 +66387,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_associate_hugetlbfs" lineno="2809">
+<interface name="fs_associate_hugetlbfs" lineno="3181">
<summary>
Allow the type to associate to hugetlbfs filesystems.
</summary>
@@ -84131,7 +66397,7 @@ The type of the object to be associated.
</summary>
</param>
</interface>
-<interface name="fs_search_inotifyfs" lineno="2827">
+<interface name="fs_search_inotifyfs" lineno="3199">
<summary>
Search inotifyfs filesystem.
</summary>
@@ -84141,7 +66407,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_inotifyfs" lineno="2845">
+<interface name="fs_list_inotifyfs" lineno="3217">
<summary>
List inotifyfs filesystem.
</summary>
@@ -84151,7 +66417,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_inotifyfs" lineno="2863">
+<interface name="fs_dontaudit_list_inotifyfs" lineno="3235">
<summary>
Dontaudit List inotifyfs filesystem.
</summary>
@@ -84161,7 +66427,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_hugetlbfs_filetrans" lineno="2897">
+<interface name="fs_hugetlbfs_filetrans" lineno="3269">
<summary>
Create an object in a hugetlbfs filesystem, with a private
type using a type transition.
@@ -84187,7 +66453,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="fs_mount_iso9660_fs" lineno="2917">
+<interface name="fs_mount_iso9660_fs" lineno="3289">
<summary>
Mount an iso9660 filesystem, which
is usually used on CDs.
@@ -84198,7 +66464,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_iso9660_fs" lineno="2937">
+<interface name="fs_remount_iso9660_fs" lineno="3309">
<summary>
Remount an iso9660 filesystem, which
is usually used on CDs. This allows
@@ -84210,7 +66476,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_iso9660_fs" lineno="2956">
+<interface name="fs_relabelfrom_iso9660_fs" lineno="3328">
<summary>
Allow changing of the label of a
filesystem with iso9660 type
@@ -84221,7 +66487,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_iso9660_fs" lineno="2975">
+<interface name="fs_unmount_iso9660_fs" lineno="3347">
<summary>
Unmount an iso9660 filesystem, which
is usually used on CDs.
@@ -84232,7 +66498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_iso9660_fs" lineno="2995">
+<interface name="fs_getattr_iso9660_fs" lineno="3367">
<summary>
Get the attributes of an iso9660
filesystem, which is usually used on CDs.
@@ -84244,7 +66510,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_iso9660_files" lineno="3014">
+<interface name="fs_getattr_iso9660_files" lineno="3386">
<summary>
Get the attributes of files on an iso9660
filesystem, which is usually used on CDs.
@@ -84255,7 +66521,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_iso9660_files" lineno="3034">
+<interface name="fs_read_iso9660_files" lineno="3406">
<summary>
Read files on an iso9660 filesystem, which
is usually used on CDs.
@@ -84266,7 +66532,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_nfs" lineno="3054">
+<interface name="fs_mount_nfs" lineno="3426">
<summary>
Mount a NFS filesystem.
</summary>
@@ -84276,7 +66542,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_nfs" lineno="3073">
+<interface name="fs_remount_nfs" lineno="3445">
<summary>
Remount a NFS filesystem. This allows
some mount options to be changed.
@@ -84287,7 +66553,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_nfs" lineno="3091">
+<interface name="fs_unmount_nfs" lineno="3463">
<summary>
Unmount a NFS filesystem.
</summary>
@@ -84297,7 +66563,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nfs" lineno="3110">
+<interface name="fs_getattr_nfs" lineno="3482">
<summary>
Get the attributes of a NFS filesystem.
</summary>
@@ -84308,7 +66574,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_search_nfs" lineno="3128">
+<interface name="fs_search_nfs" lineno="3500">
<summary>
Search directories on a NFS filesystem.
</summary>
@@ -84318,7 +66584,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_nfs" lineno="3146">
+<interface name="fs_list_nfs" lineno="3518">
<summary>
List NFS filesystem.
</summary>
@@ -84328,7 +66594,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_nfs" lineno="3165">
+<interface name="fs_dontaudit_list_nfs" lineno="3537">
<summary>
Do not audit attempts to list the contents
of directories on a NFS filesystem.
@@ -84339,7 +66605,18 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mounton_nfs" lineno="3183">
+<interface name="fs_watch_nfs_dirs" lineno="3556">
+<summary>
+Add a watch on directories on an NFS
+filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_mounton_nfs" lineno="3574">
<summary>
Mounton a NFS filesystem.
</summary>
@@ -84349,7 +66626,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_files" lineno="3202">
+<interface name="fs_read_nfs_files" lineno="3593">
<summary>
Read files on a NFS filesystem.
</summary>
@@ -84360,7 +66637,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_read_nfs_files" lineno="3222">
+<interface name="fs_dontaudit_read_nfs_files" lineno="3613">
<summary>
Do not audit attempts to read
files on a NFS filesystem.
@@ -84371,7 +66648,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_write_nfs_files" lineno="3240">
+<interface name="fs_write_nfs_files" lineno="3631">
<summary>
Read files on a NFS filesystem.
</summary>
@@ -84381,7 +66658,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_exec_nfs_files" lineno="3260">
+<interface name="fs_exec_nfs_files" lineno="3651">
<summary>
Execute files on a NFS filesystem.
</summary>
@@ -84392,7 +66669,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_append_nfs_files" lineno="3281">
+<interface name="fs_append_nfs_files" lineno="3672">
<summary>
Append files
on a NFS filesystem.
@@ -84404,7 +66681,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_append_nfs_files" lineno="3301">
+<interface name="fs_dontaudit_append_nfs_files" lineno="3692">
<summary>
dontaudit Append files
on a NFS filesystem.
@@ -84416,7 +66693,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_rw_nfs_files" lineno="3320">
+<interface name="fs_dontaudit_rw_nfs_files" lineno="3711">
<summary>
Do not audit attempts to read or
write files on a NFS filesystem.
@@ -84427,7 +66704,17 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_symlinks" lineno="3338">
+<interface name="fs_watch_nfs_files" lineno="3729">
+<summary>
+Add a watch on files on an NFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_read_nfs_symlinks" lineno="3747">
<summary>
Read symbolic links on a NFS filesystem.
</summary>
@@ -84437,7 +66724,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3357">
+<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3766">
<summary>
Dontaudit read symbolic links on a NFS filesystem.
</summary>
@@ -84447,7 +66734,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_named_sockets" lineno="3375">
+<interface name="fs_read_nfs_named_sockets" lineno="3784">
<summary>
Read named sockets on a NFS filesystem.
</summary>
@@ -84457,7 +66744,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_named_pipes" lineno="3394">
+<interface name="fs_read_nfs_named_pipes" lineno="3803">
<summary>
Read named pipes on a NFS network filesystem.
</summary>
@@ -84468,7 +66755,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_rpc_dirs" lineno="3413">
+<interface name="fs_getattr_rpc_dirs" lineno="3822">
<summary>
Get the attributes of directories of RPC
file system pipes.
@@ -84479,7 +66766,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_rpc" lineno="3432">
+<interface name="fs_search_rpc" lineno="3841">
<summary>
Search directories of RPC file system pipes.
</summary>
@@ -84489,7 +66776,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_removable" lineno="3450">
+<interface name="fs_search_removable" lineno="3859">
<summary>
Search removable storage directories.
</summary>
@@ -84499,7 +66786,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_removable" lineno="3468">
+<interface name="fs_dontaudit_list_removable" lineno="3877">
<summary>
Do not audit attempts to list removable storage directories.
</summary>
@@ -84509,7 +66796,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="fs_read_removable_files" lineno="3486">
+<interface name="fs_read_removable_files" lineno="3895">
<summary>
Read removable storage files.
</summary>
@@ -84519,7 +66806,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_removable_files" lineno="3504">
+<interface name="fs_dontaudit_read_removable_files" lineno="3913">
<summary>
Do not audit attempts to read removable storage files.
</summary>
@@ -84529,7 +66816,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_removable_files" lineno="3522">
+<interface name="fs_dontaudit_write_removable_files" lineno="3931">
<summary>
Do not audit attempts to write removable storage files.
</summary>
@@ -84539,7 +66826,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="fs_read_removable_symlinks" lineno="3540">
+<interface name="fs_read_removable_symlinks" lineno="3949">
<summary>
Read removable storage symbolic links.
</summary>
@@ -84549,7 +66836,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_removable_blk_files" lineno="3558">
+<interface name="fs_read_removable_blk_files" lineno="3967">
<summary>
Read block nodes on removable filesystems.
</summary>
@@ -84559,7 +66846,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_removable_blk_files" lineno="3577">
+<interface name="fs_rw_removable_blk_files" lineno="3986">
<summary>
Read and write block nodes on removable filesystems.
</summary>
@@ -84569,7 +66856,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_rpc" lineno="3596">
+<interface name="fs_list_rpc" lineno="4005">
<summary>
Read directories of RPC file system pipes.
</summary>
@@ -84579,7 +66866,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_rpc_files" lineno="3614">
+<interface name="fs_read_rpc_files" lineno="4023">
<summary>
Read files of RPC file system pipes.
</summary>
@@ -84589,7 +66876,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_rpc_symlinks" lineno="3632">
+<interface name="fs_read_rpc_symlinks" lineno="4041">
<summary>
Read symbolic links of RPC file system pipes.
</summary>
@@ -84599,7 +66886,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_rpc_sockets" lineno="3650">
+<interface name="fs_read_rpc_sockets" lineno="4059">
<summary>
Read sockets of RPC file system pipes.
</summary>
@@ -84609,7 +66896,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_rpc_sockets" lineno="3668">
+<interface name="fs_rw_rpc_sockets" lineno="4077">
<summary>
Read and write sockets of RPC file system pipes.
</summary>
@@ -84619,7 +66906,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_dirs" lineno="3688">
+<interface name="fs_manage_nfs_dirs" lineno="4097">
<summary>
Create, read, write, and delete directories
on a NFS filesystem.
@@ -84631,7 +66918,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3708">
+<interface name="fs_dontaudit_manage_nfs_dirs" lineno="4117">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -84643,7 +66930,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_files" lineno="3728">
+<interface name="fs_manage_nfs_files" lineno="4137">
<summary>
Create, read, write, and delete files
on a NFS filesystem.
@@ -84655,7 +66942,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_nfs_files" lineno="3748">
+<interface name="fs_dontaudit_manage_nfs_files" lineno="4157">
<summary>
Do not audit attempts to create,
read, write, and delete files
@@ -84667,7 +66954,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_symlinks" lineno="3768">
+<interface name="fs_manage_nfs_symlinks" lineno="4177">
<summary>
Create, read, write, and delete symbolic links
on a NFS network filesystem.
@@ -84679,7 +66966,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_nfs_named_pipes" lineno="3787">
+<interface name="fs_manage_nfs_named_pipes" lineno="4196">
<summary>
Create, read, write, and delete named pipes
on a NFS filesystem.
@@ -84690,7 +66977,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_named_sockets" lineno="3806">
+<interface name="fs_manage_nfs_named_sockets" lineno="4215">
<summary>
Create, read, write, and delete named sockets
on a NFS filesystem.
@@ -84701,7 +66988,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_nfs_domtrans" lineno="3849">
+<interface name="fs_nfs_domtrans" lineno="4258">
<summary>
Execute a file on a NFS filesystem
in the specified domain.
@@ -84736,7 +67023,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="fs_mount_nfsd_fs" lineno="3868">
+<interface name="fs_mount_nfsd_fs" lineno="4277">
<summary>
Mount a NFS server pseudo filesystem.
</summary>
@@ -84746,7 +67033,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_nfsd_fs" lineno="3887">
+<interface name="fs_remount_nfsd_fs" lineno="4296">
<summary>
Mount a NFS server pseudo filesystem.
This allows some mount options to be changed.
@@ -84757,7 +67044,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_nfsd_fs" lineno="3905">
+<interface name="fs_unmount_nfsd_fs" lineno="4314">
<summary>
Unmount a NFS server pseudo filesystem.
</summary>
@@ -84767,7 +67054,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nfsd_fs" lineno="3924">
+<interface name="fs_getattr_nfsd_fs" lineno="4333">
<summary>
Get the attributes of a NFS server
pseudo filesystem.
@@ -84778,7 +67065,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_nfsd_fs" lineno="3942">
+<interface name="fs_search_nfsd_fs" lineno="4351">
<summary>
Search NFS server directories.
</summary>
@@ -84788,7 +67075,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_nfsd_fs" lineno="3960">
+<interface name="fs_list_nfsd_fs" lineno="4369">
<summary>
List NFS server directories.
</summary>
@@ -84798,7 +67085,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_watch_nfsd_dirs" lineno="3978">
+<interface name="fs_watch_nfsd_dirs" lineno="4387">
<summary>
Watch NFS server directories.
</summary>
@@ -84808,7 +67095,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nfsd_files" lineno="3996">
+<interface name="fs_getattr_nfsd_files" lineno="4405">
<summary>
Getattr files on an nfsd filesystem
</summary>
@@ -84818,7 +67105,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_nfsd_fs" lineno="4014">
+<interface name="fs_rw_nfsd_fs" lineno="4423">
<summary>
Read and write NFS server files.
</summary>
@@ -84828,7 +67115,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nsfs_files" lineno="4032">
+<interface name="fs_getattr_nsfs_files" lineno="4441">
<summary>
Get the attributes of nsfs inodes (e.g. /proc/pid/ns/uts)
</summary>
@@ -84838,7 +67125,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nsfs_files" lineno="4050">
+<interface name="fs_read_nsfs_files" lineno="4459">
<summary>
Read nsfs inodes (e.g. /proc/pid/ns/uts)
</summary>
@@ -84848,7 +67135,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nsfs" lineno="4068">
+<interface name="fs_watch_nfsd_files" lineno="4477">
+<summary>
+Watch NFS server files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_getattr_nsfs" lineno="4495">
<summary>
Get the attributes of an nsfs filesystem.
</summary>
@@ -84858,7 +67155,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_nsfs" lineno="4086">
+<interface name="fs_unmount_nsfs" lineno="4513">
<summary>
Unmount an nsfs filesystem.
</summary>
@@ -84868,7 +67165,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_pstorefs" lineno="4104">
+<interface name="fs_getattr_pstorefs" lineno="4531">
<summary>
Get the attributes of a pstore filesystem.
</summary>
@@ -84878,7 +67175,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_pstore_dirs" lineno="4123">
+<interface name="fs_getattr_pstore_dirs" lineno="4550">
<summary>
Get the attributes of directories
of a pstore filesystem.
@@ -84889,7 +67186,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_create_pstore_dirs" lineno="4142">
+<interface name="fs_create_pstore_dirs" lineno="4569">
<summary>
Create pstore directories.
</summary>
@@ -84899,7 +67196,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_pstore_dirs" lineno="4161">
+<interface name="fs_relabel_pstore_dirs" lineno="4588">
<summary>
Relabel to/from pstore_t directories.
</summary>
@@ -84909,7 +67206,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_pstore_dirs" lineno="4180">
+<interface name="fs_list_pstore_dirs" lineno="4607">
<summary>
List the directories
of a pstore filesystem.
@@ -84920,7 +67217,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_pstore_files" lineno="4199">
+<interface name="fs_read_pstore_files" lineno="4626">
<summary>
Read pstore_t files
</summary>
@@ -84930,7 +67227,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_delete_pstore_files" lineno="4218">
+<interface name="fs_delete_pstore_files" lineno="4645">
<summary>
Delete the files
of a pstore filesystem.
@@ -84941,7 +67238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_associate_ramfs" lineno="4237">
+<interface name="fs_associate_ramfs" lineno="4664">
<summary>
Allow the type to associate to ramfs filesystems.
</summary>
@@ -84951,7 +67248,7 @@ The type of the object to be associated.
</summary>
</param>
</interface>
-<interface name="fs_mount_ramfs" lineno="4255">
+<interface name="fs_mount_ramfs" lineno="4682">
<summary>
Mount a RAM filesystem.
</summary>
@@ -84961,7 +67258,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_ramfs" lineno="4274">
+<interface name="fs_remount_ramfs" lineno="4701">
<summary>
Remount a RAM filesystem. This allows
some mount options to be changed.
@@ -84972,7 +67269,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_ramfs" lineno="4292">
+<interface name="fs_unmount_ramfs" lineno="4719">
<summary>
Unmount a RAM filesystem.
</summary>
@@ -84982,7 +67279,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_ramfs" lineno="4310">
+<interface name="fs_getattr_ramfs" lineno="4737">
<summary>
Get the attributes of a RAM filesystem.
</summary>
@@ -84992,7 +67289,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_ramfs" lineno="4328">
+<interface name="fs_search_ramfs" lineno="4755">
<summary>
Search directories on a ramfs
</summary>
@@ -85002,7 +67299,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_search_ramfs" lineno="4346">
+<interface name="fs_dontaudit_search_ramfs" lineno="4773">
<summary>
Dontaudit Search directories on a ramfs
</summary>
@@ -85012,7 +67309,18 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_dirs" lineno="4365">
+<interface name="fs_setattr_ramfs_dirs" lineno="4792">
+<summary>
+Set the attributes of directories on
+a ramfs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_manage_ramfs_dirs" lineno="4811">
<summary>
Create, read, write, and delete
directories on a ramfs.
@@ -85023,7 +67331,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_ramfs_files" lineno="4383">
+<interface name="fs_dontaudit_read_ramfs_files" lineno="4829">
<summary>
Dontaudit read on a ramfs files.
</summary>
@@ -85033,7 +67341,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4401">
+<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4847">
<summary>
Dontaudit read on a ramfs fifo_files.
</summary>
@@ -85043,7 +67351,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_files" lineno="4420">
+<interface name="fs_manage_ramfs_files" lineno="4866">
<summary>
Create, read, write, and delete
files on a ramfs filesystem.
@@ -85054,7 +67362,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_write_ramfs_pipes" lineno="4438">
+<interface name="fs_write_ramfs_pipes" lineno="4884">
<summary>
Write to named pipe on a ramfs filesystem.
</summary>
@@ -85064,7 +67372,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4457">
+<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4903">
<summary>
Do not audit attempts to write to named
pipes on a ramfs filesystem.
@@ -85075,7 +67383,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_rw_ramfs_pipes" lineno="4475">
+<interface name="fs_rw_ramfs_pipes" lineno="4921">
<summary>
Read and write a named pipe on a ramfs filesystem.
</summary>
@@ -85085,7 +67393,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_pipes" lineno="4494">
+<interface name="fs_manage_ramfs_pipes" lineno="4940">
<summary>
Create, read, write, and delete
named pipes on a ramfs filesystem.
@@ -85096,7 +67404,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_write_ramfs_sockets" lineno="4512">
+<interface name="fs_write_ramfs_sockets" lineno="4958">
<summary>
Write to named socket on a ramfs filesystem.
</summary>
@@ -85106,7 +67414,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_sockets" lineno="4531">
+<interface name="fs_manage_ramfs_sockets" lineno="4977">
<summary>
Create, read, write, and delete
named sockets on a ramfs filesystem.
@@ -85117,7 +67425,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_romfs" lineno="4549">
+<interface name="fs_mount_romfs" lineno="4995">
<summary>
Mount a ROM filesystem.
</summary>
@@ -85127,7 +67435,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_romfs" lineno="4568">
+<interface name="fs_remount_romfs" lineno="5014">
<summary>
Remount a ROM filesystem. This allows
some mount options to be changed.
@@ -85138,7 +67446,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_romfs" lineno="4586">
+<interface name="fs_unmount_romfs" lineno="5032">
<summary>
Unmount a ROM filesystem.
</summary>
@@ -85148,7 +67456,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_romfs" lineno="4605">
+<interface name="fs_getattr_romfs" lineno="5051">
<summary>
Get the attributes of a ROM
filesystem.
@@ -85159,7 +67467,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_rpc_pipefs" lineno="4623">
+<interface name="fs_mount_rpc_pipefs" lineno="5069">
<summary>
Mount a RPC pipe filesystem.
</summary>
@@ -85169,7 +67477,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_rpc_pipefs" lineno="4642">
+<interface name="fs_remount_rpc_pipefs" lineno="5088">
<summary>
Remount a RPC pipe filesystem. This
allows some mount option to be changed.
@@ -85180,7 +67488,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_rpc_pipefs" lineno="4660">
+<interface name="fs_unmount_rpc_pipefs" lineno="5106">
<summary>
Unmount a RPC pipe filesystem.
</summary>
@@ -85190,7 +67498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_rpc_pipefs" lineno="4679">
+<interface name="fs_getattr_rpc_pipefs" lineno="5125">
<summary>
Get the attributes of a RPC pipe
filesystem.
@@ -85201,7 +67509,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_rpc_named_pipes" lineno="4697">
+<interface name="fs_rw_rpc_named_pipes" lineno="5143">
<summary>
Read and write RPC pipe filesystem named pipes.
</summary>
@@ -85211,7 +67519,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_tmpfs" lineno="4715">
+<interface name="fs_watch_rpc_pipefs_dirs" lineno="5161">
+<summary>
+Watch RPC pipe filesystem directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_mount_tmpfs" lineno="5179">
<summary>
Mount a tmpfs filesystem.
</summary>
@@ -85221,7 +67539,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_tmpfs" lineno="4733">
+<interface name="fs_remount_tmpfs" lineno="5197">
<summary>
Remount a tmpfs filesystem.
</summary>
@@ -85231,7 +67549,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_tmpfs" lineno="4751">
+<interface name="fs_unmount_tmpfs" lineno="5215">
<summary>
Unmount a tmpfs filesystem.
</summary>
@@ -85241,7 +67559,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_tmpfs" lineno="4769">
+<interface name="fs_dontaudit_getattr_tmpfs" lineno="5233">
<summary>
Do not audit getting the attributes of a tmpfs filesystem
</summary>
@@ -85251,7 +67569,7 @@ Domain to not audit
</summary>
</param>
</interface>
-<interface name="fs_getattr_tmpfs" lineno="4789">
+<interface name="fs_getattr_tmpfs" lineno="5253">
<summary>
Get the attributes of a tmpfs
filesystem.
@@ -85263,7 +67581,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_associate_tmpfs" lineno="4807">
+<interface name="fs_associate_tmpfs" lineno="5271">
<summary>
Allow the type to associate to tmpfs filesystems.
</summary>
@@ -85273,7 +67591,7 @@ The type of the object to be associated.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs" lineno="4825">
+<interface name="fs_relabelfrom_tmpfs" lineno="5289">
<summary>
Relabel from tmpfs filesystem.
</summary>
@@ -85283,7 +67601,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tmpfs_dirs" lineno="4843">
+<interface name="fs_getattr_tmpfs_dirs" lineno="5307">
<summary>
Get the attributes of tmpfs directories.
</summary>
@@ -85293,7 +67611,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4862">
+<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="5326">
<summary>
Do not audit attempts to get the attributes
of tmpfs directories.
@@ -85304,7 +67622,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mounton_tmpfs" lineno="4880">
+<interface name="fs_mounton_tmpfs" lineno="5344">
<summary>
Mount on tmpfs directories.
</summary>
@@ -85314,7 +67632,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mounton_tmpfs_files" lineno="4898">
+<interface name="fs_mounton_tmpfs_files" lineno="5362">
<summary>
Mount on tmpfs files.
</summary>
@@ -85324,7 +67642,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_setattr_tmpfs_dirs" lineno="4916">
+<interface name="fs_setattr_tmpfs_dirs" lineno="5380">
<summary>
Set the attributes of tmpfs directories.
</summary>
@@ -85334,7 +67652,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_tmpfs" lineno="4934">
+<interface name="fs_search_tmpfs" lineno="5398">
<summary>
Search tmpfs directories.
</summary>
@@ -85344,7 +67662,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_tmpfs" lineno="4952">
+<interface name="fs_list_tmpfs" lineno="5416">
<summary>
List the contents of generic tmpfs directories.
</summary>
@@ -85354,7 +67672,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_tmpfs" lineno="4971">
+<interface name="fs_dontaudit_list_tmpfs" lineno="5435">
<summary>
Do not audit attempts to list the
contents of generic tmpfs directories.
@@ -85365,7 +67683,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_dirs" lineno="4990">
+<interface name="fs_manage_tmpfs_dirs" lineno="5454">
<summary>
Create, read, write, and delete
tmpfs directories
@@ -85376,7 +67694,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="5009">
+<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="5473">
<summary>
Do not audit attempts to write
tmpfs directories
@@ -85387,7 +67705,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs_dirs" lineno="5027">
+<interface name="fs_relabelfrom_tmpfs_dirs" lineno="5491">
<summary>
Relabel from tmpfs_t dir
</summary>
@@ -85397,7 +67715,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_dirs" lineno="5045">
+<interface name="fs_relabel_tmpfs_dirs" lineno="5509">
<summary>
Relabel directory on tmpfs filesystems.
</summary>
@@ -85407,7 +67725,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_tmpfs_filetrans" lineno="5078">
+<interface name="fs_watch_tmpfs_dirs" lineno="5526">
+<summary>
+Watch directories on tmpfs filesystems.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_tmpfs_filetrans" lineno="5560">
<summary>
Create an object in a tmpfs filesystem, with a private
type using a type transition.
@@ -85433,7 +67761,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="5098">
+<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="5580">
<summary>
Do not audit attempts to getattr
generic tmpfs files.
@@ -85444,7 +67772,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5117">
+<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5599">
<summary>
Do not audit attempts to read or write
generic tmpfs files.
@@ -85455,7 +67783,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_delete_tmpfs_symlinks" lineno="5135">
+<interface name="fs_delete_tmpfs_symlinks" lineno="5617">
<summary>
Delete tmpfs symbolic links.
</summary>
@@ -85465,7 +67793,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_auto_mountpoints" lineno="5154">
+<interface name="fs_manage_auto_mountpoints" lineno="5636">
<summary>
Create, read, write, and delete
auto moutpoints.
@@ -85476,7 +67804,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_tmpfs_files" lineno="5172">
+<interface name="fs_read_tmpfs_files" lineno="5654">
<summary>
Read generic tmpfs files.
</summary>
@@ -85486,7 +67814,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_tmpfs_files" lineno="5190">
+<interface name="fs_rw_tmpfs_files" lineno="5672">
<summary>
Read and write generic tmpfs files.
</summary>
@@ -85496,7 +67824,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_files" lineno="5208">
+<interface name="fs_relabel_tmpfs_files" lineno="5690">
<summary>
Relabel files on tmpfs filesystems.
</summary>
@@ -85506,7 +67834,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_tmpfs_symlinks" lineno="5226">
+<interface name="fs_read_tmpfs_symlinks" lineno="5708">
<summary>
Read tmpfs link files.
</summary>
@@ -85516,7 +67844,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5244">
+<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5726">
<summary>
Relabelfrom socket files on tmpfs filesystems.
</summary>
@@ -85526,7 +67854,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5262">
+<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5744">
<summary>
Relabelfrom tmpfs link files.
</summary>
@@ -85536,7 +67864,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_tmpfs_chr_files" lineno="5280">
+<interface name="fs_rw_tmpfs_chr_files" lineno="5762">
<summary>
Read and write character nodes on tmpfs filesystems.
</summary>
@@ -85546,7 +67874,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5299">
+<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5781">
<summary>
dontaudit Read and write character nodes on tmpfs filesystems.
</summary>
@@ -85556,17 +67884,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_chr_files" lineno="5318">
-<summary>
-Relabel character nodes on tmpfs filesystems.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="fs_relabel_tmpfs_chr_file" lineno="5337">
+<interface name="fs_relabel_tmpfs_chr_files" lineno="5800">
<summary>
Relabel character nodes on tmpfs filesystems.
</summary>
@@ -85576,7 +67894,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_tmpfs_blk_files" lineno="5352">
+<interface name="fs_rw_tmpfs_blk_files" lineno="5819">
<summary>
Read and write block nodes on tmpfs filesystems.
</summary>
@@ -85586,17 +67904,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_blk_files" lineno="5371">
-<summary>
-Relabel block nodes on tmpfs filesystems.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="fs_relabel_tmpfs_blk_file" lineno="5390">
+<interface name="fs_relabel_tmpfs_blk_files" lineno="5838">
<summary>
Relabel block nodes on tmpfs filesystems.
</summary>
@@ -85606,7 +67914,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_fifo_files" lineno="5405">
+<interface name="fs_relabel_tmpfs_fifo_files" lineno="5857">
<summary>
Relabel named pipes on tmpfs filesystems.
</summary>
@@ -85616,7 +67924,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_files" lineno="5425">
+<interface name="fs_manage_tmpfs_files" lineno="5877">
<summary>
Read and write, create and delete generic
files on tmpfs filesystems.
@@ -85627,7 +67935,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_symlinks" lineno="5444">
+<interface name="fs_manage_tmpfs_symlinks" lineno="5896">
<summary>
Read and write, create and delete symbolic
links on tmpfs filesystems.
@@ -85638,7 +67946,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_sockets" lineno="5463">
+<interface name="fs_manage_tmpfs_sockets" lineno="5915">
<summary>
Read and write, create and delete socket
files on tmpfs filesystems.
@@ -85649,7 +67957,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_chr_files" lineno="5482">
+<interface name="fs_manage_tmpfs_chr_files" lineno="5934">
<summary>
Read and write, create and delete character
nodes on tmpfs filesystems.
@@ -85660,7 +67968,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_blk_files" lineno="5501">
+<interface name="fs_manage_tmpfs_blk_files" lineno="5953">
<summary>
Read and write, create and delete block nodes
on tmpfs filesystems.
@@ -85671,7 +67979,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tracefs" lineno="5519">
+<interface name="fs_getattr_tracefs" lineno="5971">
<summary>
Get the attributes of a trace filesystem.
</summary>
@@ -85681,7 +67989,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tracefs_dirs" lineno="5537">
+<interface name="fs_getattr_tracefs_dirs" lineno="5989">
<summary>
Get attributes of dirs on tracefs filesystem.
</summary>
@@ -85691,7 +67999,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_tracefs" lineno="5555">
+<interface name="fs_search_tracefs" lineno="6007">
<summary>
search directories on a tracefs filesystem
</summary>
@@ -85701,7 +68009,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tracefs_files" lineno="5574">
+<interface name="fs_getattr_tracefs_files" lineno="6026">
<summary>
Get the attributes of files
on a trace filesystem.
@@ -85712,7 +68020,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_xenfs" lineno="5592">
+<interface name="fs_mount_xenfs" lineno="6044">
<summary>
Mount a XENFS filesystem.
</summary>
@@ -85722,7 +68030,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_xenfs" lineno="5610">
+<interface name="fs_search_xenfs" lineno="6062">
<summary>
Search the XENFS filesystem.
</summary>
@@ -85732,7 +68040,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_xenfs_dirs" lineno="5630">
+<interface name="fs_manage_xenfs_dirs" lineno="6082">
<summary>
Create, read, write, and delete directories
on a XENFS filesystem.
@@ -85744,7 +68052,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5650">
+<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="6102">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -85756,7 +68064,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_xenfs_files" lineno="5670">
+<interface name="fs_manage_xenfs_files" lineno="6122">
<summary>
Create, read, write, and delete files
on a XENFS filesystem.
@@ -85768,7 +68076,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_mmap_xenfs_files" lineno="5688">
+<interface name="fs_mmap_xenfs_files" lineno="6140">
<summary>
Map files a XENFS filesystem.
</summary>
@@ -85778,7 +68086,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_manage_xenfs_files" lineno="5708">
+<interface name="fs_dontaudit_manage_xenfs_files" lineno="6160">
<summary>
Do not audit attempts to create,
read, write, and delete files
@@ -85790,7 +68098,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mount_all_fs" lineno="5726">
+<interface name="fs_mount_all_fs" lineno="6178">
<summary>
Mount all filesystems.
</summary>
@@ -85800,7 +68108,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_all_fs" lineno="5745">
+<interface name="fs_remount_all_fs" lineno="6197">
<summary>
Remount all filesystems. This
allows some mount options to be changed.
@@ -85811,7 +68119,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_all_fs" lineno="5763">
+<interface name="fs_unmount_all_fs" lineno="6215">
<summary>
Unmount all filesystems.
</summary>
@@ -85821,7 +68129,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_fs" lineno="5795">
+<interface name="fs_getattr_all_fs" lineno="6247">
<summary>
Get the attributes of all filesystems.
</summary>
@@ -85845,7 +68153,7 @@ Domain allowed access.
<infoflow type="read" weight="5"/>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_getattr_all_fs" lineno="5815">
+<interface name="fs_dontaudit_getattr_all_fs" lineno="6267">
<summary>
Do not audit attempts to get the attributes
all filesystems.
@@ -85856,7 +68164,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_get_all_fs_quotas" lineno="5834">
+<interface name="fs_get_all_fs_quotas" lineno="6286">
<summary>
Get the quotas of all filesystems.
</summary>
@@ -85867,7 +68175,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_set_all_quotas" lineno="5853">
+<interface name="fs_set_all_quotas" lineno="6305">
<summary>
Set the quotas of all filesystems.
</summary>
@@ -85878,7 +68186,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_relabelfrom_all_fs" lineno="5871">
+<interface name="fs_relabelfrom_all_fs" lineno="6323">
<summary>
Relabelfrom all filesystems.
</summary>
@@ -85888,7 +68196,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_dirs" lineno="5890">
+<interface name="fs_getattr_all_dirs" lineno="6342">
<summary>
Get the attributes of all directories
with a filesystem type.
@@ -85899,7 +68207,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_all" lineno="5908">
+<interface name="fs_search_all" lineno="6360">
<summary>
Search all directories with a filesystem type.
</summary>
@@ -85909,7 +68217,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_all" lineno="5926">
+<interface name="fs_list_all" lineno="6378">
<summary>
List all directories with a filesystem type.
</summary>
@@ -85919,7 +68227,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_files" lineno="5945">
+<interface name="fs_getattr_all_files" lineno="6397">
<summary>
Get the attributes of all files with
a filesystem type.
@@ -85930,7 +68238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_files" lineno="5964">
+<interface name="fs_dontaudit_getattr_all_files" lineno="6416">
<summary>
Do not audit attempts to get the attributes
of all files with a filesystem type.
@@ -85941,7 +68249,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_symlinks" lineno="5983">
+<interface name="fs_getattr_all_symlinks" lineno="6435">
<summary>
Get the attributes of all symbolic links with
a filesystem type.
@@ -85952,7 +68260,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_symlinks" lineno="6002">
+<interface name="fs_dontaudit_getattr_all_symlinks" lineno="6454">
<summary>
Do not audit attempts to get the attributes
of all symbolic links with a filesystem type.
@@ -85963,7 +68271,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_pipes" lineno="6021">
+<interface name="fs_getattr_all_pipes" lineno="6473">
<summary>
Get the attributes of all named pipes with
a filesystem type.
@@ -85974,7 +68282,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_pipes" lineno="6040">
+<interface name="fs_dontaudit_getattr_all_pipes" lineno="6492">
<summary>
Do not audit attempts to get the attributes
of all named pipes with a filesystem type.
@@ -85985,7 +68293,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_sockets" lineno="6059">
+<interface name="fs_getattr_all_sockets" lineno="6511">
<summary>
Get the attributes of all named sockets with
a filesystem type.
@@ -85996,7 +68304,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_sockets" lineno="6078">
+<interface name="fs_dontaudit_getattr_all_sockets" lineno="6530">
<summary>
Do not audit attempts to get the attributes
of all named sockets with a filesystem type.
@@ -86007,7 +68315,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_blk_files" lineno="6097">
+<interface name="fs_getattr_all_blk_files" lineno="6549">
<summary>
Get the attributes of all block device nodes with
a filesystem type.
@@ -86018,7 +68326,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_chr_files" lineno="6116">
+<interface name="fs_getattr_all_chr_files" lineno="6568">
<summary>
Get the attributes of all character device nodes with
a filesystem type.
@@ -86029,7 +68337,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unconfined" lineno="6134">
+<interface name="fs_unconfined" lineno="6586">
<summary>
Unconfined access to filesystems
</summary>
@@ -86108,7 +68416,18 @@ The type of the directory to use as a mountpoint.
</summary>
</param>
</interface>
-<interface name="kernel_setpgid" lineno="122">
+<interface name="kernel_read_state" lineno="123">
+<summary>
+Read the process state (/proc/pid)
+of kernel threads.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kernel_setpgid" lineno="141">
<summary>
Set the process group of kernel threads.
</summary>
@@ -86118,7 +68437,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_setsched" lineno="140">
+<interface name="kernel_setsched" lineno="159">
<summary>
Set the priority of kernel threads.
</summary>
@@ -86128,7 +68447,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_sigchld" lineno="158">
+<interface name="kernel_sigchld" lineno="177">
<summary>
Send a SIGCHLD signal to kernel threads.
</summary>
@@ -86138,7 +68457,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_kill" lineno="176">
+<interface name="kernel_kill" lineno="195">
<summary>
Send a kill signal to kernel threads.
</summary>
@@ -86148,7 +68467,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_signal" lineno="194">
+<interface name="kernel_signal" lineno="213">
<summary>
Send a generic signal to kernel threads.
</summary>
@@ -86158,7 +68477,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_share_state" lineno="213">
+<interface name="kernel_share_state" lineno="232">
<summary>
Allows the kernel to share state information with
the caller.
@@ -86169,7 +68488,7 @@ The type of the process with which to share state information.
</summary>
</param>
</interface>
-<interface name="kernel_use_fds" lineno="231">
+<interface name="kernel_use_fds" lineno="250">
<summary>
Permits caller to use kernel file descriptors.
</summary>
@@ -86179,7 +68498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_use_fds" lineno="250">
+<interface name="kernel_dontaudit_use_fds" lineno="269">
<summary>
Do not audit attempts to use
kernel file descriptors.
@@ -86190,7 +68509,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_rw_pipes" lineno="268">
+<interface name="kernel_rw_pipes" lineno="287">
<summary>
Read and write kernel unnamed pipes.
</summary>
@@ -86200,7 +68519,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_rw_stream_sockets" lineno="287">
+<interface name="kernel_rw_stream_sockets" lineno="306">
<summary>
Read/write to kernel using a unix
domain stream socket.
@@ -86211,7 +68530,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_stream_connect" lineno="306">
+<interface name="kernel_stream_connect" lineno="325">
<summary>
Connect to kernel using a unix
domain stream socket.
@@ -86222,7 +68541,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_getattr_dgram_sockets" lineno="324">
+<interface name="kernel_getattr_dgram_sockets" lineno="343">
<summary>
Getattr on kernel unix datagram sockets.
</summary>
@@ -86232,7 +68551,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_rw_unix_dgram_sockets" lineno="342">
+<interface name="kernel_rw_unix_dgram_sockets" lineno="361">
<summary>
Read and write kernel unix datagram sockets.
</summary>
@@ -86242,7 +68561,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dgram_send" lineno="360">
+<interface name="kernel_dgram_send" lineno="379">
<summary>
Send messages to kernel unix datagram sockets.
</summary>
@@ -86252,7 +68571,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_rw_netlink_audit_sockets" lineno="378">
+<interface name="kernel_rw_netlink_audit_sockets" lineno="397">
<summary>
Send messages to kernel netlink audit sockets.
</summary>
@@ -86262,7 +68581,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_load_module" lineno="396">
+<interface name="kernel_load_module" lineno="415">
<summary>
Allows caller to load kernel modules
</summary>
@@ -86272,7 +68591,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_search_key" lineno="414">
+<interface name="kernel_search_key" lineno="433">
<summary>
Allow search the kernel key ring.
</summary>
@@ -86282,7 +68601,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_search_key" lineno="432">
+<interface name="kernel_dontaudit_search_key" lineno="451">
<summary>
dontaudit search the kernel key ring.
</summary>
@@ -86292,7 +68611,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_link_key" lineno="450">
+<interface name="kernel_link_key" lineno="469">
<summary>
Allow link to the kernel key ring.
</summary>
@@ -86302,7 +68621,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_link_key" lineno="468">
+<interface name="kernel_dontaudit_link_key" lineno="487">
<summary>
dontaudit link to the kernel key ring.
</summary>
@@ -86312,7 +68631,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_view_key" lineno="486">
+<interface name="kernel_view_key" lineno="505">
<summary>
Allow view the kernel key ring.
</summary>
@@ -86322,7 +68641,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_view_key" lineno="504">
+<interface name="kernel_dontaudit_view_key" lineno="523">
<summary>
dontaudit view the kernel key ring.
</summary>
@@ -86332,7 +68651,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_write_key" lineno="522">
+<interface name="kernel_write_key" lineno="541">
<summary>
allow write access to the kernel key ring.
</summary>
@@ -86342,7 +68661,7 @@ Domain to allow.
</summary>
</param>
</interface>
-<interface name="kernel_read_ring_buffer" lineno="541">
+<interface name="kernel_read_ring_buffer" lineno="560">
<summary>
Allows caller to read the ring buffer.
</summary>
@@ -86353,7 +68672,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_read_ring_buffer" lineno="560">
+<interface name="kernel_dontaudit_read_ring_buffer" lineno="579">
<summary>
Do not audit attempts to read the ring buffer.
</summary>
@@ -86363,7 +68682,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_change_ring_buffer_level" lineno="579">
+<interface name="kernel_change_ring_buffer_level" lineno="598">
<summary>
Change the level of kernel messages logged to the console.
</summary>
@@ -86374,7 +68693,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_clear_ring_buffer" lineno="599">
+<interface name="kernel_clear_ring_buffer" lineno="618">
<summary>
Allows the caller to clear the ring buffer.
</summary>
@@ -86385,7 +68704,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_request_load_module" lineno="631">
+<interface name="kernel_request_load_module" lineno="650">
<summary>
Allows caller to request the kernel to load a module
</summary>
@@ -86408,7 +68727,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_request_load_module" lineno="649">
+<interface name="kernel_dontaudit_request_load_module" lineno="668">
<summary>
Do not audit requests to the kernel to load a module.
</summary>
@@ -86418,7 +68737,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_get_sysvipc_info" lineno="667">
+<interface name="kernel_get_sysvipc_info" lineno="686">
<summary>
Get information on all System V IPC objects.
</summary>
@@ -86428,7 +68747,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_getattr_debugfs" lineno="685">
+<interface name="kernel_getattr_debugfs" lineno="704">
<summary>
Get the attributes of a kernel debugging filesystem.
</summary>
@@ -86438,7 +68757,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_mount_debugfs" lineno="703">
+<interface name="kernel_mount_debugfs" lineno="722">
<summary>
Mount a kernel debugging filesystem.
</summary>
@@ -86448,7 +68767,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_unmount_debugfs" lineno="721">
+<interface name="kernel_unmount_debugfs" lineno="740">
<summary>
Unmount a kernel debugging filesystem.
</summary>
@@ -86458,7 +68777,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_remount_debugfs" lineno="739">
+<interface name="kernel_remount_debugfs" lineno="758">
<summary>
Remount a kernel debugging filesystem.
</summary>
@@ -86468,7 +68787,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_search_debugfs" lineno="757">
+<interface name="kernel_search_debugfs" lineno="776">
<summary>
Search the contents of a kernel debugging filesystem.
</summary>
@@ -86478,7 +68797,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_search_debugfs" lineno="775">
+<interface name="kernel_dontaudit_search_debugfs" lineno="794">
<summary>
Do not audit attempts to search the kernel debugging filesystem.
</summary>
@@ -86488,7 +68807,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_read_debugfs" lineno="793">
+<interface name="kernel_read_debugfs" lineno="812">
<summary>
Read information from the debugging filesystem.
</summary>
@@ -86498,7 +68817,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_write_debugfs_dirs" lineno="813">
+<interface name="kernel_dontaudit_write_debugfs_dirs" lineno="832">
<summary>
Do not audit attempts to write kernel debugging filesystem dirs.
</summary>
@@ -86508,7 +68827,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_manage_debugfs" lineno="831">
+<interface name="kernel_manage_debugfs" lineno="850">
<summary>
Manage information from the debugging filesystem.
</summary>
@@ -86518,7 +68837,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_mount_kvmfs" lineno="851">
+<interface name="kernel_mount_kvmfs" lineno="870">
<summary>
Mount a kernel VM filesystem.
</summary>
@@ -86528,7 +68847,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_mount_proc" lineno="869">
+<interface name="kernel_mount_proc" lineno="888">
<summary>
mount the proc filesystem.
</summary>
@@ -86538,7 +68857,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_remount_proc" lineno="887">
+<interface name="kernel_remount_proc" lineno="906">
<summary>
remount the proc filesystem.
</summary>
@@ -86548,7 +68867,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_unmount_proc" lineno="905">
+<interface name="kernel_unmount_proc" lineno="924">
<summary>
Unmount the proc filesystem.
</summary>
@@ -86558,7 +68877,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_getattr_proc" lineno="923">
+<interface name="kernel_getattr_proc" lineno="942">
<summary>
Get the attributes of the proc filesystem.
</summary>
@@ -86568,7 +68887,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_proc" lineno="941">
+<interface name="kernel_dontaudit_getattr_proc" lineno="960">
<summary>
Do not audit attempts to get the attributes of the proc filesystem.
</summary>
@@ -86578,7 +68897,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_mounton_proc" lineno="960">
+<interface name="kernel_mounton_proc" lineno="979">
<summary>
Mount on proc directories. (Deprecated)
</summary>
@@ -86589,7 +68908,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="976">
+<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="995">
<summary>
Do not audit attempts to set the
attributes of directories in /proc.
@@ -86600,7 +68919,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_search_proc" lineno="994">
+<interface name="kernel_search_proc" lineno="1013">
<summary>
Search directories in /proc.
</summary>
@@ -86610,7 +68929,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_list_proc" lineno="1012">
+<interface name="kernel_list_proc" lineno="1031">
<summary>
List the contents of directories in /proc.
</summary>
@@ -86620,7 +68939,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_list_proc" lineno="1031">
+<interface name="kernel_dontaudit_list_proc" lineno="1050">
<summary>
Do not audit attempts to list the
contents of directories in /proc.
@@ -86631,7 +68950,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_write_proc_dirs" lineno="1050">
+<interface name="kernel_dontaudit_write_proc_dirs" lineno="1069">
<summary>
Do not audit attempts to write the
directories in /proc.
@@ -86642,7 +68961,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_mounton_proc_dirs" lineno="1068">
+<interface name="kernel_mounton_proc_dirs" lineno="1087">
<summary>
Mount on the directories in /proc.
</summary>
@@ -86652,7 +68971,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_getattr_proc_files" lineno="1086">
+<interface name="kernel_getattr_proc_files" lineno="1105">
<summary>
Get the attributes of files in /proc.
</summary>
@@ -86662,7 +68981,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_proc_symlinks" lineno="1113">
+<interface name="kernel_read_proc_symlinks" lineno="1132">
<summary>
Read generic symbolic links in /proc.
</summary>
@@ -86681,7 +69000,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="kernel_read_system_state" lineno="1152">
+<interface name="kernel_read_system_state" lineno="1171">
<summary>
Allows caller to read system state information in /proc.
</summary>
@@ -86712,7 +69031,7 @@ Domain allowed access.
<infoflow type="read" weight="10"/>
<rolecap/>
</interface>
-<interface name="kernel_write_proc_files" lineno="1178">
+<interface name="kernel_write_proc_files" lineno="1197">
<summary>
Write to generic proc entries.
</summary>
@@ -86723,7 +69042,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_read_system_state" lineno="1197">
+<interface name="kernel_dontaudit_read_system_state" lineno="1216">
<summary>
Do not audit attempts by caller to
read system state information in proc.
@@ -86734,7 +69053,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1216">
+<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1235">
<summary>
Do not audit attempts by caller to
read symbolic links in proc.
@@ -86745,7 +69064,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_rw_afs_state" lineno="1235">
+<interface name="kernel_rw_afs_state" lineno="1254">
<summary>
Allow caller to read and write state information for AFS.
</summary>
@@ -86756,7 +69075,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_software_raid_state" lineno="1255">
+<interface name="kernel_read_software_raid_state" lineno="1274">
<summary>
Allow caller to read the state information for software raid.
</summary>
@@ -86767,7 +69086,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_software_raid_state" lineno="1275">
+<interface name="kernel_rw_software_raid_state" lineno="1294">
<summary>
Allow caller to read and set the state information for software raid.
</summary>
@@ -86777,7 +69096,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_getattr_core_if" lineno="1295">
+<interface name="kernel_getattr_core_if" lineno="1314">
<summary>
Allows caller to get attributes of core kernel interface.
</summary>
@@ -86787,7 +69106,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_core_if" lineno="1316">
+<interface name="kernel_dontaudit_getattr_core_if" lineno="1335">
<summary>
Do not audit attempts to get the attributes of
core kernel interfaces.
@@ -86798,7 +69117,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_read_core_if" lineno="1334">
+<interface name="kernel_read_core_if" lineno="1353">
<summary>
Allows caller to read the core kernel interface.
</summary>
@@ -86808,7 +69127,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_messages" lineno="1358">
+<interface name="kernel_read_messages" lineno="1377">
<summary>
Allow caller to read kernel messages
using the /proc/kmsg interface.
@@ -86819,7 +69138,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_getattr_message_if" lineno="1380">
+<interface name="kernel_getattr_message_if" lineno="1399">
<summary>
Allow caller to get the attributes of kernel message
interface (/proc/kmsg).
@@ -86830,7 +69149,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_message_if" lineno="1399">
+<interface name="kernel_dontaudit_getattr_message_if" lineno="1418">
<summary>
Do not audit attempts by caller to get the attributes of kernel
message interfaces.
@@ -86841,7 +69160,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_mounton_message_if" lineno="1418">
+<interface name="kernel_mounton_message_if" lineno="1437">
<summary>
Mount on kernel message interfaces files.
</summary>
@@ -86852,7 +69171,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_search_network_state" lineno="1439">
+<interface name="kernel_dontaudit_search_network_state" lineno="1458">
<summary>
Do not audit attempts to search the network
state directory.
@@ -86864,7 +69183,7 @@ Domain to not audit.
</param>
</interface>
-<interface name="kernel_search_network_state" lineno="1458">
+<interface name="kernel_search_network_state" lineno="1477">
<summary>
Allow searching of network state directory.
</summary>
@@ -86875,7 +69194,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_read_network_state" lineno="1488">
+<interface name="kernel_read_network_state" lineno="1507">
<summary>
Read the network state information.
</summary>
@@ -86897,7 +69216,7 @@ Domain allowed access.
<infoflow type="read" weight="10"/>
<rolecap/>
</interface>
-<interface name="kernel_read_network_state_symlinks" lineno="1509">
+<interface name="kernel_read_network_state_symlinks" lineno="1528">
<summary>
Allow caller to read the network state symbolic links.
</summary>
@@ -86907,7 +69226,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_search_xen_state" lineno="1530">
+<interface name="kernel_search_xen_state" lineno="1549">
<summary>
Allow searching of xen state directory.
</summary>
@@ -86918,7 +69237,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_dontaudit_search_xen_state" lineno="1550">
+<interface name="kernel_dontaudit_search_xen_state" lineno="1569">
<summary>
Do not audit attempts to search the xen
state directory.
@@ -86930,7 +69249,7 @@ Domain to not audit.
</param>
</interface>
-<interface name="kernel_read_xen_state" lineno="1569">
+<interface name="kernel_read_xen_state" lineno="1588">
<summary>
Allow caller to read the xen state information.
</summary>
@@ -86941,7 +69260,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_read_xen_state_symlinks" lineno="1591">
+<interface name="kernel_read_xen_state_symlinks" lineno="1610">
<summary>
Allow caller to read the xen state symbolic links.
</summary>
@@ -86952,7 +69271,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_write_xen_state" lineno="1612">
+<interface name="kernel_write_xen_state" lineno="1631">
<summary>
Allow caller to write xen state information.
</summary>
@@ -86963,7 +69282,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_list_all_proc" lineno="1630">
+<interface name="kernel_list_all_proc" lineno="1649">
<summary>
Allow attempts to list all proc directories.
</summary>
@@ -86973,7 +69292,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_list_all_proc" lineno="1649">
+<interface name="kernel_dontaudit_list_all_proc" lineno="1668">
<summary>
Do not audit attempts to list all proc directories.
</summary>
@@ -86983,7 +69302,27 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_search_sysctl" lineno="1670">
+<interface name="kernel_write_non_proc_init_mountpoint_files" lineno="1687">
+<summary>
+Write systemd mountpoint files except proc entries.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kernel_create_non_proc_init_mountpoint_files" lineno="1705">
+<summary>
+Create systemd mountpoint files except proc entries.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kernel_dontaudit_search_sysctl" lineno="1725">
<summary>
Do not audit attempts by caller to search
the base directory of sysctls.
@@ -86995,7 +69334,7 @@ Domain to not audit.
</param>
</interface>
-<interface name="kernel_mounton_sysctl_dirs" lineno="1689">
+<interface name="kernel_mounton_sysctl_dirs" lineno="1744">
<summary>
Mount on sysctl_t dirs.
</summary>
@@ -87006,7 +69345,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_sysctl" lineno="1709">
+<interface name="kernel_read_sysctl" lineno="1764">
<summary>
Allow access to read sysctl directories.
</summary>
@@ -87017,7 +69356,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_mounton_sysctl_files" lineno="1729">
+<interface name="kernel_mounton_sysctl_files" lineno="1784">
<summary>
Mount on sysctl files.
</summary>
@@ -87028,7 +69367,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_device_sysctls" lineno="1749">
+<interface name="kernel_read_device_sysctls" lineno="1804">
<summary>
Allow caller to read the device sysctls.
</summary>
@@ -87039,7 +69378,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_device_sysctls" lineno="1770">
+<interface name="kernel_rw_device_sysctls" lineno="1825">
<summary>
Read and write device sysctls.
</summary>
@@ -87050,7 +69389,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_search_vm_sysctl" lineno="1790">
+<interface name="kernel_search_vm_sysctl" lineno="1845">
<summary>
Allow caller to search virtual memory sysctls.
</summary>
@@ -87060,7 +69399,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_vm_sysctls" lineno="1809">
+<interface name="kernel_read_vm_sysctls" lineno="1864">
<summary>
Allow caller to read virtual memory sysctls.
</summary>
@@ -87071,7 +69410,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_vm_sysctls" lineno="1830">
+<interface name="kernel_rw_vm_sysctls" lineno="1885">
<summary>
Read and write virtual memory sysctls.
</summary>
@@ -87082,7 +69421,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_search_network_sysctl" lineno="1852">
+<interface name="kernel_search_network_sysctl" lineno="1907">
<summary>
Search network sysctl directories.
</summary>
@@ -87092,7 +69431,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_search_network_sysctl" lineno="1870">
+<interface name="kernel_dontaudit_search_network_sysctl" lineno="1925">
<summary>
Do not audit attempts by caller to search network sysctl directories.
</summary>
@@ -87102,7 +69441,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_read_net_sysctls" lineno="1889">
+<interface name="kernel_read_net_sysctls" lineno="1944">
<summary>
Allow caller to read network sysctls.
</summary>
@@ -87113,7 +69452,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_net_sysctls" lineno="1910">
+<interface name="kernel_rw_net_sysctls" lineno="1965">
<summary>
Allow caller to modiry contents of sysctl network files.
</summary>
@@ -87124,7 +69463,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_unix_sysctls" lineno="1932">
+<interface name="kernel_read_unix_sysctls" lineno="1987">
<summary>
Allow caller to read unix domain
socket sysctls.
@@ -87136,7 +69475,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_unix_sysctls" lineno="1954">
+<interface name="kernel_rw_unix_sysctls" lineno="2009">
<summary>
Read and write unix domain
socket sysctls.
@@ -87148,7 +69487,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_hotplug_sysctls" lineno="1975">
+<interface name="kernel_read_hotplug_sysctls" lineno="2030">
<summary>
Read the hotplug sysctl.
</summary>
@@ -87159,7 +69498,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_hotplug_sysctls" lineno="1996">
+<interface name="kernel_rw_hotplug_sysctls" lineno="2051">
<summary>
Read and write the hotplug sysctl.
</summary>
@@ -87170,7 +69509,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_modprobe_sysctls" lineno="2017">
+<interface name="kernel_read_modprobe_sysctls" lineno="2072">
<summary>
Read the modprobe sysctl.
</summary>
@@ -87181,7 +69520,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_modprobe_sysctls" lineno="2038">
+<interface name="kernel_rw_modprobe_sysctls" lineno="2093">
<summary>
Read and write the modprobe sysctl.
</summary>
@@ -87192,7 +69531,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2058">
+<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2113">
<summary>
Do not audit attempts to search generic kernel sysctls.
</summary>
@@ -87202,7 +69541,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2076">
+<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2131">
<summary>
Do not audit attempted reading of kernel sysctls
</summary>
@@ -87212,7 +69551,7 @@ Domain to not audit accesses from
</summary>
</param>
</interface>
-<interface name="kernel_read_crypto_sysctls" lineno="2094">
+<interface name="kernel_read_crypto_sysctls" lineno="2149">
<summary>
Read generic crypto sysctls.
</summary>
@@ -87222,7 +69561,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_kernel_sysctls" lineno="2135">
+<interface name="kernel_read_kernel_sysctls" lineno="2190">
<summary>
Read general kernel sysctls.
</summary>
@@ -87254,7 +69593,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2155">
+<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2210">
<summary>
Do not audit attempts to write generic kernel sysctls.
</summary>
@@ -87264,7 +69603,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_rw_kernel_sysctl" lineno="2174">
+<interface name="kernel_rw_kernel_sysctl" lineno="2229">
<summary>
Read and write generic kernel sysctls.
</summary>
@@ -87275,7 +69614,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_mounton_kernel_sysctl_files" lineno="2195">
+<interface name="kernel_mounton_kernel_sysctl_files" lineno="2250">
<summary>
Mount on kernel sysctl files.
</summary>
@@ -87286,7 +69625,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2215">
+<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2270">
<summary>
Read kernel ns lastpid sysctls.
</summary>
@@ -87297,7 +69636,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2235">
+<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2290">
<summary>
Do not audit attempts to write kernel ns lastpid sysctls.
</summary>
@@ -87307,7 +69646,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2254">
+<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2309">
<summary>
Read and write kernel ns lastpid sysctls.
</summary>
@@ -87318,7 +69657,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_search_fs_sysctls" lineno="2275">
+<interface name="kernel_search_fs_sysctls" lineno="2330">
<summary>
Search filesystem sysctl directories.
</summary>
@@ -87329,7 +69668,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_fs_sysctls" lineno="2294">
+<interface name="kernel_read_fs_sysctls" lineno="2349">
<summary>
Read filesystem sysctls.
</summary>
@@ -87340,7 +69679,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_fs_sysctls" lineno="2315">
+<interface name="kernel_rw_fs_sysctls" lineno="2370">
<summary>
Read and write filesystem sysctls.
</summary>
@@ -87351,7 +69690,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_irq_sysctls" lineno="2336">
+<interface name="kernel_read_irq_sysctls" lineno="2391">
<summary>
Read IRQ sysctls.
</summary>
@@ -87362,7 +69701,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_search_fs_sysctls" lineno="2358">
+<interface name="kernel_dontaudit_search_fs_sysctls" lineno="2413">
<summary>
Do not audit attempts to search
filesystem sysctl directories.
@@ -87374,7 +69713,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_irq_sysctls" lineno="2377">
+<interface name="kernel_rw_irq_sysctls" lineno="2432">
<summary>
Read and write IRQ sysctls.
</summary>
@@ -87385,7 +69724,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_rpc_sysctls" lineno="2398">
+<interface name="kernel_read_rpc_sysctls" lineno="2453">
<summary>
Read RPC sysctls.
</summary>
@@ -87396,7 +69735,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_rpc_sysctls" lineno="2419">
+<interface name="kernel_rw_rpc_sysctls" lineno="2474">
<summary>
Read and write RPC sysctls.
</summary>
@@ -87407,7 +69746,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_list_all_sysctls" lineno="2439">
+<interface name="kernel_dontaudit_list_all_sysctls" lineno="2494">
<summary>
Do not audit attempts to list all sysctl directories.
</summary>
@@ -87417,7 +69756,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_read_all_sysctls" lineno="2459">
+<interface name="kernel_read_all_sysctls" lineno="2514">
<summary>
Allow caller to read all sysctls.
</summary>
@@ -87428,7 +69767,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_all_sysctls" lineno="2482">
+<interface name="kernel_rw_all_sysctls" lineno="2537">
<summary>
Read and write all sysctls.
</summary>
@@ -87439,7 +69778,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_associate_proc" lineno="2507">
+<interface name="kernel_associate_proc" lineno="2562">
<summary>
Associate a file to proc_t (/proc)
</summary>
@@ -87450,7 +69789,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_kill_unlabeled" lineno="2524">
+<interface name="kernel_kill_unlabeled" lineno="2579">
<summary>
Send a kill signal to unlabeled processes.
</summary>
@@ -87460,7 +69799,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_mount_unlabeled" lineno="2542">
+<interface name="kernel_mount_unlabeled" lineno="2597">
<summary>
Mount a kernel unlabeled filesystem.
</summary>
@@ -87470,7 +69809,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_unmount_unlabeled" lineno="2560">
+<interface name="kernel_unmount_unlabeled" lineno="2615">
<summary>
Unmount a kernel unlabeled filesystem.
</summary>
@@ -87480,7 +69819,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_signal_unlabeled" lineno="2578">
+<interface name="kernel_signal_unlabeled" lineno="2633">
<summary>
Send general signals to unlabeled processes.
</summary>
@@ -87490,7 +69829,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_signull_unlabeled" lineno="2596">
+<interface name="kernel_signull_unlabeled" lineno="2651">
<summary>
Send a null signal to unlabeled processes.
</summary>
@@ -87500,7 +69839,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_sigstop_unlabeled" lineno="2614">
+<interface name="kernel_sigstop_unlabeled" lineno="2669">
<summary>
Send a stop signal to unlabeled processes.
</summary>
@@ -87510,7 +69849,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_sigchld_unlabeled" lineno="2632">
+<interface name="kernel_sigchld_unlabeled" lineno="2687">
<summary>
Send a child terminated signal to unlabeled processes.
</summary>
@@ -87520,7 +69859,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_getattr_unlabeled_dirs" lineno="2650">
+<interface name="kernel_getattr_unlabeled_dirs" lineno="2705">
<summary>
Get the attributes of unlabeled directories.
</summary>
@@ -87530,7 +69869,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_search_unlabeled" lineno="2668">
+<interface name="kernel_dontaudit_search_unlabeled" lineno="2723">
<summary>
Do not audit attempts to search unlabeled directories.
</summary>
@@ -87540,7 +69879,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_list_unlabeled" lineno="2686">
+<interface name="kernel_list_unlabeled" lineno="2741">
<summary>
List unlabeled directories.
</summary>
@@ -87550,7 +69889,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_unlabeled_state" lineno="2704">
+<interface name="kernel_read_unlabeled_state" lineno="2759">
<summary>
Read the process state (/proc/pid) of all unlabeled_t.
</summary>
@@ -87560,7 +69899,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_list_unlabeled" lineno="2724">
+<interface name="kernel_dontaudit_list_unlabeled" lineno="2779">
<summary>
Do not audit attempts to list unlabeled directories.
</summary>
@@ -87570,7 +69909,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_rw_unlabeled_dirs" lineno="2742">
+<interface name="kernel_rw_unlabeled_dirs" lineno="2797">
<summary>
Read and write unlabeled directories.
</summary>
@@ -87580,7 +69919,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_dirs" lineno="2760">
+<interface name="kernel_delete_unlabeled_dirs" lineno="2815">
<summary>
Delete unlabeled directories.
</summary>
@@ -87590,7 +69929,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_dirs" lineno="2778">
+<interface name="kernel_manage_unlabeled_dirs" lineno="2833">
<summary>
Create, read, write, and delete unlabeled directories.
</summary>
@@ -87600,7 +69939,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_mounton_unlabeled_dirs" lineno="2796">
+<interface name="kernel_mounton_unlabeled_dirs" lineno="2851">
<summary>
Mount a filesystem on an unlabeled directory.
</summary>
@@ -87610,7 +69949,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_unlabeled_files" lineno="2814">
+<interface name="kernel_read_unlabeled_files" lineno="2869">
<summary>
Read unlabeled files.
</summary>
@@ -87620,7 +69959,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_rw_unlabeled_files" lineno="2832">
+<interface name="kernel_rw_unlabeled_files" lineno="2887">
<summary>
Read and write unlabeled files.
</summary>
@@ -87630,7 +69969,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_files" lineno="2850">
+<interface name="kernel_delete_unlabeled_files" lineno="2905">
<summary>
Delete unlabeled files.
</summary>
@@ -87640,7 +69979,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_files" lineno="2868">
+<interface name="kernel_manage_unlabeled_files" lineno="2923">
<summary>
Create, read, write, and delete unlabeled files.
</summary>
@@ -87650,7 +69989,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2887">
+<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2942">
<summary>
Do not audit attempts by caller to get the
attributes of an unlabeled file.
@@ -87661,7 +70000,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2906">
+<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2961">
<summary>
Do not audit attempts by caller to
read an unlabeled file.
@@ -87672,7 +70011,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_unlabeled_filetrans" lineno="2940">
+<interface name="kernel_unlabeled_filetrans" lineno="2995">
<summary>
Create an object in unlabeled directories
with a private type.
@@ -87698,7 +70037,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_symlinks" lineno="2958">
+<interface name="kernel_delete_unlabeled_symlinks" lineno="3013">
<summary>
Delete unlabeled symbolic links.
</summary>
@@ -87708,7 +70047,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_symlinks" lineno="2976">
+<interface name="kernel_manage_unlabeled_symlinks" lineno="3031">
<summary>
Create, read, write, and delete unlabeled symbolic links.
</summary>
@@ -87718,7 +70057,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2995">
+<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="3050">
<summary>
Do not audit attempts by caller to get the
attributes of unlabeled symbolic links.
@@ -87729,7 +70068,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="3014">
+<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="3069">
<summary>
Do not audit attempts by caller to get the
attributes of unlabeled named pipes.
@@ -87740,7 +70079,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="3033">
+<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="3088">
<summary>
Do not audit attempts by caller to get the
attributes of unlabeled named sockets.
@@ -87751,7 +70090,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="3052">
+<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="3107">
<summary>
Do not audit attempts by caller to get attributes for
unlabeled block devices.
@@ -87762,7 +70101,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_rw_unlabeled_blk_files" lineno="3070">
+<interface name="kernel_rw_unlabeled_blk_files" lineno="3125">
<summary>
Read and write unlabeled block device nodes.
</summary>
@@ -87772,7 +70111,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_blk_files" lineno="3088">
+<interface name="kernel_delete_unlabeled_blk_files" lineno="3143">
<summary>
Delete unlabeled block device nodes.
</summary>
@@ -87782,7 +70121,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_blk_files" lineno="3106">
+<interface name="kernel_manage_unlabeled_blk_files" lineno="3161">
<summary>
Create, read, write, and delete unlabeled block device nodes.
</summary>
@@ -87792,7 +70131,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3125">
+<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3180">
<summary>
Do not audit attempts by caller to get attributes for
unlabeled character devices.
@@ -87803,7 +70142,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3144">
+<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3199">
<summary>
Do not audit attempts to
write unlabeled character devices.
@@ -87814,7 +70153,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_chr_files" lineno="3162">
+<interface name="kernel_delete_unlabeled_chr_files" lineno="3217">
<summary>
Delete unlabeled character device nodes.
</summary>
@@ -87824,7 +70163,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_chr_files" lineno="3181">
+<interface name="kernel_manage_unlabeled_chr_files" lineno="3236">
<summary>
Create, read, write, and delete unlabeled character device nodes.
</summary>
@@ -87834,7 +70173,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3199">
+<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3254">
<summary>
Allow caller to relabel unlabeled directories.
</summary>
@@ -87844,7 +70183,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_files" lineno="3217">
+<interface name="kernel_relabelfrom_unlabeled_files" lineno="3272">
<summary>
Allow caller to relabel unlabeled files.
</summary>
@@ -87854,7 +70193,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3236">
+<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3291">
<summary>
Allow caller to relabel unlabeled symbolic links.
</summary>
@@ -87864,7 +70203,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3255">
+<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3310">
<summary>
Allow caller to relabel unlabeled named pipes.
</summary>
@@ -87874,7 +70213,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_pipes" lineno="3274">
+<interface name="kernel_delete_unlabeled_pipes" lineno="3329">
<summary>
Delete unlabeled named pipes
</summary>
@@ -87884,7 +70223,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3292">
+<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3347">
<summary>
Allow caller to relabel unlabeled named sockets.
</summary>
@@ -87894,7 +70233,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_sockets" lineno="3311">
+<interface name="kernel_delete_unlabeled_sockets" lineno="3366">
<summary>
Delete unlabeled named sockets.
</summary>
@@ -87904,7 +70243,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_blk_devs" lineno="3329">
+<interface name="kernel_relabelfrom_unlabeled_blk_devs" lineno="3384">
<summary>
Allow caller to relabel from unlabeled block devices.
</summary>
@@ -87914,7 +70253,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_chr_devs" lineno="3347">
+<interface name="kernel_relabelfrom_unlabeled_chr_devs" lineno="3402">
<summary>
Allow caller to relabel from unlabeled character devices.
</summary>
@@ -87924,7 +70263,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_sendrecv_unlabeled_association" lineno="3380">
+<interface name="kernel_sendrecv_unlabeled_association" lineno="3435">
<summary>
Send and receive messages from an
unlabeled IPSEC association.
@@ -87949,7 +70288,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3413">
+<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3468">
<summary>
Do not audit attempts to send and receive messages
from an unlabeled IPSEC association.
@@ -87974,7 +70313,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3440">
+<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3495">
<summary>
Receive TCP packets from an unlabeled connection.
</summary>
@@ -87993,7 +70332,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3469">
+<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3524">
<summary>
Do not audit attempts to receive TCP packets from an unlabeled
connection.
@@ -88014,7 +70353,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_udp_recvfrom_unlabeled" lineno="3496">
+<interface name="kernel_udp_recvfrom_unlabeled" lineno="3551">
<summary>
Receive UDP packets from an unlabeled connection.
</summary>
@@ -88033,7 +70372,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3525">
+<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3580">
<summary>
Do not audit attempts to receive UDP packets from an unlabeled
connection.
@@ -88054,7 +70393,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_raw_recvfrom_unlabeled" lineno="3552">
+<interface name="kernel_raw_recvfrom_unlabeled" lineno="3607">
<summary>
Receive Raw IP packets from an unlabeled connection.
</summary>
@@ -88073,7 +70412,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3581">
+<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3636">
<summary>
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
@@ -88094,7 +70433,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_sendrecv_unlabeled_packets" lineno="3611">
+<interface name="kernel_sendrecv_unlabeled_packets" lineno="3666">
<summary>
Send and receive unlabeled packets.
</summary>
@@ -88116,7 +70455,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_recvfrom_unlabeled_peer" lineno="3639">
+<interface name="kernel_recvfrom_unlabeled_peer" lineno="3694">
<summary>
Receive packets from an unlabeled peer.
</summary>
@@ -88136,7 +70475,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3667">
+<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3722">
<summary>
Do not audit attempts to receive packets from an unlabeled peer.
</summary>
@@ -88156,7 +70495,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_database" lineno="3685">
+<interface name="kernel_relabelfrom_unlabeled_database" lineno="3740">
<summary>
Relabel from unlabeled database objects.
</summary>
@@ -88166,7 +70505,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_unconfined" lineno="3722">
+<interface name="kernel_unconfined" lineno="3777">
<summary>
Unconfined access to kernel module resources.
</summary>
@@ -88176,7 +70515,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_vm_overcommit_sysctl" lineno="3742">
+<interface name="kernel_read_vm_overcommit_sysctl" lineno="3797">
<summary>
Read virtual memory overcommit sysctl.
</summary>
@@ -88187,7 +70526,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3762">
+<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3817">
<summary>
Read and write virtual memory overcommit sysctl.
</summary>
@@ -88198,7 +70537,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3781">
+<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3836">
<summary>
Access unlabeled infiniband pkeys.
</summary>
@@ -88208,7 +70547,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3799">
+<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3854">
<summary>
Manage subnet on unlabeled Infiniband endports.
</summary>
@@ -89290,17 +71629,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="selinux_map_security_files" lineno="711">
-<summary>
-Allows caller to map secuirty_t files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="selinux_unconfined" lineno="732">
+<interface name="selinux_unconfined" lineno="710">
<summary>
Unconfined access to the SELinux kernel security server.
</summary>
@@ -89339,7 +71668,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_getattr_fixed_disk_dev" lineno="34">
+<interface name="storage_dontaudit_getattr_fixed_disk_dev" lineno="35">
<summary>
Do not audit attempts made by the caller to get
the attributes of fixed disk device nodes.
@@ -89350,7 +71679,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_setattr_fixed_disk_dev" lineno="54">
+<interface name="storage_setattr_fixed_disk_dev" lineno="55">
<summary>
Allow the caller to set the attributes of fixed disk
device nodes.
@@ -89361,7 +71690,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_setattr_fixed_disk_dev" lineno="74">
+<interface name="storage_dontaudit_setattr_fixed_disk_dev" lineno="76">
<summary>
Do not audit attempts made by the caller to set
the attributes of fixed disk device nodes.
@@ -89372,7 +71701,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_raw_read_fixed_disk" lineno="95">
+<interface name="storage_raw_read_fixed_disk" lineno="98">
<summary>
Allow the caller to directly read from a fixed disk.
This is extremely dangerous as it can bypass the
@@ -89385,7 +71714,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_raw_read_fixed_disk_cond" lineno="126">
+<interface name="storage_raw_read_fixed_disk_cond" lineno="129">
<summary>
Allow the caller to directly read from a fixed disk
if a tunable is set.
@@ -89404,7 +71733,7 @@ Tunable to depend on
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_read_fixed_disk" lineno="151">
+<interface name="storage_dontaudit_read_fixed_disk" lineno="154">
<summary>
Do not audit attempts made by the caller to read
fixed disk device nodes.
@@ -89415,7 +71744,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_raw_write_fixed_disk" lineno="174">
+<interface name="storage_raw_write_fixed_disk" lineno="177">
<summary>
Allow the caller to directly write to a fixed disk.
This is extremely dangerous as it can bypass the
@@ -89428,7 +71757,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_write_fixed_disk" lineno="197">
+<interface name="storage_dontaudit_write_fixed_disk" lineno="200">
<summary>
Do not audit attempts made by the caller to write
fixed disk device nodes.
@@ -89439,7 +71768,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_raw_rw_fixed_disk" lineno="219">
+<interface name="storage_raw_rw_fixed_disk" lineno="222">
<summary>
Allow the caller to directly read and write to a fixed disk.
This is extremely dangerous as it can bypass the
@@ -89452,7 +71781,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_create_fixed_disk_dev" lineno="234">
+<interface name="storage_create_fixed_disk_dev" lineno="237">
<summary>
Allow the caller to create fixed disk device nodes.
</summary>
@@ -89462,7 +71791,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_delete_fixed_disk_dev" lineno="254">
+<interface name="storage_delete_fixed_disk_dev" lineno="257">
<summary>
Allow the caller to delete fixed disk device nodes.
</summary>
@@ -89472,7 +71801,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_manage_fixed_disk" lineno="273">
+<interface name="storage_manage_fixed_disk" lineno="276">
<summary>
Create, read, write, and delete fixed disk device nodes.
</summary>
@@ -89482,7 +71811,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dev_filetrans_fixed_disk" lineno="302">
+<interface name="storage_dev_filetrans_fixed_disk" lineno="305">
<summary>
Create block devices in /dev with the fixed disk type
via an automatic type transition.
@@ -89498,7 +71827,7 @@ Optional filename of the block device to be created
</summary>
</param>
</interface>
-<interface name="storage_tmpfs_filetrans_fixed_disk" lineno="321">
+<interface name="storage_tmpfs_filetrans_fixed_disk" lineno="324">
<summary>
Create block devices in on a tmpfs filesystem with the
fixed disk type via an automatic type transition.
@@ -89509,7 +71838,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_relabel_fixed_disk" lineno="339">
+<interface name="storage_relabel_fixed_disk" lineno="342">
<summary>
Relabel fixed disk device nodes.
</summary>
@@ -89519,7 +71848,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_swapon_fixed_disk" lineno="358">
+<interface name="storage_swapon_fixed_disk" lineno="361">
<summary>
Enable a fixed disk device as swap space
</summary>
@@ -89529,7 +71858,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_watch_fixed_disk" lineno="377">
+<interface name="storage_watch_fixed_disk" lineno="380">
<summary>
Watch fixed disk device nodes.
</summary>
@@ -89539,7 +71868,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_getattr_fuse_dev" lineno="398">
+<interface name="storage_getattr_fuse_dev" lineno="401">
<summary>
Allow the caller to get the attributes
of device nodes of fuse devices.
@@ -89550,7 +71879,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_rw_fuse" lineno="417">
+<interface name="storage_rw_fuse" lineno="420">
<summary>
read or write fuse device interfaces.
</summary>
@@ -89560,7 +71889,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_rw_fuse" lineno="436">
+<interface name="storage_dontaudit_rw_fuse" lineno="439">
<summary>
Do not audit attempts to read or write
fuse device interfaces.
@@ -89571,7 +71900,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_getattr_scsi_generic_dev" lineno="455">
+<interface name="storage_getattr_scsi_generic_dev" lineno="458">
<summary>
Allow the caller to get the attributes of
the generic SCSI interface device nodes.
@@ -89582,7 +71911,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_setattr_scsi_generic_dev" lineno="475">
+<interface name="storage_setattr_scsi_generic_dev" lineno="478">
<summary>
Allow the caller to set the attributes of
the generic SCSI interface device nodes.
@@ -89593,7 +71922,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_read_scsi_generic" lineno="498">
+<interface name="storage_read_scsi_generic" lineno="501">
<summary>
Allow the caller to directly read, in a
generic fashion, from any SCSI device.
@@ -89607,7 +71936,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_write_scsi_generic" lineno="523">
+<interface name="storage_write_scsi_generic" lineno="526">
<summary>
Allow the caller to directly write, in a
generic fashion, from any SCSI device.
@@ -89621,7 +71950,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_setattr_scsi_generic_dev_dev" lineno="545">
+<interface name="storage_setattr_scsi_generic_dev_dev" lineno="548">
<summary>
Set attributes of the device nodes
for the SCSI generic interface.
@@ -89632,7 +71961,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_rw_scsi_generic" lineno="565">
+<interface name="storage_dontaudit_rw_scsi_generic" lineno="568">
<summary>
Do not audit attempts to read or write
SCSI generic device interfaces.
@@ -89643,7 +71972,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_getattr_removable_dev" lineno="584">
+<interface name="storage_getattr_removable_dev" lineno="587">
<summary>
Allow the caller to get the attributes of removable
devices device nodes.
@@ -89654,7 +71983,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_getattr_removable_dev" lineno="604">
+<interface name="storage_dontaudit_getattr_removable_dev" lineno="607">
<summary>
Do not audit attempts made by the caller to get
the attributes of removable devices device nodes.
@@ -89665,7 +71994,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_read_removable_device" lineno="623">
+<interface name="storage_dontaudit_read_removable_device" lineno="626">
<summary>
Do not audit attempts made by the caller to read
removable devices device nodes.
@@ -89676,7 +72005,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_write_removable_device" lineno="643">
+<interface name="storage_dontaudit_write_removable_device" lineno="646">
<summary>
Do not audit attempts made by the caller to write
removable devices device nodes.
@@ -89687,7 +72016,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_setattr_removable_dev" lineno="662">
+<interface name="storage_setattr_removable_dev" lineno="665">
<summary>
Allow the caller to set the attributes of removable
devices device nodes.
@@ -89698,7 +72027,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_setattr_removable_dev" lineno="682">
+<interface name="storage_dontaudit_setattr_removable_dev" lineno="685">
<summary>
Do not audit attempts made by the caller to set
the attributes of removable devices device nodes.
@@ -89709,7 +72038,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_raw_read_removable_device" lineno="704">
+<interface name="storage_raw_read_removable_device" lineno="707">
<summary>
Allow the caller to directly read from
a removable device.
@@ -89723,7 +72052,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_raw_read_removable_device" lineno="723">
+<interface name="storage_dontaudit_raw_read_removable_device" lineno="726">
<summary>
Do not audit attempts to directly read removable devices.
</summary>
@@ -89733,7 +72062,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_raw_write_removable_device" lineno="745">
+<interface name="storage_raw_write_removable_device" lineno="748">
<summary>
Allow the caller to directly write to
a removable device.
@@ -89747,7 +72076,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_raw_write_removable_device" lineno="764">
+<interface name="storage_dontaudit_raw_write_removable_device" lineno="767">
<summary>
Do not audit attempts to directly write removable devices.
</summary>
@@ -89757,7 +72086,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_read_tape" lineno="783">
+<interface name="storage_read_tape" lineno="786">
<summary>
Allow the caller to directly read
a tape device.
@@ -89768,7 +72097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_write_tape" lineno="803">
+<interface name="storage_write_tape" lineno="806">
<summary>
Allow the caller to directly write
a tape device.
@@ -89779,7 +72108,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_getattr_tape_dev" lineno="823">
+<interface name="storage_getattr_tape_dev" lineno="826">
<summary>
Allow the caller to get the attributes
of device nodes of tape devices.
@@ -89790,7 +72119,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_setattr_tape_dev" lineno="843">
+<interface name="storage_setattr_tape_dev" lineno="846">
<summary>
Allow the caller to set the attributes
of device nodes of tape devices.
@@ -89801,7 +72130,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_unconfined" lineno="862">
+<interface name="storage_unconfined" lineno="865">
<summary>
Unconfined access to storage devices.
</summary>
@@ -90863,6 +73192,14 @@ Role allowed access.
</param>
<rolecap/>
</interface>
+<tunable name="guest_connect_network" dftval="false">
+<desc>
+<p>
+Determine whether guest can
+configure network manager.
+</p>
+</desc>
+</tunable>
</module>
<module name="logadm" filename="policy/modules/roles/logadm.if">
<summary>Log administrator role</summary>
@@ -91399,28 +73736,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="abrt_read_pid_files" lineno="234">
-<summary>
-Read abrt PID files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="abrt_manage_pid_files" lineno="249">
-<summary>
-Create, read, write, and delete
-abrt PID files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="abrt_manage_runtime_files" lineno="265">
+<interface name="abrt_manage_runtime_files" lineno="235">
<summary>
Create, read, write, and delete
abrt runtime files.
@@ -91431,7 +73747,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="abrt_admin" lineno="291">
+<interface name="abrt_admin" lineno="261">
<summary>
All of the rules required to
administrate an abrt environment,
@@ -91871,27 +74187,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="amavis_setattr_pid_files" lineno="184">
-<summary>
-Set attributes of amavis pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="amavis_create_pid_files" lineno="199">
-<summary>
-Create amavis pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="amavis_setattr_runtime_files" lineno="214">
+<interface name="amavis_setattr_runtime_files" lineno="184">
<summary>
Set attributes of amavis runtime files.
</summary>
@@ -91901,7 +74197,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="amavis_create_runtime_files" lineno="233">
+<interface name="amavis_create_runtime_files" lineno="203">
<summary>
Create amavis runtime files.
</summary>
@@ -91911,7 +74207,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="amavis_admin" lineno="259">
+<interface name="amavis_admin" lineno="229">
<summary>
All of the rules required to
administrate an amavis environment.
@@ -92665,6 +74961,17 @@ Domain allowed access.
</summary>
</param>
</interface>
+<interface name="apache_map_sys_content" lineno="1481">
+<summary>
+Map httpd sys content files.
+This interface is Gentoo-specific.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
<tunable name="allow_httpd_anon_write" dftval="false">
<desc>
<p>
@@ -92973,17 +75280,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apcupsd_read_pid_files" lineno="52">
-<summary>
-Read apcupsd PID files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="apcupsd_read_log" lineno="67">
+<interface name="apcupsd_read_log" lineno="53">
<summary>
Read apcupsd log files.
</summary>
@@ -92994,7 +75291,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apcupsd_append_log" lineno="87">
+<interface name="apcupsd_append_log" lineno="73">
<summary>
Append apcupsd log files.
</summary>
@@ -93004,7 +75301,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apcupsd_cgi_script_domtrans" lineno="108">
+<interface name="apcupsd_cgi_script_domtrans" lineno="94">
<summary>
Execute a domain transition to
run httpd_apcupsd_cgi_script.
@@ -93015,7 +75312,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apcupsd_admin" lineno="138">
+<interface name="apcupsd_admin" lineno="124">
<summary>
All of the rules required to
administrate an apcupsd environment.
@@ -93242,18 +75539,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="asterisk_setattr_pid_files" lineno="93">
-<summary>
-Set attributes of the asterisk
-PID content.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="asterisk_admin" lineno="114">
+<interface name="asterisk_admin" lineno="99">
<summary>
All of the rules required to
administrate an asterisk environment.
@@ -93430,27 +75716,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="avahi_create_pid_dirs" lineno="146">
-<summary>
-Create avahi pid directories. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="avahi_setattr_pid_dirs" lineno="161">
-<summary>
-Set attributes of avahi pid directories. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="avahi_setattr_runtime_dirs" lineno="176">
+<interface name="avahi_setattr_runtime_dirs" lineno="146">
<summary>
Set attributes of avahi runtime directories.
</summary>
@@ -93460,7 +75726,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="avahi_create_runtime_dirs" lineno="195">
+<interface name="avahi_create_runtime_dirs" lineno="165">
<summary>
Create avahi runtime directories.
</summary>
@@ -93470,49 +75736,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="avahi_manage_pid_files" lineno="214">
-<summary>
-Create, read, and write avahi pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="avahi_dontaudit_search_pid" lineno="230">
-<summary>
-Do not audit attempts to search
-avahi pid directories. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="avahi_filetrans_pid" lineno="256">
-<summary>
-Create specified objects in generic
-pid directories with the avahi pid file type. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="object_class">
-<summary>
-Class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="avahi_manage_runtime_files" lineno="271">
+<interface name="avahi_manage_runtime_files" lineno="184">
<summary>
Create, read, and write avahi runtime files.
</summary>
@@ -93522,7 +75746,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="avahi_dontaudit_search_runtime" lineno="291">
+<interface name="avahi_dontaudit_search_runtime" lineno="204">
<summary>
Do not audit attempts to search
avahi runtime directories.
@@ -93533,7 +75757,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="avahi_filetrans_runtime" lineno="320">
+<interface name="avahi_filetrans_runtime" lineno="233">
<summary>
Create specified objects in generic
runtime directories with the avahi runtime file type.
@@ -93554,7 +75778,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="avahi_admin" lineno="345">
+<interface name="avahi_admin" lineno="258">
<summary>
All of the rules required to
administrate an avahi environment.
@@ -93714,17 +75938,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="bind_setattr_pid_dirs" lineno="267">
-<summary>
-Set attributes of bind pid directories. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="bind_setattr_zone_dirs" lineno="281">
+<interface name="bind_setattr_zone_dirs" lineno="267">
<summary>
Set attributes of bind zone directories.
</summary>
@@ -93734,7 +75948,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="bind_read_zone" lineno="299">
+<interface name="bind_read_zone" lineno="285">
<summary>
Read bind zone files.
</summary>
@@ -93744,7 +75958,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="bind_manage_zone" lineno="319">
+<interface name="bind_manage_zone" lineno="305">
<summary>
Create, read, write, and delete
bind zone files.
@@ -93755,7 +75969,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="bind_admin" lineno="345">
+<interface name="bind_admin" lineno="331">
<summary>
All of the rules required to
administrate an bind environment.
@@ -94222,17 +76436,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="certmonger_read_pid_files" lineno="72">
-<summary>
-Read certmonger PID files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="certmonger_search_lib" lineno="86">
+<interface name="certmonger_search_lib" lineno="72">
<summary>
Search certmonger lib directories.
</summary>
@@ -94242,7 +76446,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="certmonger_read_lib_files" lineno="105">
+<interface name="certmonger_read_lib_files" lineno="91">
<summary>
Read certmonger lib files.
</summary>
@@ -94252,7 +76456,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="certmonger_manage_lib_files" lineno="125">
+<interface name="certmonger_manage_lib_files" lineno="111">
<summary>
Create, read, write, and delete
certmonger lib files.
@@ -94263,7 +76467,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="certmonger_admin" lineno="151">
+<interface name="certmonger_admin" lineno="137">
<summary>
All of the rules required to
administrate an certmonger environment.
@@ -94651,18 +76855,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_manage_pid_content" lineno="101">
-<summary>
-Create, read, write, and delete
-clamav pid content. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="clamav_read_config" lineno="115">
+<interface name="clamav_read_config" lineno="100">
<summary>
Read clamav configuration files.
</summary>
@@ -94672,7 +76865,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_search_lib" lineno="134">
+<interface name="clamav_search_lib" lineno="119">
<summary>
Search clamav library directories.
</summary>
@@ -94682,7 +76875,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_domtrans_clamscan" lineno="153">
+<interface name="clamav_domtrans_clamscan" lineno="138">
<summary>
Execute a domain transition to run clamscan.
</summary>
@@ -94692,7 +76885,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="clamav_exec_clamscan" lineno="172">
+<interface name="clamav_exec_clamscan" lineno="157">
<summary>
Execute clamscan in the caller domain.
</summary>
@@ -94702,7 +76895,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_read_state_clamd" lineno="191">
+<interface name="clamav_read_state_clamd" lineno="176">
<summary>
Read clamd process state files.
</summary>
@@ -94712,7 +76905,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_read_signatures" lineno="219">
+<interface name="clamav_read_signatures" lineno="204">
<summary>
Read clam virus signature files
</summary>
@@ -94729,7 +76922,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_scannable_files" lineno="240">
+<interface name="clamav_scannable_files" lineno="225">
<summary>
Denote a particular type to be scanned by ClamAV
</summary>
@@ -94739,7 +76932,7 @@ Type that clamd_t and clamscan_t can read.
</summary>
</param>
</interface>
-<interface name="clamav_domtrans_freshclam" lineno="258">
+<interface name="clamav_domtrans_freshclam" lineno="243">
<summary>
Execute a domain transition to run freshclam.
</summary>
@@ -94749,7 +76942,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="clamav_run_freshclam" lineno="284">
+<interface name="clamav_run_freshclam" lineno="269">
<summary>
Execute freshclam in the freshclam domain, and
allow the specified role the freshclam domain.
@@ -94766,7 +76959,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="clamav_exec_freshclam" lineno="303">
+<interface name="clamav_exec_freshclam" lineno="288">
<summary>
Execute freshclam in the caller domain.
</summary>
@@ -94776,7 +76969,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_enabledisable_clamd" lineno="322">
+<interface name="clamav_enabledisable_clamd" lineno="307">
<summary>
Allow specified domain to enable clamd units
</summary>
@@ -94786,7 +76979,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_startstop_clamd" lineno="341">
+<interface name="clamav_startstop_clamd" lineno="326">
<summary>
Allow specified domain to start clamd units
</summary>
@@ -94796,7 +76989,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_status_clamd" lineno="360">
+<interface name="clamav_status_clamd" lineno="345">
<summary>
Allow specified domain to get status of clamd
</summary>
@@ -94806,7 +76999,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_reload_clamd" lineno="379">
+<interface name="clamav_reload_clamd" lineno="364">
<summary>
Allow specified domain reload of clamd
</summary>
@@ -94816,7 +77009,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_admin" lineno="405">
+<interface name="clamav_admin" lineno="390">
<summary>
All of the rules required to
administrate an clamav environment.
@@ -94833,7 +77026,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="clamav_filetrans_log" lineno="444">
+<interface name="clamav_filetrans_log" lineno="429">
<summary>
specified domain creates /var/log/clamav/freshclam.log with correct type
</summary>
@@ -94843,7 +77036,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_filetrans_runtime_dir" lineno="462">
+<interface name="clamav_filetrans_runtime_dir" lineno="447">
<summary>
specified domain creates /run/clamav with correct type
</summary>
@@ -95162,19 +77355,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="consolesetup_pid_filetrans_runtime" lineno="98">
-<summary>
-Create a console-setup directory in
-the runtime directory. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="consolesetup_runtime_filetrans_runtime_dir" lineno="115">
+<interface name="consolesetup_runtime_filetrans_runtime_dir" lineno="98">
<summary>
Create a console-setup directory in
the runtime directory.
@@ -95432,7 +77613,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_engine_tmp_files" lineno="474">
+<interface name="container_search_engine_tmp" lineno="474">
+<summary>
+Allow the specified domain to search
+container engine temporary directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_engine_tmp_files" lineno="494">
<summary>
Allow the specified domain to manage
container engine temporary files.
@@ -95443,7 +77635,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_engine_tmp_sock_files" lineno="494">
+<interface name="container_manage_engine_tmp_sock_files" lineno="514">
<summary>
Allow the specified domain to manage
container engine temporary named sockets.
@@ -95454,7 +77646,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_engine_tmp_filetrans" lineno="526">
+<interface name="container_engine_tmp_filetrans" lineno="546">
<summary>
Allow the specified domain to create
objects in generic temporary directories
@@ -95477,7 +77669,18 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="container_read_system_container_state" lineno="545">
+<interface name="container_read_all_container_state" lineno="565">
+<summary>
+Read the process state (/proc/pid)
+of all containers.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_read_system_container_state" lineno="584">
<summary>
Read the process state (/proc/pid)
of all system containers.
@@ -95488,7 +77691,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_read_user_container_state" lineno="564">
+<interface name="container_read_user_container_state" lineno="603">
<summary>
Read the process state (/proc/pid)
of all user containers.
@@ -95499,7 +77702,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_all_containers" lineno="584">
+<interface name="container_read_all_container_engine_state" lineno="622">
+<summary>
+Read the process state (/proc/pid)
+of all container engines.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_all_containers" lineno="642">
<summary>
All of the permissions necessary
for a container engine to manage
@@ -95511,7 +77725,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_domtrans" lineno="604">
+<interface name="container_domtrans" lineno="662">
<summary>
Allow the specified domain to
perform a type transition to
@@ -95523,7 +77737,18 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="container_stream_connect_system_containers" lineno="623">
+<interface name="container_stream_connect_system_engine" lineno="681">
+<summary>
+Connect to a system container engine
+domain over a unix stream socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_stream_connect_system_containers" lineno="703">
<summary>
Connect to a system container domain
over a unix stream socket.
@@ -95534,7 +77759,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_stream_connect_user_containers" lineno="645">
+<interface name="container_stream_connect_user_containers" lineno="725">
<summary>
Connect to a user container domain
over a unix stream socket.
@@ -95545,7 +77770,29 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_stream_connect_all_containers" lineno="667">
+<interface name="container_stream_connect_spc" lineno="747">
+<summary>
+Connect to super privileged containers
+over a unix stream socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_rw_spc_tcp_sockets" lineno="769">
+<summary>
+Read and write super privileged
+container TCP sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_stream_connect_all_containers" lineno="788">
<summary>
Connect to a container domain
over a unix stream socket.
@@ -95556,7 +77803,29 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_signal_all_containers" lineno="690">
+<interface name="container_stream_connect_spec_container" lineno="810">
+<summary>
+Connect to the specified container
+domain over a unix stream socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_kill_all_containers" lineno="831">
+<summary>
+Allow the specified domain to
+send a kill signal to all containers.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="container_signal_all_containers" lineno="851">
<summary>
Allow the specified domain to
send all signals to a container
@@ -95568,7 +77837,58 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="container_setattr_container_ptys" lineno="708">
+<interface name="container_dev_filetrans" lineno="880">
+<summary>
+Create objects in /dev with an automatic
+transition to the container device type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="container_rw_device_files" lineno="898">
+<summary>
+Read and write container device files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_device_files" lineno="916">
+<summary>
+Manage container device files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_mounton_all_devices" lineno="934">
+<summary>
+Mount on all container devices.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_setattr_container_ptys" lineno="952">
<summary>
Set the attributes of container ptys.
</summary>
@@ -95578,7 +77898,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_use_container_ptys" lineno="726">
+<interface name="container_use_container_ptys" lineno="970">
<summary>
Read and write container ptys.
</summary>
@@ -95588,7 +77908,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_mountpoint" lineno="745">
+<interface name="container_mountpoint" lineno="989">
<summary>
Make the specified type usable as a mountpoint
for containers.
@@ -95599,10 +77919,34 @@ Type to be used as a mountpoint.
</summary>
</param>
</interface>
-<interface name="container_create_config_files" lineno="764">
+<interface name="container_list_plugin_dirs" lineno="1009">
<summary>
Allow the specified domain to
-create container config files.
+list the contents of container
+plugin directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_watch_plugin_dirs" lineno="1029">
+<summary>
+Allow the specified domain to
+add a watch on container plugin
+directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_plugin_files" lineno="1048">
+<summary>
+Allow the specified domain to
+manage container plugin files.
</summary>
<param name="domain">
<summary>
@@ -95610,10 +77954,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_write_config_files" lineno="783">
+<interface name="container_exec_plugins" lineno="1067">
<summary>
Allow the specified domain to
-write container config files.
+execute container plugins.
</summary>
<param name="domain">
<summary>
@@ -95621,7 +77965,51 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_config_files" lineno="802">
+<interface name="container_read_config" lineno="1087">
+<summary>
+Allow the specified domain to
+read container config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_watch_config_dirs" lineno="1107">
+<summary>
+Allow the specified domain to
+watch container config directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_create_config_files" lineno="1126">
+<summary>
+Allow the specified domain to
+create container config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_rw_config_files" lineno="1145">
+<summary>
+Allow the specified domain to read
+and write container config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_config_files" lineno="1164">
<summary>
Allow the specified domain to
manage container config files.
@@ -95632,7 +78020,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_file_root_filetrans" lineno="823">
+<interface name="container_file_root_filetrans" lineno="1185">
<summary>
Allow the specified domain to
create container files in the
@@ -95645,7 +78033,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_dirs" lineno="842">
+<interface name="container_manage_dirs" lineno="1204">
<summary>
Allow the specified domain to
manage container file directories.
@@ -95656,7 +78044,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_files" lineno="861">
+<interface name="container_watch_dirs" lineno="1223">
+<summary>
+Allow the specified domain to
+watch container file directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_files" lineno="1242">
<summary>
Allow the specified domain to
manage container files.
@@ -95667,7 +78066,29 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_lnk_files" lineno="880">
+<interface name="container_dontaudit_relabel_dirs" lineno="1261">
+<summary>
+Do not audit attempts to relabel
+container file directories.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="container_dontaudit_relabel_files" lineno="1280">
+<summary>
+Do not audit attempts to relabel
+container files.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_lnk_files" lineno="1299">
<summary>
Allow the specified domain to
manage container lnk files.
@@ -95678,7 +78099,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_fifo_files" lineno="899">
+<interface name="container_rw_fifo_files" lineno="1318">
+<summary>
+Allow the specified domain to
+read and write container fifo files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_fifo_files" lineno="1337">
<summary>
Allow the specified domain to
manage container fifo files.
@@ -95689,7 +78121,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_sock_files" lineno="918">
+<interface name="container_manage_sock_files" lineno="1356">
<summary>
Allow the specified domain to
manage container sock files.
@@ -95700,7 +78132,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_rw_chr_files" lineno="937">
+<interface name="container_rw_chr_files" lineno="1375">
<summary>
Allow the specified domain to read
and write container chr files.
@@ -95711,7 +78143,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_dontaudit_rw_chr_files" lineno="956">
+<interface name="container_dontaudit_rw_chr_files" lineno="1394">
<summary>
Do not audit attempts to read
and write container chr files.
@@ -95722,7 +78154,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_chr_files" lineno="975">
+<interface name="container_manage_chr_files" lineno="1413">
<summary>
Allow the specified domain to
manage container chr files.
@@ -95733,7 +78165,47 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_home_config" lineno="994">
+<interface name="container_spec_filetrans_file" lineno="1449">
+<summary>
+Allow the specified domain to create
+objects in specified directories with
+an automatic type transition to the
+container file type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="domain">
+<summary>
+Directory to transition on.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="container_list_ro_dirs" lineno="1469">
+<summary>
+Allow the specified domain to list
+the contents of read-only container
+file directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_home_config" lineno="1488">
<summary>
Allow the specified domain to
manage container config home content.
@@ -95744,7 +78216,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_config_home_filetrans" lineno="1026">
+<interface name="container_config_home_filetrans" lineno="1520">
<summary>
Allow the specified domain to create
objects in an xdg_config directory
@@ -95767,7 +78239,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="container_manage_home_data_files" lineno="1046">
+<interface name="container_manage_home_data_files" lineno="1540">
<summary>
Allow the specified domain to
manage container data home files.
@@ -95778,7 +78250,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_home_data_fifo_files" lineno="1066">
+<interface name="container_manage_home_data_fifo_files" lineno="1560">
<summary>
Allow the specified domain to
manage container data home named
@@ -95790,7 +78262,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_home_data_sock_files" lineno="1086">
+<interface name="container_manage_home_data_sock_files" lineno="1580">
<summary>
Allow the specified domain to
manage container data home named
@@ -95802,7 +78274,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_admin_all_files" lineno="1104">
+<interface name="container_admin_all_files" lineno="1598">
<summary>
Administrate all container files.
</summary>
@@ -95812,7 +78284,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_admin_all_ro_files" lineno="1124">
+<interface name="container_admin_all_ro_files" lineno="1618">
<summary>
Administrate all container read-only files.
</summary>
@@ -95822,7 +78294,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_admin_all_user_runtime_content" lineno="1146">
+<interface name="container_admin_all_user_runtime_content" lineno="1640">
<summary>
All of the rules necessary for a user
to manage user container runtime data
@@ -95834,7 +78306,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_all_home_content" lineno="1166">
+<interface name="container_manage_all_home_content" lineno="1660">
<summary>
All of the rules necessary for a user
to manage container data in their home
@@ -95846,7 +78318,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_relabel_all_content" lineno="1210">
+<interface name="container_relabel_all_content" lineno="1704">
<summary>
Allow the specified domain to
relabel container files and
@@ -95858,7 +78330,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_remount_fs" lineno="1229">
+<interface name="container_remount_fs" lineno="1723">
<summary>
Allow the specified domain to
remount container filesystems.
@@ -95869,7 +78341,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_relabel_fs" lineno="1248">
+<interface name="container_relabel_fs" lineno="1742">
<summary>
Allow the specified domain to
relabel container filesystems.
@@ -95880,7 +78352,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_getattr_fs" lineno="1268">
+<interface name="container_getattr_fs" lineno="1762">
<summary>
Allow the specified domain to
get the attributes of container
@@ -95892,7 +78364,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_search_runtime" lineno="1287">
+<interface name="container_search_runtime" lineno="1781">
<summary>
Allow the specified domain to search
runtime container directories.
@@ -95903,7 +78375,30 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_runtime_files" lineno="1307">
+<interface name="container_read_runtime_files" lineno="1801">
+<summary>
+Allow the specified domain to read
+runtime container files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_getattr_runtime_sock_files" lineno="1822">
+<summary>
+Allow the specified domain to get
+the attributes runtime container of
+container runtime named sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_runtime_files" lineno="1841">
<summary>
Allow the specified domain to manage
runtime container files.
@@ -95914,7 +78409,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_runtime_fifo_files" lineno="1326">
+<interface name="container_manage_runtime_fifo_files" lineno="1860">
<summary>
Allow the specified domain to manage
runtime container named pipes.
@@ -95925,7 +78420,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_runtime_sock_files" lineno="1345">
+<interface name="container_manage_runtime_lnk_files" lineno="1879">
+<summary>
+Allow the specified domain to manage
+runtime container symlinks.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_runtime_sock_files" lineno="1898">
<summary>
Allow the specified domain to manage
runtime container named sockets.
@@ -95936,7 +78442,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_user_runtime_files" lineno="1364">
+<interface name="container_manage_user_runtime_files" lineno="1917">
<summary>
Allow the specified domain to manage
user runtime container files.
@@ -95947,7 +78453,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_rw_user_runtime_sock_files" lineno="1383">
+<interface name="container_rw_user_runtime_sock_files" lineno="1936">
<summary>
Allow the specified domain to read and
write user runtime container named sockets.
@@ -95958,7 +78464,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_search_var_lib" lineno="1402">
+<interface name="container_search_var_lib" lineno="1955">
<summary>
Allow the specified domain to search
container directories in /var/lib.
@@ -95969,7 +78475,41 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_var_lib_files" lineno="1422">
+<interface name="container_list_var_lib" lineno="1976">
+<summary>
+Allow the specified domain to list
+the contents of container directories
+in /var/lib.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_var_lib_dirs" lineno="1996">
+<summary>
+Allow the specified domain to manage
+container file directories in /var/lib.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_read_var_lib_files" lineno="2015">
+<summary>
+Allow the specified domain to read
+container files in /var/lib.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_var_lib_files" lineno="2034">
<summary>
Allow the specified domain to manage
container files in /var/lib.
@@ -95980,7 +78520,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_var_lib_fifo_files" lineno="1441">
+<interface name="container_map_var_lib_files" lineno="2053">
+<summary>
+Allow the specified domain to memory
+map container files in /var/lib.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_var_lib_fifo_files" lineno="2072">
<summary>
Allow the specified domain to manage
container named pipes in /var/lib.
@@ -95991,7 +78542,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_manage_var_lib_sock_files" lineno="1460">
+<interface name="container_manage_var_lib_lnk_files" lineno="2091">
+<summary>
+Allow the specified domain to manage
+container symlinks in /var/lib.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_var_lib_sock_files" lineno="2110">
<summary>
Allow the specified domain to manage
container named sockets in /var/lib.
@@ -96002,7 +78564,74 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_unlabeled_var_lib_filetrans" lineno="1491">
+<interface name="container_var_lib_filetrans" lineno="2140">
+<summary>
+Allow the specified domain to create
+objects in /var/lib with an automatic
+transition to the container var lib type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="container_var_lib_filetrans_file" lineno="2170">
+<summary>
+Allow the specified domain to create
+objects in /var/lib with an automatic
+transition to the container file type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="container_filetrans_var_lib_file" lineno="2201">
+<summary>
+Allow the specified domain to create
+objects in container /var/lib directories
+with an automatic transition to the
+container file type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="container_unlabeled_var_lib_filetrans" lineno="2233">
<summary>
Allow the specified domain to create
objects in unlabeled directories with
@@ -96025,7 +78654,140 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="container_start_units" lineno="1512">
+<interface name="container_search_logs" lineno="2254">
+<summary>
+Allow the specified domain to search
+container log file directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_list_log_dirs" lineno="2274">
+<summary>
+Allow the specified domain to list
+the contents of container log directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_create_log_dirs" lineno="2293">
+<summary>
+Allow the specified domain to create
+container log file directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_log_dirs" lineno="2312">
+<summary>
+Allow the specified domain to manage
+container log file directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_watch_log_dirs" lineno="2331">
+<summary>
+Allow the specified domain to watch
+container log file directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_create_log_files" lineno="2350">
+<summary>
+Allow the specified domain to create
+container log files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_append_log_files" lineno="2369">
+<summary>
+Allow the specified domain to append
+data to container log files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_log_files" lineno="2388">
+<summary>
+Allow the specified domain to manage
+container log files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_watch_log_files" lineno="2407">
+<summary>
+Allow the specified domain to watch
+container log files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_log_filetrans" lineno="2438">
+<summary>
+Allow the specified domain to create
+objects in log directories with an
+automatic transition to the container
+log type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="container_manage_log_symlinks" lineno="2458">
+<summary>
+Allow the specified domain to manage
+container log symlinks.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="container_start_units" lineno="2477">
<summary>
Allow the specified domain to start
systemd units for containers.
@@ -96036,7 +78798,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="container_admin" lineno="1539">
+<interface name="container_admin" lineno="2504">
<summary>
All of the rules required to
administrate a container
@@ -96084,6 +78846,27 @@ Allow containers to read all public content.
</p>
</desc>
</tunable>
+<tunable name="container_spc_create_nfs_servers" dftval="false">
+<desc>
+<p>
+Allow super privileged containers to create NFS servers.
+</p>
+</desc>
+</tunable>
+<tunable name="container_spc_use_tun_tap_dev" dftval="false">
+<desc>
+<p>
+Allow super privileged containers to use tun-tap devices.
+</p>
+</desc>
+</tunable>
+<tunable name="container_use_dri" dftval="false">
+<desc>
+<p>
+Allow containers to use direct rendering devices.
+</p>
+</desc>
+</tunable>
<tunable name="container_use_ecryptfs" dftval="false">
<desc>
<p>
@@ -96091,6 +78874,13 @@ Allow containers to use eCryptfs filesystems.
</p>
</desc>
</tunable>
+<tunable name="container_use_hugetlbfs" dftval="false">
+<desc>
+<p>
+Allow containers to use huge pages.
+</p>
+</desc>
+</tunable>
<tunable name="container_use_nfs" dftval="false">
<desc>
<p>
@@ -96240,17 +79030,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="couchdb_read_pid_files" lineno="70">
-<summary>
-Read couchdb pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="couchdb_read_runtime_files" lineno="85">
+<interface name="couchdb_read_runtime_files" lineno="70">
<summary>
Read couchdb runtime files.
</summary>
@@ -96260,7 +79040,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="couchdb_admin" lineno="111">
+<interface name="couchdb_admin" lineno="96">
<summary>
All of the rules required to
administrate an couchdb environment.
@@ -96389,6 +79169,64 @@ Domain allowed access.
</param>
</interface>
</module>
+<module name="crio" filename="policy/modules/services/crio.if">
+<summary>policy for cri-o</summary>
+<interface name="crio_domtrans" lineno="13">
+<summary>
+Execute CRI-O in the crio domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="crio_run" lineno="39">
+<summary>
+Execute CRI-O in the crio domain,
+and allow the specified role the
+kubelet domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+The role to be allowed the crio domain.
+</summary>
+</param>
+</interface>
+<interface name="crio_read_conmon_state" lineno="60">
+<summary>
+Read the process state (/proc/pid)
+of CRI-O conmon.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="crio_admin" lineno="85">
+<summary>
+All of the rules required to administrate
+a CRI-O environment.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+</module>
<module name="cron" filename="policy/modules/services/cron.if">
<summary>Periodic execution of scheduled commands.</summary>
<template name="cron_common_crontab_template" lineno="13">
@@ -96670,18 +79508,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_manage_pid_files" lineno="674">
-<summary>
-Create, read, write, and delete
-crond pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="cron_anacron_domtrans_system_job" lineno="689">
+<interface name="cron_anacron_domtrans_system_job" lineno="674">
<summary>
Execute anacron in the cron
system domain.
@@ -96692,7 +79519,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="cron_use_system_job_fds" lineno="708">
+<interface name="cron_use_system_job_fds" lineno="693">
<summary>
Use system cron job file descriptors.
</summary>
@@ -96702,7 +79529,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_manage_system_spool" lineno="726">
+<interface name="cron_manage_system_spool" lineno="711">
<summary>
Create, read, write, and delete the system spool.
</summary>
@@ -96712,7 +79539,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_read_system_spool" lineno="745">
+<interface name="cron_read_system_spool" lineno="730">
<summary>
Read the system spool.
</summary>
@@ -96722,7 +79549,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_rw_tmp_files" lineno="765">
+<interface name="cron_rw_tmp_files" lineno="750">
<summary>
Read and write crond temporary files.
</summary>
@@ -96732,7 +79559,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_read_system_job_lib_files" lineno="783">
+<interface name="cron_read_system_job_lib_files" lineno="768">
<summary>
Read system cron job lib files.
</summary>
@@ -96742,7 +79569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_manage_system_job_lib_files" lineno="803">
+<interface name="cron_manage_system_job_lib_files" lineno="788">
<summary>
Create, read, write, and delete
system cron job lib files.
@@ -96753,7 +79580,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_write_system_job_pipes" lineno="822">
+<interface name="cron_write_system_job_pipes" lineno="807">
<summary>
Write system cron job unnamed pipes.
</summary>
@@ -96763,7 +79590,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_rw_system_job_pipes" lineno="841">
+<interface name="cron_rw_system_job_pipes" lineno="826">
<summary>
Read and write system cron job
unnamed pipes.
@@ -96774,7 +79601,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_rw_system_job_stream_sockets" lineno="860">
+<interface name="cron_rw_system_job_stream_sockets" lineno="845">
<summary>
Read and write inherited system cron
job unix domain stream sockets.
@@ -96785,7 +79612,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_read_system_job_tmp_files" lineno="878">
+<interface name="cron_read_system_job_tmp_files" lineno="863">
<summary>
Read system cron job temporary files.
</summary>
@@ -96795,7 +79622,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="898">
+<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="883">
<summary>
Do not audit attempts to append temporary
system cron job files.
@@ -96806,7 +79633,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="cron_rw_inherited_system_job_tmp_files" lineno="916">
+<interface name="cron_rw_inherited_system_job_tmp_files" lineno="901">
<summary>
Read and write to inherited system cron job temporary files.
</summary>
@@ -96816,7 +79643,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="935">
+<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="920">
<summary>
Do not audit attempts to write temporary
system cron job files.
@@ -96827,7 +79654,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="cron_exec_crontab" lineno="954">
+<interface name="cron_exec_crontab" lineno="939">
<summary>
Execute crontab in the caller domain.
</summary>
@@ -96838,7 +79665,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="cron_admin" lineno="980">
+<interface name="cron_admin" lineno="965">
<summary>
All of the rules required to
administrate a cron environment.
@@ -97002,17 +79829,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cups_read_pid_files" lineno="107">
-<summary>
-Read cups PID files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="cups_read_runtime_files" lineno="122">
+<interface name="cups_read_runtime_files" lineno="107">
<summary>
Read cups runtime files.
</summary>
@@ -97022,7 +79839,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cups_domtrans_config" lineno="142">
+<interface name="cups_domtrans_config" lineno="127">
<summary>
Execute cups_config in the
cups config domain.
@@ -97033,7 +79850,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="cups_signal_config" lineno="162">
+<interface name="cups_signal_config" lineno="147">
<summary>
Send generic signals to the cups
configuration daemon.
@@ -97044,7 +79861,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cups_dbus_chat_config" lineno="181">
+<interface name="cups_dbus_chat_config" lineno="166">
<summary>
Send and receive messages from
cupsd_config over dbus.
@@ -97055,7 +79872,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cups_read_config" lineno="202">
+<interface name="cups_read_config" lineno="187">
<summary>
Read cups configuration files.
</summary>
@@ -97066,7 +79883,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="cups_read_rw_config" lineno="222">
+<interface name="cups_read_rw_config" lineno="207">
<summary>
Read cups-writable configuration files.
</summary>
@@ -97077,7 +79894,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="cups_read_log" lineno="242">
+<interface name="cups_read_log" lineno="227">
<summary>
Read cups log files.
</summary>
@@ -97088,7 +79905,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="cups_append_log" lineno="261">
+<interface name="cups_append_log" lineno="246">
<summary>
Append cups log files.
</summary>
@@ -97098,7 +79915,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cups_write_log" lineno="280">
+<interface name="cups_write_log" lineno="265">
<summary>
Write cups log files.
</summary>
@@ -97108,7 +79925,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cups_stream_connect_ptal" lineno="300">
+<interface name="cups_stream_connect_ptal" lineno="285">
<summary>
Connect to ptal over an unix
domain stream socket.
@@ -97119,7 +79936,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cups_read_state" lineno="319">
+<interface name="cups_read_state" lineno="304">
<summary>
Read the process state (/proc/pid) of cupsd.
</summary>
@@ -97129,7 +79946,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cups_domtrans_hplip" lineno="341">
+<interface name="cups_domtrans_hplip" lineno="326">
<summary>
Execute HP Linux Imaging and
Printing applications in their
@@ -97141,7 +79958,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="cups_admin" lineno="367">
+<interface name="cups_admin" lineno="352">
<summary>
All of the rules required to
administrate an cups environment.
@@ -97671,7 +80488,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_unconfined" lineno="733">
+<interface name="dbus_dontaudit_write_system_bus_runtime_named_sockets" lineno="734">
+<summary>
+Do not audit attempts to write to
+system bus runtime named sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="dbus_unconfined" lineno="752">
<summary>
Unconfined access to DBUS.
</summary>
@@ -97681,7 +80509,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="763">
+<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="782">
<summary>
Create resources in /run or /var/run with the system_dbusd_runtime_t
label. This method is deprecated in favor of the init_daemon_run_dir
@@ -97703,7 +80531,7 @@ Optional file name used for the resource
</summary>
</param>
</interface>
-<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="777">
+<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="796">
<summary>
Create directories with the system_dbusd_runtime_t label
</summary>
@@ -97896,28 +80724,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="devicekit_read_pid_files" lineno="212">
-<summary>
-Read devicekit PID files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="devicekit_manage_pid_files" lineno="228">
-<summary>
-Create, read, write, and delete
-devicekit PID files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="devicekit_read_runtime_files" lineno="243">
+<interface name="devicekit_read_runtime_files" lineno="212">
<summary>
Read devicekit runtime files.
</summary>
@@ -97927,7 +80734,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="devicekit_manage_runtime_files" lineno="263">
+<interface name="devicekit_manage_runtime_files" lineno="232">
<summary>
Create, read, write, and delete
devicekit runtime files.
@@ -97938,7 +80745,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="devicekit_admin" lineno="289">
+<interface name="devicekit_admin" lineno="258">
<summary>
All of the rules required to
administrate an devicekit environment.
@@ -98267,75 +81074,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dnsmasq_delete_pid_files" lineno="149">
-<summary>
-Delete dnsmasq pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dnsmasq_manage_pid_files" lineno="165">
-<summary>
-Create, read, write, and delete
-dnsmasq pid files (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dnsmasq_read_pid_files" lineno="181">
-<summary>
-Read dnsmasq pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dnsmasq_create_pid_dirs" lineno="196">
-<summary>
-Create dnsmasq pid directories. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dnsmasq_spec_filetrans_pid" lineno="228">
-<summary>
-Create specified objects in specified
-directories with a type transition to
-the dnsmasq pid file type. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="file_type">
-<summary>
-Directory to transition on.
-</summary>
-</param>
-<param name="object">
-<summary>
-The object class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="dnsmasq_create_runtime_dirs" lineno="243">
+<interface name="dnsmasq_create_runtime_dirs" lineno="148">
<summary>
Create dnsmasq runtime directories.
</summary>
@@ -98345,7 +81084,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dnsmasq_virt_runtime_filetrans_runtime" lineno="274">
+<interface name="dnsmasq_virt_runtime_filetrans_runtime" lineno="179">
<summary>
Create specified objects in specified
directories with a type transition to
@@ -98367,7 +81106,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dnsmasq_read_runtime_files" lineno="293">
+<interface name="dnsmasq_read_runtime_files" lineno="198">
<summary>
Read dnsmasq runtime files.
</summary>
@@ -98377,7 +81116,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dnsmasq_delete_runtime_files" lineno="312">
+<interface name="dnsmasq_delete_runtime_files" lineno="217">
<summary>
Delete dnsmasq runtime files.
</summary>
@@ -98387,7 +81126,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dnsmasq_manage_runtime_files" lineno="331">
+<interface name="dnsmasq_manage_runtime_files" lineno="236">
<summary>
Create, read, write, and delete
dnsmasq runtime files
@@ -98398,7 +81137,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dnsmasq_admin" lineno="357">
+<interface name="dnsmasq_admin" lineno="262">
<summary>
All of the rules required to
administrate an dnsmasq environment.
@@ -98783,17 +81522,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="exim_read_pid_files" lineno="116">
-<summary>
-Read exim pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="exim_read_log" lineno="131">
+<interface name="exim_read_log" lineno="117">
<summary>
Read exim log files.
</summary>
@@ -98804,7 +81533,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="exim_append_log" lineno="150">
+<interface name="exim_append_log" lineno="136">
<summary>
Append exim log files.
</summary>
@@ -98814,7 +81543,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="exim_manage_log" lineno="171">
+<interface name="exim_manage_log" lineno="157">
<summary>
Create, read, write, and delete
exim log files.
@@ -98826,7 +81555,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="exim_manage_spool_dirs" lineno="191">
+<interface name="exim_manage_spool_dirs" lineno="177">
<summary>
Create, read, write, and delete
exim spool directories.
@@ -98837,7 +81566,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="exim_read_spool_files" lineno="210">
+<interface name="exim_read_spool_files" lineno="196">
<summary>
Read exim spool files.
</summary>
@@ -98847,7 +81576,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="exim_manage_spool_files" lineno="231">
+<interface name="exim_manage_spool_files" lineno="217">
<summary>
Create, read, write, and delete
exim spool files.
@@ -98858,7 +81587,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="exim_read_var_lib_files" lineno="250">
+<interface name="exim_read_var_lib_files" lineno="236">
<summary>
Read exim var lib files.
</summary>
@@ -98868,7 +81597,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="exim_manage_var_lib_files" lineno="269">
+<interface name="exim_manage_var_lib_files" lineno="255">
<summary>
Create, read, and write exim var lib files.
</summary>
@@ -98878,7 +81607,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="exim_admin" lineno="295">
+<interface name="exim_admin" lineno="281">
<summary>
All of the rules required to
administrate an exim environment.
@@ -99047,17 +81776,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fail2ban_read_pid_files" lineno="233">
-<summary>
-Read fail2ban pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="fail2ban_admin" lineno="254">
+<interface name="fail2ban_admin" lineno="240">
<summary>
All of the rules required to
administrate an fail2ban environment.
@@ -99743,35 +82462,44 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="glance_read_pid_files" lineno="192">
+<interface name="glance_admin" lineno="199">
<summary>
-Read glance pid files. (Deprecated)
+All of the rules required to
+administrate an glance environment.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
</interface>
-<interface name="glance_manage_pid_files" lineno="207">
+</module>
+<module name="glusterfs" filename="policy/modules/services/glusterfs.if">
+<summary>Cluster File System binary, daemon and command line.</summary>
+<interface name="glusterfs_domtrans_daemon" lineno="13">
<summary>
-Create, read, write, and delete
-glance pid files. (Deprecated)
+Execute glusterd in the glusterd domain.
</summary>
<param name="domain">
<summary>
-Domain allowed access.
+Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="glance_admin" lineno="228">
+<interface name="glusterfs_run_daemon" lineno="39">
<summary>
-All of the rules required to
-administrate an glance environment.
+Execute glusterd in the glusterd domain, and
+allow the specified role the glusterd domain.
</summary>
<param name="domain">
<summary>
-Domain allowed access.
+Domain allowed to transition.
</summary>
</param>
<param name="role">
@@ -99781,10 +82509,38 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-</module>
-<module name="glusterfs" filename="policy/modules/services/glusterfs.if">
-<summary>Cluster File System binary, daemon and command line.</summary>
-<interface name="glusterfs_admin" lineno="20">
+<interface name="glusterfs_stream_connect_daemon" lineno="58">
+<summary>
+Connect to glusterd over a unix stream socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="glusterfs_use_daemon_fds" lineno="79">
+<summary>
+Inherit and use glusterd file descriptors.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="glusterfs_search_bricks" lineno="98">
+<summary>
+Search through the contents of gluster brick
+directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="glusterfs_admin" lineno="123">
<summary>
All of the rules required to
administrate an glusterfs environment.
@@ -99801,6 +82557,16 @@ Role allowed access.
</param>
<rolecap/>
</interface>
+<tunable name="glusterfs_modify_policy" dftval="false">
+<desc>
+<p>
+Allow the gluster daemon to automatically
+add and remove file contexts from the local
+SELinux policy when adding and removing
+bricks.
+</p>
+</desc>
+</tunable>
</module>
<module name="gnomeclock" filename="policy/modules/services/gnomeclock.if">
<summary>Gnome clock handler for setting the time.</summary>
@@ -100029,17 +82795,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="gssproxy_read_pid_files" lineno="108">
-<summary>
-Read gssproxy PID files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="gssproxy_stream_connect" lineno="123">
+<interface name="gssproxy_stream_connect" lineno="109">
<summary>
Connect to gssproxy over an unix
domain stream socket.
@@ -100050,7 +82806,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="gssproxy_admin" lineno="145">
+<interface name="gssproxy_admin" lineno="131">
<summary>
All of the rules required to administrate
an gssproxy environment
@@ -100286,7 +83042,24 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="hddtemp_exec" lineno="32">
+<interface name="hddtemp_run" lineno="39">
+<summary>
+Execute hddtemp in the hddtemp domain, and
+allow the specified role the hdd domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="hddtemp_exec" lineno="59">
<summary>
Execute hddtemp in the caller domain.
</summary>
@@ -100296,7 +83069,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="hddtemp_admin" lineno="58">
+<interface name="hddtemp_admin" lineno="85">
<summary>
All of the rules required to
administrate an hddtemp environment.
@@ -100396,17 +83169,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="icecast_read_pid_files" lineno="68">
-<summary>
-Read icecast pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="icecast_manage_pid_files" lineno="83">
+<interface name="icecast_manage_pid_files" lineno="69">
<summary>
Create, read, write, and delete
icecast pid files.
@@ -100417,7 +83180,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="icecast_read_log" lineno="103">
+<interface name="icecast_read_log" lineno="89">
<summary>
Read icecast log files.
</summary>
@@ -100428,7 +83191,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="icecast_append_log" lineno="122">
+<interface name="icecast_append_log" lineno="108">
<summary>
Append icecast log files.
</summary>
@@ -100438,7 +83201,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="icecast_manage_log" lineno="142">
+<interface name="icecast_manage_log" lineno="128">
<summary>
Create, read, write, and delete
icecast log files.
@@ -100449,7 +83212,7 @@ Domain allow access.
</summary>
</param>
</interface>
-<interface name="icecast_admin" lineno="168">
+<interface name="icecast_admin" lineno="154">
<summary>
All of the rules required to
administrate an icecast environment.
@@ -100518,17 +83281,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ifplugd_read_pid_files" lineno="90">
-<summary>
-Read ifplugd pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="ifplugd_admin" lineno="111">
+<interface name="ifplugd_admin" lineno="97">
<summary>
All of the rules required to
administrate an ifplugd environment.
@@ -100703,18 +83456,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="inn_manage_pid" lineno="100">
-<summary>
-Create, read, write, and delete
-innd pid content. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="inn_manage_runtime_dirs" lineno="118">
+<interface name="inn_manage_runtime_dirs" lineno="100">
<summary>
Create, read, write, and delete
innd runtime dirs.
@@ -100725,7 +83467,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="inn_manage_runtime_files" lineno="138">
+<interface name="inn_manage_runtime_files" lineno="120">
<summary>
Create, read, write, and delete
innd runtime files.
@@ -100736,7 +83478,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="inn_manage_runtime_sockets" lineno="158">
+<interface name="inn_manage_runtime_sockets" lineno="140">
<summary>
Create, read, write, and delete
innd runtime named sockets.
@@ -100747,7 +83489,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="inn_read_config" lineno="178">
+<interface name="inn_read_config" lineno="160">
<summary>
Read innd configuration content.
</summary>
@@ -100757,7 +83499,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="inn_read_news_lib" lineno="198">
+<interface name="inn_read_news_lib" lineno="180">
<summary>
Read innd news library content.
</summary>
@@ -100767,7 +83509,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="inn_read_news_spool" lineno="217">
+<interface name="inn_read_news_spool" lineno="199">
<summary>
Read innd news spool content.
</summary>
@@ -100777,7 +83519,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="inn_dgram_send" lineno="237">
+<interface name="inn_dgram_send" lineno="219">
<summary>
Send to a innd unix dgram socket.
</summary>
@@ -100787,7 +83529,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="inn_domtrans" lineno="256">
+<interface name="inn_domtrans" lineno="238">
<summary>
Execute innd in the innd domain.
</summary>
@@ -100797,7 +83539,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="inn_admin" lineno="282">
+<interface name="inn_admin" lineno="264">
<summary>
All of the rules required to
administrate an inn environment.
@@ -101360,6 +84102,480 @@ Role allowed access.
<rolecap/>
</interface>
</module>
+<module name="kubernetes" filename="policy/modules/services/kubernetes.if">
+<summary>policy for kubernetes</summary>
+<template name="kubernetes_kubectl_role" lineno="29">
+<summary>
+Role access for kubectl.
+</summary>
+<param name="role_prefix">
+<summary>
+The prefix of the user role (e.g., user
+is the prefix for user_r).
+</summary>
+</param>
+<param name="user_domain">
+<summary>
+User domain for the role.
+</summary>
+</param>
+<param name="user_exec_domain">
+<summary>
+User exec domain for execute and transition access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access
+</summary>
+</param>
+</template>
+<interface name="kubernetes_domtrans_kubelet" lineno="81">
+<summary>
+Execute kubelet in the kubelet domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_run_kubelet" lineno="107">
+<summary>
+Execute kubelet in the kubelet domain,
+and allow the specified role the
+kubelet domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+The role to be allowed the kubelet domain.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_stream_connect_kubelet" lineno="127">
+<summary>
+Connect to kubelet over a unix stream socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_read_kubelet_state" lineno="149">
+<summary>
+Read the process state (/proc/pid)
+of kubelet.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_use_kubelet_fds" lineno="168">
+<summary>
+Inherit and use file descriptors from
+kubelet.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_kubelet_kill" lineno="187">
+<summary>
+Allow kubelet to send a kill signal
+to the specified domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_domtrans_kubeadm" lineno="205">
+<summary>
+Execute kubeadm in the kubeadm domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_run_kubeadm" lineno="231">
+<summary>
+Execute kubeadm in the kubeadm domain,
+and allow the specified role the
+kubeadm domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+The role to be allowed the kubeadm domain.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_container_engine" lineno="254">
+<summary>
+Associated the specified domain to
+be a domain which is capable of
+operating as a kubernetes container
+engine.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_container" lineno="276">
+<summary>
+Associated the specified domain to
+be a domain which is capable of
+operating as a container domain
+which can be spawned by kubernetes.
+engine.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_mountpoint" lineno="295">
+<summary>
+Allow the specified file type to be
+mounted on by kubernetes.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_getpgid_containers" lineno="315">
+<summary>
+Allow the specified domain to
+get the process group ID of all
+kubernetes containers.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_run_engine_bpf" lineno="334">
+<summary>
+Run kubernetes container engine bpf
+programs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_search_config" lineno="352">
+<summary>
+Search kubernetes config directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_read_config" lineno="371">
+<summary>
+Read kubernetes config files and symlinks.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_mounton_config_dirs" lineno="391">
+<summary>
+Mount on kubernetes config directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_watch_config_dirs" lineno="410">
+<summary>
+Allow the specified domain to watch
+kubernetes config directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_manage_config_files" lineno="428">
+<summary>
+Manage kubernetes config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_mounton_config_files" lineno="446">
+<summary>
+Mount on kubernetes config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_watch_config_files" lineno="465">
+<summary>
+Allow the specified domain to watch
+kubernetes config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_search_plugin_dirs" lineno="485">
+<summary>
+Allow the specified domain to search
+through the contents of kubernetes plugin
+directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_list_plugins" lineno="506">
+<summary>
+Allow the specified domain to list
+the contents of kubernetes plugin
+directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_watch_plugin_dirs" lineno="525">
+<summary>
+Allow the specified domain to watch
+kubernetes plugin directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_manage_plugin_files" lineno="544">
+<summary>
+Allow the specified domain to manage
+kubernetes plugin files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_list_tmpfs" lineno="563">
+<summary>
+List the contents of kubernetes tmpfs
+directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_manage_tmpfs_dirs" lineno="581">
+<summary>
+Manage kubernetes tmpfs directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_watch_tmpfs_dirs" lineno="599">
+<summary>
+Watch kubernetes tmpfs directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_read_tmpfs_files" lineno="617">
+<summary>
+Read kubernetes tmpfs files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_manage_tmpfs_files" lineno="635">
+<summary>
+Manage kubernetes tmpfs files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_watch_tmpfs_files" lineno="653">
+<summary>
+Watch kubernetes tmpfs files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_read_tmpfs_symlinks" lineno="671">
+<summary>
+Read kubernetes tmpfs symlinks.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_manage_tmpfs_symlinks" lineno="689">
+<summary>
+Manage kubernetes tmpfs symlinks.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_relabelfrom_tmpfs_dirs" lineno="708">
+<summary>
+Relabel directories from the kubernetes
+tmpfs type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_relabelfrom_tmpfs_files" lineno="726">
+<summary>
+Relabel files from the kubernetes tmpfs type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_relabelfrom_tmpfs_symlinks" lineno="744">
+<summary>
+Relabel symlinks from the kubernetes tmpfs type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_get_unit_status" lineno="762">
+<summary>
+Get the status of kubernetes systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_start_unit" lineno="781">
+<summary>
+Start kubernetes systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_stop_unit" lineno="800">
+<summary>
+Stop kubernetes systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_reload_unit" lineno="819">
+<summary>
+Reload kubernetes systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kubernetes_admin" lineno="845">
+<summary>
+All of the rules required to administrate
+a kubernetes environment.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+</module>
<module name="l2tp" filename="policy/modules/services/l2tp.if">
<summary>Layer 2 Tunneling Protocol.</summary>
<interface name="l2tpd_dgram_send" lineno="14">
@@ -102043,28 +85259,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="memcached_manage_pid_files" lineno="33">
-<summary>
-Create, read, write, and delete
-memcached pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="memcached_read_pid_files" lineno="48">
-<summary>
-Read memcached pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="memcached_manage_runtime_files" lineno="63">
+<interface name="memcached_manage_runtime_files" lineno="33">
<summary>
Create, read, write, and delete
memcached runtime files.
@@ -102075,7 +85270,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="memcached_stream_connect" lineno="83">
+<interface name="memcached_stream_connect" lineno="53">
<summary>
Connect to memcached using a unix
domain stream socket.
@@ -102086,7 +85281,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="memcached_tcp_connect" lineno="102">
+<interface name="memcached_tcp_connect" lineno="72">
<summary>
Connect to memcache over the network.
</summary>
@@ -102096,7 +85291,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="memcached_admin" lineno="129">
+<interface name="memcached_admin" lineno="99">
<summary>
All of the rules required to
administrate an memcached environment.
@@ -103088,7 +86283,17 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_dontaudit_read_spool_symlinks" lineno="855">
+<interface name="mta_rw_inherited_delivery_pipes" lineno="854">
+<summary>
+read and write fifo files inherited from delivery domains
+</summary>
+<param name="domain">
+<summary>
+Domain to use fifo files
+</summary>
+</param>
+</interface>
+<interface name="mta_dontaudit_read_spool_symlinks" lineno="875">
<summary>
Do not audit attempts to read
mail spool symlinks.
@@ -103099,7 +86304,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_getattr_spool" lineno="873">
+<interface name="mta_getattr_spool" lineno="893">
<summary>
Get attributes of mail spool content.
</summary>
@@ -103109,7 +86314,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_dontaudit_getattr_spool_files" lineno="895">
+<interface name="mta_dontaudit_getattr_spool_files" lineno="915">
<summary>
Do not audit attempts to get
attributes of mail spool files.
@@ -103120,7 +86325,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_spool_filetrans" lineno="933">
+<interface name="mta_spool_filetrans" lineno="953">
<summary>
Create specified objects in the
mail spool directory with a
@@ -103147,7 +86352,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="mta_read_spool_files" lineno="952">
+<interface name="mta_read_spool_files" lineno="972">
<summary>
Read mail spool files.
</summary>
@@ -103157,7 +86362,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_rw_spool" lineno="972">
+<interface name="mta_rw_spool" lineno="992">
<summary>
Read and write mail spool files.
</summary>
@@ -103167,7 +86372,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_append_spool" lineno="993">
+<interface name="mta_append_spool" lineno="1013">
<summary>
Create, read, and write mail spool files.
</summary>
@@ -103177,7 +86382,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_delete_spool" lineno="1014">
+<interface name="mta_delete_spool" lineno="1034">
<summary>
Delete mail spool files.
</summary>
@@ -103187,7 +86392,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_manage_spool" lineno="1034">
+<interface name="mta_manage_spool" lineno="1054">
<summary>
Create, read, write, and delete
mail spool content.
@@ -103198,7 +86403,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_watch_spool" lineno="1056">
+<interface name="mta_watch_spool" lineno="1076">
<summary>
Watch mail spool content.
</summary>
@@ -103208,7 +86413,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_queue_filetrans" lineno="1091">
+<interface name="mta_queue_filetrans" lineno="1111">
<summary>
Create specified objects in the
mail queue spool directory with a
@@ -103235,7 +86440,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="mta_search_queue" lineno="1110">
+<interface name="mta_search_queue" lineno="1130">
<summary>
Search mail queue directories.
</summary>
@@ -103245,7 +86450,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_list_queue" lineno="1129">
+<interface name="mta_list_queue" lineno="1149">
<summary>
List mail queue directories.
</summary>
@@ -103255,7 +86460,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_read_queue" lineno="1148">
+<interface name="mta_read_queue" lineno="1168">
<summary>
Read mail queue files.
</summary>
@@ -103265,7 +86470,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_dontaudit_rw_queue" lineno="1168">
+<interface name="mta_dontaudit_rw_queue" lineno="1188">
<summary>
Do not audit attempts to read and
write mail queue content.
@@ -103276,7 +86481,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_manage_queue" lineno="1188">
+<interface name="mta_manage_queue" lineno="1208">
<summary>
Create, read, write, and delete
mail queue content.
@@ -103287,7 +86492,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_read_sendmail_bin" lineno="1208">
+<interface name="mta_read_sendmail_bin" lineno="1228">
<summary>
Read sendmail binary.
</summary>
@@ -103297,7 +86502,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_rw_user_mail_stream_sockets" lineno="1227">
+<interface name="mta_rw_user_mail_stream_sockets" lineno="1247">
<summary>
Read and write unix domain stream
sockets of all base mail domains.
@@ -103618,28 +86823,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="mysql_read_pid_files" lineno="399">
-<summary>
-Read mysqld pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="mysql_search_pid_files" lineno="414">
-<summary>
-Search mysqld pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-
-</interface>
-<interface name="mysql_admin" lineno="435">
+<interface name="mysql_admin" lineno="406">
<summary>
All of the rules required to
administrate an mysqld environment.
@@ -103656,7 +86840,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mysql_setattr_run_dirs" lineno="477">
+<interface name="mysql_setattr_run_dirs" lineno="448">
<summary>
Set the attributes of the MySQL run directories
</summary>
@@ -103666,7 +86850,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="mysql_create_run_dirs" lineno="495">
+<interface name="mysql_create_run_dirs" lineno="466">
<summary>
Create MySQL run directories
</summary>
@@ -103676,7 +86860,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="mysql_generic_run_filetrans_run" lineno="526">
+<interface name="mysql_generic_run_filetrans_run" lineno="497">
<summary>
Automatically use the MySQL run label for created resources in generic
run locations. This method is deprecated in favor of the
@@ -103988,17 +87172,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_read_pid_files" lineno="284">
-<summary>
-Read networkmanager pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="networkmanager_read_runtime_files" lineno="299">
+<interface name="networkmanager_read_runtime_files" lineno="284">
<summary>
Read networkmanager runtime files.
</summary>
@@ -104008,7 +87182,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_stream_connect" lineno="319">
+<interface name="networkmanager_stream_connect" lineno="304">
<summary>
Connect to networkmanager over
a unix domain stream socket.
@@ -104019,7 +87193,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_enabledisable" lineno="338">
+<interface name="networkmanager_enabledisable" lineno="323">
<summary>
Allow specified domain to enable/disable NetworkManager units
</summary>
@@ -104029,7 +87203,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_startstop" lineno="357">
+<interface name="networkmanager_startstop" lineno="342">
<summary>
Allow specified domain to start/stop NetworkManager units
</summary>
@@ -104039,7 +87213,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_status" lineno="376">
+<interface name="networkmanager_status" lineno="361">
<summary>
Allow specified domain to get status of NetworkManager
</summary>
@@ -104049,7 +87223,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_admin" lineno="402">
+<interface name="networkmanager_admin" lineno="387">
<summary>
All of the rules required to
administrate an networkmanager environment.
@@ -104066,7 +87240,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="441">
+<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="426">
<summary>
Do not audit use of wpa_cli file descriptors
</summary>
@@ -104076,7 +87250,7 @@ Domain to dontaudit access.
</summary>
</param>
</interface>
-<interface name="networkmanager_domtrans_wpa_cli" lineno="460">
+<interface name="networkmanager_domtrans_wpa_cli" lineno="445">
<summary>
Execute wpa_cli in the wpa_cli domain.
</summary>
@@ -104086,7 +87260,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="networkmanager_run_wpa_cli" lineno="486">
+<interface name="networkmanager_run_wpa_cli" lineno="471">
<summary>
Execute wpa cli in the wpa_cli domain, and
allow the specified role the wpa_cli domain.
@@ -104103,7 +87277,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="networkmanager_rw_rawip_sockets" lineno="507">
+<interface name="networkmanager_rw_rawip_sockets" lineno="492">
<summary>
Read and write networkmanager rawip sockets.
</summary>
@@ -104230,17 +87404,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_read_ypbind_pid" lineno="223">
-<summary>
-Read ypbind pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="nis_read_ypbind_runtime_files" lineno="238">
+<interface name="nis_read_ypbind_runtime_files" lineno="223">
<summary>
Read ypbind runtime files.
</summary>
@@ -104250,17 +87414,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_delete_ypbind_pid" lineno="257">
-<summary>
-Delete ypbind pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="nis_read_ypserv_config" lineno="271">
+<interface name="nis_read_ypserv_config" lineno="242">
<summary>
Read ypserv configuration files.
</summary>
@@ -104270,7 +87424,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_domtrans_ypxfr" lineno="290">
+<interface name="nis_domtrans_ypxfr" lineno="261">
<summary>
Execute ypxfr in the ypxfr domain.
</summary>
@@ -104280,7 +87434,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="nis_initrc_domtrans" lineno="311">
+<interface name="nis_initrc_domtrans" lineno="282">
<summary>
Execute nis init scripts in
the init script domain.
@@ -104291,7 +87445,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="nis_initrc_domtrans_ypbind" lineno="330">
+<interface name="nis_initrc_domtrans_ypbind" lineno="301">
<summary>
Execute ypbind init scripts in
the init script domain.
@@ -104302,7 +87456,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="nis_admin" lineno="355">
+<interface name="nis_admin" lineno="326">
<summary>
All of the rules required to
administrate an nis environment.
@@ -104408,28 +87562,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nscd_dontaudit_search_pid" lineno="186">
-<summary>
-Do not audit attempts to search
-nscd pid directories. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="nscd_read_pid" lineno="201">
-<summary>
-Read nscd pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="nscd_dontaudit_search_runtime" lineno="217">
+<interface name="nscd_dontaudit_search_runtime" lineno="186">
<summary>
Do not audit attempts to search
nscd runtime directories.
@@ -104440,7 +87573,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="nscd_read_runtime_files" lineno="235">
+<interface name="nscd_read_runtime_files" lineno="204">
<summary>
Read nscd runtime files.
</summary>
@@ -104450,7 +87583,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nscd_unconfined" lineno="254">
+<interface name="nscd_unconfined" lineno="223">
<summary>
Unconfined access to nscd services.
</summary>
@@ -104460,7 +87593,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nscd_run" lineno="279">
+<interface name="nscd_run" lineno="248">
<summary>
Execute nscd in the nscd domain, and
allow the specified role the nscd domain.
@@ -104476,7 +87609,7 @@ Role allowed access.
</summary>
</param>
</interface>
-<interface name="nscd_initrc_domtrans" lineno="299">
+<interface name="nscd_initrc_domtrans" lineno="268">
<summary>
Execute the nscd server init
script in the initrc domain.
@@ -104487,7 +87620,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="nscd_admin" lineno="324">
+<interface name="nscd_admin" lineno="293">
<summary>
All of the rules required to
administrate an nscd environment.
@@ -104555,17 +87688,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="nslcd_read_pid_files" lineno="50">
-<summary>
-Read nslcd pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="nslcd_stream_connect" lineno="65">
+<interface name="nslcd_stream_connect" lineno="51">
<summary>
Connect to nslcd over an unix
domain stream socket.
@@ -104576,7 +87699,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nslcd_admin" lineno="91">
+<interface name="nslcd_admin" lineno="77">
<summary>
All of the rules required to
administrate an nslcd environment.
@@ -105215,17 +88338,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="openct_read_pid_files" lineno="69">
-<summary>
-Read openct pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="openct_read_runtime_files" lineno="84">
+<interface name="openct_read_runtime_files" lineno="69">
<summary>
Read openct runtime files.
</summary>
@@ -105235,7 +88348,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="openct_stream_connect" lineno="104">
+<interface name="openct_stream_connect" lineno="89">
<summary>
Connect to openct over an unix
domain stream socket.
@@ -105246,7 +88359,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="openct_admin" lineno="130">
+<interface name="openct_admin" lineno="115">
<summary>
All of the rules required to
administrate an openct environment.
@@ -105284,6 +88397,53 @@ Role allowed access.
<rolecap/>
</interface>
</module>
+<module name="opensm" filename="policy/modules/services/opensm.if">
+<summary>OpenSM is a software implementation of an InfiniBand subnet manager.</summary>
+<interface name="opensm_domtrans" lineno="13">
+<summary>
+Execute opensm in the opensm domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="opensm_run" lineno="39">
+<summary>
+Execute opensm in the opensm domain, and
+allow the specified role the opensm domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="opensm_admin" lineno="66">
+<summary>
+All of the rules required to administrate
+an opensm environment.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+</module>
<module name="openvpn" filename="policy/modules/services/openvpn.if">
<summary>full-featured SSL VPN solution.</summary>
<interface name="openvpn_domtrans" lineno="14">
@@ -105402,17 +88562,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="openvswitch_read_pid_files" lineno="32">
-<summary>
-Read openvswitch pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="openvswitch_read_runtime_files" lineno="47">
+<interface name="openvswitch_read_runtime_files" lineno="32">
<summary>
Read openvswitch runtime files.
</summary>
@@ -105422,7 +88572,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="openvswitch_admin" lineno="73">
+<interface name="openvswitch_admin" lineno="58">
<summary>
All of the rules required to
administrate an openvswitch environment.
@@ -105499,17 +88649,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="pcscd_read_pid_files" lineno="32">
-<summary>
-Read pcscd pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="pcscd_read_runtime_files" lineno="47">
+<interface name="pcscd_read_runtime_files" lineno="32">
<summary>
Read pcscd runtime files.
</summary>
@@ -105519,7 +88659,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="pcscd_stream_connect" lineno="67">
+<interface name="pcscd_stream_connect" lineno="52">
<summary>
Connect to pcscd over an unix
domain stream socket.
@@ -105530,7 +88670,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="pcscd_admin" lineno="96">
+<interface name="pcscd_admin" lineno="81">
<summary>
All of the rules required to
administrate an pcscd environment.
@@ -105784,27 +88924,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="plymouthd_read_pid_files" lineno="244">
-<summary>
-Read plymouthd pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="plymouthd_delete_pid_files" lineno="259">
-<summary>
-Delete the plymouthd pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="plymouthd_read_runtime_files" lineno="274">
+<interface name="plymouthd_read_runtime_files" lineno="244">
<summary>
Read plymouthd runtime files.
</summary>
@@ -105814,7 +88934,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="plymouthd_delete_runtime_files" lineno="293">
+<interface name="plymouthd_delete_runtime_files" lineno="263">
<summary>
Delete the plymouthd runtime files.
</summary>
@@ -105824,7 +88944,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="plymouthd_admin" lineno="319">
+<interface name="plymouthd_admin" lineno="289">
<summary>
All of the rules required to
administrate an plymouthd environment.
@@ -105989,7 +89109,7 @@ MLS range to transition to.
</interface>
<interface name="podman_rw_conmon_pipes" lineno="272">
<summary>
-Read and write podman conmon unnamed pipes.
+Read and write conmon unnamed pipes.
</summary>
<param name="domain">
<summary>
@@ -105997,10 +89117,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="podman_use_conmon_fds" lineno="293">
+<interface name="podman_use_conmon_fds" lineno="291">
<summary>
Allow the specified domain to inherit
-file descriptors from podman conmon.
+and use file descriptors from conmon.
</summary>
<param name="domain">
<summary>
@@ -106008,7 +89128,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<template name="podman_user_role" lineno="330">
+<template name="podman_user_role" lineno="326">
<summary>
Role access for rootless podman.
</summary>
@@ -106035,7 +89155,7 @@ Role allowed access.
</param>
<rolecap/>
</template>
-<interface name="podman_admin" lineno="367">
+<interface name="podman_admin" lineno="363">
<summary>
All of the rules required to
administrate a podman
@@ -107296,49 +90416,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ppp_read_pid_files" lineno="366">
-<summary>
-Read ppp pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="ppp_manage_pid_files" lineno="382">
-<summary>
-Create, read, write, and delete
-ppp pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="ppp_pid_filetrans" lineno="408">
-<summary>
-Create specified pppd pid objects
-with a type transition. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="object_class">
-<summary>
-Class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="ppp_read_runtime_files" lineno="423">
+<interface name="ppp_read_runtime_files" lineno="366">
<summary>
Read ppp runtime files.
</summary>
@@ -107348,7 +90426,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ppp_manage_runtime_files" lineno="443">
+<interface name="ppp_manage_runtime_files" lineno="386">
<summary>
Create, read, write, and delete
ppp runtime files.
@@ -107359,7 +90437,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ppp_runtime_filetrans" lineno="473">
+<interface name="ppp_runtime_filetrans" lineno="416">
<summary>
Create specified pppd runtime objects
with a type transition.
@@ -107380,7 +90458,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="ppp_initrc_domtrans" lineno="492">
+<interface name="ppp_initrc_domtrans" lineno="435">
<summary>
Execute pppd init script in
the initrc domain.
@@ -107391,7 +90469,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ppp_admin" lineno="517">
+<interface name="ppp_admin" lineno="460">
<summary>
All of the rules required to
administrate an ppp environment.
@@ -107683,27 +90761,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="psad_read_pid_files" lineno="111">
-<summary>
-Read psad pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="psad_rw_pid_files" lineno="125">
-<summary>
-Read and write psad pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="psad_read_log" lineno="140">
+<interface name="psad_read_log" lineno="112">
<summary>
Read psad log content.
</summary>
@@ -107714,7 +90772,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="psad_append_log" lineno="161">
+<interface name="psad_append_log" lineno="133">
<summary>
Append psad log files.
</summary>
@@ -107725,7 +90783,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="psad_rw_fifo_file" lineno="180">
+<interface name="psad_rw_fifo_file" lineno="152">
<summary>
Read and write psad fifo files.
</summary>
@@ -107735,7 +90793,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="psad_rw_tmp_files" lineno="199">
+<interface name="psad_rw_tmp_files" lineno="171">
<summary>
Read and write psad temporary files.
</summary>
@@ -107745,7 +90803,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="psad_admin" lineno="225">
+<interface name="psad_admin" lineno="197">
<summary>
All of the rules required to
administrate an psad environment.
@@ -108015,17 +91073,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="qpidd_read_pid_files" lineno="87">
-<summary>
-Read qpidd pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="qpidd_search_lib" lineno="101">
+<interface name="qpidd_search_lib" lineno="87">
<summary>
Search qpidd lib directories.
</summary>
@@ -108035,7 +91083,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qpidd_read_lib_files" lineno="120">
+<interface name="qpidd_read_lib_files" lineno="106">
<summary>
Read qpidd lib files.
</summary>
@@ -108045,7 +91093,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qpidd_manage_lib_files" lineno="140">
+<interface name="qpidd_manage_lib_files" lineno="126">
<summary>
Create, read, write, and delete
qpidd lib files.
@@ -108056,7 +91104,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qpidd_admin" lineno="166">
+<interface name="qpidd_admin" lineno="152">
<summary>
All of the rules required to
administrate an qpidd environment.
@@ -108463,17 +91511,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rhsmcertd_read_pid_files" lineno="190">
-<summary>
-Read rhsmcertd pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhsmcertd_stream_connect" lineno="205">
+<interface name="rhsmcertd_stream_connect" lineno="191">
<summary>
Connect to rhsmcertd with a
unix domain stream socket.
@@ -108484,7 +91522,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rhsmcertd_dbus_chat" lineno="225">
+<interface name="rhsmcertd_dbus_chat" lineno="211">
<summary>
Send and receive messages from
rhsmcertd over dbus.
@@ -108495,7 +91533,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rhsmcertd_dontaudit_dbus_chat" lineno="247">
+<interface name="rhsmcertd_dontaudit_dbus_chat" lineno="233">
<summary>
Do not audit attempts to send
and receive messages from
@@ -108507,7 +91545,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="rhsmcertd_admin" lineno="274">
+<interface name="rhsmcertd_admin" lineno="260">
<summary>
All of the rules required to
administrate an rhsmcertd environment.
@@ -108793,7 +91831,29 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="rpc_read_nfs_content" lineno="195">
+<interface name="rpc_read_rpcd_state" lineno="195">
+<summary>
+Read the process state (/proc/pid) of
+rpcd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="rpc_use_nfsd_fds" lineno="214">
+<summary>
+Inherit and use file descriptors from
+nfsd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="rpc_read_nfs_content" lineno="233">
<summary>
Read nfs exported content.
</summary>
@@ -108804,7 +91864,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="rpc_manage_nfs_rw_content" lineno="217">
+<interface name="rpc_manage_nfs_rw_content" lineno="255">
<summary>
Create, read, write, and delete
nfs exported read write content.
@@ -108816,7 +91876,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="rpc_manage_nfs_ro_content" lineno="239">
+<interface name="rpc_manage_nfs_ro_content" lineno="277">
<summary>
Create, read, write, and delete
nfs exported read only content.
@@ -108828,7 +91888,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="rpc_tcp_rw_nfs_sockets" lineno="259">
+<interface name="rpc_tcp_rw_nfs_sockets" lineno="297">
<summary>
Read and write to nfsd tcp sockets.
</summary>
@@ -108838,7 +91898,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpc_udp_rw_nfs_sockets" lineno="277">
+<interface name="rpc_udp_rw_nfs_sockets" lineno="315">
<summary>
Read and write to nfsd udp sockets.
</summary>
@@ -108848,7 +91908,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpc_search_nfs_state_data" lineno="295">
+<interface name="rpc_search_nfs_state_data" lineno="333">
<summary>
Search nfs lib directories.
</summary>
@@ -108858,7 +91918,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpc_read_nfs_state_data" lineno="314">
+<interface name="rpc_create_nfs_state_data_dirs" lineno="352">
+<summary>
+Create nfs lib directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="rpc_read_nfs_state_data" lineno="371">
<summary>
Read nfs lib files.
</summary>
@@ -108868,7 +91938,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpc_manage_nfs_state_data" lineno="334">
+<interface name="rpc_manage_nfs_state_data" lineno="391">
<summary>
Create, read, write, and delete
nfs lib files.
@@ -108879,7 +91949,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpc_admin" lineno="364">
+<interface name="rpc_admin" lineno="421">
<summary>
All of the rules required to
administrate an rpc environment.
@@ -108946,17 +92016,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpcbind_read_pid_files" lineno="52">
-<summary>
-Read rpcbind pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rpcbind_search_lib" lineno="66">
+<interface name="rpcbind_search_lib" lineno="52">
<summary>
Search rpcbind lib directories.
</summary>
@@ -108966,7 +92026,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpcbind_read_lib_files" lineno="85">
+<interface name="rpcbind_read_lib_files" lineno="71">
<summary>
Read rpcbind lib files.
</summary>
@@ -108976,7 +92036,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpcbind_manage_lib_files" lineno="105">
+<interface name="rpcbind_manage_lib_files" lineno="91">
<summary>
Create, read, write, and delete
rpcbind lib files.
@@ -108987,7 +92047,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpcbind_signull" lineno="124">
+<interface name="rpcbind_signull" lineno="110">
<summary>
Send null signals to rpcbind.
</summary>
@@ -108997,7 +92057,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpcbind_admin" lineno="149">
+<interface name="rpcbind_admin" lineno="135">
<summary>
All of the rules required to
administrate an rpcbind environment.
@@ -109774,17 +92834,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="samba_read_winbind_pid" lineno="718">
-<summary>
-Read winbind pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="samba_read_winbind_runtime_files" lineno="733">
+<interface name="samba_read_winbind_runtime_files" lineno="718">
<summary>
Read winbind runtime files.
</summary>
@@ -109794,7 +92844,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="samba_stream_connect_winbind" lineno="753">
+<interface name="samba_stream_connect_winbind" lineno="738">
<summary>
Connect to winbind with a unix
domain stream socket.
@@ -109805,7 +92855,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="samba_admin" lineno="779">
+<interface name="samba_admin" lineno="764">
<summary>
All of the rules required to
administrate an samba environment.
@@ -109937,18 +92987,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="sanlock_manage_pid_files" lineno="52">
-<summary>
-Create, read, write, and delete
-sanlock pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="sanlock_stream_connect" lineno="67">
+<interface name="sanlock_stream_connect" lineno="52">
<summary>
Connect to sanlock with a unix
domain stream socket.
@@ -109959,7 +92998,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sanlock_admin" lineno="93">
+<interface name="sanlock_admin" lineno="78">
<summary>
All of the rules required to
administrate an sanlock environment.
@@ -110005,7 +93044,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sasl_admin" lineno="39">
+<interface name="sasl_read_keytab" lineno="32">
+<summary>
+Read SASL keytab files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sasl_admin" lineno="58">
<summary>
All of the rules required to
administrate an sasl environment.
@@ -110471,28 +93520,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="smokeping_read_pid_files" lineno="51">
-<summary>
-Read smokeping pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="smokeping_manage_pid_files" lineno="66">
-<summary>
-Create, read, write, and delete
-smokeping pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="smokeping_getattr_lib_files" lineno="80">
+<interface name="smokeping_getattr_lib_files" lineno="51">
<summary>
Get attributes of smokeping lib files.
</summary>
@@ -110502,7 +93530,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="smokeping_read_lib_files" lineno="99">
+<interface name="smokeping_read_lib_files" lineno="70">
<summary>
Read smokeping lib files.
</summary>
@@ -110512,7 +93540,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="smokeping_manage_lib_files" lineno="119">
+<interface name="smokeping_manage_lib_files" lineno="90">
<summary>
Create, read, write, and delete
smokeping lib files.
@@ -110523,7 +93551,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="smokeping_admin" lineno="145">
+<interface name="smokeping_admin" lineno="116">
<summary>
All of the rules required to
administrate a smokeping environment.
@@ -110929,17 +93957,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_read_spamd_pid_files" lineno="376">
-<summary>
-Read spamd pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="spamassassin_read_spamd_runtime_files" lineno="391">
+<interface name="spamassassin_read_spamd_runtime_files" lineno="376">
<summary>
Read spamd runtime files.
</summary>
@@ -110949,7 +93967,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_read_spamd_tmp_files" lineno="410">
+<interface name="spamassassin_read_spamd_tmp_files" lineno="395">
<summary>
Read temporary spamd files.
</summary>
@@ -110959,7 +93977,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="429">
+<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="414">
<summary>
Do not audit attempts to get
attributes of temporary spamd sockets.
@@ -110970,7 +93988,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="spamassassin_stream_connect_spamd" lineno="448">
+<interface name="spamassassin_stream_connect_spamd" lineno="433">
<summary>
Connect to spamd with a unix
domain stream socket.
@@ -110981,7 +93999,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_admin" lineno="474">
+<interface name="spamassassin_admin" lineno="459">
<summary>
All of the rules required to
administrate an spamassassin environment.
@@ -111238,7 +94256,7 @@ is the prefix for sshd_t).
</summary>
</param>
</template>
-<template name="ssh_role_template" lineno="322">
+<template name="ssh_role_template" lineno="321">
<summary>
Role access for ssh
</summary>
@@ -111264,7 +94282,7 @@ Role allowed access
</summary>
</param>
</template>
-<interface name="ssh_sigchld" lineno="487">
+<interface name="ssh_sigchld" lineno="486">
<summary>
Send a SIGCHLD signal to the ssh server.
</summary>
@@ -111274,7 +94292,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_signal" lineno="505">
+<interface name="ssh_signal" lineno="504">
<summary>
Send a generic signal to the ssh server.
</summary>
@@ -111284,7 +94302,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_signull" lineno="523">
+<interface name="ssh_signull" lineno="522">
<summary>
Send a null signal to sshd processes.
</summary>
@@ -111294,7 +94312,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_read_pipes" lineno="541">
+<interface name="ssh_read_pipes" lineno="540">
<summary>
Read a ssh server unnamed pipe.
</summary>
@@ -111304,7 +94322,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_rw_pipes" lineno="558">
+<interface name="ssh_rw_pipes" lineno="557">
<summary>
Read and write a ssh server unnamed pipe.
</summary>
@@ -111314,7 +94332,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_rw_stream_sockets" lineno="576">
+<interface name="ssh_rw_stream_sockets" lineno="575">
<summary>
Read and write ssh server unix domain stream sockets.
</summary>
@@ -111324,7 +94342,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_rw_tcp_sockets" lineno="594">
+<interface name="ssh_rw_tcp_sockets" lineno="593">
<summary>
Read and write ssh server TCP sockets.
</summary>
@@ -111334,7 +94352,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="613">
+<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="612">
<summary>
Do not audit attempts to read and write
ssh server TCP sockets.
@@ -111345,7 +94363,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="ssh_exec_sshd" lineno="631">
+<interface name="ssh_exec_sshd" lineno="630">
<summary>
Execute the ssh daemon in the caller domain.
</summary>
@@ -111355,7 +94373,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_domtrans" lineno="650">
+<interface name="ssh_domtrans" lineno="649">
<summary>
Execute the ssh daemon sshd domain.
</summary>
@@ -111365,7 +94383,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ssh_client_domtrans" lineno="668">
+<interface name="ssh_client_domtrans" lineno="667">
<summary>
Execute the ssh client in the ssh client domain.
</summary>
@@ -111375,7 +94393,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ssh_exec" lineno="686">
+<interface name="ssh_exec" lineno="685">
<summary>
Execute the ssh client in the caller domain.
</summary>
@@ -111385,7 +94403,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_setattr_key_files" lineno="705">
+<interface name="ssh_setattr_key_files" lineno="704">
<summary>
Set the attributes of sshd key files.
</summary>
@@ -111395,7 +94413,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_agent_exec" lineno="724">
+<interface name="ssh_agent_exec" lineno="723">
<summary>
Execute the ssh agent client in the caller domain.
</summary>
@@ -111405,7 +94423,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_setattr_home_dirs" lineno="743">
+<interface name="ssh_setattr_home_dirs" lineno="742">
<summary>
Set the attributes of ssh home directory (~/.ssh)
</summary>
@@ -111415,7 +94433,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_create_home_dirs" lineno="761">
+<interface name="ssh_create_home_dirs" lineno="760">
<summary>
Create ssh home directory (~/.ssh)
</summary>
@@ -111425,7 +94443,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_read_user_home_files" lineno="780">
+<interface name="ssh_read_user_home_files" lineno="779">
<summary>
Read ssh home directory content
</summary>
@@ -111435,7 +94453,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_domtrans_keygen" lineno="801">
+<interface name="ssh_domtrans_keygen" lineno="800">
<summary>
Execute the ssh key generator in the ssh keygen domain.
</summary>
@@ -111445,7 +94463,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ssh_read_server_keys" lineno="819">
+<interface name="ssh_read_server_keys" lineno="818">
<summary>
Read ssh server keys
</summary>
@@ -111455,7 +94473,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_dontaudit_read_server_keys" lineno="837">
+<interface name="ssh_dontaudit_read_server_keys" lineno="836">
<summary>
Do not audit denials on reading ssh server keys
</summary>
@@ -111465,7 +94483,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="ssh_manage_home_files" lineno="855">
+<interface name="ssh_manage_home_files" lineno="854">
<summary>
Manage ssh home directory content
</summary>
@@ -111475,7 +94493,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_delete_tmp" lineno="874">
+<interface name="ssh_delete_tmp" lineno="873">
<summary>
Delete from the ssh temp files.
</summary>
@@ -111485,7 +94503,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_dontaudit_agent_tmp" lineno="893">
+<interface name="ssh_dontaudit_agent_tmp" lineno="892">
<summary>
dontaudit access to ssh agent tmp dirs
</summary>
@@ -111602,28 +94620,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sssd_read_pid_files" lineno="168">
-<summary>
-Read sssd pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="sssd_manage_pids" lineno="184">
-<summary>
-Create, read, write, and delete
-sssd pid content. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="sssd_read_runtime_files" lineno="198">
+<interface name="sssd_read_runtime_files" lineno="168">
<summary>
Read sssd runtime files.
</summary>
@@ -111633,7 +94630,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sssd_search_lib" lineno="217">
+<interface name="sssd_search_lib" lineno="187">
<summary>
Search sssd lib directories.
</summary>
@@ -111643,7 +94640,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sssd_dontaudit_search_lib" lineno="237">
+<interface name="sssd_dontaudit_search_lib" lineno="207">
<summary>
Do not audit attempts to search
sssd lib directories.
@@ -111654,7 +94651,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="sssd_read_lib_files" lineno="255">
+<interface name="sssd_read_lib_files" lineno="225">
<summary>
Read sssd lib files.
</summary>
@@ -111664,7 +94661,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sssd_manage_lib_files" lineno="276">
+<interface name="sssd_manage_lib_files" lineno="246">
<summary>
Create, read, write, and delete
sssd lib files.
@@ -111675,7 +94672,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sssd_dbus_chat" lineno="297">
+<interface name="sssd_dbus_chat" lineno="267">
<summary>
Send and receive messages from
sssd over dbus.
@@ -111686,7 +94683,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sssd_stream_connect" lineno="318">
+<interface name="sssd_stream_connect" lineno="288">
<summary>
Connect to sssd with a unix
domain stream socket.
@@ -111697,7 +94694,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sssd_admin" lineno="344">
+<interface name="sssd_admin" lineno="314">
<summary>
All of the rules required to
administrate an sssd environment.
@@ -111766,6 +94763,113 @@ Role allowed access.
<rolecap/>
</interface>
</module>
+<module name="sympa" filename="policy/modules/services/sympa.if">
+<summary>Sympa mailing list manager</summary>
+<desc>
+Sympa is a popular mailing list manager.
+https://www.sympa.org/
+</desc>
+<interface name="sympa_append_inherited_var_files" lineno="17">
+<summary>
+Allow appending to sympa_var_t (for error log)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sympa_read_var_files" lineno="36">
+<summary>
+Allow reading sympa_var_t files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sympa_manage_var_files" lineno="55">
+<summary>
+Allow managing sympa_var_t files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sympa_map_var_files" lineno="73">
+<summary>
+Allow mapping sympa_var_t files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sympa_domtrans" lineno="91">
+<summary>
+Transition to sympa_t when executing sympa_exec_t
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="symba_dontaudit_rw_inherited_tcp_sockets" lineno="109">
+<summary>
+Dontaudit access to inherited sympa tcp sockets
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit
+</summary>
+</param>
+</interface>
+<interface name="sympa_read_conf" lineno="127">
+<summary>
+Allow reading sympa config files
+</summary>
+<param name="domain">
+<summary>
+Domain to allow
+</summary>
+</param>
+</interface>
+<interface name="sympa_manage_runtime_files" lineno="146">
+<summary>
+Allow rw sympa runtime dirs and manage sympa runtime files
+</summary>
+<param name="domain">
+<summary>
+Domain to allow
+</summary>
+</param>
+</interface>
+<interface name="sympa_manage_runtime_sock_files" lineno="165">
+<summary>
+Allow rw sympa runtime dirs and manage sympa runtime sock files
+</summary>
+<param name="domain">
+<summary>
+Domain to allow
+</summary>
+</param>
+</interface>
+<interface name="sympa_connect_runtime_sock_files" lineno="184">
+<summary>
+Allow domain to connect to sympa socket
+</summary>
+<param name="domain">
+<summary>
+Domain to allow
+</summary>
+</param>
+</interface>
+</module>
<module name="sysstat" filename="policy/modules/services/sysstat.if">
<summary>Reports on various system states.</summary>
<interface name="sysstat_manage_log" lineno="15">
@@ -112345,28 +95449,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="tuned_read_pid_files" lineno="51">
-<summary>
-Read tuned pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="tuned_manage_pid_files" lineno="66">
-<summary>
-Create, read, write, and delete
-tuned pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="tuned_initrc_domtrans" lineno="81">
+<interface name="tuned_initrc_domtrans" lineno="52">
<summary>
Execute tuned init scripts in
the initrc domain.
@@ -112377,7 +95460,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="tuned_admin" lineno="106">
+<interface name="tuned_admin" lineno="77">
<summary>
All of the rules required to
administrate an tuned environment.
@@ -112656,17 +95739,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="uuidd_read_pid_files" lineno="129">
-<summary>
-Read uuidd pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="uuidd_stream_connect_manager" lineno="144">
+<interface name="uuidd_stream_connect_manager" lineno="130">
<summary>
Connect to uuidd with an unix
domain stream socket.
@@ -112677,7 +95750,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="uuidd_admin" lineno="170">
+<interface name="uuidd_admin" lineno="156">
<summary>
All of the rules required to
administrate an uuidd environment.
@@ -112856,17 +95929,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="vdagent_read_pid_files" lineno="69">
-<summary>
-Read vdagent pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="vdagent_stream_connect" lineno="84">
+<interface name="vdagent_stream_connect" lineno="70">
<summary>
Connect to vdagent with a unix
domain stream socket.
@@ -112877,7 +95940,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="vdagent_admin" lineno="110">
+<interface name="vdagent_admin" lineno="96">
<summary>
All of the rules required to
administrate an vdagent environment.
@@ -112960,28 +96023,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="vhostmd_read_pid_files" lineno="128">
-<summary>
-Read vhostmd pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="vhostmd_manage_pid_files" lineno="143">
-<summary>
-Create, read, write, and delete
-vhostmd pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="vhostmd_stream_connect" lineno="158">
+<interface name="vhostmd_stream_connect" lineno="129">
<summary>
Connect to vhostmd with a unix
domain stream socket.
@@ -112992,7 +96034,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="vhostmd_dontaudit_rw_stream_connect" lineno="178">
+<interface name="vhostmd_dontaudit_rw_stream_connect" lineno="149">
<summary>
Do not audit attempts to read and
write vhostmd unix domain stream sockets.
@@ -113003,7 +96045,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="vhostmd_admin" lineno="203">
+<interface name="vhostmd_admin" lineno="174">
<summary>
All of the rules required to
administrate an vhostmd environment.
@@ -113366,28 +96408,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="virt_read_pid_files" lineno="753">
-<summary>
-Read virt pid files. (Depprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="virt_manage_pid_files" lineno="769">
-<summary>
-Create, read, write, and delete
-virt pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="virt_read_runtime_files" lineno="783">
+<interface name="virt_read_runtime_files" lineno="753">
<summary>
Read virt runtime files.
</summary>
@@ -113397,7 +96418,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_runtime_filetrans" lineno="818">
+<interface name="virt_runtime_filetrans" lineno="788">
<summary>
Create an object in the libvirt runtime directory, with a private type.
</summary>
@@ -113423,7 +96444,7 @@ The name of the object being created.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="virt_search_lib" lineno="836">
+<interface name="virt_search_lib" lineno="806">
<summary>
Search virt lib directories.
</summary>
@@ -113433,7 +96454,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_read_lib_files" lineno="855">
+<interface name="virt_read_lib_files" lineno="825">
<summary>
Read virt lib files.
</summary>
@@ -113443,7 +96464,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_manage_lib_files" lineno="876">
+<interface name="virt_manage_lib_files" lineno="846">
<summary>
Create, read, write, and delete
virt lib files.
@@ -113454,34 +96475,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_pid_filetrans" lineno="912">
-<summary>
-Create objects in virt pid
-directories with a private type. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="private type">
-<summary>
-The type of the object to be created.
-</summary>
-</param>
-<param name="object">
-<summary>
-The object class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="virt_read_log" lineno="928">
+<interface name="virt_read_log" lineno="866">
<summary>
Read virt log files.
</summary>
@@ -113492,7 +96486,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="virt_append_log" lineno="947">
+<interface name="virt_append_log" lineno="885">
<summary>
Append virt log files.
</summary>
@@ -113502,7 +96496,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_manage_log" lineno="967">
+<interface name="virt_manage_log" lineno="905">
<summary>
Create, read, write, and delete
virt log files.
@@ -113513,7 +96507,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_search_images" lineno="988">
+<interface name="virt_search_images" lineno="926">
<summary>
Search virt image directories.
</summary>
@@ -113523,7 +96517,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_read_images" lineno="1007">
+<interface name="virt_read_images" lineno="945">
<summary>
Read virt image files.
</summary>
@@ -113533,7 +96527,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_rw_all_image_chr_files" lineno="1043">
+<interface name="virt_rw_all_image_chr_files" lineno="981">
<summary>
Read and write all virt image
character files.
@@ -113544,7 +96538,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_manage_virt_cache" lineno="1064">
+<interface name="virt_manage_virt_cache" lineno="1002">
<summary>
Create, read, write, and delete
virt cache content.
@@ -113555,7 +96549,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_manage_images" lineno="1086">
+<interface name="virt_manage_images" lineno="1024">
<summary>
Create, read, write, and delete
virt image files.
@@ -113566,7 +96560,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_lxc_use_fds" lineno="1122">
+<interface name="virt_lxc_use_fds" lineno="1060">
<summary>
Inherit and use virtd lxc
file descriptors.
@@ -113577,7 +96571,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_lxc_sigchld" lineno="1140">
+<interface name="virt_lxc_sigchld" lineno="1078">
<summary>
Send a SIGCHLD to virtd lxc.
</summary>
@@ -113587,7 +96581,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_lxc_rw_pipes" lineno="1158">
+<interface name="virt_lxc_rw_pipes" lineno="1096">
<summary>
Read and write virtd lxc unamed pipes.
</summary>
@@ -113597,7 +96591,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_lxc_stream_connect" lineno="1177">
+<interface name="virt_lxc_stream_connect" lineno="1115">
<summary>
Connect to virtd lxc over
a unix stream socket.
@@ -113608,7 +96602,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_lxc_list_runtime" lineno="1197">
+<interface name="virt_lxc_list_runtime" lineno="1135">
<summary>
List the contents of virtd lxc
directories.
@@ -113619,7 +96613,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_lxc_read_runtime" lineno="1215">
+<interface name="virt_lxc_read_runtime" lineno="1153">
<summary>
Read virtd lxc runtime files.
</summary>
@@ -113629,7 +96623,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_virsh_use_fds" lineno="1234">
+<interface name="virt_virsh_use_fds" lineno="1172">
<summary>
Inherit and use virsh file
descriptors.
@@ -113640,7 +96634,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_virsh_sigchld" lineno="1252">
+<interface name="virt_virsh_sigchld" lineno="1190">
<summary>
Send a SIGCHLD to virsh.
</summary>
@@ -113650,7 +96644,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_virsh_rw_pipes" lineno="1270">
+<interface name="virt_virsh_rw_pipes" lineno="1208">
<summary>
Read and write virsh unamed pipes.
</summary>
@@ -113660,7 +96654,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_admin" lineno="1295">
+<interface name="virt_admin" lineno="1233">
<summary>
All of the rules required to
administrate an virt environment.
@@ -114399,17 +97393,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_pid" lineno="1007">
-<summary>
-Read XDM pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="xserver_read_xdm_runtime_files" lineno="1022">
+<interface name="xserver_read_xdm_runtime_files" lineno="1007">
<summary>
Read XDM runtime files.
</summary>
@@ -114419,7 +97403,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_lib_files" lineno="1041">
+<interface name="xserver_read_xdm_lib_files" lineno="1026">
<summary>
Read XDM var lib files.
</summary>
@@ -114429,7 +97413,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_xsession_entry_type" lineno="1059">
+<interface name="xserver_xsession_entry_type" lineno="1044">
<summary>
Make an X session script an entrypoint for the specified domain.
</summary>
@@ -114439,7 +97423,7 @@ The domain for which the shell is an entrypoint.
</summary>
</param>
</interface>
-<interface name="xserver_xsession_spec_domtrans" lineno="1096">
+<interface name="xserver_xsession_spec_domtrans" lineno="1081">
<summary>
Execute an X session in the target domain. This
is an explicit transition, requiring the
@@ -114468,7 +97452,7 @@ The type of the shell process.
</summary>
</param>
</interface>
-<interface name="xserver_write_inherited_xsession_log" lineno="1115">
+<interface name="xserver_write_inherited_xsession_log" lineno="1100">
<summary>
Write to inherited xsession log
files such as .xsession-errors.
@@ -114479,7 +97463,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_xsession_log" lineno="1135">
+<interface name="xserver_rw_xsession_log" lineno="1120">
<summary>
Read and write xsession log
files such as .xsession-errors.
@@ -114490,7 +97474,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_xsession_log" lineno="1154">
+<interface name="xserver_manage_xsession_log" lineno="1139">
<summary>
Manage xsession log files such
as .xsession-errors.
@@ -114501,7 +97485,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_write_inherited_log" lineno="1173">
+<interface name="xserver_write_inherited_log" lineno="1158">
<summary>
Write to inherited X server log
files like /var/log/lightdm/lightdm.log
@@ -114512,7 +97496,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_getattr_log" lineno="1191">
+<interface name="xserver_getattr_log" lineno="1176">
<summary>
Get the attributes of X server logs.
</summary>
@@ -114522,7 +97506,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_write_log" lineno="1211">
+<interface name="xserver_dontaudit_write_log" lineno="1196">
<summary>
Do not audit attempts to write the X server
log files.
@@ -114533,7 +97517,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_delete_log" lineno="1229">
+<interface name="xserver_delete_log" lineno="1214">
<summary>
Delete X server log files.
</summary>
@@ -114543,7 +97527,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xkb_libs" lineno="1250">
+<interface name="xserver_read_xkb_libs" lineno="1235">
<summary>
Read X keyboard extension libraries.
</summary>
@@ -114553,7 +97537,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_create_xdm_tmp_dirs" lineno="1271">
+<interface name="xserver_create_xdm_tmp_dirs" lineno="1256">
<summary>
Create xdm temporary directories.
</summary>
@@ -114563,7 +97547,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_tmp_files" lineno="1289">
+<interface name="xserver_read_xdm_tmp_files" lineno="1274">
<summary>
Read xdm temporary files.
</summary>
@@ -114573,7 +97557,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1308">
+<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1293">
<summary>
Do not audit attempts to read xdm temporary files.
</summary>
@@ -114583,7 +97567,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_rw_xdm_tmp_files" lineno="1327">
+<interface name="xserver_rw_xdm_tmp_files" lineno="1312">
<summary>
Read write xdm temporary files.
</summary>
@@ -114593,7 +97577,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_xdm_tmp_files" lineno="1346">
+<interface name="xserver_manage_xdm_tmp_files" lineno="1331">
<summary>
Create, read, write, and delete xdm temporary files.
</summary>
@@ -114603,7 +97587,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1365">
+<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1350">
<summary>
Do not audit attempts to get the attributes of
xdm temporary named sockets.
@@ -114614,7 +97598,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_list_xdm_tmp" lineno="1383">
+<interface name="xserver_list_xdm_tmp" lineno="1368">
<summary>
list xdm_tmp_t directories
</summary>
@@ -114624,7 +97608,7 @@ Domain to allow
</summary>
</param>
</interface>
-<interface name="xserver_domtrans" lineno="1401">
+<interface name="xserver_domtrans" lineno="1386">
<summary>
Execute the X server in the X server domain.
</summary>
@@ -114634,7 +97618,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="xserver_signal" lineno="1420">
+<interface name="xserver_signal" lineno="1405">
<summary>
Signal X servers
</summary>
@@ -114644,7 +97628,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_kill" lineno="1438">
+<interface name="xserver_kill" lineno="1423">
<summary>
Kill X servers
</summary>
@@ -114654,7 +97638,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_state" lineno="1456">
+<interface name="xserver_read_state" lineno="1441">
<summary>
Allow reading xserver_t files to get cgroup and sessionid
</summary>
@@ -114664,7 +97648,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_shm" lineno="1476">
+<interface name="xserver_rw_shm" lineno="1461">
<summary>
Read and write X server Sys V Shared
memory segments.
@@ -114675,7 +97659,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1495">
+<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1480">
<summary>
Do not audit attempts to read and write to
X server sockets.
@@ -114686,7 +97670,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1514">
+<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1499">
<summary>
Do not audit attempts to read and write X server
unix domain stream sockets.
@@ -114697,7 +97681,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_stream_connect" lineno="1533">
+<interface name="xserver_stream_connect" lineno="1518">
<summary>
Connect to the X server over a unix domain
stream socket.
@@ -114708,7 +97692,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_tmp_files" lineno="1552">
+<interface name="xserver_read_tmp_files" lineno="1537">
<summary>
Read X server temporary files.
</summary>
@@ -114718,7 +97702,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dbus_chat" lineno="1571">
+<interface name="xserver_dbus_chat" lineno="1556">
<summary>
talk to xserver_t by dbus
</summary>
@@ -114728,7 +97712,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_core_devices" lineno="1593">
+<interface name="xserver_manage_core_devices" lineno="1578">
<summary>
Interface to provide X object permissions on a given X server to
an X client domain. Gives the domain permission to read the
@@ -114740,7 +97724,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_unconfined" lineno="1616">
+<interface name="xserver_unconfined" lineno="1601">
<summary>
Interface to provide X object permissions on a given X server to
an X client domain. Gives the domain complete control over the
@@ -114752,7 +97736,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_xdm_keys" lineno="1636">
+<interface name="xserver_rw_xdm_keys" lineno="1621">
<summary>
Manage keys for xdm.
</summary>
@@ -114762,7 +97746,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_link_xdm_keys" lineno="1654">
+<interface name="xserver_link_xdm_keys" lineno="1639">
<summary>
Manage keys for xdm.
</summary>
@@ -114772,7 +97756,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_mesa_shader_cache" lineno="1672">
+<interface name="xserver_rw_mesa_shader_cache" lineno="1657">
<summary>
Read and write the mesa shader cache.
</summary>
@@ -114782,7 +97766,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_mesa_shader_cache" lineno="1693">
+<interface name="xserver_manage_mesa_shader_cache" lineno="1678">
<summary>
Manage the mesa shader cache.
</summary>
@@ -114873,17 +97857,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="zabbix_read_pid_files" lineno="91">
-<summary>
-Read zabbix pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="zabbix_agent_tcp_connect" lineno="105">
+<interface name="zabbix_agent_tcp_connect" lineno="91">
<summary>
Connect to zabbix agent on the TCP network.
</summary>
@@ -114893,7 +97867,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="zabbix_admin" lineno="132">
+<interface name="zabbix_admin" lineno="118">
<summary>
All of the rules required to
administrate an zabbix environment.
@@ -115040,6 +98014,94 @@ manage its configuration files.
</desc>
</tunable>
</module>
+<module name="zfs" filename="policy/modules/services/zfs.if">
+<summary>Tools for the Zettabyte File System.</summary>
+<interface name="zfs_domtrans" lineno="14">
+<summary>
+Execute ZFS tools in the
+ZFS domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="zfs_exec" lineno="33">
+<summary>
+Execute ZFS tools in the caller domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="zfs_run" lineno="59">
+<summary>
+Execute ZFS tools in the ZFS domain, and
+allow the specified role the ZFS domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="zfs_search_config" lineno="78">
+<summary>
+Search ZFS config directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="zfs_read_config" lineno="97">
+<summary>
+Read ZFS config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="zfs_rw_zpool_cache" lineno="117">
+<summary>
+Read and write zpool cache files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="zfs_admin" lineno="143">
+<summary>
+All of the rules required to
+administrate a ZFS environment.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+</module>
<module name="zosremote" filename="policy/modules/services/zosremote.if">
<summary>z/OS Remote-services Audit dispatcher plugin.</summary>
<interface name="zosremote_domtrans" lineno="13">
@@ -115763,70 +98825,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_pam_pid" lineno="1136">
-<summary>
-Read PAM PID files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="auth_dontaudit_read_pam_pid" lineno="1151">
-<summary>
-Do not audit attempts to read PAM PID files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="auth_pid_filetrans_pam_var_run" lineno="1179">
-<summary>
-Create specified objects in
-pid directories with the pam var
-run file type using a
-file type transition. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="object_class">
-<summary>
-Class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="auth_delete_pam_pid" lineno="1194">
-<summary>
-Delete pam PID files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="auth_manage_pam_pid" lineno="1209">
-<summary>
-Manage pam PID files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="auth_manage_pam_runtime_dirs" lineno="1225">
+<interface name="auth_manage_pam_runtime_dirs" lineno="1136">
<summary>
Manage pam runtime dirs.
</summary>
@@ -115836,7 +98835,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_runtime_filetrans_pam_runtime" lineno="1256">
+<interface name="auth_runtime_filetrans_pam_runtime" lineno="1167">
<summary>
Create specified objects in
pid directories with the pam runtime
@@ -115858,7 +98857,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="auth_read_pam_runtime_files" lineno="1274">
+<interface name="auth_read_pam_runtime_files" lineno="1185">
<summary>
Read PAM runtime files.
</summary>
@@ -115868,7 +98867,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_dontaudit_read_pam_runtime_files" lineno="1294">
+<interface name="auth_dontaudit_read_pam_runtime_files" lineno="1205">
<summary>
Do not audit attempts to read PAM runtime files.
</summary>
@@ -115878,7 +98877,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_delete_pam_runtime_files" lineno="1312">
+<interface name="auth_delete_pam_runtime_files" lineno="1223">
<summary>
Delete pam runtime files.
</summary>
@@ -115888,7 +98887,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_pam_runtime_files" lineno="1331">
+<interface name="auth_manage_pam_runtime_files" lineno="1242">
<summary>
Create, read, write, and delete pam runtime files.
</summary>
@@ -115898,7 +98897,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_pam_console" lineno="1350">
+<interface name="auth_domtrans_pam_console" lineno="1261">
<summary>
Execute pam_console with a domain transition.
</summary>
@@ -115908,7 +98907,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_search_pam_console_data" lineno="1369">
+<interface name="auth_search_pam_console_data" lineno="1280">
<summary>
Search the contents of the
pam_console data directory.
@@ -115919,7 +98918,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_list_pam_console_data" lineno="1389">
+<interface name="auth_list_pam_console_data" lineno="1300">
<summary>
List the contents of the pam_console
data directory.
@@ -115930,7 +98929,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_create_pam_console_data_dirs" lineno="1408">
+<interface name="auth_create_pam_console_data_dirs" lineno="1319">
<summary>
Create pam var console pid directories.
</summary>
@@ -115940,7 +98939,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabel_pam_console_data_dirs" lineno="1427">
+<interface name="auth_relabel_pam_console_data_dirs" lineno="1338">
<summary>
Relabel pam_console data directories.
</summary>
@@ -115950,7 +98949,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_pam_console_data" lineno="1445">
+<interface name="auth_read_pam_console_data" lineno="1356">
<summary>
Read pam_console data files.
</summary>
@@ -115960,7 +98959,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_pam_console_data" lineno="1466">
+<interface name="auth_manage_pam_console_data" lineno="1377">
<summary>
Create, read, write, and delete
pam_console data files.
@@ -115971,7 +98970,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_delete_pam_console_data" lineno="1486">
+<interface name="auth_delete_pam_console_data" lineno="1397">
<summary>
Delete pam_console data.
</summary>
@@ -115981,30 +98980,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_pid_filetrans_pam_var_console" lineno="1519">
-<summary>
-Create specified objects in
-pid directories with the pam var
-console pid file type using a
-file type transition. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="object_class">
-<summary>
-Class of the object being created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="auth_runtime_filetrans_pam_var_console" lineno="1547">
+<interface name="auth_runtime_filetrans_pam_var_console" lineno="1430">
<summary>
Create specified objects in generic
runtime directories with the pam var
@@ -116027,7 +99003,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_utempter" lineno="1565">
+<interface name="auth_domtrans_utempter" lineno="1448">
<summary>
Execute utempter programs in the utempter domain.
</summary>
@@ -116037,7 +99013,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_run_utempter" lineno="1588">
+<interface name="auth_run_utempter" lineno="1471">
<summary>
Execute utempter programs in the utempter domain.
</summary>
@@ -116052,7 +99028,7 @@ The role to allow the utempter domain.
</summary>
</param>
</interface>
-<interface name="auth_dontaudit_exec_utempter" lineno="1607">
+<interface name="auth_dontaudit_exec_utempter" lineno="1490">
<summary>
Do not audit attempts to execute utempter executable.
</summary>
@@ -116062,7 +99038,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_setattr_login_records" lineno="1625">
+<interface name="auth_setattr_login_records" lineno="1508">
<summary>
Set the attributes of login record files.
</summary>
@@ -116072,7 +99048,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_login_records" lineno="1645">
+<interface name="auth_read_login_records" lineno="1528">
<summary>
Read login records files (/var/log/wtmp).
</summary>
@@ -116083,7 +99059,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="auth_dontaudit_read_login_records" lineno="1666">
+<interface name="auth_dontaudit_read_login_records" lineno="1549">
<summary>
Do not audit attempts to read login records
files (/var/log/wtmp).
@@ -116095,7 +99071,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="auth_dontaudit_write_login_records" lineno="1685">
+<interface name="auth_dontaudit_write_login_records" lineno="1568">
<summary>
Do not audit attempts to write to
login records files.
@@ -116106,7 +99082,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_append_login_records" lineno="1703">
+<interface name="auth_append_login_records" lineno="1586">
<summary>
Append to login records (wtmp).
</summary>
@@ -116116,7 +99092,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_write_login_records" lineno="1722">
+<interface name="auth_write_login_records" lineno="1605">
<summary>
Write to login records (wtmp).
</summary>
@@ -116126,7 +99102,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_login_records" lineno="1740">
+<interface name="auth_rw_login_records" lineno="1623">
<summary>
Read and write login records.
</summary>
@@ -116136,7 +99112,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_log_filetrans_login_records" lineno="1760">
+<interface name="auth_log_filetrans_login_records" lineno="1643">
<summary>
Create a login records in the log directory
using a type transition.
@@ -116147,7 +99123,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_login_records" lineno="1779">
+<interface name="auth_manage_login_records" lineno="1662">
<summary>
Create, read, write, and delete login
records files.
@@ -116158,7 +99134,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabel_login_records" lineno="1798">
+<interface name="auth_relabel_login_records" lineno="1681">
<summary>
Relabel login record files.
</summary>
@@ -116168,7 +99144,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_use_nsswitch" lineno="1826">
+<interface name="auth_use_nsswitch" lineno="1709">
<summary>
Use nsswitch to look up user, password, group, or
host information.
@@ -116188,7 +99164,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="auth_unconfined" lineno="1854">
+<interface name="auth_unconfined" lineno="1737">
<summary>
Unconfined access to the authlogin module.
</summary>
@@ -117016,28 +99992,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_daemon_pid_file" lineno="662">
-<summary>
-Mark the file type as a daemon pid file, allowing initrc_t
-to create it (Deprecated)
-</summary>
-<param name="filetype">
-<summary>
-Type to mark as a daemon pid file
-</summary>
-</param>
-<param name="class">
-<summary>
-Class on which the type is applied
-</summary>
-</param>
-<param name="filename">
-<summary>
-Filename of the file that the init script creates
-</summary>
-</param>
-</interface>
-<interface name="init_daemon_runtime_file" lineno="689">
+<interface name="init_daemon_runtime_file" lineno="662">
<summary>
Mark the file type as a daemon runtime file, allowing initrc_t
to create it
@@ -117058,7 +100013,7 @@ Filename of the file that the init script creates
</summary>
</param>
</interface>
-<interface name="init_daemon_lock_file" lineno="722">
+<interface name="init_daemon_lock_file" lineno="695">
<summary>
Mark the file type as a daemon lock file, allowing initrc_t
to create it
@@ -117079,7 +100034,7 @@ Filename of the file that the init script creates
</summary>
</param>
</interface>
-<interface name="init_domtrans" lineno="744">
+<interface name="init_domtrans" lineno="717">
<summary>
Execute init (/sbin/init) with a domain transition.
</summary>
@@ -117089,7 +100044,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_pgm_spec_user_daemon_domain" lineno="768">
+<interface name="init_pgm_spec_user_daemon_domain" lineno="741">
<summary>
Execute init (/sbin/init) with a domain transition
to the provided domain.
@@ -117105,7 +100060,7 @@ The type to be used as a systemd --user domain.
</summary>
</param>
</interface>
-<interface name="init_exec" lineno="796">
+<interface name="init_exec" lineno="769">
<summary>
Execute the init program in the caller domain.
</summary>
@@ -117116,7 +100071,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_pgm_entrypoint" lineno="817">
+<interface name="init_pgm_entrypoint" lineno="790">
<summary>
Allow the init program to be an entrypoint
for the specified domain.
@@ -117128,7 +100083,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_exec_rc" lineno="846">
+<interface name="init_exec_rc" lineno="819">
<summary>
Execute the rc application in the caller domain.
</summary>
@@ -117149,7 +100104,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getpgid" lineno="865">
+<interface name="init_getpgid" lineno="838">
<summary>
Get the process group of init.
</summary>
@@ -117159,7 +100114,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signal" lineno="883">
+<interface name="init_signal" lineno="856">
<summary>
Send init a generic signal.
</summary>
@@ -117169,7 +100124,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signull" lineno="901">
+<interface name="init_signull" lineno="874">
<summary>
Send init a null signal.
</summary>
@@ -117179,7 +100134,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_sigchld" lineno="919">
+<interface name="init_sigchld" lineno="892">
<summary>
Send init a SIGCHLD signal.
</summary>
@@ -117189,7 +100144,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_setsched" lineno="937">
+<interface name="init_setsched" lineno="910">
<summary>
Set the nice level of init.
</summary>
@@ -117199,7 +100154,39 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stream_connect" lineno="955">
+<interface name="init_write_mountpoint_files" lineno="934">
+<summary>
+Write systemd mountpoint files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="exception_types" optional="true">
+<summary>
+The types to be excluded. Each type or attribute
+must be negated by the caller.
+</summary>
+</param>
+</interface>
+<interface name="init_create_mountpoint_files" lineno="958">
+<summary>
+Create systemd mountpoint files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="exception_types" optional="true">
+<summary>
+The types to be excluded. Each type or attribute
+must be negated by the caller.
+</summary>
+</param>
+</interface>
+<interface name="init_stream_connect" lineno="976">
<summary>
Connect to init with a unix socket.
</summary>
@@ -117209,7 +100196,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_unix_stream_socket_connectto" lineno="976">
+<interface name="init_unix_stream_socket_connectto" lineno="997">
<summary>
Connect to init with a unix socket.
Without any additional permissions.
@@ -117220,7 +100207,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_fds" lineno="1034">
+<interface name="init_use_fds" lineno="1055">
<summary>
Inherit and use file descriptors from init.
</summary>
@@ -117270,7 +100257,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="1"/>
</interface>
-<interface name="init_dontaudit_use_fds" lineno="1053">
+<interface name="init_dontaudit_use_fds" lineno="1074">
<summary>
Do not audit attempts to inherit file
descriptors from init.
@@ -117281,7 +100268,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_dgram_send" lineno="1072">
+<interface name="init_dgram_send" lineno="1093">
<summary>
Send messages to init unix datagram sockets.
</summary>
@@ -117292,7 +100279,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_rw_inherited_stream_socket" lineno="1092">
+<interface name="init_rw_inherited_stream_socket" lineno="1113">
<summary>
Read and write to inherited init unix streams.
</summary>
@@ -117302,7 +100289,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_stream_sockets" lineno="1111">
+<interface name="init_rw_stream_sockets" lineno="1132">
<summary>
Allow the specified domain to read/write to
init with unix domain stream sockets.
@@ -117313,7 +100300,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_search_keys" lineno="1129">
+<interface name="init_dontaudit_search_keys" lineno="1150">
<summary>
Do not audit attempts to search init keys.
</summary>
@@ -117323,7 +100310,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_system" lineno="1147">
+<interface name="init_start_system" lineno="1168">
<summary>
start service (systemd).
</summary>
@@ -117333,7 +100320,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_system" lineno="1165">
+<interface name="init_stop_system" lineno="1186">
<summary>
stop service (systemd).
</summary>
@@ -117343,7 +100330,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_system_status" lineno="1183">
+<interface name="init_get_system_status" lineno="1204">
<summary>
Get all service status (systemd).
</summary>
@@ -117353,7 +100340,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_enable" lineno="1201">
+<interface name="init_enable" lineno="1222">
<summary>
Enable all systemd services (systemd).
</summary>
@@ -117363,7 +100350,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_disable" lineno="1219">
+<interface name="init_disable" lineno="1240">
<summary>
Disable all services (systemd).
</summary>
@@ -117373,7 +100360,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_reload" lineno="1237">
+<interface name="init_reload" lineno="1258">
<summary>
Reload all services (systemd).
</summary>
@@ -117383,7 +100370,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_reboot_system" lineno="1255">
+<interface name="init_reboot_system" lineno="1276">
<summary>
Reboot the system (systemd).
</summary>
@@ -117393,7 +100380,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_shutdown_system" lineno="1273">
+<interface name="init_shutdown_system" lineno="1294">
<summary>
Shutdown (halt) the system (systemd).
</summary>
@@ -117403,7 +100390,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_service_status" lineno="1291">
+<interface name="init_service_status" lineno="1312">
<summary>
Allow specified domain to get init status
</summary>
@@ -117413,7 +100400,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="init_service_start" lineno="1310">
+<interface name="init_service_start" lineno="1331">
<summary>
Allow specified domain to get init start
</summary>
@@ -117423,7 +100410,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="init_dbus_chat" lineno="1330">
+<interface name="init_dbus_chat" lineno="1351">
<summary>
Send and receive messages from
systemd over dbus.
@@ -117434,7 +100421,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_run_bpf" lineno="1350">
+<interface name="init_run_bpf" lineno="1371">
<summary>
Run init BPF programs.
</summary>
@@ -117444,7 +100431,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_var_lib_links" lineno="1369">
+<interface name="init_read_var_lib_links" lineno="1390">
<summary>
read/follow symlinks under /var/lib/systemd/
</summary>
@@ -117454,7 +100441,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_search_var_lib_dirs" lineno="1388">
+<interface name="init_search_var_lib_dirs" lineno="1409">
<summary>
Search /var/lib/systemd/ dirs
</summary>
@@ -117464,7 +100451,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_list_var_lib_dirs" lineno="1407">
+<interface name="init_list_var_lib_dirs" lineno="1428">
<summary>
List /var/lib/systemd/ dir
</summary>
@@ -117474,7 +100461,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_relabel_var_lib_dirs" lineno="1425">
+<interface name="init_relabel_var_lib_dirs" lineno="1446">
<summary>
Relabel dirs in /var/lib/systemd/.
</summary>
@@ -117484,7 +100471,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_var_lib_files" lineno="1443">
+<interface name="init_manage_var_lib_files" lineno="1464">
<summary>
Manage files in /var/lib/systemd/.
</summary>
@@ -117494,7 +100481,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_var_lib_filetrans" lineno="1478">
+<interface name="init_var_lib_filetrans" lineno="1499">
<summary>
Create files in /var/lib/systemd
with an automatic type transition.
@@ -117520,93 +100507,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_search_pids" lineno="1497">
-<summary>
-Allow search directory in the /run/systemd directory. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_list_pids" lineno="1512">
-<summary>
-Allow listing of the /run/systemd directory. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_manage_pid_symlinks" lineno="1527">
-<summary>
-Create symbolic links in the /run/systemd directory. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_create_pid_files" lineno="1542">
-<summary>
-Create files in the /run/systemd directory. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_write_pid_files" lineno="1557">
-<summary>
-Write files in the /run/systemd directory. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_manage_pid_dirs" lineno="1573">
-<summary>
-Create, read, write, and delete
-directories in the /run/systemd directory. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_pid_filetrans" lineno="1603">
-<summary>
-Create files in an init PID directory. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="file_type">
-<summary>
-The type of the object to be created
-</summary>
-</param>
-<param name="object_class">
-<summary>
-The object class.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="init_search_runtime" lineno="1618">
+<interface name="init_search_runtime" lineno="1518">
<summary>
Search init runtime directories, e.g. /run/systemd.
</summary>
@@ -117616,7 +100517,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_list_runtime" lineno="1636">
+<interface name="init_list_runtime" lineno="1536">
<summary>
List init runtime directories, e.g. /run/systemd.
</summary>
@@ -117626,7 +100527,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_runtime_dirs" lineno="1656">
+<interface name="init_manage_runtime_dirs" lineno="1556">
<summary>
Create, read, write, and delete
directories in the /run/systemd directory.
@@ -117637,7 +100538,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_runtime_filetrans" lineno="1689">
+<interface name="init_runtime_filetrans" lineno="1589">
<summary>
Create files in an init runtime directory with a private type.
</summary>
@@ -117662,7 +100563,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_write_runtime_files" lineno="1708">
+<interface name="init_write_runtime_files" lineno="1608">
<summary>
Write init runtime files, e.g. in /run/systemd.
</summary>
@@ -117672,7 +100573,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_create_runtime_files" lineno="1726">
+<interface name="init_create_runtime_files" lineno="1626">
<summary>
Create init runtime files, e.g. in /run/systemd.
</summary>
@@ -117682,7 +100583,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_runtime_symlinks" lineno="1744">
+<interface name="init_manage_runtime_symlinks" lineno="1644">
<summary>
Create init runtime symbolic links, e.g. in /run/systemd.
</summary>
@@ -117692,7 +100593,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getattr_initctl" lineno="1762">
+<interface name="init_getattr_initctl" lineno="1662">
<summary>
Get the attributes of initctl.
</summary>
@@ -117702,7 +100603,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_getattr_initctl" lineno="1783">
+<interface name="init_dontaudit_getattr_initctl" lineno="1683">
<summary>
Do not audit attempts to get the
attributes of initctl.
@@ -117713,7 +100614,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_write_initctl" lineno="1801">
+<interface name="init_write_initctl" lineno="1701">
<summary>
Write to initctl.
</summary>
@@ -117723,7 +100624,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_telinit" lineno="1822">
+<interface name="init_telinit" lineno="1722">
<summary>
Use telinit (Read and write initctl).
</summary>
@@ -117734,7 +100635,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_rw_initctl" lineno="1855">
+<interface name="init_rw_initctl" lineno="1755">
<summary>
Read and write initctl.
</summary>
@@ -117744,7 +100645,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_rw_initctl" lineno="1876">
+<interface name="init_dontaudit_rw_initctl" lineno="1776">
<summary>
Do not audit attempts to read and
write initctl.
@@ -117755,7 +100656,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_script_file_entry_type" lineno="1895">
+<interface name="init_script_file_entry_type" lineno="1795">
<summary>
Make init scripts an entry point for
the specified domain.
@@ -117766,7 +100667,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_spec_domtrans_script" lineno="1918">
+<interface name="init_spec_domtrans_script" lineno="1818">
<summary>
Execute init scripts with a specified domain transition.
</summary>
@@ -117776,7 +100677,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_domtrans_script" lineno="1945">
+<interface name="init_domtrans_script" lineno="1845">
<summary>
Execute init scripts with an automatic domain transition.
</summary>
@@ -117786,7 +100687,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_domtrans_labeled_script" lineno="1980">
+<interface name="init_domtrans_labeled_script" lineno="1880">
<summary>
Execute labelled init scripts with an automatic domain transition.
</summary>
@@ -117796,7 +100697,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_script_file_domtrans" lineno="2026">
+<interface name="init_script_file_domtrans" lineno="1926">
<summary>
Execute a init script in a specified domain.
</summary>
@@ -117821,7 +100722,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="init_kill_scripts" lineno="2045">
+<interface name="init_kill_scripts" lineno="1945">
<summary>
Send a kill signal to init scripts.
</summary>
@@ -117831,7 +100732,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_script_service" lineno="2063">
+<interface name="init_manage_script_service" lineno="1963">
<summary>
Allow manage service for initrc_exec_t scripts
</summary>
@@ -117841,7 +100742,7 @@ Target domain
</summary>
</param>
</interface>
-<interface name="init_labeled_script_domtrans" lineno="2088">
+<interface name="init_labeled_script_domtrans" lineno="1988">
<summary>
Transition to the init script domain
on a specified labeled init script.
@@ -117857,7 +100758,7 @@ Labeled init script file.
</summary>
</param>
</interface>
-<interface name="init_all_labeled_script_domtrans" lineno="2110">
+<interface name="init_all_labeled_script_domtrans" lineno="2010">
<summary>
Transition to the init script domain
for all labeled init script types
@@ -117868,7 +100769,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_get_script_status" lineno="2128">
+<interface name="init_get_script_status" lineno="2028">
<summary>
Allow getting service status of initrc_exec_t scripts
</summary>
@@ -117878,7 +100779,7 @@ Target domain
</summary>
</param>
</interface>
-<interface name="init_startstop_service" lineno="2168">
+<interface name="init_startstop_service" lineno="2068">
<summary>
Allow the role to start and stop
labeled services.
@@ -117909,7 +100810,7 @@ Systemd unit file type.
</summary>
</param>
</interface>
-<interface name="init_run_daemon" lineno="2224">
+<interface name="init_run_daemon" lineno="2124">
<summary>
Start and stop daemon programs directly.
</summary>
@@ -117931,7 +100832,7 @@ The role to be performing this action.
</summary>
</param>
</interface>
-<interface name="init_startstop_all_script_services" lineno="2246">
+<interface name="init_startstop_all_script_services" lineno="2146">
<summary>
Start and stop init_script_file_type services
</summary>
@@ -117941,7 +100842,7 @@ domain that can start and stop the services
</summary>
</param>
</interface>
-<interface name="init_read_state" lineno="2265">
+<interface name="init_read_state" lineno="2165">
<summary>
Read the process state (/proc/pid) of init.
</summary>
@@ -117951,7 +100852,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_read_state" lineno="2285">
+<interface name="init_dontaudit_read_state" lineno="2185">
<summary>
Dontaudit read the process state (/proc/pid) of init.
</summary>
@@ -117961,7 +100862,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_ptrace" lineno="2306">
+<interface name="init_ptrace" lineno="2206">
<summary>
Ptrace init
</summary>
@@ -117972,7 +100873,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_getattr" lineno="2325">
+<interface name="init_getattr" lineno="2225">
<summary>
get init process stats
</summary>
@@ -117983,7 +100884,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_read_script_pipes" lineno="2343">
+<interface name="init_read_script_pipes" lineno="2243">
<summary>
Read an init script unnamed pipe.
</summary>
@@ -117993,7 +100894,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_write_script_pipes" lineno="2361">
+<interface name="init_write_script_pipes" lineno="2261">
<summary>
Write an init script unnamed pipe.
</summary>
@@ -118003,7 +100904,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getattr_script_files" lineno="2379">
+<interface name="init_getattr_script_files" lineno="2279">
<summary>
Get the attribute of init script entrypoint files.
</summary>
@@ -118013,7 +100914,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_files" lineno="2398">
+<interface name="init_read_script_files" lineno="2298">
<summary>
Read init scripts.
</summary>
@@ -118023,7 +100924,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_exec_script_files" lineno="2417">
+<interface name="init_exec_script_files" lineno="2317">
<summary>
Execute init scripts in the caller domain.
</summary>
@@ -118033,7 +100934,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getattr_all_script_files" lineno="2436">
+<interface name="init_getattr_all_script_files" lineno="2336">
<summary>
Get the attribute of all init script entrypoint files.
</summary>
@@ -118043,7 +100944,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_all_script_files" lineno="2455">
+<interface name="init_read_all_script_files" lineno="2355">
<summary>
Read all init script files.
</summary>
@@ -118053,7 +100954,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_read_all_script_files" lineno="2479">
+<interface name="init_dontaudit_read_all_script_files" lineno="2379">
<summary>
Dontaudit read all init script files.
</summary>
@@ -118063,7 +100964,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_exec_all_script_files" lineno="2497">
+<interface name="init_exec_all_script_files" lineno="2397">
<summary>
Execute all init scripts in the caller domain.
</summary>
@@ -118073,7 +100974,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_state" lineno="2516">
+<interface name="init_read_script_state" lineno="2416">
<summary>
Read the process state (/proc/pid) of the init scripts.
</summary>
@@ -118083,7 +100984,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_script_fds" lineno="2535">
+<interface name="init_use_script_fds" lineno="2435">
<summary>
Inherit and use init script file descriptors.
</summary>
@@ -118093,7 +100994,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_use_script_fds" lineno="2554">
+<interface name="init_dontaudit_use_script_fds" lineno="2454">
<summary>
Do not audit attempts to inherit
init script file descriptors.
@@ -118104,7 +101005,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_search_script_keys" lineno="2572">
+<interface name="init_search_script_keys" lineno="2472">
<summary>
Search init script keys.
</summary>
@@ -118114,7 +101015,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getpgid_script" lineno="2590">
+<interface name="init_getpgid_script" lineno="2490">
<summary>
Get the process group ID of init scripts.
</summary>
@@ -118124,7 +101025,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_sigchld_script" lineno="2608">
+<interface name="init_sigchld_script" lineno="2508">
<summary>
Send SIGCHLD signals to init scripts.
</summary>
@@ -118134,7 +101035,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signal_script" lineno="2626">
+<interface name="init_signal_script" lineno="2526">
<summary>
Send generic signals to init scripts.
</summary>
@@ -118144,7 +101045,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signull_script" lineno="2644">
+<interface name="init_signull_script" lineno="2544">
<summary>
Send null signals to init scripts.
</summary>
@@ -118154,7 +101055,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_script_pipes" lineno="2662">
+<interface name="init_rw_script_pipes" lineno="2562">
<summary>
Read and write init script unnamed pipes.
</summary>
@@ -118164,7 +101065,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stream_connect_script" lineno="2681">
+<interface name="init_stream_connect_script" lineno="2581">
<summary>
Allow the specified domain to connect to
init scripts with a unix socket.
@@ -118175,7 +101076,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_script_stream_sockets" lineno="2700">
+<interface name="init_rw_script_stream_sockets" lineno="2600">
<summary>
Allow the specified domain to read/write to
init scripts with a unix domain stream sockets.
@@ -118186,7 +101087,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_stream_connect_script" lineno="2719">
+<interface name="init_dontaudit_stream_connect_script" lineno="2619">
<summary>
Dont audit the specified domain connecting to
init scripts with a unix domain stream socket.
@@ -118197,7 +101098,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_dbus_send_script" lineno="2736">
+<interface name="init_dbus_send_script" lineno="2636">
<summary>
Send messages to init scripts over dbus.
</summary>
@@ -118207,7 +101108,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dbus_chat_script" lineno="2756">
+<interface name="init_dbus_chat_script" lineno="2656">
<summary>
Send and receive messages from
init scripts over dbus.
@@ -118218,7 +101119,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_script_ptys" lineno="2785">
+<interface name="init_use_script_ptys" lineno="2685">
<summary>
Read and write the init script pty.
</summary>
@@ -118237,7 +101138,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_inherited_script_ptys" lineno="2804">
+<interface name="init_use_inherited_script_ptys" lineno="2704">
<summary>
Read and write inherited init script ptys.
</summary>
@@ -118247,7 +101148,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_use_script_ptys" lineno="2826">
+<interface name="init_dontaudit_use_script_ptys" lineno="2726">
<summary>
Do not audit attempts to read and
write the init script pty.
@@ -118258,7 +101159,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_getattr_script_status_files" lineno="2845">
+<interface name="init_getattr_script_status_files" lineno="2745">
<summary>
Get the attributes of init script
status files.
@@ -118269,7 +101170,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_read_script_status_files" lineno="2864">
+<interface name="init_dontaudit_read_script_status_files" lineno="2764">
<summary>
Do not audit attempts to read init script
status files.
@@ -118280,7 +101181,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_search_run" lineno="2883">
+<interface name="init_search_run" lineno="2783">
<summary>
Search the /run/systemd directory.
</summary>
@@ -118290,7 +101191,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_tmp_files" lineno="2902">
+<interface name="init_read_script_tmp_files" lineno="2802">
<summary>
Read init script temporary data.
</summary>
@@ -118300,7 +101201,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_inherited_script_tmp_files" lineno="2921">
+<interface name="init_rw_inherited_script_tmp_files" lineno="2821">
<summary>
Read and write init script inherited temporary data.
</summary>
@@ -118310,7 +101211,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_script_tmp_files" lineno="2939">
+<interface name="init_rw_script_tmp_files" lineno="2839">
<summary>
Read and write init script temporary data.
</summary>
@@ -118320,7 +101221,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_script_tmp_filetrans" lineno="2974">
+<interface name="init_script_tmp_filetrans" lineno="2874">
<summary>
Create files in a init script
temporary data directory.
@@ -118346,7 +101247,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_getattr_utmp" lineno="2993">
+<interface name="init_getattr_utmp" lineno="2893">
<summary>
Get the attributes of init script process id files.
</summary>
@@ -118356,7 +101257,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_utmp" lineno="3011">
+<interface name="init_read_utmp" lineno="2911">
<summary>
Read utmp.
</summary>
@@ -118366,7 +101267,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_write_utmp" lineno="3030">
+<interface name="init_dontaudit_write_utmp" lineno="2930">
<summary>
Do not audit attempts to write utmp.
</summary>
@@ -118376,7 +101277,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_write_utmp" lineno="3048">
+<interface name="init_write_utmp" lineno="2948">
<summary>
Write to utmp.
</summary>
@@ -118386,7 +101287,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_lock_utmp" lineno="3068">
+<interface name="init_dontaudit_lock_utmp" lineno="2968">
<summary>
Do not audit attempts to lock
init script pid files.
@@ -118397,7 +101298,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_rw_utmp" lineno="3086">
+<interface name="init_rw_utmp" lineno="2986">
<summary>
Read and write utmp.
</summary>
@@ -118407,7 +101308,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_rw_utmp" lineno="3105">
+<interface name="init_dontaudit_rw_utmp" lineno="3005">
<summary>
Do not audit attempts to read and write utmp.
</summary>
@@ -118417,7 +101318,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_manage_utmp" lineno="3123">
+<interface name="init_manage_utmp" lineno="3023">
<summary>
Create, read, write, and delete utmp.
</summary>
@@ -118427,7 +101328,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_watch_utmp" lineno="3142">
+<interface name="init_watch_utmp" lineno="3042">
<summary>
Add a watch on utmp.
</summary>
@@ -118437,7 +101338,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_relabel_utmp" lineno="3160">
+<interface name="init_relabel_utmp" lineno="3060">
<summary>
Relabel utmp.
</summary>
@@ -118447,7 +101348,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_runtime_filetrans_utmp" lineno="3179">
+<interface name="init_runtime_filetrans_utmp" lineno="3079">
<summary>
Create files in /var/run with the
utmp file type.
@@ -118458,7 +101359,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_create_runtime_dirs" lineno="3197">
+<interface name="init_create_runtime_dirs" lineno="3097">
<summary>
Create a directory in the /run/systemd directory.
</summary>
@@ -118468,7 +101369,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_runtime_files" lineno="3216">
+<interface name="init_read_runtime_files" lineno="3116">
<summary>
Read init_runtime_t files
</summary>
@@ -118478,7 +101379,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_rename_runtime_files" lineno="3234">
+<interface name="init_rename_runtime_files" lineno="3134">
<summary>
Rename init_runtime_t files
</summary>
@@ -118488,7 +101389,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_setattr_runtime_files" lineno="3252">
+<interface name="init_setattr_runtime_files" lineno="3152">
<summary>
Setattr init_runtime_t files
</summary>
@@ -118498,7 +101399,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_delete_runtime_files" lineno="3270">
+<interface name="init_delete_runtime_files" lineno="3170">
<summary>
Delete init_runtime_t files
</summary>
@@ -118508,7 +101409,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_write_runtime_socket" lineno="3289">
+<interface name="init_write_runtime_socket" lineno="3189">
<summary>
Allow the specified domain to write to
init sock file.
@@ -118519,7 +101420,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_runtime_pipes" lineno="3307">
+<interface name="init_dontaudit_write_runtime_socket" lineno="3208">
+<summary>
+Do not audit attempts to write to
+init sock files.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="init_read_runtime_pipes" lineno="3226">
<summary>
Read init unnamed pipes.
</summary>
@@ -118529,7 +101441,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_runtime_symlinks" lineno="3325">
+<interface name="init_read_runtime_symlinks" lineno="3244">
<summary>
read systemd unit symlinks (usually under /run/systemd/units/)
</summary>
@@ -118539,7 +101451,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_tcp_recvfrom_all_daemons" lineno="3343">
+<interface name="init_tcp_recvfrom_all_daemons" lineno="3262">
<summary>
Allow the specified domain to connect to daemon with a tcp socket
</summary>
@@ -118549,7 +101461,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_udp_recvfrom_all_daemons" lineno="3361">
+<interface name="init_udp_recvfrom_all_daemons" lineno="3280">
<summary>
Allow the specified domain to connect to daemon with a udp socket
</summary>
@@ -118559,7 +101471,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_status_files" lineno="3380">
+<interface name="init_read_script_status_files" lineno="3299">
<summary>
Allow reading the init script state files
</summary>
@@ -118569,7 +101481,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="init_relabelto_script_state" lineno="3398">
+<interface name="init_relabelto_script_state" lineno="3317">
<summary>
Label to init script status files
</summary>
@@ -118579,7 +101491,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="init_script_readable_type" lineno="3417">
+<interface name="init_script_readable_type" lineno="3336">
<summary>
Mark as a readable type for the initrc_t domain
</summary>
@@ -118589,7 +101501,7 @@ Type that initrc_t needs read access to
</summary>
</param>
</interface>
-<interface name="init_search_units" lineno="3435">
+<interface name="init_search_units" lineno="3354">
<summary>
Search systemd unit dirs.
</summary>
@@ -118599,7 +101511,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_list_unit_dirs" lineno="3460">
+<interface name="init_list_unit_dirs" lineno="3379">
<summary>
List systemd unit dirs.
</summary>
@@ -118609,7 +101521,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getattr_generic_units_files" lineno="3480">
+<interface name="init_getattr_generic_units_files" lineno="3399">
<summary>
Get the attributes of systemd unit files
</summary>
@@ -118619,7 +101531,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_generic_units_files" lineno="3498">
+<interface name="init_read_generic_units_files" lineno="3417">
<summary>
Read systemd unit files
</summary>
@@ -118629,7 +101541,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_generic_units_symlinks" lineno="3516">
+<interface name="init_read_generic_units_symlinks" lineno="3435">
<summary>
Read systemd unit links
</summary>
@@ -118639,7 +101551,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_generic_units_status" lineno="3534">
+<interface name="init_get_generic_units_status" lineno="3453">
<summary>
Get status of generic systemd units.
</summary>
@@ -118649,7 +101561,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_generic_units" lineno="3553">
+<interface name="init_start_generic_units" lineno="3472">
<summary>
Start generic systemd units.
</summary>
@@ -118659,7 +101571,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_generic_units" lineno="3572">
+<interface name="init_stop_generic_units" lineno="3491">
<summary>
Stop generic systemd units.
</summary>
@@ -118669,7 +101581,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_reload_generic_units" lineno="3591">
+<interface name="init_reload_generic_units" lineno="3510">
<summary>
Reload generic systemd units.
</summary>
@@ -118679,7 +101591,37 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_transient_units_status" lineno="3610">
+<interface name="init_get_runtime_units_status" lineno="3529">
+<summary>
+Get the status of runtime systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_start_runtime_units" lineno="3548">
+<summary>
+Start runtime systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_stop_runtime_units" lineno="3567">
+<summary>
+Stop runtime systemd units.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_get_transient_units_status" lineno="3586">
<summary>
Get status of transient systemd units.
</summary>
@@ -118689,7 +101631,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_transient_units" lineno="3629">
+<interface name="init_start_transient_units" lineno="3605">
<summary>
Start transient systemd units.
</summary>
@@ -118699,7 +101641,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_transient_units" lineno="3648">
+<interface name="init_stop_transient_units" lineno="3624">
<summary>
Stop transient systemd units.
</summary>
@@ -118709,7 +101651,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_reload_transient_units" lineno="3667">
+<interface name="init_reload_transient_units" lineno="3643">
<summary>
Reload transient systemd units.
</summary>
@@ -118719,7 +101661,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_all_units_status" lineno="3687">
+<interface name="init_get_all_units_status" lineno="3663">
<summary>
Get status of all systemd units.
</summary>
@@ -118729,7 +101671,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_all_units" lineno="3706">
+<interface name="init_manage_all_units" lineno="3682">
<summary>
All perms on all systemd units.
</summary>
@@ -118739,7 +101681,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_all_units" lineno="3726">
+<interface name="init_start_all_units" lineno="3702">
<summary>
Start all systemd units.
</summary>
@@ -118749,7 +101691,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_all_units" lineno="3745">
+<interface name="init_stop_all_units" lineno="3721">
<summary>
Stop all systemd units.
</summary>
@@ -118759,7 +101701,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_reload_all_units" lineno="3764">
+<interface name="init_reload_all_units" lineno="3740">
<summary>
Reload all systemd units.
</summary>
@@ -118769,7 +101711,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_all_unit_files" lineno="3783">
+<interface name="init_manage_all_unit_files" lineno="3759">
<summary>
Manage systemd unit dirs and the files in them
</summary>
@@ -118779,7 +101721,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_linkable_keyring" lineno="3804">
+<interface name="init_linkable_keyring" lineno="3780">
<summary>
Associate the specified domain to be a domain whose
keyring init should be allowed to link.
@@ -118790,7 +101732,7 @@ Domain whose keyring init should be allowed to link.
</summary>
</param>
</interface>
-<interface name="init_admin" lineno="3822">
+<interface name="init_admin" lineno="3798">
<summary>
Allow unconfined access to send instructions to init
</summary>
@@ -118800,7 +101742,7 @@ Target domain
</summary>
</param>
</interface>
-<interface name="init_getrlimit" lineno="3854">
+<interface name="init_getrlimit" lineno="3830">
<summary>
Allow getting init_t rlimit
</summary>
@@ -118817,6 +101759,13 @@ Enable support for upstart as the init program.
</p>
</desc>
</tunable>
+<tunable name="init_create_mountpoints" dftval="false">
+<desc>
+<p>
+Enable systemd to create mountpoints.
+</p>
+</desc>
+</tunable>
<tunable name="init_daemons_use_tty" dftval="false">
<desc>
<p>
@@ -118967,28 +101916,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ipsec_write_pid" lineno="259">
-<summary>
-write the ipsec_runtime_t files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="ipsec_manage_pid" lineno="275">
-<summary>
-Create, read, write, and delete the IPSEC pid files.
-(Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="ipsec_write_runtime_files" lineno="290">
+<interface name="ipsec_write_runtime_files" lineno="259">
<summary>
Write ipsec runtime files.
</summary>
@@ -118998,7 +101926,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ipsec_manage_runtime_files" lineno="309">
+<interface name="ipsec_manage_runtime_files" lineno="278">
<summary>
Create, read, write, and delete the IPSEC runtime files.
</summary>
@@ -119008,7 +101936,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ipsec_domtrans_racoon" lineno="328">
+<interface name="ipsec_domtrans_racoon" lineno="297">
<summary>
Execute racoon in the racoon domain.
</summary>
@@ -119018,7 +101946,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ipsec_run_racoon" lineno="352">
+<interface name="ipsec_run_racoon" lineno="321">
<summary>
Execute racoon and allow the specified role the domain.
</summary>
@@ -119034,7 +101962,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="ipsec_domtrans_setkey" lineno="371">
+<interface name="ipsec_domtrans_setkey" lineno="340">
<summary>
Execute setkey in the setkey domain.
</summary>
@@ -119044,7 +101972,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ipsec_run_setkey" lineno="395">
+<interface name="ipsec_run_setkey" lineno="364">
<summary>
Execute setkey and allow the specified role the domains.
</summary>
@@ -119060,7 +101988,7 @@ Role allowed access..
</param>
<rolecap/>
</interface>
-<interface name="ipsec_admin" lineno="421">
+<interface name="ipsec_admin" lineno="390">
<summary>
All of the rules required to
administrate an ipsec environment.
@@ -119124,7 +102052,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_initrc_domtrans" lineno="80">
+<interface name="iptables_read_state" lineno="80">
+<summary>
+Read the process state (/proc/pid)
+of iptables.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="iptables_initrc_domtrans" lineno="99">
<summary>
Execute iptables init scripts in
the init script domain.
@@ -119135,7 +102074,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="iptables_setattr_config" lineno="98">
+<interface name="iptables_setattr_config" lineno="117">
<summary>
Set the attributes of iptables config files.
</summary>
@@ -119145,7 +102084,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_read_config" lineno="117">
+<interface name="iptables_read_config" lineno="136">
<summary>
Read iptables config files.
</summary>
@@ -119155,7 +102094,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_etc_filetrans_config" lineno="138">
+<interface name="iptables_etc_filetrans_config" lineno="157">
<summary>
Create files in /etc with the type used for
the iptables config files.
@@ -119166,7 +102105,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_manage_config" lineno="156">
+<interface name="iptables_manage_config" lineno="175">
<summary>
Manage iptables config files.
</summary>
@@ -119176,17 +102115,37 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_dontaudit_read_pids" lineno="175">
+<interface name="iptables_getattr_runtime_files" lineno="194">
<summary>
-dontaudit reading iptables_runtime_t (Deprecated)
+Get the attributes of iptables runtime files.
</summary>
<param name="domain">
<summary>
-Domain to not audit.
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="iptables_read_runtime_files" lineno="212">
+<summary>
+Read iptables runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_dontaudit_read_runtime_files" lineno="190">
+<interface name="iptables_mounton_runtime_files" lineno="230">
+<summary>
+Mount on iptables runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="iptables_dontaudit_read_runtime_files" lineno="248">
<summary>
Do not audit reading iptables runtime files.
</summary>
@@ -119196,7 +102155,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="iptables_startstop" lineno="208">
+<interface name="iptables_startstop" lineno="266">
<summary>
Allow specified domain to start and stop iptables service
</summary>
@@ -119206,7 +102165,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_status" lineno="227">
+<interface name="iptables_status" lineno="285">
<summary>
Allow specified domain to get status of iptables service
</summary>
@@ -119216,7 +102175,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_admin" lineno="254">
+<interface name="iptables_admin" lineno="312">
<summary>
All of the rules required to
administrate an iptables
@@ -119455,7 +102414,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_dontaudit_setattr_lib_files" lineno="289">
+<interface name="libs_watch_lib_dirs" lineno="289">
+<summary>
+Watch /usr/lib directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="libs_dontaudit_setattr_lib_files" lineno="307">
<summary>
dontaudit attempts to setattr on library files
</summary>
@@ -119465,7 +102434,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="libs_read_lib_files" lineno="308">
+<interface name="libs_read_lib_files" lineno="326">
<summary>
Read files in the library directories, such
as static libraries.
@@ -119476,7 +102445,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_exec_lib_files" lineno="329">
+<interface name="libs_exec_lib_files" lineno="347">
<summary>
Execute library scripts in the caller domain.
</summary>
@@ -119486,7 +102455,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_manage_lib_files" lineno="352">
+<interface name="libs_manage_lib_files" lineno="370">
<summary>
Create, read, write, and delete generic
files in library directories.
@@ -119497,7 +102466,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_dontaudit_manage_lib_files" lineno="371">
+<interface name="libs_dontaudit_manage_lib_files" lineno="389">
<summary>
Do not audit attempts to create, read, write,
and delete generic files in library directories.
@@ -119508,7 +102477,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="libs_relabelto_lib_files" lineno="389">
+<interface name="libs_relabelto_lib_files" lineno="407">
<summary>
Relabel files to the type used in library directories.
</summary>
@@ -119518,7 +102487,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_relabel_lib_files" lineno="409">
+<interface name="libs_relabel_lib_files" lineno="427">
<summary>
Relabel to and from the type used
for generic lib files.
@@ -119529,7 +102498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_delete_lib_symlinks" lineno="428">
+<interface name="libs_delete_lib_symlinks" lineno="446">
<summary>
Delete generic symlinks in library directories.
</summary>
@@ -119539,7 +102508,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_manage_lib_symlinks" lineno="446">
+<interface name="libs_manage_lib_symlinks" lineno="464">
<summary>
Manage generic symlinks in library directories.
</summary>
@@ -119549,7 +102518,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_manage_shared_libs" lineno="465">
+<interface name="libs_manage_shared_libs" lineno="483">
<summary>
Create, read, write, and delete shared libraries.
</summary>
@@ -119559,7 +102528,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_use_shared_libs" lineno="483">
+<interface name="libs_use_shared_libs" lineno="501">
<summary>
Load and execute functions from shared libraries.
</summary>
@@ -119569,7 +102538,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_legacy_use_shared_libs" lineno="506">
+<interface name="libs_legacy_use_shared_libs" lineno="524">
<summary>
Load and execute functions from shared libraries,
with legacy support.
@@ -119580,7 +102549,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_relabel_shared_libs" lineno="527">
+<interface name="libs_relabel_shared_libs" lineno="545">
<summary>
Relabel to and from the type used for
shared libraries.
@@ -119591,7 +102560,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="560">
+<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="578">
<summary>
Create an object in etc with a type transition to
the ld_so_cache_t type
@@ -119614,7 +102583,7 @@ Name of the resource created for which a type transition occurs
</summary>
</param>
</interface>
-<interface name="libs_lib_filetrans" lineno="594">
+<interface name="libs_lib_filetrans" lineno="612">
<summary>
Create an object in the generic lib location with a type transition
to the provided type
@@ -119640,7 +102609,7 @@ Name of the resource created for which a type transition should occur
</summary>
</param>
</interface>
-<interface name="libs_relabel_lib_dirs" lineno="615">
+<interface name="libs_relabel_lib_dirs" lineno="633">
<summary>
Relabel to and from the type used
for generic lib directories.
@@ -120158,7 +103127,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_use_syslogd_fd" lineno="721">
+<interface name="logging_use_syslogd_fd" lineno="722">
<summary>
Allow domain to use a file descriptor
from syslogd.
@@ -120169,7 +103138,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_relabelto_devlog_sock_files" lineno="740">
+<interface name="logging_relabelto_devlog_sock_files" lineno="741">
<summary>
Allow domain to relabelto devlog sock_files
</summary>
@@ -120180,7 +103149,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_create_devlog" lineno="758">
+<interface name="logging_create_devlog" lineno="759">
<summary>
Connect to the syslog control unix stream socket.
</summary>
@@ -120190,7 +103159,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_read_audit_config" lineno="779">
+<interface name="logging_read_audit_config" lineno="780">
<summary>
Read the auditd configuration files.
</summary>
@@ -120201,7 +103170,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_dontaudit_search_audit_config" lineno="802">
+<interface name="logging_dontaudit_search_audit_config" lineno="803">
<summary>
dontaudit search of auditd configuration files.
</summary>
@@ -120212,7 +103181,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="logging_read_syslog_config" lineno="821">
+<interface name="logging_read_syslog_config" lineno="822">
<summary>
Read syslog configuration files.
</summary>
@@ -120223,7 +103192,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_watch_runtime_dirs" lineno="839">
+<interface name="logging_watch_runtime_dirs" lineno="840">
<summary>
Watch syslog runtime dirs.
</summary>
@@ -120233,7 +103202,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_delete_devlog_socket" lineno="858">
+<interface name="logging_delete_devlog_socket" lineno="859">
<summary>
Delete the syslog socket files
</summary>
@@ -120244,17 +103213,7 @@ Domain allowed access
</param>
<rolecap/>
</interface>
-<interface name="logging_manage_pid_sockets" lineno="876">
-<summary>
-Create, read, write, and delete syslog PID sockets. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="logging_manage_runtime_sockets" lineno="891">
+<interface name="logging_manage_runtime_sockets" lineno="877">
<summary>
Create, read, write, and delete syslog PID sockets.
</summary>
@@ -120264,7 +103223,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_search_logs" lineno="912">
+<interface name="logging_search_logs" lineno="898">
<summary>
Allows the domain to open a file in the
log directory, but does not allow the listing
@@ -120276,7 +103235,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_dontaudit_search_logs" lineno="932">
+<interface name="logging_dontaudit_search_logs" lineno="918">
<summary>
Do not audit attempts to search the var log directory.
</summary>
@@ -120286,7 +103245,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="logging_list_logs" lineno="950">
+<interface name="logging_list_logs" lineno="936">
<summary>
List the contents of the generic log directory (/var/log).
</summary>
@@ -120296,7 +103255,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_rw_generic_log_dirs" lineno="970">
+<interface name="logging_rw_generic_log_dirs" lineno="956">
<summary>
Read and write the generic log directory (/var/log).
</summary>
@@ -120306,7 +103265,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_search_all_logs" lineno="991">
+<interface name="logging_search_all_logs" lineno="977">
<summary>
Search through all log dirs.
</summary>
@@ -120317,7 +103276,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_setattr_all_log_dirs" lineno="1010">
+<interface name="logging_setattr_all_log_dirs" lineno="996">
<summary>
Set attributes on all log dirs.
</summary>
@@ -120328,7 +103287,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_dontaudit_getattr_all_logs" lineno="1029">
+<interface name="logging_dontaudit_getattr_all_logs" lineno="1015">
<summary>
Do not audit attempts to get the attributes
of any log files.
@@ -120339,7 +103298,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="logging_getattr_all_logs" lineno="1047">
+<interface name="logging_getattr_all_logs" lineno="1033">
<summary>
Read the attributes of any log file
</summary>
@@ -120349,7 +103308,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="logging_append_all_logs" lineno="1065">
+<interface name="logging_append_all_logs" lineno="1051">
<summary>
Append to all log files.
</summary>
@@ -120359,7 +103318,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_append_all_inherited_logs" lineno="1086">
+<interface name="logging_append_all_inherited_logs" lineno="1072">
<summary>
Append to all log files.
</summary>
@@ -120369,7 +103328,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_read_all_logs" lineno="1105">
+<interface name="logging_read_all_logs" lineno="1091">
<summary>
Read all log files.
</summary>
@@ -120380,7 +103339,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_watch_all_logs" lineno="1126">
+<interface name="logging_watch_all_logs" lineno="1112">
<summary>
Watch all log files.
</summary>
@@ -120391,7 +103350,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_exec_all_logs" lineno="1146">
+<interface name="logging_exec_all_logs" lineno="1132">
<summary>
Execute all log files in the caller domain.
</summary>
@@ -120401,7 +103360,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_rw_all_logs" lineno="1166">
+<interface name="logging_rw_all_logs" lineno="1152">
<summary>
read/write to all log files.
</summary>
@@ -120411,7 +103370,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_manage_all_logs" lineno="1186">
+<interface name="logging_manage_all_logs" lineno="1172">
<summary>
Create, read, write, and delete all log files.
</summary>
@@ -120422,7 +103381,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_manage_generic_log_dirs" lineno="1207">
+<interface name="logging_manage_generic_log_dirs" lineno="1193">
<summary>
Create, read, write, and delete generic log directories.
</summary>
@@ -120433,7 +103392,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_relabel_generic_log_dirs" lineno="1227">
+<interface name="logging_relabel_generic_log_dirs" lineno="1213">
<summary>
Relabel from and to generic log directory type.
</summary>
@@ -120444,7 +103403,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_read_generic_logs" lineno="1247">
+<interface name="logging_read_generic_logs" lineno="1233">
<summary>
Read generic log files.
</summary>
@@ -120455,7 +103414,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_mmap_generic_logs" lineno="1268">
+<interface name="logging_mmap_generic_logs" lineno="1254">
<summary>
Map generic log files.
</summary>
@@ -120466,7 +103425,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_write_generic_logs" lineno="1286">
+<interface name="logging_write_generic_logs" lineno="1272">
<summary>
Write generic log files.
</summary>
@@ -120476,7 +103435,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_dontaudit_write_generic_logs" lineno="1307">
+<interface name="logging_dontaudit_write_generic_logs" lineno="1293">
<summary>
Dontaudit Write generic log files.
</summary>
@@ -120486,7 +103445,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="logging_rw_generic_logs" lineno="1325">
+<interface name="logging_rw_generic_logs" lineno="1311">
<summary>
Read and write generic log files.
</summary>
@@ -120496,7 +103455,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_manage_generic_logs" lineno="1348">
+<interface name="logging_manage_generic_logs" lineno="1334">
<summary>
Create, read, write, and delete
generic log files.
@@ -120508,7 +103467,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_watch_generic_logs_dir" lineno="1367">
+<interface name="logging_watch_generic_logs_dir" lineno="1353">
<summary>
Watch generic log dirs.
</summary>
@@ -120518,7 +103477,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_admin_audit" lineno="1392">
+<interface name="logging_admin_audit" lineno="1378">
<summary>
All of the rules required to administrate
the audit environment
@@ -120535,7 +103494,7 @@ User role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_admin_syslog" lineno="1436">
+<interface name="logging_admin_syslog" lineno="1422">
<summary>
All of the rules required to administrate
the syslog environment
@@ -120552,7 +103511,7 @@ User role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_admin" lineno="1492">
+<interface name="logging_admin" lineno="1478">
<summary>
All of the rules required to administrate
the logging environment
@@ -120569,7 +103528,7 @@ User role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_syslog_managed_log_file" lineno="1515">
+<interface name="logging_syslog_managed_log_file" lineno="1501">
<summary>
Mark the type as a syslog managed log file
and introduce the proper file transition when
@@ -120587,7 +103546,7 @@ Name to use for the file
</summary>
</param>
</interface>
-<interface name="logging_syslog_managed_log_dir" lineno="1554">
+<interface name="logging_syslog_managed_log_dir" lineno="1540">
<summary>
Mark the type as a syslog managed log dir
and introduce the proper file transition when
@@ -120614,7 +103573,7 @@ Name to use for the directory
</summary>
</param>
</interface>
-<interface name="logging_mmap_journal" lineno="1576">
+<interface name="logging_mmap_journal" lineno="1562">
<summary>
Map files in /run/log/journal/ directory.
</summary>
@@ -120727,17 +103686,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="lvm_rw_inherited_pid_pipes" lineno="185">
-<summary>
-Read and write a lvm unnamed pipe. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="lvm_admin" lineno="205">
+<interface name="lvm_admin" lineno="191">
<summary>
All of the rules required to
administrate an lvm environment.
@@ -120901,7 +103850,18 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_read_generic_tls_privkey" lineno="235">
+<interface name="miscfiles_mounton_generic_cert_dirs" lineno="234">
+<summary>
+Mount on generic SSL/TLS certificate directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="miscfiles_read_generic_tls_privkey" lineno="254">
<summary>
Read generic SSL/TLS private
keys.
@@ -120913,7 +103873,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_manage_generic_tls_privkey_dirs" lineno="256">
+<interface name="miscfiles_manage_generic_tls_privkey_dirs" lineno="275">
<summary>
Manage generic SSL/TLS private
keys.
@@ -120924,7 +103884,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_manage_generic_tls_privkey_files" lineno="276">
+<interface name="miscfiles_manage_generic_tls_privkey_files" lineno="295">
<summary>
Manage generic SSL/TLS private
keys.
@@ -120936,7 +103896,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_manage_generic_tls_privkey_symlinks" lineno="297">
+<interface name="miscfiles_manage_generic_tls_privkey_symlinks" lineno="316">
<summary>
Manage generic SSL/TLS private
keys.
@@ -120948,7 +103908,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_read_fonts" lineno="316">
+<interface name="miscfiles_read_fonts" lineno="335">
<summary>
Read fonts.
</summary>
@@ -120959,7 +103919,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_setattr_fonts_dirs" lineno="347">
+<interface name="miscfiles_setattr_fonts_dirs" lineno="366">
<summary>
Set the attributes on a fonts directory.
</summary>
@@ -120970,7 +103930,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_dontaudit_setattr_fonts_dirs" lineno="367">
+<interface name="miscfiles_dontaudit_setattr_fonts_dirs" lineno="386">
<summary>
Do not audit attempts to set the attributes
on a fonts directory.
@@ -120982,7 +103942,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_dontaudit_write_fonts" lineno="386">
+<interface name="miscfiles_dontaudit_write_fonts" lineno="405">
<summary>
Do not audit attempts to write fonts.
</summary>
@@ -120993,7 +103953,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_manage_fonts" lineno="406">
+<interface name="miscfiles_manage_fonts" lineno="425">
<summary>
Create, read, write, and delete fonts.
</summary>
@@ -121004,7 +103964,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_watch_fonts_dirs" lineno="431">
+<interface name="miscfiles_watch_fonts_dirs" lineno="450">
<summary>
Watch fonts directories.
</summary>
@@ -121015,7 +103975,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_setattr_fonts_cache_dirs" lineno="449">
+<interface name="miscfiles_setattr_fonts_cache_dirs" lineno="468">
<summary>
Set the attributes on a fonts cache directory.
</summary>
@@ -121025,7 +103985,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_dontaudit_setattr_fonts_cache_dirs" lineno="468">
+<interface name="miscfiles_dontaudit_setattr_fonts_cache_dirs" lineno="487">
<summary>
Do not audit attempts to set the attributes
on a fonts cache directory.
@@ -121036,7 +103996,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="miscfiles_manage_fonts_cache" lineno="487">
+<interface name="miscfiles_manage_fonts_cache" lineno="506">
<summary>
Create, read, write, and delete fonts cache.
</summary>
@@ -121047,7 +104007,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_read_hwdata" lineno="509">
+<interface name="miscfiles_read_hwdata" lineno="528">
<summary>
Read hardware identification data.
</summary>
@@ -121057,7 +104017,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_getattr_localization" lineno="529">
+<interface name="miscfiles_getattr_localization" lineno="548">
<summary>
Allow process to get the attributes of localization info
</summary>
@@ -121067,7 +104027,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_setattr_localization" lineno="549">
+<interface name="miscfiles_setattr_localization" lineno="568">
<summary>
Allow process to setattr localization info
</summary>
@@ -121077,7 +104037,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_read_localization" lineno="581">
+<interface name="miscfiles_read_localization" lineno="600">
<summary>
Allow process to read localization information.
</summary>
@@ -121099,7 +104059,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="miscfiles_rw_localization" lineno="604">
+<interface name="miscfiles_rw_localization" lineno="623">
<summary>
Allow process to write localization info
</summary>
@@ -121109,7 +104069,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_relabel_localization" lineno="624">
+<interface name="miscfiles_relabel_localization" lineno="643">
<summary>
Allow process to relabel localization info
</summary>
@@ -121119,7 +104079,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_legacy_read_localization" lineno="643">
+<interface name="miscfiles_legacy_read_localization" lineno="662">
<summary>
Allow process to read legacy time localization info
</summary>
@@ -121129,7 +104089,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_watch_localization" lineno="662">
+<interface name="miscfiles_watch_localization" lineno="681">
<summary>
Watch time localization info
</summary>
@@ -121139,7 +104099,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_search_man_pages" lineno="680">
+<interface name="miscfiles_search_man_pages" lineno="699">
<summary>
Search man pages.
</summary>
@@ -121149,7 +104109,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_dontaudit_search_man_pages" lineno="699">
+<interface name="miscfiles_dontaudit_search_man_pages" lineno="718">
<summary>
Do not audit attempts to search man pages.
</summary>
@@ -121159,7 +104119,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="miscfiles_read_man_pages" lineno="718">
+<interface name="miscfiles_read_man_pages" lineno="737">
<summary>
Read man pages
</summary>
@@ -121170,7 +104130,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_delete_man_pages" lineno="740">
+<interface name="miscfiles_delete_man_pages" lineno="759">
<summary>
Delete man pages
</summary>
@@ -121180,7 +104140,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_manage_man_pages" lineno="762">
+<interface name="miscfiles_manage_man_pages" lineno="781">
<summary>
Create, read, write, and delete man pages
</summary>
@@ -121190,7 +104150,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_read_man_cache" lineno="783">
+<interface name="miscfiles_read_man_cache" lineno="802">
<summary>
Read man cache content.
</summary>
@@ -121200,7 +104160,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_map_man_cache" lineno="804">
+<interface name="miscfiles_map_man_cache" lineno="823">
<summary>
Map man cache content.
</summary>
@@ -121210,7 +104170,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_manage_man_cache" lineno="823">
+<interface name="miscfiles_manage_man_cache" lineno="842">
<summary>
Create, read, write, and delete
man cache content.
@@ -121221,7 +104181,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_relabel_man_cache" lineno="844">
+<interface name="miscfiles_relabel_man_cache" lineno="863">
<summary>
Relabel from and to man cache.
</summary>
@@ -121231,7 +104191,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_read_public_files" lineno="865">
+<interface name="miscfiles_search_public_dirs" lineno="882">
+<summary>
+Search public directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="miscfiles_read_public_files" lineno="904">
<summary>
Read public files used for file
transfer services.
@@ -121243,7 +104213,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_manage_public_files" lineno="887">
+<interface name="miscfiles_manage_public_files" lineno="926">
<summary>
Create, read, write, and delete public files
and directories used for file transfer services.
@@ -121255,7 +104225,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_watch_public_dirs" lineno="907">
+<interface name="miscfiles_watch_public_dirs" lineno="946">
<summary>
Watch public files
</summary>
@@ -121265,7 +104235,38 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_read_tetex_data" lineno="925">
+<interface name="miscfiles_mounton_all_public_dirs" lineno="964">
+<summary>
+Mount on all public content directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="miscfiles_mounton_all_public_files" lineno="984">
+<summary>
+Mount on all public content files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="miscfiles_rangetrans_all_public_content" lineno="1005">
+<summary>
+Transition to the specified sensitivity
+when creating all public content objects.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="miscfiles_read_tetex_data" lineno="1031">
<summary>
Read TeX data
</summary>
@@ -121275,7 +104276,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_exec_tetex_data" lineno="949">
+<interface name="miscfiles_exec_tetex_data" lineno="1055">
<summary>
Execute TeX data programs in the caller domain.
</summary>
@@ -121285,7 +104286,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_domain_entry_test_files" lineno="973">
+<interface name="miscfiles_domain_entry_test_files" lineno="1079">
<summary>
Let test files be an entry point for
a specified domain.
@@ -121296,7 +104297,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_read_test_files" lineno="991">
+<interface name="miscfiles_read_test_files" lineno="1097">
<summary>
Read test files and directories.
</summary>
@@ -121306,7 +104307,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_exec_test_files" lineno="1010">
+<interface name="miscfiles_exec_test_files" lineno="1116">
<summary>
Execute test files.
</summary>
@@ -121316,7 +104317,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_etc_filetrans_localization" lineno="1030">
+<interface name="miscfiles_etc_filetrans_localization" lineno="1136">
<summary>
Create files in etc directories
with localization file type.
@@ -121327,7 +104328,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_manage_localization" lineno="1050">
+<interface name="miscfiles_manage_localization" lineno="1156">
<summary>
Create, read, write, and delete localization
</summary>
@@ -121361,17 +104362,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="modutils_read_module_objects" lineno="51">
-<summary>
-Read the kernel modules. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="modutils_read_module_config" lineno="68">
+<interface name="modutils_read_module_config" lineno="53">
<summary>
Read the configuration options used when
loading modules.
@@ -121383,7 +104374,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="modutils_rename_module_config" lineno="94">
+<interface name="modutils_rename_module_config" lineno="79">
<summary>
Rename a file with the configuration options used when
loading modules.
@@ -121394,7 +104385,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="modutils_delete_module_config" lineno="113">
+<interface name="modutils_delete_module_config" lineno="98">
<summary>
Unlink a file with the configuration options used when
loading modules.
@@ -121405,7 +104396,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="modutils_manage_module_config" lineno="132">
+<interface name="modutils_manage_module_config" lineno="117">
<summary>
Manage files with the configuration options used when
loading modules.
@@ -121416,7 +104407,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="modutils_domtrans" lineno="152">
+<interface name="modutils_domtrans" lineno="137">
<summary>
Execute any modutil,
like insmod, kmod, depmod or updates-modules,
@@ -121428,7 +104419,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="modutils_run" lineno="181">
+<interface name="modutils_run" lineno="166">
<summary>
Execute any modutil,
like insmod, kmod, depmod or updates-modules,
@@ -121448,7 +104439,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="modutils_exec" lineno="202">
+<interface name="modutils_exec" lineno="187">
<summary>
Execute any modutil,
like insmod, kmod, depmod or updates-modules,
@@ -121501,7 +104492,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_signal" lineno="82">
+<interface name="mount_read_state" lineno="82">
+<summary>
+Read the process state (/proc/pid) of mount.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="mount_signal" lineno="100">
<summary>
Send a generic signal to mount.
</summary>
@@ -121511,7 +104512,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_use_fds" lineno="100">
+<interface name="mount_use_fds" lineno="118">
<summary>
Use file descriptors for mount.
</summary>
@@ -121521,7 +104522,7 @@ The type of the process performing this action.
</summary>
</param>
</interface>
-<interface name="mount_domtrans_unconfined" lineno="118">
+<interface name="mount_domtrans_unconfined" lineno="136">
<summary>
Execute mount in the unconfined mount domain.
</summary>
@@ -121531,7 +104532,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="mount_run_unconfined" lineno="144">
+<interface name="mount_run_unconfined" lineno="162">
<summary>
Execute mount in the unconfined mount domain, and
allow the specified role the unconfined mount domain,
@@ -121549,7 +104550,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mount_read_loopback_files" lineno="163">
+<interface name="mount_read_loopback_files" lineno="181">
<summary>
Read loopback filesystem image files.
</summary>
@@ -121559,7 +104560,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_rw_loopback_files" lineno="181">
+<interface name="mount_rw_loopback_files" lineno="199">
<summary>
Read and write loopback filesystem image files.
</summary>
@@ -121569,7 +104570,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_list_runtime" lineno="199">
+<interface name="mount_list_runtime" lineno="217">
<summary>
List mount runtime files.
</summary>
@@ -121579,7 +104580,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_watch_runtime_dirs" lineno="217">
+<interface name="mount_watch_runtime_dirs" lineno="235">
<summary>
Watch mount runtime dirs.
</summary>
@@ -121589,7 +104590,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_watch_runtime_files" lineno="235">
+<interface name="mount_watch_runtime_files" lineno="253">
<summary>
Watch mount runtime files.
</summary>
@@ -121599,7 +104600,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_watch_reads_runtime_files" lineno="253">
+<interface name="mount_watch_reads_runtime_files" lineno="271">
<summary>
Watch reads on mount runtime files.
</summary>
@@ -121609,7 +104610,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_getattr_runtime_files" lineno="271">
+<interface name="mount_getattr_runtime_files" lineno="289">
<summary>
Getattr on mount_runtime_t files
</summary>
@@ -121619,7 +104620,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_read_runtime_files" lineno="289">
+<interface name="mount_read_runtime_files" lineno="307">
<summary>
Read mount runtime files.
</summary>
@@ -121629,7 +104630,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_rw_runtime_files" lineno="307">
+<interface name="mount_rw_runtime_files" lineno="325">
<summary>
Read and write mount runtime files.
</summary>
@@ -121639,7 +104640,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_rw_pipes" lineno="327">
+<interface name="mount_rw_pipes" lineno="345">
<summary>
Read and write mount unnamed pipes
</summary>
@@ -121717,28 +104718,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="raid_read_mdadm_pid" lineno="59">
-<summary>
-read mdadm pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="raid_manage_mdadm_pid" lineno="75">
-<summary>
-Create, read, write, and delete
-mdadm pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="raid_read_mdadm_runtime_files" lineno="90">
+<interface name="raid_read_mdadm_runtime_files" lineno="59">
<summary>
Read mdadm runtime files.
</summary>
@@ -121748,7 +104728,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="raid_manage_mdadm_runtime_files" lineno="111">
+<interface name="raid_manage_mdadm_runtime_files" lineno="80">
<summary>
Create, read, write, and delete
mdadm runtime files.
@@ -121759,7 +104739,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="raid_admin_mdadm" lineno="137">
+<interface name="raid_admin_mdadm" lineno="106">
<summary>
All of the rules required to
administrate an mdadm environment.
@@ -122128,7 +105108,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_dontaudit_search_config" lineno="588">
+<interface name="seutil_dontaudit_exec_setfiles" lineno="587">
+<summary>
+Do not audit attempts to execute setfiles.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="seutil_dontaudit_search_config" lineno="606">
<summary>
Do not audit attempts to search the SELinux
configuration directory (/etc/selinux).
@@ -122139,7 +105129,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="seutil_dontaudit_read_config" lineno="607">
+<interface name="seutil_dontaudit_read_config" lineno="625">
<summary>
Do not audit attempts to read the SELinux
userland configuration (/etc/selinux).
@@ -122150,7 +105140,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="seutil_read_config" lineno="627">
+<interface name="seutil_read_config" lineno="645">
<summary>
Read the general SELinux configuration files.
</summary>
@@ -122161,7 +105151,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="seutil_rw_config" lineno="649">
+<interface name="seutil_rw_config" lineno="667">
<summary>
Read and write the general SELinux configuration files.
</summary>
@@ -122172,7 +105162,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="seutil_manage_config" lineno="671">
+<interface name="seutil_manage_config" lineno="689">
<summary>
Create, read, write, and delete
the general selinux configuration files.
@@ -122184,7 +105174,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="seutil_manage_config_dirs" lineno="693">
+<interface name="seutil_manage_config_dirs" lineno="711">
<summary>
Create, read, write, and delete
the general selinux configuration directories.
@@ -122196,7 +105186,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="seutil_search_default_contexts" lineno="712">
+<interface name="seutil_search_default_contexts" lineno="730">
<summary>
Search the policy directory with default_context files.
</summary>
@@ -122206,7 +105196,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_read_default_contexts" lineno="732">
+<interface name="seutil_read_default_contexts" lineno="750">
<summary>
Read the default_contexts files.
</summary>
@@ -122217,7 +105207,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="seutil_manage_default_contexts" lineno="752">
+<interface name="seutil_manage_default_contexts" lineno="770">
<summary>
Create, read, write, and delete the default_contexts files.
</summary>
@@ -122227,7 +105217,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_read_file_contexts" lineno="773">
+<interface name="seutil_read_file_contexts" lineno="791">
<summary>
Read the file_contexts files.
</summary>
@@ -122238,7 +105228,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="seutil_dontaudit_read_file_contexts" lineno="795">
+<interface name="seutil_dontaudit_read_file_contexts" lineno="813">
<summary>
Do not audit attempts to read the file_contexts files.
</summary>
@@ -122249,7 +105239,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="seutil_rw_file_contexts" lineno="815">
+<interface name="seutil_rw_file_contexts" lineno="833">
<summary>
Read and write the file_contexts files.
</summary>
@@ -122259,7 +105249,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_manage_file_contexts" lineno="837">
+<interface name="seutil_manage_file_contexts" lineno="855">
<summary>
Create, read, write, and delete the file_contexts files.
</summary>
@@ -122270,7 +105260,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="seutil_read_bin_policy" lineno="858">
+<interface name="seutil_read_bin_policy" lineno="876">
<summary>
Read the SELinux binary policy.
</summary>
@@ -122280,7 +105270,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_create_bin_policy" lineno="885">
+<interface name="seutil_create_bin_policy" lineno="903">
<summary>
Create the SELinux binary policy.
</summary>
@@ -122290,7 +105280,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_relabelto_bin_policy" lineno="908">
+<interface name="seutil_relabelto_bin_policy" lineno="926">
<summary>
Allow the caller to relabel a file to the binary policy type.
</summary>
@@ -122300,7 +105290,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_manage_bin_policy" lineno="929">
+<interface name="seutil_manage_bin_policy" lineno="947">
<summary>
Create, read, write, and delete the SELinux
binary policy.
@@ -122311,7 +105301,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_read_src_policy" lineno="951">
+<interface name="seutil_read_src_policy" lineno="969">
<summary>
Read SELinux policy source files.
</summary>
@@ -122321,7 +105311,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_manage_src_policy" lineno="973">
+<interface name="seutil_manage_src_policy" lineno="991">
<summary>
Create, read, write, and delete SELinux
policy source files.
@@ -122333,7 +105323,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="seutil_domtrans_semanage" lineno="994">
+<interface name="seutil_domtrans_semanage" lineno="1012">
<summary>
Execute a domain transition to run semanage.
</summary>
@@ -122343,7 +105333,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="seutil_run_semanage" lineno="1022">
+<interface name="seutil_run_semanage" lineno="1040">
<summary>
Execute semanage in the semanage domain, and
allow the specified role the semanage domain,
@@ -122361,7 +105351,17 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="seutil_read_module_store" lineno="1041">
+<interface name="seutil_dontaudit_exec_semanage" lineno="1059">
+<summary>
+Do not audit attempts to execute semanage.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="seutil_read_module_store" lineno="1077">
<summary>
Read the semanage module store.
</summary>
@@ -122371,7 +105371,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_manage_module_store" lineno="1066">
+<interface name="seutil_manage_module_store" lineno="1102">
<summary>
Full management of the semanage
module store.
@@ -122382,7 +105382,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_get_semanage_read_lock" lineno="1090">
+<interface name="seutil_get_semanage_read_lock" lineno="1126">
<summary>
Get read lock on module store
</summary>
@@ -122392,7 +105392,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_get_semanage_trans_lock" lineno="1109">
+<interface name="seutil_get_semanage_trans_lock" lineno="1145">
<summary>
Get trans lock on module store
</summary>
@@ -122402,7 +105402,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_libselinux_linked" lineno="1137">
+<interface name="seutil_libselinux_linked" lineno="1173">
<summary>
SELinux-enabled program access for
libselinux-linked programs.
@@ -122421,7 +105421,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_dontaudit_libselinux_linked" lineno="1167">
+<interface name="seutil_dontaudit_libselinux_linked" lineno="1203">
<summary>
Do not audit SELinux-enabled program access for
libselinux-linked programs.
@@ -122693,7 +105693,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_mmap_config_files" lineno="385">
+<interface name="sysnet_mmap_config_files" lineno="386">
<summary>
Map network config files.
</summary>
@@ -122709,7 +105709,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_mmap_read_config" lineno="410">
+<interface name="sysnet_mmap_read_config" lineno="411">
<summary>
map network config files.
</summary>
@@ -122725,7 +105725,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_dontaudit_read_config" lineno="429">
+<interface name="sysnet_dontaudit_read_config" lineno="430">
<summary>
Do not audit attempts to read network config files.
</summary>
@@ -122735,7 +105735,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="sysnet_write_config" lineno="447">
+<interface name="sysnet_write_config" lineno="448">
<summary>
Write network config files.
</summary>
@@ -122745,7 +105745,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_create_config" lineno="466">
+<interface name="sysnet_create_config" lineno="467">
<summary>
Create network config files.
</summary>
@@ -122755,7 +105755,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_relabel_config" lineno="485">
+<interface name="sysnet_relabel_config" lineno="486">
<summary>
Relabel network config files.
</summary>
@@ -122765,7 +105765,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_etc_filetrans_config" lineno="510">
+<interface name="sysnet_etc_filetrans_config" lineno="511">
<summary>
Create files in /etc with the type used for
the network config files.
@@ -122781,7 +105781,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="sysnet_manage_config" lineno="528">
+<interface name="sysnet_manage_config" lineno="529">
<summary>
Create, read, write, and delete network config files.
</summary>
@@ -122791,27 +105791,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_read_dhcpc_pid" lineno="560">
-<summary>
-Read the dhcp client pid file. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="sysnet_delete_dhcpc_pid" lineno="575">
-<summary>
-Delete the dhcp client pid file. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="sysnet_read_dhcpc_runtime_files" lineno="590">
+<interface name="sysnet_read_dhcpc_runtime_files" lineno="561">
<summary>
Read dhcp client runtime files.
</summary>
@@ -122821,7 +105801,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_delete_dhcpc_runtime_files" lineno="609">
+<interface name="sysnet_delete_dhcpc_runtime_files" lineno="580">
<summary>
Delete the dhcp client runtime files.
</summary>
@@ -122831,7 +105811,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_manage_dhcpc_runtime_files" lineno="627">
+<interface name="sysnet_manage_dhcpc_runtime_files" lineno="598">
<summary>
Create, read, write, and delete dhcp client runtime files.
</summary>
@@ -122841,7 +105821,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_domtrans_ifconfig" lineno="645">
+<interface name="sysnet_domtrans_ifconfig" lineno="616">
<summary>
Execute ifconfig in the ifconfig domain.
</summary>
@@ -122851,7 +105831,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="sysnet_run_ifconfig" lineno="672">
+<interface name="sysnet_run_ifconfig" lineno="643">
<summary>
Execute ifconfig in the ifconfig domain, and
allow the specified role the ifconfig domain,
@@ -122869,7 +105849,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_exec_ifconfig" lineno="692">
+<interface name="sysnet_exec_ifconfig" lineno="663">
<summary>
Execute ifconfig in the caller domain.
</summary>
@@ -122879,7 +105859,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_signal_ifconfig" lineno="712">
+<interface name="sysnet_signal_ifconfig" lineno="683">
<summary>
Send a generic signal to ifconfig.
</summary>
@@ -122890,7 +105870,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_signull_ifconfig" lineno="731">
+<interface name="sysnet_signull_ifconfig" lineno="702">
<summary>
Send null signals to ifconfig.
</summary>
@@ -122901,7 +105881,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_create_netns_dirs" lineno="750">
+<interface name="sysnet_create_netns_dirs" lineno="721">
<summary>
Create the /run/netns directory with
an automatic type transition.
@@ -122912,7 +105892,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_netns_filetrans" lineno="784">
+<interface name="sysnet_netns_filetrans" lineno="755">
<summary>
Create an object in the /run/netns
directory with a private type.
@@ -122938,7 +105918,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="sysnet_read_dhcp_config" lineno="805">
+<interface name="sysnet_read_dhcp_config" lineno="776">
<summary>
Read the DHCP configuration files.
</summary>
@@ -122948,7 +105928,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_search_dhcp_state" lineno="825">
+<interface name="sysnet_search_dhcp_state" lineno="796">
<summary>
Search the DHCP state data directory.
</summary>
@@ -122958,7 +105938,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_dhcp_state_filetrans" lineno="869">
+<interface name="sysnet_dhcp_state_filetrans" lineno="840">
<summary>
Create DHCP state data.
</summary>
@@ -122993,7 +105973,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="sysnet_dns_name_resolve" lineno="889">
+<interface name="sysnet_dns_name_resolve" lineno="860">
<summary>
Perform a DNS name resolution.
</summary>
@@ -123004,7 +105984,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_use_ldap" lineno="940">
+<interface name="sysnet_use_ldap" lineno="911">
<summary>
Connect and use a LDAP server.
</summary>
@@ -123014,7 +105994,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_use_portmap" lineno="967">
+<interface name="sysnet_use_portmap" lineno="938">
<summary>
Connect and use remote port mappers.
</summary>
@@ -123024,7 +106004,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_dhcpc_script_entry" lineno="1001">
+<interface name="sysnet_dhcpc_script_entry" lineno="972">
<summary>
Make the specified program domain
accessable from the DHCP hooks/scripts.
@@ -123076,7 +106056,7 @@ The type for the user pty
</summary>
</param>
</template>
-<template name="systemd_user_daemon_domain" lineno="221">
+<template name="systemd_user_daemon_domain" lineno="222">
<summary>
Allow the specified domain to be started as a daemon by the
specified systemd user instance.
@@ -123097,7 +106077,7 @@ Domain to allow the systemd user domain to run.
</summary>
</param>
</template>
-<interface name="systemd_user_activated_sock_file" lineno="242">
+<interface name="systemd_user_activated_sock_file" lineno="243">
<summary>
Associate the specified file type to be a type whose sock files
can be managed by systemd user instances for socket activation.
@@ -123108,7 +106088,7 @@ File type to be associated.
</summary>
</param>
</interface>
-<interface name="systemd_user_unix_stream_activated_socket" lineno="267">
+<interface name="systemd_user_unix_stream_activated_socket" lineno="268">
<summary>
Associate the specified domain to be a domain whose unix stream
sockets and sock files can be managed by systemd user instances
@@ -123125,7 +106105,7 @@ File type of the domain's sock files to be associated.
</summary>
</param>
</interface>
-<template name="systemd_user_send_systemd_notify" lineno="293">
+<template name="systemd_user_send_systemd_notify" lineno="294">
<summary>
Allow the target domain the permissions necessary
to use systemd notify when started by the specified
@@ -123142,7 +106122,7 @@ Domain to be allowed systemd notify permissions.
</summary>
</param>
</template>
-<template name="systemd_user_app_status" lineno="321">
+<template name="systemd_user_app_status" lineno="322">
<summary>
Allow the target domain to be monitored and have its output
captured by the specified systemd user instance domain.
@@ -123158,7 +106138,7 @@ Domain to allow the systemd user instance to monitor.
</summary>
</param>
</template>
-<template name="systemd_read_user_manager_state" lineno="361">
+<template name="systemd_read_user_manager_state" lineno="362">
<summary>
Read the process state (/proc/pid) of
the specified systemd user instance.
@@ -123174,7 +106154,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<template name="systemd_user_manager_system_start" lineno="385">
+<template name="systemd_user_manager_system_start" lineno="386">
<summary>
Send a start request to the specified
systemd user instance system object.
@@ -123190,7 +106170,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<template name="systemd_user_manager_system_stop" lineno="409">
+<template name="systemd_user_manager_system_stop" lineno="410">
<summary>
Send a stop request to the specified
systemd user instance system object.
@@ -123206,7 +106186,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<template name="systemd_user_manager_system_status" lineno="433">
+<template name="systemd_user_manager_system_status" lineno="434">
<summary>
Get the status of the specified
systemd user instance system object.
@@ -123222,7 +106202,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<template name="systemd_user_manager_dbus_chat" lineno="457">
+<template name="systemd_user_manager_dbus_chat" lineno="458">
<summary>
Send and receive messages from the
specified systemd user instance over dbus.
@@ -123238,7 +106218,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<interface name="systemd_search_conf_home_content" lineno="478">
+<interface name="systemd_search_conf_home_content" lineno="479">
<summary>
Allow the specified domain to search systemd config home
content.
@@ -123249,7 +106229,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_conf_home_content" lineno="497">
+<interface name="systemd_manage_conf_home_content" lineno="498">
<summary>
Allow the specified domain to manage systemd config home
content.
@@ -123260,7 +106240,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabel_conf_home_content" lineno="518">
+<interface name="systemd_relabel_conf_home_content" lineno="519">
<summary>
Allow the specified domain to relabel systemd config home
content.
@@ -123271,7 +106251,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_search_data_home_content" lineno="539">
+<interface name="systemd_search_data_home_content" lineno="540">
<summary>
Allow the specified domain to search systemd data home
content.
@@ -123282,7 +106262,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_data_home_content" lineno="558">
+<interface name="systemd_manage_data_home_content" lineno="559">
<summary>
Allow the specified domain to manage systemd data home
content.
@@ -123293,7 +106273,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabel_data_home_content" lineno="579">
+<interface name="systemd_relabel_data_home_content" lineno="580">
<summary>
Allow the specified domain to relabel systemd data home
content.
@@ -123304,7 +106284,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_search_user_runtime" lineno="600">
+<interface name="systemd_search_user_runtime" lineno="601">
<summary>
Allow the specified domain to search systemd user runtime
content.
@@ -123315,7 +106295,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_runtime_files" lineno="618">
+<interface name="systemd_read_user_runtime_files" lineno="619">
<summary>
Allow the specified domain to read systemd user runtime files.
</summary>
@@ -123325,7 +106305,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_runtime_lnk_files" lineno="636">
+<interface name="systemd_read_user_runtime_lnk_files" lineno="637">
<summary>
Allow the specified domain to read systemd user runtime lnk files.
</summary>
@@ -123335,7 +106315,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_user_runtime_socket" lineno="655">
+<interface name="systemd_write_user_runtime_socket" lineno="656">
<summary>
Allow the specified domain to write to
the systemd user runtime named socket.
@@ -123346,7 +106326,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_unit_files" lineno="674">
+<interface name="systemd_read_user_unit_files" lineno="675">
<summary>
Allow the specified domain to read system-wide systemd
user unit files. (Deprecated)
@@ -123357,7 +106337,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_units_files" lineno="690">
+<interface name="systemd_read_user_units_files" lineno="691">
<summary>
Allow the specified domain to read system-wide systemd
user unit files.
@@ -123368,7 +106348,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_runtime_units" lineno="710">
+<interface name="systemd_read_user_runtime_units" lineno="711">
<summary>
Allow the specified domain to read systemd user runtime unit files. (Deprecated)
</summary>
@@ -123378,7 +106358,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_runtime_units_files" lineno="725">
+<interface name="systemd_read_user_runtime_units_files" lineno="726">
<summary>
Allow the specified domain to read systemd user runtime unit files.
</summary>
@@ -123388,7 +106368,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_search_user_runtime_unit_dirs" lineno="745">
+<interface name="systemd_search_user_runtime_unit_dirs" lineno="746">
<summary>
Allow the specified domain to search systemd user runtime unit
directories.
@@ -123399,7 +106379,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_list_user_runtime_unit_dirs" lineno="764">
+<interface name="systemd_list_user_runtime_unit_dirs" lineno="765">
<summary>
Allow the specified domain to list the contents of systemd
user runtime unit directories.
@@ -123410,7 +106390,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_status_user_runtime_units" lineno="782">
+<interface name="systemd_status_user_runtime_units" lineno="783">
<summary>
Allow the specified domain to get the status of systemd user runtime units. (Deprecated)
</summary>
@@ -123420,7 +106400,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_get_user_runtime_units_status" lineno="797">
+<interface name="systemd_get_user_runtime_units_status" lineno="798">
<summary>
Allow the specified domain to get the status of systemd user runtime units.
</summary>
@@ -123430,7 +106410,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_start_user_runtime_units" lineno="816">
+<interface name="systemd_start_user_runtime_units" lineno="817">
<summary>
Allow the specified domain to start systemd user runtime units.
</summary>
@@ -123440,7 +106420,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_stop_user_runtime_units" lineno="835">
+<interface name="systemd_stop_user_runtime_units" lineno="836">
<summary>
Allow the specified domain to stop systemd user runtime units.
</summary>
@@ -123450,7 +106430,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_reload_user_runtime_units" lineno="854">
+<interface name="systemd_reload_user_runtime_units" lineno="855">
<summary>
Allow the specified domain to reload systemd user runtime units.
</summary>
@@ -123460,7 +106440,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_user_transient_units_files" lineno="873">
+<interface name="systemd_read_user_transient_units_files" lineno="874">
<summary>
Allow the specified domain to read systemd user transient unit files.
</summary>
@@ -123470,7 +106450,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_search_user_transient_unit_dirs" lineno="893">
+<interface name="systemd_search_user_transient_unit_dirs" lineno="894">
<summary>
Allow the specified domain to search systemd user transient unit
directories.
@@ -123481,7 +106461,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_list_user_transient_unit_dirs" lineno="912">
+<interface name="systemd_list_user_transient_unit_dirs" lineno="913">
<summary>
Allow the specified domain to list the contents of systemd
user transient unit directories.
@@ -123492,7 +106472,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_get_user_transient_units_status" lineno="930">
+<interface name="systemd_get_user_transient_units_status" lineno="931">
<summary>
Allow the specified domain to get the status of systemd user transient units.
</summary>
@@ -123502,7 +106482,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_start_user_transient_units" lineno="949">
+<interface name="systemd_start_user_transient_units" lineno="950">
<summary>
Allow the specified domain to start systemd user transient units.
</summary>
@@ -123512,7 +106492,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_stop_user_transient_units" lineno="968">
+<interface name="systemd_stop_user_transient_units" lineno="969">
<summary>
Allow the specified domain to stop systemd user transient units.
</summary>
@@ -123522,7 +106502,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_reload_user_transient_units" lineno="987">
+<interface name="systemd_reload_user_transient_units" lineno="988">
<summary>
Allow the specified domain to reload systemd user transient units.
</summary>
@@ -123532,7 +106512,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_log_parse_environment" lineno="1007">
+<interface name="systemd_log_parse_environment" lineno="1008">
<summary>
Make the specified type usable as an
log parse environment type.
@@ -123543,7 +106523,7 @@ Type to be used as a log parse environment type.
</summary>
</param>
</interface>
-<interface name="systemd_use_nss" lineno="1027">
+<interface name="systemd_use_nss" lineno="1028">
<summary>
Allow domain to use systemd's Name Service Switch (NSS) module.
This module provides UNIX user and group name resolution for dynamic users
@@ -123555,7 +106535,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_PrivateDevices" lineno="1054">
+<interface name="systemd_PrivateDevices" lineno="1055">
<summary>
Allow domain to be used as a systemd service with a unit
that uses PrivateDevices=yes in section [Service].
@@ -123566,7 +106546,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_rw_homework_semaphores" lineno="1071">
+<interface name="systemd_rw_homework_semaphores" lineno="1072">
<summary>
Read and write systemd-homework semaphores.
</summary>
@@ -123576,7 +106556,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_read_hwdb" lineno="1089">
+<interface name="systemd_read_hwdb" lineno="1090">
<summary>
Allow domain to read udev hwdb file
</summary>
@@ -123586,7 +106566,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_map_hwdb" lineno="1107">
+<interface name="systemd_map_hwdb" lineno="1108">
<summary>
Allow domain to map udev hwdb file
</summary>
@@ -123596,9 +106576,9 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_pids" lineno="1125">
+<interface name="systemd_watch_logind_runtime_dirs" lineno="1126">
<summary>
-Read systemd_login PID files. (Deprecated)
+Watch systemd-logind runtime dirs.
</summary>
<param name="domain">
<summary>
@@ -123606,9 +106586,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_logind_pid_pipes" lineno="1140">
+<interface name="systemd_read_logind_runtime_files" lineno="1145">
<summary>
-Manage systemd_login PID pipes. (Deprecated)
+Read systemd-logind runtime files.
</summary>
<param name="domain">
<summary>
@@ -123616,9 +106596,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_logind_pid_pipes" lineno="1155">
+<interface name="systemd_manage_logind_runtime_pipes" lineno="1165">
<summary>
-Write systemd_login named pipe. (Deprecated)
+Manage systemd-logind runtime pipes.
</summary>
<param name="domain">
<summary>
@@ -123626,9 +106606,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_watch_logind_runtime_dirs" lineno="1170">
+<interface name="systemd_write_logind_runtime_pipes" lineno="1184">
<summary>
-Watch systemd-logind runtime dirs.
+Write systemd-logind runtime named pipe.
</summary>
<param name="domain">
<summary>
@@ -123636,9 +106616,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_runtime_files" lineno="1189">
+<interface name="systemd_use_logind_fds" lineno="1205">
<summary>
-Read systemd-logind runtime files.
+Use inherited systemd
+logind file descriptors.
</summary>
<param name="domain">
<summary>
@@ -123646,9 +106627,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_logind_runtime_pipes" lineno="1209">
+<interface name="systemd_watch_logind_sessions_dirs" lineno="1223">
<summary>
-Manage systemd-logind runtime pipes.
+Watch logind sessions dirs.
</summary>
<param name="domain">
<summary>
@@ -123656,9 +106637,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_logind_runtime_pipes" lineno="1228">
+<interface name="systemd_read_logind_sessions_files" lineno="1242">
<summary>
-Write systemd-logind runtime named pipe.
+Read logind sessions files.
</summary>
<param name="domain">
<summary>
@@ -123666,10 +106647,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_use_logind_fds" lineno="1249">
+<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1263">
<summary>
-Use inherited systemd
-logind file descriptors.
+Write inherited logind sessions pipes.
</summary>
<param name="domain">
<summary>
@@ -123677,9 +106657,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_watch_logind_sessions_dirs" lineno="1267">
+<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1283">
<summary>
-Watch logind sessions dirs.
+Write inherited logind inhibit pipes.
</summary>
<param name="domain">
<summary>
@@ -123687,9 +106667,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_sessions_files" lineno="1286">
+<interface name="systemd_dbus_chat_logind" lineno="1304">
<summary>
-Read logind sessions files.
+Send and receive messages from
+systemd logind over dbus.
</summary>
<param name="domain">
<summary>
@@ -123697,9 +106678,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1307">
+<interface name="systemd_status_logind" lineno="1324">
<summary>
-Write inherited logind sessions pipes.
+Get the system status information from systemd_login
</summary>
<param name="domain">
<summary>
@@ -123707,9 +106688,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1327">
+<interface name="systemd_signull_logind" lineno="1343">
<summary>
-Write inherited logind inhibit pipes.
+Send systemd_login a null signal.
</summary>
<param name="domain">
<summary>
@@ -123717,10 +106698,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_logind" lineno="1348">
+<interface name="systemd_list_userdb_runtime_dirs" lineno="1361">
<summary>
-Send and receive messages from
-systemd logind over dbus.
+List the contents of systemd userdb runtime directories.
</summary>
<param name="domain">
<summary>
@@ -123728,9 +106708,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_status_logind" lineno="1368">
+<interface name="systemd_manage_userdb_runtime_dirs" lineno="1379">
<summary>
-Get the system status information from systemd_login
+Manage systemd userdb runtime directories.
</summary>
<param name="domain">
<summary>
@@ -123738,9 +106718,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_signull_logind" lineno="1387">
+<interface name="systemd_read_userdb_runtime_files" lineno="1397">
<summary>
-Send systemd_login a null signal.
+Read systemd userdb runtime files.
</summary>
<param name="domain">
<summary>
@@ -123748,9 +106728,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_userdb_runtime_dirs" lineno="1405">
+<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1415">
<summary>
-Manage systemd userdb runtime directories.
+Manage socket files under /run/systemd/userdb .
</summary>
<param name="domain">
<summary>
@@ -123758,9 +106738,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1423">
+<interface name="systemd_stream_connect_userdb" lineno="1433">
<summary>
-Manage socket files under /run/systemd/userdb .
+Connect to /run/systemd/userdb/io.systemd.DynamicUser .
</summary>
<param name="domain">
<summary>
@@ -123768,27 +106748,27 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_stream_connect_userdb" lineno="1441">
+<interface name="systemd_read_machines" lineno="1455">
<summary>
-Connect to /run/systemd/userdb/io.systemd.DynamicUser .
+Allow reading /run/systemd/machines
</summary>
<param name="domain">
<summary>
-Domain allowed access.
+Domain that can access the machines files
</summary>
</param>
</interface>
-<interface name="systemd_read_machines" lineno="1463">
+<interface name="systemd_watch_machines_dirs" lineno="1474">
<summary>
-Allow reading /run/systemd/machines
+Allow watching /run/systemd/machines
</summary>
<param name="domain">
<summary>
-Domain that can access the machines files
+Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_connect_machined" lineno="1482">
+<interface name="systemd_connect_machined" lineno="1492">
<summary>
Allow connecting to /run/systemd/userdb/io.systemd.Machine socket
</summary>
@@ -123798,7 +106778,7 @@ Domain that can access the socket
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_machined" lineno="1501">
+<interface name="systemd_dbus_chat_machined" lineno="1511">
<summary>
Send and receive messages from
systemd machined over dbus.
@@ -123809,7 +106789,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_hostnamed" lineno="1522">
+<interface name="systemd_dbus_chat_hostnamed" lineno="1532">
<summary>
Send and receive messages from
systemd hostnamed over dbus.
@@ -123820,7 +106800,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_use_passwd_agent_fds" lineno="1542">
+<interface name="systemd_use_passwd_agent_fds" lineno="1552">
<summary>
allow systemd_passwd_agent to inherit fds
</summary>
@@ -123830,7 +106810,7 @@ Domain that owns the fds
</summary>
</param>
</interface>
-<interface name="systemd_run_passwd_agent" lineno="1565">
+<interface name="systemd_run_passwd_agent" lineno="1575">
<summary>
allow systemd_passwd_agent to be run by admin
</summary>
@@ -123845,7 +106825,7 @@ role that it runs in
</summary>
</param>
</interface>
-<interface name="systemd_use_passwd_agent" lineno="1586">
+<interface name="systemd_use_passwd_agent" lineno="1596">
<summary>
Allow a systemd_passwd_agent_t process to interact with a daemon
that needs a password from the sysadmin.
@@ -123856,7 +106836,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1610">
+<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1620">
<summary>
Transition to systemd_passwd_runtime_t when creating dirs
</summary>
@@ -123866,7 +106846,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1631">
+<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1641">
<summary>
Transition to systemd_userdbd_runtime_t when
creating the userdb directory inside an init runtime
@@ -123878,7 +106858,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1649">
+<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1659">
<summary>
Allow to domain to create systemd-passwd symlink
</summary>
@@ -123888,7 +106868,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_watch_passwd_runtime_dirs" lineno="1667">
+<interface name="systemd_watch_passwd_runtime_dirs" lineno="1677">
<summary>
Allow a domain to watch systemd-passwd runtime dirs.
</summary>
@@ -123898,17 +106878,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_all_units" lineno="1685">
-<summary>
-manage systemd unit dirs and the files in them (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="systemd_list_journal_dirs" lineno="1700">
+<interface name="systemd_list_journal_dirs" lineno="1695">
<summary>
Allow domain to list the contents of systemd_journal_t dirs
</summary>
@@ -123918,7 +106888,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_journal_files" lineno="1718">
+<interface name="systemd_read_journal_files" lineno="1713">
<summary>
Allow domain to read systemd_journal_t files
</summary>
@@ -123928,7 +106898,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_journal_files" lineno="1737">
+<interface name="systemd_manage_journal_files" lineno="1732">
<summary>
Allow domain to create/manage systemd_journal_t files
</summary>
@@ -123938,7 +106908,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_watch_journal_dirs" lineno="1757">
+<interface name="systemd_watch_journal_dirs" lineno="1752">
<summary>
Allow domain to add a watch on systemd_journal_t directories
</summary>
@@ -123948,7 +106918,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_journal_dirs" lineno="1775">
+<interface name="systemd_relabelto_journal_dirs" lineno="1770">
<summary>
Relabel to systemd-journald directory type.
</summary>
@@ -123958,7 +106928,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_journal_files" lineno="1794">
+<interface name="systemd_relabelto_journal_files" lineno="1789">
<summary>
Relabel to systemd-journald file type.
</summary>
@@ -123968,7 +106938,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_networkd_units" lineno="1814">
+<interface name="systemd_read_networkd_units" lineno="1809">
<summary>
Allow domain to read systemd_networkd_t unit files
</summary>
@@ -123978,7 +106948,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_networkd_units" lineno="1834">
+<interface name="systemd_manage_networkd_units" lineno="1829">
<summary>
Allow domain to create/manage systemd_networkd_t unit files
</summary>
@@ -123988,7 +106958,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_enabledisable_networkd" lineno="1854">
+<interface name="systemd_enabledisable_networkd" lineno="1849">
<summary>
Allow specified domain to enable systemd-networkd units
</summary>
@@ -123998,7 +106968,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_startstop_networkd" lineno="1873">
+<interface name="systemd_startstop_networkd" lineno="1868">
<summary>
Allow specified domain to start systemd-networkd units
</summary>
@@ -124008,7 +106978,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_networkd" lineno="1893">
+<interface name="systemd_dbus_chat_networkd" lineno="1888">
<summary>
Send and receive messages from
systemd networkd over dbus.
@@ -124019,7 +106989,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_status_networkd" lineno="1913">
+<interface name="systemd_status_networkd" lineno="1908">
<summary>
Allow specified domain to get status of systemd-networkd
</summary>
@@ -124029,7 +106999,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1932">
+<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1927">
<summary>
Relabel systemd_networkd tun socket.
</summary>
@@ -124039,7 +107009,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1950">
+<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1945">
<summary>
Read/Write from systemd_networkd netlink route socket.
</summary>
@@ -124049,7 +107019,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_list_networkd_runtime" lineno="1968">
+<interface name="systemd_list_networkd_runtime" lineno="1963">
<summary>
Allow domain to list dirs under /run/systemd/netif
</summary>
@@ -124059,7 +107029,7 @@ domain permitted the access
</summary>
</param>
</interface>
-<interface name="systemd_watch_networkd_runtime_dirs" lineno="1987">
+<interface name="systemd_watch_networkd_runtime_dirs" lineno="1982">
<summary>
Watch directories under /run/systemd/netif
</summary>
@@ -124069,7 +107039,7 @@ Domain permitted the access
</summary>
</param>
</interface>
-<interface name="systemd_read_networkd_runtime" lineno="2006">
+<interface name="systemd_read_networkd_runtime" lineno="2001">
<summary>
Allow domain to read files generated by systemd_networkd
</summary>
@@ -124079,7 +107049,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_state" lineno="2025">
+<interface name="systemd_read_logind_state" lineno="2020">
<summary>
Allow systemd_logind_t to read process state for cgroup file
</summary>
@@ -124089,7 +107059,7 @@ Domain systemd_logind_t may access.
</summary>
</param>
</interface>
-<interface name="systemd_create_logind_linger_dir" lineno="2046">
+<interface name="systemd_create_logind_linger_dir" lineno="2041">
<summary>
Allow the specified domain to create
the systemd-logind linger directory with
@@ -124101,7 +107071,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_start_user_manager_units" lineno="2066">
+<interface name="systemd_start_user_manager_units" lineno="2061">
<summary>
Allow the specified domain to start systemd
user manager units (systemd --user).
@@ -124112,7 +107082,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_stop_user_manager_units" lineno="2086">
+<interface name="systemd_stop_user_manager_units" lineno="2081">
<summary>
Allow the specified domain to stop systemd
user manager units (systemd --user).
@@ -124123,7 +107093,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_reload_user_manager_units" lineno="2106">
+<interface name="systemd_reload_user_manager_units" lineno="2101">
<summary>
Allow the specified domain to reload systemd
user manager units (systemd --user).
@@ -124134,7 +107104,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_get_user_manager_units_status" lineno="2126">
+<interface name="systemd_get_user_manager_units_status" lineno="2121">
<summary>
Get the status of systemd user manager
units (systemd --user).
@@ -124145,7 +107115,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_start_power_units" lineno="2145">
+<interface name="systemd_start_power_units" lineno="2140">
<summary>
Allow specified domain to start power units
</summary>
@@ -124155,7 +107125,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="systemd_status_power_units" lineno="2164">
+<interface name="systemd_status_power_units" lineno="2159">
<summary>
Get the system status information about power units
</summary>
@@ -124165,7 +107135,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_stream_connect_socket_proxyd" lineno="2183">
+<interface name="systemd_stream_connect_socket_proxyd" lineno="2178">
<summary>
Allows connections to the systemd-socket-proxyd's socket.
</summary>
@@ -124175,7 +107145,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfiles_conf_file" lineno="2202">
+<interface name="systemd_tmpfiles_conf_file" lineno="2197">
<summary>
Make the specified type usable for
systemd tmpfiles config files.
@@ -124186,7 +107156,7 @@ Type to be used for systemd tmpfiles config files.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfiles_creator" lineno="2223">
+<interface name="systemd_tmpfiles_creator" lineno="2218">
<summary>
Allow the specified domain to create
the tmpfiles config directory with
@@ -124198,7 +107168,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfiles_conf_filetrans" lineno="2259">
+<interface name="systemd_tmpfiles_conf_filetrans" lineno="2254">
<summary>
Create an object in the systemd tmpfiles config
directory, with a private type
@@ -124225,7 +107195,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="systemd_list_tmpfiles_conf" lineno="2278">
+<interface name="systemd_list_tmpfiles_conf" lineno="2273">
<summary>
Allow domain to list systemd tmpfiles config directory
</summary>
@@ -124235,7 +107205,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2296">
+<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2291">
<summary>
Allow domain to relabel to systemd tmpfiles config directory
</summary>
@@ -124245,7 +107215,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2314">
+<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2309">
<summary>
Allow domain to relabel to systemd tmpfiles config files
</summary>
@@ -124255,7 +107225,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfilesd_managed" lineno="2332">
+<interface name="systemd_tmpfilesd_managed" lineno="2327">
<summary>
Allow systemd_tmpfiles_t to manage filesystem objects
</summary>
@@ -124265,7 +107235,7 @@ Type of object to manage
</summary>
</param>
</interface>
-<interface name="systemd_stream_connect_resolved" lineno="2359">
+<interface name="systemd_stream_connect_resolved" lineno="2354">
<summary>
Connect to systemd resolved over
/run/systemd/resolve/io.systemd.Resolve .
@@ -124276,7 +107246,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_resolved" lineno="2380">
+<interface name="systemd_dbus_chat_resolved" lineno="2375">
<summary>
Send and receive messages from
systemd resolved over dbus.
@@ -124287,7 +107257,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_resolved_runtime" lineno="2400">
+<interface name="systemd_read_resolved_runtime" lineno="2395">
<summary>
Allow domain to read resolv.conf file generated by systemd_resolved
</summary>
@@ -124297,7 +107267,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_exec_systemctl" lineno="2422">
+<interface name="systemd_exec_systemctl" lineno="2417">
<summary>
Execute the systemctl program.
</summary>
@@ -124307,7 +107277,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_getattr_updated_runtime" lineno="2453">
+<interface name="systemd_getattr_updated_runtime" lineno="2448">
<summary>
Allow domain to getattr on .updated file (generated by systemd-update-done
</summary>
@@ -124317,7 +107287,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_search_all_user_keys" lineno="2471">
+<interface name="systemd_search_all_user_keys" lineno="2466">
<summary>
Search keys for the all systemd --user domains.
</summary>
@@ -124327,7 +107297,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_create_all_user_keys" lineno="2489">
+<interface name="systemd_create_all_user_keys" lineno="2484">
<summary>
Create keys for the all systemd --user domains.
</summary>
@@ -124337,7 +107307,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_all_user_keys" lineno="2507">
+<interface name="systemd_write_all_user_keys" lineno="2502">
<summary>
Write keys for the all systemd --user domains.
</summary>
@@ -124347,7 +107317,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_domtrans_sysusers" lineno="2526">
+<interface name="systemd_domtrans_sysusers" lineno="2521">
<summary>
Execute systemd-sysusers in the
systemd sysusers domain.
@@ -124358,7 +107328,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_run_sysusers" lineno="2551">
+<interface name="systemd_run_sysusers" lineno="2546">
<summary>
Run systemd-sysusers with a domain transition.
</summary>
@@ -124374,7 +107344,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="systemd_use_inherited_machined_ptys" lineno="2571">
+<interface name="systemd_use_inherited_machined_ptys" lineno="2566">
<summary>
receive and use a systemd_machined_devpts_t file handle
</summary>
@@ -124877,7 +107847,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_dontaudit_rw_runtime_files" lineno="591">
+<interface name="udev_dontaudit_rw_runtime_files" lineno="592">
<summary>
dontaudit attempts to read/write udev runtime files.
</summary>
@@ -124887,7 +107857,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_manage_runtime_files" lineno="610">
+<interface name="udev_manage_runtime_files" lineno="611">
<summary>
Create, read, write, and delete
udev runtime files.
@@ -124898,7 +107868,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_domtrans_udevadm" lineno="629">
+<interface name="udev_domtrans_udevadm" lineno="630">
<summary>
Execute udev admin in the udevadm domain.
</summary>
@@ -124908,7 +107878,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="udevadm_domtrans" lineno="647">
+<interface name="udevadm_domtrans" lineno="648">
<summary>
Execute udev admin in the udevadm domain. (Deprecated)
</summary>
@@ -124918,7 +107888,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="udevadm_run" lineno="669">
+<interface name="udevadm_run" lineno="670">
<summary>
Execute udevadm in the udevadm domain, and
allow the specified role the udevadm domain. (Deprecated)
@@ -124935,7 +107905,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="udev_run_udevadm" lineno="691">
+<interface name="udev_run_udevadm" lineno="692">
<summary>
Execute udevadm in the udevadm domain, and
allow the specified role the udevadm domain.
@@ -124952,7 +107922,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="udevadm_exec" lineno="710">
+<interface name="udevadm_exec" lineno="711">
<summary>
Execute udevadm in the caller domain. (Deprecated)
</summary>
@@ -124962,7 +107932,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_exec_udevadm" lineno="725">
+<interface name="udev_exec_udevadm" lineno="726">
<summary>
Execute udevadm in the caller domain.
</summary>
@@ -124972,7 +107942,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_pid_filetrans_rules" lineno="755">
+<interface name="udev_pid_filetrans_rules" lineno="756">
<summary>
Write in /var/run/udev with the udev_rules_t (udev rules) file type
</summary>
@@ -124992,7 +107962,7 @@ Name of the directory that the file transition will work on
</summary>
</param>
</interface>
-<interface name="udev_create_rules_dirs" lineno="774">
+<interface name="udev_create_rules_dirs" lineno="775">
<summary>
Create udev rules directories
</summary>
@@ -125660,7 +108630,7 @@ is the prefix for sysadm_t).
</summary>
</param>
</template>
-<interface name="userdom_security_admin_template" lineno="1505">
+<interface name="userdom_security_admin_template" lineno="1506">
<summary>
Allow user to run as a secadm
</summary>
@@ -125686,7 +108656,7 @@ The role of the object to create.
</summary>
</param>
</interface>
-<template name="userdom_xdg_user_template" lineno="1608">
+<template name="userdom_xdg_user_template" lineno="1609">
<summary>
Allow user to interact with xdg content types
</summary>
@@ -125707,7 +108677,7 @@ Domain allowed access.
</summary>
</param>
</template>
-<interface name="userdom_user_application_type" lineno="1657">
+<interface name="userdom_user_application_type" lineno="1658">
<summary>
Make the specified type usable as
a user application domain type.
@@ -125718,7 +108688,7 @@ Type to be used as a user application domain.
</summary>
</param>
</interface>
-<interface name="userdom_user_application_domain" lineno="1678">
+<interface name="userdom_user_application_domain" lineno="1679">
<summary>
Make the specified type usable as
a user application domain.
@@ -125734,7 +108704,7 @@ Type to be used as the domain entry point.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_content" lineno="1695">
+<interface name="userdom_user_home_content" lineno="1696">
<summary>
Make the specified type usable in a
user home directory.
@@ -125746,7 +108716,7 @@ user home directory.
</summary>
</param>
</interface>
-<interface name="userdom_user_tmp_file" lineno="1721">
+<interface name="userdom_user_tmp_file" lineno="1722">
<summary>
Make the specified type usable as a
user temporary file.
@@ -125758,7 +108728,7 @@ temporary directories.
</summary>
</param>
</interface>
-<interface name="userdom_user_tmpfs_file" lineno="1738">
+<interface name="userdom_user_tmpfs_file" lineno="1739">
<summary>
Make the specified type usable as a
user tmpfs file.
@@ -125770,7 +108740,7 @@ tmpfs directories.
</summary>
</param>
</interface>
-<interface name="userdom_attach_admin_tun_iface" lineno="1753">
+<interface name="userdom_attach_admin_tun_iface" lineno="1754">
<summary>
Allow domain to attach to TUN devices created by administrative users.
</summary>
@@ -125780,7 +108750,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_setattr_user_ptys" lineno="1772">
+<interface name="userdom_setattr_user_ptys" lineno="1773">
<summary>
Set the attributes of a user pty.
</summary>
@@ -125790,7 +108760,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_create_user_pty" lineno="1790">
+<interface name="userdom_create_user_pty" lineno="1791">
<summary>
Create a user pty.
</summary>
@@ -125800,7 +108770,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_getattr_user_home_dirs" lineno="1808">
+<interface name="userdom_getattr_user_home_dirs" lineno="1809">
<summary>
Get the attributes of user home directories.
</summary>
@@ -125810,7 +108780,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1827">
+<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1828">
<summary>
Do not audit attempts to get the attributes of user home directories.
</summary>
@@ -125820,7 +108790,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_home_dirs" lineno="1845">
+<interface name="userdom_search_user_home_dirs" lineno="1846">
<summary>
Search user home directories.
</summary>
@@ -125830,7 +108800,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1872">
+<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1873">
<summary>
Do not audit attempts to search user home directories.
</summary>
@@ -125848,7 +108818,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="userdom_list_user_home_dirs" lineno="1890">
+<interface name="userdom_list_user_home_dirs" lineno="1891">
<summary>
List user home directories.
</summary>
@@ -125858,7 +108828,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1909">
+<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1910">
<summary>
Do not audit attempts to list user home subdirectories.
</summary>
@@ -125868,7 +108838,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_create_user_home_dirs" lineno="1927">
+<interface name="userdom_create_user_home_dirs" lineno="1928">
<summary>
Create user home directories.
</summary>
@@ -125878,7 +108848,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_dirs" lineno="1945">
+<interface name="userdom_manage_user_home_dirs" lineno="1946">
<summary>
Manage user home directories.
</summary>
@@ -125888,7 +108858,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabelto_user_home_dirs" lineno="1963">
+<interface name="userdom_dontaudit_manage_user_home_dirs" lineno="1965">
+<summary>
+Do not audit attempts to manage user
+home directories.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="userdom_relabelto_user_home_dirs" lineno="1983">
<summary>
Relabel to user home directories.
</summary>
@@ -125898,7 +108879,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_home_filetrans_user_home_dir" lineno="1987">
+<interface name="userdom_home_filetrans_user_home_dir" lineno="2007">
<summary>
Create directories in the home dir root with
the user home directory type.
@@ -125914,7 +108895,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_domtrans" lineno="2024">
+<interface name="userdom_user_home_domtrans" lineno="2044">
<summary>
Do a domain transition to the specified
domain when executing a program in the
@@ -125943,7 +108924,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_search_user_home_content" lineno="2044">
+<interface name="userdom_dontaudit_search_user_home_content" lineno="2064">
<summary>
Do not audit attempts to search user home content directories.
</summary>
@@ -125953,7 +108934,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_list_all_user_home_content" lineno="2062">
+<interface name="userdom_list_all_user_home_content" lineno="2082">
<summary>
List all users home content directories.
</summary>
@@ -125963,7 +108944,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_list_user_home_content" lineno="2081">
+<interface name="userdom_list_user_home_content" lineno="2101">
<summary>
List contents of users home directory.
</summary>
@@ -125973,7 +108954,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_dirs" lineno="2100">
+<interface name="userdom_manage_user_home_content_dirs" lineno="2120">
<summary>
Create, read, write, and delete directories
in a user home subdirectory.
@@ -125984,7 +108965,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_home_content_dirs" lineno="2119">
+<interface name="userdom_delete_all_user_home_content_dirs" lineno="2139">
<summary>
Delete all user home content directories.
</summary>
@@ -125994,7 +108975,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_home_content_dirs" lineno="2139">
+<interface name="userdom_delete_user_home_content_dirs" lineno="2159">
<summary>
Delete directories in a user home subdirectory.
</summary>
@@ -126004,7 +108985,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2157">
+<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2177">
<summary>
Set attributes of all user home content directories.
</summary>
@@ -126014,7 +108995,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2177">
+<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2197">
<summary>
Do not audit attempts to set the
attributes of user home files.
@@ -126025,7 +109006,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_map_user_home_content_files" lineno="2195">
+<interface name="userdom_map_user_home_content_files" lineno="2215">
<summary>
Map user home files.
</summary>
@@ -126035,7 +109016,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_mmap_user_home_content_files" lineno="2213">
+<interface name="userdom_mmap_user_home_content_files" lineno="2233">
<summary>
Mmap user home files.
</summary>
@@ -126045,7 +109026,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_home_content_files" lineno="2232">
+<interface name="userdom_read_user_home_content_files" lineno="2252">
<summary>
Read user home files.
</summary>
@@ -126055,7 +109036,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2251">
+<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2271">
<summary>
Do not audit attempts to read user home files.
</summary>
@@ -126065,7 +109046,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_all_user_home_content" lineno="2270">
+<interface name="userdom_read_all_user_home_content" lineno="2290">
<summary>
Read all user home content, including application-specific resources.
</summary>
@@ -126075,7 +109056,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_manage_all_user_home_content" lineno="2292">
+<interface name="userdom_manage_all_user_home_content" lineno="2312">
<summary>
Manage all user home content, including application-specific resources.
</summary>
@@ -126085,7 +109066,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_map_all_user_home_content_files" lineno="2314">
+<interface name="userdom_map_all_user_home_content_files" lineno="2334">
<summary>
Map all user home content, including application-specific resources.
</summary>
@@ -126095,7 +109076,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2332">
+<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2352">
<summary>
Do not audit attempts to append user home files.
</summary>
@@ -126105,7 +109086,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2350">
+<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2370">
<summary>
Do not audit attempts to write user home files.
</summary>
@@ -126115,7 +109096,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_home_content_files" lineno="2368">
+<interface name="userdom_delete_all_user_home_content_files" lineno="2388">
<summary>
Delete all user home content files.
</summary>
@@ -126125,7 +109106,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_home_content_files" lineno="2388">
+<interface name="userdom_delete_user_home_content_files" lineno="2408">
<summary>
Delete files in a user home subdirectory.
</summary>
@@ -126135,7 +109116,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_generic_user_home_dirs" lineno="2406">
+<interface name="userdom_relabel_generic_user_home_dirs" lineno="2426">
<summary>
Relabel generic user home dirs.
</summary>
@@ -126145,7 +109126,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_generic_user_home_files" lineno="2424">
+<interface name="userdom_relabel_generic_user_home_files" lineno="2444">
<summary>
Relabel generic user home files.
</summary>
@@ -126155,7 +109136,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2442">
+<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2462">
<summary>
Do not audit attempts to relabel user home files.
</summary>
@@ -126165,7 +109146,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_home_content_symlinks" lineno="2460">
+<interface name="userdom_read_user_home_content_symlinks" lineno="2480">
<summary>
Read user home subdirectory symbolic links.
</summary>
@@ -126175,7 +109156,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_exec_user_home_content_files" lineno="2480">
+<interface name="userdom_exec_user_home_content_files" lineno="2500">
<summary>
Execute user home files.
</summary>
@@ -126186,7 +109167,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2507">
+<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2527">
<summary>
Do not audit attempts to execute user home files.
</summary>
@@ -126196,7 +109177,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_files" lineno="2526">
+<interface name="userdom_manage_user_home_content_files" lineno="2546">
<summary>
Create, read, write, and delete files
in a user home subdirectory.
@@ -126207,7 +109188,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2547">
+<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2567">
<summary>
Do not audit attempts to create, read, write, and delete directories
in a user home subdirectory.
@@ -126218,7 +109199,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_symlinks" lineno="2566">
+<interface name="userdom_manage_user_home_content_symlinks" lineno="2586">
<summary>
Create, read, write, and delete symbolic links
in a user home subdirectory.
@@ -126229,7 +109210,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2586">
+<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2606">
<summary>
Delete all user home content symbolic links.
</summary>
@@ -126239,7 +109220,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_home_content_symlinks" lineno="2606">
+<interface name="userdom_delete_user_home_content_symlinks" lineno="2626">
<summary>
Delete symbolic links in a user home directory.
</summary>
@@ -126249,7 +109230,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_pipes" lineno="2625">
+<interface name="userdom_manage_user_home_content_pipes" lineno="2645">
<summary>
Create, read, write, and delete named pipes
in a user home subdirectory.
@@ -126260,7 +109241,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_sockets" lineno="2646">
+<interface name="userdom_manage_user_home_content_sockets" lineno="2666">
<summary>
Create, read, write, and delete named sockets
in a user home subdirectory.
@@ -126271,7 +109252,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_dir_filetrans" lineno="2683">
+<interface name="userdom_user_home_dir_filetrans" lineno="2703">
<summary>
Create objects in a user home directory
with an automatic type transition to
@@ -126298,7 +109279,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_content_filetrans" lineno="2720">
+<interface name="userdom_user_home_content_filetrans" lineno="2740">
<summary>
Create objects in a directory located
in a user home directory with an
@@ -126326,7 +109307,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2751">
+<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2771">
<summary>
Automatically use the user_cert_t label for selected resources
created in a users home directory
@@ -126347,7 +109328,7 @@ Name of the resource that is being created
</summary>
</param>
</interface>
-<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2781">
+<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2801">
<summary>
Create objects in a user home directory
with an automatic type transition to
@@ -126369,7 +109350,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_exec_user_bin_files" lineno="2800">
+<interface name="userdom_exec_user_bin_files" lineno="2820">
<summary>
Execute user executable files.
</summary>
@@ -126379,7 +109360,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_bin" lineno="2820">
+<interface name="userdom_manage_user_bin" lineno="2840">
<summary>
Manage user executable files.
</summary>
@@ -126389,7 +109370,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_certs" lineno="2842">
+<interface name="userdom_read_user_certs" lineno="2862">
<summary>
Read user SSL certificates.
</summary>
@@ -126400,7 +109381,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="userdom_dontaudit_manage_user_certs" lineno="2865">
+<interface name="userdom_dontaudit_manage_user_certs" lineno="2885">
<summary>
Do not audit attempts to manage
the user SSL certificates.
@@ -126412,7 +109393,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="userdom_manage_user_certs" lineno="2885">
+<interface name="userdom_manage_user_certs" lineno="2905">
<summary>
Manage user SSL certificates.
</summary>
@@ -126422,7 +109403,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_write_user_tmp_sockets" lineno="2906">
+<interface name="userdom_write_user_tmp_sockets" lineno="2926">
<summary>
Write to user temporary named sockets.
</summary>
@@ -126432,7 +109413,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_list_user_tmp" lineno="2926">
+<interface name="userdom_list_user_tmp" lineno="2946">
<summary>
List user temporary directories.
</summary>
@@ -126442,7 +109423,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_list_user_tmp" lineno="2948">
+<interface name="userdom_dontaudit_list_user_tmp" lineno="2968">
<summary>
Do not audit attempts to list user
temporary directories.
@@ -126453,7 +109434,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_dirs" lineno="2966">
+<interface name="userdom_delete_user_tmp_dirs" lineno="2986">
<summary>
Delete users temporary directories.
</summary>
@@ -126463,7 +109444,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2985">
+<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="3005">
<summary>
Do not audit attempts to manage users
temporary directories.
@@ -126474,7 +109455,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_tmp_files" lineno="3003">
+<interface name="userdom_read_user_tmp_files" lineno="3023">
<summary>
Read user temporary files.
</summary>
@@ -126484,7 +109465,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_map_user_tmp_files" lineno="3024">
+<interface name="userdom_map_user_tmp_files" lineno="3044">
<summary>
Map user temporary files.
</summary>
@@ -126494,7 +109475,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3043">
+<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3063">
<summary>
Do not audit attempts to read users
temporary files.
@@ -126505,7 +109486,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3062">
+<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3082">
<summary>
Do not audit attempts to append users
temporary files.
@@ -126516,7 +109497,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_rw_user_tmp_files" lineno="3080">
+<interface name="userdom_rw_user_tmp_files" lineno="3100">
<summary>
Read and write user temporary files.
</summary>
@@ -126526,7 +109507,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_files" lineno="3101">
+<interface name="userdom_delete_user_tmp_files" lineno="3121">
<summary>
Delete users temporary files.
</summary>
@@ -126536,7 +109517,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3120">
+<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3140">
<summary>
Do not audit attempts to manage users
temporary files.
@@ -126547,7 +109528,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_tmp_symlinks" lineno="3138">
+<interface name="userdom_read_user_tmp_symlinks" lineno="3158">
<summary>
Read user temporary symbolic links.
</summary>
@@ -126557,7 +109538,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_symlinks" lineno="3159">
+<interface name="userdom_delete_user_tmp_symlinks" lineno="3179">
<summary>
Delete users temporary symbolic links.
</summary>
@@ -126567,7 +109548,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_dirs" lineno="3178">
+<interface name="userdom_manage_user_tmp_dirs" lineno="3198">
<summary>
Create, read, write, and delete user
temporary directories.
@@ -126578,7 +109559,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_named_pipes" lineno="3198">
+<interface name="userdom_delete_user_tmp_named_pipes" lineno="3218">
<summary>
Delete users temporary named pipes.
</summary>
@@ -126588,7 +109569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_files" lineno="3217">
+<interface name="userdom_manage_user_tmp_files" lineno="3237">
<summary>
Create, read, write, and delete user
temporary files.
@@ -126599,7 +109580,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_named_sockets" lineno="3237">
+<interface name="userdom_delete_user_tmp_named_sockets" lineno="3257">
<summary>
Delete users temporary named sockets.
</summary>
@@ -126609,7 +109590,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_symlinks" lineno="3256">
+<interface name="userdom_manage_user_tmp_symlinks" lineno="3276">
<summary>
Create, read, write, and delete user
temporary symbolic links.
@@ -126620,7 +109601,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3277">
+<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3297">
<summary>
Do not audit attempts to read and write
temporary pipes.
@@ -126631,7 +109612,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_pipes" lineno="3296">
+<interface name="userdom_manage_user_tmp_pipes" lineno="3316">
<summary>
Create, read, write, and delete user
temporary named pipes.
@@ -126642,7 +109623,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_sockets" lineno="3317">
+<interface name="userdom_manage_user_tmp_sockets" lineno="3337">
<summary>
Create, read, write, and delete user
temporary named sockets.
@@ -126653,7 +109634,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_user_tmp_filetrans" lineno="3354">
+<interface name="userdom_user_tmp_filetrans" lineno="3374">
<summary>
Create objects in a user temporary directory
with an automatic type transition to
@@ -126680,7 +109661,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_tmp_filetrans_user_tmp" lineno="3386">
+<interface name="userdom_tmp_filetrans_user_tmp" lineno="3406">
<summary>
Create objects in the temporary directory
with an automatic type transition to
@@ -126702,7 +109683,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_map_user_tmpfs_files" lineno="3404">
+<interface name="userdom_map_user_tmpfs_files" lineno="3424">
<summary>
Map user tmpfs files.
</summary>
@@ -126712,7 +109693,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_tmpfs_files" lineno="3422">
+<interface name="userdom_read_user_tmpfs_files" lineno="3442">
<summary>
Read user tmpfs files.
</summary>
@@ -126722,7 +109703,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3442">
+<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3462">
<summary>
dontaudit Read attempts of user tmpfs files.
</summary>
@@ -126732,7 +109713,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3461">
+<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3481">
<summary>
relabel to/from user tmpfs dirs
</summary>
@@ -126742,7 +109723,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_tmpfs_files" lineno="3480">
+<interface name="userdom_relabel_user_tmpfs_files" lineno="3500">
<summary>
relabel to/from user tmpfs files
</summary>
@@ -126752,7 +109733,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_content" lineno="3502">
+<interface name="userdom_user_runtime_content" lineno="3522">
<summary>
Make the specified type usable in
the directory /run/user/%{USERID}/.
@@ -126764,7 +109745,7 @@ user_runtime_content_dir_t.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_runtime" lineno="3522">
+<interface name="userdom_search_user_runtime" lineno="3542">
<summary>
Search users runtime directories.
</summary>
@@ -126774,7 +109755,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_runtime_root" lineno="3541">
+<interface name="userdom_search_user_runtime_root" lineno="3561">
<summary>
Search user runtime root directories.
</summary>
@@ -126784,7 +109765,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3561">
+<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3581">
<summary>
Do not audit attempts to search
user runtime root directories.
@@ -126795,7 +109776,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_runtime_root_dirs" lineno="3580">
+<interface name="userdom_manage_user_runtime_root_dirs" lineno="3600">
<summary>
Create, read, write, and delete user
runtime root dirs.
@@ -126806,7 +109787,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3599">
+<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3619">
<summary>
Relabel to and from user runtime root dirs.
</summary>
@@ -126816,7 +109797,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_runtime_dirs" lineno="3618">
+<interface name="userdom_manage_user_runtime_dirs" lineno="3638">
<summary>
Create, read, write, and delete user
runtime dirs.
@@ -126827,7 +109808,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_mounton_user_runtime_dirs" lineno="3638">
+<interface name="userdom_mounton_user_runtime_dirs" lineno="3658">
<summary>
Mount a filesystem on user runtime dir
directories.
@@ -126838,7 +109819,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabelto_user_runtime_dirs" lineno="3656">
+<interface name="userdom_relabelto_user_runtime_dirs" lineno="3676">
<summary>
Relabel to user runtime directories.
</summary>
@@ -126848,7 +109829,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3674">
+<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3694">
<summary>
Relabel from user runtime directories.
</summary>
@@ -126858,7 +109839,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_runtime_files" lineno="3692">
+<interface name="userdom_delete_user_runtime_files" lineno="3712">
<summary>
delete user runtime files
</summary>
@@ -126868,7 +109849,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_search_all_user_runtime" lineno="3711">
+<interface name="userdom_search_all_user_runtime" lineno="3731">
<summary>
Search users runtime directories.
</summary>
@@ -126878,7 +109859,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_list_all_user_runtime" lineno="3730">
+<interface name="userdom_list_all_user_runtime" lineno="3750">
<summary>
List user runtime directories.
</summary>
@@ -126888,7 +109869,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_dirs" lineno="3749">
+<interface name="userdom_delete_all_user_runtime_dirs" lineno="3769">
<summary>
delete user runtime directories
</summary>
@@ -126898,7 +109879,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_files" lineno="3767">
+<interface name="userdom_delete_all_user_runtime_files" lineno="3787">
<summary>
delete user runtime files
</summary>
@@ -126908,7 +109889,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3785">
+<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3805">
<summary>
delete user runtime symlink files
</summary>
@@ -126918,7 +109899,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3803">
+<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3823">
<summary>
delete user runtime fifo files
</summary>
@@ -126928,7 +109909,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3821">
+<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3841">
<summary>
delete user runtime socket files
</summary>
@@ -126938,7 +109919,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3839">
+<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3859">
<summary>
delete user runtime blk files
</summary>
@@ -126948,7 +109929,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3857">
+<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3877">
<summary>
delete user runtime chr files
</summary>
@@ -126958,29 +109939,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3887">
-<summary>
-Create objects in the pid directory
-with an automatic type transition to
-the user runtime root type. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="object_class">
-<summary>
-The class of the object to be created.
-</summary>
-</param>
-<param name="name" optional="true">
-<summary>
-The name of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3914">
+<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3907">
<summary>
Create objects in the runtime directory
with an automatic type transition to
@@ -127002,7 +109961,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_filetrans" lineno="3950">
+<interface name="userdom_user_runtime_filetrans" lineno="3943">
<summary>
Create objects in a user runtime
directory with an automatic type
@@ -127030,7 +109989,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3981">
+<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3974">
<summary>
Create objects in the user runtime directory
with an automatic type transition to
@@ -127052,7 +110011,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4011">
+<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4004">
<summary>
Create objects in the user runtime root
directory with an automatic type transition
@@ -127074,7 +110033,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_run_filetrans_user_runtime" lineno="4042">
+<interface name="userdom_user_run_filetrans_user_runtime" lineno="4035">
<summary>
Create objects in the user runtime root
directory with an automatic type transition
@@ -127096,7 +110055,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_rw_user_tmpfs_files" lineno="4060">
+<interface name="userdom_rw_user_tmpfs_files" lineno="4053">
<summary>
Read and write user tmpfs files.
</summary>
@@ -127106,7 +110065,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmpfs_files" lineno="4081">
+<interface name="userdom_delete_user_tmpfs_files" lineno="4074">
<summary>
Delete user tmpfs files.
</summary>
@@ -127116,7 +110075,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmpfs_files" lineno="4100">
+<interface name="userdom_manage_user_tmpfs_files" lineno="4093">
<summary>
Create, read, write, and delete user tmpfs files.
</summary>
@@ -127126,7 +110085,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_getattr_user_ttys" lineno="4120">
+<interface name="userdom_getattr_user_ttys" lineno="4113">
<summary>
Get the attributes of a user domain tty.
</summary>
@@ -127136,7 +110095,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4138">
+<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4131">
<summary>
Do not audit attempts to get the attributes of a user domain tty.
</summary>
@@ -127146,7 +110105,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_setattr_user_ttys" lineno="4156">
+<interface name="userdom_setattr_user_ttys" lineno="4149">
<summary>
Set the attributes of a user domain tty.
</summary>
@@ -127156,7 +110115,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4174">
+<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4167">
<summary>
Do not audit attempts to set the attributes of a user domain tty.
</summary>
@@ -127166,7 +110125,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_use_user_ttys" lineno="4192">
+<interface name="userdom_use_user_ttys" lineno="4185">
<summary>
Read and write a user domain tty.
</summary>
@@ -127176,7 +110135,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_user_ptys" lineno="4210">
+<interface name="userdom_use_user_ptys" lineno="4203">
<summary>
Read and write a user domain pty.
</summary>
@@ -127186,7 +110145,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_inherited_user_terminals" lineno="4245">
+<interface name="userdom_use_inherited_user_terminals" lineno="4238">
<summary>
Read and write a user TTYs and PTYs.
</summary>
@@ -127212,7 +110171,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="userdom_use_user_terminals" lineno="4286">
+<interface name="userdom_use_user_terminals" lineno="4279">
<summary>
Read, write and open a user TTYs and PTYs.
</summary>
@@ -127244,7 +110203,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="userdom_dontaudit_use_user_terminals" lineno="4302">
+<interface name="userdom_dontaudit_use_user_terminals" lineno="4295">
<summary>
Do not audit attempts to read and write
a user domain tty and pty.
@@ -127255,7 +110214,17 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_spec_domtrans_all_users" lineno="4323">
+<interface name="userdom_lock_user_terminals" lineno="4314">
+<summary>
+Lock user TTYs and PTYs.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="userdom_spec_domtrans_all_users" lineno="4335">
<summary>
Execute a shell in all user domains. This
is an explicit transition, requiring the
@@ -127267,7 +110236,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4346">
+<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4358">
<summary>
Execute an Xserver session in all user domains. This
is an explicit transition, requiring the
@@ -127279,7 +110248,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_spec_domtrans_unpriv_users" lineno="4369">
+<interface name="userdom_spec_domtrans_unpriv_users" lineno="4381">
<summary>
Execute a shell in all unprivileged user domains. This
is an explicit transition, requiring the
@@ -127291,7 +110260,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4392">
+<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4404">
<summary>
Execute an Xserver session in all unprivileged user domains. This
is an explicit transition, requiring the
@@ -127303,7 +110272,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_rw_unpriv_user_semaphores" lineno="4413">
+<interface name="userdom_rw_unpriv_user_semaphores" lineno="4425">
<summary>
Read and write unpriviledged user SysV sempaphores.
</summary>
@@ -127313,7 +110282,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_unpriv_user_semaphores" lineno="4431">
+<interface name="userdom_manage_unpriv_user_semaphores" lineno="4443">
<summary>
Manage unpriviledged user SysV sempaphores.
</summary>
@@ -127323,7 +110292,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4450">
+<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4462">
<summary>
Read and write unpriviledged user SysV shared
memory segments.
@@ -127334,7 +110303,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4469">
+<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4481">
<summary>
Manage unpriviledged user SysV shared
memory segments.
@@ -127345,7 +110314,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4489">
+<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4501">
<summary>
Execute bin_t in the unprivileged user domains. This
is an explicit transition, requiring the
@@ -127357,7 +110326,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4512">
+<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4524">
<summary>
Execute all entrypoint files in unprivileged user
domains. This is an explicit transition, requiring the
@@ -127369,7 +110338,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_home_content" lineno="4533">
+<interface name="userdom_search_user_home_content" lineno="4545">
<summary>
Search users home directories.
</summary>
@@ -127379,7 +110348,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_signull_unpriv_users" lineno="4552">
+<interface name="userdom_signull_unpriv_users" lineno="4564">
<summary>
Send signull to unprivileged user domains.
</summary>
@@ -127389,7 +110358,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_signal_unpriv_users" lineno="4570">
+<interface name="userdom_signal_unpriv_users" lineno="4582">
<summary>
Send general signals to unprivileged user domains.
</summary>
@@ -127399,7 +110368,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_unpriv_users_fds" lineno="4588">
+<interface name="userdom_use_unpriv_users_fds" lineno="4600">
<summary>
Inherit the file descriptors from unprivileged user domains.
</summary>
@@ -127409,7 +110378,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4616">
+<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4628">
<summary>
Do not audit attempts to inherit the file descriptors
from unprivileged user domains.
@@ -127429,7 +110398,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="userdom_dontaudit_use_user_ptys" lineno="4634">
+<interface name="userdom_dontaudit_use_user_ptys" lineno="4646">
<summary>
Do not audit attempts to use user ptys.
</summary>
@@ -127439,7 +110408,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_relabelto_user_ptys" lineno="4652">
+<interface name="userdom_relabelto_user_ptys" lineno="4664">
<summary>
Relabel files to unprivileged user pty types.
</summary>
@@ -127449,7 +110418,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4671">
+<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4683">
<summary>
Do not audit attempts to relabel files from
user pty types.
@@ -127460,7 +110429,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_write_user_tmp_files" lineno="4689">
+<interface name="userdom_write_user_tmp_files" lineno="4701">
<summary>
Write all users files in /tmp
</summary>
@@ -127470,7 +110439,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4708">
+<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4720">
<summary>
Do not audit attempts to write users
temporary files.
@@ -127481,7 +110450,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_use_user_ttys" lineno="4726">
+<interface name="userdom_dontaudit_use_user_ttys" lineno="4738">
<summary>
Do not audit attempts to use user ttys.
</summary>
@@ -127491,7 +110460,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_all_users_state" lineno="4744">
+<interface name="userdom_read_all_users_state" lineno="4756">
<summary>
Read the process state of all user domains.
</summary>
@@ -127501,7 +110470,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_getattr_all_users" lineno="4764">
+<interface name="userdom_getattr_all_users" lineno="4776">
<summary>
Get the attributes of all user domains.
</summary>
@@ -127511,7 +110480,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_all_users_fds" lineno="4782">
+<interface name="userdom_use_all_users_fds" lineno="4794">
<summary>
Inherit the file descriptors from all user domains
</summary>
@@ -127521,7 +110490,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_use_all_users_fds" lineno="4801">
+<interface name="userdom_dontaudit_use_all_users_fds" lineno="4813">
<summary>
Do not audit attempts to inherit the file
descriptors from any user domains.
@@ -127532,7 +110501,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_signal_all_users" lineno="4819">
+<interface name="userdom_signal_all_users" lineno="4831">
<summary>
Send general signals to all user domains.
</summary>
@@ -127542,7 +110511,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_sigchld_all_users" lineno="4837">
+<interface name="userdom_sigchld_all_users" lineno="4849">
<summary>
Send a SIGCHLD signal to all user domains.
</summary>
@@ -127552,7 +110521,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_all_users_keys" lineno="4855">
+<interface name="userdom_read_all_users_keys" lineno="4867">
<summary>
Read keys for all user domains.
</summary>
@@ -127562,7 +110531,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_write_all_users_keys" lineno="4873">
+<interface name="userdom_write_all_users_keys" lineno="4885">
<summary>
Write keys for all user domains.
</summary>
@@ -127572,7 +110541,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_rw_all_users_keys" lineno="4891">
+<interface name="userdom_rw_all_users_keys" lineno="4903">
<summary>
Read and write keys for all user domains.
</summary>
@@ -127582,7 +110551,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_create_all_users_keys" lineno="4909">
+<interface name="userdom_create_all_users_keys" lineno="4921">
<summary>
Create keys for all user domains.
</summary>
@@ -127592,7 +110561,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_all_users_keys" lineno="4927">
+<interface name="userdom_manage_all_users_keys" lineno="4939">
<summary>
Manage keys for all user domains.
</summary>
@@ -127602,7 +110571,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dbus_send_all_users" lineno="4945">
+<interface name="userdom_dbus_send_all_users" lineno="4957">
<summary>
Send a dbus message to all user domains.
</summary>
@@ -127612,7 +110581,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_chr_files" lineno="4967">
+<interface name="userdom_manage_user_tmp_chr_files" lineno="4979">
<summary>
Create, read, write, and delete user
temporary character files.
@@ -127623,7 +110592,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_certs" lineno="4988">
+<interface name="userdom_relabel_user_certs" lineno="5000">
<summary>
Allow relabeling resources to user_cert_t
</summary>
@@ -127633,7 +110602,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5011">
+<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5023">
<summary>
Do not audit attempts to read and write
unserdomain stream.
@@ -127897,7 +110866,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_watch_config_dirs" lineno="382">
+<interface name="xdg_dontaudit_search_config_dirs" lineno="383">
+<summary>
+Do not audit attempts to search through the
+xdg config home directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_watch_config_dirs" lineno="401">
<summary>
Watch the xdg config home directories
</summary>
@@ -127907,7 +110887,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_watch_all_config_dirs" lineno="400">
+<interface name="xdg_watch_all_config_dirs" lineno="419">
<summary>
Watch all the xdg config home directories
</summary>
@@ -127917,7 +110897,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_config_files" lineno="418">
+<interface name="xdg_read_config_files" lineno="437">
<summary>
Read the xdg config home files
</summary>
@@ -127927,7 +110907,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_all_config_files" lineno="441">
+<interface name="xdg_read_all_config_files" lineno="460">
<summary>
Read all xdg_config_type files
</summary>
@@ -127937,7 +110917,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_config_filetrans" lineno="481">
+<interface name="xdg_config_filetrans" lineno="500">
<summary>
Create objects in an xdg_config directory
with an automatic type transition to
@@ -127964,7 +110944,7 @@ Name of the file or directory created
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_config" lineno="514">
+<interface name="xdg_generic_user_home_dir_filetrans_config" lineno="533">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_config_t type.
@@ -127985,7 +110965,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_create_config_dirs" lineno="532">
+<interface name="xdg_create_config_dirs" lineno="551">
<summary>
Create xdg config home directories
</summary>
@@ -127995,7 +110975,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_config" lineno="550">
+<interface name="xdg_manage_config" lineno="569">
<summary>
Manage the xdg config home files
</summary>
@@ -128005,7 +110985,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_manage_all_config" lineno="575">
+<interface name="xdg_manage_all_config" lineno="594">
<summary>
Manage all the xdg config home files regardless of their specific type
</summary>
@@ -128015,7 +110995,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_config" lineno="600">
+<interface name="xdg_relabel_config" lineno="619">
<summary>
Allow relabeling the xdg config home files
</summary>
@@ -128025,7 +111005,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_all_config" lineno="624">
+<interface name="xdg_relabel_all_config" lineno="643">
<summary>
Allow relabeling the xdg config home files, regardless of their specific type
</summary>
@@ -128035,7 +111015,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_search_data_dirs" lineno="648">
+<interface name="xdg_search_data_dirs" lineno="667">
<summary>
Search through the xdg data home directories
</summary>
@@ -128045,7 +111025,18 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_watch_data_dirs" lineno="666">
+<interface name="xdg_dontaudit_search_data_dirs" lineno="686">
+<summary>
+Do not audit attempts to search through the
+xdg data home directories.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="xdg_watch_data_dirs" lineno="704">
<summary>
Watch the xdg data home directories
</summary>
@@ -128055,7 +111046,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_watch_all_data_dirs" lineno="684">
+<interface name="xdg_watch_all_data_dirs" lineno="722">
<summary>
Watch all the xdg data home directories
</summary>
@@ -128065,7 +111056,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_data_files" lineno="702">
+<interface name="xdg_read_data_files" lineno="740">
<summary>
Read the xdg data home files
</summary>
@@ -128075,7 +111066,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_all_data_files" lineno="725">
+<interface name="xdg_read_all_data_files" lineno="763">
<summary>
Read all xdg_data_type files
</summary>
@@ -128085,7 +111076,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_data_filetrans" lineno="765">
+<interface name="xdg_data_filetrans" lineno="803">
<summary>
Create objects in an xdg_data directory
with an automatic type transition to
@@ -128112,7 +111103,7 @@ Optional name of the file or directory created
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_data" lineno="798">
+<interface name="xdg_generic_user_home_dir_filetrans_data" lineno="836">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_data_t type.
@@ -128133,7 +111124,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_create_data_dirs" lineno="816">
+<interface name="xdg_create_data_dirs" lineno="854">
<summary>
Create xdg data home directories
</summary>
@@ -128143,7 +111134,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_data" lineno="834">
+<interface name="xdg_manage_data" lineno="872">
<summary>
Manage the xdg data home files
</summary>
@@ -128153,7 +111144,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_manage_all_data" lineno="859">
+<interface name="xdg_manage_all_data" lineno="897">
<summary>
Manage all the xdg data home files, regardless of their specific type
</summary>
@@ -128163,7 +111154,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_data" lineno="884">
+<interface name="xdg_relabel_data" lineno="922">
<summary>
Allow relabeling the xdg data home files
</summary>
@@ -128173,7 +111164,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_all_data" lineno="908">
+<interface name="xdg_relabel_all_data" lineno="946">
<summary>
Allow relabeling the xdg data home files, regardless of their type
</summary>
@@ -128183,7 +111174,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_watch_documents_dirs" lineno="932">
+<interface name="xdg_watch_documents_dirs" lineno="970">
<summary>
Watch the xdg documents home directories
</summary>
@@ -128193,7 +111184,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_documents" lineno="961">
+<interface name="xdg_generic_user_home_dir_filetrans_documents" lineno="999">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_documents_t type.
@@ -128214,7 +111205,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_manage_documents" lineno="979">
+<interface name="xdg_manage_documents" lineno="1017">
<summary>
Manage documents content
</summary>
@@ -128224,7 +111215,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_relabel_documents" lineno="1000">
+<interface name="xdg_relabel_documents" lineno="1038">
<summary>
Allow relabeling the documents resources
</summary>
@@ -128234,7 +111225,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_watch_downloads_dirs" lineno="1022">
+<interface name="xdg_watch_downloads_dirs" lineno="1060">
<summary>
Watch the xdg downloads home directories
</summary>
@@ -128244,7 +111235,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_downloads" lineno="1040">
+<interface name="xdg_read_downloads" lineno="1078">
<summary>
Read downloaded content
</summary>
@@ -128254,7 +111245,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_create_downloads" lineno="1063">
+<interface name="xdg_create_downloads" lineno="1101">
<summary>
Create downloaded content
</summary>
@@ -128264,7 +111255,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_write_downloads" lineno="1086">
+<interface name="xdg_write_downloads" lineno="1124">
<summary>
Write downloaded content
</summary>
@@ -128274,7 +111265,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_downloads" lineno="1120">
+<interface name="xdg_generic_user_home_dir_filetrans_downloads" lineno="1158">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_downloads_t type.
@@ -128295,7 +111286,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_manage_downloads" lineno="1138">
+<interface name="xdg_manage_downloads" lineno="1176">
<summary>
Manage downloaded content
</summary>
@@ -128305,7 +111296,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_relabel_downloads" lineno="1159">
+<interface name="xdg_relabel_downloads" lineno="1197">
<summary>
Allow relabeling the downloads resources
</summary>
@@ -128315,7 +111306,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_watch_pictures_dirs" lineno="1181">
+<interface name="xdg_watch_pictures_dirs" lineno="1219">
<summary>
Watch the xdg pictures home directories
</summary>
@@ -128325,7 +111316,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_pictures" lineno="1199">
+<interface name="xdg_read_pictures" lineno="1237">
<summary>
Read user pictures content
</summary>
@@ -128335,7 +111326,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_pictures" lineno="1233">
+<interface name="xdg_generic_user_home_dir_filetrans_pictures" lineno="1271">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_pictures_t type.
@@ -128356,7 +111347,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_manage_pictures" lineno="1251">
+<interface name="xdg_manage_pictures" lineno="1289">
<summary>
Manage pictures content
</summary>
@@ -128366,7 +111357,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_relabel_pictures" lineno="1272">
+<interface name="xdg_relabel_pictures" lineno="1310">
<summary>
Allow relabeling the pictures resources
</summary>
@@ -128376,7 +111367,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_watch_music_dirs" lineno="1294">
+<interface name="xdg_watch_music_dirs" lineno="1332">
<summary>
Watch the xdg music home directories
</summary>
@@ -128386,7 +111377,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_music" lineno="1312">
+<interface name="xdg_read_music" lineno="1350">
<summary>
Read user music content
</summary>
@@ -128396,7 +111387,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_music" lineno="1346">
+<interface name="xdg_generic_user_home_dir_filetrans_music" lineno="1384">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_pictures_t type.
@@ -128417,7 +111408,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_manage_music" lineno="1364">
+<interface name="xdg_manage_music" lineno="1402">
<summary>
Manage music content
</summary>
@@ -128427,7 +111418,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_relabel_music" lineno="1385">
+<interface name="xdg_relabel_music" lineno="1423">
<summary>
Allow relabeling the music resources
</summary>
@@ -128437,7 +111428,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_watch_videos_dirs" lineno="1407">
+<interface name="xdg_watch_videos_dirs" lineno="1445">
<summary>
Watch the xdg video content
</summary>
@@ -128447,7 +111438,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_videos" lineno="1425">
+<interface name="xdg_read_videos" lineno="1463">
<summary>
Read user video content
</summary>
@@ -128457,7 +111448,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_videos" lineno="1459">
+<interface name="xdg_generic_user_home_dir_filetrans_videos" lineno="1497">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_videos_t type.
@@ -128478,7 +111469,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_manage_videos" lineno="1477">
+<interface name="xdg_manage_videos" lineno="1515">
<summary>
Manage video content
</summary>
@@ -128488,7 +111479,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_relabel_videos" lineno="1498">
+<interface name="xdg_relabel_videos" lineno="1536">
<summary>
Allow relabeling the videos resources
</summary>
@@ -128498,7 +111489,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_cache_home_content" lineno="1524">
+<interface name="xdg_cache_home_content" lineno="1562">
<summary>
Mark the selected type as an xdg_cache_home_type
</summary>
@@ -128508,7 +111499,7 @@ Type to give the xdg_cache_home_type attribute to
</summary>
</param>
</interface>
-<interface name="xdg_config_home_content" lineno="1538">
+<interface name="xdg_config_home_content" lineno="1576">
<summary>
Mark the selected type as an xdg_config_home_type
</summary>
@@ -128518,7 +111509,7 @@ Type to give the xdg_config_home_type attribute to
</summary>
</param>
</interface>
-<interface name="xdg_data_home_content" lineno="1552">
+<interface name="xdg_data_home_content" lineno="1590">
<summary>
Mark the selected type as an xdg_data_home_type
</summary>
@@ -128528,7 +111519,7 @@ Type to give the xdg_data_home_type attribute to
</summary>
</param>
</interface>
-<interface name="xdg_read_cache_home_files" lineno="1566">
+<interface name="xdg_read_cache_home_files" lineno="1604">
<summary>
Read the xdg cache home files
</summary>
@@ -128538,7 +111529,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_all_cache_home_files" lineno="1580">
+<interface name="xdg_read_all_cache_home_files" lineno="1618">
<summary>
Read all xdg_cache_home_type files
</summary>
@@ -128548,7 +111539,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_cache_home_filetrans" lineno="1611">
+<interface name="xdg_cache_home_filetrans" lineno="1649">
<summary>
Create objects in an xdg_cache_home directory
with an automatic type transition to
@@ -128575,7 +111566,7 @@ Name of the file or directory created
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_cache_home" lineno="1636">
+<interface name="xdg_generic_user_home_dir_filetrans_cache_home" lineno="1674">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_cache_home_t type.
@@ -128596,7 +111587,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_create_cache_home_dirs" lineno="1650">
+<interface name="xdg_create_cache_home_dirs" lineno="1688">
<summary>
Create xdg cache home directories
</summary>
@@ -128606,7 +111597,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_cache_home" lineno="1664">
+<interface name="xdg_manage_cache_home" lineno="1702">
<summary>
Manage the xdg cache home files
</summary>
@@ -128616,7 +111607,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_manage_all_cache_home" lineno="1678">
+<interface name="xdg_manage_all_cache_home" lineno="1716">
<summary>
Manage all the xdg cache home files regardless of their specific type
</summary>
@@ -128626,7 +111617,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_cache_home" lineno="1692">
+<interface name="xdg_relabel_cache_home" lineno="1730">
<summary>
Allow relabeling the xdg cache home files
</summary>
@@ -128636,7 +111627,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_all_cache_home" lineno="1706">
+<interface name="xdg_relabel_all_cache_home" lineno="1744">
<summary>
Allow relabeling the xdg cache home files, regardless of their specific type
</summary>
@@ -128646,7 +111637,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_search_config_home_dirs" lineno="1720">
+<interface name="xdg_search_config_home_dirs" lineno="1758">
<summary>
Search through the xdg config home directories
</summary>
@@ -128656,7 +111647,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_config_home_files" lineno="1734">
+<interface name="xdg_read_config_home_files" lineno="1772">
<summary>
Read the xdg config home files
</summary>
@@ -128666,7 +111657,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_all_config_home_files" lineno="1748">
+<interface name="xdg_read_all_config_home_files" lineno="1786">
<summary>
Read all xdg_config_home_type files
</summary>
@@ -128676,7 +111667,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_config_home_filetrans" lineno="1779">
+<interface name="xdg_config_home_filetrans" lineno="1817">
<summary>
Create objects in an xdg_config_home directory
with an automatic type transition to
@@ -128703,7 +111694,7 @@ Name of the file or directory created
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_config_home" lineno="1804">
+<interface name="xdg_generic_user_home_dir_filetrans_config_home" lineno="1842">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_config_home_t type.
@@ -128724,7 +111715,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_create_config_home_dirs" lineno="1818">
+<interface name="xdg_create_config_home_dirs" lineno="1856">
<summary>
Create xdg config home directories
</summary>
@@ -128734,7 +111725,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_config_home" lineno="1832">
+<interface name="xdg_manage_config_home" lineno="1870">
<summary>
Manage the xdg config home files
</summary>
@@ -128744,7 +111735,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_manage_all_config_home" lineno="1846">
+<interface name="xdg_manage_all_config_home" lineno="1884">
<summary>
Manage all the xdg config home files regardless of their specific type
</summary>
@@ -128754,7 +111745,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_config_home" lineno="1860">
+<interface name="xdg_relabel_config_home" lineno="1898">
<summary>
Allow relabeling the xdg config home files
</summary>
@@ -128764,7 +111755,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_all_config_home" lineno="1874">
+<interface name="xdg_relabel_all_config_home" lineno="1912">
<summary>
Allow relabeling the xdg config home files, regardless of their specific type
</summary>
@@ -128774,7 +111765,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_data_home_files" lineno="1888">
+<interface name="xdg_read_data_home_files" lineno="1926">
<summary>
Read the xdg data home files
</summary>
@@ -128784,7 +111775,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_all_data_home_files" lineno="1902">
+<interface name="xdg_read_all_data_home_files" lineno="1940">
<summary>
Read all xdg_data_home_type files
</summary>
@@ -128794,7 +111785,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_data_home_filetrans" lineno="1933">
+<interface name="xdg_data_home_filetrans" lineno="1971">
<summary>
Create objects in an xdg_data_home directory
with an automatic type transition to
@@ -128821,7 +111812,7 @@ Optional name of the file or directory created
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_data_home" lineno="1958">
+<interface name="xdg_generic_user_home_dir_filetrans_data_home" lineno="1996">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_data_home_t type.
@@ -128842,7 +111833,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_create_data_home_dirs" lineno="1972">
+<interface name="xdg_create_data_home_dirs" lineno="2010">
<summary>
Create xdg data home directories
</summary>
@@ -128852,7 +111843,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_data_home" lineno="1986">
+<interface name="xdg_manage_data_home" lineno="2024">
<summary>
Manage the xdg data home files
</summary>
@@ -128862,7 +111853,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_manage_all_data_home" lineno="2000">
+<interface name="xdg_manage_all_data_home" lineno="2038">
<summary>
Manage all the xdg data home files, regardless of their specific type
</summary>
@@ -128872,7 +111863,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_data_home" lineno="2014">
+<interface name="xdg_relabel_data_home" lineno="2052">
<summary>
Allow relabeling the xdg data home files
</summary>
@@ -128882,7 +111873,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_all_data_home" lineno="2028">
+<interface name="xdg_relabel_all_data_home" lineno="2066">
<summary>
Allow relabeling the xdg data home files, regardless of their type
</summary>
@@ -128892,7 +111883,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_downloads_home" lineno="2042">
+<interface name="xdg_read_downloads_home" lineno="2080">
<summary>
Read downloaded content
</summary>
@@ -128902,7 +111893,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_read_videos_home" lineno="2056">
+<interface name="xdg_read_videos_home" lineno="2094">
<summary>
Read user video content
</summary>
@@ -128912,7 +111903,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_read_pictures_home" lineno="2070">
+<interface name="xdg_read_pictures_home" lineno="2108">
<summary>
Read user pictures content
</summary>
@@ -128922,7 +111913,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_read_music_home" lineno="2084">
+<interface name="xdg_read_music_home" lineno="2122">
<summary>
Read user music content
</summary>
@@ -128932,7 +111923,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_create_downloads_home" lineno="2098">
+<interface name="xdg_create_downloads_home" lineno="2136">
<summary>
Create downloaded content
</summary>
@@ -128942,7 +111933,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_write_downloads_home" lineno="2112">
+<interface name="xdg_write_downloads_home" lineno="2150">
<summary>
Write downloaded content
</summary>
@@ -128952,7 +111943,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_downloads_home" lineno="2126">
+<interface name="xdg_manage_downloads_home" lineno="2164">
<summary>
Manage downloaded content
</summary>
@@ -128962,7 +111953,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_documents_home" lineno="2140">
+<interface name="xdg_manage_documents_home" lineno="2178">
<summary>
Manage documents content
</summary>
@@ -128972,7 +111963,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_music_home" lineno="2154">
+<interface name="xdg_manage_music_home" lineno="2192">
<summary>
Manage music content
</summary>
@@ -128982,7 +111973,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_pictures_home" lineno="2168">
+<interface name="xdg_manage_pictures_home" lineno="2206">
<summary>
Manage pictures content
</summary>
@@ -128992,7 +111983,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_videos_home" lineno="2182">
+<interface name="xdg_manage_videos_home" lineno="2220">
<summary>
Manage video content
</summary>
@@ -129098,17 +112089,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xen_read_xenstored_pid_files" lineno="189">
-<summary>
-Read xenstored pid files. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="xen_read_xenstored_runtime_files" lineno="204">
+<interface name="xen_read_xenstored_runtime_files" lineno="189">
<summary>
Read xenstored runtime files.
</summary>
@@ -129118,7 +112099,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xen_dontaudit_rw_unix_stream_sockets" lineno="224">
+<interface name="xen_dontaudit_rw_unix_stream_sockets" lineno="209">
<summary>
Do not audit attempts to read and write
Xen unix domain stream sockets.
@@ -129129,7 +112110,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xen_stream_connect_xenstore" lineno="243">
+<interface name="xen_stream_connect_xenstore" lineno="228">
<summary>
Connect to xenstored with a unix
domain stream socket.
@@ -129140,7 +112121,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xen_stream_connect" lineno="263">
+<interface name="xen_stream_connect" lineno="248">
<summary>
Connect to xend with a unix
domain stream socket.
@@ -129151,27 +112132,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xen_pid_filetrans" lineno="295">
-<summary>
-Create in a xend_runtime_t directory (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="private type">
-<summary>
-The type of the object to be created.
-</summary>
-</param>
-<param name="object">
-<summary>
-The object class of the object being created.
-</summary>
-</param>
-</interface>
-<interface name="xen_runtime_filetrans" lineno="320">
+<interface name="xen_runtime_filetrans" lineno="280">
<summary>
Create in a xend_runtime_t directory
</summary>
@@ -129191,7 +112152,7 @@ The object class of the object being created.
</summary>
</param>
</interface>
-<interface name="xen_domtrans_xm" lineno="338">
+<interface name="xen_domtrans_xm" lineno="298">
<summary>
Execute a domain transition to run xm.
</summary>
@@ -129201,7 +112162,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="xen_stream_connect_xm" lineno="358">
+<interface name="xen_stream_connect_xm" lineno="318">
<summary>
Connect to xm with a unix
domain stream socket.