diff options
author | Kenton Groombridge <concord@gentoo.org> | 2022-12-13 14:33:04 -0500 |
---|---|---|
committer | Kenton Groombridge <concord@gentoo.org> | 2022-12-13 14:33:04 -0500 |
commit | c9ea1d5713d9a33466145fc78970b80a398065fb (patch) | |
tree | 44d004553345a5fba393fa8c2ade8639ffbf25e7 /doc | |
parent | salt: use mmap_manage_file_perms (diff) | |
download | hardened-refpolicy-c9ea1d5713d9a33466145fc78970b80a398065fb.tar.gz hardened-refpolicy-c9ea1d5713d9a33466145fc78970b80a398065fb.tar.bz2 hardened-refpolicy-c9ea1d5713d9a33466145fc78970b80a398065fb.zip |
Update generated policy and doc files2.20221101-r3
Signed-off-by: Kenton Groombridge <concord@gentoo.org>
Diffstat (limited to 'doc')
-rw-r--r-- | doc/policy.xml | 34579 |
1 files changed, 8770 insertions, 25809 deletions
diff --git a/doc/policy.xml b/doc/policy.xml index 6dd4831a2..ed1c8ef5d 100644 --- a/doc/policy.xml +++ b/doc/policy.xml @@ -1353,6 +1353,96 @@ Role allowed access. </param> </interface> </module> +<module name="fapolicyd" filename="policy/modules/admin/fapolicyd.if"> +<summary> +The fapolicyd software framework controls the execution of applications based +on a user-defined policy. This is one of the most efficient ways to prevent +running untrusted and possibly malicious applications on the system. +</summary> +<interface name="fapolicyd_mmap_read_config_files" lineno="17"> +<summary> +Read fapolicyd config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fapolicyd_domtrans_fagenrules" lineno="35"> +<summary> +Execute fagenrules in the fagenrules_t domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="fapolicyd_run_fagenrules" lineno="62"> +<summary> +Execute fagenrules in the fagenrules domain, +and allow the specified roles the +fagenurles domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fapolicyd_domtrans_cli" lineno="82"> +<summary> +Execute fapolicyd-cli in the fapolicyc domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="fapolicyd_run_cli" lineno="109"> +<summary> +Execute fapoliyd-cli in the fapolicyc domain, +and allow the specified roles the +fapolicyc domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fapolicyd_admin" lineno="135"> +<summary> +All of the rules required to +administrate an fapolicyd environment. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> <module name="firstboot" filename="policy/modules/admin/firstboot.if"> <summary>Initial system configuration utility.</summary> <interface name="firstboot_domtrans" lineno="13"> @@ -1642,28 +1732,7 @@ Role allowed access. </summary> </param> </interface> -<interface name="kismet_read_pid_files" lineno="95"> -<summary> -Read kismet pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="kismet_manage_pid_files" lineno="111"> -<summary> -Create, read, write, and delete -kismet pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="kismet_read_runtime_files" lineno="126"> +<interface name="kismet_read_runtime_files" lineno="95"> <summary> Read kismet runtime files. </summary> @@ -1673,7 +1742,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kismet_manage_runtime_files" lineno="146"> +<interface name="kismet_manage_runtime_files" lineno="115"> <summary> Create, read, write, and delete kismet runtime files. @@ -1684,7 +1753,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kismet_search_lib" lineno="165"> +<interface name="kismet_search_lib" lineno="134"> <summary> Search kismet lib directories. </summary> @@ -1694,7 +1763,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kismet_read_lib_files" lineno="184"> +<interface name="kismet_read_lib_files" lineno="153"> <summary> Read kismet lib files. </summary> @@ -1704,7 +1773,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kismet_manage_lib_files" lineno="205"> +<interface name="kismet_manage_lib_files" lineno="174"> <summary> Create, read, write, and delete kismet lib files. @@ -1715,7 +1784,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kismet_manage_lib" lineno="225"> +<interface name="kismet_manage_lib" lineno="194"> <summary> Create, read, write, and delete kismet lib content. @@ -1726,7 +1795,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kismet_read_log" lineno="247"> +<interface name="kismet_read_log" lineno="216"> <summary> Read kismet log files. </summary> @@ -1737,7 +1806,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kismet_append_log" lineno="266"> +<interface name="kismet_append_log" lineno="235"> <summary> Append kismet log files. </summary> @@ -1747,7 +1816,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kismet_manage_log" lineno="286"> +<interface name="kismet_manage_log" lineno="255"> <summary> Create, read, write, and delete kismet log content. @@ -1758,7 +1827,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kismet_admin" lineno="314"> +<interface name="kismet_admin" lineno="283"> <summary> All of the rules required to administrate an kismet environment. @@ -3212,49 +3281,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="rpm_read_pid_files" lineno="538"> -<summary> -Read rpm pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="rpm_manage_pid_files" lineno="553"> -<summary> -Create, read, write, and delete -rpm pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="rpm_pid_filetrans_rpm_pid" lineno="579"> -<summary> -Create specified objects in pid directories -with the rpm pid file type. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<param name="object_class"> -<summary> -Class of the object being created. -</summary> -</param> -<param name="name" optional="true"> -<summary> -The name of the object being created. -</summary> -</param> -</interface> -<interface name="rpm_manage_runtime_files" lineno="594"> +<interface name="rpm_manage_runtime_files" lineno="539"> <summary> Create, read, write, and delete rpm runtime files. @@ -3265,7 +3292,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="rpm_admin" lineno="620"> +<interface name="rpm_admin" lineno="565"> <summary> All of the rules required to administrate an rpm environment. @@ -3384,18 +3411,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="samhain_manage_pid_files" lineno="187"> -<summary> -Create, read, write, and delete -samhain pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="samhain_admin" lineno="208"> +<interface name="samhain_admin" lineno="193"> <summary> All of the rules required to administrate the samhain environment. @@ -3425,17 +3441,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="sblim_read_pid_files" lineno="32"> -<summary> -Read gatherd pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="sblim_admin" lineno="53"> +<interface name="sblim_admin" lineno="39"> <summary> All of the rules required to administrate an sblim environment. @@ -3817,7 +3823,7 @@ Role allowed access </summary> </param> </template> -<interface name="sudo_sigchld" lineno="220"> +<interface name="sudo_sigchld" lineno="232"> <summary> Send a SIGCHLD signal to the sudo domain. </summary> @@ -7485,17 +7491,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="qemu_delete_pid_sock_file" lineno="293"> -<summary> -Unlink qemu socket (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="qemu_delete_runtime_sock_files" lineno="308"> +<interface name="qemu_delete_runtime_sock_files" lineno="293"> <summary> Unlink qemu runtime sockets. </summary> @@ -7505,7 +7501,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="qemu_domtrans_unconfined" lineno="327"> +<interface name="qemu_domtrans_unconfined" lineno="312"> <summary> Execute a domain transition to run qemu unconfined. @@ -7516,7 +7512,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="qemu_manage_tmp_dirs" lineno="347"> +<interface name="qemu_manage_tmp_dirs" lineno="332"> <summary> Create, read, write, and delete qemu temporary directories. @@ -7527,7 +7523,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="qemu_manage_tmp_files" lineno="367"> +<interface name="qemu_manage_tmp_files" lineno="352"> <summary> Create, read, write, and delete qemu temporary files. @@ -7538,7 +7534,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="qemu_spec_domtrans" lineno="401"> +<interface name="qemu_spec_domtrans" lineno="386"> <summary> Execute qemu in a specified domain. </summary> @@ -7563,7 +7559,7 @@ Domain to transition to. </summary> </param> </interface> -<interface name="qemu_entry_type" lineno="421"> +<interface name="qemu_entry_type" lineno="406"> <summary> Make qemu executable files an entrypoint for the specified domain. @@ -7574,7 +7570,7 @@ The domain for which qemu_exec_t is an entrypoint. </summary> </param> </interface> -<interface name="qemu_rw_pid_sock_files" lineno="441"> +<interface name="qemu_rw_pid_sock_files" lineno="426"> <summary> Read/write to qemu socket files in /var/run </summary> @@ -7702,6 +7698,17 @@ Domain allowed access. </summary> </param> </interface> +<interface name="screen_dontaudit_getattr_sock_file" lineno="134"> +<summary> +Do not audit attempts to get the attributes +of the screen runtime named socket. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> </module> <module name="seunshare" filename="policy/modules/apps/seunshare.if"> <summary>Filesystem namespacing/polyinstantiation application.</summary> @@ -9564,6 +9571,49 @@ Allow phpfpm to send syslog messages </p> </desc> </tunable> +<tunable name="phpfpm_exec_shell" dftval="false"> +<desc> +<p> +Allow phpfpm to execute shells. This +is needed by some webapps. +</p> +</desc> +</tunable> +<tunable name="phpfpm_connect_http" dftval="false"> +<desc> +<p> +Allow phpfpm to connect to http ports. +</p> +</desc> +</tunable> +<tunable name="phpfpm_connect_pop" dftval="false"> +<desc> +<p> +Allow phpfpm to connect to pop ports. +</p> +</desc> +</tunable> +<tunable name="phpfpm_connect_redis" dftval="false"> +<desc> +<p> +Allow phpfpm to connect to redis ports. +</p> +</desc> +</tunable> +<tunable name="phpfpm_connect_sieve" dftval="false"> +<desc> +<p> +Allow phpfpm to connect to sieve ports. +</p> +</desc> +</tunable> +<tunable name="phpfpm_connect_smtp" dftval="false"> +<desc> +<p> +Allow phpfpm to connect to smtp ports. +</p> +</desc> +</tunable> </module> <module name="resolvconf" filename="policy/modules/contrib/resolvconf.if"> <summary>OpenResolv network configuration management</summary> @@ -9922,19 +9972,19 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_dontaudit_write_bin_dirs" lineno="137"> +<interface name="corecmd_watch_bin_dirs" lineno="137"> <summary> -Do not audit attempts to write bin directories. +Watch bin directories. </summary> <param name="domain"> <summary> -Domain to not audit. +Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_watch_bin_dirs" lineno="155"> +<interface name="corecmd_mounton_bin_dirs" lineno="155"> <summary> -Watch bin directories. +Mount on bin directories. </summary> <param name="domain"> <summary> @@ -9942,7 +9992,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_getattr_bin_files" lineno="173"> +<interface name="corecmd_dontaudit_write_bin_dirs" lineno="173"> +<summary> +Do not audit attempts to write bin directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corecmd_getattr_bin_files" lineno="191"> <summary> Get the attributes of files in bin directories. </summary> @@ -9952,7 +10012,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_dontaudit_getattr_bin_files" lineno="192"> +<interface name="corecmd_dontaudit_getattr_bin_files" lineno="210"> <summary> Do not audit attempts to get the attributes of files in bin directories. </summary> @@ -9962,7 +10022,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corecmd_check_exec_bin_files" lineno="211"> +<interface name="corecmd_check_exec_bin_files" lineno="229"> <summary> Check if files in bin directories are executable (DAC-wise) </summary> @@ -9972,7 +10032,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_read_bin_files" lineno="230"> +<interface name="corecmd_read_bin_files" lineno="248"> <summary> Read files in bin directories. </summary> @@ -9982,7 +10042,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_dontaudit_write_bin_files" lineno="249"> +<interface name="corecmd_dontaudit_write_bin_files" lineno="267"> <summary> Do not audit attempts to write bin files. </summary> @@ -9992,7 +10052,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corecmd_read_bin_pipes" lineno="267"> +<interface name="corecmd_read_bin_pipes" lineno="285"> <summary> Read pipes in bin directories. </summary> @@ -10002,7 +10062,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_read_bin_sockets" lineno="286"> +<interface name="corecmd_read_bin_sockets" lineno="304"> <summary> Read named sockets in bin directories. </summary> @@ -10012,7 +10072,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_exec_bin" lineno="326"> +<interface name="corecmd_exec_bin" lineno="344"> <summary> Execute generic programs in bin directories, in the caller domain. @@ -10043,7 +10103,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_manage_bin_files" lineno="345"> +<interface name="corecmd_manage_bin_files" lineno="363"> <summary> Create, read, write, and delete bin files. </summary> @@ -10053,7 +10113,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_manage_bin_symlinks" lineno="364"> +<interface name="corecmd_manage_bin_symlinks" lineno="382"> <summary> Manage symlinks for bin files. </summary> @@ -10063,7 +10123,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_relabel_bin_files" lineno="383"> +<interface name="corecmd_relabel_bin_files" lineno="401"> <summary> Relabel to and from the bin type. </summary> @@ -10073,7 +10133,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_mmap_bin_files" lineno="402"> +<interface name="corecmd_mmap_bin_files" lineno="420"> <summary> Mmap a bin file as executable. </summary> @@ -10083,7 +10143,34 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_bin_spec_domtrans" lineno="447"> +<interface name="corecmd_bin_filetrans" lineno="456"> +<summary> +Create objects in bin directories +with an automatic transition to a +private type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="file_type"> +<summary> +The type of the object being created. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +<param name="name" optional="true"> +<summary> +The name of the object being created. +</summary> +</param> +</interface> +<interface name="corecmd_bin_spec_domtrans" lineno="501"> <summary> Execute a file in a bin directory in the specified domain but do not @@ -10119,7 +10206,7 @@ The type of the new process. </summary> </param> </interface> -<interface name="corecmd_bin_domtrans" lineno="490"> +<interface name="corecmd_bin_domtrans" lineno="544"> <summary> Execute a file in a bin directory in the specified domain. @@ -10153,7 +10240,7 @@ The type of the new process. </summary> </param> </interface> -<interface name="corecmd_check_exec_shell" lineno="509"> +<interface name="corecmd_check_exec_shell" lineno="563"> <summary> Check if a shell is executable (DAC-wise). </summary> @@ -10163,7 +10250,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_exec_shell" lineno="546"> +<interface name="corecmd_exec_shell" lineno="600"> <summary> Execute shells in the caller domain. </summary> @@ -10191,7 +10278,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_shell_spec_domtrans" lineno="584"> +<interface name="corecmd_shell_spec_domtrans" lineno="638"> <summary> Execute a shell in the target domain. This is an explicit transition, requiring the @@ -10220,7 +10307,7 @@ The type of the shell process. </summary> </param> </interface> -<interface name="corecmd_shell_domtrans" lineno="618"> +<interface name="corecmd_shell_domtrans" lineno="672"> <summary> Execute a shell in the specified domain. </summary> @@ -10245,7 +10332,7 @@ The type of the shell process. </summary> </param> </interface> -<interface name="corecmd_exec_chroot" lineno="637"> +<interface name="corecmd_exec_chroot" lineno="691"> <summary> Execute chroot in the caller domain. </summary> @@ -10255,7 +10342,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_getattr_all_executables" lineno="658"> +<interface name="corecmd_getattr_all_executables" lineno="712"> <summary> Get the attributes of all executable files. </summary> @@ -10266,7 +10353,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="corecmd_read_all_executables" lineno="679"> +<interface name="corecmd_read_all_executables" lineno="733"> <summary> Read all executable files. </summary> @@ -10277,7 +10364,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="corecmd_exec_all_executables" lineno="699"> +<interface name="corecmd_exec_all_executables" lineno="753"> <summary> Execute all executable files. </summary> @@ -10288,7 +10375,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="corecmd_dontaudit_exec_all_executables" lineno="720"> +<interface name="corecmd_dontaudit_exec_all_executables" lineno="774"> <summary> Do not audit attempts to execute all executables. </summary> @@ -10298,7 +10385,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="corecmd_manage_all_executables" lineno="739"> +<interface name="corecmd_manage_all_executables" lineno="793"> <summary> Create, read, write, and all executable files. </summary> @@ -10309,7 +10396,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="corecmd_relabel_all_executables" lineno="761"> +<interface name="corecmd_relabel_all_executables" lineno="815"> <summary> Relabel to and from the bin type. </summary> @@ -10320,7 +10407,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="corecmd_mmap_all_executables" lineno="781"> +<interface name="corecmd_mmap_all_executables" lineno="835"> <summary> Mmap all executables as executable. </summary> @@ -10330,7 +10417,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_relabel_bin_dirs" lineno="803"> +<interface name="corecmd_relabel_bin_dirs" lineno="857"> <summary> Relabel to and from the bin type. </summary> @@ -10340,7 +10427,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corecmd_relabel_bin_lnk_files" lineno="821"> +<interface name="corecmd_relabel_bin_lnk_files" lineno="875"> <summary> Relabel to and from the bin type. </summary> @@ -12610,85 +12697,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_adb_port" lineno="3684"> -<summary> -Send and receive TCP traffic on the adb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_adb_port" lineno="3699"> -<summary> -Send UDP traffic on the adb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3714"> -<summary> -Do not audit attempts to send UDP traffic on the adb port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_adb_port" lineno="3729"> -<summary> -Receive UDP traffic on the adb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3744"> -<summary> -Do not audit attempts to receive UDP traffic on the adb port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_adb_port" lineno="3759"> -<summary> -Send and receive UDP traffic on the adb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3775"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the adb port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_adb_port" lineno="3790"> +<interface name="corenet_tcp_bind_adb_port" lineno="3684"> <summary> Bind TCP sockets to the adb port. </summary> @@ -12699,7 +12708,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_adb_port" lineno="3810"> +<interface name="corenet_udp_bind_adb_port" lineno="3704"> <summary> Bind UDP sockets to the adb port. </summary> @@ -12710,7 +12719,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_adb_port" lineno="3829"> +<interface name="corenet_tcp_connect_adb_port" lineno="3723"> <summary> Make a TCP connection to the adb port. </summary> @@ -12720,7 +12729,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_adb_client_packets" lineno="3849"> +<interface name="corenet_send_adb_client_packets" lineno="3743"> <summary> Send adb_client packets. </summary> @@ -12731,7 +12740,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3868"> +<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3762"> <summary> Do not audit attempts to send adb_client packets. </summary> @@ -12742,7 +12751,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_adb_client_packets" lineno="3887"> +<interface name="corenet_receive_adb_client_packets" lineno="3781"> <summary> Receive adb_client packets. </summary> @@ -12753,7 +12762,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3906"> +<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3800"> <summary> Do not audit attempts to receive adb_client packets. </summary> @@ -12764,7 +12773,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_adb_client_packets" lineno="3925"> +<interface name="corenet_sendrecv_adb_client_packets" lineno="3819"> <summary> Send and receive adb_client packets. </summary> @@ -12775,7 +12784,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3941"> +<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3835"> <summary> Do not audit attempts to send and receive adb_client packets. </summary> @@ -12786,7 +12795,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_adb_client_packets" lineno="3956"> +<interface name="corenet_relabelto_adb_client_packets" lineno="3850"> <summary> Relabel packets to adb_client the packet type. </summary> @@ -12796,7 +12805,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_adb_server_packets" lineno="3976"> +<interface name="corenet_send_adb_server_packets" lineno="3870"> <summary> Send adb_server packets. </summary> @@ -12807,7 +12816,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3995"> +<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3889"> <summary> Do not audit attempts to send adb_server packets. </summary> @@ -12818,7 +12827,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_adb_server_packets" lineno="4014"> +<interface name="corenet_receive_adb_server_packets" lineno="3908"> <summary> Receive adb_server packets. </summary> @@ -12829,7 +12838,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="4033"> +<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="3927"> <summary> Do not audit attempts to receive adb_server packets. </summary> @@ -12840,7 +12849,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_adb_server_packets" lineno="4052"> +<interface name="corenet_sendrecv_adb_server_packets" lineno="3946"> <summary> Send and receive adb_server packets. </summary> @@ -12851,7 +12860,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4068"> +<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="3962"> <summary> Do not audit attempts to send and receive adb_server packets. </summary> @@ -12862,7 +12871,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_adb_server_packets" lineno="4083"> +<interface name="corenet_relabelto_adb_server_packets" lineno="3977"> <summary> Relabel packets to adb_server the packet type. </summary> @@ -12872,85 +12881,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4105"> -<summary> -Send and receive TCP traffic on the afs_bos port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_afs_bos_port" lineno="4120"> -<summary> -Send UDP traffic on the afs_bos port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4135"> -<summary> -Do not audit attempts to send UDP traffic on the afs_bos port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_afs_bos_port" lineno="4150"> -<summary> -Receive UDP traffic on the afs_bos port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4165"> -<summary> -Do not audit attempts to receive UDP traffic on the afs_bos port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4180"> -<summary> -Send and receive UDP traffic on the afs_bos port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4196"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the afs_bos port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_afs_bos_port" lineno="4211"> +<interface name="corenet_tcp_bind_afs_bos_port" lineno="3999"> <summary> Bind TCP sockets to the afs_bos port. </summary> @@ -12961,7 +12892,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs_bos_port" lineno="4231"> +<interface name="corenet_udp_bind_afs_bos_port" lineno="4019"> <summary> Bind UDP sockets to the afs_bos port. </summary> @@ -12972,7 +12903,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs_bos_port" lineno="4250"> +<interface name="corenet_tcp_connect_afs_bos_port" lineno="4038"> <summary> Make a TCP connection to the afs_bos port. </summary> @@ -12982,7 +12913,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_bos_client_packets" lineno="4270"> +<interface name="corenet_send_afs_bos_client_packets" lineno="4058"> <summary> Send afs_bos_client packets. </summary> @@ -12993,7 +12924,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4289"> +<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4077"> <summary> Do not audit attempts to send afs_bos_client packets. </summary> @@ -13004,7 +12935,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_bos_client_packets" lineno="4308"> +<interface name="corenet_receive_afs_bos_client_packets" lineno="4096"> <summary> Receive afs_bos_client packets. </summary> @@ -13015,7 +12946,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4327"> +<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4115"> <summary> Do not audit attempts to receive afs_bos_client packets. </summary> @@ -13026,7 +12957,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4346"> +<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4134"> <summary> Send and receive afs_bos_client packets. </summary> @@ -13037,7 +12968,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4362"> +<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4150"> <summary> Do not audit attempts to send and receive afs_bos_client packets. </summary> @@ -13048,7 +12979,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4377"> +<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4165"> <summary> Relabel packets to afs_bos_client the packet type. </summary> @@ -13058,7 +12989,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_bos_server_packets" lineno="4397"> +<interface name="corenet_send_afs_bos_server_packets" lineno="4185"> <summary> Send afs_bos_server packets. </summary> @@ -13069,7 +13000,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4416"> +<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4204"> <summary> Do not audit attempts to send afs_bos_server packets. </summary> @@ -13080,7 +13011,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_bos_server_packets" lineno="4435"> +<interface name="corenet_receive_afs_bos_server_packets" lineno="4223"> <summary> Receive afs_bos_server packets. </summary> @@ -13091,7 +13022,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4454"> +<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4242"> <summary> Do not audit attempts to receive afs_bos_server packets. </summary> @@ -13102,7 +13033,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4473"> +<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4261"> <summary> Send and receive afs_bos_server packets. </summary> @@ -13113,7 +13044,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4489"> +<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4277"> <summary> Do not audit attempts to send and receive afs_bos_server packets. </summary> @@ -13124,7 +13055,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4504"> +<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4292"> <summary> Relabel packets to afs_bos_server the packet type. </summary> @@ -13134,85 +13065,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4526"> -<summary> -Send and receive TCP traffic on the afs_fs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_afs_fs_port" lineno="4541"> -<summary> -Send UDP traffic on the afs_fs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4556"> -<summary> -Do not audit attempts to send UDP traffic on the afs_fs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_afs_fs_port" lineno="4571"> -<summary> -Receive UDP traffic on the afs_fs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4586"> -<summary> -Do not audit attempts to receive UDP traffic on the afs_fs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4601"> -<summary> -Send and receive UDP traffic on the afs_fs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4617"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the afs_fs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_afs_fs_port" lineno="4632"> +<interface name="corenet_tcp_bind_afs_fs_port" lineno="4314"> <summary> Bind TCP sockets to the afs_fs port. </summary> @@ -13223,7 +13076,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs_fs_port" lineno="4652"> +<interface name="corenet_udp_bind_afs_fs_port" lineno="4334"> <summary> Bind UDP sockets to the afs_fs port. </summary> @@ -13234,7 +13087,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs_fs_port" lineno="4671"> +<interface name="corenet_tcp_connect_afs_fs_port" lineno="4353"> <summary> Make a TCP connection to the afs_fs port. </summary> @@ -13244,7 +13097,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_fs_client_packets" lineno="4691"> +<interface name="corenet_send_afs_fs_client_packets" lineno="4373"> <summary> Send afs_fs_client packets. </summary> @@ -13255,7 +13108,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4710"> +<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4392"> <summary> Do not audit attempts to send afs_fs_client packets. </summary> @@ -13266,7 +13119,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_fs_client_packets" lineno="4729"> +<interface name="corenet_receive_afs_fs_client_packets" lineno="4411"> <summary> Receive afs_fs_client packets. </summary> @@ -13277,7 +13130,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4748"> +<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4430"> <summary> Do not audit attempts to receive afs_fs_client packets. </summary> @@ -13288,7 +13141,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4767"> +<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4449"> <summary> Send and receive afs_fs_client packets. </summary> @@ -13299,7 +13152,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4783"> +<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4465"> <summary> Do not audit attempts to send and receive afs_fs_client packets. </summary> @@ -13310,7 +13163,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4798"> +<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4480"> <summary> Relabel packets to afs_fs_client the packet type. </summary> @@ -13320,7 +13173,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_fs_server_packets" lineno="4818"> +<interface name="corenet_send_afs_fs_server_packets" lineno="4500"> <summary> Send afs_fs_server packets. </summary> @@ -13331,7 +13184,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4837"> +<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4519"> <summary> Do not audit attempts to send afs_fs_server packets. </summary> @@ -13342,7 +13195,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_fs_server_packets" lineno="4856"> +<interface name="corenet_receive_afs_fs_server_packets" lineno="4538"> <summary> Receive afs_fs_server packets. </summary> @@ -13353,7 +13206,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4875"> +<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4557"> <summary> Do not audit attempts to receive afs_fs_server packets. </summary> @@ -13364,7 +13217,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4894"> +<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4576"> <summary> Send and receive afs_fs_server packets. </summary> @@ -13375,7 +13228,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4910"> +<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4592"> <summary> Do not audit attempts to send and receive afs_fs_server packets. </summary> @@ -13386,7 +13239,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4925"> +<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4607"> <summary> Relabel packets to afs_fs_server the packet type. </summary> @@ -13396,85 +13249,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4947"> -<summary> -Send and receive TCP traffic on the afs_ka port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_afs_ka_port" lineno="4962"> -<summary> -Send UDP traffic on the afs_ka port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4977"> -<summary> -Do not audit attempts to send UDP traffic on the afs_ka port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_afs_ka_port" lineno="4992"> -<summary> -Receive UDP traffic on the afs_ka port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="5007"> -<summary> -Do not audit attempts to receive UDP traffic on the afs_ka port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5022"> -<summary> -Send and receive UDP traffic on the afs_ka port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5038"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the afs_ka port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_afs_ka_port" lineno="5053"> +<interface name="corenet_tcp_bind_afs_ka_port" lineno="4629"> <summary> Bind TCP sockets to the afs_ka port. </summary> @@ -13485,7 +13260,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs_ka_port" lineno="5073"> +<interface name="corenet_udp_bind_afs_ka_port" lineno="4649"> <summary> Bind UDP sockets to the afs_ka port. </summary> @@ -13496,7 +13271,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs_ka_port" lineno="5092"> +<interface name="corenet_tcp_connect_afs_ka_port" lineno="4668"> <summary> Make a TCP connection to the afs_ka port. </summary> @@ -13506,7 +13281,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_ka_client_packets" lineno="5112"> +<interface name="corenet_send_afs_ka_client_packets" lineno="4688"> <summary> Send afs_ka_client packets. </summary> @@ -13517,7 +13292,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5131"> +<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="4707"> <summary> Do not audit attempts to send afs_ka_client packets. </summary> @@ -13528,7 +13303,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_ka_client_packets" lineno="5150"> +<interface name="corenet_receive_afs_ka_client_packets" lineno="4726"> <summary> Receive afs_ka_client packets. </summary> @@ -13539,7 +13314,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5169"> +<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="4745"> <summary> Do not audit attempts to receive afs_ka_client packets. </summary> @@ -13550,7 +13325,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5188"> +<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="4764"> <summary> Send and receive afs_ka_client packets. </summary> @@ -13561,7 +13336,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5204"> +<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="4780"> <summary> Do not audit attempts to send and receive afs_ka_client packets. </summary> @@ -13572,7 +13347,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5219"> +<interface name="corenet_relabelto_afs_ka_client_packets" lineno="4795"> <summary> Relabel packets to afs_ka_client the packet type. </summary> @@ -13582,7 +13357,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_ka_server_packets" lineno="5239"> +<interface name="corenet_send_afs_ka_server_packets" lineno="4815"> <summary> Send afs_ka_server packets. </summary> @@ -13593,7 +13368,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5258"> +<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="4834"> <summary> Do not audit attempts to send afs_ka_server packets. </summary> @@ -13604,7 +13379,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_ka_server_packets" lineno="5277"> +<interface name="corenet_receive_afs_ka_server_packets" lineno="4853"> <summary> Receive afs_ka_server packets. </summary> @@ -13615,7 +13390,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5296"> +<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="4872"> <summary> Do not audit attempts to receive afs_ka_server packets. </summary> @@ -13626,7 +13401,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5315"> +<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="4891"> <summary> Send and receive afs_ka_server packets. </summary> @@ -13637,7 +13412,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5331"> +<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="4907"> <summary> Do not audit attempts to send and receive afs_ka_server packets. </summary> @@ -13648,7 +13423,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5346"> +<interface name="corenet_relabelto_afs_ka_server_packets" lineno="4922"> <summary> Relabel packets to afs_ka_server the packet type. </summary> @@ -13658,85 +13433,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5368"> -<summary> -Send and receive TCP traffic on the afs_pt port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_afs_pt_port" lineno="5383"> -<summary> -Send UDP traffic on the afs_pt port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5398"> -<summary> -Do not audit attempts to send UDP traffic on the afs_pt port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_afs_pt_port" lineno="5413"> -<summary> -Receive UDP traffic on the afs_pt port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5428"> -<summary> -Do not audit attempts to receive UDP traffic on the afs_pt port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5443"> -<summary> -Send and receive UDP traffic on the afs_pt port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5459"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the afs_pt port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_afs_pt_port" lineno="5474"> +<interface name="corenet_tcp_bind_afs_pt_port" lineno="4944"> <summary> Bind TCP sockets to the afs_pt port. </summary> @@ -13747,7 +13444,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs_pt_port" lineno="5494"> +<interface name="corenet_udp_bind_afs_pt_port" lineno="4964"> <summary> Bind UDP sockets to the afs_pt port. </summary> @@ -13758,7 +13455,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs_pt_port" lineno="5513"> +<interface name="corenet_tcp_connect_afs_pt_port" lineno="4983"> <summary> Make a TCP connection to the afs_pt port. </summary> @@ -13768,7 +13465,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_pt_client_packets" lineno="5533"> +<interface name="corenet_send_afs_pt_client_packets" lineno="5003"> <summary> Send afs_pt_client packets. </summary> @@ -13779,7 +13476,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5552"> +<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5022"> <summary> Do not audit attempts to send afs_pt_client packets. </summary> @@ -13790,7 +13487,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_pt_client_packets" lineno="5571"> +<interface name="corenet_receive_afs_pt_client_packets" lineno="5041"> <summary> Receive afs_pt_client packets. </summary> @@ -13801,7 +13498,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5590"> +<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5060"> <summary> Do not audit attempts to receive afs_pt_client packets. </summary> @@ -13812,7 +13509,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5609"> +<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5079"> <summary> Send and receive afs_pt_client packets. </summary> @@ -13823,7 +13520,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5625"> +<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5095"> <summary> Do not audit attempts to send and receive afs_pt_client packets. </summary> @@ -13834,7 +13531,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5640"> +<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5110"> <summary> Relabel packets to afs_pt_client the packet type. </summary> @@ -13844,7 +13541,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_pt_server_packets" lineno="5660"> +<interface name="corenet_send_afs_pt_server_packets" lineno="5130"> <summary> Send afs_pt_server packets. </summary> @@ -13855,7 +13552,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5679"> +<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5149"> <summary> Do not audit attempts to send afs_pt_server packets. </summary> @@ -13866,7 +13563,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_pt_server_packets" lineno="5698"> +<interface name="corenet_receive_afs_pt_server_packets" lineno="5168"> <summary> Receive afs_pt_server packets. </summary> @@ -13877,7 +13574,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5717"> +<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5187"> <summary> Do not audit attempts to receive afs_pt_server packets. </summary> @@ -13888,7 +13585,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5736"> +<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5206"> <summary> Send and receive afs_pt_server packets. </summary> @@ -13899,7 +13596,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5752"> +<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5222"> <summary> Do not audit attempts to send and receive afs_pt_server packets. </summary> @@ -13910,7 +13607,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5767"> +<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5237"> <summary> Relabel packets to afs_pt_server the packet type. </summary> @@ -13920,85 +13617,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5789"> -<summary> -Send and receive TCP traffic on the afs_vl port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_afs_vl_port" lineno="5804"> -<summary> -Send UDP traffic on the afs_vl port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5819"> -<summary> -Do not audit attempts to send UDP traffic on the afs_vl port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_afs_vl_port" lineno="5834"> -<summary> -Receive UDP traffic on the afs_vl port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5849"> -<summary> -Do not audit attempts to receive UDP traffic on the afs_vl port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5864"> -<summary> -Send and receive UDP traffic on the afs_vl port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5880"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the afs_vl port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_afs_vl_port" lineno="5895"> +<interface name="corenet_tcp_bind_afs_vl_port" lineno="5259"> <summary> Bind TCP sockets to the afs_vl port. </summary> @@ -14009,7 +13628,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs_vl_port" lineno="5915"> +<interface name="corenet_udp_bind_afs_vl_port" lineno="5279"> <summary> Bind UDP sockets to the afs_vl port. </summary> @@ -14020,7 +13639,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs_vl_port" lineno="5934"> +<interface name="corenet_tcp_connect_afs_vl_port" lineno="5298"> <summary> Make a TCP connection to the afs_vl port. </summary> @@ -14030,7 +13649,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_vl_client_packets" lineno="5954"> +<interface name="corenet_send_afs_vl_client_packets" lineno="5318"> <summary> Send afs_vl_client packets. </summary> @@ -14041,7 +13660,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5973"> +<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5337"> <summary> Do not audit attempts to send afs_vl_client packets. </summary> @@ -14052,7 +13671,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_vl_client_packets" lineno="5992"> +<interface name="corenet_receive_afs_vl_client_packets" lineno="5356"> <summary> Receive afs_vl_client packets. </summary> @@ -14063,7 +13682,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="6011"> +<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5375"> <summary> Do not audit attempts to receive afs_vl_client packets. </summary> @@ -14074,7 +13693,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6030"> +<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="5394"> <summary> Send and receive afs_vl_client packets. </summary> @@ -14085,7 +13704,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6046"> +<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="5410"> <summary> Do not audit attempts to send and receive afs_vl_client packets. </summary> @@ -14096,7 +13715,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6061"> +<interface name="corenet_relabelto_afs_vl_client_packets" lineno="5425"> <summary> Relabel packets to afs_vl_client the packet type. </summary> @@ -14106,7 +13725,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs_vl_server_packets" lineno="6081"> +<interface name="corenet_send_afs_vl_server_packets" lineno="5445"> <summary> Send afs_vl_server packets. </summary> @@ -14117,7 +13736,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6100"> +<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="5464"> <summary> Do not audit attempts to send afs_vl_server packets. </summary> @@ -14128,7 +13747,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs_vl_server_packets" lineno="6119"> +<interface name="corenet_receive_afs_vl_server_packets" lineno="5483"> <summary> Receive afs_vl_server packets. </summary> @@ -14139,7 +13758,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6138"> +<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="5502"> <summary> Do not audit attempts to receive afs_vl_server packets. </summary> @@ -14150,7 +13769,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6157"> +<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="5521"> <summary> Send and receive afs_vl_server packets. </summary> @@ -14161,7 +13780,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6173"> +<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="5537"> <summary> Do not audit attempts to send and receive afs_vl_server packets. </summary> @@ -14172,7 +13791,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6188"> +<interface name="corenet_relabelto_afs_vl_server_packets" lineno="5552"> <summary> Relabel packets to afs_vl_server the packet type. </summary> @@ -14182,85 +13801,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6210"> -<summary> -Send and receive TCP traffic on the afs3_callback port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_afs3_callback_port" lineno="6225"> -<summary> -Send UDP traffic on the afs3_callback port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6240"> -<summary> -Do not audit attempts to send UDP traffic on the afs3_callback port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_afs3_callback_port" lineno="6255"> -<summary> -Receive UDP traffic on the afs3_callback port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6270"> -<summary> -Do not audit attempts to receive UDP traffic on the afs3_callback port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6285"> -<summary> -Send and receive UDP traffic on the afs3_callback port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6301"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the afs3_callback port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6316"> +<interface name="corenet_tcp_bind_afs3_callback_port" lineno="5574"> <summary> Bind TCP sockets to the afs3_callback port. </summary> @@ -14271,7 +13812,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_afs3_callback_port" lineno="6336"> +<interface name="corenet_udp_bind_afs3_callback_port" lineno="5594"> <summary> Bind UDP sockets to the afs3_callback port. </summary> @@ -14282,7 +13823,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6355"> +<interface name="corenet_tcp_connect_afs3_callback_port" lineno="5613"> <summary> Make a TCP connection to the afs3_callback port. </summary> @@ -14292,7 +13833,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs3_callback_client_packets" lineno="6375"> +<interface name="corenet_send_afs3_callback_client_packets" lineno="5633"> <summary> Send afs3_callback_client packets. </summary> @@ -14303,7 +13844,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6394"> +<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="5652"> <summary> Do not audit attempts to send afs3_callback_client packets. </summary> @@ -14314,7 +13855,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs3_callback_client_packets" lineno="6413"> +<interface name="corenet_receive_afs3_callback_client_packets" lineno="5671"> <summary> Receive afs3_callback_client packets. </summary> @@ -14325,7 +13866,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6432"> +<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="5690"> <summary> Do not audit attempts to receive afs3_callback_client packets. </summary> @@ -14336,7 +13877,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6451"> +<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="5709"> <summary> Send and receive afs3_callback_client packets. </summary> @@ -14347,7 +13888,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6467"> +<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="5725"> <summary> Do not audit attempts to send and receive afs3_callback_client packets. </summary> @@ -14358,7 +13899,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6482"> +<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="5740"> <summary> Relabel packets to afs3_callback_client the packet type. </summary> @@ -14368,7 +13909,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_afs3_callback_server_packets" lineno="6502"> +<interface name="corenet_send_afs3_callback_server_packets" lineno="5760"> <summary> Send afs3_callback_server packets. </summary> @@ -14379,7 +13920,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6521"> +<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="5779"> <summary> Do not audit attempts to send afs3_callback_server packets. </summary> @@ -14390,7 +13931,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_afs3_callback_server_packets" lineno="6540"> +<interface name="corenet_receive_afs3_callback_server_packets" lineno="5798"> <summary> Receive afs3_callback_server packets. </summary> @@ -14401,7 +13942,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6559"> +<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="5817"> <summary> Do not audit attempts to receive afs3_callback_server packets. </summary> @@ -14412,7 +13953,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6578"> +<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="5836"> <summary> Send and receive afs3_callback_server packets. </summary> @@ -14423,7 +13964,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6594"> +<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="5852"> <summary> Do not audit attempts to send and receive afs3_callback_server packets. </summary> @@ -14434,7 +13975,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6609"> +<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="5867"> <summary> Relabel packets to afs3_callback_server the packet type. </summary> @@ -14444,85 +13985,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6631"> -<summary> -Send and receive TCP traffic on the agentx port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_agentx_port" lineno="6646"> -<summary> -Send UDP traffic on the agentx port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6661"> -<summary> -Do not audit attempts to send UDP traffic on the agentx port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_agentx_port" lineno="6676"> -<summary> -Receive UDP traffic on the agentx port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6691"> -<summary> -Do not audit attempts to receive UDP traffic on the agentx port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_agentx_port" lineno="6706"> -<summary> -Send and receive UDP traffic on the agentx port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6722"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the agentx port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_agentx_port" lineno="6737"> +<interface name="corenet_tcp_bind_agentx_port" lineno="5889"> <summary> Bind TCP sockets to the agentx port. </summary> @@ -14533,7 +13996,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_agentx_port" lineno="6757"> +<interface name="corenet_udp_bind_agentx_port" lineno="5909"> <summary> Bind UDP sockets to the agentx port. </summary> @@ -14544,7 +14007,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_agentx_port" lineno="6776"> +<interface name="corenet_tcp_connect_agentx_port" lineno="5928"> <summary> Make a TCP connection to the agentx port. </summary> @@ -14554,7 +14017,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_agentx_client_packets" lineno="6796"> +<interface name="corenet_send_agentx_client_packets" lineno="5948"> <summary> Send agentx_client packets. </summary> @@ -14565,7 +14028,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6815"> +<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="5967"> <summary> Do not audit attempts to send agentx_client packets. </summary> @@ -14576,7 +14039,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_agentx_client_packets" lineno="6834"> +<interface name="corenet_receive_agentx_client_packets" lineno="5986"> <summary> Receive agentx_client packets. </summary> @@ -14587,7 +14050,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6853"> +<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6005"> <summary> Do not audit attempts to receive agentx_client packets. </summary> @@ -14598,7 +14061,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_agentx_client_packets" lineno="6872"> +<interface name="corenet_sendrecv_agentx_client_packets" lineno="6024"> <summary> Send and receive agentx_client packets. </summary> @@ -14609,7 +14072,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6888"> +<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6040"> <summary> Do not audit attempts to send and receive agentx_client packets. </summary> @@ -14620,7 +14083,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_agentx_client_packets" lineno="6903"> +<interface name="corenet_relabelto_agentx_client_packets" lineno="6055"> <summary> Relabel packets to agentx_client the packet type. </summary> @@ -14630,7 +14093,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_agentx_server_packets" lineno="6923"> +<interface name="corenet_send_agentx_server_packets" lineno="6075"> <summary> Send agentx_server packets. </summary> @@ -14641,7 +14104,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6942"> +<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6094"> <summary> Do not audit attempts to send agentx_server packets. </summary> @@ -14652,7 +14115,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_agentx_server_packets" lineno="6961"> +<interface name="corenet_receive_agentx_server_packets" lineno="6113"> <summary> Receive agentx_server packets. </summary> @@ -14663,7 +14126,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6980"> +<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6132"> <summary> Do not audit attempts to receive agentx_server packets. </summary> @@ -14674,7 +14137,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_agentx_server_packets" lineno="6999"> +<interface name="corenet_sendrecv_agentx_server_packets" lineno="6151"> <summary> Send and receive agentx_server packets. </summary> @@ -14685,7 +14148,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="7015"> +<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6167"> <summary> Do not audit attempts to send and receive agentx_server packets. </summary> @@ -14696,7 +14159,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_agentx_server_packets" lineno="7030"> +<interface name="corenet_relabelto_agentx_server_packets" lineno="6182"> <summary> Relabel packets to agentx_server the packet type. </summary> @@ -14706,85 +14169,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7052"> -<summary> -Send and receive TCP traffic on the amanda port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_amanda_port" lineno="7067"> -<summary> -Send UDP traffic on the amanda port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7082"> -<summary> -Do not audit attempts to send UDP traffic on the amanda port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_amanda_port" lineno="7097"> -<summary> -Receive UDP traffic on the amanda port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7112"> -<summary> -Do not audit attempts to receive UDP traffic on the amanda port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_amanda_port" lineno="7127"> -<summary> -Send and receive UDP traffic on the amanda port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7143"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the amanda port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_amanda_port" lineno="7158"> +<interface name="corenet_tcp_bind_amanda_port" lineno="6204"> <summary> Bind TCP sockets to the amanda port. </summary> @@ -14795,7 +14180,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_amanda_port" lineno="7178"> +<interface name="corenet_udp_bind_amanda_port" lineno="6224"> <summary> Bind UDP sockets to the amanda port. </summary> @@ -14806,7 +14191,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_amanda_port" lineno="7197"> +<interface name="corenet_tcp_connect_amanda_port" lineno="6243"> <summary> Make a TCP connection to the amanda port. </summary> @@ -14816,7 +14201,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amanda_client_packets" lineno="7217"> +<interface name="corenet_send_amanda_client_packets" lineno="6263"> <summary> Send amanda_client packets. </summary> @@ -14827,7 +14212,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7236"> +<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="6282"> <summary> Do not audit attempts to send amanda_client packets. </summary> @@ -14838,7 +14223,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amanda_client_packets" lineno="7255"> +<interface name="corenet_receive_amanda_client_packets" lineno="6301"> <summary> Receive amanda_client packets. </summary> @@ -14849,7 +14234,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7274"> +<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="6320"> <summary> Do not audit attempts to receive amanda_client packets. </summary> @@ -14860,7 +14245,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amanda_client_packets" lineno="7293"> +<interface name="corenet_sendrecv_amanda_client_packets" lineno="6339"> <summary> Send and receive amanda_client packets. </summary> @@ -14871,7 +14256,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7309"> +<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="6355"> <summary> Do not audit attempts to send and receive amanda_client packets. </summary> @@ -14882,7 +14267,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amanda_client_packets" lineno="7324"> +<interface name="corenet_relabelto_amanda_client_packets" lineno="6370"> <summary> Relabel packets to amanda_client the packet type. </summary> @@ -14892,7 +14277,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amanda_server_packets" lineno="7344"> +<interface name="corenet_send_amanda_server_packets" lineno="6390"> <summary> Send amanda_server packets. </summary> @@ -14903,7 +14288,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7363"> +<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="6409"> <summary> Do not audit attempts to send amanda_server packets. </summary> @@ -14914,7 +14299,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amanda_server_packets" lineno="7382"> +<interface name="corenet_receive_amanda_server_packets" lineno="6428"> <summary> Receive amanda_server packets. </summary> @@ -14925,7 +14310,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7401"> +<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="6447"> <summary> Do not audit attempts to receive amanda_server packets. </summary> @@ -14936,7 +14321,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amanda_server_packets" lineno="7420"> +<interface name="corenet_sendrecv_amanda_server_packets" lineno="6466"> <summary> Send and receive amanda_server packets. </summary> @@ -14947,7 +14332,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7436"> +<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="6482"> <summary> Do not audit attempts to send and receive amanda_server packets. </summary> @@ -14958,7 +14343,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amanda_server_packets" lineno="7451"> +<interface name="corenet_relabelto_amanda_server_packets" lineno="6497"> <summary> Relabel packets to amanda_server the packet type. </summary> @@ -14968,85 +14353,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7473"> -<summary> -Send and receive TCP traffic on the amavisd_recv port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_amavisd_recv_port" lineno="7488"> -<summary> -Send UDP traffic on the amavisd_recv port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7503"> -<summary> -Do not audit attempts to send UDP traffic on the amavisd_recv port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7518"> -<summary> -Receive UDP traffic on the amavisd_recv port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7533"> -<summary> -Do not audit attempts to receive UDP traffic on the amavisd_recv port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7548"> -<summary> -Send and receive UDP traffic on the amavisd_recv port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7564"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the amavisd_recv port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7579"> +<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="6519"> <summary> Bind TCP sockets to the amavisd_recv port. </summary> @@ -15057,7 +14364,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7599"> +<interface name="corenet_udp_bind_amavisd_recv_port" lineno="6539"> <summary> Bind UDP sockets to the amavisd_recv port. </summary> @@ -15068,7 +14375,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7618"> +<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="6558"> <summary> Make a TCP connection to the amavisd_recv port. </summary> @@ -15078,7 +14385,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amavisd_recv_client_packets" lineno="7638"> +<interface name="corenet_send_amavisd_recv_client_packets" lineno="6578"> <summary> Send amavisd_recv_client packets. </summary> @@ -15089,7 +14396,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7657"> +<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="6597"> <summary> Do not audit attempts to send amavisd_recv_client packets. </summary> @@ -15100,7 +14407,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7676"> +<interface name="corenet_receive_amavisd_recv_client_packets" lineno="6616"> <summary> Receive amavisd_recv_client packets. </summary> @@ -15111,7 +14418,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7695"> +<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="6635"> <summary> Do not audit attempts to receive amavisd_recv_client packets. </summary> @@ -15122,7 +14429,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7714"> +<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="6654"> <summary> Send and receive amavisd_recv_client packets. </summary> @@ -15133,7 +14440,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7730"> +<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="6670"> <summary> Do not audit attempts to send and receive amavisd_recv_client packets. </summary> @@ -15144,7 +14451,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7745"> +<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="6685"> <summary> Relabel packets to amavisd_recv_client the packet type. </summary> @@ -15154,7 +14461,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amavisd_recv_server_packets" lineno="7765"> +<interface name="corenet_send_amavisd_recv_server_packets" lineno="6705"> <summary> Send amavisd_recv_server packets. </summary> @@ -15165,7 +14472,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7784"> +<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="6724"> <summary> Do not audit attempts to send amavisd_recv_server packets. </summary> @@ -15176,7 +14483,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7803"> +<interface name="corenet_receive_amavisd_recv_server_packets" lineno="6743"> <summary> Receive amavisd_recv_server packets. </summary> @@ -15187,7 +14494,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7822"> +<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="6762"> <summary> Do not audit attempts to receive amavisd_recv_server packets. </summary> @@ -15198,7 +14505,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7841"> +<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="6781"> <summary> Send and receive amavisd_recv_server packets. </summary> @@ -15209,7 +14516,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7857"> +<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="6797"> <summary> Do not audit attempts to send and receive amavisd_recv_server packets. </summary> @@ -15220,7 +14527,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7872"> +<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="6812"> <summary> Relabel packets to amavisd_recv_server the packet type. </summary> @@ -15230,85 +14537,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7894"> -<summary> -Send and receive TCP traffic on the amavisd_send port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_amavisd_send_port" lineno="7909"> -<summary> -Send UDP traffic on the amavisd_send port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7924"> -<summary> -Do not audit attempts to send UDP traffic on the amavisd_send port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_amavisd_send_port" lineno="7939"> -<summary> -Receive UDP traffic on the amavisd_send port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7954"> -<summary> -Do not audit attempts to receive UDP traffic on the amavisd_send port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7969"> -<summary> -Send and receive UDP traffic on the amavisd_send port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7985"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the amavisd_send port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_amavisd_send_port" lineno="8000"> +<interface name="corenet_tcp_bind_amavisd_send_port" lineno="6834"> <summary> Bind TCP sockets to the amavisd_send port. </summary> @@ -15319,7 +14548,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_amavisd_send_port" lineno="8020"> +<interface name="corenet_udp_bind_amavisd_send_port" lineno="6854"> <summary> Bind UDP sockets to the amavisd_send port. </summary> @@ -15330,7 +14559,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8039"> +<interface name="corenet_tcp_connect_amavisd_send_port" lineno="6873"> <summary> Make a TCP connection to the amavisd_send port. </summary> @@ -15340,7 +14569,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amavisd_send_client_packets" lineno="8059"> +<interface name="corenet_send_amavisd_send_client_packets" lineno="6893"> <summary> Send amavisd_send_client packets. </summary> @@ -15351,7 +14580,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8078"> +<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="6912"> <summary> Do not audit attempts to send amavisd_send_client packets. </summary> @@ -15362,7 +14591,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amavisd_send_client_packets" lineno="8097"> +<interface name="corenet_receive_amavisd_send_client_packets" lineno="6931"> <summary> Receive amavisd_send_client packets. </summary> @@ -15373,7 +14602,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8116"> +<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="6950"> <summary> Do not audit attempts to receive amavisd_send_client packets. </summary> @@ -15384,7 +14613,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8135"> +<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="6969"> <summary> Send and receive amavisd_send_client packets. </summary> @@ -15395,7 +14624,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8151"> +<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="6985"> <summary> Do not audit attempts to send and receive amavisd_send_client packets. </summary> @@ -15406,7 +14635,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8166"> +<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="7000"> <summary> Relabel packets to amavisd_send_client the packet type. </summary> @@ -15416,7 +14645,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amavisd_send_server_packets" lineno="8186"> +<interface name="corenet_send_amavisd_send_server_packets" lineno="7020"> <summary> Send amavisd_send_server packets. </summary> @@ -15427,7 +14656,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8205"> +<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="7039"> <summary> Do not audit attempts to send amavisd_send_server packets. </summary> @@ -15438,7 +14667,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amavisd_send_server_packets" lineno="8224"> +<interface name="corenet_receive_amavisd_send_server_packets" lineno="7058"> <summary> Receive amavisd_send_server packets. </summary> @@ -15449,7 +14678,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8243"> +<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="7077"> <summary> Do not audit attempts to receive amavisd_send_server packets. </summary> @@ -15460,7 +14689,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8262"> +<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="7096"> <summary> Send and receive amavisd_send_server packets. </summary> @@ -15471,7 +14700,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8278"> +<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="7112"> <summary> Do not audit attempts to send and receive amavisd_send_server packets. </summary> @@ -15482,7 +14711,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8293"> +<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="7127"> <summary> Relabel packets to amavisd_send_server the packet type. </summary> @@ -15492,85 +14721,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8315"> -<summary> -Send and receive TCP traffic on the amqp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_amqp_port" lineno="8330"> -<summary> -Send UDP traffic on the amqp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8345"> -<summary> -Do not audit attempts to send UDP traffic on the amqp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_amqp_port" lineno="8360"> -<summary> -Receive UDP traffic on the amqp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8375"> -<summary> -Do not audit attempts to receive UDP traffic on the amqp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_amqp_port" lineno="8390"> -<summary> -Send and receive UDP traffic on the amqp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8406"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the amqp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_amqp_port" lineno="8421"> +<interface name="corenet_tcp_bind_amqp_port" lineno="7149"> <summary> Bind TCP sockets to the amqp port. </summary> @@ -15581,7 +14732,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_amqp_port" lineno="8441"> +<interface name="corenet_udp_bind_amqp_port" lineno="7169"> <summary> Bind UDP sockets to the amqp port. </summary> @@ -15592,7 +14743,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_amqp_port" lineno="8460"> +<interface name="corenet_tcp_connect_amqp_port" lineno="7188"> <summary> Make a TCP connection to the amqp port. </summary> @@ -15602,7 +14753,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amqp_client_packets" lineno="8480"> +<interface name="corenet_send_amqp_client_packets" lineno="7208"> <summary> Send amqp_client packets. </summary> @@ -15613,7 +14764,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8499"> +<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="7227"> <summary> Do not audit attempts to send amqp_client packets. </summary> @@ -15624,7 +14775,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amqp_client_packets" lineno="8518"> +<interface name="corenet_receive_amqp_client_packets" lineno="7246"> <summary> Receive amqp_client packets. </summary> @@ -15635,7 +14786,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8537"> +<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="7265"> <summary> Do not audit attempts to receive amqp_client packets. </summary> @@ -15646,7 +14797,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amqp_client_packets" lineno="8556"> +<interface name="corenet_sendrecv_amqp_client_packets" lineno="7284"> <summary> Send and receive amqp_client packets. </summary> @@ -15657,7 +14808,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8572"> +<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="7300"> <summary> Do not audit attempts to send and receive amqp_client packets. </summary> @@ -15668,7 +14819,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amqp_client_packets" lineno="8587"> +<interface name="corenet_relabelto_amqp_client_packets" lineno="7315"> <summary> Relabel packets to amqp_client the packet type. </summary> @@ -15678,7 +14829,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_amqp_server_packets" lineno="8607"> +<interface name="corenet_send_amqp_server_packets" lineno="7335"> <summary> Send amqp_server packets. </summary> @@ -15689,7 +14840,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8626"> +<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="7354"> <summary> Do not audit attempts to send amqp_server packets. </summary> @@ -15700,7 +14851,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_amqp_server_packets" lineno="8645"> +<interface name="corenet_receive_amqp_server_packets" lineno="7373"> <summary> Receive amqp_server packets. </summary> @@ -15711,7 +14862,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8664"> +<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="7392"> <summary> Do not audit attempts to receive amqp_server packets. </summary> @@ -15722,7 +14873,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_amqp_server_packets" lineno="8683"> +<interface name="corenet_sendrecv_amqp_server_packets" lineno="7411"> <summary> Send and receive amqp_server packets. </summary> @@ -15733,7 +14884,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8699"> +<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="7427"> <summary> Do not audit attempts to send and receive amqp_server packets. </summary> @@ -15744,7 +14895,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_amqp_server_packets" lineno="8714"> +<interface name="corenet_relabelto_amqp_server_packets" lineno="7442"> <summary> Relabel packets to amqp_server the packet type. </summary> @@ -15754,85 +14905,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_aol_port" lineno="8736"> -<summary> -Send and receive TCP traffic on the aol port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_aol_port" lineno="8751"> -<summary> -Send UDP traffic on the aol port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8766"> -<summary> -Do not audit attempts to send UDP traffic on the aol port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_aol_port" lineno="8781"> -<summary> -Receive UDP traffic on the aol port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8796"> -<summary> -Do not audit attempts to receive UDP traffic on the aol port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_aol_port" lineno="8811"> -<summary> -Send and receive UDP traffic on the aol port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8827"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the aol port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_aol_port" lineno="8842"> +<interface name="corenet_tcp_bind_aol_port" lineno="7464"> <summary> Bind TCP sockets to the aol port. </summary> @@ -15843,7 +14916,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_aol_port" lineno="8862"> +<interface name="corenet_udp_bind_aol_port" lineno="7484"> <summary> Bind UDP sockets to the aol port. </summary> @@ -15854,7 +14927,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_aol_port" lineno="8881"> +<interface name="corenet_tcp_connect_aol_port" lineno="7503"> <summary> Make a TCP connection to the aol port. </summary> @@ -15864,7 +14937,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_aol_client_packets" lineno="8901"> +<interface name="corenet_send_aol_client_packets" lineno="7523"> <summary> Send aol_client packets. </summary> @@ -15875,7 +14948,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8920"> +<interface name="corenet_dontaudit_send_aol_client_packets" lineno="7542"> <summary> Do not audit attempts to send aol_client packets. </summary> @@ -15886,7 +14959,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_aol_client_packets" lineno="8939"> +<interface name="corenet_receive_aol_client_packets" lineno="7561"> <summary> Receive aol_client packets. </summary> @@ -15897,7 +14970,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8958"> +<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="7580"> <summary> Do not audit attempts to receive aol_client packets. </summary> @@ -15908,7 +14981,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_aol_client_packets" lineno="8977"> +<interface name="corenet_sendrecv_aol_client_packets" lineno="7599"> <summary> Send and receive aol_client packets. </summary> @@ -15919,7 +14992,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8993"> +<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="7615"> <summary> Do not audit attempts to send and receive aol_client packets. </summary> @@ -15930,7 +15003,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_aol_client_packets" lineno="9008"> +<interface name="corenet_relabelto_aol_client_packets" lineno="7630"> <summary> Relabel packets to aol_client the packet type. </summary> @@ -15940,7 +15013,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_aol_server_packets" lineno="9028"> +<interface name="corenet_send_aol_server_packets" lineno="7650"> <summary> Send aol_server packets. </summary> @@ -15951,7 +15024,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9047"> +<interface name="corenet_dontaudit_send_aol_server_packets" lineno="7669"> <summary> Do not audit attempts to send aol_server packets. </summary> @@ -15962,7 +15035,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_aol_server_packets" lineno="9066"> +<interface name="corenet_receive_aol_server_packets" lineno="7688"> <summary> Receive aol_server packets. </summary> @@ -15973,7 +15046,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9085"> +<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="7707"> <summary> Do not audit attempts to receive aol_server packets. </summary> @@ -15984,7 +15057,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_aol_server_packets" lineno="9104"> +<interface name="corenet_sendrecv_aol_server_packets" lineno="7726"> <summary> Send and receive aol_server packets. </summary> @@ -15995,7 +15068,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9120"> +<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="7742"> <summary> Do not audit attempts to send and receive aol_server packets. </summary> @@ -16006,7 +15079,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_aol_server_packets" lineno="9135"> +<interface name="corenet_relabelto_aol_server_packets" lineno="7757"> <summary> Relabel packets to aol_server the packet type. </summary> @@ -16016,85 +15089,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9157"> -<summary> -Send and receive TCP traffic on the apcupsd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_apcupsd_port" lineno="9172"> -<summary> -Send UDP traffic on the apcupsd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9187"> -<summary> -Do not audit attempts to send UDP traffic on the apcupsd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_apcupsd_port" lineno="9202"> -<summary> -Receive UDP traffic on the apcupsd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9217"> -<summary> -Do not audit attempts to receive UDP traffic on the apcupsd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9232"> -<summary> -Send and receive UDP traffic on the apcupsd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9248"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the apcupsd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_apcupsd_port" lineno="9263"> +<interface name="corenet_tcp_bind_apcupsd_port" lineno="7779"> <summary> Bind TCP sockets to the apcupsd port. </summary> @@ -16105,7 +15100,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_apcupsd_port" lineno="9283"> +<interface name="corenet_udp_bind_apcupsd_port" lineno="7799"> <summary> Bind UDP sockets to the apcupsd port. </summary> @@ -16116,7 +15111,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_apcupsd_port" lineno="9302"> +<interface name="corenet_tcp_connect_apcupsd_port" lineno="7818"> <summary> Make a TCP connection to the apcupsd port. </summary> @@ -16126,7 +15121,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_apcupsd_client_packets" lineno="9322"> +<interface name="corenet_send_apcupsd_client_packets" lineno="7838"> <summary> Send apcupsd_client packets. </summary> @@ -16137,7 +15132,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9341"> +<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="7857"> <summary> Do not audit attempts to send apcupsd_client packets. </summary> @@ -16148,7 +15143,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_apcupsd_client_packets" lineno="9360"> +<interface name="corenet_receive_apcupsd_client_packets" lineno="7876"> <summary> Receive apcupsd_client packets. </summary> @@ -16159,7 +15154,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9379"> +<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="7895"> <summary> Do not audit attempts to receive apcupsd_client packets. </summary> @@ -16170,7 +15165,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9398"> +<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="7914"> <summary> Send and receive apcupsd_client packets. </summary> @@ -16181,7 +15176,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9414"> +<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="7930"> <summary> Do not audit attempts to send and receive apcupsd_client packets. </summary> @@ -16192,7 +15187,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9429"> +<interface name="corenet_relabelto_apcupsd_client_packets" lineno="7945"> <summary> Relabel packets to apcupsd_client the packet type. </summary> @@ -16202,7 +15197,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_apcupsd_server_packets" lineno="9449"> +<interface name="corenet_send_apcupsd_server_packets" lineno="7965"> <summary> Send apcupsd_server packets. </summary> @@ -16213,7 +15208,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9468"> +<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="7984"> <summary> Do not audit attempts to send apcupsd_server packets. </summary> @@ -16224,7 +15219,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_apcupsd_server_packets" lineno="9487"> +<interface name="corenet_receive_apcupsd_server_packets" lineno="8003"> <summary> Receive apcupsd_server packets. </summary> @@ -16235,7 +15230,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9506"> +<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="8022"> <summary> Do not audit attempts to receive apcupsd_server packets. </summary> @@ -16246,7 +15241,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9525"> +<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="8041"> <summary> Send and receive apcupsd_server packets. </summary> @@ -16257,7 +15252,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9541"> +<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="8057"> <summary> Do not audit attempts to send and receive apcupsd_server packets. </summary> @@ -16268,7 +15263,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9556"> +<interface name="corenet_relabelto_apcupsd_server_packets" lineno="8072"> <summary> Relabel packets to apcupsd_server the packet type. </summary> @@ -16278,85 +15273,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9578"> -<summary> -Send and receive TCP traffic on the apertus_ldp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_apertus_ldp_port" lineno="9593"> -<summary> -Send UDP traffic on the apertus_ldp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9608"> -<summary> -Do not audit attempts to send UDP traffic on the apertus_ldp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9623"> -<summary> -Receive UDP traffic on the apertus_ldp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9638"> -<summary> -Do not audit attempts to receive UDP traffic on the apertus_ldp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9653"> -<summary> -Send and receive UDP traffic on the apertus_ldp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9669"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the apertus_ldp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9684"> +<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="8094"> <summary> Bind TCP sockets to the apertus_ldp port. </summary> @@ -16367,7 +15284,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9704"> +<interface name="corenet_udp_bind_apertus_ldp_port" lineno="8114"> <summary> Bind UDP sockets to the apertus_ldp port. </summary> @@ -16378,7 +15295,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9723"> +<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="8133"> <summary> Make a TCP connection to the apertus_ldp port. </summary> @@ -16388,7 +15305,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_apertus_ldp_client_packets" lineno="9743"> +<interface name="corenet_send_apertus_ldp_client_packets" lineno="8153"> <summary> Send apertus_ldp_client packets. </summary> @@ -16399,7 +15316,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9762"> +<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="8172"> <summary> Do not audit attempts to send apertus_ldp_client packets. </summary> @@ -16410,7 +15327,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9781"> +<interface name="corenet_receive_apertus_ldp_client_packets" lineno="8191"> <summary> Receive apertus_ldp_client packets. </summary> @@ -16421,7 +15338,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9800"> +<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="8210"> <summary> Do not audit attempts to receive apertus_ldp_client packets. </summary> @@ -16432,7 +15349,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9819"> +<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="8229"> <summary> Send and receive apertus_ldp_client packets. </summary> @@ -16443,7 +15360,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9835"> +<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="8245"> <summary> Do not audit attempts to send and receive apertus_ldp_client packets. </summary> @@ -16454,7 +15371,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9850"> +<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="8260"> <summary> Relabel packets to apertus_ldp_client the packet type. </summary> @@ -16464,7 +15381,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_apertus_ldp_server_packets" lineno="9870"> +<interface name="corenet_send_apertus_ldp_server_packets" lineno="8280"> <summary> Send apertus_ldp_server packets. </summary> @@ -16475,7 +15392,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9889"> +<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="8299"> <summary> Do not audit attempts to send apertus_ldp_server packets. </summary> @@ -16486,7 +15403,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9908"> +<interface name="corenet_receive_apertus_ldp_server_packets" lineno="8318"> <summary> Receive apertus_ldp_server packets. </summary> @@ -16497,7 +15414,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9927"> +<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="8337"> <summary> Do not audit attempts to receive apertus_ldp_server packets. </summary> @@ -16508,7 +15425,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9946"> +<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="8356"> <summary> Send and receive apertus_ldp_server packets. </summary> @@ -16519,7 +15436,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9962"> +<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="8372"> <summary> Do not audit attempts to send and receive apertus_ldp_server packets. </summary> @@ -16530,7 +15447,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9977"> +<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="8387"> <summary> Relabel packets to apertus_ldp_server the packet type. </summary> @@ -16540,85 +15457,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_aptcacher_port" lineno="9999"> -<summary> -Send and receive TCP traffic on the aptcacher port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_aptcacher_port" lineno="10014"> -<summary> -Send UDP traffic on the aptcacher port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_aptcacher_port" lineno="10029"> -<summary> -Do not audit attempts to send UDP traffic on the aptcacher port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_aptcacher_port" lineno="10044"> -<summary> -Receive UDP traffic on the aptcacher port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_aptcacher_port" lineno="10059"> -<summary> -Do not audit attempts to receive UDP traffic on the aptcacher port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_aptcacher_port" lineno="10074"> -<summary> -Send and receive UDP traffic on the aptcacher port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_aptcacher_port" lineno="10090"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the aptcacher port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_aptcacher_port" lineno="10105"> +<interface name="corenet_tcp_bind_aptcacher_port" lineno="8409"> <summary> Bind TCP sockets to the aptcacher port. </summary> @@ -16629,7 +15468,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_aptcacher_port" lineno="10125"> +<interface name="corenet_udp_bind_aptcacher_port" lineno="8429"> <summary> Bind UDP sockets to the aptcacher port. </summary> @@ -16640,7 +15479,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_aptcacher_port" lineno="10144"> +<interface name="corenet_tcp_connect_aptcacher_port" lineno="8448"> <summary> Make a TCP connection to the aptcacher port. </summary> @@ -16650,7 +15489,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_aptcacher_client_packets" lineno="10164"> +<interface name="corenet_send_aptcacher_client_packets" lineno="8468"> <summary> Send aptcacher_client packets. </summary> @@ -16661,7 +15500,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="10183"> +<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="8487"> <summary> Do not audit attempts to send aptcacher_client packets. </summary> @@ -16672,7 +15511,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_aptcacher_client_packets" lineno="10202"> +<interface name="corenet_receive_aptcacher_client_packets" lineno="8506"> <summary> Receive aptcacher_client packets. </summary> @@ -16683,7 +15522,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="10221"> +<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="8525"> <summary> Do not audit attempts to receive aptcacher_client packets. </summary> @@ -16694,7 +15533,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="10240"> +<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="8544"> <summary> Send and receive aptcacher_client packets. </summary> @@ -16705,7 +15544,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="10256"> +<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="8560"> <summary> Do not audit attempts to send and receive aptcacher_client packets. </summary> @@ -16716,7 +15555,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_aptcacher_client_packets" lineno="10271"> +<interface name="corenet_relabelto_aptcacher_client_packets" lineno="8575"> <summary> Relabel packets to aptcacher_client the packet type. </summary> @@ -16726,7 +15565,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_aptcacher_server_packets" lineno="10291"> +<interface name="corenet_send_aptcacher_server_packets" lineno="8595"> <summary> Send aptcacher_server packets. </summary> @@ -16737,7 +15576,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="10310"> +<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="8614"> <summary> Do not audit attempts to send aptcacher_server packets. </summary> @@ -16748,7 +15587,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_aptcacher_server_packets" lineno="10329"> +<interface name="corenet_receive_aptcacher_server_packets" lineno="8633"> <summary> Receive aptcacher_server packets. </summary> @@ -16759,7 +15598,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="10348"> +<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="8652"> <summary> Do not audit attempts to receive aptcacher_server packets. </summary> @@ -16770,7 +15609,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="10367"> +<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="8671"> <summary> Send and receive aptcacher_server packets. </summary> @@ -16781,7 +15620,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="10383"> +<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="8687"> <summary> Do not audit attempts to send and receive aptcacher_server packets. </summary> @@ -16792,7 +15631,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_aptcacher_server_packets" lineno="10398"> +<interface name="corenet_relabelto_aptcacher_server_packets" lineno="8702"> <summary> Relabel packets to aptcacher_server the packet type. </summary> @@ -16802,85 +15641,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10420"> -<summary> -Send and receive TCP traffic on the armtechdaemon port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_armtechdaemon_port" lineno="10435"> -<summary> -Send UDP traffic on the armtechdaemon port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10450"> -<summary> -Do not audit attempts to send UDP traffic on the armtechdaemon port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10465"> -<summary> -Receive UDP traffic on the armtechdaemon port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10480"> -<summary> -Do not audit attempts to receive UDP traffic on the armtechdaemon port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10495"> -<summary> -Send and receive UDP traffic on the armtechdaemon port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10511"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the armtechdaemon port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10526"> +<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="8724"> <summary> Bind TCP sockets to the armtechdaemon port. </summary> @@ -16891,7 +15652,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10546"> +<interface name="corenet_udp_bind_armtechdaemon_port" lineno="8744"> <summary> Bind UDP sockets to the armtechdaemon port. </summary> @@ -16902,7 +15663,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10565"> +<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="8763"> <summary> Make a TCP connection to the armtechdaemon port. </summary> @@ -16912,7 +15673,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_armtechdaemon_client_packets" lineno="10585"> +<interface name="corenet_send_armtechdaemon_client_packets" lineno="8783"> <summary> Send armtechdaemon_client packets. </summary> @@ -16923,7 +15684,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10604"> +<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="8802"> <summary> Do not audit attempts to send armtechdaemon_client packets. </summary> @@ -16934,7 +15695,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10623"> +<interface name="corenet_receive_armtechdaemon_client_packets" lineno="8821"> <summary> Receive armtechdaemon_client packets. </summary> @@ -16945,7 +15706,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10642"> +<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="8840"> <summary> Do not audit attempts to receive armtechdaemon_client packets. </summary> @@ -16956,7 +15717,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10661"> +<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="8859"> <summary> Send and receive armtechdaemon_client packets. </summary> @@ -16967,7 +15728,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10677"> +<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="8875"> <summary> Do not audit attempts to send and receive armtechdaemon_client packets. </summary> @@ -16978,7 +15739,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10692"> +<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="8890"> <summary> Relabel packets to armtechdaemon_client the packet type. </summary> @@ -16988,7 +15749,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_armtechdaemon_server_packets" lineno="10712"> +<interface name="corenet_send_armtechdaemon_server_packets" lineno="8910"> <summary> Send armtechdaemon_server packets. </summary> @@ -16999,7 +15760,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10731"> +<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="8929"> <summary> Do not audit attempts to send armtechdaemon_server packets. </summary> @@ -17010,7 +15771,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10750"> +<interface name="corenet_receive_armtechdaemon_server_packets" lineno="8948"> <summary> Receive armtechdaemon_server packets. </summary> @@ -17021,7 +15782,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10769"> +<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="8967"> <summary> Do not audit attempts to receive armtechdaemon_server packets. </summary> @@ -17032,7 +15793,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10788"> +<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="8986"> <summary> Send and receive armtechdaemon_server packets. </summary> @@ -17043,7 +15804,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10804"> +<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="9002"> <summary> Do not audit attempts to send and receive armtechdaemon_server packets. </summary> @@ -17054,7 +15815,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10819"> +<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="9017"> <summary> Relabel packets to armtechdaemon_server the packet type. </summary> @@ -17064,85 +15825,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10841"> -<summary> -Send and receive TCP traffic on the asterisk port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_asterisk_port" lineno="10856"> -<summary> -Send UDP traffic on the asterisk port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10871"> -<summary> -Do not audit attempts to send UDP traffic on the asterisk port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_asterisk_port" lineno="10886"> -<summary> -Receive UDP traffic on the asterisk port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10901"> -<summary> -Do not audit attempts to receive UDP traffic on the asterisk port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10916"> -<summary> -Send and receive UDP traffic on the asterisk port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10932"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the asterisk port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_asterisk_port" lineno="10947"> +<interface name="corenet_tcp_bind_asterisk_port" lineno="9039"> <summary> Bind TCP sockets to the asterisk port. </summary> @@ -17153,7 +15836,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_asterisk_port" lineno="10967"> +<interface name="corenet_udp_bind_asterisk_port" lineno="9059"> <summary> Bind UDP sockets to the asterisk port. </summary> @@ -17164,7 +15847,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_asterisk_port" lineno="10986"> +<interface name="corenet_tcp_connect_asterisk_port" lineno="9078"> <summary> Make a TCP connection to the asterisk port. </summary> @@ -17174,7 +15857,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_asterisk_client_packets" lineno="11006"> +<interface name="corenet_send_asterisk_client_packets" lineno="9098"> <summary> Send asterisk_client packets. </summary> @@ -17185,7 +15868,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="11025"> +<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="9117"> <summary> Do not audit attempts to send asterisk_client packets. </summary> @@ -17196,7 +15879,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_asterisk_client_packets" lineno="11044"> +<interface name="corenet_receive_asterisk_client_packets" lineno="9136"> <summary> Receive asterisk_client packets. </summary> @@ -17207,7 +15890,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="11063"> +<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="9155"> <summary> Do not audit attempts to receive asterisk_client packets. </summary> @@ -17218,7 +15901,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_asterisk_client_packets" lineno="11082"> +<interface name="corenet_sendrecv_asterisk_client_packets" lineno="9174"> <summary> Send and receive asterisk_client packets. </summary> @@ -17229,7 +15912,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="11098"> +<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="9190"> <summary> Do not audit attempts to send and receive asterisk_client packets. </summary> @@ -17240,7 +15923,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_asterisk_client_packets" lineno="11113"> +<interface name="corenet_relabelto_asterisk_client_packets" lineno="9205"> <summary> Relabel packets to asterisk_client the packet type. </summary> @@ -17250,7 +15933,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_asterisk_server_packets" lineno="11133"> +<interface name="corenet_send_asterisk_server_packets" lineno="9225"> <summary> Send asterisk_server packets. </summary> @@ -17261,7 +15944,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11152"> +<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="9244"> <summary> Do not audit attempts to send asterisk_server packets. </summary> @@ -17272,7 +15955,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_asterisk_server_packets" lineno="11171"> +<interface name="corenet_receive_asterisk_server_packets" lineno="9263"> <summary> Receive asterisk_server packets. </summary> @@ -17283,7 +15966,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11190"> +<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="9282"> <summary> Do not audit attempts to receive asterisk_server packets. </summary> @@ -17294,7 +15977,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11209"> +<interface name="corenet_sendrecv_asterisk_server_packets" lineno="9301"> <summary> Send and receive asterisk_server packets. </summary> @@ -17305,7 +15988,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11225"> +<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="9317"> <summary> Do not audit attempts to send and receive asterisk_server packets. </summary> @@ -17316,7 +15999,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_asterisk_server_packets" lineno="11240"> +<interface name="corenet_relabelto_asterisk_server_packets" lineno="9332"> <summary> Relabel packets to asterisk_server the packet type. </summary> @@ -17326,85 +16009,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_audit_port" lineno="11262"> -<summary> -Send and receive TCP traffic on the audit port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_audit_port" lineno="11277"> -<summary> -Send UDP traffic on the audit port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11292"> -<summary> -Do not audit attempts to send UDP traffic on the audit port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_audit_port" lineno="11307"> -<summary> -Receive UDP traffic on the audit port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11322"> -<summary> -Do not audit attempts to receive UDP traffic on the audit port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_audit_port" lineno="11337"> -<summary> -Send and receive UDP traffic on the audit port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11353"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the audit port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_audit_port" lineno="11368"> +<interface name="corenet_tcp_bind_audit_port" lineno="9354"> <summary> Bind TCP sockets to the audit port. </summary> @@ -17415,7 +16020,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_audit_port" lineno="11388"> +<interface name="corenet_udp_bind_audit_port" lineno="9374"> <summary> Bind UDP sockets to the audit port. </summary> @@ -17426,7 +16031,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_audit_port" lineno="11407"> +<interface name="corenet_tcp_connect_audit_port" lineno="9393"> <summary> Make a TCP connection to the audit port. </summary> @@ -17436,7 +16041,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_audit_client_packets" lineno="11427"> +<interface name="corenet_send_audit_client_packets" lineno="9413"> <summary> Send audit_client packets. </summary> @@ -17447,7 +16052,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11446"> +<interface name="corenet_dontaudit_send_audit_client_packets" lineno="9432"> <summary> Do not audit attempts to send audit_client packets. </summary> @@ -17458,7 +16063,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_audit_client_packets" lineno="11465"> +<interface name="corenet_receive_audit_client_packets" lineno="9451"> <summary> Receive audit_client packets. </summary> @@ -17469,7 +16074,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11484"> +<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="9470"> <summary> Do not audit attempts to receive audit_client packets. </summary> @@ -17480,7 +16085,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_audit_client_packets" lineno="11503"> +<interface name="corenet_sendrecv_audit_client_packets" lineno="9489"> <summary> Send and receive audit_client packets. </summary> @@ -17491,7 +16096,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11519"> +<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="9505"> <summary> Do not audit attempts to send and receive audit_client packets. </summary> @@ -17502,7 +16107,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_audit_client_packets" lineno="11534"> +<interface name="corenet_relabelto_audit_client_packets" lineno="9520"> <summary> Relabel packets to audit_client the packet type. </summary> @@ -17512,7 +16117,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_audit_server_packets" lineno="11554"> +<interface name="corenet_send_audit_server_packets" lineno="9540"> <summary> Send audit_server packets. </summary> @@ -17523,7 +16128,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11573"> +<interface name="corenet_dontaudit_send_audit_server_packets" lineno="9559"> <summary> Do not audit attempts to send audit_server packets. </summary> @@ -17534,7 +16139,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_audit_server_packets" lineno="11592"> +<interface name="corenet_receive_audit_server_packets" lineno="9578"> <summary> Receive audit_server packets. </summary> @@ -17545,7 +16150,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11611"> +<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="9597"> <summary> Do not audit attempts to receive audit_server packets. </summary> @@ -17556,7 +16161,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_audit_server_packets" lineno="11630"> +<interface name="corenet_sendrecv_audit_server_packets" lineno="9616"> <summary> Send and receive audit_server packets. </summary> @@ -17567,7 +16172,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11646"> +<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="9632"> <summary> Do not audit attempts to send and receive audit_server packets. </summary> @@ -17578,7 +16183,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_audit_server_packets" lineno="11661"> +<interface name="corenet_relabelto_audit_server_packets" lineno="9647"> <summary> Relabel packets to audit_server the packet type. </summary> @@ -17588,85 +16193,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_auth_port" lineno="11683"> -<summary> -Send and receive TCP traffic on the auth port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_auth_port" lineno="11698"> -<summary> -Send UDP traffic on the auth port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11713"> -<summary> -Do not audit attempts to send UDP traffic on the auth port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_auth_port" lineno="11728"> -<summary> -Receive UDP traffic on the auth port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11743"> -<summary> -Do not audit attempts to receive UDP traffic on the auth port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_auth_port" lineno="11758"> -<summary> -Send and receive UDP traffic on the auth port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11774"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the auth port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_auth_port" lineno="11789"> +<interface name="corenet_tcp_bind_auth_port" lineno="9669"> <summary> Bind TCP sockets to the auth port. </summary> @@ -17677,7 +16204,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_auth_port" lineno="11809"> +<interface name="corenet_udp_bind_auth_port" lineno="9689"> <summary> Bind UDP sockets to the auth port. </summary> @@ -17688,7 +16215,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_auth_port" lineno="11828"> +<interface name="corenet_tcp_connect_auth_port" lineno="9708"> <summary> Make a TCP connection to the auth port. </summary> @@ -17698,7 +16225,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_auth_client_packets" lineno="11848"> +<interface name="corenet_send_auth_client_packets" lineno="9728"> <summary> Send auth_client packets. </summary> @@ -17709,7 +16236,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11867"> +<interface name="corenet_dontaudit_send_auth_client_packets" lineno="9747"> <summary> Do not audit attempts to send auth_client packets. </summary> @@ -17720,7 +16247,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_auth_client_packets" lineno="11886"> +<interface name="corenet_receive_auth_client_packets" lineno="9766"> <summary> Receive auth_client packets. </summary> @@ -17731,7 +16258,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11905"> +<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="9785"> <summary> Do not audit attempts to receive auth_client packets. </summary> @@ -17742,7 +16269,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_auth_client_packets" lineno="11924"> +<interface name="corenet_sendrecv_auth_client_packets" lineno="9804"> <summary> Send and receive auth_client packets. </summary> @@ -17753,7 +16280,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11940"> +<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="9820"> <summary> Do not audit attempts to send and receive auth_client packets. </summary> @@ -17764,7 +16291,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_auth_client_packets" lineno="11955"> +<interface name="corenet_relabelto_auth_client_packets" lineno="9835"> <summary> Relabel packets to auth_client the packet type. </summary> @@ -17774,7 +16301,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_auth_server_packets" lineno="11975"> +<interface name="corenet_send_auth_server_packets" lineno="9855"> <summary> Send auth_server packets. </summary> @@ -17785,7 +16312,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11994"> +<interface name="corenet_dontaudit_send_auth_server_packets" lineno="9874"> <summary> Do not audit attempts to send auth_server packets. </summary> @@ -17796,7 +16323,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_auth_server_packets" lineno="12013"> +<interface name="corenet_receive_auth_server_packets" lineno="9893"> <summary> Receive auth_server packets. </summary> @@ -17807,7 +16334,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="12032"> +<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="9912"> <summary> Do not audit attempts to receive auth_server packets. </summary> @@ -17818,7 +16345,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_auth_server_packets" lineno="12051"> +<interface name="corenet_sendrecv_auth_server_packets" lineno="9931"> <summary> Send and receive auth_server packets. </summary> @@ -17829,7 +16356,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="12067"> +<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="9947"> <summary> Do not audit attempts to send and receive auth_server packets. </summary> @@ -17840,7 +16367,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_auth_server_packets" lineno="12082"> +<interface name="corenet_relabelto_auth_server_packets" lineno="9962"> <summary> Relabel packets to auth_server the packet type. </summary> @@ -17850,85 +16377,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12104"> -<summary> -Send and receive TCP traffic on the bgp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_bgp_port" lineno="12119"> -<summary> -Send UDP traffic on the bgp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12134"> -<summary> -Do not audit attempts to send UDP traffic on the bgp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_bgp_port" lineno="12149"> -<summary> -Receive UDP traffic on the bgp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12164"> -<summary> -Do not audit attempts to receive UDP traffic on the bgp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_bgp_port" lineno="12179"> -<summary> -Send and receive UDP traffic on the bgp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12195"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the bgp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_bgp_port" lineno="12210"> +<interface name="corenet_tcp_bind_bgp_port" lineno="9984"> <summary> Bind TCP sockets to the bgp port. </summary> @@ -17939,7 +16388,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_bgp_port" lineno="12230"> +<interface name="corenet_udp_bind_bgp_port" lineno="10004"> <summary> Bind UDP sockets to the bgp port. </summary> @@ -17950,7 +16399,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_bgp_port" lineno="12249"> +<interface name="corenet_tcp_connect_bgp_port" lineno="10023"> <summary> Make a TCP connection to the bgp port. </summary> @@ -17960,7 +16409,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_bgp_client_packets" lineno="12269"> +<interface name="corenet_send_bgp_client_packets" lineno="10043"> <summary> Send bgp_client packets. </summary> @@ -17971,7 +16420,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12288"> +<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="10062"> <summary> Do not audit attempts to send bgp_client packets. </summary> @@ -17982,7 +16431,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_bgp_client_packets" lineno="12307"> +<interface name="corenet_receive_bgp_client_packets" lineno="10081"> <summary> Receive bgp_client packets. </summary> @@ -17993,7 +16442,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12326"> +<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="10100"> <summary> Do not audit attempts to receive bgp_client packets. </summary> @@ -18004,7 +16453,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_bgp_client_packets" lineno="12345"> +<interface name="corenet_sendrecv_bgp_client_packets" lineno="10119"> <summary> Send and receive bgp_client packets. </summary> @@ -18015,7 +16464,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12361"> +<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="10135"> <summary> Do not audit attempts to send and receive bgp_client packets. </summary> @@ -18026,7 +16475,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_bgp_client_packets" lineno="12376"> +<interface name="corenet_relabelto_bgp_client_packets" lineno="10150"> <summary> Relabel packets to bgp_client the packet type. </summary> @@ -18036,7 +16485,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_bgp_server_packets" lineno="12396"> +<interface name="corenet_send_bgp_server_packets" lineno="10170"> <summary> Send bgp_server packets. </summary> @@ -18047,7 +16496,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12415"> +<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="10189"> <summary> Do not audit attempts to send bgp_server packets. </summary> @@ -18058,7 +16507,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_bgp_server_packets" lineno="12434"> +<interface name="corenet_receive_bgp_server_packets" lineno="10208"> <summary> Receive bgp_server packets. </summary> @@ -18069,7 +16518,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12453"> +<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="10227"> <summary> Do not audit attempts to receive bgp_server packets. </summary> @@ -18080,7 +16529,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_bgp_server_packets" lineno="12472"> +<interface name="corenet_sendrecv_bgp_server_packets" lineno="10246"> <summary> Send and receive bgp_server packets. </summary> @@ -18091,7 +16540,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12488"> +<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="10262"> <summary> Do not audit attempts to send and receive bgp_server packets. </summary> @@ -18102,7 +16551,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_bgp_server_packets" lineno="12503"> +<interface name="corenet_relabelto_bgp_server_packets" lineno="10277"> <summary> Relabel packets to bgp_server the packet type. </summary> @@ -18112,85 +16561,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12525"> -<summary> -Send and receive TCP traffic on the bitcoin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_bitcoin_port" lineno="12540"> -<summary> -Send UDP traffic on the bitcoin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12555"> -<summary> -Do not audit attempts to send UDP traffic on the bitcoin port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_bitcoin_port" lineno="12570"> -<summary> -Receive UDP traffic on the bitcoin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12585"> -<summary> -Do not audit attempts to receive UDP traffic on the bitcoin port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12600"> -<summary> -Send and receive UDP traffic on the bitcoin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12616"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the bitcoin port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_bitcoin_port" lineno="12631"> +<interface name="corenet_tcp_bind_bitcoin_port" lineno="10299"> <summary> Bind TCP sockets to the bitcoin port. </summary> @@ -18201,7 +16572,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_bitcoin_port" lineno="12651"> +<interface name="corenet_udp_bind_bitcoin_port" lineno="10319"> <summary> Bind UDP sockets to the bitcoin port. </summary> @@ -18212,7 +16583,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_bitcoin_port" lineno="12670"> +<interface name="corenet_tcp_connect_bitcoin_port" lineno="10338"> <summary> Make a TCP connection to the bitcoin port. </summary> @@ -18222,7 +16593,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_bitcoin_client_packets" lineno="12690"> +<interface name="corenet_send_bitcoin_client_packets" lineno="10358"> <summary> Send bitcoin_client packets. </summary> @@ -18233,7 +16604,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12709"> +<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="10377"> <summary> Do not audit attempts to send bitcoin_client packets. </summary> @@ -18244,7 +16615,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_bitcoin_client_packets" lineno="12728"> +<interface name="corenet_receive_bitcoin_client_packets" lineno="10396"> <summary> Receive bitcoin_client packets. </summary> @@ -18255,7 +16626,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12747"> +<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="10415"> <summary> Do not audit attempts to receive bitcoin_client packets. </summary> @@ -18266,7 +16637,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12766"> +<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="10434"> <summary> Send and receive bitcoin_client packets. </summary> @@ -18277,7 +16648,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12782"> +<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="10450"> <summary> Do not audit attempts to send and receive bitcoin_client packets. </summary> @@ -18288,7 +16659,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12797"> +<interface name="corenet_relabelto_bitcoin_client_packets" lineno="10465"> <summary> Relabel packets to bitcoin_client the packet type. </summary> @@ -18298,7 +16669,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_bitcoin_server_packets" lineno="12817"> +<interface name="corenet_send_bitcoin_server_packets" lineno="10485"> <summary> Send bitcoin_server packets. </summary> @@ -18309,7 +16680,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12836"> +<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="10504"> <summary> Do not audit attempts to send bitcoin_server packets. </summary> @@ -18320,7 +16691,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_bitcoin_server_packets" lineno="12855"> +<interface name="corenet_receive_bitcoin_server_packets" lineno="10523"> <summary> Receive bitcoin_server packets. </summary> @@ -18331,7 +16702,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12874"> +<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="10542"> <summary> Do not audit attempts to receive bitcoin_server packets. </summary> @@ -18342,7 +16713,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12893"> +<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="10561"> <summary> Send and receive bitcoin_server packets. </summary> @@ -18353,7 +16724,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12909"> +<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="10577"> <summary> Do not audit attempts to send and receive bitcoin_server packets. </summary> @@ -18364,7 +16735,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12924"> +<interface name="corenet_relabelto_bitcoin_server_packets" lineno="10592"> <summary> Relabel packets to bitcoin_server the packet type. </summary> @@ -18374,85 +16745,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12946"> -<summary> -Send and receive TCP traffic on the boinc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_boinc_port" lineno="12961"> -<summary> -Send UDP traffic on the boinc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12976"> -<summary> -Do not audit attempts to send UDP traffic on the boinc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_boinc_port" lineno="12991"> -<summary> -Receive UDP traffic on the boinc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="13006"> -<summary> -Do not audit attempts to receive UDP traffic on the boinc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_boinc_port" lineno="13021"> -<summary> -Send and receive UDP traffic on the boinc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13037"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the boinc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_boinc_port" lineno="13052"> +<interface name="corenet_tcp_bind_boinc_port" lineno="10614"> <summary> Bind TCP sockets to the boinc port. </summary> @@ -18463,7 +16756,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_boinc_port" lineno="13072"> +<interface name="corenet_udp_bind_boinc_port" lineno="10634"> <summary> Bind UDP sockets to the boinc port. </summary> @@ -18474,7 +16767,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_boinc_port" lineno="13091"> +<interface name="corenet_tcp_connect_boinc_port" lineno="10653"> <summary> Make a TCP connection to the boinc port. </summary> @@ -18484,7 +16777,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_boinc_client_packets" lineno="13111"> +<interface name="corenet_send_boinc_client_packets" lineno="10673"> <summary> Send boinc_client packets. </summary> @@ -18495,7 +16788,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13130"> +<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="10692"> <summary> Do not audit attempts to send boinc_client packets. </summary> @@ -18506,7 +16799,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_boinc_client_packets" lineno="13149"> +<interface name="corenet_receive_boinc_client_packets" lineno="10711"> <summary> Receive boinc_client packets. </summary> @@ -18517,7 +16810,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13168"> +<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="10730"> <summary> Do not audit attempts to receive boinc_client packets. </summary> @@ -18528,7 +16821,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_boinc_client_packets" lineno="13187"> +<interface name="corenet_sendrecv_boinc_client_packets" lineno="10749"> <summary> Send and receive boinc_client packets. </summary> @@ -18539,7 +16832,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13203"> +<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="10765"> <summary> Do not audit attempts to send and receive boinc_client packets. </summary> @@ -18550,7 +16843,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_boinc_client_packets" lineno="13218"> +<interface name="corenet_relabelto_boinc_client_packets" lineno="10780"> <summary> Relabel packets to boinc_client the packet type. </summary> @@ -18560,7 +16853,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_boinc_server_packets" lineno="13238"> +<interface name="corenet_send_boinc_server_packets" lineno="10800"> <summary> Send boinc_server packets. </summary> @@ -18571,7 +16864,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13257"> +<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="10819"> <summary> Do not audit attempts to send boinc_server packets. </summary> @@ -18582,7 +16875,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_boinc_server_packets" lineno="13276"> +<interface name="corenet_receive_boinc_server_packets" lineno="10838"> <summary> Receive boinc_server packets. </summary> @@ -18593,7 +16886,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13295"> +<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="10857"> <summary> Do not audit attempts to receive boinc_server packets. </summary> @@ -18604,7 +16897,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_boinc_server_packets" lineno="13314"> +<interface name="corenet_sendrecv_boinc_server_packets" lineno="10876"> <summary> Send and receive boinc_server packets. </summary> @@ -18615,7 +16908,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13330"> +<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="10892"> <summary> Do not audit attempts to send and receive boinc_server packets. </summary> @@ -18626,7 +16919,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_boinc_server_packets" lineno="13345"> +<interface name="corenet_relabelto_boinc_server_packets" lineno="10907"> <summary> Relabel packets to boinc_server the packet type. </summary> @@ -18636,85 +16929,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13367"> -<summary> -Send and receive TCP traffic on the boinc_client port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_boinc_client_port" lineno="13382"> -<summary> -Send UDP traffic on the boinc_client port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13397"> -<summary> -Do not audit attempts to send UDP traffic on the boinc_client port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_boinc_client_port" lineno="13412"> -<summary> -Receive UDP traffic on the boinc_client port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13427"> -<summary> -Do not audit attempts to receive UDP traffic on the boinc_client port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13442"> -<summary> -Send and receive UDP traffic on the boinc_client port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13458"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the boinc_client port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_boinc_client_port" lineno="13473"> +<interface name="corenet_tcp_bind_boinc_client_port" lineno="10929"> <summary> Bind TCP sockets to the boinc_client port. </summary> @@ -18725,7 +16940,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_boinc_client_port" lineno="13493"> +<interface name="corenet_udp_bind_boinc_client_port" lineno="10949"> <summary> Bind UDP sockets to the boinc_client port. </summary> @@ -18736,7 +16951,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_boinc_client_port" lineno="13512"> +<interface name="corenet_tcp_connect_boinc_client_port" lineno="10968"> <summary> Make a TCP connection to the boinc_client port. </summary> @@ -18746,7 +16961,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_boinc_client_client_packets" lineno="13532"> +<interface name="corenet_send_boinc_client_client_packets" lineno="10988"> <summary> Send boinc_client_client packets. </summary> @@ -18757,7 +16972,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13551"> +<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="11007"> <summary> Do not audit attempts to send boinc_client_client packets. </summary> @@ -18768,7 +16983,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_boinc_client_client_packets" lineno="13570"> +<interface name="corenet_receive_boinc_client_client_packets" lineno="11026"> <summary> Receive boinc_client_client packets. </summary> @@ -18779,7 +16994,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13589"> +<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="11045"> <summary> Do not audit attempts to receive boinc_client_client packets. </summary> @@ -18790,7 +17005,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13608"> +<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="11064"> <summary> Send and receive boinc_client_client packets. </summary> @@ -18801,7 +17016,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13624"> +<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="11080"> <summary> Do not audit attempts to send and receive boinc_client_client packets. </summary> @@ -18812,7 +17027,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13639"> +<interface name="corenet_relabelto_boinc_client_client_packets" lineno="11095"> <summary> Relabel packets to boinc_client_client the packet type. </summary> @@ -18822,7 +17037,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_boinc_client_server_packets" lineno="13659"> +<interface name="corenet_send_boinc_client_server_packets" lineno="11115"> <summary> Send boinc_client_server packets. </summary> @@ -18833,7 +17048,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13678"> +<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="11134"> <summary> Do not audit attempts to send boinc_client_server packets. </summary> @@ -18844,7 +17059,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_boinc_client_server_packets" lineno="13697"> +<interface name="corenet_receive_boinc_client_server_packets" lineno="11153"> <summary> Receive boinc_client_server packets. </summary> @@ -18855,7 +17070,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13716"> +<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="11172"> <summary> Do not audit attempts to receive boinc_client_server packets. </summary> @@ -18866,7 +17081,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13735"> +<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="11191"> <summary> Send and receive boinc_client_server packets. </summary> @@ -18877,7 +17092,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13751"> +<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="11207"> <summary> Do not audit attempts to send and receive boinc_client_server packets. </summary> @@ -18888,7 +17103,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13766"> +<interface name="corenet_relabelto_boinc_client_server_packets" lineno="11222"> <summary> Relabel packets to boinc_client_server the packet type. </summary> @@ -18898,85 +17113,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_biff_port" lineno="13788"> -<summary> -Send and receive TCP traffic on the biff port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_biff_port" lineno="13803"> -<summary> -Send UDP traffic on the biff port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13818"> -<summary> -Do not audit attempts to send UDP traffic on the biff port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_biff_port" lineno="13833"> -<summary> -Receive UDP traffic on the biff port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13848"> -<summary> -Do not audit attempts to receive UDP traffic on the biff port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_biff_port" lineno="13863"> -<summary> -Send and receive UDP traffic on the biff port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13879"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the biff port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_biff_port" lineno="13894"> +<interface name="corenet_tcp_bind_biff_port" lineno="11244"> <summary> Bind TCP sockets to the biff port. </summary> @@ -18987,7 +17124,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_biff_port" lineno="13914"> +<interface name="corenet_udp_bind_biff_port" lineno="11264"> <summary> Bind UDP sockets to the biff port. </summary> @@ -18998,7 +17135,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_biff_port" lineno="13933"> +<interface name="corenet_tcp_connect_biff_port" lineno="11283"> <summary> Make a TCP connection to the biff port. </summary> @@ -19008,7 +17145,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_biff_client_packets" lineno="13953"> +<interface name="corenet_send_biff_client_packets" lineno="11303"> <summary> Send biff_client packets. </summary> @@ -19019,7 +17156,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13972"> +<interface name="corenet_dontaudit_send_biff_client_packets" lineno="11322"> <summary> Do not audit attempts to send biff_client packets. </summary> @@ -19030,7 +17167,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_biff_client_packets" lineno="13991"> +<interface name="corenet_receive_biff_client_packets" lineno="11341"> <summary> Receive biff_client packets. </summary> @@ -19041,7 +17178,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="14010"> +<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="11360"> <summary> Do not audit attempts to receive biff_client packets. </summary> @@ -19052,7 +17189,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_biff_client_packets" lineno="14029"> +<interface name="corenet_sendrecv_biff_client_packets" lineno="11379"> <summary> Send and receive biff_client packets. </summary> @@ -19063,7 +17200,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14045"> +<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="11395"> <summary> Do not audit attempts to send and receive biff_client packets. </summary> @@ -19074,7 +17211,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_biff_client_packets" lineno="14060"> +<interface name="corenet_relabelto_biff_client_packets" lineno="11410"> <summary> Relabel packets to biff_client the packet type. </summary> @@ -19084,7 +17221,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_biff_server_packets" lineno="14080"> +<interface name="corenet_send_biff_server_packets" lineno="11430"> <summary> Send biff_server packets. </summary> @@ -19095,7 +17232,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14099"> +<interface name="corenet_dontaudit_send_biff_server_packets" lineno="11449"> <summary> Do not audit attempts to send biff_server packets. </summary> @@ -19106,7 +17243,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_biff_server_packets" lineno="14118"> +<interface name="corenet_receive_biff_server_packets" lineno="11468"> <summary> Receive biff_server packets. </summary> @@ -19117,7 +17254,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14137"> +<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="11487"> <summary> Do not audit attempts to receive biff_server packets. </summary> @@ -19128,7 +17265,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_biff_server_packets" lineno="14156"> +<interface name="corenet_sendrecv_biff_server_packets" lineno="11506"> <summary> Send and receive biff_server packets. </summary> @@ -19139,7 +17276,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14172"> +<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="11522"> <summary> Do not audit attempts to send and receive biff_server packets. </summary> @@ -19150,7 +17287,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_biff_server_packets" lineno="14187"> +<interface name="corenet_relabelto_biff_server_packets" lineno="11537"> <summary> Relabel packets to biff_server the packet type. </summary> @@ -19160,85 +17297,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14209"> -<summary> -Send and receive TCP traffic on the certmaster port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_certmaster_port" lineno="14224"> -<summary> -Send UDP traffic on the certmaster port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14239"> -<summary> -Do not audit attempts to send UDP traffic on the certmaster port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_certmaster_port" lineno="14254"> -<summary> -Receive UDP traffic on the certmaster port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14269"> -<summary> -Do not audit attempts to receive UDP traffic on the certmaster port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14284"> -<summary> -Send and receive UDP traffic on the certmaster port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14300"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the certmaster port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_certmaster_port" lineno="14315"> +<interface name="corenet_tcp_bind_certmaster_port" lineno="11559"> <summary> Bind TCP sockets to the certmaster port. </summary> @@ -19249,7 +17308,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_certmaster_port" lineno="14335"> +<interface name="corenet_udp_bind_certmaster_port" lineno="11579"> <summary> Bind UDP sockets to the certmaster port. </summary> @@ -19260,7 +17319,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_certmaster_port" lineno="14354"> +<interface name="corenet_tcp_connect_certmaster_port" lineno="11598"> <summary> Make a TCP connection to the certmaster port. </summary> @@ -19270,7 +17329,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_certmaster_client_packets" lineno="14374"> +<interface name="corenet_send_certmaster_client_packets" lineno="11618"> <summary> Send certmaster_client packets. </summary> @@ -19281,7 +17340,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14393"> +<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="11637"> <summary> Do not audit attempts to send certmaster_client packets. </summary> @@ -19292,7 +17351,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_certmaster_client_packets" lineno="14412"> +<interface name="corenet_receive_certmaster_client_packets" lineno="11656"> <summary> Receive certmaster_client packets. </summary> @@ -19303,7 +17362,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14431"> +<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="11675"> <summary> Do not audit attempts to receive certmaster_client packets. </summary> @@ -19314,7 +17373,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14450"> +<interface name="corenet_sendrecv_certmaster_client_packets" lineno="11694"> <summary> Send and receive certmaster_client packets. </summary> @@ -19325,7 +17384,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14466"> +<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="11710"> <summary> Do not audit attempts to send and receive certmaster_client packets. </summary> @@ -19336,7 +17395,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_certmaster_client_packets" lineno="14481"> +<interface name="corenet_relabelto_certmaster_client_packets" lineno="11725"> <summary> Relabel packets to certmaster_client the packet type. </summary> @@ -19346,7 +17405,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_certmaster_server_packets" lineno="14501"> +<interface name="corenet_send_certmaster_server_packets" lineno="11745"> <summary> Send certmaster_server packets. </summary> @@ -19357,7 +17416,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14520"> +<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="11764"> <summary> Do not audit attempts to send certmaster_server packets. </summary> @@ -19368,7 +17427,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_certmaster_server_packets" lineno="14539"> +<interface name="corenet_receive_certmaster_server_packets" lineno="11783"> <summary> Receive certmaster_server packets. </summary> @@ -19379,7 +17438,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14558"> +<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="11802"> <summary> Do not audit attempts to receive certmaster_server packets. </summary> @@ -19390,7 +17449,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14577"> +<interface name="corenet_sendrecv_certmaster_server_packets" lineno="11821"> <summary> Send and receive certmaster_server packets. </summary> @@ -19401,7 +17460,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14593"> +<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="11837"> <summary> Do not audit attempts to send and receive certmaster_server packets. </summary> @@ -19412,7 +17471,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_certmaster_server_packets" lineno="14608"> +<interface name="corenet_relabelto_certmaster_server_packets" lineno="11852"> <summary> Relabel packets to certmaster_server the packet type. </summary> @@ -19422,85 +17481,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14630"> -<summary> -Send and receive TCP traffic on the chronyd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_chronyd_port" lineno="14645"> -<summary> -Send UDP traffic on the chronyd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14660"> -<summary> -Do not audit attempts to send UDP traffic on the chronyd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_chronyd_port" lineno="14675"> -<summary> -Receive UDP traffic on the chronyd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14690"> -<summary> -Do not audit attempts to receive UDP traffic on the chronyd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14705"> -<summary> -Send and receive UDP traffic on the chronyd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14721"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the chronyd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_chronyd_port" lineno="14736"> +<interface name="corenet_tcp_bind_chronyd_port" lineno="11874"> <summary> Bind TCP sockets to the chronyd port. </summary> @@ -19511,7 +17492,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_chronyd_port" lineno="14756"> +<interface name="corenet_udp_bind_chronyd_port" lineno="11894"> <summary> Bind UDP sockets to the chronyd port. </summary> @@ -19522,7 +17503,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_chronyd_port" lineno="14775"> +<interface name="corenet_tcp_connect_chronyd_port" lineno="11913"> <summary> Make a TCP connection to the chronyd port. </summary> @@ -19532,7 +17513,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_chronyd_client_packets" lineno="14795"> +<interface name="corenet_send_chronyd_client_packets" lineno="11933"> <summary> Send chronyd_client packets. </summary> @@ -19543,7 +17524,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14814"> +<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="11952"> <summary> Do not audit attempts to send chronyd_client packets. </summary> @@ -19554,7 +17535,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_chronyd_client_packets" lineno="14833"> +<interface name="corenet_receive_chronyd_client_packets" lineno="11971"> <summary> Receive chronyd_client packets. </summary> @@ -19565,7 +17546,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14852"> +<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="11990"> <summary> Do not audit attempts to receive chronyd_client packets. </summary> @@ -19576,7 +17557,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14871"> +<interface name="corenet_sendrecv_chronyd_client_packets" lineno="12009"> <summary> Send and receive chronyd_client packets. </summary> @@ -19587,7 +17568,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14887"> +<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="12025"> <summary> Do not audit attempts to send and receive chronyd_client packets. </summary> @@ -19598,7 +17579,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_chronyd_client_packets" lineno="14902"> +<interface name="corenet_relabelto_chronyd_client_packets" lineno="12040"> <summary> Relabel packets to chronyd_client the packet type. </summary> @@ -19608,7 +17589,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_chronyd_server_packets" lineno="14922"> +<interface name="corenet_send_chronyd_server_packets" lineno="12060"> <summary> Send chronyd_server packets. </summary> @@ -19619,7 +17600,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14941"> +<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="12079"> <summary> Do not audit attempts to send chronyd_server packets. </summary> @@ -19630,7 +17611,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_chronyd_server_packets" lineno="14960"> +<interface name="corenet_receive_chronyd_server_packets" lineno="12098"> <summary> Receive chronyd_server packets. </summary> @@ -19641,7 +17622,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14979"> +<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="12117"> <summary> Do not audit attempts to receive chronyd_server packets. </summary> @@ -19652,7 +17633,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14998"> +<interface name="corenet_sendrecv_chronyd_server_packets" lineno="12136"> <summary> Send and receive chronyd_server packets. </summary> @@ -19663,7 +17644,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="15014"> +<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="12152"> <summary> Do not audit attempts to send and receive chronyd_server packets. </summary> @@ -19674,7 +17655,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_chronyd_server_packets" lineno="15029"> +<interface name="corenet_relabelto_chronyd_server_packets" lineno="12167"> <summary> Relabel packets to chronyd_server the packet type. </summary> @@ -19684,85 +17665,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15051"> -<summary> -Send and receive TCP traffic on the clamd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_clamd_port" lineno="15066"> -<summary> -Send UDP traffic on the clamd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15081"> -<summary> -Do not audit attempts to send UDP traffic on the clamd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_clamd_port" lineno="15096"> -<summary> -Receive UDP traffic on the clamd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15111"> -<summary> -Do not audit attempts to receive UDP traffic on the clamd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_clamd_port" lineno="15126"> -<summary> -Send and receive UDP traffic on the clamd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15142"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the clamd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_clamd_port" lineno="15157"> +<interface name="corenet_tcp_bind_clamd_port" lineno="12189"> <summary> Bind TCP sockets to the clamd port. </summary> @@ -19773,7 +17676,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_clamd_port" lineno="15177"> +<interface name="corenet_udp_bind_clamd_port" lineno="12209"> <summary> Bind UDP sockets to the clamd port. </summary> @@ -19784,7 +17687,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_clamd_port" lineno="15196"> +<interface name="corenet_tcp_connect_clamd_port" lineno="12228"> <summary> Make a TCP connection to the clamd port. </summary> @@ -19794,7 +17697,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_clamd_client_packets" lineno="15216"> +<interface name="corenet_send_clamd_client_packets" lineno="12248"> <summary> Send clamd_client packets. </summary> @@ -19805,7 +17708,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15235"> +<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="12267"> <summary> Do not audit attempts to send clamd_client packets. </summary> @@ -19816,7 +17719,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_clamd_client_packets" lineno="15254"> +<interface name="corenet_receive_clamd_client_packets" lineno="12286"> <summary> Receive clamd_client packets. </summary> @@ -19827,7 +17730,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15273"> +<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="12305"> <summary> Do not audit attempts to receive clamd_client packets. </summary> @@ -19838,7 +17741,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_clamd_client_packets" lineno="15292"> +<interface name="corenet_sendrecv_clamd_client_packets" lineno="12324"> <summary> Send and receive clamd_client packets. </summary> @@ -19849,7 +17752,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15308"> +<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="12340"> <summary> Do not audit attempts to send and receive clamd_client packets. </summary> @@ -19860,7 +17763,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_clamd_client_packets" lineno="15323"> +<interface name="corenet_relabelto_clamd_client_packets" lineno="12355"> <summary> Relabel packets to clamd_client the packet type. </summary> @@ -19870,7 +17773,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_clamd_server_packets" lineno="15343"> +<interface name="corenet_send_clamd_server_packets" lineno="12375"> <summary> Send clamd_server packets. </summary> @@ -19881,7 +17784,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15362"> +<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="12394"> <summary> Do not audit attempts to send clamd_server packets. </summary> @@ -19892,7 +17795,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_clamd_server_packets" lineno="15381"> +<interface name="corenet_receive_clamd_server_packets" lineno="12413"> <summary> Receive clamd_server packets. </summary> @@ -19903,7 +17806,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15400"> +<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="12432"> <summary> Do not audit attempts to receive clamd_server packets. </summary> @@ -19914,7 +17817,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_clamd_server_packets" lineno="15419"> +<interface name="corenet_sendrecv_clamd_server_packets" lineno="12451"> <summary> Send and receive clamd_server packets. </summary> @@ -19925,7 +17828,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15435"> +<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="12467"> <summary> Do not audit attempts to send and receive clamd_server packets. </summary> @@ -19936,7 +17839,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_clamd_server_packets" lineno="15450"> +<interface name="corenet_relabelto_clamd_server_packets" lineno="12482"> <summary> Relabel packets to clamd_server the packet type. </summary> @@ -19946,85 +17849,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15472"> -<summary> -Send and receive TCP traffic on the clockspeed port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_clockspeed_port" lineno="15487"> -<summary> -Send UDP traffic on the clockspeed port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15502"> -<summary> -Do not audit attempts to send UDP traffic on the clockspeed port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_clockspeed_port" lineno="15517"> -<summary> -Receive UDP traffic on the clockspeed port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15532"> -<summary> -Do not audit attempts to receive UDP traffic on the clockspeed port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15547"> -<summary> -Send and receive UDP traffic on the clockspeed port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15563"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the clockspeed port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_clockspeed_port" lineno="15578"> +<interface name="corenet_tcp_bind_clockspeed_port" lineno="12504"> <summary> Bind TCP sockets to the clockspeed port. </summary> @@ -20035,7 +17860,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_clockspeed_port" lineno="15598"> +<interface name="corenet_udp_bind_clockspeed_port" lineno="12524"> <summary> Bind UDP sockets to the clockspeed port. </summary> @@ -20046,7 +17871,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_clockspeed_port" lineno="15617"> +<interface name="corenet_tcp_connect_clockspeed_port" lineno="12543"> <summary> Make a TCP connection to the clockspeed port. </summary> @@ -20056,7 +17881,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_clockspeed_client_packets" lineno="15637"> +<interface name="corenet_send_clockspeed_client_packets" lineno="12563"> <summary> Send clockspeed_client packets. </summary> @@ -20067,7 +17892,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15656"> +<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="12582"> <summary> Do not audit attempts to send clockspeed_client packets. </summary> @@ -20078,7 +17903,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_clockspeed_client_packets" lineno="15675"> +<interface name="corenet_receive_clockspeed_client_packets" lineno="12601"> <summary> Receive clockspeed_client packets. </summary> @@ -20089,7 +17914,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15694"> +<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="12620"> <summary> Do not audit attempts to receive clockspeed_client packets. </summary> @@ -20100,7 +17925,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15713"> +<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="12639"> <summary> Send and receive clockspeed_client packets. </summary> @@ -20111,7 +17936,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15729"> +<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="12655"> <summary> Do not audit attempts to send and receive clockspeed_client packets. </summary> @@ -20122,7 +17947,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15744"> +<interface name="corenet_relabelto_clockspeed_client_packets" lineno="12670"> <summary> Relabel packets to clockspeed_client the packet type. </summary> @@ -20132,7 +17957,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_clockspeed_server_packets" lineno="15764"> +<interface name="corenet_send_clockspeed_server_packets" lineno="12690"> <summary> Send clockspeed_server packets. </summary> @@ -20143,7 +17968,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15783"> +<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="12709"> <summary> Do not audit attempts to send clockspeed_server packets. </summary> @@ -20154,7 +17979,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_clockspeed_server_packets" lineno="15802"> +<interface name="corenet_receive_clockspeed_server_packets" lineno="12728"> <summary> Receive clockspeed_server packets. </summary> @@ -20165,7 +17990,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15821"> +<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="12747"> <summary> Do not audit attempts to receive clockspeed_server packets. </summary> @@ -20176,7 +18001,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15840"> +<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="12766"> <summary> Send and receive clockspeed_server packets. </summary> @@ -20187,7 +18012,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15856"> +<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="12782"> <summary> Do not audit attempts to send and receive clockspeed_server packets. </summary> @@ -20198,7 +18023,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15871"> +<interface name="corenet_relabelto_clockspeed_server_packets" lineno="12797"> <summary> Relabel packets to clockspeed_server the packet type. </summary> @@ -20208,85 +18033,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15893"> -<summary> -Send and receive TCP traffic on the cluster port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_cluster_port" lineno="15908"> -<summary> -Send UDP traffic on the cluster port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15923"> -<summary> -Do not audit attempts to send UDP traffic on the cluster port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_cluster_port" lineno="15938"> -<summary> -Receive UDP traffic on the cluster port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15953"> -<summary> -Do not audit attempts to receive UDP traffic on the cluster port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_cluster_port" lineno="15968"> -<summary> -Send and receive UDP traffic on the cluster port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15984"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the cluster port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_cluster_port" lineno="15999"> +<interface name="corenet_tcp_bind_cluster_port" lineno="12819"> <summary> Bind TCP sockets to the cluster port. </summary> @@ -20297,7 +18044,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cluster_port" lineno="16019"> +<interface name="corenet_udp_bind_cluster_port" lineno="12839"> <summary> Bind UDP sockets to the cluster port. </summary> @@ -20308,7 +18055,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cluster_port" lineno="16038"> +<interface name="corenet_tcp_connect_cluster_port" lineno="12858"> <summary> Make a TCP connection to the cluster port. </summary> @@ -20318,7 +18065,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cluster_client_packets" lineno="16058"> +<interface name="corenet_send_cluster_client_packets" lineno="12878"> <summary> Send cluster_client packets. </summary> @@ -20329,7 +18076,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16077"> +<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="12897"> <summary> Do not audit attempts to send cluster_client packets. </summary> @@ -20340,7 +18087,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cluster_client_packets" lineno="16096"> +<interface name="corenet_receive_cluster_client_packets" lineno="12916"> <summary> Receive cluster_client packets. </summary> @@ -20351,7 +18098,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16115"> +<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="12935"> <summary> Do not audit attempts to receive cluster_client packets. </summary> @@ -20362,7 +18109,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cluster_client_packets" lineno="16134"> +<interface name="corenet_sendrecv_cluster_client_packets" lineno="12954"> <summary> Send and receive cluster_client packets. </summary> @@ -20373,7 +18120,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16150"> +<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="12970"> <summary> Do not audit attempts to send and receive cluster_client packets. </summary> @@ -20384,7 +18131,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cluster_client_packets" lineno="16165"> +<interface name="corenet_relabelto_cluster_client_packets" lineno="12985"> <summary> Relabel packets to cluster_client the packet type. </summary> @@ -20394,7 +18141,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cluster_server_packets" lineno="16185"> +<interface name="corenet_send_cluster_server_packets" lineno="13005"> <summary> Send cluster_server packets. </summary> @@ -20405,7 +18152,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16204"> +<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="13024"> <summary> Do not audit attempts to send cluster_server packets. </summary> @@ -20416,7 +18163,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cluster_server_packets" lineno="16223"> +<interface name="corenet_receive_cluster_server_packets" lineno="13043"> <summary> Receive cluster_server packets. </summary> @@ -20427,7 +18174,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16242"> +<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="13062"> <summary> Do not audit attempts to receive cluster_server packets. </summary> @@ -20438,7 +18185,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cluster_server_packets" lineno="16261"> +<interface name="corenet_sendrecv_cluster_server_packets" lineno="13081"> <summary> Send and receive cluster_server packets. </summary> @@ -20449,7 +18196,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16277"> +<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="13097"> <summary> Do not audit attempts to send and receive cluster_server packets. </summary> @@ -20460,7 +18207,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cluster_server_packets" lineno="16292"> +<interface name="corenet_relabelto_cluster_server_packets" lineno="13112"> <summary> Relabel packets to cluster_server the packet type. </summary> @@ -20470,85 +18217,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cma_port" lineno="16314"> -<summary> -Send and receive TCP traffic on the cma port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_cma_port" lineno="16329"> -<summary> -Send UDP traffic on the cma port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16344"> -<summary> -Do not audit attempts to send UDP traffic on the cma port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_cma_port" lineno="16359"> -<summary> -Receive UDP traffic on the cma port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16374"> -<summary> -Do not audit attempts to receive UDP traffic on the cma port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_cma_port" lineno="16389"> -<summary> -Send and receive UDP traffic on the cma port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16405"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the cma port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_cma_port" lineno="16420"> +<interface name="corenet_tcp_bind_cma_port" lineno="13134"> <summary> Bind TCP sockets to the cma port. </summary> @@ -20559,7 +18228,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cma_port" lineno="16440"> +<interface name="corenet_udp_bind_cma_port" lineno="13154"> <summary> Bind UDP sockets to the cma port. </summary> @@ -20570,7 +18239,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cma_port" lineno="16459"> +<interface name="corenet_tcp_connect_cma_port" lineno="13173"> <summary> Make a TCP connection to the cma port. </summary> @@ -20580,7 +18249,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cma_client_packets" lineno="16479"> +<interface name="corenet_send_cma_client_packets" lineno="13193"> <summary> Send cma_client packets. </summary> @@ -20591,7 +18260,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16498"> +<interface name="corenet_dontaudit_send_cma_client_packets" lineno="13212"> <summary> Do not audit attempts to send cma_client packets. </summary> @@ -20602,7 +18271,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cma_client_packets" lineno="16517"> +<interface name="corenet_receive_cma_client_packets" lineno="13231"> <summary> Receive cma_client packets. </summary> @@ -20613,7 +18282,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16536"> +<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="13250"> <summary> Do not audit attempts to receive cma_client packets. </summary> @@ -20624,7 +18293,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cma_client_packets" lineno="16555"> +<interface name="corenet_sendrecv_cma_client_packets" lineno="13269"> <summary> Send and receive cma_client packets. </summary> @@ -20635,7 +18304,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16571"> +<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="13285"> <summary> Do not audit attempts to send and receive cma_client packets. </summary> @@ -20646,7 +18315,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cma_client_packets" lineno="16586"> +<interface name="corenet_relabelto_cma_client_packets" lineno="13300"> <summary> Relabel packets to cma_client the packet type. </summary> @@ -20656,7 +18325,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cma_server_packets" lineno="16606"> +<interface name="corenet_send_cma_server_packets" lineno="13320"> <summary> Send cma_server packets. </summary> @@ -20667,7 +18336,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16625"> +<interface name="corenet_dontaudit_send_cma_server_packets" lineno="13339"> <summary> Do not audit attempts to send cma_server packets. </summary> @@ -20678,7 +18347,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cma_server_packets" lineno="16644"> +<interface name="corenet_receive_cma_server_packets" lineno="13358"> <summary> Receive cma_server packets. </summary> @@ -20689,7 +18358,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16663"> +<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="13377"> <summary> Do not audit attempts to receive cma_server packets. </summary> @@ -20700,7 +18369,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cma_server_packets" lineno="16682"> +<interface name="corenet_sendrecv_cma_server_packets" lineno="13396"> <summary> Send and receive cma_server packets. </summary> @@ -20711,7 +18380,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16698"> +<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="13412"> <summary> Do not audit attempts to send and receive cma_server packets. </summary> @@ -20722,7 +18391,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cma_server_packets" lineno="16713"> +<interface name="corenet_relabelto_cma_server_packets" lineno="13427"> <summary> Relabel packets to cma_server the packet type. </summary> @@ -20732,85 +18401,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16735"> -<summary> -Send and receive TCP traffic on the cobbler port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_cobbler_port" lineno="16750"> -<summary> -Send UDP traffic on the cobbler port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16765"> -<summary> -Do not audit attempts to send UDP traffic on the cobbler port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_cobbler_port" lineno="16780"> -<summary> -Receive UDP traffic on the cobbler port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16795"> -<summary> -Do not audit attempts to receive UDP traffic on the cobbler port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16810"> -<summary> -Send and receive UDP traffic on the cobbler port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16826"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the cobbler port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_cobbler_port" lineno="16841"> +<interface name="corenet_tcp_bind_cobbler_port" lineno="13449"> <summary> Bind TCP sockets to the cobbler port. </summary> @@ -20821,7 +18412,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cobbler_port" lineno="16861"> +<interface name="corenet_udp_bind_cobbler_port" lineno="13469"> <summary> Bind UDP sockets to the cobbler port. </summary> @@ -20832,7 +18423,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cobbler_port" lineno="16880"> +<interface name="corenet_tcp_connect_cobbler_port" lineno="13488"> <summary> Make a TCP connection to the cobbler port. </summary> @@ -20842,7 +18433,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cobbler_client_packets" lineno="16900"> +<interface name="corenet_send_cobbler_client_packets" lineno="13508"> <summary> Send cobbler_client packets. </summary> @@ -20853,7 +18444,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16919"> +<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="13527"> <summary> Do not audit attempts to send cobbler_client packets. </summary> @@ -20864,7 +18455,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cobbler_client_packets" lineno="16938"> +<interface name="corenet_receive_cobbler_client_packets" lineno="13546"> <summary> Receive cobbler_client packets. </summary> @@ -20875,7 +18466,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16957"> +<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="13565"> <summary> Do not audit attempts to receive cobbler_client packets. </summary> @@ -20886,7 +18477,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16976"> +<interface name="corenet_sendrecv_cobbler_client_packets" lineno="13584"> <summary> Send and receive cobbler_client packets. </summary> @@ -20897,7 +18488,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16992"> +<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="13600"> <summary> Do not audit attempts to send and receive cobbler_client packets. </summary> @@ -20908,7 +18499,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cobbler_client_packets" lineno="17007"> +<interface name="corenet_relabelto_cobbler_client_packets" lineno="13615"> <summary> Relabel packets to cobbler_client the packet type. </summary> @@ -20918,7 +18509,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cobbler_server_packets" lineno="17027"> +<interface name="corenet_send_cobbler_server_packets" lineno="13635"> <summary> Send cobbler_server packets. </summary> @@ -20929,7 +18520,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17046"> +<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="13654"> <summary> Do not audit attempts to send cobbler_server packets. </summary> @@ -20940,7 +18531,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cobbler_server_packets" lineno="17065"> +<interface name="corenet_receive_cobbler_server_packets" lineno="13673"> <summary> Receive cobbler_server packets. </summary> @@ -20951,7 +18542,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17084"> +<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="13692"> <summary> Do not audit attempts to receive cobbler_server packets. </summary> @@ -20962,7 +18553,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17103"> +<interface name="corenet_sendrecv_cobbler_server_packets" lineno="13711"> <summary> Send and receive cobbler_server packets. </summary> @@ -20973,7 +18564,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17119"> +<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="13727"> <summary> Do not audit attempts to send and receive cobbler_server packets. </summary> @@ -20984,7 +18575,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cobbler_server_packets" lineno="17134"> +<interface name="corenet_relabelto_cobbler_server_packets" lineno="13742"> <summary> Relabel packets to cobbler_server the packet type. </summary> @@ -20994,85 +18585,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17156"> -<summary> -Send and receive TCP traffic on the commplex_link port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_commplex_link_port" lineno="17171"> -<summary> -Send UDP traffic on the commplex_link port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17186"> -<summary> -Do not audit attempts to send UDP traffic on the commplex_link port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_commplex_link_port" lineno="17201"> -<summary> -Receive UDP traffic on the commplex_link port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17216"> -<summary> -Do not audit attempts to receive UDP traffic on the commplex_link port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17231"> -<summary> -Send and receive UDP traffic on the commplex_link port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17247"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the commplex_link port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_commplex_link_port" lineno="17262"> +<interface name="corenet_tcp_bind_commplex_link_port" lineno="13764"> <summary> Bind TCP sockets to the commplex_link port. </summary> @@ -21083,7 +18596,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_commplex_link_port" lineno="17282"> +<interface name="corenet_udp_bind_commplex_link_port" lineno="13784"> <summary> Bind UDP sockets to the commplex_link port. </summary> @@ -21094,7 +18607,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_commplex_link_port" lineno="17301"> +<interface name="corenet_tcp_connect_commplex_link_port" lineno="13803"> <summary> Make a TCP connection to the commplex_link port. </summary> @@ -21104,7 +18617,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_commplex_link_client_packets" lineno="17321"> +<interface name="corenet_send_commplex_link_client_packets" lineno="13823"> <summary> Send commplex_link_client packets. </summary> @@ -21115,7 +18628,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17340"> +<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="13842"> <summary> Do not audit attempts to send commplex_link_client packets. </summary> @@ -21126,7 +18639,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_commplex_link_client_packets" lineno="17359"> +<interface name="corenet_receive_commplex_link_client_packets" lineno="13861"> <summary> Receive commplex_link_client packets. </summary> @@ -21137,7 +18650,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17378"> +<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="13880"> <summary> Do not audit attempts to receive commplex_link_client packets. </summary> @@ -21148,7 +18661,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17397"> +<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="13899"> <summary> Send and receive commplex_link_client packets. </summary> @@ -21159,7 +18672,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17413"> +<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="13915"> <summary> Do not audit attempts to send and receive commplex_link_client packets. </summary> @@ -21170,7 +18683,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17428"> +<interface name="corenet_relabelto_commplex_link_client_packets" lineno="13930"> <summary> Relabel packets to commplex_link_client the packet type. </summary> @@ -21180,7 +18693,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_commplex_link_server_packets" lineno="17448"> +<interface name="corenet_send_commplex_link_server_packets" lineno="13950"> <summary> Send commplex_link_server packets. </summary> @@ -21191,7 +18704,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17467"> +<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="13969"> <summary> Do not audit attempts to send commplex_link_server packets. </summary> @@ -21202,7 +18715,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_commplex_link_server_packets" lineno="17486"> +<interface name="corenet_receive_commplex_link_server_packets" lineno="13988"> <summary> Receive commplex_link_server packets. </summary> @@ -21213,7 +18726,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17505"> +<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="14007"> <summary> Do not audit attempts to receive commplex_link_server packets. </summary> @@ -21224,7 +18737,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17524"> +<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="14026"> <summary> Send and receive commplex_link_server packets. </summary> @@ -21235,7 +18748,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17540"> +<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="14042"> <summary> Do not audit attempts to send and receive commplex_link_server packets. </summary> @@ -21246,7 +18759,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17555"> +<interface name="corenet_relabelto_commplex_link_server_packets" lineno="14057"> <summary> Relabel packets to commplex_link_server the packet type. </summary> @@ -21256,85 +18769,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17577"> -<summary> -Send and receive TCP traffic on the commplex_main port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_commplex_main_port" lineno="17592"> -<summary> -Send UDP traffic on the commplex_main port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17607"> -<summary> -Do not audit attempts to send UDP traffic on the commplex_main port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_commplex_main_port" lineno="17622"> -<summary> -Receive UDP traffic on the commplex_main port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17637"> -<summary> -Do not audit attempts to receive UDP traffic on the commplex_main port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17652"> -<summary> -Send and receive UDP traffic on the commplex_main port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17668"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the commplex_main port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_commplex_main_port" lineno="17683"> +<interface name="corenet_tcp_bind_commplex_main_port" lineno="14079"> <summary> Bind TCP sockets to the commplex_main port. </summary> @@ -21345,7 +18780,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_commplex_main_port" lineno="17703"> +<interface name="corenet_udp_bind_commplex_main_port" lineno="14099"> <summary> Bind UDP sockets to the commplex_main port. </summary> @@ -21356,7 +18791,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_commplex_main_port" lineno="17722"> +<interface name="corenet_tcp_connect_commplex_main_port" lineno="14118"> <summary> Make a TCP connection to the commplex_main port. </summary> @@ -21366,7 +18801,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_commplex_main_client_packets" lineno="17742"> +<interface name="corenet_send_commplex_main_client_packets" lineno="14138"> <summary> Send commplex_main_client packets. </summary> @@ -21377,7 +18812,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17761"> +<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="14157"> <summary> Do not audit attempts to send commplex_main_client packets. </summary> @@ -21388,7 +18823,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_commplex_main_client_packets" lineno="17780"> +<interface name="corenet_receive_commplex_main_client_packets" lineno="14176"> <summary> Receive commplex_main_client packets. </summary> @@ -21399,7 +18834,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17799"> +<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="14195"> <summary> Do not audit attempts to receive commplex_main_client packets. </summary> @@ -21410,7 +18845,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17818"> +<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="14214"> <summary> Send and receive commplex_main_client packets. </summary> @@ -21421,7 +18856,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17834"> +<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="14230"> <summary> Do not audit attempts to send and receive commplex_main_client packets. </summary> @@ -21432,7 +18867,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17849"> +<interface name="corenet_relabelto_commplex_main_client_packets" lineno="14245"> <summary> Relabel packets to commplex_main_client the packet type. </summary> @@ -21442,7 +18877,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_commplex_main_server_packets" lineno="17869"> +<interface name="corenet_send_commplex_main_server_packets" lineno="14265"> <summary> Send commplex_main_server packets. </summary> @@ -21453,7 +18888,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17888"> +<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="14284"> <summary> Do not audit attempts to send commplex_main_server packets. </summary> @@ -21464,7 +18899,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_commplex_main_server_packets" lineno="17907"> +<interface name="corenet_receive_commplex_main_server_packets" lineno="14303"> <summary> Receive commplex_main_server packets. </summary> @@ -21475,7 +18910,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17926"> +<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="14322"> <summary> Do not audit attempts to receive commplex_main_server packets. </summary> @@ -21486,7 +18921,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17945"> +<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="14341"> <summary> Send and receive commplex_main_server packets. </summary> @@ -21497,7 +18932,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17961"> +<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="14357"> <summary> Do not audit attempts to send and receive commplex_main_server packets. </summary> @@ -21508,7 +18943,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17976"> +<interface name="corenet_relabelto_commplex_main_server_packets" lineno="14372"> <summary> Relabel packets to commplex_main_server the packet type. </summary> @@ -21518,85 +18953,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17998"> -<summary> -Send and receive TCP traffic on the comsat port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_comsat_port" lineno="18013"> -<summary> -Send UDP traffic on the comsat port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18028"> -<summary> -Do not audit attempts to send UDP traffic on the comsat port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_comsat_port" lineno="18043"> -<summary> -Receive UDP traffic on the comsat port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18058"> -<summary> -Do not audit attempts to receive UDP traffic on the comsat port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_comsat_port" lineno="18073"> -<summary> -Send and receive UDP traffic on the comsat port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18089"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the comsat port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_comsat_port" lineno="18104"> +<interface name="corenet_tcp_bind_comsat_port" lineno="14394"> <summary> Bind TCP sockets to the comsat port. </summary> @@ -21607,7 +18964,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_comsat_port" lineno="18124"> +<interface name="corenet_udp_bind_comsat_port" lineno="14414"> <summary> Bind UDP sockets to the comsat port. </summary> @@ -21618,7 +18975,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_comsat_port" lineno="18143"> +<interface name="corenet_tcp_connect_comsat_port" lineno="14433"> <summary> Make a TCP connection to the comsat port. </summary> @@ -21628,7 +18985,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_comsat_client_packets" lineno="18163"> +<interface name="corenet_send_comsat_client_packets" lineno="14453"> <summary> Send comsat_client packets. </summary> @@ -21639,7 +18996,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18182"> +<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="14472"> <summary> Do not audit attempts to send comsat_client packets. </summary> @@ -21650,7 +19007,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_comsat_client_packets" lineno="18201"> +<interface name="corenet_receive_comsat_client_packets" lineno="14491"> <summary> Receive comsat_client packets. </summary> @@ -21661,7 +19018,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18220"> +<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="14510"> <summary> Do not audit attempts to receive comsat_client packets. </summary> @@ -21672,7 +19029,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_comsat_client_packets" lineno="18239"> +<interface name="corenet_sendrecv_comsat_client_packets" lineno="14529"> <summary> Send and receive comsat_client packets. </summary> @@ -21683,7 +19040,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18255"> +<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="14545"> <summary> Do not audit attempts to send and receive comsat_client packets. </summary> @@ -21694,7 +19051,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_comsat_client_packets" lineno="18270"> +<interface name="corenet_relabelto_comsat_client_packets" lineno="14560"> <summary> Relabel packets to comsat_client the packet type. </summary> @@ -21704,7 +19061,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_comsat_server_packets" lineno="18290"> +<interface name="corenet_send_comsat_server_packets" lineno="14580"> <summary> Send comsat_server packets. </summary> @@ -21715,7 +19072,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18309"> +<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="14599"> <summary> Do not audit attempts to send comsat_server packets. </summary> @@ -21726,7 +19083,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_comsat_server_packets" lineno="18328"> +<interface name="corenet_receive_comsat_server_packets" lineno="14618"> <summary> Receive comsat_server packets. </summary> @@ -21737,7 +19094,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18347"> +<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="14637"> <summary> Do not audit attempts to receive comsat_server packets. </summary> @@ -21748,7 +19105,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_comsat_server_packets" lineno="18366"> +<interface name="corenet_sendrecv_comsat_server_packets" lineno="14656"> <summary> Send and receive comsat_server packets. </summary> @@ -21759,7 +19116,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18382"> +<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="14672"> <summary> Do not audit attempts to send and receive comsat_server packets. </summary> @@ -21770,7 +19127,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_comsat_server_packets" lineno="18397"> +<interface name="corenet_relabelto_comsat_server_packets" lineno="14687"> <summary> Relabel packets to comsat_server the packet type. </summary> @@ -21780,85 +19137,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_condor_port" lineno="18419"> -<summary> -Send and receive TCP traffic on the condor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_condor_port" lineno="18434"> -<summary> -Send UDP traffic on the condor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18449"> -<summary> -Do not audit attempts to send UDP traffic on the condor port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_condor_port" lineno="18464"> -<summary> -Receive UDP traffic on the condor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18479"> -<summary> -Do not audit attempts to receive UDP traffic on the condor port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_condor_port" lineno="18494"> -<summary> -Send and receive UDP traffic on the condor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18510"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the condor port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_condor_port" lineno="18525"> +<interface name="corenet_tcp_bind_condor_port" lineno="14709"> <summary> Bind TCP sockets to the condor port. </summary> @@ -21869,7 +19148,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_condor_port" lineno="18545"> +<interface name="corenet_udp_bind_condor_port" lineno="14729"> <summary> Bind UDP sockets to the condor port. </summary> @@ -21880,7 +19159,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_condor_port" lineno="18564"> +<interface name="corenet_tcp_connect_condor_port" lineno="14748"> <summary> Make a TCP connection to the condor port. </summary> @@ -21890,7 +19169,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_condor_client_packets" lineno="18584"> +<interface name="corenet_send_condor_client_packets" lineno="14768"> <summary> Send condor_client packets. </summary> @@ -21901,7 +19180,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18603"> +<interface name="corenet_dontaudit_send_condor_client_packets" lineno="14787"> <summary> Do not audit attempts to send condor_client packets. </summary> @@ -21912,7 +19191,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_condor_client_packets" lineno="18622"> +<interface name="corenet_receive_condor_client_packets" lineno="14806"> <summary> Receive condor_client packets. </summary> @@ -21923,7 +19202,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18641"> +<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="14825"> <summary> Do not audit attempts to receive condor_client packets. </summary> @@ -21934,7 +19213,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_condor_client_packets" lineno="18660"> +<interface name="corenet_sendrecv_condor_client_packets" lineno="14844"> <summary> Send and receive condor_client packets. </summary> @@ -21945,7 +19224,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18676"> +<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="14860"> <summary> Do not audit attempts to send and receive condor_client packets. </summary> @@ -21956,7 +19235,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_condor_client_packets" lineno="18691"> +<interface name="corenet_relabelto_condor_client_packets" lineno="14875"> <summary> Relabel packets to condor_client the packet type. </summary> @@ -21966,7 +19245,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_condor_server_packets" lineno="18711"> +<interface name="corenet_send_condor_server_packets" lineno="14895"> <summary> Send condor_server packets. </summary> @@ -21977,7 +19256,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18730"> +<interface name="corenet_dontaudit_send_condor_server_packets" lineno="14914"> <summary> Do not audit attempts to send condor_server packets. </summary> @@ -21988,7 +19267,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_condor_server_packets" lineno="18749"> +<interface name="corenet_receive_condor_server_packets" lineno="14933"> <summary> Receive condor_server packets. </summary> @@ -21999,7 +19278,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18768"> +<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="14952"> <summary> Do not audit attempts to receive condor_server packets. </summary> @@ -22010,7 +19289,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_condor_server_packets" lineno="18787"> +<interface name="corenet_sendrecv_condor_server_packets" lineno="14971"> <summary> Send and receive condor_server packets. </summary> @@ -22021,7 +19300,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18803"> +<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="14987"> <summary> Do not audit attempts to send and receive condor_server packets. </summary> @@ -22032,7 +19311,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_condor_server_packets" lineno="18818"> +<interface name="corenet_relabelto_condor_server_packets" lineno="15002"> <summary> Relabel packets to condor_server the packet type. </summary> @@ -22042,85 +19321,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18840"> -<summary> -Send and receive TCP traffic on the couchdb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_couchdb_port" lineno="18855"> -<summary> -Send UDP traffic on the couchdb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18870"> -<summary> -Do not audit attempts to send UDP traffic on the couchdb port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_couchdb_port" lineno="18885"> -<summary> -Receive UDP traffic on the couchdb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18900"> -<summary> -Do not audit attempts to receive UDP traffic on the couchdb port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18915"> -<summary> -Send and receive UDP traffic on the couchdb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18931"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the couchdb port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_couchdb_port" lineno="18946"> +<interface name="corenet_tcp_bind_couchdb_port" lineno="15024"> <summary> Bind TCP sockets to the couchdb port. </summary> @@ -22131,7 +19332,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_couchdb_port" lineno="18966"> +<interface name="corenet_udp_bind_couchdb_port" lineno="15044"> <summary> Bind UDP sockets to the couchdb port. </summary> @@ -22142,7 +19343,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_couchdb_port" lineno="18985"> +<interface name="corenet_tcp_connect_couchdb_port" lineno="15063"> <summary> Make a TCP connection to the couchdb port. </summary> @@ -22152,7 +19353,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_couchdb_client_packets" lineno="19005"> +<interface name="corenet_send_couchdb_client_packets" lineno="15083"> <summary> Send couchdb_client packets. </summary> @@ -22163,7 +19364,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19024"> +<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="15102"> <summary> Do not audit attempts to send couchdb_client packets. </summary> @@ -22174,7 +19375,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_couchdb_client_packets" lineno="19043"> +<interface name="corenet_receive_couchdb_client_packets" lineno="15121"> <summary> Receive couchdb_client packets. </summary> @@ -22185,7 +19386,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19062"> +<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="15140"> <summary> Do not audit attempts to receive couchdb_client packets. </summary> @@ -22196,7 +19397,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19081"> +<interface name="corenet_sendrecv_couchdb_client_packets" lineno="15159"> <summary> Send and receive couchdb_client packets. </summary> @@ -22207,7 +19408,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19097"> +<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="15175"> <summary> Do not audit attempts to send and receive couchdb_client packets. </summary> @@ -22218,7 +19419,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_couchdb_client_packets" lineno="19112"> +<interface name="corenet_relabelto_couchdb_client_packets" lineno="15190"> <summary> Relabel packets to couchdb_client the packet type. </summary> @@ -22228,7 +19429,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_couchdb_server_packets" lineno="19132"> +<interface name="corenet_send_couchdb_server_packets" lineno="15210"> <summary> Send couchdb_server packets. </summary> @@ -22239,7 +19440,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19151"> +<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="15229"> <summary> Do not audit attempts to send couchdb_server packets. </summary> @@ -22250,7 +19451,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_couchdb_server_packets" lineno="19170"> +<interface name="corenet_receive_couchdb_server_packets" lineno="15248"> <summary> Receive couchdb_server packets. </summary> @@ -22261,7 +19462,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19189"> +<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="15267"> <summary> Do not audit attempts to receive couchdb_server packets. </summary> @@ -22272,7 +19473,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19208"> +<interface name="corenet_sendrecv_couchdb_server_packets" lineno="15286"> <summary> Send and receive couchdb_server packets. </summary> @@ -22283,7 +19484,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19224"> +<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="15302"> <summary> Do not audit attempts to send and receive couchdb_server packets. </summary> @@ -22294,7 +19495,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_couchdb_server_packets" lineno="19239"> +<interface name="corenet_relabelto_couchdb_server_packets" lineno="15317"> <summary> Relabel packets to couchdb_server the packet type. </summary> @@ -22304,85 +19505,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19261"> -<summary> -Send and receive TCP traffic on the cslistener port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_cslistener_port" lineno="19276"> -<summary> -Send UDP traffic on the cslistener port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19291"> -<summary> -Do not audit attempts to send UDP traffic on the cslistener port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_cslistener_port" lineno="19306"> -<summary> -Receive UDP traffic on the cslistener port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19321"> -<summary> -Do not audit attempts to receive UDP traffic on the cslistener port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19336"> -<summary> -Send and receive UDP traffic on the cslistener port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19352"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the cslistener port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_cslistener_port" lineno="19367"> +<interface name="corenet_tcp_bind_cslistener_port" lineno="15339"> <summary> Bind TCP sockets to the cslistener port. </summary> @@ -22393,7 +19516,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cslistener_port" lineno="19387"> +<interface name="corenet_udp_bind_cslistener_port" lineno="15359"> <summary> Bind UDP sockets to the cslistener port. </summary> @@ -22404,7 +19527,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cslistener_port" lineno="19406"> +<interface name="corenet_tcp_connect_cslistener_port" lineno="15378"> <summary> Make a TCP connection to the cslistener port. </summary> @@ -22414,7 +19537,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cslistener_client_packets" lineno="19426"> +<interface name="corenet_send_cslistener_client_packets" lineno="15398"> <summary> Send cslistener_client packets. </summary> @@ -22425,7 +19548,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19445"> +<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="15417"> <summary> Do not audit attempts to send cslistener_client packets. </summary> @@ -22436,7 +19559,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cslistener_client_packets" lineno="19464"> +<interface name="corenet_receive_cslistener_client_packets" lineno="15436"> <summary> Receive cslistener_client packets. </summary> @@ -22447,7 +19570,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19483"> +<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="15455"> <summary> Do not audit attempts to receive cslistener_client packets. </summary> @@ -22458,7 +19581,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19502"> +<interface name="corenet_sendrecv_cslistener_client_packets" lineno="15474"> <summary> Send and receive cslistener_client packets. </summary> @@ -22469,7 +19592,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19518"> +<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="15490"> <summary> Do not audit attempts to send and receive cslistener_client packets. </summary> @@ -22480,7 +19603,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cslistener_client_packets" lineno="19533"> +<interface name="corenet_relabelto_cslistener_client_packets" lineno="15505"> <summary> Relabel packets to cslistener_client the packet type. </summary> @@ -22490,7 +19613,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cslistener_server_packets" lineno="19553"> +<interface name="corenet_send_cslistener_server_packets" lineno="15525"> <summary> Send cslistener_server packets. </summary> @@ -22501,7 +19624,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19572"> +<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="15544"> <summary> Do not audit attempts to send cslistener_server packets. </summary> @@ -22512,7 +19635,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cslistener_server_packets" lineno="19591"> +<interface name="corenet_receive_cslistener_server_packets" lineno="15563"> <summary> Receive cslistener_server packets. </summary> @@ -22523,7 +19646,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19610"> +<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="15582"> <summary> Do not audit attempts to receive cslistener_server packets. </summary> @@ -22534,7 +19657,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19629"> +<interface name="corenet_sendrecv_cslistener_server_packets" lineno="15601"> <summary> Send and receive cslistener_server packets. </summary> @@ -22545,7 +19668,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19645"> +<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="15617"> <summary> Do not audit attempts to send and receive cslistener_server packets. </summary> @@ -22556,7 +19679,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cslistener_server_packets" lineno="19660"> +<interface name="corenet_relabelto_cslistener_server_packets" lineno="15632"> <summary> Relabel packets to cslistener_server the packet type. </summary> @@ -22566,85 +19689,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19682"> -<summary> -Send and receive TCP traffic on the ctdb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ctdb_port" lineno="19697"> -<summary> -Send UDP traffic on the ctdb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19712"> -<summary> -Do not audit attempts to send UDP traffic on the ctdb port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ctdb_port" lineno="19727"> -<summary> -Receive UDP traffic on the ctdb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19742"> -<summary> -Do not audit attempts to receive UDP traffic on the ctdb port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19757"> -<summary> -Send and receive UDP traffic on the ctdb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19773"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ctdb port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ctdb_port" lineno="19788"> +<interface name="corenet_tcp_bind_ctdb_port" lineno="15654"> <summary> Bind TCP sockets to the ctdb port. </summary> @@ -22655,7 +19700,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ctdb_port" lineno="19808"> +<interface name="corenet_udp_bind_ctdb_port" lineno="15674"> <summary> Bind UDP sockets to the ctdb port. </summary> @@ -22666,7 +19711,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ctdb_port" lineno="19827"> +<interface name="corenet_tcp_connect_ctdb_port" lineno="15693"> <summary> Make a TCP connection to the ctdb port. </summary> @@ -22676,7 +19721,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ctdb_client_packets" lineno="19847"> +<interface name="corenet_send_ctdb_client_packets" lineno="15713"> <summary> Send ctdb_client packets. </summary> @@ -22687,7 +19732,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19866"> +<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="15732"> <summary> Do not audit attempts to send ctdb_client packets. </summary> @@ -22698,7 +19743,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ctdb_client_packets" lineno="19885"> +<interface name="corenet_receive_ctdb_client_packets" lineno="15751"> <summary> Receive ctdb_client packets. </summary> @@ -22709,7 +19754,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19904"> +<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="15770"> <summary> Do not audit attempts to receive ctdb_client packets. </summary> @@ -22720,7 +19765,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19923"> +<interface name="corenet_sendrecv_ctdb_client_packets" lineno="15789"> <summary> Send and receive ctdb_client packets. </summary> @@ -22731,7 +19776,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19939"> +<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="15805"> <summary> Do not audit attempts to send and receive ctdb_client packets. </summary> @@ -22742,7 +19787,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ctdb_client_packets" lineno="19954"> +<interface name="corenet_relabelto_ctdb_client_packets" lineno="15820"> <summary> Relabel packets to ctdb_client the packet type. </summary> @@ -22752,7 +19797,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ctdb_server_packets" lineno="19974"> +<interface name="corenet_send_ctdb_server_packets" lineno="15840"> <summary> Send ctdb_server packets. </summary> @@ -22763,7 +19808,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19993"> +<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="15859"> <summary> Do not audit attempts to send ctdb_server packets. </summary> @@ -22774,7 +19819,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ctdb_server_packets" lineno="20012"> +<interface name="corenet_receive_ctdb_server_packets" lineno="15878"> <summary> Receive ctdb_server packets. </summary> @@ -22785,7 +19830,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20031"> +<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="15897"> <summary> Do not audit attempts to receive ctdb_server packets. </summary> @@ -22796,7 +19841,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20050"> +<interface name="corenet_sendrecv_ctdb_server_packets" lineno="15916"> <summary> Send and receive ctdb_server packets. </summary> @@ -22807,7 +19852,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20066"> +<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="15932"> <summary> Do not audit attempts to send and receive ctdb_server packets. </summary> @@ -22818,7 +19863,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ctdb_server_packets" lineno="20081"> +<interface name="corenet_relabelto_ctdb_server_packets" lineno="15947"> <summary> Relabel packets to ctdb_server the packet type. </summary> @@ -22828,85 +19873,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20103"> -<summary> -Send and receive TCP traffic on the cvs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_cvs_port" lineno="20118"> -<summary> -Send UDP traffic on the cvs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20133"> -<summary> -Do not audit attempts to send UDP traffic on the cvs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_cvs_port" lineno="20148"> -<summary> -Receive UDP traffic on the cvs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20163"> -<summary> -Do not audit attempts to receive UDP traffic on the cvs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_cvs_port" lineno="20178"> -<summary> -Send and receive UDP traffic on the cvs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20194"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the cvs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_cvs_port" lineno="20209"> +<interface name="corenet_tcp_bind_cvs_port" lineno="15969"> <summary> Bind TCP sockets to the cvs port. </summary> @@ -22917,7 +19884,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cvs_port" lineno="20229"> +<interface name="corenet_udp_bind_cvs_port" lineno="15989"> <summary> Bind UDP sockets to the cvs port. </summary> @@ -22928,7 +19895,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cvs_port" lineno="20248"> +<interface name="corenet_tcp_connect_cvs_port" lineno="16008"> <summary> Make a TCP connection to the cvs port. </summary> @@ -22938,7 +19905,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cvs_client_packets" lineno="20268"> +<interface name="corenet_send_cvs_client_packets" lineno="16028"> <summary> Send cvs_client packets. </summary> @@ -22949,7 +19916,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20287"> +<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="16047"> <summary> Do not audit attempts to send cvs_client packets. </summary> @@ -22960,7 +19927,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cvs_client_packets" lineno="20306"> +<interface name="corenet_receive_cvs_client_packets" lineno="16066"> <summary> Receive cvs_client packets. </summary> @@ -22971,7 +19938,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20325"> +<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="16085"> <summary> Do not audit attempts to receive cvs_client packets. </summary> @@ -22982,7 +19949,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cvs_client_packets" lineno="20344"> +<interface name="corenet_sendrecv_cvs_client_packets" lineno="16104"> <summary> Send and receive cvs_client packets. </summary> @@ -22993,7 +19960,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20360"> +<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="16120"> <summary> Do not audit attempts to send and receive cvs_client packets. </summary> @@ -23004,7 +19971,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cvs_client_packets" lineno="20375"> +<interface name="corenet_relabelto_cvs_client_packets" lineno="16135"> <summary> Relabel packets to cvs_client the packet type. </summary> @@ -23014,7 +19981,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cvs_server_packets" lineno="20395"> +<interface name="corenet_send_cvs_server_packets" lineno="16155"> <summary> Send cvs_server packets. </summary> @@ -23025,7 +19992,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20414"> +<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="16174"> <summary> Do not audit attempts to send cvs_server packets. </summary> @@ -23036,7 +20003,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cvs_server_packets" lineno="20433"> +<interface name="corenet_receive_cvs_server_packets" lineno="16193"> <summary> Receive cvs_server packets. </summary> @@ -23047,7 +20014,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20452"> +<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="16212"> <summary> Do not audit attempts to receive cvs_server packets. </summary> @@ -23058,7 +20025,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cvs_server_packets" lineno="20471"> +<interface name="corenet_sendrecv_cvs_server_packets" lineno="16231"> <summary> Send and receive cvs_server packets. </summary> @@ -23069,7 +20036,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20487"> +<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="16247"> <summary> Do not audit attempts to send and receive cvs_server packets. </summary> @@ -23080,7 +20047,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cvs_server_packets" lineno="20502"> +<interface name="corenet_relabelto_cvs_server_packets" lineno="16262"> <summary> Relabel packets to cvs_server the packet type. </summary> @@ -23090,85 +20057,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20524"> -<summary> -Send and receive TCP traffic on the cyphesis port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_cyphesis_port" lineno="20539"> -<summary> -Send UDP traffic on the cyphesis port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20554"> -<summary> -Do not audit attempts to send UDP traffic on the cyphesis port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_cyphesis_port" lineno="20569"> -<summary> -Receive UDP traffic on the cyphesis port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20584"> -<summary> -Do not audit attempts to receive UDP traffic on the cyphesis port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20599"> -<summary> -Send and receive UDP traffic on the cyphesis port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20615"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the cyphesis port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_cyphesis_port" lineno="20630"> +<interface name="corenet_tcp_bind_cyphesis_port" lineno="16284"> <summary> Bind TCP sockets to the cyphesis port. </summary> @@ -23179,7 +20068,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_cyphesis_port" lineno="20650"> +<interface name="corenet_udp_bind_cyphesis_port" lineno="16304"> <summary> Bind UDP sockets to the cyphesis port. </summary> @@ -23190,7 +20079,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_cyphesis_port" lineno="20669"> +<interface name="corenet_tcp_connect_cyphesis_port" lineno="16323"> <summary> Make a TCP connection to the cyphesis port. </summary> @@ -23200,7 +20089,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cyphesis_client_packets" lineno="20689"> +<interface name="corenet_send_cyphesis_client_packets" lineno="16343"> <summary> Send cyphesis_client packets. </summary> @@ -23211,7 +20100,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20708"> +<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="16362"> <summary> Do not audit attempts to send cyphesis_client packets. </summary> @@ -23222,7 +20111,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cyphesis_client_packets" lineno="20727"> +<interface name="corenet_receive_cyphesis_client_packets" lineno="16381"> <summary> Receive cyphesis_client packets. </summary> @@ -23233,7 +20122,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20746"> +<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="16400"> <summary> Do not audit attempts to receive cyphesis_client packets. </summary> @@ -23244,7 +20133,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20765"> +<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="16419"> <summary> Send and receive cyphesis_client packets. </summary> @@ -23255,7 +20144,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20781"> +<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="16435"> <summary> Do not audit attempts to send and receive cyphesis_client packets. </summary> @@ -23266,7 +20155,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20796"> +<interface name="corenet_relabelto_cyphesis_client_packets" lineno="16450"> <summary> Relabel packets to cyphesis_client the packet type. </summary> @@ -23276,7 +20165,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_cyphesis_server_packets" lineno="20816"> +<interface name="corenet_send_cyphesis_server_packets" lineno="16470"> <summary> Send cyphesis_server packets. </summary> @@ -23287,7 +20176,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20835"> +<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="16489"> <summary> Do not audit attempts to send cyphesis_server packets. </summary> @@ -23298,7 +20187,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_cyphesis_server_packets" lineno="20854"> +<interface name="corenet_receive_cyphesis_server_packets" lineno="16508"> <summary> Receive cyphesis_server packets. </summary> @@ -23309,7 +20198,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20873"> +<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="16527"> <summary> Do not audit attempts to receive cyphesis_server packets. </summary> @@ -23320,7 +20209,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20892"> +<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="16546"> <summary> Send and receive cyphesis_server packets. </summary> @@ -23331,7 +20220,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20908"> +<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="16562"> <summary> Do not audit attempts to send and receive cyphesis_server packets. </summary> @@ -23342,7 +20231,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20923"> +<interface name="corenet_relabelto_cyphesis_server_packets" lineno="16577"> <summary> Relabel packets to cyphesis_server the packet type. </summary> @@ -23352,85 +20241,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_daap_port" lineno="20945"> -<summary> -Send and receive TCP traffic on the daap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_daap_port" lineno="20960"> -<summary> -Send UDP traffic on the daap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20975"> -<summary> -Do not audit attempts to send UDP traffic on the daap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_daap_port" lineno="20990"> -<summary> -Receive UDP traffic on the daap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="21005"> -<summary> -Do not audit attempts to receive UDP traffic on the daap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_daap_port" lineno="21020"> -<summary> -Send and receive UDP traffic on the daap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21036"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the daap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_daap_port" lineno="21051"> +<interface name="corenet_tcp_bind_daap_port" lineno="16599"> <summary> Bind TCP sockets to the daap port. </summary> @@ -23441,7 +20252,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_daap_port" lineno="21071"> +<interface name="corenet_udp_bind_daap_port" lineno="16619"> <summary> Bind UDP sockets to the daap port. </summary> @@ -23452,7 +20263,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_daap_port" lineno="21090"> +<interface name="corenet_tcp_connect_daap_port" lineno="16638"> <summary> Make a TCP connection to the daap port. </summary> @@ -23462,7 +20273,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_daap_client_packets" lineno="21110"> +<interface name="corenet_send_daap_client_packets" lineno="16658"> <summary> Send daap_client packets. </summary> @@ -23473,7 +20284,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21129"> +<interface name="corenet_dontaudit_send_daap_client_packets" lineno="16677"> <summary> Do not audit attempts to send daap_client packets. </summary> @@ -23484,7 +20295,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_daap_client_packets" lineno="21148"> +<interface name="corenet_receive_daap_client_packets" lineno="16696"> <summary> Receive daap_client packets. </summary> @@ -23495,7 +20306,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21167"> +<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="16715"> <summary> Do not audit attempts to receive daap_client packets. </summary> @@ -23506,7 +20317,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_daap_client_packets" lineno="21186"> +<interface name="corenet_sendrecv_daap_client_packets" lineno="16734"> <summary> Send and receive daap_client packets. </summary> @@ -23517,7 +20328,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21202"> +<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="16750"> <summary> Do not audit attempts to send and receive daap_client packets. </summary> @@ -23528,7 +20339,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_daap_client_packets" lineno="21217"> +<interface name="corenet_relabelto_daap_client_packets" lineno="16765"> <summary> Relabel packets to daap_client the packet type. </summary> @@ -23538,7 +20349,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_daap_server_packets" lineno="21237"> +<interface name="corenet_send_daap_server_packets" lineno="16785"> <summary> Send daap_server packets. </summary> @@ -23549,7 +20360,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21256"> +<interface name="corenet_dontaudit_send_daap_server_packets" lineno="16804"> <summary> Do not audit attempts to send daap_server packets. </summary> @@ -23560,7 +20371,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_daap_server_packets" lineno="21275"> +<interface name="corenet_receive_daap_server_packets" lineno="16823"> <summary> Receive daap_server packets. </summary> @@ -23571,7 +20382,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21294"> +<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="16842"> <summary> Do not audit attempts to receive daap_server packets. </summary> @@ -23582,7 +20393,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_daap_server_packets" lineno="21313"> +<interface name="corenet_sendrecv_daap_server_packets" lineno="16861"> <summary> Send and receive daap_server packets. </summary> @@ -23593,7 +20404,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21329"> +<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="16877"> <summary> Do not audit attempts to send and receive daap_server packets. </summary> @@ -23604,7 +20415,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_daap_server_packets" lineno="21344"> +<interface name="corenet_relabelto_daap_server_packets" lineno="16892"> <summary> Relabel packets to daap_server the packet type. </summary> @@ -23614,85 +20425,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21366"> -<summary> -Send and receive TCP traffic on the dbskkd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_dbskkd_port" lineno="21381"> -<summary> -Send UDP traffic on the dbskkd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21396"> -<summary> -Do not audit attempts to send UDP traffic on the dbskkd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_dbskkd_port" lineno="21411"> -<summary> -Receive UDP traffic on the dbskkd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21426"> -<summary> -Do not audit attempts to receive UDP traffic on the dbskkd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21441"> -<summary> -Send and receive UDP traffic on the dbskkd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21457"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the dbskkd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_dbskkd_port" lineno="21472"> +<interface name="corenet_tcp_bind_dbskkd_port" lineno="16914"> <summary> Bind TCP sockets to the dbskkd port. </summary> @@ -23703,7 +20436,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dbskkd_port" lineno="21492"> +<interface name="corenet_udp_bind_dbskkd_port" lineno="16934"> <summary> Bind UDP sockets to the dbskkd port. </summary> @@ -23714,7 +20447,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dbskkd_port" lineno="21511"> +<interface name="corenet_tcp_connect_dbskkd_port" lineno="16953"> <summary> Make a TCP connection to the dbskkd port. </summary> @@ -23724,7 +20457,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dbskkd_client_packets" lineno="21531"> +<interface name="corenet_send_dbskkd_client_packets" lineno="16973"> <summary> Send dbskkd_client packets. </summary> @@ -23735,7 +20468,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21550"> +<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="16992"> <summary> Do not audit attempts to send dbskkd_client packets. </summary> @@ -23746,7 +20479,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dbskkd_client_packets" lineno="21569"> +<interface name="corenet_receive_dbskkd_client_packets" lineno="17011"> <summary> Receive dbskkd_client packets. </summary> @@ -23757,7 +20490,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21588"> +<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="17030"> <summary> Do not audit attempts to receive dbskkd_client packets. </summary> @@ -23768,7 +20501,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21607"> +<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="17049"> <summary> Send and receive dbskkd_client packets. </summary> @@ -23779,7 +20512,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21623"> +<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="17065"> <summary> Do not audit attempts to send and receive dbskkd_client packets. </summary> @@ -23790,7 +20523,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21638"> +<interface name="corenet_relabelto_dbskkd_client_packets" lineno="17080"> <summary> Relabel packets to dbskkd_client the packet type. </summary> @@ -23800,7 +20533,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dbskkd_server_packets" lineno="21658"> +<interface name="corenet_send_dbskkd_server_packets" lineno="17100"> <summary> Send dbskkd_server packets. </summary> @@ -23811,7 +20544,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21677"> +<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="17119"> <summary> Do not audit attempts to send dbskkd_server packets. </summary> @@ -23822,7 +20555,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dbskkd_server_packets" lineno="21696"> +<interface name="corenet_receive_dbskkd_server_packets" lineno="17138"> <summary> Receive dbskkd_server packets. </summary> @@ -23833,7 +20566,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21715"> +<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="17157"> <summary> Do not audit attempts to receive dbskkd_server packets. </summary> @@ -23844,7 +20577,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21734"> +<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="17176"> <summary> Send and receive dbskkd_server packets. </summary> @@ -23855,7 +20588,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21750"> +<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="17192"> <summary> Do not audit attempts to send and receive dbskkd_server packets. </summary> @@ -23866,7 +20599,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21765"> +<interface name="corenet_relabelto_dbskkd_server_packets" lineno="17207"> <summary> Relabel packets to dbskkd_server the packet type. </summary> @@ -23876,85 +20609,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21787"> -<summary> -Send and receive TCP traffic on the dcc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_dcc_port" lineno="21802"> -<summary> -Send UDP traffic on the dcc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21817"> -<summary> -Do not audit attempts to send UDP traffic on the dcc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_dcc_port" lineno="21832"> -<summary> -Receive UDP traffic on the dcc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21847"> -<summary> -Do not audit attempts to receive UDP traffic on the dcc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_dcc_port" lineno="21862"> -<summary> -Send and receive UDP traffic on the dcc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21878"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the dcc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_dcc_port" lineno="21893"> +<interface name="corenet_tcp_bind_dcc_port" lineno="17229"> <summary> Bind TCP sockets to the dcc port. </summary> @@ -23965,7 +20620,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dcc_port" lineno="21913"> +<interface name="corenet_udp_bind_dcc_port" lineno="17249"> <summary> Bind UDP sockets to the dcc port. </summary> @@ -23976,7 +20631,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dcc_port" lineno="21932"> +<interface name="corenet_tcp_connect_dcc_port" lineno="17268"> <summary> Make a TCP connection to the dcc port. </summary> @@ -23986,7 +20641,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dcc_client_packets" lineno="21952"> +<interface name="corenet_send_dcc_client_packets" lineno="17288"> <summary> Send dcc_client packets. </summary> @@ -23997,7 +20652,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21971"> +<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="17307"> <summary> Do not audit attempts to send dcc_client packets. </summary> @@ -24008,7 +20663,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dcc_client_packets" lineno="21990"> +<interface name="corenet_receive_dcc_client_packets" lineno="17326"> <summary> Receive dcc_client packets. </summary> @@ -24019,7 +20674,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="22009"> +<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="17345"> <summary> Do not audit attempts to receive dcc_client packets. </summary> @@ -24030,7 +20685,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dcc_client_packets" lineno="22028"> +<interface name="corenet_sendrecv_dcc_client_packets" lineno="17364"> <summary> Send and receive dcc_client packets. </summary> @@ -24041,7 +20696,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22044"> +<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="17380"> <summary> Do not audit attempts to send and receive dcc_client packets. </summary> @@ -24052,7 +20707,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dcc_client_packets" lineno="22059"> +<interface name="corenet_relabelto_dcc_client_packets" lineno="17395"> <summary> Relabel packets to dcc_client the packet type. </summary> @@ -24062,7 +20717,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dcc_server_packets" lineno="22079"> +<interface name="corenet_send_dcc_server_packets" lineno="17415"> <summary> Send dcc_server packets. </summary> @@ -24073,7 +20728,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22098"> +<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="17434"> <summary> Do not audit attempts to send dcc_server packets. </summary> @@ -24084,7 +20739,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dcc_server_packets" lineno="22117"> +<interface name="corenet_receive_dcc_server_packets" lineno="17453"> <summary> Receive dcc_server packets. </summary> @@ -24095,7 +20750,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22136"> +<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="17472"> <summary> Do not audit attempts to receive dcc_server packets. </summary> @@ -24106,7 +20761,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dcc_server_packets" lineno="22155"> +<interface name="corenet_sendrecv_dcc_server_packets" lineno="17491"> <summary> Send and receive dcc_server packets. </summary> @@ -24117,7 +20772,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22171"> +<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="17507"> <summary> Do not audit attempts to send and receive dcc_server packets. </summary> @@ -24128,7 +20783,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dcc_server_packets" lineno="22186"> +<interface name="corenet_relabelto_dcc_server_packets" lineno="17522"> <summary> Relabel packets to dcc_server the packet type. </summary> @@ -24138,85 +20793,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22208"> -<summary> -Send and receive TCP traffic on the dccm port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_dccm_port" lineno="22223"> -<summary> -Send UDP traffic on the dccm port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22238"> -<summary> -Do not audit attempts to send UDP traffic on the dccm port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_dccm_port" lineno="22253"> -<summary> -Receive UDP traffic on the dccm port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22268"> -<summary> -Do not audit attempts to receive UDP traffic on the dccm port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_dccm_port" lineno="22283"> -<summary> -Send and receive UDP traffic on the dccm port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22299"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the dccm port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_dccm_port" lineno="22314"> +<interface name="corenet_tcp_bind_dccm_port" lineno="17544"> <summary> Bind TCP sockets to the dccm port. </summary> @@ -24227,7 +20804,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dccm_port" lineno="22334"> +<interface name="corenet_udp_bind_dccm_port" lineno="17564"> <summary> Bind UDP sockets to the dccm port. </summary> @@ -24238,7 +20815,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dccm_port" lineno="22353"> +<interface name="corenet_tcp_connect_dccm_port" lineno="17583"> <summary> Make a TCP connection to the dccm port. </summary> @@ -24248,7 +20825,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dccm_client_packets" lineno="22373"> +<interface name="corenet_send_dccm_client_packets" lineno="17603"> <summary> Send dccm_client packets. </summary> @@ -24259,7 +20836,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22392"> +<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="17622"> <summary> Do not audit attempts to send dccm_client packets. </summary> @@ -24270,7 +20847,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dccm_client_packets" lineno="22411"> +<interface name="corenet_receive_dccm_client_packets" lineno="17641"> <summary> Receive dccm_client packets. </summary> @@ -24281,7 +20858,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22430"> +<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="17660"> <summary> Do not audit attempts to receive dccm_client packets. </summary> @@ -24292,7 +20869,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dccm_client_packets" lineno="22449"> +<interface name="corenet_sendrecv_dccm_client_packets" lineno="17679"> <summary> Send and receive dccm_client packets. </summary> @@ -24303,7 +20880,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22465"> +<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="17695"> <summary> Do not audit attempts to send and receive dccm_client packets. </summary> @@ -24314,7 +20891,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dccm_client_packets" lineno="22480"> +<interface name="corenet_relabelto_dccm_client_packets" lineno="17710"> <summary> Relabel packets to dccm_client the packet type. </summary> @@ -24324,7 +20901,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dccm_server_packets" lineno="22500"> +<interface name="corenet_send_dccm_server_packets" lineno="17730"> <summary> Send dccm_server packets. </summary> @@ -24335,7 +20912,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22519"> +<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="17749"> <summary> Do not audit attempts to send dccm_server packets. </summary> @@ -24346,7 +20923,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dccm_server_packets" lineno="22538"> +<interface name="corenet_receive_dccm_server_packets" lineno="17768"> <summary> Receive dccm_server packets. </summary> @@ -24357,7 +20934,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="22557"> +<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="17787"> <summary> Do not audit attempts to receive dccm_server packets. </summary> @@ -24368,7 +20945,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dccm_server_packets" lineno="22576"> +<interface name="corenet_sendrecv_dccm_server_packets" lineno="17806"> <summary> Send and receive dccm_server packets. </summary> @@ -24379,7 +20956,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22592"> +<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="17822"> <summary> Do not audit attempts to send and receive dccm_server packets. </summary> @@ -24390,7 +20967,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dccm_server_packets" lineno="22607"> +<interface name="corenet_relabelto_dccm_server_packets" lineno="17837"> <summary> Relabel packets to dccm_server the packet type. </summary> @@ -24400,85 +20977,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22629"> -<summary> -Send and receive TCP traffic on the dhcpc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_dhcpc_port" lineno="22644"> -<summary> -Send UDP traffic on the dhcpc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22659"> -<summary> -Do not audit attempts to send UDP traffic on the dhcpc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_dhcpc_port" lineno="22674"> -<summary> -Receive UDP traffic on the dhcpc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22689"> -<summary> -Do not audit attempts to receive UDP traffic on the dhcpc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22704"> -<summary> -Send and receive UDP traffic on the dhcpc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22720"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the dhcpc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_dhcpc_port" lineno="22735"> +<interface name="corenet_tcp_bind_dhcpc_port" lineno="17859"> <summary> Bind TCP sockets to the dhcpc port. </summary> @@ -24489,7 +20988,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dhcpc_port" lineno="22755"> +<interface name="corenet_udp_bind_dhcpc_port" lineno="17879"> <summary> Bind UDP sockets to the dhcpc port. </summary> @@ -24500,7 +20999,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dhcpc_port" lineno="22774"> +<interface name="corenet_tcp_connect_dhcpc_port" lineno="17898"> <summary> Make a TCP connection to the dhcpc port. </summary> @@ -24510,7 +21009,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dhcpc_client_packets" lineno="22794"> +<interface name="corenet_send_dhcpc_client_packets" lineno="17918"> <summary> Send dhcpc_client packets. </summary> @@ -24521,7 +21020,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22813"> +<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="17937"> <summary> Do not audit attempts to send dhcpc_client packets. </summary> @@ -24532,7 +21031,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dhcpc_client_packets" lineno="22832"> +<interface name="corenet_receive_dhcpc_client_packets" lineno="17956"> <summary> Receive dhcpc_client packets. </summary> @@ -24543,7 +21042,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22851"> +<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="17975"> <summary> Do not audit attempts to receive dhcpc_client packets. </summary> @@ -24554,7 +21053,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22870"> +<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="17994"> <summary> Send and receive dhcpc_client packets. </summary> @@ -24565,7 +21064,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22886"> +<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="18010"> <summary> Do not audit attempts to send and receive dhcpc_client packets. </summary> @@ -24576,7 +21075,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22901"> +<interface name="corenet_relabelto_dhcpc_client_packets" lineno="18025"> <summary> Relabel packets to dhcpc_client the packet type. </summary> @@ -24586,7 +21085,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dhcpc_server_packets" lineno="22921"> +<interface name="corenet_send_dhcpc_server_packets" lineno="18045"> <summary> Send dhcpc_server packets. </summary> @@ -24597,7 +21096,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22940"> +<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="18064"> <summary> Do not audit attempts to send dhcpc_server packets. </summary> @@ -24608,7 +21107,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dhcpc_server_packets" lineno="22959"> +<interface name="corenet_receive_dhcpc_server_packets" lineno="18083"> <summary> Receive dhcpc_server packets. </summary> @@ -24619,7 +21118,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22978"> +<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="18102"> <summary> Do not audit attempts to receive dhcpc_server packets. </summary> @@ -24630,7 +21129,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22997"> +<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="18121"> <summary> Send and receive dhcpc_server packets. </summary> @@ -24641,7 +21140,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="23013"> +<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="18137"> <summary> Do not audit attempts to send and receive dhcpc_server packets. </summary> @@ -24652,7 +21151,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23028"> +<interface name="corenet_relabelto_dhcpc_server_packets" lineno="18152"> <summary> Relabel packets to dhcpc_server the packet type. </summary> @@ -24662,85 +21161,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23050"> -<summary> -Send and receive TCP traffic on the dhcpd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_dhcpd_port" lineno="23065"> -<summary> -Send UDP traffic on the dhcpd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23080"> -<summary> -Do not audit attempts to send UDP traffic on the dhcpd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_dhcpd_port" lineno="23095"> -<summary> -Receive UDP traffic on the dhcpd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23110"> -<summary> -Do not audit attempts to receive UDP traffic on the dhcpd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23125"> -<summary> -Send and receive UDP traffic on the dhcpd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23141"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the dhcpd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_dhcpd_port" lineno="23156"> +<interface name="corenet_tcp_bind_dhcpd_port" lineno="18174"> <summary> Bind TCP sockets to the dhcpd port. </summary> @@ -24751,7 +21172,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dhcpd_port" lineno="23176"> +<interface name="corenet_udp_bind_dhcpd_port" lineno="18194"> <summary> Bind UDP sockets to the dhcpd port. </summary> @@ -24762,7 +21183,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dhcpd_port" lineno="23195"> +<interface name="corenet_tcp_connect_dhcpd_port" lineno="18213"> <summary> Make a TCP connection to the dhcpd port. </summary> @@ -24772,7 +21193,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dhcpd_client_packets" lineno="23215"> +<interface name="corenet_send_dhcpd_client_packets" lineno="18233"> <summary> Send dhcpd_client packets. </summary> @@ -24783,7 +21204,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23234"> +<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="18252"> <summary> Do not audit attempts to send dhcpd_client packets. </summary> @@ -24794,7 +21215,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dhcpd_client_packets" lineno="23253"> +<interface name="corenet_receive_dhcpd_client_packets" lineno="18271"> <summary> Receive dhcpd_client packets. </summary> @@ -24805,7 +21226,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23272"> +<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="18290"> <summary> Do not audit attempts to receive dhcpd_client packets. </summary> @@ -24816,7 +21237,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23291"> +<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="18309"> <summary> Send and receive dhcpd_client packets. </summary> @@ -24827,7 +21248,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23307"> +<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="18325"> <summary> Do not audit attempts to send and receive dhcpd_client packets. </summary> @@ -24838,7 +21259,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23322"> +<interface name="corenet_relabelto_dhcpd_client_packets" lineno="18340"> <summary> Relabel packets to dhcpd_client the packet type. </summary> @@ -24848,7 +21269,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dhcpd_server_packets" lineno="23342"> +<interface name="corenet_send_dhcpd_server_packets" lineno="18360"> <summary> Send dhcpd_server packets. </summary> @@ -24859,7 +21280,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23361"> +<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="18379"> <summary> Do not audit attempts to send dhcpd_server packets. </summary> @@ -24870,7 +21291,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dhcpd_server_packets" lineno="23380"> +<interface name="corenet_receive_dhcpd_server_packets" lineno="18398"> <summary> Receive dhcpd_server packets. </summary> @@ -24881,7 +21302,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23399"> +<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="18417"> <summary> Do not audit attempts to receive dhcpd_server packets. </summary> @@ -24892,7 +21313,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23418"> +<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="18436"> <summary> Send and receive dhcpd_server packets. </summary> @@ -24903,7 +21324,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23434"> +<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="18452"> <summary> Do not audit attempts to send and receive dhcpd_server packets. </summary> @@ -24914,7 +21335,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23449"> +<interface name="corenet_relabelto_dhcpd_server_packets" lineno="18467"> <summary> Relabel packets to dhcpd_server the packet type. </summary> @@ -24924,85 +21345,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dict_port" lineno="23471"> -<summary> -Send and receive TCP traffic on the dict port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_dict_port" lineno="23486"> -<summary> -Send UDP traffic on the dict port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_dict_port" lineno="23501"> -<summary> -Do not audit attempts to send UDP traffic on the dict port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_dict_port" lineno="23516"> -<summary> -Receive UDP traffic on the dict port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="23531"> -<summary> -Do not audit attempts to receive UDP traffic on the dict port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_dict_port" lineno="23546"> -<summary> -Send and receive UDP traffic on the dict port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23562"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the dict port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_dict_port" lineno="23577"> +<interface name="corenet_tcp_bind_dict_port" lineno="18489"> <summary> Bind TCP sockets to the dict port. </summary> @@ -25013,7 +21356,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dict_port" lineno="23597"> +<interface name="corenet_udp_bind_dict_port" lineno="18509"> <summary> Bind UDP sockets to the dict port. </summary> @@ -25024,7 +21367,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dict_port" lineno="23616"> +<interface name="corenet_tcp_connect_dict_port" lineno="18528"> <summary> Make a TCP connection to the dict port. </summary> @@ -25034,7 +21377,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dict_client_packets" lineno="23636"> +<interface name="corenet_send_dict_client_packets" lineno="18548"> <summary> Send dict_client packets. </summary> @@ -25045,7 +21388,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23655"> +<interface name="corenet_dontaudit_send_dict_client_packets" lineno="18567"> <summary> Do not audit attempts to send dict_client packets. </summary> @@ -25056,7 +21399,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dict_client_packets" lineno="23674"> +<interface name="corenet_receive_dict_client_packets" lineno="18586"> <summary> Receive dict_client packets. </summary> @@ -25067,7 +21410,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23693"> +<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="18605"> <summary> Do not audit attempts to receive dict_client packets. </summary> @@ -25078,7 +21421,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dict_client_packets" lineno="23712"> +<interface name="corenet_sendrecv_dict_client_packets" lineno="18624"> <summary> Send and receive dict_client packets. </summary> @@ -25089,7 +21432,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23728"> +<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="18640"> <summary> Do not audit attempts to send and receive dict_client packets. </summary> @@ -25100,7 +21443,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dict_client_packets" lineno="23743"> +<interface name="corenet_relabelto_dict_client_packets" lineno="18655"> <summary> Relabel packets to dict_client the packet type. </summary> @@ -25110,7 +21453,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dict_server_packets" lineno="23763"> +<interface name="corenet_send_dict_server_packets" lineno="18675"> <summary> Send dict_server packets. </summary> @@ -25121,7 +21464,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23782"> +<interface name="corenet_dontaudit_send_dict_server_packets" lineno="18694"> <summary> Do not audit attempts to send dict_server packets. </summary> @@ -25132,7 +21475,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dict_server_packets" lineno="23801"> +<interface name="corenet_receive_dict_server_packets" lineno="18713"> <summary> Receive dict_server packets. </summary> @@ -25143,7 +21486,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23820"> +<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="18732"> <summary> Do not audit attempts to receive dict_server packets. </summary> @@ -25154,7 +21497,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dict_server_packets" lineno="23839"> +<interface name="corenet_sendrecv_dict_server_packets" lineno="18751"> <summary> Send and receive dict_server packets. </summary> @@ -25165,7 +21508,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23855"> +<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="18767"> <summary> Do not audit attempts to send and receive dict_server packets. </summary> @@ -25176,7 +21519,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dict_server_packets" lineno="23870"> +<interface name="corenet_relabelto_dict_server_packets" lineno="18782"> <summary> Relabel packets to dict_server the packet type. </summary> @@ -25186,85 +21529,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23892"> -<summary> -Send and receive TCP traffic on the distccd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_distccd_port" lineno="23907"> -<summary> -Send UDP traffic on the distccd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23922"> -<summary> -Do not audit attempts to send UDP traffic on the distccd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_distccd_port" lineno="23937"> -<summary> -Receive UDP traffic on the distccd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23952"> -<summary> -Do not audit attempts to receive UDP traffic on the distccd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_distccd_port" lineno="23967"> -<summary> -Send and receive UDP traffic on the distccd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23983"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the distccd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_distccd_port" lineno="23998"> +<interface name="corenet_tcp_bind_distccd_port" lineno="18804"> <summary> Bind TCP sockets to the distccd port. </summary> @@ -25275,7 +21540,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_distccd_port" lineno="24018"> +<interface name="corenet_udp_bind_distccd_port" lineno="18824"> <summary> Bind UDP sockets to the distccd port. </summary> @@ -25286,7 +21551,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_distccd_port" lineno="24037"> +<interface name="corenet_tcp_connect_distccd_port" lineno="18843"> <summary> Make a TCP connection to the distccd port. </summary> @@ -25296,7 +21561,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_distccd_client_packets" lineno="24057"> +<interface name="corenet_send_distccd_client_packets" lineno="18863"> <summary> Send distccd_client packets. </summary> @@ -25307,7 +21572,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24076"> +<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="18882"> <summary> Do not audit attempts to send distccd_client packets. </summary> @@ -25318,7 +21583,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_distccd_client_packets" lineno="24095"> +<interface name="corenet_receive_distccd_client_packets" lineno="18901"> <summary> Receive distccd_client packets. </summary> @@ -25329,7 +21594,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24114"> +<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="18920"> <summary> Do not audit attempts to receive distccd_client packets. </summary> @@ -25340,7 +21605,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_distccd_client_packets" lineno="24133"> +<interface name="corenet_sendrecv_distccd_client_packets" lineno="18939"> <summary> Send and receive distccd_client packets. </summary> @@ -25351,7 +21616,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24149"> +<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="18955"> <summary> Do not audit attempts to send and receive distccd_client packets. </summary> @@ -25362,7 +21627,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_distccd_client_packets" lineno="24164"> +<interface name="corenet_relabelto_distccd_client_packets" lineno="18970"> <summary> Relabel packets to distccd_client the packet type. </summary> @@ -25372,7 +21637,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_distccd_server_packets" lineno="24184"> +<interface name="corenet_send_distccd_server_packets" lineno="18990"> <summary> Send distccd_server packets. </summary> @@ -25383,7 +21648,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24203"> +<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="19009"> <summary> Do not audit attempts to send distccd_server packets. </summary> @@ -25394,7 +21659,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_distccd_server_packets" lineno="24222"> +<interface name="corenet_receive_distccd_server_packets" lineno="19028"> <summary> Receive distccd_server packets. </summary> @@ -25405,7 +21670,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24241"> +<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="19047"> <summary> Do not audit attempts to receive distccd_server packets. </summary> @@ -25416,7 +21681,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_distccd_server_packets" lineno="24260"> +<interface name="corenet_sendrecv_distccd_server_packets" lineno="19066"> <summary> Send and receive distccd_server packets. </summary> @@ -25427,7 +21692,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24276"> +<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="19082"> <summary> Do not audit attempts to send and receive distccd_server packets. </summary> @@ -25438,7 +21703,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_distccd_server_packets" lineno="24291"> +<interface name="corenet_relabelto_distccd_server_packets" lineno="19097"> <summary> Relabel packets to distccd_server the packet type. </summary> @@ -25448,85 +21713,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dns_port" lineno="24313"> -<summary> -Send and receive TCP traffic on the dns port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_dns_port" lineno="24328"> -<summary> -Send UDP traffic on the dns port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24343"> -<summary> -Do not audit attempts to send UDP traffic on the dns port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_dns_port" lineno="24358"> -<summary> -Receive UDP traffic on the dns port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24373"> -<summary> -Do not audit attempts to receive UDP traffic on the dns port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_dns_port" lineno="24388"> -<summary> -Send and receive UDP traffic on the dns port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24404"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the dns port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_dns_port" lineno="24419"> +<interface name="corenet_tcp_bind_dns_port" lineno="19119"> <summary> Bind TCP sockets to the dns port. </summary> @@ -25537,7 +21724,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dns_port" lineno="24439"> +<interface name="corenet_udp_bind_dns_port" lineno="19139"> <summary> Bind UDP sockets to the dns port. </summary> @@ -25548,7 +21735,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dns_port" lineno="24458"> +<interface name="corenet_tcp_connect_dns_port" lineno="19158"> <summary> Make a TCP connection to the dns port. </summary> @@ -25558,7 +21745,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dns_client_packets" lineno="24478"> +<interface name="corenet_send_dns_client_packets" lineno="19178"> <summary> Send dns_client packets. </summary> @@ -25569,7 +21756,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dns_client_packets" lineno="24497"> +<interface name="corenet_dontaudit_send_dns_client_packets" lineno="19197"> <summary> Do not audit attempts to send dns_client packets. </summary> @@ -25580,7 +21767,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dns_client_packets" lineno="24516"> +<interface name="corenet_receive_dns_client_packets" lineno="19216"> <summary> Receive dns_client packets. </summary> @@ -25591,7 +21778,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="24535"> +<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="19235"> <summary> Do not audit attempts to receive dns_client packets. </summary> @@ -25602,7 +21789,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dns_client_packets" lineno="24554"> +<interface name="corenet_sendrecv_dns_client_packets" lineno="19254"> <summary> Send and receive dns_client packets. </summary> @@ -25613,7 +21800,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24570"> +<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="19270"> <summary> Do not audit attempts to send and receive dns_client packets. </summary> @@ -25624,7 +21811,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dns_client_packets" lineno="24585"> +<interface name="corenet_relabelto_dns_client_packets" lineno="19285"> <summary> Relabel packets to dns_client the packet type. </summary> @@ -25634,7 +21821,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dns_server_packets" lineno="24605"> +<interface name="corenet_send_dns_server_packets" lineno="19305"> <summary> Send dns_server packets. </summary> @@ -25645,7 +21832,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24624"> +<interface name="corenet_dontaudit_send_dns_server_packets" lineno="19324"> <summary> Do not audit attempts to send dns_server packets. </summary> @@ -25656,7 +21843,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dns_server_packets" lineno="24643"> +<interface name="corenet_receive_dns_server_packets" lineno="19343"> <summary> Receive dns_server packets. </summary> @@ -25667,7 +21854,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24662"> +<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="19362"> <summary> Do not audit attempts to receive dns_server packets. </summary> @@ -25678,7 +21865,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dns_server_packets" lineno="24681"> +<interface name="corenet_sendrecv_dns_server_packets" lineno="19381"> <summary> Send and receive dns_server packets. </summary> @@ -25689,7 +21876,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24697"> +<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="19397"> <summary> Do not audit attempts to send and receive dns_server packets. </summary> @@ -25700,7 +21887,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dns_server_packets" lineno="24712"> +<interface name="corenet_relabelto_dns_server_packets" lineno="19412"> <summary> Relabel packets to dns_server the packet type. </summary> @@ -25710,85 +21897,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24734"> -<summary> -Send and receive TCP traffic on the dropbox port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_dropbox_port" lineno="24749"> -<summary> -Send UDP traffic on the dropbox port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24764"> -<summary> -Do not audit attempts to send UDP traffic on the dropbox port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_dropbox_port" lineno="24779"> -<summary> -Receive UDP traffic on the dropbox port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24794"> -<summary> -Do not audit attempts to receive UDP traffic on the dropbox port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24809"> -<summary> -Send and receive UDP traffic on the dropbox port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24825"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the dropbox port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_dropbox_port" lineno="24840"> +<interface name="corenet_tcp_bind_dropbox_port" lineno="19434"> <summary> Bind TCP sockets to the dropbox port. </summary> @@ -25799,7 +21908,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_dropbox_port" lineno="24860"> +<interface name="corenet_udp_bind_dropbox_port" lineno="19454"> <summary> Bind UDP sockets to the dropbox port. </summary> @@ -25810,7 +21919,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_dropbox_port" lineno="24879"> +<interface name="corenet_tcp_connect_dropbox_port" lineno="19473"> <summary> Make a TCP connection to the dropbox port. </summary> @@ -25820,7 +21929,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dropbox_client_packets" lineno="24899"> +<interface name="corenet_send_dropbox_client_packets" lineno="19493"> <summary> Send dropbox_client packets. </summary> @@ -25831,7 +21940,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24918"> +<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="19512"> <summary> Do not audit attempts to send dropbox_client packets. </summary> @@ -25842,7 +21951,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dropbox_client_packets" lineno="24937"> +<interface name="corenet_receive_dropbox_client_packets" lineno="19531"> <summary> Receive dropbox_client packets. </summary> @@ -25853,7 +21962,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24956"> +<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="19550"> <summary> Do not audit attempts to receive dropbox_client packets. </summary> @@ -25864,7 +21973,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24975"> +<interface name="corenet_sendrecv_dropbox_client_packets" lineno="19569"> <summary> Send and receive dropbox_client packets. </summary> @@ -25875,7 +21984,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24991"> +<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="19585"> <summary> Do not audit attempts to send and receive dropbox_client packets. </summary> @@ -25886,7 +21995,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dropbox_client_packets" lineno="25006"> +<interface name="corenet_relabelto_dropbox_client_packets" lineno="19600"> <summary> Relabel packets to dropbox_client the packet type. </summary> @@ -25896,7 +22005,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_dropbox_server_packets" lineno="25026"> +<interface name="corenet_send_dropbox_server_packets" lineno="19620"> <summary> Send dropbox_server packets. </summary> @@ -25907,7 +22016,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25045"> +<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="19639"> <summary> Do not audit attempts to send dropbox_server packets. </summary> @@ -25918,7 +22027,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_dropbox_server_packets" lineno="25064"> +<interface name="corenet_receive_dropbox_server_packets" lineno="19658"> <summary> Receive dropbox_server packets. </summary> @@ -25929,7 +22038,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25083"> +<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="19677"> <summary> Do not audit attempts to receive dropbox_server packets. </summary> @@ -25940,7 +22049,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25102"> +<interface name="corenet_sendrecv_dropbox_server_packets" lineno="19696"> <summary> Send and receive dropbox_server packets. </summary> @@ -25951,7 +22060,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25118"> +<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="19712"> <summary> Do not audit attempts to send and receive dropbox_server packets. </summary> @@ -25962,7 +22071,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_dropbox_server_packets" lineno="25133"> +<interface name="corenet_relabelto_dropbox_server_packets" lineno="19727"> <summary> Relabel packets to dropbox_server the packet type. </summary> @@ -25972,85 +22081,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_efs_port" lineno="25155"> -<summary> -Send and receive TCP traffic on the efs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_efs_port" lineno="25170"> -<summary> -Send UDP traffic on the efs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25185"> -<summary> -Do not audit attempts to send UDP traffic on the efs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_efs_port" lineno="25200"> -<summary> -Receive UDP traffic on the efs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25215"> -<summary> -Do not audit attempts to receive UDP traffic on the efs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_efs_port" lineno="25230"> -<summary> -Send and receive UDP traffic on the efs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25246"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the efs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_efs_port" lineno="25261"> +<interface name="corenet_tcp_bind_efs_port" lineno="19749"> <summary> Bind TCP sockets to the efs port. </summary> @@ -26061,7 +22092,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_efs_port" lineno="25281"> +<interface name="corenet_udp_bind_efs_port" lineno="19769"> <summary> Bind UDP sockets to the efs port. </summary> @@ -26072,7 +22103,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_efs_port" lineno="25300"> +<interface name="corenet_tcp_connect_efs_port" lineno="19788"> <summary> Make a TCP connection to the efs port. </summary> @@ -26082,7 +22113,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_efs_client_packets" lineno="25320"> +<interface name="corenet_send_efs_client_packets" lineno="19808"> <summary> Send efs_client packets. </summary> @@ -26093,7 +22124,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25339"> +<interface name="corenet_dontaudit_send_efs_client_packets" lineno="19827"> <summary> Do not audit attempts to send efs_client packets. </summary> @@ -26104,7 +22135,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_efs_client_packets" lineno="25358"> +<interface name="corenet_receive_efs_client_packets" lineno="19846"> <summary> Receive efs_client packets. </summary> @@ -26115,7 +22146,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25377"> +<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="19865"> <summary> Do not audit attempts to receive efs_client packets. </summary> @@ -26126,7 +22157,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_efs_client_packets" lineno="25396"> +<interface name="corenet_sendrecv_efs_client_packets" lineno="19884"> <summary> Send and receive efs_client packets. </summary> @@ -26137,7 +22168,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="25412"> +<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="19900"> <summary> Do not audit attempts to send and receive efs_client packets. </summary> @@ -26148,7 +22179,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_efs_client_packets" lineno="25427"> +<interface name="corenet_relabelto_efs_client_packets" lineno="19915"> <summary> Relabel packets to efs_client the packet type. </summary> @@ -26158,7 +22189,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_efs_server_packets" lineno="25447"> +<interface name="corenet_send_efs_server_packets" lineno="19935"> <summary> Send efs_server packets. </summary> @@ -26169,7 +22200,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_efs_server_packets" lineno="25466"> +<interface name="corenet_dontaudit_send_efs_server_packets" lineno="19954"> <summary> Do not audit attempts to send efs_server packets. </summary> @@ -26180,7 +22211,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_efs_server_packets" lineno="25485"> +<interface name="corenet_receive_efs_server_packets" lineno="19973"> <summary> Receive efs_server packets. </summary> @@ -26191,7 +22222,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="25504"> +<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="19992"> <summary> Do not audit attempts to receive efs_server packets. </summary> @@ -26202,7 +22233,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_efs_server_packets" lineno="25523"> +<interface name="corenet_sendrecv_efs_server_packets" lineno="20011"> <summary> Send and receive efs_server packets. </summary> @@ -26213,7 +22244,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="25539"> +<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="20027"> <summary> Do not audit attempts to send and receive efs_server packets. </summary> @@ -26224,7 +22255,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_efs_server_packets" lineno="25554"> +<interface name="corenet_relabelto_efs_server_packets" lineno="20042"> <summary> Relabel packets to efs_server the packet type. </summary> @@ -26234,85 +22265,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25576"> -<summary> -Send and receive TCP traffic on the embrace_dp_c port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25591"> -<summary> -Send UDP traffic on the embrace_dp_c port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25606"> -<summary> -Do not audit attempts to send UDP traffic on the embrace_dp_c port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25621"> -<summary> -Receive UDP traffic on the embrace_dp_c port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25636"> -<summary> -Do not audit attempts to receive UDP traffic on the embrace_dp_c port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25651"> -<summary> -Send and receive UDP traffic on the embrace_dp_c port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25667"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the embrace_dp_c port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25682"> +<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="20064"> <summary> Bind TCP sockets to the embrace_dp_c port. </summary> @@ -26323,7 +22276,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25702"> +<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="20084"> <summary> Bind UDP sockets to the embrace_dp_c port. </summary> @@ -26334,7 +22287,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25721"> +<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="20103"> <summary> Make a TCP connection to the embrace_dp_c port. </summary> @@ -26344,7 +22297,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25741"> +<interface name="corenet_send_embrace_dp_c_client_packets" lineno="20123"> <summary> Send embrace_dp_c_client packets. </summary> @@ -26355,7 +22308,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25760"> +<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="20142"> <summary> Do not audit attempts to send embrace_dp_c_client packets. </summary> @@ -26366,7 +22319,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25779"> +<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="20161"> <summary> Receive embrace_dp_c_client packets. </summary> @@ -26377,7 +22330,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25798"> +<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="20180"> <summary> Do not audit attempts to receive embrace_dp_c_client packets. </summary> @@ -26388,7 +22341,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25817"> +<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="20199"> <summary> Send and receive embrace_dp_c_client packets. </summary> @@ -26399,7 +22352,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25833"> +<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="20215"> <summary> Do not audit attempts to send and receive embrace_dp_c_client packets. </summary> @@ -26410,7 +22363,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25848"> +<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="20230"> <summary> Relabel packets to embrace_dp_c_client the packet type. </summary> @@ -26420,7 +22373,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25868"> +<interface name="corenet_send_embrace_dp_c_server_packets" lineno="20250"> <summary> Send embrace_dp_c_server packets. </summary> @@ -26431,7 +22384,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25887"> +<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="20269"> <summary> Do not audit attempts to send embrace_dp_c_server packets. </summary> @@ -26442,7 +22395,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25906"> +<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="20288"> <summary> Receive embrace_dp_c_server packets. </summary> @@ -26453,7 +22406,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25925"> +<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="20307"> <summary> Do not audit attempts to receive embrace_dp_c_server packets. </summary> @@ -26464,7 +22417,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25944"> +<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="20326"> <summary> Send and receive embrace_dp_c_server packets. </summary> @@ -26475,7 +22428,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25960"> +<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="20342"> <summary> Do not audit attempts to send and receive embrace_dp_c_server packets. </summary> @@ -26486,7 +22439,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25975"> +<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="20357"> <summary> Relabel packets to embrace_dp_c_server the packet type. </summary> @@ -26496,85 +22449,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25997"> -<summary> -Send and receive TCP traffic on the epmap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_epmap_port" lineno="26012"> -<summary> -Send UDP traffic on the epmap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26027"> -<summary> -Do not audit attempts to send UDP traffic on the epmap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_epmap_port" lineno="26042"> -<summary> -Receive UDP traffic on the epmap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26057"> -<summary> -Do not audit attempts to receive UDP traffic on the epmap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_epmap_port" lineno="26072"> -<summary> -Send and receive UDP traffic on the epmap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26088"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the epmap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_epmap_port" lineno="26103"> +<interface name="corenet_tcp_bind_epmap_port" lineno="20379"> <summary> Bind TCP sockets to the epmap port. </summary> @@ -26585,7 +22460,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_epmap_port" lineno="26123"> +<interface name="corenet_udp_bind_epmap_port" lineno="20399"> <summary> Bind UDP sockets to the epmap port. </summary> @@ -26596,7 +22471,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_epmap_port" lineno="26142"> +<interface name="corenet_tcp_connect_epmap_port" lineno="20418"> <summary> Make a TCP connection to the epmap port. </summary> @@ -26606,7 +22481,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_epmap_client_packets" lineno="26162"> +<interface name="corenet_send_epmap_client_packets" lineno="20438"> <summary> Send epmap_client packets. </summary> @@ -26617,7 +22492,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26181"> +<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="20457"> <summary> Do not audit attempts to send epmap_client packets. </summary> @@ -26628,7 +22503,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_epmap_client_packets" lineno="26200"> +<interface name="corenet_receive_epmap_client_packets" lineno="20476"> <summary> Receive epmap_client packets. </summary> @@ -26639,7 +22514,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26219"> +<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="20495"> <summary> Do not audit attempts to receive epmap_client packets. </summary> @@ -26650,7 +22525,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_epmap_client_packets" lineno="26238"> +<interface name="corenet_sendrecv_epmap_client_packets" lineno="20514"> <summary> Send and receive epmap_client packets. </summary> @@ -26661,7 +22536,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26254"> +<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="20530"> <summary> Do not audit attempts to send and receive epmap_client packets. </summary> @@ -26672,7 +22547,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_epmap_client_packets" lineno="26269"> +<interface name="corenet_relabelto_epmap_client_packets" lineno="20545"> <summary> Relabel packets to epmap_client the packet type. </summary> @@ -26682,7 +22557,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_epmap_server_packets" lineno="26289"> +<interface name="corenet_send_epmap_server_packets" lineno="20565"> <summary> Send epmap_server packets. </summary> @@ -26693,7 +22568,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26308"> +<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="20584"> <summary> Do not audit attempts to send epmap_server packets. </summary> @@ -26704,7 +22579,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_epmap_server_packets" lineno="26327"> +<interface name="corenet_receive_epmap_server_packets" lineno="20603"> <summary> Receive epmap_server packets. </summary> @@ -26715,7 +22590,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="26346"> +<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="20622"> <summary> Do not audit attempts to receive epmap_server packets. </summary> @@ -26726,7 +22601,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_epmap_server_packets" lineno="26365"> +<interface name="corenet_sendrecv_epmap_server_packets" lineno="20641"> <summary> Send and receive epmap_server packets. </summary> @@ -26737,7 +22612,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="26381"> +<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="20657"> <summary> Do not audit attempts to send and receive epmap_server packets. </summary> @@ -26748,7 +22623,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_epmap_server_packets" lineno="26396"> +<interface name="corenet_relabelto_epmap_server_packets" lineno="20672"> <summary> Relabel packets to epmap_server the packet type. </summary> @@ -26758,85 +22633,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_epmd_port" lineno="26418"> -<summary> -Send and receive TCP traffic on the epmd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_epmd_port" lineno="26433"> -<summary> -Send UDP traffic on the epmd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="26448"> -<summary> -Do not audit attempts to send UDP traffic on the epmd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_epmd_port" lineno="26463"> -<summary> -Receive UDP traffic on the epmd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="26478"> -<summary> -Do not audit attempts to receive UDP traffic on the epmd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_epmd_port" lineno="26493"> -<summary> -Send and receive UDP traffic on the epmd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="26509"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the epmd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_epmd_port" lineno="26524"> +<interface name="corenet_tcp_bind_epmd_port" lineno="20694"> <summary> Bind TCP sockets to the epmd port. </summary> @@ -26847,7 +22644,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_epmd_port" lineno="26544"> +<interface name="corenet_udp_bind_epmd_port" lineno="20714"> <summary> Bind UDP sockets to the epmd port. </summary> @@ -26858,7 +22655,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_epmd_port" lineno="26563"> +<interface name="corenet_tcp_connect_epmd_port" lineno="20733"> <summary> Make a TCP connection to the epmd port. </summary> @@ -26868,7 +22665,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_epmd_client_packets" lineno="26583"> +<interface name="corenet_send_epmd_client_packets" lineno="20753"> <summary> Send epmd_client packets. </summary> @@ -26879,7 +22676,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26602"> +<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="20772"> <summary> Do not audit attempts to send epmd_client packets. </summary> @@ -26890,7 +22687,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_epmd_client_packets" lineno="26621"> +<interface name="corenet_receive_epmd_client_packets" lineno="20791"> <summary> Receive epmd_client packets. </summary> @@ -26901,7 +22698,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26640"> +<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="20810"> <summary> Do not audit attempts to receive epmd_client packets. </summary> @@ -26912,7 +22709,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_epmd_client_packets" lineno="26659"> +<interface name="corenet_sendrecv_epmd_client_packets" lineno="20829"> <summary> Send and receive epmd_client packets. </summary> @@ -26923,7 +22720,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26675"> +<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="20845"> <summary> Do not audit attempts to send and receive epmd_client packets. </summary> @@ -26934,7 +22731,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_epmd_client_packets" lineno="26690"> +<interface name="corenet_relabelto_epmd_client_packets" lineno="20860"> <summary> Relabel packets to epmd_client the packet type. </summary> @@ -26944,7 +22741,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_epmd_server_packets" lineno="26710"> +<interface name="corenet_send_epmd_server_packets" lineno="20880"> <summary> Send epmd_server packets. </summary> @@ -26955,7 +22752,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26729"> +<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="20899"> <summary> Do not audit attempts to send epmd_server packets. </summary> @@ -26966,7 +22763,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_epmd_server_packets" lineno="26748"> +<interface name="corenet_receive_epmd_server_packets" lineno="20918"> <summary> Receive epmd_server packets. </summary> @@ -26977,7 +22774,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26767"> +<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="20937"> <summary> Do not audit attempts to receive epmd_server packets. </summary> @@ -26988,7 +22785,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_epmd_server_packets" lineno="26786"> +<interface name="corenet_sendrecv_epmd_server_packets" lineno="20956"> <summary> Send and receive epmd_server packets. </summary> @@ -26999,7 +22796,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26802"> +<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="20972"> <summary> Do not audit attempts to send and receive epmd_server packets. </summary> @@ -27010,7 +22807,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_epmd_server_packets" lineno="26817"> +<interface name="corenet_relabelto_epmd_server_packets" lineno="20987"> <summary> Relabel packets to epmd_server the packet type. </summary> @@ -27020,85 +22817,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26839"> -<summary> -Send and receive TCP traffic on the fingerd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_fingerd_port" lineno="26854"> -<summary> -Send UDP traffic on the fingerd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26869"> -<summary> -Do not audit attempts to send UDP traffic on the fingerd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_fingerd_port" lineno="26884"> -<summary> -Receive UDP traffic on the fingerd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26899"> -<summary> -Do not audit attempts to receive UDP traffic on the fingerd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26914"> -<summary> -Send and receive UDP traffic on the fingerd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26930"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the fingerd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_fingerd_port" lineno="26945"> +<interface name="corenet_tcp_bind_fingerd_port" lineno="21009"> <summary> Bind TCP sockets to the fingerd port. </summary> @@ -27109,7 +22828,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_fingerd_port" lineno="26965"> +<interface name="corenet_udp_bind_fingerd_port" lineno="21029"> <summary> Bind UDP sockets to the fingerd port. </summary> @@ -27120,7 +22839,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_fingerd_port" lineno="26984"> +<interface name="corenet_tcp_connect_fingerd_port" lineno="21048"> <summary> Make a TCP connection to the fingerd port. </summary> @@ -27130,7 +22849,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_fingerd_client_packets" lineno="27004"> +<interface name="corenet_send_fingerd_client_packets" lineno="21068"> <summary> Send fingerd_client packets. </summary> @@ -27141,7 +22860,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27023"> +<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="21087"> <summary> Do not audit attempts to send fingerd_client packets. </summary> @@ -27152,7 +22871,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_fingerd_client_packets" lineno="27042"> +<interface name="corenet_receive_fingerd_client_packets" lineno="21106"> <summary> Receive fingerd_client packets. </summary> @@ -27163,7 +22882,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27061"> +<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="21125"> <summary> Do not audit attempts to receive fingerd_client packets. </summary> @@ -27174,7 +22893,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27080"> +<interface name="corenet_sendrecv_fingerd_client_packets" lineno="21144"> <summary> Send and receive fingerd_client packets. </summary> @@ -27185,7 +22904,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27096"> +<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="21160"> <summary> Do not audit attempts to send and receive fingerd_client packets. </summary> @@ -27196,7 +22915,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_fingerd_client_packets" lineno="27111"> +<interface name="corenet_relabelto_fingerd_client_packets" lineno="21175"> <summary> Relabel packets to fingerd_client the packet type. </summary> @@ -27206,7 +22925,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_fingerd_server_packets" lineno="27131"> +<interface name="corenet_send_fingerd_server_packets" lineno="21195"> <summary> Send fingerd_server packets. </summary> @@ -27217,7 +22936,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27150"> +<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="21214"> <summary> Do not audit attempts to send fingerd_server packets. </summary> @@ -27228,7 +22947,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_fingerd_server_packets" lineno="27169"> +<interface name="corenet_receive_fingerd_server_packets" lineno="21233"> <summary> Receive fingerd_server packets. </summary> @@ -27239,7 +22958,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27188"> +<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="21252"> <summary> Do not audit attempts to receive fingerd_server packets. </summary> @@ -27250,7 +22969,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27207"> +<interface name="corenet_sendrecv_fingerd_server_packets" lineno="21271"> <summary> Send and receive fingerd_server packets. </summary> @@ -27261,7 +22980,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27223"> +<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="21287"> <summary> Do not audit attempts to send and receive fingerd_server packets. </summary> @@ -27272,7 +22991,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_fingerd_server_packets" lineno="27238"> +<interface name="corenet_relabelto_fingerd_server_packets" lineno="21302"> <summary> Relabel packets to fingerd_server the packet type. </summary> @@ -27282,85 +23001,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27260"> -<summary> -Send and receive TCP traffic on the ftp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ftp_port" lineno="27275"> -<summary> -Send UDP traffic on the ftp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="27290"> -<summary> -Do not audit attempts to send UDP traffic on the ftp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ftp_port" lineno="27305"> -<summary> -Receive UDP traffic on the ftp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="27320"> -<summary> -Do not audit attempts to receive UDP traffic on the ftp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ftp_port" lineno="27335"> -<summary> -Send and receive UDP traffic on the ftp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="27351"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ftp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ftp_port" lineno="27366"> +<interface name="corenet_tcp_bind_ftp_port" lineno="21324"> <summary> Bind TCP sockets to the ftp port. </summary> @@ -27371,7 +23012,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ftp_port" lineno="27386"> +<interface name="corenet_udp_bind_ftp_port" lineno="21344"> <summary> Bind UDP sockets to the ftp port. </summary> @@ -27382,7 +23023,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ftp_port" lineno="27405"> +<interface name="corenet_tcp_connect_ftp_port" lineno="21363"> <summary> Make a TCP connection to the ftp port. </summary> @@ -27392,7 +23033,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ftp_client_packets" lineno="27425"> +<interface name="corenet_send_ftp_client_packets" lineno="21383"> <summary> Send ftp_client packets. </summary> @@ -27403,7 +23044,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="27444"> +<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="21402"> <summary> Do not audit attempts to send ftp_client packets. </summary> @@ -27414,7 +23055,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ftp_client_packets" lineno="27463"> +<interface name="corenet_receive_ftp_client_packets" lineno="21421"> <summary> Receive ftp_client packets. </summary> @@ -27425,7 +23066,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="27482"> +<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="21440"> <summary> Do not audit attempts to receive ftp_client packets. </summary> @@ -27436,7 +23077,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ftp_client_packets" lineno="27501"> +<interface name="corenet_sendrecv_ftp_client_packets" lineno="21459"> <summary> Send and receive ftp_client packets. </summary> @@ -27447,7 +23088,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="27517"> +<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="21475"> <summary> Do not audit attempts to send and receive ftp_client packets. </summary> @@ -27458,7 +23099,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ftp_client_packets" lineno="27532"> +<interface name="corenet_relabelto_ftp_client_packets" lineno="21490"> <summary> Relabel packets to ftp_client the packet type. </summary> @@ -27468,7 +23109,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ftp_server_packets" lineno="27552"> +<interface name="corenet_send_ftp_server_packets" lineno="21510"> <summary> Send ftp_server packets. </summary> @@ -27479,7 +23120,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27571"> +<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="21529"> <summary> Do not audit attempts to send ftp_server packets. </summary> @@ -27490,7 +23131,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ftp_server_packets" lineno="27590"> +<interface name="corenet_receive_ftp_server_packets" lineno="21548"> <summary> Receive ftp_server packets. </summary> @@ -27501,7 +23142,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27609"> +<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="21567"> <summary> Do not audit attempts to receive ftp_server packets. </summary> @@ -27512,7 +23153,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ftp_server_packets" lineno="27628"> +<interface name="corenet_sendrecv_ftp_server_packets" lineno="21586"> <summary> Send and receive ftp_server packets. </summary> @@ -27523,7 +23164,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27644"> +<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="21602"> <summary> Do not audit attempts to send and receive ftp_server packets. </summary> @@ -27534,7 +23175,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ftp_server_packets" lineno="27659"> +<interface name="corenet_relabelto_ftp_server_packets" lineno="21617"> <summary> Relabel packets to ftp_server the packet type. </summary> @@ -27544,85 +23185,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27681"> -<summary> -Send and receive TCP traffic on the ftp_data port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ftp_data_port" lineno="27696"> -<summary> -Send UDP traffic on the ftp_data port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27711"> -<summary> -Do not audit attempts to send UDP traffic on the ftp_data port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ftp_data_port" lineno="27726"> -<summary> -Receive UDP traffic on the ftp_data port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27741"> -<summary> -Do not audit attempts to receive UDP traffic on the ftp_data port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27756"> -<summary> -Send and receive UDP traffic on the ftp_data port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27772"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ftp_data port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ftp_data_port" lineno="27787"> +<interface name="corenet_tcp_bind_ftp_data_port" lineno="21639"> <summary> Bind TCP sockets to the ftp_data port. </summary> @@ -27633,7 +23196,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ftp_data_port" lineno="27807"> +<interface name="corenet_udp_bind_ftp_data_port" lineno="21659"> <summary> Bind UDP sockets to the ftp_data port. </summary> @@ -27644,7 +23207,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ftp_data_port" lineno="27826"> +<interface name="corenet_tcp_connect_ftp_data_port" lineno="21678"> <summary> Make a TCP connection to the ftp_data port. </summary> @@ -27654,7 +23217,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ftp_data_client_packets" lineno="27846"> +<interface name="corenet_send_ftp_data_client_packets" lineno="21698"> <summary> Send ftp_data_client packets. </summary> @@ -27665,7 +23228,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27865"> +<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="21717"> <summary> Do not audit attempts to send ftp_data_client packets. </summary> @@ -27676,7 +23239,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ftp_data_client_packets" lineno="27884"> +<interface name="corenet_receive_ftp_data_client_packets" lineno="21736"> <summary> Receive ftp_data_client packets. </summary> @@ -27687,7 +23250,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27903"> +<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="21755"> <summary> Do not audit attempts to receive ftp_data_client packets. </summary> @@ -27698,7 +23261,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27922"> +<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="21774"> <summary> Send and receive ftp_data_client packets. </summary> @@ -27709,7 +23272,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27938"> +<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="21790"> <summary> Do not audit attempts to send and receive ftp_data_client packets. </summary> @@ -27720,7 +23283,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27953"> +<interface name="corenet_relabelto_ftp_data_client_packets" lineno="21805"> <summary> Relabel packets to ftp_data_client the packet type. </summary> @@ -27730,7 +23293,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ftp_data_server_packets" lineno="27973"> +<interface name="corenet_send_ftp_data_server_packets" lineno="21825"> <summary> Send ftp_data_server packets. </summary> @@ -27741,7 +23304,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27992"> +<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="21844"> <summary> Do not audit attempts to send ftp_data_server packets. </summary> @@ -27752,7 +23315,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ftp_data_server_packets" lineno="28011"> +<interface name="corenet_receive_ftp_data_server_packets" lineno="21863"> <summary> Receive ftp_data_server packets. </summary> @@ -27763,7 +23326,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28030"> +<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="21882"> <summary> Do not audit attempts to receive ftp_data_server packets. </summary> @@ -27774,7 +23337,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28049"> +<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="21901"> <summary> Send and receive ftp_data_server packets. </summary> @@ -27785,7 +23348,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28065"> +<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="21917"> <summary> Do not audit attempts to send and receive ftp_data_server packets. </summary> @@ -27796,7 +23359,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28080"> +<interface name="corenet_relabelto_ftp_data_server_packets" lineno="21932"> <summary> Relabel packets to ftp_data_server the packet type. </summary> @@ -27806,85 +23369,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28102"> -<summary> -Send and receive TCP traffic on the gatekeeper port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_gatekeeper_port" lineno="28117"> -<summary> -Send UDP traffic on the gatekeeper port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28132"> -<summary> -Do not audit attempts to send UDP traffic on the gatekeeper port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_gatekeeper_port" lineno="28147"> -<summary> -Receive UDP traffic on the gatekeeper port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28162"> -<summary> -Do not audit attempts to receive UDP traffic on the gatekeeper port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28177"> -<summary> -Send and receive UDP traffic on the gatekeeper port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28193"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the gatekeeper port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28208"> +<interface name="corenet_tcp_bind_gatekeeper_port" lineno="21954"> <summary> Bind TCP sockets to the gatekeeper port. </summary> @@ -27895,7 +23380,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_gatekeeper_port" lineno="28228"> +<interface name="corenet_udp_bind_gatekeeper_port" lineno="21974"> <summary> Bind UDP sockets to the gatekeeper port. </summary> @@ -27906,7 +23391,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_gatekeeper_port" lineno="28247"> +<interface name="corenet_tcp_connect_gatekeeper_port" lineno="21993"> <summary> Make a TCP connection to the gatekeeper port. </summary> @@ -27916,7 +23401,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gatekeeper_client_packets" lineno="28267"> +<interface name="corenet_send_gatekeeper_client_packets" lineno="22013"> <summary> Send gatekeeper_client packets. </summary> @@ -27927,7 +23412,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="28286"> +<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="22032"> <summary> Do not audit attempts to send gatekeeper_client packets. </summary> @@ -27938,7 +23423,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gatekeeper_client_packets" lineno="28305"> +<interface name="corenet_receive_gatekeeper_client_packets" lineno="22051"> <summary> Receive gatekeeper_client packets. </summary> @@ -27949,7 +23434,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="28324"> +<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="22070"> <summary> Do not audit attempts to receive gatekeeper_client packets. </summary> @@ -27960,7 +23445,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="28343"> +<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="22089"> <summary> Send and receive gatekeeper_client packets. </summary> @@ -27971,7 +23456,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="28359"> +<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="22105"> <summary> Do not audit attempts to send and receive gatekeeper_client packets. </summary> @@ -27982,7 +23467,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="28374"> +<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="22120"> <summary> Relabel packets to gatekeeper_client the packet type. </summary> @@ -27992,7 +23477,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gatekeeper_server_packets" lineno="28394"> +<interface name="corenet_send_gatekeeper_server_packets" lineno="22140"> <summary> Send gatekeeper_server packets. </summary> @@ -28003,7 +23488,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="28413"> +<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="22159"> <summary> Do not audit attempts to send gatekeeper_server packets. </summary> @@ -28014,7 +23499,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gatekeeper_server_packets" lineno="28432"> +<interface name="corenet_receive_gatekeeper_server_packets" lineno="22178"> <summary> Receive gatekeeper_server packets. </summary> @@ -28025,7 +23510,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="28451"> +<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="22197"> <summary> Do not audit attempts to receive gatekeeper_server packets. </summary> @@ -28036,7 +23521,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="28470"> +<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="22216"> <summary> Send and receive gatekeeper_server packets. </summary> @@ -28047,7 +23532,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="28486"> +<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="22232"> <summary> Do not audit attempts to send and receive gatekeeper_server packets. </summary> @@ -28058,7 +23543,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="28501"> +<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="22247"> <summary> Relabel packets to gatekeeper_server the packet type. </summary> @@ -28068,85 +23553,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="28523"> -<summary> -Send and receive TCP traffic on the gdomap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_gdomap_port" lineno="28538"> -<summary> -Send UDP traffic on the gdomap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="28553"> -<summary> -Do not audit attempts to send UDP traffic on the gdomap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_gdomap_port" lineno="28568"> -<summary> -Receive UDP traffic on the gdomap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28583"> -<summary> -Do not audit attempts to receive UDP traffic on the gdomap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28598"> -<summary> -Send and receive UDP traffic on the gdomap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28614"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the gdomap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_gdomap_port" lineno="28629"> +<interface name="corenet_tcp_bind_gdomap_port" lineno="22269"> <summary> Bind TCP sockets to the gdomap port. </summary> @@ -28157,7 +23564,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_gdomap_port" lineno="28649"> +<interface name="corenet_udp_bind_gdomap_port" lineno="22289"> <summary> Bind UDP sockets to the gdomap port. </summary> @@ -28168,7 +23575,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_gdomap_port" lineno="28668"> +<interface name="corenet_tcp_connect_gdomap_port" lineno="22308"> <summary> Make a TCP connection to the gdomap port. </summary> @@ -28178,7 +23585,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gdomap_client_packets" lineno="28688"> +<interface name="corenet_send_gdomap_client_packets" lineno="22328"> <summary> Send gdomap_client packets. </summary> @@ -28189,7 +23596,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28707"> +<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="22347"> <summary> Do not audit attempts to send gdomap_client packets. </summary> @@ -28200,7 +23607,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gdomap_client_packets" lineno="28726"> +<interface name="corenet_receive_gdomap_client_packets" lineno="22366"> <summary> Receive gdomap_client packets. </summary> @@ -28211,7 +23618,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28745"> +<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="22385"> <summary> Do not audit attempts to receive gdomap_client packets. </summary> @@ -28222,7 +23629,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28764"> +<interface name="corenet_sendrecv_gdomap_client_packets" lineno="22404"> <summary> Send and receive gdomap_client packets. </summary> @@ -28233,7 +23640,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28780"> +<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="22420"> <summary> Do not audit attempts to send and receive gdomap_client packets. </summary> @@ -28244,7 +23651,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gdomap_client_packets" lineno="28795"> +<interface name="corenet_relabelto_gdomap_client_packets" lineno="22435"> <summary> Relabel packets to gdomap_client the packet type. </summary> @@ -28254,7 +23661,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gdomap_server_packets" lineno="28815"> +<interface name="corenet_send_gdomap_server_packets" lineno="22455"> <summary> Send gdomap_server packets. </summary> @@ -28265,7 +23672,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28834"> +<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="22474"> <summary> Do not audit attempts to send gdomap_server packets. </summary> @@ -28276,7 +23683,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gdomap_server_packets" lineno="28853"> +<interface name="corenet_receive_gdomap_server_packets" lineno="22493"> <summary> Receive gdomap_server packets. </summary> @@ -28287,7 +23694,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28872"> +<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="22512"> <summary> Do not audit attempts to receive gdomap_server packets. </summary> @@ -28298,7 +23705,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28891"> +<interface name="corenet_sendrecv_gdomap_server_packets" lineno="22531"> <summary> Send and receive gdomap_server packets. </summary> @@ -28309,7 +23716,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28907"> +<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="22547"> <summary> Do not audit attempts to send and receive gdomap_server packets. </summary> @@ -28320,7 +23727,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gdomap_server_packets" lineno="28922"> +<interface name="corenet_relabelto_gdomap_server_packets" lineno="22562"> <summary> Relabel packets to gdomap_server the packet type. </summary> @@ -28330,85 +23737,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28944"> -<summary> -Send and receive TCP traffic on the gds_db port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_gds_db_port" lineno="28959"> -<summary> -Send UDP traffic on the gds_db port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28974"> -<summary> -Do not audit attempts to send UDP traffic on the gds_db port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_gds_db_port" lineno="28989"> -<summary> -Receive UDP traffic on the gds_db port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="29004"> -<summary> -Do not audit attempts to receive UDP traffic on the gds_db port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29019"> -<summary> -Send and receive UDP traffic on the gds_db port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29035"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the gds_db port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_gds_db_port" lineno="29050"> +<interface name="corenet_tcp_bind_gds_db_port" lineno="22584"> <summary> Bind TCP sockets to the gds_db port. </summary> @@ -28419,7 +23748,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_gds_db_port" lineno="29070"> +<interface name="corenet_udp_bind_gds_db_port" lineno="22604"> <summary> Bind UDP sockets to the gds_db port. </summary> @@ -28430,7 +23759,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_gds_db_port" lineno="29089"> +<interface name="corenet_tcp_connect_gds_db_port" lineno="22623"> <summary> Make a TCP connection to the gds_db port. </summary> @@ -28440,7 +23769,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gds_db_client_packets" lineno="29109"> +<interface name="corenet_send_gds_db_client_packets" lineno="22643"> <summary> Send gds_db_client packets. </summary> @@ -28451,7 +23780,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29128"> +<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="22662"> <summary> Do not audit attempts to send gds_db_client packets. </summary> @@ -28462,7 +23791,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gds_db_client_packets" lineno="29147"> +<interface name="corenet_receive_gds_db_client_packets" lineno="22681"> <summary> Receive gds_db_client packets. </summary> @@ -28473,7 +23802,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29166"> +<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="22700"> <summary> Do not audit attempts to receive gds_db_client packets. </summary> @@ -28484,7 +23813,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29185"> +<interface name="corenet_sendrecv_gds_db_client_packets" lineno="22719"> <summary> Send and receive gds_db_client packets. </summary> @@ -28495,7 +23824,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="29201"> +<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="22735"> <summary> Do not audit attempts to send and receive gds_db_client packets. </summary> @@ -28506,7 +23835,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gds_db_client_packets" lineno="29216"> +<interface name="corenet_relabelto_gds_db_client_packets" lineno="22750"> <summary> Relabel packets to gds_db_client the packet type. </summary> @@ -28516,7 +23845,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gds_db_server_packets" lineno="29236"> +<interface name="corenet_send_gds_db_server_packets" lineno="22770"> <summary> Send gds_db_server packets. </summary> @@ -28527,7 +23856,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="29255"> +<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="22789"> <summary> Do not audit attempts to send gds_db_server packets. </summary> @@ -28538,7 +23867,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gds_db_server_packets" lineno="29274"> +<interface name="corenet_receive_gds_db_server_packets" lineno="22808"> <summary> Receive gds_db_server packets. </summary> @@ -28549,7 +23878,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="29293"> +<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="22827"> <summary> Do not audit attempts to receive gds_db_server packets. </summary> @@ -28560,7 +23889,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gds_db_server_packets" lineno="29312"> +<interface name="corenet_sendrecv_gds_db_server_packets" lineno="22846"> <summary> Send and receive gds_db_server packets. </summary> @@ -28571,7 +23900,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="29328"> +<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="22862"> <summary> Do not audit attempts to send and receive gds_db_server packets. </summary> @@ -28582,7 +23911,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gds_db_server_packets" lineno="29343"> +<interface name="corenet_relabelto_gds_db_server_packets" lineno="22877"> <summary> Relabel packets to gds_db_server the packet type. </summary> @@ -28592,85 +23921,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_git_port" lineno="29365"> -<summary> -Send and receive TCP traffic on the git port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_git_port" lineno="29380"> -<summary> -Send UDP traffic on the git port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_git_port" lineno="29395"> -<summary> -Do not audit attempts to send UDP traffic on the git port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_git_port" lineno="29410"> -<summary> -Receive UDP traffic on the git port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29425"> -<summary> -Do not audit attempts to receive UDP traffic on the git port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_git_port" lineno="29440"> -<summary> -Send and receive UDP traffic on the git port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29456"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the git port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_git_port" lineno="29471"> +<interface name="corenet_tcp_bind_git_port" lineno="22899"> <summary> Bind TCP sockets to the git port. </summary> @@ -28681,7 +23932,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_git_port" lineno="29491"> +<interface name="corenet_udp_bind_git_port" lineno="22919"> <summary> Bind UDP sockets to the git port. </summary> @@ -28692,7 +23943,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_git_port" lineno="29510"> +<interface name="corenet_tcp_connect_git_port" lineno="22938"> <summary> Make a TCP connection to the git port. </summary> @@ -28702,7 +23953,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_git_client_packets" lineno="29530"> +<interface name="corenet_send_git_client_packets" lineno="22958"> <summary> Send git_client packets. </summary> @@ -28713,7 +23964,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_git_client_packets" lineno="29549"> +<interface name="corenet_dontaudit_send_git_client_packets" lineno="22977"> <summary> Do not audit attempts to send git_client packets. </summary> @@ -28724,7 +23975,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_git_client_packets" lineno="29568"> +<interface name="corenet_receive_git_client_packets" lineno="22996"> <summary> Receive git_client packets. </summary> @@ -28735,7 +23986,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29587"> +<interface name="corenet_dontaudit_receive_git_client_packets" lineno="23015"> <summary> Do not audit attempts to receive git_client packets. </summary> @@ -28746,7 +23997,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_git_client_packets" lineno="29606"> +<interface name="corenet_sendrecv_git_client_packets" lineno="23034"> <summary> Send and receive git_client packets. </summary> @@ -28757,7 +24008,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29622"> +<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="23050"> <summary> Do not audit attempts to send and receive git_client packets. </summary> @@ -28768,7 +24019,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_git_client_packets" lineno="29637"> +<interface name="corenet_relabelto_git_client_packets" lineno="23065"> <summary> Relabel packets to git_client the packet type. </summary> @@ -28778,7 +24029,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_git_server_packets" lineno="29657"> +<interface name="corenet_send_git_server_packets" lineno="23085"> <summary> Send git_server packets. </summary> @@ -28789,7 +24040,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_git_server_packets" lineno="29676"> +<interface name="corenet_dontaudit_send_git_server_packets" lineno="23104"> <summary> Do not audit attempts to send git_server packets. </summary> @@ -28800,7 +24051,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_git_server_packets" lineno="29695"> +<interface name="corenet_receive_git_server_packets" lineno="23123"> <summary> Receive git_server packets. </summary> @@ -28811,7 +24062,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29714"> +<interface name="corenet_dontaudit_receive_git_server_packets" lineno="23142"> <summary> Do not audit attempts to receive git_server packets. </summary> @@ -28822,7 +24073,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_git_server_packets" lineno="29733"> +<interface name="corenet_sendrecv_git_server_packets" lineno="23161"> <summary> Send and receive git_server packets. </summary> @@ -28833,7 +24084,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29749"> +<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="23177"> <summary> Do not audit attempts to send and receive git_server packets. </summary> @@ -28844,7 +24095,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_git_server_packets" lineno="29764"> +<interface name="corenet_relabelto_git_server_packets" lineno="23192"> <summary> Relabel packets to git_server the packet type. </summary> @@ -28854,85 +24105,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29786"> -<summary> -Send and receive TCP traffic on the glance_registry port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_glance_registry_port" lineno="29801"> -<summary> -Send UDP traffic on the glance_registry port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29816"> -<summary> -Do not audit attempts to send UDP traffic on the glance_registry port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_glance_registry_port" lineno="29831"> -<summary> -Receive UDP traffic on the glance_registry port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29846"> -<summary> -Do not audit attempts to receive UDP traffic on the glance_registry port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29861"> -<summary> -Send and receive UDP traffic on the glance_registry port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29877"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the glance_registry port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_glance_registry_port" lineno="29892"> +<interface name="corenet_tcp_bind_glance_registry_port" lineno="23214"> <summary> Bind TCP sockets to the glance_registry port. </summary> @@ -28943,7 +24116,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_glance_registry_port" lineno="29912"> +<interface name="corenet_udp_bind_glance_registry_port" lineno="23234"> <summary> Bind UDP sockets to the glance_registry port. </summary> @@ -28954,7 +24127,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_glance_registry_port" lineno="29931"> +<interface name="corenet_tcp_connect_glance_registry_port" lineno="23253"> <summary> Make a TCP connection to the glance_registry port. </summary> @@ -28964,7 +24137,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_glance_registry_client_packets" lineno="29951"> +<interface name="corenet_send_glance_registry_client_packets" lineno="23273"> <summary> Send glance_registry_client packets. </summary> @@ -28975,7 +24148,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29970"> +<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="23292"> <summary> Do not audit attempts to send glance_registry_client packets. </summary> @@ -28986,7 +24159,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_glance_registry_client_packets" lineno="29989"> +<interface name="corenet_receive_glance_registry_client_packets" lineno="23311"> <summary> Receive glance_registry_client packets. </summary> @@ -28997,7 +24170,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="30008"> +<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="23330"> <summary> Do not audit attempts to receive glance_registry_client packets. </summary> @@ -29008,7 +24181,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="30027"> +<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="23349"> <summary> Send and receive glance_registry_client packets. </summary> @@ -29019,7 +24192,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="30043"> +<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="23365"> <summary> Do not audit attempts to send and receive glance_registry_client packets. </summary> @@ -29030,7 +24203,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_glance_registry_client_packets" lineno="30058"> +<interface name="corenet_relabelto_glance_registry_client_packets" lineno="23380"> <summary> Relabel packets to glance_registry_client the packet type. </summary> @@ -29040,7 +24213,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_glance_registry_server_packets" lineno="30078"> +<interface name="corenet_send_glance_registry_server_packets" lineno="23400"> <summary> Send glance_registry_server packets. </summary> @@ -29051,7 +24224,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="30097"> +<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="23419"> <summary> Do not audit attempts to send glance_registry_server packets. </summary> @@ -29062,7 +24235,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_glance_registry_server_packets" lineno="30116"> +<interface name="corenet_receive_glance_registry_server_packets" lineno="23438"> <summary> Receive glance_registry_server packets. </summary> @@ -29073,7 +24246,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="30135"> +<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="23457"> <summary> Do not audit attempts to receive glance_registry_server packets. </summary> @@ -29084,7 +24257,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30154"> +<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="23476"> <summary> Send and receive glance_registry_server packets. </summary> @@ -29095,7 +24268,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30170"> +<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="23492"> <summary> Do not audit attempts to send and receive glance_registry_server packets. </summary> @@ -29106,7 +24279,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30185"> +<interface name="corenet_relabelto_glance_registry_server_packets" lineno="23507"> <summary> Relabel packets to glance_registry_server the packet type. </summary> @@ -29116,53 +24289,52 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30207"> +<interface name="corenet_tcp_bind_glusterd_port" lineno="23529"> <summary> -Send and receive TCP traffic on the gopher port. +Bind TCP sockets to the glusterd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="both" weight="10"/> +<infoflow type="none"/> </interface> -<interface name="corenet_udp_send_gopher_port" lineno="30222"> +<interface name="corenet_udp_bind_glusterd_port" lineno="23549"> <summary> -Send UDP traffic on the gopher port. +Bind UDP sockets to the glusterd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="write" weight="10"/> +<infoflow type="none"/> </interface> -<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30237"> +<interface name="corenet_tcp_connect_glusterd_port" lineno="23568"> <summary> -Do not audit attempts to send UDP traffic on the gopher port. +Make a TCP connection to the glusterd port. </summary> <param name="domain"> <summary> -Domain to not audit. +Domain allowed access. </summary> </param> -<infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_gopher_port" lineno="30252"> +<interface name="corenet_send_glusterd_client_packets" lineno="23588"> <summary> -Receive UDP traffic on the gopher port. +Send glusterd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="read" weight="10"/> +<infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30267"> +<interface name="corenet_dontaudit_send_glusterd_client_packets" lineno="23607"> <summary> -Do not audit attempts to receive UDP traffic on the gopher port. +Do not audit attempts to send glusterd_client packets. </summary> <param name="domain"> <summary> @@ -29171,54 +24343,53 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_gopher_port" lineno="30282"> +<interface name="corenet_receive_glusterd_client_packets" lineno="23626"> <summary> -Send and receive UDP traffic on the gopher port. +Receive glusterd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="both" weight="10"/> +<infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30298"> +<interface name="corenet_dontaudit_receive_glusterd_client_packets" lineno="23645"> <summary> -Do not audit attempts to send and receive -UDP traffic on the gopher port. +Do not audit attempts to receive glusterd_client packets. </summary> <param name="domain"> <summary> -Domain to not audit. +Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_gopher_port" lineno="30313"> +<interface name="corenet_sendrecv_glusterd_client_packets" lineno="23664"> <summary> -Bind TCP sockets to the gopher port. +Send and receive glusterd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="none"/> +<infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_bind_gopher_port" lineno="30333"> +<interface name="corenet_dontaudit_sendrecv_glusterd_client_packets" lineno="23680"> <summary> -Bind UDP sockets to the gopher port. +Do not audit attempts to send and receive glusterd_client packets. </summary> <param name="domain"> <summary> -Domain allowed access. +Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_gopher_port" lineno="30352"> +<interface name="corenet_relabelto_glusterd_client_packets" lineno="23695"> <summary> -Make a TCP connection to the gopher port. +Relabel packets to glusterd_client the packet type. </summary> <param name="domain"> <summary> @@ -29226,9 +24397,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gopher_client_packets" lineno="30372"> +<interface name="corenet_send_glusterd_server_packets" lineno="23715"> <summary> -Send gopher_client packets. +Send glusterd_server packets. </summary> <param name="domain"> <summary> @@ -29237,9 +24408,9 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30391"> +<interface name="corenet_dontaudit_send_glusterd_server_packets" lineno="23734"> <summary> -Do not audit attempts to send gopher_client packets. +Do not audit attempts to send glusterd_server packets. </summary> <param name="domain"> <summary> @@ -29248,9 +24419,9 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gopher_client_packets" lineno="30410"> +<interface name="corenet_receive_glusterd_server_packets" lineno="23753"> <summary> -Receive gopher_client packets. +Receive glusterd_server packets. </summary> <param name="domain"> <summary> @@ -29259,9 +24430,9 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30429"> +<interface name="corenet_dontaudit_receive_glusterd_server_packets" lineno="23772"> <summary> -Do not audit attempts to receive gopher_client packets. +Do not audit attempts to receive glusterd_server packets. </summary> <param name="domain"> <summary> @@ -29270,9 +24441,9 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gopher_client_packets" lineno="30448"> +<interface name="corenet_sendrecv_glusterd_server_packets" lineno="23791"> <summary> -Send and receive gopher_client packets. +Send and receive glusterd_server packets. </summary> <param name="domain"> <summary> @@ -29281,9 +24452,9 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30464"> +<interface name="corenet_dontaudit_sendrecv_glusterd_server_packets" lineno="23807"> <summary> -Do not audit attempts to send and receive gopher_client packets. +Do not audit attempts to send and receive glusterd_server packets. </summary> <param name="domain"> <summary> @@ -29292,9 +24463,9 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gopher_client_packets" lineno="30479"> +<interface name="corenet_relabelto_glusterd_server_packets" lineno="23822"> <summary> -Relabel packets to gopher_client the packet type. +Relabel packets to glusterd_server the packet type. </summary> <param name="domain"> <summary> @@ -29302,96 +24473,117 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gopher_server_packets" lineno="30499"> +<interface name="corenet_tcp_bind_gopher_port" lineno="23844"> <summary> -Send gopher_server packets. +Bind TCP sockets to the gopher port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="write" weight="10"/> +<infoflow type="none"/> </interface> -<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30518"> +<interface name="corenet_udp_bind_gopher_port" lineno="23864"> <summary> -Do not audit attempts to send gopher_server packets. +Bind UDP sockets to the gopher port. </summary> <param name="domain"> <summary> -Domain to not audit. +Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gopher_server_packets" lineno="30537"> +<interface name="corenet_tcp_connect_gopher_port" lineno="23883"> <summary> -Receive gopher_server packets. +Make a TCP connection to the gopher port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30556"> +<interface name="corenet_send_gopher_client_packets" lineno="23903"> <summary> -Do not audit attempts to receive gopher_server packets. +Send gopher_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="23922"> +<summary> +Do not audit attempts to send gopher_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gopher_server_packets" lineno="30575"> +<interface name="corenet_receive_gopher_client_packets" lineno="23941"> <summary> -Send and receive gopher_server packets. +Receive gopher_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="both" weight="10"/> +<infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30591"> +<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="23960"> <summary> -Do not audit attempts to send and receive gopher_server packets. +Do not audit attempts to receive gopher_client packets. </summary> <param name="domain"> <summary> -Domain to not audit. +Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gopher_server_packets" lineno="30606"> +<interface name="corenet_sendrecv_gopher_client_packets" lineno="23979"> <summary> -Relabel packets to gopher_server the packet type. +Send and receive gopher_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="23995"> +<summary> +Do not audit attempts to send and receive gopher_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> </interface> -<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30628"> +<interface name="corenet_relabelto_gopher_client_packets" lineno="24010"> <summary> -Send and receive TCP traffic on the gpsd port. +Relabel packets to gopher_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_gpsd_port" lineno="30643"> +<interface name="corenet_send_gopher_server_packets" lineno="24030"> <summary> -Send UDP traffic on the gpsd port. +Send gopher_server packets. </summary> <param name="domain"> <summary> @@ -29400,9 +24592,9 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30658"> +<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="24049"> <summary> -Do not audit attempts to send UDP traffic on the gpsd port. +Do not audit attempts to send gopher_server packets. </summary> <param name="domain"> <summary> @@ -29411,9 +24603,9 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_gpsd_port" lineno="30673"> +<interface name="corenet_receive_gopher_server_packets" lineno="24068"> <summary> -Receive UDP traffic on the gpsd port. +Receive gopher_server packets. </summary> <param name="domain"> <summary> @@ -29422,20 +24614,20 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30688"> +<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="24087"> <summary> -Do not audit attempts to receive UDP traffic on the gpsd port. +Do not audit attempts to receive gopher_server packets. </summary> <param name="domain"> <summary> -Domain to not audit. +Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30703"> +<interface name="corenet_sendrecv_gopher_server_packets" lineno="24106"> <summary> -Send and receive UDP traffic on the gpsd port. +Send and receive gopher_server packets. </summary> <param name="domain"> <summary> @@ -29444,10 +24636,9 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30719"> +<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="24122"> <summary> -Do not audit attempts to send and receive -UDP traffic on the gpsd port. +Do not audit attempts to send and receive gopher_server packets. </summary> <param name="domain"> <summary> @@ -29456,7 +24647,17 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_gpsd_port" lineno="30734"> +<interface name="corenet_relabelto_gopher_server_packets" lineno="24137"> +<summary> +Relabel packets to gopher_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_bind_gpsd_port" lineno="24159"> <summary> Bind TCP sockets to the gpsd port. </summary> @@ -29467,7 +24668,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_gpsd_port" lineno="30754"> +<interface name="corenet_udp_bind_gpsd_port" lineno="24179"> <summary> Bind UDP sockets to the gpsd port. </summary> @@ -29478,7 +24679,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_gpsd_port" lineno="30773"> +<interface name="corenet_tcp_connect_gpsd_port" lineno="24198"> <summary> Make a TCP connection to the gpsd port. </summary> @@ -29488,7 +24689,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gpsd_client_packets" lineno="30793"> +<interface name="corenet_send_gpsd_client_packets" lineno="24218"> <summary> Send gpsd_client packets. </summary> @@ -29499,7 +24700,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30812"> +<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="24237"> <summary> Do not audit attempts to send gpsd_client packets. </summary> @@ -29510,7 +24711,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gpsd_client_packets" lineno="30831"> +<interface name="corenet_receive_gpsd_client_packets" lineno="24256"> <summary> Receive gpsd_client packets. </summary> @@ -29521,7 +24722,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30850"> +<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="24275"> <summary> Do not audit attempts to receive gpsd_client packets. </summary> @@ -29532,7 +24733,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30869"> +<interface name="corenet_sendrecv_gpsd_client_packets" lineno="24294"> <summary> Send and receive gpsd_client packets. </summary> @@ -29543,7 +24744,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30885"> +<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="24310"> <summary> Do not audit attempts to send and receive gpsd_client packets. </summary> @@ -29554,7 +24755,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gpsd_client_packets" lineno="30900"> +<interface name="corenet_relabelto_gpsd_client_packets" lineno="24325"> <summary> Relabel packets to gpsd_client the packet type. </summary> @@ -29564,7 +24765,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_gpsd_server_packets" lineno="30920"> +<interface name="corenet_send_gpsd_server_packets" lineno="24345"> <summary> Send gpsd_server packets. </summary> @@ -29575,7 +24776,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30939"> +<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="24364"> <summary> Do not audit attempts to send gpsd_server packets. </summary> @@ -29586,7 +24787,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_gpsd_server_packets" lineno="30958"> +<interface name="corenet_receive_gpsd_server_packets" lineno="24383"> <summary> Receive gpsd_server packets. </summary> @@ -29597,7 +24798,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30977"> +<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="24402"> <summary> Do not audit attempts to receive gpsd_server packets. </summary> @@ -29608,7 +24809,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30996"> +<interface name="corenet_sendrecv_gpsd_server_packets" lineno="24421"> <summary> Send and receive gpsd_server packets. </summary> @@ -29619,7 +24820,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="31012"> +<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="24437"> <summary> Do not audit attempts to send and receive gpsd_server packets. </summary> @@ -29630,7 +24831,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_gpsd_server_packets" lineno="31027"> +<interface name="corenet_relabelto_gpsd_server_packets" lineno="24452"> <summary> Relabel packets to gpsd_server the packet type. </summary> @@ -29640,85 +24841,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="31049"> -<summary> -Send and receive TCP traffic on the hadoop_datanode port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_hadoop_datanode_port" lineno="31064"> -<summary> -Send UDP traffic on the hadoop_datanode port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="31079"> -<summary> -Do not audit attempts to send UDP traffic on the hadoop_datanode port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="31094"> -<summary> -Receive UDP traffic on the hadoop_datanode port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="31109"> -<summary> -Do not audit attempts to receive UDP traffic on the hadoop_datanode port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="31124"> -<summary> -Send and receive UDP traffic on the hadoop_datanode port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="31140"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the hadoop_datanode port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31155"> +<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="24474"> <summary> Bind TCP sockets to the hadoop_datanode port. </summary> @@ -29729,7 +24852,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31175"> +<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="24494"> <summary> Bind UDP sockets to the hadoop_datanode port. </summary> @@ -29740,7 +24863,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31194"> +<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="24513"> <summary> Make a TCP connection to the hadoop_datanode port. </summary> @@ -29750,7 +24873,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31214"> +<interface name="corenet_send_hadoop_datanode_client_packets" lineno="24533"> <summary> Send hadoop_datanode_client packets. </summary> @@ -29761,7 +24884,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31233"> +<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="24552"> <summary> Do not audit attempts to send hadoop_datanode_client packets. </summary> @@ -29772,7 +24895,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31252"> +<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="24571"> <summary> Receive hadoop_datanode_client packets. </summary> @@ -29783,7 +24906,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31271"> +<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="24590"> <summary> Do not audit attempts to receive hadoop_datanode_client packets. </summary> @@ -29794,7 +24917,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31290"> +<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="24609"> <summary> Send and receive hadoop_datanode_client packets. </summary> @@ -29805,7 +24928,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31306"> +<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="24625"> <summary> Do not audit attempts to send and receive hadoop_datanode_client packets. </summary> @@ -29816,7 +24939,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31321"> +<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="24640"> <summary> Relabel packets to hadoop_datanode_client the packet type. </summary> @@ -29826,7 +24949,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31341"> +<interface name="corenet_send_hadoop_datanode_server_packets" lineno="24660"> <summary> Send hadoop_datanode_server packets. </summary> @@ -29837,7 +24960,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31360"> +<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="24679"> <summary> Do not audit attempts to send hadoop_datanode_server packets. </summary> @@ -29848,7 +24971,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31379"> +<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="24698"> <summary> Receive hadoop_datanode_server packets. </summary> @@ -29859,7 +24982,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31398"> +<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="24717"> <summary> Do not audit attempts to receive hadoop_datanode_server packets. </summary> @@ -29870,7 +24993,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31417"> +<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="24736"> <summary> Send and receive hadoop_datanode_server packets. </summary> @@ -29881,7 +25004,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31433"> +<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="24752"> <summary> Do not audit attempts to send and receive hadoop_datanode_server packets. </summary> @@ -29892,7 +25015,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31448"> +<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="24767"> <summary> Relabel packets to hadoop_datanode_server the packet type. </summary> @@ -29902,85 +25025,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31470"> -<summary> -Send and receive TCP traffic on the hadoop_namenode port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31485"> -<summary> -Send UDP traffic on the hadoop_namenode port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31500"> -<summary> -Do not audit attempts to send UDP traffic on the hadoop_namenode port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31515"> -<summary> -Receive UDP traffic on the hadoop_namenode port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31530"> -<summary> -Do not audit attempts to receive UDP traffic on the hadoop_namenode port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31545"> -<summary> -Send and receive UDP traffic on the hadoop_namenode port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31561"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the hadoop_namenode port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31576"> +<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="24789"> <summary> Bind TCP sockets to the hadoop_namenode port. </summary> @@ -29991,7 +25036,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31596"> +<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="24809"> <summary> Bind UDP sockets to the hadoop_namenode port. </summary> @@ -30002,7 +25047,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31615"> +<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="24828"> <summary> Make a TCP connection to the hadoop_namenode port. </summary> @@ -30012,7 +25057,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31635"> +<interface name="corenet_send_hadoop_namenode_client_packets" lineno="24848"> <summary> Send hadoop_namenode_client packets. </summary> @@ -30023,7 +25068,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31654"> +<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="24867"> <summary> Do not audit attempts to send hadoop_namenode_client packets. </summary> @@ -30034,7 +25079,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31673"> +<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="24886"> <summary> Receive hadoop_namenode_client packets. </summary> @@ -30045,7 +25090,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31692"> +<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="24905"> <summary> Do not audit attempts to receive hadoop_namenode_client packets. </summary> @@ -30056,7 +25101,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31711"> +<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="24924"> <summary> Send and receive hadoop_namenode_client packets. </summary> @@ -30067,7 +25112,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31727"> +<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="24940"> <summary> Do not audit attempts to send and receive hadoop_namenode_client packets. </summary> @@ -30078,7 +25123,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31742"> +<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="24955"> <summary> Relabel packets to hadoop_namenode_client the packet type. </summary> @@ -30088,7 +25133,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31762"> +<interface name="corenet_send_hadoop_namenode_server_packets" lineno="24975"> <summary> Send hadoop_namenode_server packets. </summary> @@ -30099,7 +25144,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31781"> +<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="24994"> <summary> Do not audit attempts to send hadoop_namenode_server packets. </summary> @@ -30110,7 +25155,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31800"> +<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="25013"> <summary> Receive hadoop_namenode_server packets. </summary> @@ -30121,7 +25166,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31819"> +<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="25032"> <summary> Do not audit attempts to receive hadoop_namenode_server packets. </summary> @@ -30132,7 +25177,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31838"> +<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="25051"> <summary> Send and receive hadoop_namenode_server packets. </summary> @@ -30143,7 +25188,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31854"> +<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="25067"> <summary> Do not audit attempts to send and receive hadoop_namenode_server packets. </summary> @@ -30154,7 +25199,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31869"> +<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="25082"> <summary> Relabel packets to hadoop_namenode_server the packet type. </summary> @@ -30164,85 +25209,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31891"> -<summary> -Send and receive TCP traffic on the hddtemp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_hddtemp_port" lineno="31906"> -<summary> -Send UDP traffic on the hddtemp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31921"> -<summary> -Do not audit attempts to send UDP traffic on the hddtemp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_hddtemp_port" lineno="31936"> -<summary> -Receive UDP traffic on the hddtemp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31951"> -<summary> -Do not audit attempts to receive UDP traffic on the hddtemp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31966"> -<summary> -Send and receive UDP traffic on the hddtemp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31982"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the hddtemp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_hddtemp_port" lineno="31997"> +<interface name="corenet_tcp_bind_hddtemp_port" lineno="25104"> <summary> Bind TCP sockets to the hddtemp port. </summary> @@ -30253,7 +25220,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_hddtemp_port" lineno="32017"> +<interface name="corenet_udp_bind_hddtemp_port" lineno="25124"> <summary> Bind UDP sockets to the hddtemp port. </summary> @@ -30264,7 +25231,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_hddtemp_port" lineno="32036"> +<interface name="corenet_tcp_connect_hddtemp_port" lineno="25143"> <summary> Make a TCP connection to the hddtemp port. </summary> @@ -30274,7 +25241,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hddtemp_client_packets" lineno="32056"> +<interface name="corenet_send_hddtemp_client_packets" lineno="25163"> <summary> Send hddtemp_client packets. </summary> @@ -30285,7 +25252,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="32075"> +<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="25182"> <summary> Do not audit attempts to send hddtemp_client packets. </summary> @@ -30296,7 +25263,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hddtemp_client_packets" lineno="32094"> +<interface name="corenet_receive_hddtemp_client_packets" lineno="25201"> <summary> Receive hddtemp_client packets. </summary> @@ -30307,7 +25274,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="32113"> +<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="25220"> <summary> Do not audit attempts to receive hddtemp_client packets. </summary> @@ -30318,7 +25285,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="32132"> +<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="25239"> <summary> Send and receive hddtemp_client packets. </summary> @@ -30329,7 +25296,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32148"> +<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="25255"> <summary> Do not audit attempts to send and receive hddtemp_client packets. </summary> @@ -30340,7 +25307,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32163"> +<interface name="corenet_relabelto_hddtemp_client_packets" lineno="25270"> <summary> Relabel packets to hddtemp_client the packet type. </summary> @@ -30350,7 +25317,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hddtemp_server_packets" lineno="32183"> +<interface name="corenet_send_hddtemp_server_packets" lineno="25290"> <summary> Send hddtemp_server packets. </summary> @@ -30361,7 +25328,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32202"> +<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="25309"> <summary> Do not audit attempts to send hddtemp_server packets. </summary> @@ -30372,7 +25339,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hddtemp_server_packets" lineno="32221"> +<interface name="corenet_receive_hddtemp_server_packets" lineno="25328"> <summary> Receive hddtemp_server packets. </summary> @@ -30383,7 +25350,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32240"> +<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="25347"> <summary> Do not audit attempts to receive hddtemp_server packets. </summary> @@ -30394,7 +25361,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32259"> +<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="25366"> <summary> Send and receive hddtemp_server packets. </summary> @@ -30405,7 +25372,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32275"> +<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="25382"> <summary> Do not audit attempts to send and receive hddtemp_server packets. </summary> @@ -30416,7 +25383,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32290"> +<interface name="corenet_relabelto_hddtemp_server_packets" lineno="25397"> <summary> Relabel packets to hddtemp_server the packet type. </summary> @@ -30426,85 +25393,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_howl_port" lineno="32312"> -<summary> -Send and receive TCP traffic on the howl port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_howl_port" lineno="32327"> -<summary> -Send UDP traffic on the howl port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32342"> -<summary> -Do not audit attempts to send UDP traffic on the howl port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_howl_port" lineno="32357"> -<summary> -Receive UDP traffic on the howl port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32372"> -<summary> -Do not audit attempts to receive UDP traffic on the howl port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_howl_port" lineno="32387"> -<summary> -Send and receive UDP traffic on the howl port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32403"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the howl port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_howl_port" lineno="32418"> +<interface name="corenet_tcp_bind_howl_port" lineno="25419"> <summary> Bind TCP sockets to the howl port. </summary> @@ -30515,7 +25404,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_howl_port" lineno="32438"> +<interface name="corenet_udp_bind_howl_port" lineno="25439"> <summary> Bind UDP sockets to the howl port. </summary> @@ -30526,7 +25415,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_howl_port" lineno="32457"> +<interface name="corenet_tcp_connect_howl_port" lineno="25458"> <summary> Make a TCP connection to the howl port. </summary> @@ -30536,7 +25425,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_howl_client_packets" lineno="32477"> +<interface name="corenet_send_howl_client_packets" lineno="25478"> <summary> Send howl_client packets. </summary> @@ -30547,7 +25436,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32496"> +<interface name="corenet_dontaudit_send_howl_client_packets" lineno="25497"> <summary> Do not audit attempts to send howl_client packets. </summary> @@ -30558,7 +25447,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_howl_client_packets" lineno="32515"> +<interface name="corenet_receive_howl_client_packets" lineno="25516"> <summary> Receive howl_client packets. </summary> @@ -30569,7 +25458,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32534"> +<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="25535"> <summary> Do not audit attempts to receive howl_client packets. </summary> @@ -30580,7 +25469,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_howl_client_packets" lineno="32553"> +<interface name="corenet_sendrecv_howl_client_packets" lineno="25554"> <summary> Send and receive howl_client packets. </summary> @@ -30591,7 +25480,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32569"> +<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="25570"> <summary> Do not audit attempts to send and receive howl_client packets. </summary> @@ -30602,7 +25491,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_howl_client_packets" lineno="32584"> +<interface name="corenet_relabelto_howl_client_packets" lineno="25585"> <summary> Relabel packets to howl_client the packet type. </summary> @@ -30612,7 +25501,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_howl_server_packets" lineno="32604"> +<interface name="corenet_send_howl_server_packets" lineno="25605"> <summary> Send howl_server packets. </summary> @@ -30623,7 +25512,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32623"> +<interface name="corenet_dontaudit_send_howl_server_packets" lineno="25624"> <summary> Do not audit attempts to send howl_server packets. </summary> @@ -30634,7 +25523,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_howl_server_packets" lineno="32642"> +<interface name="corenet_receive_howl_server_packets" lineno="25643"> <summary> Receive howl_server packets. </summary> @@ -30645,7 +25534,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32661"> +<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="25662"> <summary> Do not audit attempts to receive howl_server packets. </summary> @@ -30656,7 +25545,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_howl_server_packets" lineno="32680"> +<interface name="corenet_sendrecv_howl_server_packets" lineno="25681"> <summary> Send and receive howl_server packets. </summary> @@ -30667,7 +25556,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32696"> +<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="25697"> <summary> Do not audit attempts to send and receive howl_server packets. </summary> @@ -30678,7 +25567,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_howl_server_packets" lineno="32711"> +<interface name="corenet_relabelto_howl_server_packets" lineno="25712"> <summary> Relabel packets to howl_server the packet type. </summary> @@ -30688,85 +25577,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32733"> -<summary> -Send and receive TCP traffic on the hplip port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_hplip_port" lineno="32748"> -<summary> -Send UDP traffic on the hplip port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32763"> -<summary> -Do not audit attempts to send UDP traffic on the hplip port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_hplip_port" lineno="32778"> -<summary> -Receive UDP traffic on the hplip port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32793"> -<summary> -Do not audit attempts to receive UDP traffic on the hplip port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_hplip_port" lineno="32808"> -<summary> -Send and receive UDP traffic on the hplip port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32824"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the hplip port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_hplip_port" lineno="32839"> +<interface name="corenet_tcp_bind_hplip_port" lineno="25734"> <summary> Bind TCP sockets to the hplip port. </summary> @@ -30777,7 +25588,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_hplip_port" lineno="32859"> +<interface name="corenet_udp_bind_hplip_port" lineno="25754"> <summary> Bind UDP sockets to the hplip port. </summary> @@ -30788,7 +25599,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_hplip_port" lineno="32878"> +<interface name="corenet_tcp_connect_hplip_port" lineno="25773"> <summary> Make a TCP connection to the hplip port. </summary> @@ -30798,7 +25609,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hplip_client_packets" lineno="32898"> +<interface name="corenet_send_hplip_client_packets" lineno="25793"> <summary> Send hplip_client packets. </summary> @@ -30809,7 +25620,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32917"> +<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="25812"> <summary> Do not audit attempts to send hplip_client packets. </summary> @@ -30820,7 +25631,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hplip_client_packets" lineno="32936"> +<interface name="corenet_receive_hplip_client_packets" lineno="25831"> <summary> Receive hplip_client packets. </summary> @@ -30831,7 +25642,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32955"> +<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="25850"> <summary> Do not audit attempts to receive hplip_client packets. </summary> @@ -30842,7 +25653,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hplip_client_packets" lineno="32974"> +<interface name="corenet_sendrecv_hplip_client_packets" lineno="25869"> <summary> Send and receive hplip_client packets. </summary> @@ -30853,7 +25664,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32990"> +<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="25885"> <summary> Do not audit attempts to send and receive hplip_client packets. </summary> @@ -30864,7 +25675,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hplip_client_packets" lineno="33005"> +<interface name="corenet_relabelto_hplip_client_packets" lineno="25900"> <summary> Relabel packets to hplip_client the packet type. </summary> @@ -30874,7 +25685,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_hplip_server_packets" lineno="33025"> +<interface name="corenet_send_hplip_server_packets" lineno="25920"> <summary> Send hplip_server packets. </summary> @@ -30885,7 +25696,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="33044"> +<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="25939"> <summary> Do not audit attempts to send hplip_server packets. </summary> @@ -30896,7 +25707,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_hplip_server_packets" lineno="33063"> +<interface name="corenet_receive_hplip_server_packets" lineno="25958"> <summary> Receive hplip_server packets. </summary> @@ -30907,7 +25718,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="33082"> +<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="25977"> <summary> Do not audit attempts to receive hplip_server packets. </summary> @@ -30918,7 +25729,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_hplip_server_packets" lineno="33101"> +<interface name="corenet_sendrecv_hplip_server_packets" lineno="25996"> <summary> Send and receive hplip_server packets. </summary> @@ -30929,7 +25740,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="33117"> +<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="26012"> <summary> Do not audit attempts to send and receive hplip_server packets. </summary> @@ -30940,7 +25751,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_hplip_server_packets" lineno="33132"> +<interface name="corenet_relabelto_hplip_server_packets" lineno="26027"> <summary> Relabel packets to hplip_server the packet type. </summary> @@ -30950,85 +25761,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_http_port" lineno="33154"> -<summary> -Send and receive TCP traffic on the http port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_http_port" lineno="33169"> -<summary> -Send UDP traffic on the http port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_http_port" lineno="33184"> -<summary> -Do not audit attempts to send UDP traffic on the http port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_http_port" lineno="33199"> -<summary> -Receive UDP traffic on the http port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33214"> -<summary> -Do not audit attempts to receive UDP traffic on the http port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_http_port" lineno="33229"> -<summary> -Send and receive UDP traffic on the http port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33245"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the http port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_http_port" lineno="33260"> +<interface name="corenet_tcp_bind_http_port" lineno="26049"> <summary> Bind TCP sockets to the http port. </summary> @@ -31039,7 +25772,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_http_port" lineno="33280"> +<interface name="corenet_udp_bind_http_port" lineno="26069"> <summary> Bind UDP sockets to the http port. </summary> @@ -31050,7 +25783,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_http_port" lineno="33299"> +<interface name="corenet_tcp_connect_http_port" lineno="26088"> <summary> Make a TCP connection to the http port. </summary> @@ -31060,7 +25793,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_http_client_packets" lineno="33319"> +<interface name="corenet_send_http_client_packets" lineno="26108"> <summary> Send http_client packets. </summary> @@ -31071,7 +25804,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_http_client_packets" lineno="33338"> +<interface name="corenet_dontaudit_send_http_client_packets" lineno="26127"> <summary> Do not audit attempts to send http_client packets. </summary> @@ -31082,7 +25815,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_http_client_packets" lineno="33357"> +<interface name="corenet_receive_http_client_packets" lineno="26146"> <summary> Receive http_client packets. </summary> @@ -31093,7 +25826,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33376"> +<interface name="corenet_dontaudit_receive_http_client_packets" lineno="26165"> <summary> Do not audit attempts to receive http_client packets. </summary> @@ -31104,7 +25837,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_http_client_packets" lineno="33395"> +<interface name="corenet_sendrecv_http_client_packets" lineno="26184"> <summary> Send and receive http_client packets. </summary> @@ -31115,7 +25848,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33411"> +<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="26200"> <summary> Do not audit attempts to send and receive http_client packets. </summary> @@ -31126,7 +25859,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_http_client_packets" lineno="33426"> +<interface name="corenet_relabelto_http_client_packets" lineno="26215"> <summary> Relabel packets to http_client the packet type. </summary> @@ -31136,7 +25869,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_http_server_packets" lineno="33446"> +<interface name="corenet_send_http_server_packets" lineno="26235"> <summary> Send http_server packets. </summary> @@ -31147,7 +25880,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_http_server_packets" lineno="33465"> +<interface name="corenet_dontaudit_send_http_server_packets" lineno="26254"> <summary> Do not audit attempts to send http_server packets. </summary> @@ -31158,7 +25891,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_http_server_packets" lineno="33484"> +<interface name="corenet_receive_http_server_packets" lineno="26273"> <summary> Receive http_server packets. </summary> @@ -31169,7 +25902,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33503"> +<interface name="corenet_dontaudit_receive_http_server_packets" lineno="26292"> <summary> Do not audit attempts to receive http_server packets. </summary> @@ -31180,7 +25913,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_http_server_packets" lineno="33522"> +<interface name="corenet_sendrecv_http_server_packets" lineno="26311"> <summary> Send and receive http_server packets. </summary> @@ -31191,7 +25924,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33538"> +<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="26327"> <summary> Do not audit attempts to send and receive http_server packets. </summary> @@ -31202,7 +25935,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_http_server_packets" lineno="33553"> +<interface name="corenet_relabelto_http_server_packets" lineno="26342"> <summary> Relabel packets to http_server the packet type. </summary> @@ -31212,85 +25945,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33575"> -<summary> -Send and receive TCP traffic on the http_cache port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_http_cache_port" lineno="33590"> -<summary> -Send UDP traffic on the http_cache port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33605"> -<summary> -Do not audit attempts to send UDP traffic on the http_cache port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_http_cache_port" lineno="33620"> -<summary> -Receive UDP traffic on the http_cache port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33635"> -<summary> -Do not audit attempts to receive UDP traffic on the http_cache port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33650"> -<summary> -Send and receive UDP traffic on the http_cache port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33666"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the http_cache port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_http_cache_port" lineno="33681"> +<interface name="corenet_tcp_bind_http_cache_port" lineno="26364"> <summary> Bind TCP sockets to the http_cache port. </summary> @@ -31301,7 +25956,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_http_cache_port" lineno="33701"> +<interface name="corenet_udp_bind_http_cache_port" lineno="26384"> <summary> Bind UDP sockets to the http_cache port. </summary> @@ -31312,7 +25967,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_http_cache_port" lineno="33720"> +<interface name="corenet_tcp_connect_http_cache_port" lineno="26403"> <summary> Make a TCP connection to the http_cache port. </summary> @@ -31322,7 +25977,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_http_cache_client_packets" lineno="33740"> +<interface name="corenet_send_http_cache_client_packets" lineno="26423"> <summary> Send http_cache_client packets. </summary> @@ -31333,7 +25988,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33759"> +<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="26442"> <summary> Do not audit attempts to send http_cache_client packets. </summary> @@ -31344,7 +25999,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_http_cache_client_packets" lineno="33778"> +<interface name="corenet_receive_http_cache_client_packets" lineno="26461"> <summary> Receive http_cache_client packets. </summary> @@ -31355,7 +26010,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33797"> +<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="26480"> <summary> Do not audit attempts to receive http_cache_client packets. </summary> @@ -31366,7 +26021,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33816"> +<interface name="corenet_sendrecv_http_cache_client_packets" lineno="26499"> <summary> Send and receive http_cache_client packets. </summary> @@ -31377,7 +26032,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33832"> +<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="26515"> <summary> Do not audit attempts to send and receive http_cache_client packets. </summary> @@ -31388,7 +26043,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_http_cache_client_packets" lineno="33847"> +<interface name="corenet_relabelto_http_cache_client_packets" lineno="26530"> <summary> Relabel packets to http_cache_client the packet type. </summary> @@ -31398,7 +26053,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_http_cache_server_packets" lineno="33867"> +<interface name="corenet_send_http_cache_server_packets" lineno="26550"> <summary> Send http_cache_server packets. </summary> @@ -31409,7 +26064,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33886"> +<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="26569"> <summary> Do not audit attempts to send http_cache_server packets. </summary> @@ -31420,7 +26075,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_http_cache_server_packets" lineno="33905"> +<interface name="corenet_receive_http_cache_server_packets" lineno="26588"> <summary> Receive http_cache_server packets. </summary> @@ -31431,7 +26086,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33924"> +<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="26607"> <summary> Do not audit attempts to receive http_cache_server packets. </summary> @@ -31442,7 +26097,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33943"> +<interface name="corenet_sendrecv_http_cache_server_packets" lineno="26626"> <summary> Send and receive http_cache_server packets. </summary> @@ -31453,7 +26108,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33959"> +<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="26642"> <summary> Do not audit attempts to send and receive http_cache_server packets. </summary> @@ -31464,7 +26119,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_http_cache_server_packets" lineno="33974"> +<interface name="corenet_relabelto_http_cache_server_packets" lineno="26657"> <summary> Relabel packets to http_cache_server the packet type. </summary> @@ -31474,85 +26129,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33996"> -<summary> -Send and receive TCP traffic on the i18n_input port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_i18n_input_port" lineno="34011"> -<summary> -Send UDP traffic on the i18n_input port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="34026"> -<summary> -Do not audit attempts to send UDP traffic on the i18n_input port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_i18n_input_port" lineno="34041"> -<summary> -Receive UDP traffic on the i18n_input port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="34056"> -<summary> -Do not audit attempts to receive UDP traffic on the i18n_input port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="34071"> -<summary> -Send and receive UDP traffic on the i18n_input port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="34087"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the i18n_input port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_i18n_input_port" lineno="34102"> +<interface name="corenet_tcp_bind_i18n_input_port" lineno="26679"> <summary> Bind TCP sockets to the i18n_input port. </summary> @@ -31563,7 +26140,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_i18n_input_port" lineno="34122"> +<interface name="corenet_udp_bind_i18n_input_port" lineno="26699"> <summary> Bind UDP sockets to the i18n_input port. </summary> @@ -31574,7 +26151,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_i18n_input_port" lineno="34141"> +<interface name="corenet_tcp_connect_i18n_input_port" lineno="26718"> <summary> Make a TCP connection to the i18n_input port. </summary> @@ -31584,7 +26161,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_i18n_input_client_packets" lineno="34161"> +<interface name="corenet_send_i18n_input_client_packets" lineno="26738"> <summary> Send i18n_input_client packets. </summary> @@ -31595,7 +26172,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34180"> +<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="26757"> <summary> Do not audit attempts to send i18n_input_client packets. </summary> @@ -31606,7 +26183,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_i18n_input_client_packets" lineno="34199"> +<interface name="corenet_receive_i18n_input_client_packets" lineno="26776"> <summary> Receive i18n_input_client packets. </summary> @@ -31617,7 +26194,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34218"> +<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="26795"> <summary> Do not audit attempts to receive i18n_input_client packets. </summary> @@ -31628,7 +26205,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34237"> +<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="26814"> <summary> Send and receive i18n_input_client packets. </summary> @@ -31639,7 +26216,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34253"> +<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="26830"> <summary> Do not audit attempts to send and receive i18n_input_client packets. </summary> @@ -31650,7 +26227,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34268"> +<interface name="corenet_relabelto_i18n_input_client_packets" lineno="26845"> <summary> Relabel packets to i18n_input_client the packet type. </summary> @@ -31660,7 +26237,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_i18n_input_server_packets" lineno="34288"> +<interface name="corenet_send_i18n_input_server_packets" lineno="26865"> <summary> Send i18n_input_server packets. </summary> @@ -31671,7 +26248,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34307"> +<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="26884"> <summary> Do not audit attempts to send i18n_input_server packets. </summary> @@ -31682,7 +26259,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_i18n_input_server_packets" lineno="34326"> +<interface name="corenet_receive_i18n_input_server_packets" lineno="26903"> <summary> Receive i18n_input_server packets. </summary> @@ -31693,7 +26270,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34345"> +<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="26922"> <summary> Do not audit attempts to receive i18n_input_server packets. </summary> @@ -31704,7 +26281,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34364"> +<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="26941"> <summary> Send and receive i18n_input_server packets. </summary> @@ -31715,7 +26292,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34380"> +<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="26957"> <summary> Do not audit attempts to send and receive i18n_input_server packets. </summary> @@ -31726,7 +26303,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34395"> +<interface name="corenet_relabelto_i18n_input_server_packets" lineno="26972"> <summary> Relabel packets to i18n_input_server the packet type. </summary> @@ -31736,85 +26313,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34417"> -<summary> -Send and receive TCP traffic on the imaze port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_imaze_port" lineno="34432"> -<summary> -Send UDP traffic on the imaze port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34447"> -<summary> -Do not audit attempts to send UDP traffic on the imaze port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_imaze_port" lineno="34462"> -<summary> -Receive UDP traffic on the imaze port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34477"> -<summary> -Do not audit attempts to receive UDP traffic on the imaze port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_imaze_port" lineno="34492"> -<summary> -Send and receive UDP traffic on the imaze port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34508"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the imaze port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_imaze_port" lineno="34523"> +<interface name="corenet_tcp_bind_imaze_port" lineno="26994"> <summary> Bind TCP sockets to the imaze port. </summary> @@ -31825,7 +26324,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_imaze_port" lineno="34543"> +<interface name="corenet_udp_bind_imaze_port" lineno="27014"> <summary> Bind UDP sockets to the imaze port. </summary> @@ -31836,7 +26335,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_imaze_port" lineno="34562"> +<interface name="corenet_tcp_connect_imaze_port" lineno="27033"> <summary> Make a TCP connection to the imaze port. </summary> @@ -31846,7 +26345,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_imaze_client_packets" lineno="34582"> +<interface name="corenet_send_imaze_client_packets" lineno="27053"> <summary> Send imaze_client packets. </summary> @@ -31857,7 +26356,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34601"> +<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="27072"> <summary> Do not audit attempts to send imaze_client packets. </summary> @@ -31868,7 +26367,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_imaze_client_packets" lineno="34620"> +<interface name="corenet_receive_imaze_client_packets" lineno="27091"> <summary> Receive imaze_client packets. </summary> @@ -31879,7 +26378,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34639"> +<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="27110"> <summary> Do not audit attempts to receive imaze_client packets. </summary> @@ -31890,7 +26389,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_imaze_client_packets" lineno="34658"> +<interface name="corenet_sendrecv_imaze_client_packets" lineno="27129"> <summary> Send and receive imaze_client packets. </summary> @@ -31901,7 +26400,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34674"> +<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="27145"> <summary> Do not audit attempts to send and receive imaze_client packets. </summary> @@ -31912,7 +26411,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_imaze_client_packets" lineno="34689"> +<interface name="corenet_relabelto_imaze_client_packets" lineno="27160"> <summary> Relabel packets to imaze_client the packet type. </summary> @@ -31922,7 +26421,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_imaze_server_packets" lineno="34709"> +<interface name="corenet_send_imaze_server_packets" lineno="27180"> <summary> Send imaze_server packets. </summary> @@ -31933,7 +26432,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34728"> +<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="27199"> <summary> Do not audit attempts to send imaze_server packets. </summary> @@ -31944,7 +26443,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_imaze_server_packets" lineno="34747"> +<interface name="corenet_receive_imaze_server_packets" lineno="27218"> <summary> Receive imaze_server packets. </summary> @@ -31955,7 +26454,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34766"> +<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="27237"> <summary> Do not audit attempts to receive imaze_server packets. </summary> @@ -31966,7 +26465,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_imaze_server_packets" lineno="34785"> +<interface name="corenet_sendrecv_imaze_server_packets" lineno="27256"> <summary> Send and receive imaze_server packets. </summary> @@ -31977,7 +26476,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34801"> +<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="27272"> <summary> Do not audit attempts to send and receive imaze_server packets. </summary> @@ -31988,7 +26487,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_imaze_server_packets" lineno="34816"> +<interface name="corenet_relabelto_imaze_server_packets" lineno="27287"> <summary> Relabel packets to imaze_server the packet type. </summary> @@ -31998,85 +26497,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34838"> -<summary> -Send and receive TCP traffic on the inetd_child port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_inetd_child_port" lineno="34853"> -<summary> -Send UDP traffic on the inetd_child port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34868"> -<summary> -Do not audit attempts to send UDP traffic on the inetd_child port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_inetd_child_port" lineno="34883"> -<summary> -Receive UDP traffic on the inetd_child port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34898"> -<summary> -Do not audit attempts to receive UDP traffic on the inetd_child port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34913"> -<summary> -Send and receive UDP traffic on the inetd_child port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34929"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the inetd_child port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_inetd_child_port" lineno="34944"> +<interface name="corenet_tcp_bind_inetd_child_port" lineno="27309"> <summary> Bind TCP sockets to the inetd_child port. </summary> @@ -32087,7 +26508,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_inetd_child_port" lineno="34964"> +<interface name="corenet_udp_bind_inetd_child_port" lineno="27329"> <summary> Bind UDP sockets to the inetd_child port. </summary> @@ -32098,7 +26519,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_inetd_child_port" lineno="34983"> +<interface name="corenet_tcp_connect_inetd_child_port" lineno="27348"> <summary> Make a TCP connection to the inetd_child port. </summary> @@ -32108,7 +26529,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_inetd_child_client_packets" lineno="35003"> +<interface name="corenet_send_inetd_child_client_packets" lineno="27368"> <summary> Send inetd_child_client packets. </summary> @@ -32119,7 +26540,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="35022"> +<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="27387"> <summary> Do not audit attempts to send inetd_child_client packets. </summary> @@ -32130,7 +26551,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_inetd_child_client_packets" lineno="35041"> +<interface name="corenet_receive_inetd_child_client_packets" lineno="27406"> <summary> Receive inetd_child_client packets. </summary> @@ -32141,7 +26562,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="35060"> +<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="27425"> <summary> Do not audit attempts to receive inetd_child_client packets. </summary> @@ -32152,7 +26573,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="35079"> +<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="27444"> <summary> Send and receive inetd_child_client packets. </summary> @@ -32163,7 +26584,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="35095"> +<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="27460"> <summary> Do not audit attempts to send and receive inetd_child_client packets. </summary> @@ -32174,7 +26595,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_inetd_child_client_packets" lineno="35110"> +<interface name="corenet_relabelto_inetd_child_client_packets" lineno="27475"> <summary> Relabel packets to inetd_child_client the packet type. </summary> @@ -32184,7 +26605,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_inetd_child_server_packets" lineno="35130"> +<interface name="corenet_send_inetd_child_server_packets" lineno="27495"> <summary> Send inetd_child_server packets. </summary> @@ -32195,7 +26616,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35149"> +<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="27514"> <summary> Do not audit attempts to send inetd_child_server packets. </summary> @@ -32206,7 +26627,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_inetd_child_server_packets" lineno="35168"> +<interface name="corenet_receive_inetd_child_server_packets" lineno="27533"> <summary> Receive inetd_child_server packets. </summary> @@ -32217,7 +26638,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35187"> +<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="27552"> <summary> Do not audit attempts to receive inetd_child_server packets. </summary> @@ -32228,7 +26649,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35206"> +<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="27571"> <summary> Send and receive inetd_child_server packets. </summary> @@ -32239,7 +26660,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35222"> +<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="27587"> <summary> Do not audit attempts to send and receive inetd_child_server packets. </summary> @@ -32250,7 +26671,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35237"> +<interface name="corenet_relabelto_inetd_child_server_packets" lineno="27602"> <summary> Relabel packets to inetd_child_server the packet type. </summary> @@ -32260,85 +26681,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_innd_port" lineno="35259"> -<summary> -Send and receive TCP traffic on the innd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_innd_port" lineno="35274"> -<summary> -Send UDP traffic on the innd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35289"> -<summary> -Do not audit attempts to send UDP traffic on the innd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_innd_port" lineno="35304"> -<summary> -Receive UDP traffic on the innd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35319"> -<summary> -Do not audit attempts to receive UDP traffic on the innd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_innd_port" lineno="35334"> -<summary> -Send and receive UDP traffic on the innd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35350"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the innd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_innd_port" lineno="35365"> +<interface name="corenet_tcp_bind_innd_port" lineno="27624"> <summary> Bind TCP sockets to the innd port. </summary> @@ -32349,7 +26692,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_innd_port" lineno="35385"> +<interface name="corenet_udp_bind_innd_port" lineno="27644"> <summary> Bind UDP sockets to the innd port. </summary> @@ -32360,7 +26703,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_innd_port" lineno="35404"> +<interface name="corenet_tcp_connect_innd_port" lineno="27663"> <summary> Make a TCP connection to the innd port. </summary> @@ -32370,7 +26713,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_innd_client_packets" lineno="35424"> +<interface name="corenet_send_innd_client_packets" lineno="27683"> <summary> Send innd_client packets. </summary> @@ -32381,7 +26724,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35443"> +<interface name="corenet_dontaudit_send_innd_client_packets" lineno="27702"> <summary> Do not audit attempts to send innd_client packets. </summary> @@ -32392,7 +26735,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_innd_client_packets" lineno="35462"> +<interface name="corenet_receive_innd_client_packets" lineno="27721"> <summary> Receive innd_client packets. </summary> @@ -32403,7 +26746,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35481"> +<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="27740"> <summary> Do not audit attempts to receive innd_client packets. </summary> @@ -32414,7 +26757,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_innd_client_packets" lineno="35500"> +<interface name="corenet_sendrecv_innd_client_packets" lineno="27759"> <summary> Send and receive innd_client packets. </summary> @@ -32425,7 +26768,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35516"> +<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="27775"> <summary> Do not audit attempts to send and receive innd_client packets. </summary> @@ -32436,7 +26779,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_innd_client_packets" lineno="35531"> +<interface name="corenet_relabelto_innd_client_packets" lineno="27790"> <summary> Relabel packets to innd_client the packet type. </summary> @@ -32446,7 +26789,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_innd_server_packets" lineno="35551"> +<interface name="corenet_send_innd_server_packets" lineno="27810"> <summary> Send innd_server packets. </summary> @@ -32457,7 +26800,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35570"> +<interface name="corenet_dontaudit_send_innd_server_packets" lineno="27829"> <summary> Do not audit attempts to send innd_server packets. </summary> @@ -32468,7 +26811,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_innd_server_packets" lineno="35589"> +<interface name="corenet_receive_innd_server_packets" lineno="27848"> <summary> Receive innd_server packets. </summary> @@ -32479,7 +26822,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35608"> +<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="27867"> <summary> Do not audit attempts to receive innd_server packets. </summary> @@ -32490,7 +26833,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_innd_server_packets" lineno="35627"> +<interface name="corenet_sendrecv_innd_server_packets" lineno="27886"> <summary> Send and receive innd_server packets. </summary> @@ -32501,7 +26844,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35643"> +<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="27902"> <summary> Do not audit attempts to send and receive innd_server packets. </summary> @@ -32512,7 +26855,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_innd_server_packets" lineno="35658"> +<interface name="corenet_relabelto_innd_server_packets" lineno="27917"> <summary> Relabel packets to innd_server the packet type. </summary> @@ -32522,85 +26865,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35680"> -<summary> -Send and receive TCP traffic on the interwise port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_interwise_port" lineno="35695"> -<summary> -Send UDP traffic on the interwise port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35710"> -<summary> -Do not audit attempts to send UDP traffic on the interwise port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_interwise_port" lineno="35725"> -<summary> -Receive UDP traffic on the interwise port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35740"> -<summary> -Do not audit attempts to receive UDP traffic on the interwise port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_interwise_port" lineno="35755"> -<summary> -Send and receive UDP traffic on the interwise port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35771"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the interwise port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_interwise_port" lineno="35786"> +<interface name="corenet_tcp_bind_interwise_port" lineno="27939"> <summary> Bind TCP sockets to the interwise port. </summary> @@ -32611,7 +26876,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_interwise_port" lineno="35806"> +<interface name="corenet_udp_bind_interwise_port" lineno="27959"> <summary> Bind UDP sockets to the interwise port. </summary> @@ -32622,7 +26887,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_interwise_port" lineno="35825"> +<interface name="corenet_tcp_connect_interwise_port" lineno="27978"> <summary> Make a TCP connection to the interwise port. </summary> @@ -32632,7 +26897,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_interwise_client_packets" lineno="35845"> +<interface name="corenet_send_interwise_client_packets" lineno="27998"> <summary> Send interwise_client packets. </summary> @@ -32643,7 +26908,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35864"> +<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="28017"> <summary> Do not audit attempts to send interwise_client packets. </summary> @@ -32654,7 +26919,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_interwise_client_packets" lineno="35883"> +<interface name="corenet_receive_interwise_client_packets" lineno="28036"> <summary> Receive interwise_client packets. </summary> @@ -32665,7 +26930,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35902"> +<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="28055"> <summary> Do not audit attempts to receive interwise_client packets. </summary> @@ -32676,7 +26941,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_interwise_client_packets" lineno="35921"> +<interface name="corenet_sendrecv_interwise_client_packets" lineno="28074"> <summary> Send and receive interwise_client packets. </summary> @@ -32687,7 +26952,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35937"> +<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="28090"> <summary> Do not audit attempts to send and receive interwise_client packets. </summary> @@ -32698,7 +26963,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_interwise_client_packets" lineno="35952"> +<interface name="corenet_relabelto_interwise_client_packets" lineno="28105"> <summary> Relabel packets to interwise_client the packet type. </summary> @@ -32708,7 +26973,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_interwise_server_packets" lineno="35972"> +<interface name="corenet_send_interwise_server_packets" lineno="28125"> <summary> Send interwise_server packets. </summary> @@ -32719,7 +26984,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35991"> +<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="28144"> <summary> Do not audit attempts to send interwise_server packets. </summary> @@ -32730,7 +26995,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_interwise_server_packets" lineno="36010"> +<interface name="corenet_receive_interwise_server_packets" lineno="28163"> <summary> Receive interwise_server packets. </summary> @@ -32741,7 +27006,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="36029"> +<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="28182"> <summary> Do not audit attempts to receive interwise_server packets. </summary> @@ -32752,7 +27017,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_interwise_server_packets" lineno="36048"> +<interface name="corenet_sendrecv_interwise_server_packets" lineno="28201"> <summary> Send and receive interwise_server packets. </summary> @@ -32763,7 +27028,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="36064"> +<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="28217"> <summary> Do not audit attempts to send and receive interwise_server packets. </summary> @@ -32774,7 +27039,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_interwise_server_packets" lineno="36079"> +<interface name="corenet_relabelto_interwise_server_packets" lineno="28232"> <summary> Relabel packets to interwise_server the packet type. </summary> @@ -32784,85 +27049,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="36101"> -<summary> -Send and receive TCP traffic on the ionixnetmon port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ionixnetmon_port" lineno="36116"> -<summary> -Send UDP traffic on the ionixnetmon port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="36131"> -<summary> -Do not audit attempts to send UDP traffic on the ionixnetmon port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36146"> -<summary> -Receive UDP traffic on the ionixnetmon port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36161"> -<summary> -Do not audit attempts to receive UDP traffic on the ionixnetmon port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36176"> -<summary> -Send and receive UDP traffic on the ionixnetmon port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36192"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ionixnetmon port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36207"> +<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="28254"> <summary> Bind TCP sockets to the ionixnetmon port. </summary> @@ -32873,7 +27060,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36227"> +<interface name="corenet_udp_bind_ionixnetmon_port" lineno="28274"> <summary> Bind UDP sockets to the ionixnetmon port. </summary> @@ -32884,7 +27071,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36246"> +<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="28293"> <summary> Make a TCP connection to the ionixnetmon port. </summary> @@ -32894,7 +27081,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ionixnetmon_client_packets" lineno="36266"> +<interface name="corenet_send_ionixnetmon_client_packets" lineno="28313"> <summary> Send ionixnetmon_client packets. </summary> @@ -32905,7 +27092,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36285"> +<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="28332"> <summary> Do not audit attempts to send ionixnetmon_client packets. </summary> @@ -32916,7 +27103,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36304"> +<interface name="corenet_receive_ionixnetmon_client_packets" lineno="28351"> <summary> Receive ionixnetmon_client packets. </summary> @@ -32927,7 +27114,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36323"> +<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="28370"> <summary> Do not audit attempts to receive ionixnetmon_client packets. </summary> @@ -32938,7 +27125,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36342"> +<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="28389"> <summary> Send and receive ionixnetmon_client packets. </summary> @@ -32949,7 +27136,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36358"> +<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="28405"> <summary> Do not audit attempts to send and receive ionixnetmon_client packets. </summary> @@ -32960,7 +27147,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36373"> +<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="28420"> <summary> Relabel packets to ionixnetmon_client the packet type. </summary> @@ -32970,7 +27157,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ionixnetmon_server_packets" lineno="36393"> +<interface name="corenet_send_ionixnetmon_server_packets" lineno="28440"> <summary> Send ionixnetmon_server packets. </summary> @@ -32981,7 +27168,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36412"> +<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="28459"> <summary> Do not audit attempts to send ionixnetmon_server packets. </summary> @@ -32992,7 +27179,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36431"> +<interface name="corenet_receive_ionixnetmon_server_packets" lineno="28478"> <summary> Receive ionixnetmon_server packets. </summary> @@ -33003,7 +27190,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36450"> +<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="28497"> <summary> Do not audit attempts to receive ionixnetmon_server packets. </summary> @@ -33014,7 +27201,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36469"> +<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="28516"> <summary> Send and receive ionixnetmon_server packets. </summary> @@ -33025,7 +27212,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36485"> +<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="28532"> <summary> Do not audit attempts to send and receive ionixnetmon_server packets. </summary> @@ -33036,7 +27223,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36500"> +<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="28547"> <summary> Relabel packets to ionixnetmon_server the packet type. </summary> @@ -33046,85 +27233,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36522"> -<summary> -Send and receive TCP traffic on the ipmi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ipmi_port" lineno="36537"> -<summary> -Send UDP traffic on the ipmi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36552"> -<summary> -Do not audit attempts to send UDP traffic on the ipmi port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ipmi_port" lineno="36567"> -<summary> -Receive UDP traffic on the ipmi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36582"> -<summary> -Do not audit attempts to receive UDP traffic on the ipmi port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36597"> -<summary> -Send and receive UDP traffic on the ipmi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36613"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ipmi port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ipmi_port" lineno="36628"> +<interface name="corenet_tcp_bind_ipmi_port" lineno="28569"> <summary> Bind TCP sockets to the ipmi port. </summary> @@ -33135,7 +27244,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ipmi_port" lineno="36648"> +<interface name="corenet_udp_bind_ipmi_port" lineno="28589"> <summary> Bind UDP sockets to the ipmi port. </summary> @@ -33146,7 +27255,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ipmi_port" lineno="36667"> +<interface name="corenet_tcp_connect_ipmi_port" lineno="28608"> <summary> Make a TCP connection to the ipmi port. </summary> @@ -33156,7 +27265,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipmi_client_packets" lineno="36687"> +<interface name="corenet_send_ipmi_client_packets" lineno="28628"> <summary> Send ipmi_client packets. </summary> @@ -33167,7 +27276,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36706"> +<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="28647"> <summary> Do not audit attempts to send ipmi_client packets. </summary> @@ -33178,7 +27287,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipmi_client_packets" lineno="36725"> +<interface name="corenet_receive_ipmi_client_packets" lineno="28666"> <summary> Receive ipmi_client packets. </summary> @@ -33189,7 +27298,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36744"> +<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="28685"> <summary> Do not audit attempts to receive ipmi_client packets. </summary> @@ -33200,7 +27309,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36763"> +<interface name="corenet_sendrecv_ipmi_client_packets" lineno="28704"> <summary> Send and receive ipmi_client packets. </summary> @@ -33211,7 +27320,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36779"> +<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="28720"> <summary> Do not audit attempts to send and receive ipmi_client packets. </summary> @@ -33222,7 +27331,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipmi_client_packets" lineno="36794"> +<interface name="corenet_relabelto_ipmi_client_packets" lineno="28735"> <summary> Relabel packets to ipmi_client the packet type. </summary> @@ -33232,7 +27341,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipmi_server_packets" lineno="36814"> +<interface name="corenet_send_ipmi_server_packets" lineno="28755"> <summary> Send ipmi_server packets. </summary> @@ -33243,7 +27352,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36833"> +<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="28774"> <summary> Do not audit attempts to send ipmi_server packets. </summary> @@ -33254,7 +27363,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipmi_server_packets" lineno="36852"> +<interface name="corenet_receive_ipmi_server_packets" lineno="28793"> <summary> Receive ipmi_server packets. </summary> @@ -33265,7 +27374,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36871"> +<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="28812"> <summary> Do not audit attempts to receive ipmi_server packets. </summary> @@ -33276,7 +27385,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36890"> +<interface name="corenet_sendrecv_ipmi_server_packets" lineno="28831"> <summary> Send and receive ipmi_server packets. </summary> @@ -33287,7 +27396,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36906"> +<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="28847"> <summary> Do not audit attempts to send and receive ipmi_server packets. </summary> @@ -33298,7 +27407,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipmi_server_packets" lineno="36921"> +<interface name="corenet_relabelto_ipmi_server_packets" lineno="28862"> <summary> Relabel packets to ipmi_server the packet type. </summary> @@ -33308,85 +27417,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36943"> -<summary> -Send and receive TCP traffic on the ipp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ipp_port" lineno="36958"> -<summary> -Send UDP traffic on the ipp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36973"> -<summary> -Do not audit attempts to send UDP traffic on the ipp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ipp_port" lineno="36988"> -<summary> -Receive UDP traffic on the ipp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="37003"> -<summary> -Do not audit attempts to receive UDP traffic on the ipp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ipp_port" lineno="37018"> -<summary> -Send and receive UDP traffic on the ipp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="37034"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ipp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ipp_port" lineno="37049"> +<interface name="corenet_tcp_bind_ipp_port" lineno="28884"> <summary> Bind TCP sockets to the ipp port. </summary> @@ -33397,7 +27428,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ipp_port" lineno="37069"> +<interface name="corenet_udp_bind_ipp_port" lineno="28904"> <summary> Bind UDP sockets to the ipp port. </summary> @@ -33408,7 +27439,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ipp_port" lineno="37088"> +<interface name="corenet_tcp_connect_ipp_port" lineno="28923"> <summary> Make a TCP connection to the ipp port. </summary> @@ -33418,7 +27449,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipp_client_packets" lineno="37108"> +<interface name="corenet_send_ipp_client_packets" lineno="28943"> <summary> Send ipp_client packets. </summary> @@ -33429,7 +27460,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="37127"> +<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="28962"> <summary> Do not audit attempts to send ipp_client packets. </summary> @@ -33440,7 +27471,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipp_client_packets" lineno="37146"> +<interface name="corenet_receive_ipp_client_packets" lineno="28981"> <summary> Receive ipp_client packets. </summary> @@ -33451,7 +27482,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37165"> +<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="29000"> <summary> Do not audit attempts to receive ipp_client packets. </summary> @@ -33462,7 +27493,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipp_client_packets" lineno="37184"> +<interface name="corenet_sendrecv_ipp_client_packets" lineno="29019"> <summary> Send and receive ipp_client packets. </summary> @@ -33473,7 +27504,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37200"> +<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="29035"> <summary> Do not audit attempts to send and receive ipp_client packets. </summary> @@ -33484,7 +27515,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipp_client_packets" lineno="37215"> +<interface name="corenet_relabelto_ipp_client_packets" lineno="29050"> <summary> Relabel packets to ipp_client the packet type. </summary> @@ -33494,7 +27525,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipp_server_packets" lineno="37235"> +<interface name="corenet_send_ipp_server_packets" lineno="29070"> <summary> Send ipp_server packets. </summary> @@ -33505,7 +27536,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37254"> +<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="29089"> <summary> Do not audit attempts to send ipp_server packets. </summary> @@ -33516,7 +27547,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipp_server_packets" lineno="37273"> +<interface name="corenet_receive_ipp_server_packets" lineno="29108"> <summary> Receive ipp_server packets. </summary> @@ -33527,7 +27558,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37292"> +<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="29127"> <summary> Do not audit attempts to receive ipp_server packets. </summary> @@ -33538,7 +27569,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipp_server_packets" lineno="37311"> +<interface name="corenet_sendrecv_ipp_server_packets" lineno="29146"> <summary> Send and receive ipp_server packets. </summary> @@ -33549,7 +27580,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37327"> +<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="29162"> <summary> Do not audit attempts to send and receive ipp_server packets. </summary> @@ -33560,7 +27591,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipp_server_packets" lineno="37342"> +<interface name="corenet_relabelto_ipp_server_packets" lineno="29177"> <summary> Relabel packets to ipp_server the packet type. </summary> @@ -33570,85 +27601,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37364"> -<summary> -Send and receive TCP traffic on the ipsecnat port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ipsecnat_port" lineno="37379"> -<summary> -Send UDP traffic on the ipsecnat port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37394"> -<summary> -Do not audit attempts to send UDP traffic on the ipsecnat port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ipsecnat_port" lineno="37409"> -<summary> -Receive UDP traffic on the ipsecnat port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37424"> -<summary> -Do not audit attempts to receive UDP traffic on the ipsecnat port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37439"> -<summary> -Send and receive UDP traffic on the ipsecnat port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37455"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ipsecnat port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37470"> +<interface name="corenet_tcp_bind_ipsecnat_port" lineno="29199"> <summary> Bind TCP sockets to the ipsecnat port. </summary> @@ -33659,7 +27612,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ipsecnat_port" lineno="37490"> +<interface name="corenet_udp_bind_ipsecnat_port" lineno="29219"> <summary> Bind UDP sockets to the ipsecnat port. </summary> @@ -33670,7 +27623,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37509"> +<interface name="corenet_tcp_connect_ipsecnat_port" lineno="29238"> <summary> Make a TCP connection to the ipsecnat port. </summary> @@ -33680,7 +27633,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipsecnat_client_packets" lineno="37529"> +<interface name="corenet_send_ipsecnat_client_packets" lineno="29258"> <summary> Send ipsecnat_client packets. </summary> @@ -33691,7 +27644,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37548"> +<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="29277"> <summary> Do not audit attempts to send ipsecnat_client packets. </summary> @@ -33702,7 +27655,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipsecnat_client_packets" lineno="37567"> +<interface name="corenet_receive_ipsecnat_client_packets" lineno="29296"> <summary> Receive ipsecnat_client packets. </summary> @@ -33713,7 +27666,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37586"> +<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="29315"> <summary> Do not audit attempts to receive ipsecnat_client packets. </summary> @@ -33724,7 +27677,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37605"> +<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="29334"> <summary> Send and receive ipsecnat_client packets. </summary> @@ -33735,7 +27688,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37621"> +<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="29350"> <summary> Do not audit attempts to send and receive ipsecnat_client packets. </summary> @@ -33746,7 +27699,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37636"> +<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="29365"> <summary> Relabel packets to ipsecnat_client the packet type. </summary> @@ -33756,7 +27709,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ipsecnat_server_packets" lineno="37656"> +<interface name="corenet_send_ipsecnat_server_packets" lineno="29385"> <summary> Send ipsecnat_server packets. </summary> @@ -33767,7 +27720,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37675"> +<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="29404"> <summary> Do not audit attempts to send ipsecnat_server packets. </summary> @@ -33778,7 +27731,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ipsecnat_server_packets" lineno="37694"> +<interface name="corenet_receive_ipsecnat_server_packets" lineno="29423"> <summary> Receive ipsecnat_server packets. </summary> @@ -33789,7 +27742,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37713"> +<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="29442"> <summary> Do not audit attempts to receive ipsecnat_server packets. </summary> @@ -33800,7 +27753,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37732"> +<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="29461"> <summary> Send and receive ipsecnat_server packets. </summary> @@ -33811,7 +27764,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37748"> +<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="29477"> <summary> Do not audit attempts to send and receive ipsecnat_server packets. </summary> @@ -33822,7 +27775,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37763"> +<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="29492"> <summary> Relabel packets to ipsecnat_server the packet type. </summary> @@ -33832,85 +27785,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37785"> -<summary> -Send and receive TCP traffic on the ircd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ircd_port" lineno="37800"> -<summary> -Send UDP traffic on the ircd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37815"> -<summary> -Do not audit attempts to send UDP traffic on the ircd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ircd_port" lineno="37830"> -<summary> -Receive UDP traffic on the ircd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37845"> -<summary> -Do not audit attempts to receive UDP traffic on the ircd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ircd_port" lineno="37860"> -<summary> -Send and receive UDP traffic on the ircd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37876"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ircd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ircd_port" lineno="37891"> +<interface name="corenet_tcp_bind_ircd_port" lineno="29514"> <summary> Bind TCP sockets to the ircd port. </summary> @@ -33921,7 +27796,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ircd_port" lineno="37911"> +<interface name="corenet_udp_bind_ircd_port" lineno="29534"> <summary> Bind UDP sockets to the ircd port. </summary> @@ -33932,7 +27807,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ircd_port" lineno="37930"> +<interface name="corenet_tcp_connect_ircd_port" lineno="29553"> <summary> Make a TCP connection to the ircd port. </summary> @@ -33942,7 +27817,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ircd_client_packets" lineno="37950"> +<interface name="corenet_send_ircd_client_packets" lineno="29573"> <summary> Send ircd_client packets. </summary> @@ -33953,7 +27828,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37969"> +<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="29592"> <summary> Do not audit attempts to send ircd_client packets. </summary> @@ -33964,7 +27839,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ircd_client_packets" lineno="37988"> +<interface name="corenet_receive_ircd_client_packets" lineno="29611"> <summary> Receive ircd_client packets. </summary> @@ -33975,7 +27850,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="38007"> +<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="29630"> <summary> Do not audit attempts to receive ircd_client packets. </summary> @@ -33986,7 +27861,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ircd_client_packets" lineno="38026"> +<interface name="corenet_sendrecv_ircd_client_packets" lineno="29649"> <summary> Send and receive ircd_client packets. </summary> @@ -33997,7 +27872,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="38042"> +<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="29665"> <summary> Do not audit attempts to send and receive ircd_client packets. </summary> @@ -34008,7 +27883,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ircd_client_packets" lineno="38057"> +<interface name="corenet_relabelto_ircd_client_packets" lineno="29680"> <summary> Relabel packets to ircd_client the packet type. </summary> @@ -34018,7 +27893,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ircd_server_packets" lineno="38077"> +<interface name="corenet_send_ircd_server_packets" lineno="29700"> <summary> Send ircd_server packets. </summary> @@ -34029,7 +27904,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="38096"> +<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="29719"> <summary> Do not audit attempts to send ircd_server packets. </summary> @@ -34040,7 +27915,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ircd_server_packets" lineno="38115"> +<interface name="corenet_receive_ircd_server_packets" lineno="29738"> <summary> Receive ircd_server packets. </summary> @@ -34051,7 +27926,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="38134"> +<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="29757"> <summary> Do not audit attempts to receive ircd_server packets. </summary> @@ -34062,7 +27937,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ircd_server_packets" lineno="38153"> +<interface name="corenet_sendrecv_ircd_server_packets" lineno="29776"> <summary> Send and receive ircd_server packets. </summary> @@ -34073,7 +27948,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38169"> +<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="29792"> <summary> Do not audit attempts to send and receive ircd_server packets. </summary> @@ -34084,7 +27959,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ircd_server_packets" lineno="38184"> +<interface name="corenet_relabelto_ircd_server_packets" lineno="29807"> <summary> Relabel packets to ircd_server the packet type. </summary> @@ -34094,85 +27969,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38206"> -<summary> -Send and receive TCP traffic on the isakmp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_isakmp_port" lineno="38221"> -<summary> -Send UDP traffic on the isakmp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38236"> -<summary> -Do not audit attempts to send UDP traffic on the isakmp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_isakmp_port" lineno="38251"> -<summary> -Receive UDP traffic on the isakmp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38266"> -<summary> -Do not audit attempts to receive UDP traffic on the isakmp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38281"> -<summary> -Send and receive UDP traffic on the isakmp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38297"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the isakmp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_isakmp_port" lineno="38312"> +<interface name="corenet_tcp_bind_isakmp_port" lineno="29829"> <summary> Bind TCP sockets to the isakmp port. </summary> @@ -34183,7 +27980,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_isakmp_port" lineno="38332"> +<interface name="corenet_udp_bind_isakmp_port" lineno="29849"> <summary> Bind UDP sockets to the isakmp port. </summary> @@ -34194,7 +27991,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_isakmp_port" lineno="38351"> +<interface name="corenet_tcp_connect_isakmp_port" lineno="29868"> <summary> Make a TCP connection to the isakmp port. </summary> @@ -34204,7 +28001,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_isakmp_client_packets" lineno="38371"> +<interface name="corenet_send_isakmp_client_packets" lineno="29888"> <summary> Send isakmp_client packets. </summary> @@ -34215,7 +28012,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38390"> +<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="29907"> <summary> Do not audit attempts to send isakmp_client packets. </summary> @@ -34226,7 +28023,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_isakmp_client_packets" lineno="38409"> +<interface name="corenet_receive_isakmp_client_packets" lineno="29926"> <summary> Receive isakmp_client packets. </summary> @@ -34237,7 +28034,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38428"> +<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="29945"> <summary> Do not audit attempts to receive isakmp_client packets. </summary> @@ -34248,7 +28045,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38447"> +<interface name="corenet_sendrecv_isakmp_client_packets" lineno="29964"> <summary> Send and receive isakmp_client packets. </summary> @@ -34259,7 +28056,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38463"> +<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="29980"> <summary> Do not audit attempts to send and receive isakmp_client packets. </summary> @@ -34270,7 +28067,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_isakmp_client_packets" lineno="38478"> +<interface name="corenet_relabelto_isakmp_client_packets" lineno="29995"> <summary> Relabel packets to isakmp_client the packet type. </summary> @@ -34280,7 +28077,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_isakmp_server_packets" lineno="38498"> +<interface name="corenet_send_isakmp_server_packets" lineno="30015"> <summary> Send isakmp_server packets. </summary> @@ -34291,7 +28088,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38517"> +<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="30034"> <summary> Do not audit attempts to send isakmp_server packets. </summary> @@ -34302,7 +28099,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_isakmp_server_packets" lineno="38536"> +<interface name="corenet_receive_isakmp_server_packets" lineno="30053"> <summary> Receive isakmp_server packets. </summary> @@ -34313,7 +28110,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38555"> +<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="30072"> <summary> Do not audit attempts to receive isakmp_server packets. </summary> @@ -34324,7 +28121,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38574"> +<interface name="corenet_sendrecv_isakmp_server_packets" lineno="30091"> <summary> Send and receive isakmp_server packets. </summary> @@ -34335,7 +28132,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38590"> +<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="30107"> <summary> Do not audit attempts to send and receive isakmp_server packets. </summary> @@ -34346,7 +28143,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_isakmp_server_packets" lineno="38605"> +<interface name="corenet_relabelto_isakmp_server_packets" lineno="30122"> <summary> Relabel packets to isakmp_server the packet type. </summary> @@ -34356,85 +28153,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38627"> -<summary> -Send and receive TCP traffic on the iscsi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_iscsi_port" lineno="38642"> -<summary> -Send UDP traffic on the iscsi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38657"> -<summary> -Do not audit attempts to send UDP traffic on the iscsi port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_iscsi_port" lineno="38672"> -<summary> -Receive UDP traffic on the iscsi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38687"> -<summary> -Do not audit attempts to receive UDP traffic on the iscsi port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38702"> -<summary> -Send and receive UDP traffic on the iscsi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38718"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the iscsi port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_iscsi_port" lineno="38733"> +<interface name="corenet_tcp_bind_iscsi_port" lineno="30144"> <summary> Bind TCP sockets to the iscsi port. </summary> @@ -34445,7 +28164,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_iscsi_port" lineno="38753"> +<interface name="corenet_udp_bind_iscsi_port" lineno="30164"> <summary> Bind UDP sockets to the iscsi port. </summary> @@ -34456,7 +28175,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_iscsi_port" lineno="38772"> +<interface name="corenet_tcp_connect_iscsi_port" lineno="30183"> <summary> Make a TCP connection to the iscsi port. </summary> @@ -34466,7 +28185,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_iscsi_client_packets" lineno="38792"> +<interface name="corenet_send_iscsi_client_packets" lineno="30203"> <summary> Send iscsi_client packets. </summary> @@ -34477,7 +28196,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38811"> +<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="30222"> <summary> Do not audit attempts to send iscsi_client packets. </summary> @@ -34488,7 +28207,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_iscsi_client_packets" lineno="38830"> +<interface name="corenet_receive_iscsi_client_packets" lineno="30241"> <summary> Receive iscsi_client packets. </summary> @@ -34499,7 +28218,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38849"> +<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="30260"> <summary> Do not audit attempts to receive iscsi_client packets. </summary> @@ -34510,7 +28229,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38868"> +<interface name="corenet_sendrecv_iscsi_client_packets" lineno="30279"> <summary> Send and receive iscsi_client packets. </summary> @@ -34521,7 +28240,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38884"> +<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="30295"> <summary> Do not audit attempts to send and receive iscsi_client packets. </summary> @@ -34532,7 +28251,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_iscsi_client_packets" lineno="38899"> +<interface name="corenet_relabelto_iscsi_client_packets" lineno="30310"> <summary> Relabel packets to iscsi_client the packet type. </summary> @@ -34542,7 +28261,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_iscsi_server_packets" lineno="38919"> +<interface name="corenet_send_iscsi_server_packets" lineno="30330"> <summary> Send iscsi_server packets. </summary> @@ -34553,7 +28272,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38938"> +<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="30349"> <summary> Do not audit attempts to send iscsi_server packets. </summary> @@ -34564,7 +28283,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_iscsi_server_packets" lineno="38957"> +<interface name="corenet_receive_iscsi_server_packets" lineno="30368"> <summary> Receive iscsi_server packets. </summary> @@ -34575,7 +28294,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38976"> +<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="30387"> <summary> Do not audit attempts to receive iscsi_server packets. </summary> @@ -34586,7 +28305,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38995"> +<interface name="corenet_sendrecv_iscsi_server_packets" lineno="30406"> <summary> Send and receive iscsi_server packets. </summary> @@ -34597,7 +28316,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="39011"> +<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="30422"> <summary> Do not audit attempts to send and receive iscsi_server packets. </summary> @@ -34608,7 +28327,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_iscsi_server_packets" lineno="39026"> +<interface name="corenet_relabelto_iscsi_server_packets" lineno="30437"> <summary> Relabel packets to iscsi_server the packet type. </summary> @@ -34618,85 +28337,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_isns_port" lineno="39048"> -<summary> -Send and receive TCP traffic on the isns port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_isns_port" lineno="39063"> -<summary> -Send UDP traffic on the isns port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_isns_port" lineno="39078"> -<summary> -Do not audit attempts to send UDP traffic on the isns port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_isns_port" lineno="39093"> -<summary> -Receive UDP traffic on the isns port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="39108"> -<summary> -Do not audit attempts to receive UDP traffic on the isns port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_isns_port" lineno="39123"> -<summary> -Send and receive UDP traffic on the isns port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="39139"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the isns port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_isns_port" lineno="39154"> +<interface name="corenet_tcp_bind_isns_port" lineno="30459"> <summary> Bind TCP sockets to the isns port. </summary> @@ -34707,7 +28348,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_isns_port" lineno="39174"> +<interface name="corenet_udp_bind_isns_port" lineno="30479"> <summary> Bind UDP sockets to the isns port. </summary> @@ -34718,7 +28359,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_isns_port" lineno="39193"> +<interface name="corenet_tcp_connect_isns_port" lineno="30498"> <summary> Make a TCP connection to the isns port. </summary> @@ -34728,7 +28369,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_isns_client_packets" lineno="39213"> +<interface name="corenet_send_isns_client_packets" lineno="30518"> <summary> Send isns_client packets. </summary> @@ -34739,7 +28380,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39232"> +<interface name="corenet_dontaudit_send_isns_client_packets" lineno="30537"> <summary> Do not audit attempts to send isns_client packets. </summary> @@ -34750,7 +28391,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_isns_client_packets" lineno="39251"> +<interface name="corenet_receive_isns_client_packets" lineno="30556"> <summary> Receive isns_client packets. </summary> @@ -34761,7 +28402,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39270"> +<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="30575"> <summary> Do not audit attempts to receive isns_client packets. </summary> @@ -34772,7 +28413,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_isns_client_packets" lineno="39289"> +<interface name="corenet_sendrecv_isns_client_packets" lineno="30594"> <summary> Send and receive isns_client packets. </summary> @@ -34783,7 +28424,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39305"> +<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="30610"> <summary> Do not audit attempts to send and receive isns_client packets. </summary> @@ -34794,7 +28435,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_isns_client_packets" lineno="39320"> +<interface name="corenet_relabelto_isns_client_packets" lineno="30625"> <summary> Relabel packets to isns_client the packet type. </summary> @@ -34804,7 +28445,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_isns_server_packets" lineno="39340"> +<interface name="corenet_send_isns_server_packets" lineno="30645"> <summary> Send isns_server packets. </summary> @@ -34815,7 +28456,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39359"> +<interface name="corenet_dontaudit_send_isns_server_packets" lineno="30664"> <summary> Do not audit attempts to send isns_server packets. </summary> @@ -34826,7 +28467,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_isns_server_packets" lineno="39378"> +<interface name="corenet_receive_isns_server_packets" lineno="30683"> <summary> Receive isns_server packets. </summary> @@ -34837,7 +28478,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39397"> +<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="30702"> <summary> Do not audit attempts to receive isns_server packets. </summary> @@ -34848,7 +28489,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_isns_server_packets" lineno="39416"> +<interface name="corenet_sendrecv_isns_server_packets" lineno="30721"> <summary> Send and receive isns_server packets. </summary> @@ -34859,7 +28500,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39432"> +<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="30737"> <summary> Do not audit attempts to send and receive isns_server packets. </summary> @@ -34870,7 +28511,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_isns_server_packets" lineno="39447"> +<interface name="corenet_relabelto_isns_server_packets" lineno="30752"> <summary> Relabel packets to isns_server the packet type. </summary> @@ -34880,85 +28521,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39469"> -<summary> -Send and receive TCP traffic on the jabber_client port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_jabber_client_port" lineno="39484"> -<summary> -Send UDP traffic on the jabber_client port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39499"> -<summary> -Do not audit attempts to send UDP traffic on the jabber_client port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_jabber_client_port" lineno="39514"> -<summary> -Receive UDP traffic on the jabber_client port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39529"> -<summary> -Do not audit attempts to receive UDP traffic on the jabber_client port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39544"> -<summary> -Send and receive UDP traffic on the jabber_client port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39560"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the jabber_client port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_jabber_client_port" lineno="39575"> +<interface name="corenet_tcp_bind_jabber_client_port" lineno="30774"> <summary> Bind TCP sockets to the jabber_client port. </summary> @@ -34969,7 +28532,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_jabber_client_port" lineno="39595"> +<interface name="corenet_udp_bind_jabber_client_port" lineno="30794"> <summary> Bind UDP sockets to the jabber_client port. </summary> @@ -34980,7 +28543,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_jabber_client_port" lineno="39614"> +<interface name="corenet_tcp_connect_jabber_client_port" lineno="30813"> <summary> Make a TCP connection to the jabber_client port. </summary> @@ -34990,7 +28553,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jabber_client_client_packets" lineno="39634"> +<interface name="corenet_send_jabber_client_client_packets" lineno="30833"> <summary> Send jabber_client_client packets. </summary> @@ -35001,7 +28564,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39653"> +<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="30852"> <summary> Do not audit attempts to send jabber_client_client packets. </summary> @@ -35012,7 +28575,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jabber_client_client_packets" lineno="39672"> +<interface name="corenet_receive_jabber_client_client_packets" lineno="30871"> <summary> Receive jabber_client_client packets. </summary> @@ -35023,7 +28586,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39691"> +<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="30890"> <summary> Do not audit attempts to receive jabber_client_client packets. </summary> @@ -35034,7 +28597,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39710"> +<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="30909"> <summary> Send and receive jabber_client_client packets. </summary> @@ -35045,7 +28608,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39726"> +<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="30925"> <summary> Do not audit attempts to send and receive jabber_client_client packets. </summary> @@ -35056,7 +28619,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39741"> +<interface name="corenet_relabelto_jabber_client_client_packets" lineno="30940"> <summary> Relabel packets to jabber_client_client the packet type. </summary> @@ -35066,7 +28629,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jabber_client_server_packets" lineno="39761"> +<interface name="corenet_send_jabber_client_server_packets" lineno="30960"> <summary> Send jabber_client_server packets. </summary> @@ -35077,7 +28640,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39780"> +<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="30979"> <summary> Do not audit attempts to send jabber_client_server packets. </summary> @@ -35088,7 +28651,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jabber_client_server_packets" lineno="39799"> +<interface name="corenet_receive_jabber_client_server_packets" lineno="30998"> <summary> Receive jabber_client_server packets. </summary> @@ -35099,7 +28662,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39818"> +<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="31017"> <summary> Do not audit attempts to receive jabber_client_server packets. </summary> @@ -35110,7 +28673,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39837"> +<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="31036"> <summary> Send and receive jabber_client_server packets. </summary> @@ -35121,7 +28684,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39853"> +<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="31052"> <summary> Do not audit attempts to send and receive jabber_client_server packets. </summary> @@ -35132,7 +28695,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39868"> +<interface name="corenet_relabelto_jabber_client_server_packets" lineno="31067"> <summary> Relabel packets to jabber_client_server the packet type. </summary> @@ -35142,85 +28705,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39890"> -<summary> -Send and receive TCP traffic on the jabber_interserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_jabber_interserver_port" lineno="39905"> -<summary> -Send UDP traffic on the jabber_interserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39920"> -<summary> -Do not audit attempts to send UDP traffic on the jabber_interserver port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39935"> -<summary> -Receive UDP traffic on the jabber_interserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39950"> -<summary> -Do not audit attempts to receive UDP traffic on the jabber_interserver port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39965"> -<summary> -Send and receive UDP traffic on the jabber_interserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39981"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the jabber_interserver port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39996"> +<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="31089"> <summary> Bind TCP sockets to the jabber_interserver port. </summary> @@ -35231,7 +28716,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_jabber_interserver_port" lineno="40016"> +<interface name="corenet_udp_bind_jabber_interserver_port" lineno="31109"> <summary> Bind UDP sockets to the jabber_interserver port. </summary> @@ -35242,7 +28727,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="40035"> +<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="31128"> <summary> Make a TCP connection to the jabber_interserver port. </summary> @@ -35252,7 +28737,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jabber_interserver_client_packets" lineno="40055"> +<interface name="corenet_send_jabber_interserver_client_packets" lineno="31148"> <summary> Send jabber_interserver_client packets. </summary> @@ -35263,7 +28748,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="40074"> +<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="31167"> <summary> Do not audit attempts to send jabber_interserver_client packets. </summary> @@ -35274,7 +28759,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jabber_interserver_client_packets" lineno="40093"> +<interface name="corenet_receive_jabber_interserver_client_packets" lineno="31186"> <summary> Receive jabber_interserver_client packets. </summary> @@ -35285,7 +28770,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="40112"> +<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="31205"> <summary> Do not audit attempts to receive jabber_interserver_client packets. </summary> @@ -35296,7 +28781,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="40131"> +<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="31224"> <summary> Send and receive jabber_interserver_client packets. </summary> @@ -35307,7 +28792,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40147"> +<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="31240"> <summary> Do not audit attempts to send and receive jabber_interserver_client packets. </summary> @@ -35318,7 +28803,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40162"> +<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="31255"> <summary> Relabel packets to jabber_interserver_client the packet type. </summary> @@ -35328,7 +28813,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jabber_interserver_server_packets" lineno="40182"> +<interface name="corenet_send_jabber_interserver_server_packets" lineno="31275"> <summary> Send jabber_interserver_server packets. </summary> @@ -35339,7 +28824,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40201"> +<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="31294"> <summary> Do not audit attempts to send jabber_interserver_server packets. </summary> @@ -35350,7 +28835,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40220"> +<interface name="corenet_receive_jabber_interserver_server_packets" lineno="31313"> <summary> Receive jabber_interserver_server packets. </summary> @@ -35361,7 +28846,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40239"> +<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="31332"> <summary> Do not audit attempts to receive jabber_interserver_server packets. </summary> @@ -35372,7 +28857,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40258"> +<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="31351"> <summary> Send and receive jabber_interserver_server packets. </summary> @@ -35383,7 +28868,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40274"> +<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="31367"> <summary> Do not audit attempts to send and receive jabber_interserver_server packets. </summary> @@ -35394,7 +28879,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40289"> +<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="31382"> <summary> Relabel packets to jabber_interserver_server the packet type. </summary> @@ -35404,85 +28889,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40311"> -<summary> -Send and receive TCP traffic on the jboss_iiop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_jboss_iiop_port" lineno="40326"> -<summary> -Send UDP traffic on the jboss_iiop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40341"> -<summary> -Do not audit attempts to send UDP traffic on the jboss_iiop port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40356"> -<summary> -Receive UDP traffic on the jboss_iiop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40371"> -<summary> -Do not audit attempts to receive UDP traffic on the jboss_iiop port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40386"> -<summary> -Send and receive UDP traffic on the jboss_iiop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40402"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the jboss_iiop port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40417"> +<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="31404"> <summary> Bind TCP sockets to the jboss_iiop port. </summary> @@ -35493,7 +28900,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40437"> +<interface name="corenet_udp_bind_jboss_iiop_port" lineno="31424"> <summary> Bind UDP sockets to the jboss_iiop port. </summary> @@ -35504,7 +28911,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40456"> +<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="31443"> <summary> Make a TCP connection to the jboss_iiop port. </summary> @@ -35514,7 +28921,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jboss_iiop_client_packets" lineno="40476"> +<interface name="corenet_send_jboss_iiop_client_packets" lineno="31463"> <summary> Send jboss_iiop_client packets. </summary> @@ -35525,7 +28932,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40495"> +<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="31482"> <summary> Do not audit attempts to send jboss_iiop_client packets. </summary> @@ -35536,7 +28943,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40514"> +<interface name="corenet_receive_jboss_iiop_client_packets" lineno="31501"> <summary> Receive jboss_iiop_client packets. </summary> @@ -35547,7 +28954,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40533"> +<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="31520"> <summary> Do not audit attempts to receive jboss_iiop_client packets. </summary> @@ -35558,7 +28965,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40552"> +<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="31539"> <summary> Send and receive jboss_iiop_client packets. </summary> @@ -35569,7 +28976,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40568"> +<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="31555"> <summary> Do not audit attempts to send and receive jboss_iiop_client packets. </summary> @@ -35580,7 +28987,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40583"> +<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="31570"> <summary> Relabel packets to jboss_iiop_client the packet type. </summary> @@ -35590,7 +28997,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_jboss_iiop_server_packets" lineno="40603"> +<interface name="corenet_send_jboss_iiop_server_packets" lineno="31590"> <summary> Send jboss_iiop_server packets. </summary> @@ -35601,7 +29008,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40622"> +<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="31609"> <summary> Do not audit attempts to send jboss_iiop_server packets. </summary> @@ -35612,7 +29019,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40641"> +<interface name="corenet_receive_jboss_iiop_server_packets" lineno="31628"> <summary> Receive jboss_iiop_server packets. </summary> @@ -35623,7 +29030,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40660"> +<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="31647"> <summary> Do not audit attempts to receive jboss_iiop_server packets. </summary> @@ -35634,7 +29041,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40679"> +<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="31666"> <summary> Send and receive jboss_iiop_server packets. </summary> @@ -35645,7 +29052,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40695"> +<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="31682"> <summary> Do not audit attempts to send and receive jboss_iiop_server packets. </summary> @@ -35656,7 +29063,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40710"> +<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="31697"> <summary> Relabel packets to jboss_iiop_server the packet type. </summary> @@ -35666,85 +29073,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40732"> -<summary> -Send and receive TCP traffic on the kerberos port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_kerberos_port" lineno="40747"> -<summary> -Send UDP traffic on the kerberos port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40762"> -<summary> -Do not audit attempts to send UDP traffic on the kerberos port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_kerberos_port" lineno="40777"> -<summary> -Receive UDP traffic on the kerberos port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40792"> -<summary> -Do not audit attempts to receive UDP traffic on the kerberos port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40807"> -<summary> -Send and receive UDP traffic on the kerberos port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40823"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the kerberos port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_kerberos_port" lineno="40838"> +<interface name="corenet_tcp_bind_kerberos_port" lineno="31719"> <summary> Bind TCP sockets to the kerberos port. </summary> @@ -35755,7 +29084,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kerberos_port" lineno="40858"> +<interface name="corenet_udp_bind_kerberos_port" lineno="31739"> <summary> Bind UDP sockets to the kerberos port. </summary> @@ -35766,7 +29095,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kerberos_port" lineno="40877"> +<interface name="corenet_tcp_connect_kerberos_port" lineno="31758"> <summary> Make a TCP connection to the kerberos port. </summary> @@ -35776,7 +29105,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_client_packets" lineno="40897"> +<interface name="corenet_send_kerberos_client_packets" lineno="31778"> <summary> Send kerberos_client packets. </summary> @@ -35787,7 +29116,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40916"> +<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="31797"> <summary> Do not audit attempts to send kerberos_client packets. </summary> @@ -35798,7 +29127,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_client_packets" lineno="40935"> +<interface name="corenet_receive_kerberos_client_packets" lineno="31816"> <summary> Receive kerberos_client packets. </summary> @@ -35809,7 +29138,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40954"> +<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="31835"> <summary> Do not audit attempts to receive kerberos_client packets. </summary> @@ -35820,7 +29149,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40973"> +<interface name="corenet_sendrecv_kerberos_client_packets" lineno="31854"> <summary> Send and receive kerberos_client packets. </summary> @@ -35831,7 +29160,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40989"> +<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="31870"> <summary> Do not audit attempts to send and receive kerberos_client packets. </summary> @@ -35842,7 +29171,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_client_packets" lineno="41004"> +<interface name="corenet_relabelto_kerberos_client_packets" lineno="31885"> <summary> Relabel packets to kerberos_client the packet type. </summary> @@ -35852,7 +29181,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_server_packets" lineno="41024"> +<interface name="corenet_send_kerberos_server_packets" lineno="31905"> <summary> Send kerberos_server packets. </summary> @@ -35863,7 +29192,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="41043"> +<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="31924"> <summary> Do not audit attempts to send kerberos_server packets. </summary> @@ -35874,7 +29203,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_server_packets" lineno="41062"> +<interface name="corenet_receive_kerberos_server_packets" lineno="31943"> <summary> Receive kerberos_server packets. </summary> @@ -35885,7 +29214,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="41081"> +<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="31962"> <summary> Do not audit attempts to receive kerberos_server packets. </summary> @@ -35896,7 +29225,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_server_packets" lineno="41100"> +<interface name="corenet_sendrecv_kerberos_server_packets" lineno="31981"> <summary> Send and receive kerberos_server packets. </summary> @@ -35907,7 +29236,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="41116"> +<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="31997"> <summary> Do not audit attempts to send and receive kerberos_server packets. </summary> @@ -35918,7 +29247,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_server_packets" lineno="41131"> +<interface name="corenet_relabelto_kerberos_server_packets" lineno="32012"> <summary> Relabel packets to kerberos_server the packet type. </summary> @@ -35928,85 +29257,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41153"> -<summary> -Send and receive TCP traffic on the kerberos_admin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_kerberos_admin_port" lineno="41168"> -<summary> -Send UDP traffic on the kerberos_admin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41183"> -<summary> -Do not audit attempts to send UDP traffic on the kerberos_admin port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41198"> -<summary> -Receive UDP traffic on the kerberos_admin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41213"> -<summary> -Do not audit attempts to receive UDP traffic on the kerberos_admin port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41228"> -<summary> -Send and receive UDP traffic on the kerberos_admin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41244"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the kerberos_admin port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41259"> +<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="32034"> <summary> Bind TCP sockets to the kerberos_admin port. </summary> @@ -36017,7 +29268,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41279"> +<interface name="corenet_udp_bind_kerberos_admin_port" lineno="32054"> <summary> Bind UDP sockets to the kerberos_admin port. </summary> @@ -36028,7 +29279,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41298"> +<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="32073"> <summary> Make a TCP connection to the kerberos_admin port. </summary> @@ -36038,7 +29289,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_admin_client_packets" lineno="41318"> +<interface name="corenet_send_kerberos_admin_client_packets" lineno="32093"> <summary> Send kerberos_admin_client packets. </summary> @@ -36049,7 +29300,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41337"> +<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="32112"> <summary> Do not audit attempts to send kerberos_admin_client packets. </summary> @@ -36060,7 +29311,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41356"> +<interface name="corenet_receive_kerberos_admin_client_packets" lineno="32131"> <summary> Receive kerberos_admin_client packets. </summary> @@ -36071,7 +29322,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41375"> +<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="32150"> <summary> Do not audit attempts to receive kerberos_admin_client packets. </summary> @@ -36082,7 +29333,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41394"> +<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="32169"> <summary> Send and receive kerberos_admin_client packets. </summary> @@ -36093,7 +29344,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41410"> +<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="32185"> <summary> Do not audit attempts to send and receive kerberos_admin_client packets. </summary> @@ -36104,7 +29355,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41425"> +<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="32200"> <summary> Relabel packets to kerberos_admin_client the packet type. </summary> @@ -36114,7 +29365,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_admin_server_packets" lineno="41445"> +<interface name="corenet_send_kerberos_admin_server_packets" lineno="32220"> <summary> Send kerberos_admin_server packets. </summary> @@ -36125,7 +29376,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41464"> +<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="32239"> <summary> Do not audit attempts to send kerberos_admin_server packets. </summary> @@ -36136,7 +29387,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41483"> +<interface name="corenet_receive_kerberos_admin_server_packets" lineno="32258"> <summary> Receive kerberos_admin_server packets. </summary> @@ -36147,7 +29398,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41502"> +<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="32277"> <summary> Do not audit attempts to receive kerberos_admin_server packets. </summary> @@ -36158,7 +29409,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41521"> +<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="32296"> <summary> Send and receive kerberos_admin_server packets. </summary> @@ -36169,7 +29420,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41537"> +<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="32312"> <summary> Do not audit attempts to send and receive kerberos_admin_server packets. </summary> @@ -36180,7 +29431,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41552"> +<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="32327"> <summary> Relabel packets to kerberos_admin_server the packet type. </summary> @@ -36190,85 +29441,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41574"> -<summary> -Send and receive TCP traffic on the kerberos_master port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_kerberos_master_port" lineno="41589"> -<summary> -Send UDP traffic on the kerberos_master port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41604"> -<summary> -Do not audit attempts to send UDP traffic on the kerberos_master port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_kerberos_master_port" lineno="41619"> -<summary> -Receive UDP traffic on the kerberos_master port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41634"> -<summary> -Do not audit attempts to receive UDP traffic on the kerberos_master port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41649"> -<summary> -Send and receive UDP traffic on the kerberos_master port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41665"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the kerberos_master port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41680"> +<interface name="corenet_tcp_bind_kerberos_master_port" lineno="32349"> <summary> Bind TCP sockets to the kerberos_master port. </summary> @@ -36279,7 +29452,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kerberos_master_port" lineno="41700"> +<interface name="corenet_udp_bind_kerberos_master_port" lineno="32369"> <summary> Bind UDP sockets to the kerberos_master port. </summary> @@ -36290,7 +29463,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41719"> +<interface name="corenet_tcp_connect_kerberos_master_port" lineno="32388"> <summary> Make a TCP connection to the kerberos_master port. </summary> @@ -36300,7 +29473,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_master_client_packets" lineno="41739"> +<interface name="corenet_send_kerberos_master_client_packets" lineno="32408"> <summary> Send kerberos_master_client packets. </summary> @@ -36311,7 +29484,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41758"> +<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="32427"> <summary> Do not audit attempts to send kerberos_master_client packets. </summary> @@ -36322,7 +29495,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_master_client_packets" lineno="41777"> +<interface name="corenet_receive_kerberos_master_client_packets" lineno="32446"> <summary> Receive kerberos_master_client packets. </summary> @@ -36333,7 +29506,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41796"> +<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="32465"> <summary> Do not audit attempts to receive kerberos_master_client packets. </summary> @@ -36344,7 +29517,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41815"> +<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="32484"> <summary> Send and receive kerberos_master_client packets. </summary> @@ -36355,7 +29528,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41831"> +<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="32500"> <summary> Do not audit attempts to send and receive kerberos_master_client packets. </summary> @@ -36366,7 +29539,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41846"> +<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="32515"> <summary> Relabel packets to kerberos_master_client the packet type. </summary> @@ -36376,7 +29549,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kerberos_master_server_packets" lineno="41866"> +<interface name="corenet_send_kerberos_master_server_packets" lineno="32535"> <summary> Send kerberos_master_server packets. </summary> @@ -36387,7 +29560,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41885"> +<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="32554"> <summary> Do not audit attempts to send kerberos_master_server packets. </summary> @@ -36398,7 +29571,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kerberos_master_server_packets" lineno="41904"> +<interface name="corenet_receive_kerberos_master_server_packets" lineno="32573"> <summary> Receive kerberos_master_server packets. </summary> @@ -36409,7 +29582,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41923"> +<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="32592"> <summary> Do not audit attempts to receive kerberos_master_server packets. </summary> @@ -36420,7 +29593,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41942"> +<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="32611"> <summary> Send and receive kerberos_master_server packets. </summary> @@ -36431,7 +29604,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41958"> +<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="32627"> <summary> Do not audit attempts to send and receive kerberos_master_server packets. </summary> @@ -36442,7 +29615,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41973"> +<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="32642"> <summary> Relabel packets to kerberos_master_server the packet type. </summary> @@ -36452,85 +29625,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41995"> -<summary> -Send and receive TCP traffic on the kismet port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_kismet_port" lineno="42010"> -<summary> -Send UDP traffic on the kismet port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="42025"> -<summary> -Do not audit attempts to send UDP traffic on the kismet port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_kismet_port" lineno="42040"> -<summary> -Receive UDP traffic on the kismet port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="42055"> -<summary> -Do not audit attempts to receive UDP traffic on the kismet port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_kismet_port" lineno="42070"> -<summary> -Send and receive UDP traffic on the kismet port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="42086"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the kismet port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_kismet_port" lineno="42101"> +<interface name="corenet_tcp_bind_kismet_port" lineno="32664"> <summary> Bind TCP sockets to the kismet port. </summary> @@ -36541,7 +29636,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kismet_port" lineno="42121"> +<interface name="corenet_udp_bind_kismet_port" lineno="32684"> <summary> Bind UDP sockets to the kismet port. </summary> @@ -36552,7 +29647,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kismet_port" lineno="42140"> +<interface name="corenet_tcp_connect_kismet_port" lineno="32703"> <summary> Make a TCP connection to the kismet port. </summary> @@ -36562,7 +29657,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kismet_client_packets" lineno="42160"> +<interface name="corenet_send_kismet_client_packets" lineno="32723"> <summary> Send kismet_client packets. </summary> @@ -36573,7 +29668,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42179"> +<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="32742"> <summary> Do not audit attempts to send kismet_client packets. </summary> @@ -36584,7 +29679,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kismet_client_packets" lineno="42198"> +<interface name="corenet_receive_kismet_client_packets" lineno="32761"> <summary> Receive kismet_client packets. </summary> @@ -36595,7 +29690,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42217"> +<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="32780"> <summary> Do not audit attempts to receive kismet_client packets. </summary> @@ -36606,7 +29701,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kismet_client_packets" lineno="42236"> +<interface name="corenet_sendrecv_kismet_client_packets" lineno="32799"> <summary> Send and receive kismet_client packets. </summary> @@ -36617,7 +29712,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42252"> +<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="32815"> <summary> Do not audit attempts to send and receive kismet_client packets. </summary> @@ -36628,7 +29723,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kismet_client_packets" lineno="42267"> +<interface name="corenet_relabelto_kismet_client_packets" lineno="32830"> <summary> Relabel packets to kismet_client the packet type. </summary> @@ -36638,7 +29733,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kismet_server_packets" lineno="42287"> +<interface name="corenet_send_kismet_server_packets" lineno="32850"> <summary> Send kismet_server packets. </summary> @@ -36649,7 +29744,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42306"> +<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="32869"> <summary> Do not audit attempts to send kismet_server packets. </summary> @@ -36660,7 +29755,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kismet_server_packets" lineno="42325"> +<interface name="corenet_receive_kismet_server_packets" lineno="32888"> <summary> Receive kismet_server packets. </summary> @@ -36671,7 +29766,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42344"> +<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="32907"> <summary> Do not audit attempts to receive kismet_server packets. </summary> @@ -36682,7 +29777,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kismet_server_packets" lineno="42363"> +<interface name="corenet_sendrecv_kismet_server_packets" lineno="32926"> <summary> Send and receive kismet_server packets. </summary> @@ -36693,7 +29788,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42379"> +<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="32942"> <summary> Do not audit attempts to send and receive kismet_server packets. </summary> @@ -36704,7 +29799,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kismet_server_packets" lineno="42394"> +<interface name="corenet_relabelto_kismet_server_packets" lineno="32957"> <summary> Relabel packets to kismet_server the packet type. </summary> @@ -36714,85 +29809,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42416"> -<summary> -Send and receive TCP traffic on the kdeconnect port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_kdeconnect_port" lineno="42431"> -<summary> -Send UDP traffic on the kdeconnect port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42446"> -<summary> -Do not audit attempts to send UDP traffic on the kdeconnect port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_kdeconnect_port" lineno="42461"> -<summary> -Receive UDP traffic on the kdeconnect port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42476"> -<summary> -Do not audit attempts to receive UDP traffic on the kdeconnect port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42491"> -<summary> -Send and receive UDP traffic on the kdeconnect port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42507"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the kdeconnect port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42522"> +<interface name="corenet_tcp_bind_kdeconnect_port" lineno="32979"> <summary> Bind TCP sockets to the kdeconnect port. </summary> @@ -36803,7 +29820,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kdeconnect_port" lineno="42542"> +<interface name="corenet_udp_bind_kdeconnect_port" lineno="32999"> <summary> Bind UDP sockets to the kdeconnect port. </summary> @@ -36814,7 +29831,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42561"> +<interface name="corenet_tcp_connect_kdeconnect_port" lineno="33018"> <summary> Make a TCP connection to the kdeconnect port. </summary> @@ -36824,7 +29841,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kdeconnect_client_packets" lineno="42581"> +<interface name="corenet_send_kdeconnect_client_packets" lineno="33038"> <summary> Send kdeconnect_client packets. </summary> @@ -36835,7 +29852,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42600"> +<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="33057"> <summary> Do not audit attempts to send kdeconnect_client packets. </summary> @@ -36846,7 +29863,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kdeconnect_client_packets" lineno="42619"> +<interface name="corenet_receive_kdeconnect_client_packets" lineno="33076"> <summary> Receive kdeconnect_client packets. </summary> @@ -36857,7 +29874,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42638"> +<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="33095"> <summary> Do not audit attempts to receive kdeconnect_client packets. </summary> @@ -36868,7 +29885,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42657"> +<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="33114"> <summary> Send and receive kdeconnect_client packets. </summary> @@ -36879,7 +29896,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42673"> +<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="33130"> <summary> Do not audit attempts to send and receive kdeconnect_client packets. </summary> @@ -36890,7 +29907,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42688"> +<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="33145"> <summary> Relabel packets to kdeconnect_client the packet type. </summary> @@ -36900,7 +29917,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kdeconnect_server_packets" lineno="42708"> +<interface name="corenet_send_kdeconnect_server_packets" lineno="33165"> <summary> Send kdeconnect_server packets. </summary> @@ -36911,7 +29928,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42727"> +<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="33184"> <summary> Do not audit attempts to send kdeconnect_server packets. </summary> @@ -36922,7 +29939,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kdeconnect_server_packets" lineno="42746"> +<interface name="corenet_receive_kdeconnect_server_packets" lineno="33203"> <summary> Receive kdeconnect_server packets. </summary> @@ -36933,7 +29950,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42765"> +<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="33222"> <summary> Do not audit attempts to receive kdeconnect_server packets. </summary> @@ -36944,7 +29961,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42784"> +<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="33241"> <summary> Send and receive kdeconnect_server packets. </summary> @@ -36955,7 +29972,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42800"> +<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="33257"> <summary> Do not audit attempts to send and receive kdeconnect_server packets. </summary> @@ -36966,7 +29983,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42815"> +<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="33272"> <summary> Relabel packets to kdeconnect_server the packet type. </summary> @@ -36976,85 +29993,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42837"> -<summary> -Send and receive TCP traffic on the kprop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_kprop_port" lineno="42852"> -<summary> -Send UDP traffic on the kprop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42867"> -<summary> -Do not audit attempts to send UDP traffic on the kprop port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_kprop_port" lineno="42882"> -<summary> -Receive UDP traffic on the kprop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42897"> -<summary> -Do not audit attempts to receive UDP traffic on the kprop port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_kprop_port" lineno="42912"> -<summary> -Send and receive UDP traffic on the kprop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42928"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the kprop port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_kprop_port" lineno="42943"> +<interface name="corenet_tcp_bind_kprop_port" lineno="33294"> <summary> Bind TCP sockets to the kprop port. </summary> @@ -37065,7 +30004,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_kprop_port" lineno="42963"> +<interface name="corenet_udp_bind_kprop_port" lineno="33314"> <summary> Bind UDP sockets to the kprop port. </summary> @@ -37076,7 +30015,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_kprop_port" lineno="42982"> +<interface name="corenet_tcp_connect_kprop_port" lineno="33333"> <summary> Make a TCP connection to the kprop port. </summary> @@ -37086,7 +30025,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kprop_client_packets" lineno="43002"> +<interface name="corenet_send_kprop_client_packets" lineno="33353"> <summary> Send kprop_client packets. </summary> @@ -37097,7 +30036,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="43021"> +<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="33372"> <summary> Do not audit attempts to send kprop_client packets. </summary> @@ -37108,7 +30047,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kprop_client_packets" lineno="43040"> +<interface name="corenet_receive_kprop_client_packets" lineno="33391"> <summary> Receive kprop_client packets. </summary> @@ -37119,7 +30058,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="43059"> +<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="33410"> <summary> Do not audit attempts to receive kprop_client packets. </summary> @@ -37130,7 +30069,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kprop_client_packets" lineno="43078"> +<interface name="corenet_sendrecv_kprop_client_packets" lineno="33429"> <summary> Send and receive kprop_client packets. </summary> @@ -37141,7 +30080,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="43094"> +<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="33445"> <summary> Do not audit attempts to send and receive kprop_client packets. </summary> @@ -37152,7 +30091,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kprop_client_packets" lineno="43109"> +<interface name="corenet_relabelto_kprop_client_packets" lineno="33460"> <summary> Relabel packets to kprop_client the packet type. </summary> @@ -37162,7 +30101,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_kprop_server_packets" lineno="43129"> +<interface name="corenet_send_kprop_server_packets" lineno="33480"> <summary> Send kprop_server packets. </summary> @@ -37173,7 +30112,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43148"> +<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="33499"> <summary> Do not audit attempts to send kprop_server packets. </summary> @@ -37184,7 +30123,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_kprop_server_packets" lineno="43167"> +<interface name="corenet_receive_kprop_server_packets" lineno="33518"> <summary> Receive kprop_server packets. </summary> @@ -37195,7 +30134,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43186"> +<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="33537"> <summary> Do not audit attempts to receive kprop_server packets. </summary> @@ -37206,7 +30145,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_kprop_server_packets" lineno="43205"> +<interface name="corenet_sendrecv_kprop_server_packets" lineno="33556"> <summary> Send and receive kprop_server packets. </summary> @@ -37217,7 +30156,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43221"> +<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="33572"> <summary> Do not audit attempts to send and receive kprop_server packets. </summary> @@ -37228,7 +30167,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_kprop_server_packets" lineno="43236"> +<interface name="corenet_relabelto_kprop_server_packets" lineno="33587"> <summary> Relabel packets to kprop_server the packet type. </summary> @@ -37238,85 +30177,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43258"> -<summary> -Send and receive TCP traffic on the ktalkd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ktalkd_port" lineno="43273"> -<summary> -Send UDP traffic on the ktalkd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43288"> -<summary> -Do not audit attempts to send UDP traffic on the ktalkd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ktalkd_port" lineno="43303"> -<summary> -Receive UDP traffic on the ktalkd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43318"> -<summary> -Do not audit attempts to receive UDP traffic on the ktalkd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43333"> -<summary> -Send and receive UDP traffic on the ktalkd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43349"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ktalkd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ktalkd_port" lineno="43364"> +<interface name="corenet_tcp_bind_ktalkd_port" lineno="33609"> <summary> Bind TCP sockets to the ktalkd port. </summary> @@ -37327,7 +30188,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ktalkd_port" lineno="43384"> +<interface name="corenet_udp_bind_ktalkd_port" lineno="33629"> <summary> Bind UDP sockets to the ktalkd port. </summary> @@ -37338,7 +30199,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ktalkd_port" lineno="43403"> +<interface name="corenet_tcp_connect_ktalkd_port" lineno="33648"> <summary> Make a TCP connection to the ktalkd port. </summary> @@ -37348,7 +30209,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ktalkd_client_packets" lineno="43423"> +<interface name="corenet_send_ktalkd_client_packets" lineno="33668"> <summary> Send ktalkd_client packets. </summary> @@ -37359,7 +30220,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43442"> +<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="33687"> <summary> Do not audit attempts to send ktalkd_client packets. </summary> @@ -37370,7 +30231,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ktalkd_client_packets" lineno="43461"> +<interface name="corenet_receive_ktalkd_client_packets" lineno="33706"> <summary> Receive ktalkd_client packets. </summary> @@ -37381,7 +30242,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43480"> +<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="33725"> <summary> Do not audit attempts to receive ktalkd_client packets. </summary> @@ -37392,7 +30253,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43499"> +<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="33744"> <summary> Send and receive ktalkd_client packets. </summary> @@ -37403,7 +30264,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43515"> +<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="33760"> <summary> Do not audit attempts to send and receive ktalkd_client packets. </summary> @@ -37414,7 +30275,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43530"> +<interface name="corenet_relabelto_ktalkd_client_packets" lineno="33775"> <summary> Relabel packets to ktalkd_client the packet type. </summary> @@ -37424,7 +30285,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ktalkd_server_packets" lineno="43550"> +<interface name="corenet_send_ktalkd_server_packets" lineno="33795"> <summary> Send ktalkd_server packets. </summary> @@ -37435,7 +30296,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43569"> +<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="33814"> <summary> Do not audit attempts to send ktalkd_server packets. </summary> @@ -37446,7 +30307,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ktalkd_server_packets" lineno="43588"> +<interface name="corenet_receive_ktalkd_server_packets" lineno="33833"> <summary> Receive ktalkd_server packets. </summary> @@ -37457,7 +30318,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43607"> +<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="33852"> <summary> Do not audit attempts to receive ktalkd_server packets. </summary> @@ -37468,7 +30329,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43626"> +<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="33871"> <summary> Send and receive ktalkd_server packets. </summary> @@ -37479,7 +30340,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43642"> +<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="33887"> <summary> Do not audit attempts to send and receive ktalkd_server packets. </summary> @@ -37490,7 +30351,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43657"> +<interface name="corenet_relabelto_ktalkd_server_packets" lineno="33902"> <summary> Relabel packets to ktalkd_server the packet type. </summary> @@ -37500,53 +30361,52 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43679"> +<interface name="corenet_tcp_bind_kubernetes_port" lineno="33924"> <summary> -Send and receive TCP traffic on the l2tp port. +Bind TCP sockets to the kubernetes port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="both" weight="10"/> +<infoflow type="none"/> </interface> -<interface name="corenet_udp_send_l2tp_port" lineno="43694"> +<interface name="corenet_udp_bind_kubernetes_port" lineno="33944"> <summary> -Send UDP traffic on the l2tp port. +Bind UDP sockets to the kubernetes port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="write" weight="10"/> +<infoflow type="none"/> </interface> -<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43709"> +<interface name="corenet_tcp_connect_kubernetes_port" lineno="33963"> <summary> -Do not audit attempts to send UDP traffic on the l2tp port. +Make a TCP connection to the kubernetes port. </summary> <param name="domain"> <summary> -Domain to not audit. +Domain allowed access. </summary> </param> -<infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_l2tp_port" lineno="43724"> +<interface name="corenet_send_kubernetes_client_packets" lineno="33983"> <summary> -Receive UDP traffic on the l2tp port. +Send kubernetes_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="read" weight="10"/> +<infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43739"> +<interface name="corenet_dontaudit_send_kubernetes_client_packets" lineno="34002"> <summary> -Do not audit attempts to receive UDP traffic on the l2tp port. +Do not audit attempts to send kubernetes_client packets. </summary> <param name="domain"> <summary> @@ -37555,54 +30415,53 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43754"> +<interface name="corenet_receive_kubernetes_client_packets" lineno="34021"> <summary> -Send and receive UDP traffic on the l2tp port. +Receive kubernetes_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="both" weight="10"/> +<infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43770"> +<interface name="corenet_dontaudit_receive_kubernetes_client_packets" lineno="34040"> <summary> -Do not audit attempts to send and receive -UDP traffic on the l2tp port. +Do not audit attempts to receive kubernetes_client packets. </summary> <param name="domain"> <summary> -Domain to not audit. +Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_l2tp_port" lineno="43785"> +<interface name="corenet_sendrecv_kubernetes_client_packets" lineno="34059"> <summary> -Bind TCP sockets to the l2tp port. +Send and receive kubernetes_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="none"/> +<infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_bind_l2tp_port" lineno="43805"> +<interface name="corenet_dontaudit_sendrecv_kubernetes_client_packets" lineno="34075"> <summary> -Bind UDP sockets to the l2tp port. +Do not audit attempts to send and receive kubernetes_client packets. </summary> <param name="domain"> <summary> -Domain allowed access. +Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_l2tp_port" lineno="43824"> +<interface name="corenet_relabelto_kubernetes_client_packets" lineno="34090"> <summary> -Make a TCP connection to the l2tp port. +Relabel packets to kubernetes_client the packet type. </summary> <param name="domain"> <summary> @@ -37610,9 +30469,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_l2tp_client_packets" lineno="43844"> +<interface name="corenet_send_kubernetes_server_packets" lineno="34110"> <summary> -Send l2tp_client packets. +Send kubernetes_server packets. </summary> <param name="domain"> <summary> @@ -37621,9 +30480,9 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43863"> +<interface name="corenet_dontaudit_send_kubernetes_server_packets" lineno="34129"> <summary> -Do not audit attempts to send l2tp_client packets. +Do not audit attempts to send kubernetes_server packets. </summary> <param name="domain"> <summary> @@ -37632,9 +30491,9 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_l2tp_client_packets" lineno="43882"> +<interface name="corenet_receive_kubernetes_server_packets" lineno="34148"> <summary> -Receive l2tp_client packets. +Receive kubernetes_server packets. </summary> <param name="domain"> <summary> @@ -37643,9 +30502,9 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43901"> +<interface name="corenet_dontaudit_receive_kubernetes_server_packets" lineno="34167"> <summary> -Do not audit attempts to receive l2tp_client packets. +Do not audit attempts to receive kubernetes_server packets. </summary> <param name="domain"> <summary> @@ -37654,9 +30513,9 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43920"> +<interface name="corenet_sendrecv_kubernetes_server_packets" lineno="34186"> <summary> -Send and receive l2tp_client packets. +Send and receive kubernetes_server packets. </summary> <param name="domain"> <summary> @@ -37665,9 +30524,9 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43936"> +<interface name="corenet_dontaudit_sendrecv_kubernetes_server_packets" lineno="34202"> <summary> -Do not audit attempts to send and receive l2tp_client packets. +Do not audit attempts to send and receive kubernetes_server packets. </summary> <param name="domain"> <summary> @@ -37676,9 +30535,9 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_l2tp_client_packets" lineno="43951"> +<interface name="corenet_relabelto_kubernetes_server_packets" lineno="34217"> <summary> -Relabel packets to l2tp_client the packet type. +Relabel packets to kubernetes_server the packet type. </summary> <param name="domain"> <summary> @@ -37686,96 +30545,117 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_l2tp_server_packets" lineno="43971"> +<interface name="corenet_tcp_bind_l2tp_port" lineno="34239"> <summary> -Send l2tp_server packets. +Bind TCP sockets to the l2tp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="write" weight="10"/> +<infoflow type="none"/> </interface> -<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43990"> +<interface name="corenet_udp_bind_l2tp_port" lineno="34259"> <summary> -Do not audit attempts to send l2tp_server packets. +Bind UDP sockets to the l2tp port. </summary> <param name="domain"> <summary> -Domain to not audit. +Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_l2tp_server_packets" lineno="44009"> +<interface name="corenet_tcp_connect_l2tp_port" lineno="34278"> <summary> -Receive l2tp_server packets. +Make a TCP connection to the l2tp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="44028"> +<interface name="corenet_send_l2tp_client_packets" lineno="34298"> <summary> -Do not audit attempts to receive l2tp_server packets. +Send l2tp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="34317"> +<summary> +Do not audit attempts to send l2tp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_l2tp_server_packets" lineno="44047"> +<interface name="corenet_receive_l2tp_client_packets" lineno="34336"> <summary> -Send and receive l2tp_server packets. +Receive l2tp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="both" weight="10"/> +<infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="44063"> +<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="34355"> <summary> -Do not audit attempts to send and receive l2tp_server packets. +Do not audit attempts to receive l2tp_client packets. </summary> <param name="domain"> <summary> -Domain to not audit. +Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_l2tp_server_packets" lineno="44078"> +<interface name="corenet_sendrecv_l2tp_client_packets" lineno="34374"> <summary> -Relabel packets to l2tp_server the packet type. +Send and receive l2tp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> +<infoflow type="both" weight="10"/> </interface> -<interface name="corenet_tcp_sendrecv_ldap_port" lineno="44100"> +<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="34390"> <summary> -Send and receive TCP traffic on the ldap port. +Do not audit attempts to send and receive l2tp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_l2tp_client_packets" lineno="34405"> +<summary> +Relabel packets to l2tp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> -<infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_ldap_port" lineno="44115"> +<interface name="corenet_send_l2tp_server_packets" lineno="34425"> <summary> -Send UDP traffic on the ldap port. +Send l2tp_server packets. </summary> <param name="domain"> <summary> @@ -37784,9 +30664,9 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="44130"> +<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="34444"> <summary> -Do not audit attempts to send UDP traffic on the ldap port. +Do not audit attempts to send l2tp_server packets. </summary> <param name="domain"> <summary> @@ -37795,9 +30675,9 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_receive_ldap_port" lineno="44145"> +<interface name="corenet_receive_l2tp_server_packets" lineno="34463"> <summary> -Receive UDP traffic on the ldap port. +Receive l2tp_server packets. </summary> <param name="domain"> <summary> @@ -37806,20 +30686,20 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44160"> +<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="34482"> <summary> -Do not audit attempts to receive UDP traffic on the ldap port. +Do not audit attempts to receive l2tp_server packets. </summary> <param name="domain"> <summary> -Domain to not audit. +Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_sendrecv_ldap_port" lineno="44175"> +<interface name="corenet_sendrecv_l2tp_server_packets" lineno="34501"> <summary> -Send and receive UDP traffic on the ldap port. +Send and receive l2tp_server packets. </summary> <param name="domain"> <summary> @@ -37828,10 +30708,9 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44191"> +<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="34517"> <summary> -Do not audit attempts to send and receive -UDP traffic on the ldap port. +Do not audit attempts to send and receive l2tp_server packets. </summary> <param name="domain"> <summary> @@ -37840,7 +30719,17 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_bind_ldap_port" lineno="44206"> +<interface name="corenet_relabelto_l2tp_server_packets" lineno="34532"> +<summary> +Relabel packets to l2tp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_bind_ldap_port" lineno="34554"> <summary> Bind TCP sockets to the ldap port. </summary> @@ -37851,7 +30740,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ldap_port" lineno="44226"> +<interface name="corenet_udp_bind_ldap_port" lineno="34574"> <summary> Bind UDP sockets to the ldap port. </summary> @@ -37862,7 +30751,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ldap_port" lineno="44245"> +<interface name="corenet_tcp_connect_ldap_port" lineno="34593"> <summary> Make a TCP connection to the ldap port. </summary> @@ -37872,7 +30761,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ldap_client_packets" lineno="44265"> +<interface name="corenet_send_ldap_client_packets" lineno="34613"> <summary> Send ldap_client packets. </summary> @@ -37883,7 +30772,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44284"> +<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="34632"> <summary> Do not audit attempts to send ldap_client packets. </summary> @@ -37894,7 +30783,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ldap_client_packets" lineno="44303"> +<interface name="corenet_receive_ldap_client_packets" lineno="34651"> <summary> Receive ldap_client packets. </summary> @@ -37905,7 +30794,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44322"> +<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="34670"> <summary> Do not audit attempts to receive ldap_client packets. </summary> @@ -37916,7 +30805,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ldap_client_packets" lineno="44341"> +<interface name="corenet_sendrecv_ldap_client_packets" lineno="34689"> <summary> Send and receive ldap_client packets. </summary> @@ -37927,7 +30816,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44357"> +<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="34705"> <summary> Do not audit attempts to send and receive ldap_client packets. </summary> @@ -37938,7 +30827,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ldap_client_packets" lineno="44372"> +<interface name="corenet_relabelto_ldap_client_packets" lineno="34720"> <summary> Relabel packets to ldap_client the packet type. </summary> @@ -37948,7 +30837,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ldap_server_packets" lineno="44392"> +<interface name="corenet_send_ldap_server_packets" lineno="34740"> <summary> Send ldap_server packets. </summary> @@ -37959,7 +30848,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44411"> +<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="34759"> <summary> Do not audit attempts to send ldap_server packets. </summary> @@ -37970,7 +30859,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ldap_server_packets" lineno="44430"> +<interface name="corenet_receive_ldap_server_packets" lineno="34778"> <summary> Receive ldap_server packets. </summary> @@ -37981,7 +30870,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44449"> +<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="34797"> <summary> Do not audit attempts to receive ldap_server packets. </summary> @@ -37992,7 +30881,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ldap_server_packets" lineno="44468"> +<interface name="corenet_sendrecv_ldap_server_packets" lineno="34816"> <summary> Send and receive ldap_server packets. </summary> @@ -38003,7 +30892,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44484"> +<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="34832"> <summary> Do not audit attempts to send and receive ldap_server packets. </summary> @@ -38014,7 +30903,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ldap_server_packets" lineno="44499"> +<interface name="corenet_relabelto_ldap_server_packets" lineno="34847"> <summary> Relabel packets to ldap_server the packet type. </summary> @@ -38024,85 +30913,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44521"> -<summary> -Send and receive TCP traffic on the lirc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_lirc_port" lineno="44536"> -<summary> -Send UDP traffic on the lirc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44551"> -<summary> -Do not audit attempts to send UDP traffic on the lirc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_lirc_port" lineno="44566"> -<summary> -Receive UDP traffic on the lirc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44581"> -<summary> -Do not audit attempts to receive UDP traffic on the lirc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_lirc_port" lineno="44596"> -<summary> -Send and receive UDP traffic on the lirc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44612"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the lirc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_lirc_port" lineno="44627"> +<interface name="corenet_tcp_bind_lirc_port" lineno="34869"> <summary> Bind TCP sockets to the lirc port. </summary> @@ -38113,7 +30924,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_lirc_port" lineno="44647"> +<interface name="corenet_udp_bind_lirc_port" lineno="34889"> <summary> Bind UDP sockets to the lirc port. </summary> @@ -38124,7 +30935,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_lirc_port" lineno="44666"> +<interface name="corenet_tcp_connect_lirc_port" lineno="34908"> <summary> Make a TCP connection to the lirc port. </summary> @@ -38134,7 +30945,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lirc_client_packets" lineno="44686"> +<interface name="corenet_send_lirc_client_packets" lineno="34928"> <summary> Send lirc_client packets. </summary> @@ -38145,7 +30956,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44705"> +<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="34947"> <summary> Do not audit attempts to send lirc_client packets. </summary> @@ -38156,7 +30967,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lirc_client_packets" lineno="44724"> +<interface name="corenet_receive_lirc_client_packets" lineno="34966"> <summary> Receive lirc_client packets. </summary> @@ -38167,7 +30978,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44743"> +<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="34985"> <summary> Do not audit attempts to receive lirc_client packets. </summary> @@ -38178,7 +30989,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lirc_client_packets" lineno="44762"> +<interface name="corenet_sendrecv_lirc_client_packets" lineno="35004"> <summary> Send and receive lirc_client packets. </summary> @@ -38189,7 +31000,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44778"> +<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="35020"> <summary> Do not audit attempts to send and receive lirc_client packets. </summary> @@ -38200,7 +31011,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lirc_client_packets" lineno="44793"> +<interface name="corenet_relabelto_lirc_client_packets" lineno="35035"> <summary> Relabel packets to lirc_client the packet type. </summary> @@ -38210,7 +31021,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lirc_server_packets" lineno="44813"> +<interface name="corenet_send_lirc_server_packets" lineno="35055"> <summary> Send lirc_server packets. </summary> @@ -38221,7 +31032,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44832"> +<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="35074"> <summary> Do not audit attempts to send lirc_server packets. </summary> @@ -38232,7 +31043,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lirc_server_packets" lineno="44851"> +<interface name="corenet_receive_lirc_server_packets" lineno="35093"> <summary> Receive lirc_server packets. </summary> @@ -38243,7 +31054,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44870"> +<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="35112"> <summary> Do not audit attempts to receive lirc_server packets. </summary> @@ -38254,7 +31065,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lirc_server_packets" lineno="44889"> +<interface name="corenet_sendrecv_lirc_server_packets" lineno="35131"> <summary> Send and receive lirc_server packets. </summary> @@ -38265,7 +31076,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44905"> +<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="35147"> <summary> Do not audit attempts to send and receive lirc_server packets. </summary> @@ -38276,7 +31087,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lirc_server_packets" lineno="44920"> +<interface name="corenet_relabelto_lirc_server_packets" lineno="35162"> <summary> Relabel packets to lirc_server the packet type. </summary> @@ -38286,85 +31097,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44942"> -<summary> -Send and receive TCP traffic on the llmnr port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_llmnr_port" lineno="44957"> -<summary> -Send UDP traffic on the llmnr port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44972"> -<summary> -Do not audit attempts to send UDP traffic on the llmnr port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_llmnr_port" lineno="44987"> -<summary> -Receive UDP traffic on the llmnr port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="45002"> -<summary> -Do not audit attempts to receive UDP traffic on the llmnr port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_llmnr_port" lineno="45017"> -<summary> -Send and receive UDP traffic on the llmnr port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="45033"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the llmnr port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_llmnr_port" lineno="45048"> +<interface name="corenet_tcp_bind_llmnr_port" lineno="35184"> <summary> Bind TCP sockets to the llmnr port. </summary> @@ -38375,7 +31108,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_llmnr_port" lineno="45068"> +<interface name="corenet_udp_bind_llmnr_port" lineno="35204"> <summary> Bind UDP sockets to the llmnr port. </summary> @@ -38386,7 +31119,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_llmnr_port" lineno="45087"> +<interface name="corenet_tcp_connect_llmnr_port" lineno="35223"> <summary> Make a TCP connection to the llmnr port. </summary> @@ -38396,7 +31129,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_llmnr_client_packets" lineno="45107"> +<interface name="corenet_send_llmnr_client_packets" lineno="35243"> <summary> Send llmnr_client packets. </summary> @@ -38407,7 +31140,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="45126"> +<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="35262"> <summary> Do not audit attempts to send llmnr_client packets. </summary> @@ -38418,7 +31151,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_llmnr_client_packets" lineno="45145"> +<interface name="corenet_receive_llmnr_client_packets" lineno="35281"> <summary> Receive llmnr_client packets. </summary> @@ -38429,7 +31162,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45164"> +<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="35300"> <summary> Do not audit attempts to receive llmnr_client packets. </summary> @@ -38440,7 +31173,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45183"> +<interface name="corenet_sendrecv_llmnr_client_packets" lineno="35319"> <summary> Send and receive llmnr_client packets. </summary> @@ -38451,7 +31184,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45199"> +<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="35335"> <summary> Do not audit attempts to send and receive llmnr_client packets. </summary> @@ -38462,7 +31195,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_llmnr_client_packets" lineno="45214"> +<interface name="corenet_relabelto_llmnr_client_packets" lineno="35350"> <summary> Relabel packets to llmnr_client the packet type. </summary> @@ -38472,7 +31205,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_llmnr_server_packets" lineno="45234"> +<interface name="corenet_send_llmnr_server_packets" lineno="35370"> <summary> Send llmnr_server packets. </summary> @@ -38483,7 +31216,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45253"> +<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="35389"> <summary> Do not audit attempts to send llmnr_server packets. </summary> @@ -38494,7 +31227,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_llmnr_server_packets" lineno="45272"> +<interface name="corenet_receive_llmnr_server_packets" lineno="35408"> <summary> Receive llmnr_server packets. </summary> @@ -38505,7 +31238,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45291"> +<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="35427"> <summary> Do not audit attempts to receive llmnr_server packets. </summary> @@ -38516,7 +31249,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45310"> +<interface name="corenet_sendrecv_llmnr_server_packets" lineno="35446"> <summary> Send and receive llmnr_server packets. </summary> @@ -38527,7 +31260,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45326"> +<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="35462"> <summary> Do not audit attempts to send and receive llmnr_server packets. </summary> @@ -38538,7 +31271,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_llmnr_server_packets" lineno="45341"> +<interface name="corenet_relabelto_llmnr_server_packets" lineno="35477"> <summary> Relabel packets to llmnr_server the packet type. </summary> @@ -38548,85 +31281,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45363"> -<summary> -Send and receive TCP traffic on the lmtp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_lmtp_port" lineno="45378"> -<summary> -Send UDP traffic on the lmtp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45393"> -<summary> -Do not audit attempts to send UDP traffic on the lmtp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_lmtp_port" lineno="45408"> -<summary> -Receive UDP traffic on the lmtp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45423"> -<summary> -Do not audit attempts to receive UDP traffic on the lmtp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45438"> -<summary> -Send and receive UDP traffic on the lmtp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45454"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the lmtp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_lmtp_port" lineno="45469"> +<interface name="corenet_tcp_bind_lmtp_port" lineno="35499"> <summary> Bind TCP sockets to the lmtp port. </summary> @@ -38637,7 +31292,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_lmtp_port" lineno="45489"> +<interface name="corenet_udp_bind_lmtp_port" lineno="35519"> <summary> Bind UDP sockets to the lmtp port. </summary> @@ -38648,7 +31303,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_lmtp_port" lineno="45508"> +<interface name="corenet_tcp_connect_lmtp_port" lineno="35538"> <summary> Make a TCP connection to the lmtp port. </summary> @@ -38658,7 +31313,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lmtp_client_packets" lineno="45528"> +<interface name="corenet_send_lmtp_client_packets" lineno="35558"> <summary> Send lmtp_client packets. </summary> @@ -38669,7 +31324,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45547"> +<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="35577"> <summary> Do not audit attempts to send lmtp_client packets. </summary> @@ -38680,7 +31335,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lmtp_client_packets" lineno="45566"> +<interface name="corenet_receive_lmtp_client_packets" lineno="35596"> <summary> Receive lmtp_client packets. </summary> @@ -38691,7 +31346,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45585"> +<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="35615"> <summary> Do not audit attempts to receive lmtp_client packets. </summary> @@ -38702,7 +31357,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45604"> +<interface name="corenet_sendrecv_lmtp_client_packets" lineno="35634"> <summary> Send and receive lmtp_client packets. </summary> @@ -38713,7 +31368,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45620"> +<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="35650"> <summary> Do not audit attempts to send and receive lmtp_client packets. </summary> @@ -38724,7 +31379,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lmtp_client_packets" lineno="45635"> +<interface name="corenet_relabelto_lmtp_client_packets" lineno="35665"> <summary> Relabel packets to lmtp_client the packet type. </summary> @@ -38734,7 +31389,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lmtp_server_packets" lineno="45655"> +<interface name="corenet_send_lmtp_server_packets" lineno="35685"> <summary> Send lmtp_server packets. </summary> @@ -38745,7 +31400,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45674"> +<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="35704"> <summary> Do not audit attempts to send lmtp_server packets. </summary> @@ -38756,7 +31411,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lmtp_server_packets" lineno="45693"> +<interface name="corenet_receive_lmtp_server_packets" lineno="35723"> <summary> Receive lmtp_server packets. </summary> @@ -38767,7 +31422,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45712"> +<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="35742"> <summary> Do not audit attempts to receive lmtp_server packets. </summary> @@ -38778,7 +31433,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45731"> +<interface name="corenet_sendrecv_lmtp_server_packets" lineno="35761"> <summary> Send and receive lmtp_server packets. </summary> @@ -38789,7 +31444,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45747"> +<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="35777"> <summary> Do not audit attempts to send and receive lmtp_server packets. </summary> @@ -38800,7 +31455,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lmtp_server_packets" lineno="45762"> +<interface name="corenet_relabelto_lmtp_server_packets" lineno="35792"> <summary> Relabel packets to lmtp_server the packet type. </summary> @@ -38810,85 +31465,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45784"> -<summary> -Send and receive TCP traffic on the lrrd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_lrrd_port" lineno="45799"> -<summary> -Send UDP traffic on the lrrd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45814"> -<summary> -Do not audit attempts to send UDP traffic on the lrrd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_lrrd_port" lineno="45829"> -<summary> -Receive UDP traffic on the lrrd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45844"> -<summary> -Do not audit attempts to receive UDP traffic on the lrrd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45859"> -<summary> -Send and receive UDP traffic on the lrrd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45875"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the lrrd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_lrrd_port" lineno="45890"> +<interface name="corenet_tcp_bind_lrrd_port" lineno="35814"> <summary> Bind TCP sockets to the lrrd port. </summary> @@ -38899,7 +31476,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_lrrd_port" lineno="45910"> +<interface name="corenet_udp_bind_lrrd_port" lineno="35834"> <summary> Bind UDP sockets to the lrrd port. </summary> @@ -38910,7 +31487,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_lrrd_port" lineno="45929"> +<interface name="corenet_tcp_connect_lrrd_port" lineno="35853"> <summary> Make a TCP connection to the lrrd port. </summary> @@ -38920,7 +31497,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lrrd_client_packets" lineno="45949"> +<interface name="corenet_send_lrrd_client_packets" lineno="35873"> <summary> Send lrrd_client packets. </summary> @@ -38931,7 +31508,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45968"> +<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="35892"> <summary> Do not audit attempts to send lrrd_client packets. </summary> @@ -38942,7 +31519,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lrrd_client_packets" lineno="45987"> +<interface name="corenet_receive_lrrd_client_packets" lineno="35911"> <summary> Receive lrrd_client packets. </summary> @@ -38953,7 +31530,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="46006"> +<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="35930"> <summary> Do not audit attempts to receive lrrd_client packets. </summary> @@ -38964,7 +31541,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lrrd_client_packets" lineno="46025"> +<interface name="corenet_sendrecv_lrrd_client_packets" lineno="35949"> <summary> Send and receive lrrd_client packets. </summary> @@ -38975,7 +31552,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="46041"> +<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="35965"> <summary> Do not audit attempts to send and receive lrrd_client packets. </summary> @@ -38986,7 +31563,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lrrd_client_packets" lineno="46056"> +<interface name="corenet_relabelto_lrrd_client_packets" lineno="35980"> <summary> Relabel packets to lrrd_client the packet type. </summary> @@ -38996,7 +31573,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_lrrd_server_packets" lineno="46076"> +<interface name="corenet_send_lrrd_server_packets" lineno="36000"> <summary> Send lrrd_server packets. </summary> @@ -39007,7 +31584,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="46095"> +<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="36019"> <summary> Do not audit attempts to send lrrd_server packets. </summary> @@ -39018,7 +31595,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_lrrd_server_packets" lineno="46114"> +<interface name="corenet_receive_lrrd_server_packets" lineno="36038"> <summary> Receive lrrd_server packets. </summary> @@ -39029,7 +31606,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="46133"> +<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="36057"> <summary> Do not audit attempts to receive lrrd_server packets. </summary> @@ -39040,7 +31617,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46152"> +<interface name="corenet_sendrecv_lrrd_server_packets" lineno="36076"> <summary> Send and receive lrrd_server packets. </summary> @@ -39051,7 +31628,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46168"> +<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="36092"> <summary> Do not audit attempts to send and receive lrrd_server packets. </summary> @@ -39062,7 +31639,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_lrrd_server_packets" lineno="46183"> +<interface name="corenet_relabelto_lrrd_server_packets" lineno="36107"> <summary> Relabel packets to lrrd_server the packet type. </summary> @@ -39072,85 +31649,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mail_port" lineno="46205"> -<summary> -Send and receive TCP traffic on the mail port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_mail_port" lineno="46220"> -<summary> -Send UDP traffic on the mail port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46235"> -<summary> -Do not audit attempts to send UDP traffic on the mail port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_mail_port" lineno="46250"> -<summary> -Receive UDP traffic on the mail port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46265"> -<summary> -Do not audit attempts to receive UDP traffic on the mail port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_mail_port" lineno="46280"> -<summary> -Send and receive UDP traffic on the mail port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46296"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the mail port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_mail_port" lineno="46311"> +<interface name="corenet_tcp_bind_mail_port" lineno="36129"> <summary> Bind TCP sockets to the mail port. </summary> @@ -39161,7 +31660,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mail_port" lineno="46331"> +<interface name="corenet_udp_bind_mail_port" lineno="36149"> <summary> Bind UDP sockets to the mail port. </summary> @@ -39172,7 +31671,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mail_port" lineno="46350"> +<interface name="corenet_tcp_connect_mail_port" lineno="36168"> <summary> Make a TCP connection to the mail port. </summary> @@ -39182,7 +31681,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mail_client_packets" lineno="46370"> +<interface name="corenet_send_mail_client_packets" lineno="36188"> <summary> Send mail_client packets. </summary> @@ -39193,7 +31692,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46389"> +<interface name="corenet_dontaudit_send_mail_client_packets" lineno="36207"> <summary> Do not audit attempts to send mail_client packets. </summary> @@ -39204,7 +31703,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mail_client_packets" lineno="46408"> +<interface name="corenet_receive_mail_client_packets" lineno="36226"> <summary> Receive mail_client packets. </summary> @@ -39215,7 +31714,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46427"> +<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="36245"> <summary> Do not audit attempts to receive mail_client packets. </summary> @@ -39226,7 +31725,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mail_client_packets" lineno="46446"> +<interface name="corenet_sendrecv_mail_client_packets" lineno="36264"> <summary> Send and receive mail_client packets. </summary> @@ -39237,7 +31736,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46462"> +<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="36280"> <summary> Do not audit attempts to send and receive mail_client packets. </summary> @@ -39248,7 +31747,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mail_client_packets" lineno="46477"> +<interface name="corenet_relabelto_mail_client_packets" lineno="36295"> <summary> Relabel packets to mail_client the packet type. </summary> @@ -39258,7 +31757,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mail_server_packets" lineno="46497"> +<interface name="corenet_send_mail_server_packets" lineno="36315"> <summary> Send mail_server packets. </summary> @@ -39269,7 +31768,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46516"> +<interface name="corenet_dontaudit_send_mail_server_packets" lineno="36334"> <summary> Do not audit attempts to send mail_server packets. </summary> @@ -39280,7 +31779,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mail_server_packets" lineno="46535"> +<interface name="corenet_receive_mail_server_packets" lineno="36353"> <summary> Receive mail_server packets. </summary> @@ -39291,7 +31790,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46554"> +<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="36372"> <summary> Do not audit attempts to receive mail_server packets. </summary> @@ -39302,7 +31801,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mail_server_packets" lineno="46573"> +<interface name="corenet_sendrecv_mail_server_packets" lineno="36391"> <summary> Send and receive mail_server packets. </summary> @@ -39313,7 +31812,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46589"> +<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="36407"> <summary> Do not audit attempts to send and receive mail_server packets. </summary> @@ -39324,7 +31823,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mail_server_packets" lineno="46604"> +<interface name="corenet_relabelto_mail_server_packets" lineno="36422"> <summary> Relabel packets to mail_server the packet type. </summary> @@ -39334,85 +31833,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46626"> -<summary> -Send and receive TCP traffic on the matahari port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_matahari_port" lineno="46641"> -<summary> -Send UDP traffic on the matahari port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46656"> -<summary> -Do not audit attempts to send UDP traffic on the matahari port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_matahari_port" lineno="46671"> -<summary> -Receive UDP traffic on the matahari port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46686"> -<summary> -Do not audit attempts to receive UDP traffic on the matahari port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_matahari_port" lineno="46701"> -<summary> -Send and receive UDP traffic on the matahari port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46717"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the matahari port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_matahari_port" lineno="46732"> +<interface name="corenet_tcp_bind_matahari_port" lineno="36444"> <summary> Bind TCP sockets to the matahari port. </summary> @@ -39423,7 +31844,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_matahari_port" lineno="46752"> +<interface name="corenet_udp_bind_matahari_port" lineno="36464"> <summary> Bind UDP sockets to the matahari port. </summary> @@ -39434,7 +31855,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_matahari_port" lineno="46771"> +<interface name="corenet_tcp_connect_matahari_port" lineno="36483"> <summary> Make a TCP connection to the matahari port. </summary> @@ -39444,7 +31865,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_matahari_client_packets" lineno="46791"> +<interface name="corenet_send_matahari_client_packets" lineno="36503"> <summary> Send matahari_client packets. </summary> @@ -39455,7 +31876,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46810"> +<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="36522"> <summary> Do not audit attempts to send matahari_client packets. </summary> @@ -39466,7 +31887,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_matahari_client_packets" lineno="46829"> +<interface name="corenet_receive_matahari_client_packets" lineno="36541"> <summary> Receive matahari_client packets. </summary> @@ -39477,7 +31898,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46848"> +<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="36560"> <summary> Do not audit attempts to receive matahari_client packets. </summary> @@ -39488,7 +31909,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_matahari_client_packets" lineno="46867"> +<interface name="corenet_sendrecv_matahari_client_packets" lineno="36579"> <summary> Send and receive matahari_client packets. </summary> @@ -39499,7 +31920,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46883"> +<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="36595"> <summary> Do not audit attempts to send and receive matahari_client packets. </summary> @@ -39510,7 +31931,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_matahari_client_packets" lineno="46898"> +<interface name="corenet_relabelto_matahari_client_packets" lineno="36610"> <summary> Relabel packets to matahari_client the packet type. </summary> @@ -39520,7 +31941,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_matahari_server_packets" lineno="46918"> +<interface name="corenet_send_matahari_server_packets" lineno="36630"> <summary> Send matahari_server packets. </summary> @@ -39531,7 +31952,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46937"> +<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="36649"> <summary> Do not audit attempts to send matahari_server packets. </summary> @@ -39542,7 +31963,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_matahari_server_packets" lineno="46956"> +<interface name="corenet_receive_matahari_server_packets" lineno="36668"> <summary> Receive matahari_server packets. </summary> @@ -39553,7 +31974,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46975"> +<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="36687"> <summary> Do not audit attempts to receive matahari_server packets. </summary> @@ -39564,7 +31985,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_matahari_server_packets" lineno="46994"> +<interface name="corenet_sendrecv_matahari_server_packets" lineno="36706"> <summary> Send and receive matahari_server packets. </summary> @@ -39575,7 +31996,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="47010"> +<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="36722"> <summary> Do not audit attempts to send and receive matahari_server packets. </summary> @@ -39586,7 +32007,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_matahari_server_packets" lineno="47025"> +<interface name="corenet_relabelto_matahari_server_packets" lineno="36737"> <summary> Relabel packets to matahari_server the packet type. </summary> @@ -39596,85 +32017,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_memcache_port" lineno="47047"> -<summary> -Send and receive TCP traffic on the memcache port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_memcache_port" lineno="47062"> -<summary> -Send UDP traffic on the memcache port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="47077"> -<summary> -Do not audit attempts to send UDP traffic on the memcache port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_memcache_port" lineno="47092"> -<summary> -Receive UDP traffic on the memcache port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="47107"> -<summary> -Do not audit attempts to receive UDP traffic on the memcache port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_memcache_port" lineno="47122"> -<summary> -Send and receive UDP traffic on the memcache port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="47138"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the memcache port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_memcache_port" lineno="47153"> +<interface name="corenet_tcp_bind_memcache_port" lineno="36759"> <summary> Bind TCP sockets to the memcache port. </summary> @@ -39685,7 +32028,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_memcache_port" lineno="47173"> +<interface name="corenet_udp_bind_memcache_port" lineno="36779"> <summary> Bind UDP sockets to the memcache port. </summary> @@ -39696,7 +32039,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_memcache_port" lineno="47192"> +<interface name="corenet_tcp_connect_memcache_port" lineno="36798"> <summary> Make a TCP connection to the memcache port. </summary> @@ -39706,7 +32049,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_memcache_client_packets" lineno="47212"> +<interface name="corenet_send_memcache_client_packets" lineno="36818"> <summary> Send memcache_client packets. </summary> @@ -39717,7 +32060,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47231"> +<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="36837"> <summary> Do not audit attempts to send memcache_client packets. </summary> @@ -39728,7 +32071,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_memcache_client_packets" lineno="47250"> +<interface name="corenet_receive_memcache_client_packets" lineno="36856"> <summary> Receive memcache_client packets. </summary> @@ -39739,7 +32082,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47269"> +<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="36875"> <summary> Do not audit attempts to receive memcache_client packets. </summary> @@ -39750,7 +32093,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_memcache_client_packets" lineno="47288"> +<interface name="corenet_sendrecv_memcache_client_packets" lineno="36894"> <summary> Send and receive memcache_client packets. </summary> @@ -39761,7 +32104,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47304"> +<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="36910"> <summary> Do not audit attempts to send and receive memcache_client packets. </summary> @@ -39772,7 +32115,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_memcache_client_packets" lineno="47319"> +<interface name="corenet_relabelto_memcache_client_packets" lineno="36925"> <summary> Relabel packets to memcache_client the packet type. </summary> @@ -39782,7 +32125,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_memcache_server_packets" lineno="47339"> +<interface name="corenet_send_memcache_server_packets" lineno="36945"> <summary> Send memcache_server packets. </summary> @@ -39793,7 +32136,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47358"> +<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="36964"> <summary> Do not audit attempts to send memcache_server packets. </summary> @@ -39804,7 +32147,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_memcache_server_packets" lineno="47377"> +<interface name="corenet_receive_memcache_server_packets" lineno="36983"> <summary> Receive memcache_server packets. </summary> @@ -39815,7 +32158,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47396"> +<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="37002"> <summary> Do not audit attempts to receive memcache_server packets. </summary> @@ -39826,7 +32169,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_memcache_server_packets" lineno="47415"> +<interface name="corenet_sendrecv_memcache_server_packets" lineno="37021"> <summary> Send and receive memcache_server packets. </summary> @@ -39837,7 +32180,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47431"> +<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="37037"> <summary> Do not audit attempts to send and receive memcache_server packets. </summary> @@ -39848,7 +32191,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_memcache_server_packets" lineno="47446"> +<interface name="corenet_relabelto_memcache_server_packets" lineno="37052"> <summary> Relabel packets to memcache_server the packet type. </summary> @@ -39858,85 +32201,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_milter_port" lineno="47468"> -<summary> -Send and receive TCP traffic on the milter port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_milter_port" lineno="47483"> -<summary> -Send UDP traffic on the milter port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47498"> -<summary> -Do not audit attempts to send UDP traffic on the milter port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_milter_port" lineno="47513"> -<summary> -Receive UDP traffic on the milter port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47528"> -<summary> -Do not audit attempts to receive UDP traffic on the milter port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_milter_port" lineno="47543"> -<summary> -Send and receive UDP traffic on the milter port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47559"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the milter port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_milter_port" lineno="47574"> +<interface name="corenet_tcp_bind_milter_port" lineno="37074"> <summary> Bind TCP sockets to the milter port. </summary> @@ -39947,7 +32212,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_milter_port" lineno="47594"> +<interface name="corenet_udp_bind_milter_port" lineno="37094"> <summary> Bind UDP sockets to the milter port. </summary> @@ -39958,7 +32223,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_milter_port" lineno="47613"> +<interface name="corenet_tcp_connect_milter_port" lineno="37113"> <summary> Make a TCP connection to the milter port. </summary> @@ -39968,7 +32233,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_milter_client_packets" lineno="47633"> +<interface name="corenet_send_milter_client_packets" lineno="37133"> <summary> Send milter_client packets. </summary> @@ -39979,7 +32244,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47652"> +<interface name="corenet_dontaudit_send_milter_client_packets" lineno="37152"> <summary> Do not audit attempts to send milter_client packets. </summary> @@ -39990,7 +32255,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_milter_client_packets" lineno="47671"> +<interface name="corenet_receive_milter_client_packets" lineno="37171"> <summary> Receive milter_client packets. </summary> @@ -40001,7 +32266,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47690"> +<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="37190"> <summary> Do not audit attempts to receive milter_client packets. </summary> @@ -40012,7 +32277,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_milter_client_packets" lineno="47709"> +<interface name="corenet_sendrecv_milter_client_packets" lineno="37209"> <summary> Send and receive milter_client packets. </summary> @@ -40023,7 +32288,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47725"> +<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="37225"> <summary> Do not audit attempts to send and receive milter_client packets. </summary> @@ -40034,7 +32299,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_milter_client_packets" lineno="47740"> +<interface name="corenet_relabelto_milter_client_packets" lineno="37240"> <summary> Relabel packets to milter_client the packet type. </summary> @@ -40044,7 +32309,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_milter_server_packets" lineno="47760"> +<interface name="corenet_send_milter_server_packets" lineno="37260"> <summary> Send milter_server packets. </summary> @@ -40055,7 +32320,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47779"> +<interface name="corenet_dontaudit_send_milter_server_packets" lineno="37279"> <summary> Do not audit attempts to send milter_server packets. </summary> @@ -40066,7 +32331,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_milter_server_packets" lineno="47798"> +<interface name="corenet_receive_milter_server_packets" lineno="37298"> <summary> Receive milter_server packets. </summary> @@ -40077,7 +32342,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47817"> +<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="37317"> <summary> Do not audit attempts to receive milter_server packets. </summary> @@ -40088,7 +32353,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_milter_server_packets" lineno="47836"> +<interface name="corenet_sendrecv_milter_server_packets" lineno="37336"> <summary> Send and receive milter_server packets. </summary> @@ -40099,7 +32364,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47852"> +<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="37352"> <summary> Do not audit attempts to send and receive milter_server packets. </summary> @@ -40110,7 +32375,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_milter_server_packets" lineno="47867"> +<interface name="corenet_relabelto_milter_server_packets" lineno="37367"> <summary> Relabel packets to milter_server the packet type. </summary> @@ -40120,85 +32385,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47889"> -<summary> -Send and receive TCP traffic on the mmcc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_mmcc_port" lineno="47904"> -<summary> -Send UDP traffic on the mmcc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47919"> -<summary> -Do not audit attempts to send UDP traffic on the mmcc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_mmcc_port" lineno="47934"> -<summary> -Receive UDP traffic on the mmcc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47949"> -<summary> -Do not audit attempts to receive UDP traffic on the mmcc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47964"> -<summary> -Send and receive UDP traffic on the mmcc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47980"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the mmcc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_mmcc_port" lineno="47995"> +<interface name="corenet_tcp_bind_mmcc_port" lineno="37389"> <summary> Bind TCP sockets to the mmcc port. </summary> @@ -40209,7 +32396,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mmcc_port" lineno="48015"> +<interface name="corenet_udp_bind_mmcc_port" lineno="37409"> <summary> Bind UDP sockets to the mmcc port. </summary> @@ -40220,7 +32407,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mmcc_port" lineno="48034"> +<interface name="corenet_tcp_connect_mmcc_port" lineno="37428"> <summary> Make a TCP connection to the mmcc port. </summary> @@ -40230,7 +32417,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mmcc_client_packets" lineno="48054"> +<interface name="corenet_send_mmcc_client_packets" lineno="37448"> <summary> Send mmcc_client packets. </summary> @@ -40241,7 +32428,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="48073"> +<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="37467"> <summary> Do not audit attempts to send mmcc_client packets. </summary> @@ -40252,7 +32439,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mmcc_client_packets" lineno="48092"> +<interface name="corenet_receive_mmcc_client_packets" lineno="37486"> <summary> Receive mmcc_client packets. </summary> @@ -40263,7 +32450,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="48111"> +<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="37505"> <summary> Do not audit attempts to receive mmcc_client packets. </summary> @@ -40274,7 +32461,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mmcc_client_packets" lineno="48130"> +<interface name="corenet_sendrecv_mmcc_client_packets" lineno="37524"> <summary> Send and receive mmcc_client packets. </summary> @@ -40285,7 +32472,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48146"> +<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="37540"> <summary> Do not audit attempts to send and receive mmcc_client packets. </summary> @@ -40296,7 +32483,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mmcc_client_packets" lineno="48161"> +<interface name="corenet_relabelto_mmcc_client_packets" lineno="37555"> <summary> Relabel packets to mmcc_client the packet type. </summary> @@ -40306,7 +32493,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mmcc_server_packets" lineno="48181"> +<interface name="corenet_send_mmcc_server_packets" lineno="37575"> <summary> Send mmcc_server packets. </summary> @@ -40317,7 +32504,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48200"> +<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="37594"> <summary> Do not audit attempts to send mmcc_server packets. </summary> @@ -40328,7 +32515,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mmcc_server_packets" lineno="48219"> +<interface name="corenet_receive_mmcc_server_packets" lineno="37613"> <summary> Receive mmcc_server packets. </summary> @@ -40339,7 +32526,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48238"> +<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="37632"> <summary> Do not audit attempts to receive mmcc_server packets. </summary> @@ -40350,7 +32537,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48257"> +<interface name="corenet_sendrecv_mmcc_server_packets" lineno="37651"> <summary> Send and receive mmcc_server packets. </summary> @@ -40361,7 +32548,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48273"> +<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="37667"> <summary> Do not audit attempts to send and receive mmcc_server packets. </summary> @@ -40372,7 +32559,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mmcc_server_packets" lineno="48288"> +<interface name="corenet_relabelto_mmcc_server_packets" lineno="37682"> <summary> Relabel packets to mmcc_server the packet type. </summary> @@ -40382,85 +32569,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mon_port" lineno="48310"> -<summary> -Send and receive TCP traffic on the mon port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_mon_port" lineno="48325"> -<summary> -Send UDP traffic on the mon port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48340"> -<summary> -Do not audit attempts to send UDP traffic on the mon port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_mon_port" lineno="48355"> -<summary> -Receive UDP traffic on the mon port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48370"> -<summary> -Do not audit attempts to receive UDP traffic on the mon port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_mon_port" lineno="48385"> -<summary> -Send and receive UDP traffic on the mon port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48401"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the mon port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_mon_port" lineno="48416"> +<interface name="corenet_tcp_bind_mon_port" lineno="37704"> <summary> Bind TCP sockets to the mon port. </summary> @@ -40471,7 +32580,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mon_port" lineno="48436"> +<interface name="corenet_udp_bind_mon_port" lineno="37724"> <summary> Bind UDP sockets to the mon port. </summary> @@ -40482,7 +32591,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mon_port" lineno="48455"> +<interface name="corenet_tcp_connect_mon_port" lineno="37743"> <summary> Make a TCP connection to the mon port. </summary> @@ -40492,7 +32601,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mon_client_packets" lineno="48475"> +<interface name="corenet_send_mon_client_packets" lineno="37763"> <summary> Send mon_client packets. </summary> @@ -40503,7 +32612,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48494"> +<interface name="corenet_dontaudit_send_mon_client_packets" lineno="37782"> <summary> Do not audit attempts to send mon_client packets. </summary> @@ -40514,7 +32623,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mon_client_packets" lineno="48513"> +<interface name="corenet_receive_mon_client_packets" lineno="37801"> <summary> Receive mon_client packets. </summary> @@ -40525,7 +32634,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48532"> +<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="37820"> <summary> Do not audit attempts to receive mon_client packets. </summary> @@ -40536,7 +32645,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mon_client_packets" lineno="48551"> +<interface name="corenet_sendrecv_mon_client_packets" lineno="37839"> <summary> Send and receive mon_client packets. </summary> @@ -40547,7 +32656,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48567"> +<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="37855"> <summary> Do not audit attempts to send and receive mon_client packets. </summary> @@ -40558,7 +32667,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mon_client_packets" lineno="48582"> +<interface name="corenet_relabelto_mon_client_packets" lineno="37870"> <summary> Relabel packets to mon_client the packet type. </summary> @@ -40568,7 +32677,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mon_server_packets" lineno="48602"> +<interface name="corenet_send_mon_server_packets" lineno="37890"> <summary> Send mon_server packets. </summary> @@ -40579,7 +32688,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48621"> +<interface name="corenet_dontaudit_send_mon_server_packets" lineno="37909"> <summary> Do not audit attempts to send mon_server packets. </summary> @@ -40590,7 +32699,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mon_server_packets" lineno="48640"> +<interface name="corenet_receive_mon_server_packets" lineno="37928"> <summary> Receive mon_server packets. </summary> @@ -40601,7 +32710,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48659"> +<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="37947"> <summary> Do not audit attempts to receive mon_server packets. </summary> @@ -40612,7 +32721,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mon_server_packets" lineno="48678"> +<interface name="corenet_sendrecv_mon_server_packets" lineno="37966"> <summary> Send and receive mon_server packets. </summary> @@ -40623,7 +32732,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48694"> +<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="37982"> <summary> Do not audit attempts to send and receive mon_server packets. </summary> @@ -40634,7 +32743,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mon_server_packets" lineno="48709"> +<interface name="corenet_relabelto_mon_server_packets" lineno="37997"> <summary> Relabel packets to mon_server the packet type. </summary> @@ -40644,85 +32753,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_monit_port" lineno="48731"> -<summary> -Send and receive TCP traffic on the monit port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_monit_port" lineno="48746"> -<summary> -Send UDP traffic on the monit port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48761"> -<summary> -Do not audit attempts to send UDP traffic on the monit port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_monit_port" lineno="48776"> -<summary> -Receive UDP traffic on the monit port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48791"> -<summary> -Do not audit attempts to receive UDP traffic on the monit port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_monit_port" lineno="48806"> -<summary> -Send and receive UDP traffic on the monit port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48822"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the monit port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_monit_port" lineno="48837"> +<interface name="corenet_tcp_bind_monit_port" lineno="38019"> <summary> Bind TCP sockets to the monit port. </summary> @@ -40733,7 +32764,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_monit_port" lineno="48857"> +<interface name="corenet_udp_bind_monit_port" lineno="38039"> <summary> Bind UDP sockets to the monit port. </summary> @@ -40744,7 +32775,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_monit_port" lineno="48876"> +<interface name="corenet_tcp_connect_monit_port" lineno="38058"> <summary> Make a TCP connection to the monit port. </summary> @@ -40754,7 +32785,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_monit_client_packets" lineno="48896"> +<interface name="corenet_send_monit_client_packets" lineno="38078"> <summary> Send monit_client packets. </summary> @@ -40765,7 +32796,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48915"> +<interface name="corenet_dontaudit_send_monit_client_packets" lineno="38097"> <summary> Do not audit attempts to send monit_client packets. </summary> @@ -40776,7 +32807,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_monit_client_packets" lineno="48934"> +<interface name="corenet_receive_monit_client_packets" lineno="38116"> <summary> Receive monit_client packets. </summary> @@ -40787,7 +32818,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48953"> +<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="38135"> <summary> Do not audit attempts to receive monit_client packets. </summary> @@ -40798,7 +32829,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_monit_client_packets" lineno="48972"> +<interface name="corenet_sendrecv_monit_client_packets" lineno="38154"> <summary> Send and receive monit_client packets. </summary> @@ -40809,7 +32840,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48988"> +<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="38170"> <summary> Do not audit attempts to send and receive monit_client packets. </summary> @@ -40820,7 +32851,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_monit_client_packets" lineno="49003"> +<interface name="corenet_relabelto_monit_client_packets" lineno="38185"> <summary> Relabel packets to monit_client the packet type. </summary> @@ -40830,7 +32861,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_monit_server_packets" lineno="49023"> +<interface name="corenet_send_monit_server_packets" lineno="38205"> <summary> Send monit_server packets. </summary> @@ -40841,7 +32872,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_monit_server_packets" lineno="49042"> +<interface name="corenet_dontaudit_send_monit_server_packets" lineno="38224"> <summary> Do not audit attempts to send monit_server packets. </summary> @@ -40852,7 +32883,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_monit_server_packets" lineno="49061"> +<interface name="corenet_receive_monit_server_packets" lineno="38243"> <summary> Receive monit_server packets. </summary> @@ -40863,7 +32894,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="49080"> +<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="38262"> <summary> Do not audit attempts to receive monit_server packets. </summary> @@ -40874,7 +32905,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_monit_server_packets" lineno="49099"> +<interface name="corenet_sendrecv_monit_server_packets" lineno="38281"> <summary> Send and receive monit_server packets. </summary> @@ -40885,7 +32916,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="49115"> +<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="38297"> <summary> Do not audit attempts to send and receive monit_server packets. </summary> @@ -40896,7 +32927,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_monit_server_packets" lineno="49130"> +<interface name="corenet_relabelto_monit_server_packets" lineno="38312"> <summary> Relabel packets to monit_server the packet type. </summary> @@ -40906,85 +32937,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49152"> -<summary> -Send and receive TCP traffic on the monopd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_monopd_port" lineno="49167"> -<summary> -Send UDP traffic on the monopd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49182"> -<summary> -Do not audit attempts to send UDP traffic on the monopd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_monopd_port" lineno="49197"> -<summary> -Receive UDP traffic on the monopd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49212"> -<summary> -Do not audit attempts to receive UDP traffic on the monopd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_monopd_port" lineno="49227"> -<summary> -Send and receive UDP traffic on the monopd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49243"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the monopd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_monopd_port" lineno="49258"> +<interface name="corenet_tcp_bind_monopd_port" lineno="38334"> <summary> Bind TCP sockets to the monopd port. </summary> @@ -40995,7 +32948,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_monopd_port" lineno="49278"> +<interface name="corenet_udp_bind_monopd_port" lineno="38354"> <summary> Bind UDP sockets to the monopd port. </summary> @@ -41006,7 +32959,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_monopd_port" lineno="49297"> +<interface name="corenet_tcp_connect_monopd_port" lineno="38373"> <summary> Make a TCP connection to the monopd port. </summary> @@ -41016,7 +32969,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_monopd_client_packets" lineno="49317"> +<interface name="corenet_send_monopd_client_packets" lineno="38393"> <summary> Send monopd_client packets. </summary> @@ -41027,7 +32980,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49336"> +<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="38412"> <summary> Do not audit attempts to send monopd_client packets. </summary> @@ -41038,7 +32991,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_monopd_client_packets" lineno="49355"> +<interface name="corenet_receive_monopd_client_packets" lineno="38431"> <summary> Receive monopd_client packets. </summary> @@ -41049,7 +33002,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49374"> +<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="38450"> <summary> Do not audit attempts to receive monopd_client packets. </summary> @@ -41060,7 +33013,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_monopd_client_packets" lineno="49393"> +<interface name="corenet_sendrecv_monopd_client_packets" lineno="38469"> <summary> Send and receive monopd_client packets. </summary> @@ -41071,7 +33024,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49409"> +<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="38485"> <summary> Do not audit attempts to send and receive monopd_client packets. </summary> @@ -41082,7 +33035,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_monopd_client_packets" lineno="49424"> +<interface name="corenet_relabelto_monopd_client_packets" lineno="38500"> <summary> Relabel packets to monopd_client the packet type. </summary> @@ -41092,7 +33045,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_monopd_server_packets" lineno="49444"> +<interface name="corenet_send_monopd_server_packets" lineno="38520"> <summary> Send monopd_server packets. </summary> @@ -41103,7 +33056,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49463"> +<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="38539"> <summary> Do not audit attempts to send monopd_server packets. </summary> @@ -41114,7 +33067,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_monopd_server_packets" lineno="49482"> +<interface name="corenet_receive_monopd_server_packets" lineno="38558"> <summary> Receive monopd_server packets. </summary> @@ -41125,7 +33078,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49501"> +<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="38577"> <summary> Do not audit attempts to receive monopd_server packets. </summary> @@ -41136,7 +33089,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_monopd_server_packets" lineno="49520"> +<interface name="corenet_sendrecv_monopd_server_packets" lineno="38596"> <summary> Send and receive monopd_server packets. </summary> @@ -41147,7 +33100,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49536"> +<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="38612"> <summary> Do not audit attempts to send and receive monopd_server packets. </summary> @@ -41158,7 +33111,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_monopd_server_packets" lineno="49551"> +<interface name="corenet_relabelto_monopd_server_packets" lineno="38627"> <summary> Relabel packets to monopd_server the packet type. </summary> @@ -41168,85 +33121,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49573"> -<summary> -Send and receive TCP traffic on the mountd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_mountd_port" lineno="49588"> -<summary> -Send UDP traffic on the mountd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49603"> -<summary> -Do not audit attempts to send UDP traffic on the mountd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_mountd_port" lineno="49618"> -<summary> -Receive UDP traffic on the mountd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49633"> -<summary> -Do not audit attempts to receive UDP traffic on the mountd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_mountd_port" lineno="49648"> -<summary> -Send and receive UDP traffic on the mountd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49664"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the mountd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_mountd_port" lineno="49679"> +<interface name="corenet_tcp_bind_mountd_port" lineno="38649"> <summary> Bind TCP sockets to the mountd port. </summary> @@ -41257,7 +33132,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mountd_port" lineno="49699"> +<interface name="corenet_udp_bind_mountd_port" lineno="38669"> <summary> Bind UDP sockets to the mountd port. </summary> @@ -41268,7 +33143,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mountd_port" lineno="49718"> +<interface name="corenet_tcp_connect_mountd_port" lineno="38688"> <summary> Make a TCP connection to the mountd port. </summary> @@ -41278,7 +33153,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mountd_client_packets" lineno="49738"> +<interface name="corenet_send_mountd_client_packets" lineno="38708"> <summary> Send mountd_client packets. </summary> @@ -41289,7 +33164,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49757"> +<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="38727"> <summary> Do not audit attempts to send mountd_client packets. </summary> @@ -41300,7 +33175,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mountd_client_packets" lineno="49776"> +<interface name="corenet_receive_mountd_client_packets" lineno="38746"> <summary> Receive mountd_client packets. </summary> @@ -41311,7 +33186,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49795"> +<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="38765"> <summary> Do not audit attempts to receive mountd_client packets. </summary> @@ -41322,7 +33197,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mountd_client_packets" lineno="49814"> +<interface name="corenet_sendrecv_mountd_client_packets" lineno="38784"> <summary> Send and receive mountd_client packets. </summary> @@ -41333,7 +33208,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49830"> +<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="38800"> <summary> Do not audit attempts to send and receive mountd_client packets. </summary> @@ -41344,7 +33219,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mountd_client_packets" lineno="49845"> +<interface name="corenet_relabelto_mountd_client_packets" lineno="38815"> <summary> Relabel packets to mountd_client the packet type. </summary> @@ -41354,7 +33229,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mountd_server_packets" lineno="49865"> +<interface name="corenet_send_mountd_server_packets" lineno="38835"> <summary> Send mountd_server packets. </summary> @@ -41365,7 +33240,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49884"> +<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="38854"> <summary> Do not audit attempts to send mountd_server packets. </summary> @@ -41376,7 +33251,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mountd_server_packets" lineno="49903"> +<interface name="corenet_receive_mountd_server_packets" lineno="38873"> <summary> Receive mountd_server packets. </summary> @@ -41387,7 +33262,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49922"> +<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="38892"> <summary> Do not audit attempts to receive mountd_server packets. </summary> @@ -41398,7 +33273,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mountd_server_packets" lineno="49941"> +<interface name="corenet_sendrecv_mountd_server_packets" lineno="38911"> <summary> Send and receive mountd_server packets. </summary> @@ -41409,7 +33284,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49957"> +<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="38927"> <summary> Do not audit attempts to send and receive mountd_server packets. </summary> @@ -41420,7 +33295,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mountd_server_packets" lineno="49972"> +<interface name="corenet_relabelto_mountd_server_packets" lineno="38942"> <summary> Relabel packets to mountd_server the packet type. </summary> @@ -41430,85 +33305,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49994"> -<summary> -Send and receive TCP traffic on the movaz_ssc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_movaz_ssc_port" lineno="50009"> -<summary> -Send UDP traffic on the movaz_ssc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="50024"> -<summary> -Do not audit attempts to send UDP traffic on the movaz_ssc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_movaz_ssc_port" lineno="50039"> -<summary> -Receive UDP traffic on the movaz_ssc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="50054"> -<summary> -Do not audit attempts to receive UDP traffic on the movaz_ssc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="50069"> -<summary> -Send and receive UDP traffic on the movaz_ssc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="50085"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the movaz_ssc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="50100"> +<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="38964"> <summary> Bind TCP sockets to the movaz_ssc port. </summary> @@ -41519,7 +33316,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_movaz_ssc_port" lineno="50120"> +<interface name="corenet_udp_bind_movaz_ssc_port" lineno="38984"> <summary> Bind UDP sockets to the movaz_ssc port. </summary> @@ -41530,7 +33327,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="50139"> +<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="39003"> <summary> Make a TCP connection to the movaz_ssc port. </summary> @@ -41540,7 +33337,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_movaz_ssc_client_packets" lineno="50159"> +<interface name="corenet_send_movaz_ssc_client_packets" lineno="39023"> <summary> Send movaz_ssc_client packets. </summary> @@ -41551,7 +33348,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50178"> +<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="39042"> <summary> Do not audit attempts to send movaz_ssc_client packets. </summary> @@ -41562,7 +33359,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50197"> +<interface name="corenet_receive_movaz_ssc_client_packets" lineno="39061"> <summary> Receive movaz_ssc_client packets. </summary> @@ -41573,7 +33370,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50216"> +<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="39080"> <summary> Do not audit attempts to receive movaz_ssc_client packets. </summary> @@ -41584,7 +33381,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50235"> +<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="39099"> <summary> Send and receive movaz_ssc_client packets. </summary> @@ -41595,7 +33392,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50251"> +<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="39115"> <summary> Do not audit attempts to send and receive movaz_ssc_client packets. </summary> @@ -41606,7 +33403,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50266"> +<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="39130"> <summary> Relabel packets to movaz_ssc_client the packet type. </summary> @@ -41616,7 +33413,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_movaz_ssc_server_packets" lineno="50286"> +<interface name="corenet_send_movaz_ssc_server_packets" lineno="39150"> <summary> Send movaz_ssc_server packets. </summary> @@ -41627,7 +33424,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50305"> +<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="39169"> <summary> Do not audit attempts to send movaz_ssc_server packets. </summary> @@ -41638,7 +33435,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50324"> +<interface name="corenet_receive_movaz_ssc_server_packets" lineno="39188"> <summary> Receive movaz_ssc_server packets. </summary> @@ -41649,7 +33446,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50343"> +<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="39207"> <summary> Do not audit attempts to receive movaz_ssc_server packets. </summary> @@ -41660,7 +33457,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50362"> +<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="39226"> <summary> Send and receive movaz_ssc_server packets. </summary> @@ -41671,7 +33468,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50378"> +<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="39242"> <summary> Do not audit attempts to send and receive movaz_ssc_server packets. </summary> @@ -41682,7 +33479,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50393"> +<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="39257"> <summary> Relabel packets to movaz_ssc_server the packet type. </summary> @@ -41692,85 +33489,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50415"> -<summary> -Send and receive TCP traffic on the mpd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_mpd_port" lineno="50430"> -<summary> -Send UDP traffic on the mpd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50445"> -<summary> -Do not audit attempts to send UDP traffic on the mpd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_mpd_port" lineno="50460"> -<summary> -Receive UDP traffic on the mpd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50475"> -<summary> -Do not audit attempts to receive UDP traffic on the mpd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_mpd_port" lineno="50490"> -<summary> -Send and receive UDP traffic on the mpd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50506"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the mpd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_mpd_port" lineno="50521"> +<interface name="corenet_tcp_bind_mpd_port" lineno="39279"> <summary> Bind TCP sockets to the mpd port. </summary> @@ -41781,7 +33500,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mpd_port" lineno="50541"> +<interface name="corenet_udp_bind_mpd_port" lineno="39299"> <summary> Bind UDP sockets to the mpd port. </summary> @@ -41792,7 +33511,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mpd_port" lineno="50560"> +<interface name="corenet_tcp_connect_mpd_port" lineno="39318"> <summary> Make a TCP connection to the mpd port. </summary> @@ -41802,7 +33521,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mpd_client_packets" lineno="50580"> +<interface name="corenet_send_mpd_client_packets" lineno="39338"> <summary> Send mpd_client packets. </summary> @@ -41813,7 +33532,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50599"> +<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="39357"> <summary> Do not audit attempts to send mpd_client packets. </summary> @@ -41824,7 +33543,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mpd_client_packets" lineno="50618"> +<interface name="corenet_receive_mpd_client_packets" lineno="39376"> <summary> Receive mpd_client packets. </summary> @@ -41835,7 +33554,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50637"> +<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="39395"> <summary> Do not audit attempts to receive mpd_client packets. </summary> @@ -41846,7 +33565,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mpd_client_packets" lineno="50656"> +<interface name="corenet_sendrecv_mpd_client_packets" lineno="39414"> <summary> Send and receive mpd_client packets. </summary> @@ -41857,7 +33576,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50672"> +<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="39430"> <summary> Do not audit attempts to send and receive mpd_client packets. </summary> @@ -41868,7 +33587,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mpd_client_packets" lineno="50687"> +<interface name="corenet_relabelto_mpd_client_packets" lineno="39445"> <summary> Relabel packets to mpd_client the packet type. </summary> @@ -41878,7 +33597,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mpd_server_packets" lineno="50707"> +<interface name="corenet_send_mpd_server_packets" lineno="39465"> <summary> Send mpd_server packets. </summary> @@ -41889,7 +33608,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50726"> +<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="39484"> <summary> Do not audit attempts to send mpd_server packets. </summary> @@ -41900,7 +33619,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mpd_server_packets" lineno="50745"> +<interface name="corenet_receive_mpd_server_packets" lineno="39503"> <summary> Receive mpd_server packets. </summary> @@ -41911,7 +33630,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50764"> +<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="39522"> <summary> Do not audit attempts to receive mpd_server packets. </summary> @@ -41922,7 +33641,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mpd_server_packets" lineno="50783"> +<interface name="corenet_sendrecv_mpd_server_packets" lineno="39541"> <summary> Send and receive mpd_server packets. </summary> @@ -41933,7 +33652,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50799"> +<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="39557"> <summary> Do not audit attempts to send and receive mpd_server packets. </summary> @@ -41944,7 +33663,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mpd_server_packets" lineno="50814"> +<interface name="corenet_relabelto_mpd_server_packets" lineno="39572"> <summary> Relabel packets to mpd_server the packet type. </summary> @@ -41954,85 +33673,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50836"> -<summary> -Send and receive TCP traffic on the msgsrvr port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_msgsrvr_port" lineno="50851"> -<summary> -Send UDP traffic on the msgsrvr port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50866"> -<summary> -Do not audit attempts to send UDP traffic on the msgsrvr port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_msgsrvr_port" lineno="50881"> -<summary> -Receive UDP traffic on the msgsrvr port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50896"> -<summary> -Do not audit attempts to receive UDP traffic on the msgsrvr port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50911"> -<summary> -Send and receive UDP traffic on the msgsrvr port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50927"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the msgsrvr port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50942"> +<interface name="corenet_tcp_bind_msgsrvr_port" lineno="39594"> <summary> Bind TCP sockets to the msgsrvr port. </summary> @@ -42043,7 +33684,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_msgsrvr_port" lineno="50962"> +<interface name="corenet_udp_bind_msgsrvr_port" lineno="39614"> <summary> Bind UDP sockets to the msgsrvr port. </summary> @@ -42054,7 +33695,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50981"> +<interface name="corenet_tcp_connect_msgsrvr_port" lineno="39633"> <summary> Make a TCP connection to the msgsrvr port. </summary> @@ -42064,7 +33705,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_msgsrvr_client_packets" lineno="51001"> +<interface name="corenet_send_msgsrvr_client_packets" lineno="39653"> <summary> Send msgsrvr_client packets. </summary> @@ -42075,7 +33716,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="51020"> +<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="39672"> <summary> Do not audit attempts to send msgsrvr_client packets. </summary> @@ -42086,7 +33727,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_msgsrvr_client_packets" lineno="51039"> +<interface name="corenet_receive_msgsrvr_client_packets" lineno="39691"> <summary> Receive msgsrvr_client packets. </summary> @@ -42097,7 +33738,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="51058"> +<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="39710"> <summary> Do not audit attempts to receive msgsrvr_client packets. </summary> @@ -42108,7 +33749,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="51077"> +<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="39729"> <summary> Send and receive msgsrvr_client packets. </summary> @@ -42119,7 +33760,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="51093"> +<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="39745"> <summary> Do not audit attempts to send and receive msgsrvr_client packets. </summary> @@ -42130,7 +33771,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="51108"> +<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="39760"> <summary> Relabel packets to msgsrvr_client the packet type. </summary> @@ -42140,7 +33781,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_msgsrvr_server_packets" lineno="51128"> +<interface name="corenet_send_msgsrvr_server_packets" lineno="39780"> <summary> Send msgsrvr_server packets. </summary> @@ -42151,7 +33792,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51147"> +<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="39799"> <summary> Do not audit attempts to send msgsrvr_server packets. </summary> @@ -42162,7 +33803,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_msgsrvr_server_packets" lineno="51166"> +<interface name="corenet_receive_msgsrvr_server_packets" lineno="39818"> <summary> Receive msgsrvr_server packets. </summary> @@ -42173,7 +33814,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51185"> +<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="39837"> <summary> Do not audit attempts to receive msgsrvr_server packets. </summary> @@ -42184,7 +33825,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51204"> +<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="39856"> <summary> Send and receive msgsrvr_server packets. </summary> @@ -42195,7 +33836,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51220"> +<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="39872"> <summary> Do not audit attempts to send and receive msgsrvr_server packets. </summary> @@ -42206,7 +33847,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51235"> +<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="39887"> <summary> Relabel packets to msgsrvr_server the packet type. </summary> @@ -42216,85 +33857,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51257"> -<summary> -Send and receive TCP traffic on the msnp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_msnp_port" lineno="51272"> -<summary> -Send UDP traffic on the msnp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51287"> -<summary> -Do not audit attempts to send UDP traffic on the msnp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_msnp_port" lineno="51302"> -<summary> -Receive UDP traffic on the msnp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51317"> -<summary> -Do not audit attempts to receive UDP traffic on the msnp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_msnp_port" lineno="51332"> -<summary> -Send and receive UDP traffic on the msnp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51348"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the msnp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_msnp_port" lineno="51363"> +<interface name="corenet_tcp_bind_msnp_port" lineno="39909"> <summary> Bind TCP sockets to the msnp port. </summary> @@ -42305,7 +33868,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_msnp_port" lineno="51383"> +<interface name="corenet_udp_bind_msnp_port" lineno="39929"> <summary> Bind UDP sockets to the msnp port. </summary> @@ -42316,7 +33879,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_msnp_port" lineno="51402"> +<interface name="corenet_tcp_connect_msnp_port" lineno="39948"> <summary> Make a TCP connection to the msnp port. </summary> @@ -42326,7 +33889,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_msnp_client_packets" lineno="51422"> +<interface name="corenet_send_msnp_client_packets" lineno="39968"> <summary> Send msnp_client packets. </summary> @@ -42337,7 +33900,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51441"> +<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="39987"> <summary> Do not audit attempts to send msnp_client packets. </summary> @@ -42348,7 +33911,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_msnp_client_packets" lineno="51460"> +<interface name="corenet_receive_msnp_client_packets" lineno="40006"> <summary> Receive msnp_client packets. </summary> @@ -42359,7 +33922,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51479"> +<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="40025"> <summary> Do not audit attempts to receive msnp_client packets. </summary> @@ -42370,7 +33933,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_msnp_client_packets" lineno="51498"> +<interface name="corenet_sendrecv_msnp_client_packets" lineno="40044"> <summary> Send and receive msnp_client packets. </summary> @@ -42381,7 +33944,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51514"> +<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="40060"> <summary> Do not audit attempts to send and receive msnp_client packets. </summary> @@ -42392,7 +33955,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_msnp_client_packets" lineno="51529"> +<interface name="corenet_relabelto_msnp_client_packets" lineno="40075"> <summary> Relabel packets to msnp_client the packet type. </summary> @@ -42402,7 +33965,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_msnp_server_packets" lineno="51549"> +<interface name="corenet_send_msnp_server_packets" lineno="40095"> <summary> Send msnp_server packets. </summary> @@ -42413,7 +33976,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51568"> +<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="40114"> <summary> Do not audit attempts to send msnp_server packets. </summary> @@ -42424,7 +33987,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_msnp_server_packets" lineno="51587"> +<interface name="corenet_receive_msnp_server_packets" lineno="40133"> <summary> Receive msnp_server packets. </summary> @@ -42435,7 +33998,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51606"> +<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="40152"> <summary> Do not audit attempts to receive msnp_server packets. </summary> @@ -42446,7 +34009,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_msnp_server_packets" lineno="51625"> +<interface name="corenet_sendrecv_msnp_server_packets" lineno="40171"> <summary> Send and receive msnp_server packets. </summary> @@ -42457,7 +34020,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51641"> +<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="40187"> <summary> Do not audit attempts to send and receive msnp_server packets. </summary> @@ -42468,7 +34031,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_msnp_server_packets" lineno="51656"> +<interface name="corenet_relabelto_msnp_server_packets" lineno="40202"> <summary> Relabel packets to msnp_server the packet type. </summary> @@ -42478,85 +34041,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51678"> -<summary> -Send and receive TCP traffic on the mssql port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_mssql_port" lineno="51693"> -<summary> -Send UDP traffic on the mssql port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51708"> -<summary> -Do not audit attempts to send UDP traffic on the mssql port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_mssql_port" lineno="51723"> -<summary> -Receive UDP traffic on the mssql port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51738"> -<summary> -Do not audit attempts to receive UDP traffic on the mssql port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_mssql_port" lineno="51753"> -<summary> -Send and receive UDP traffic on the mssql port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51769"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the mssql port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_mssql_port" lineno="51784"> +<interface name="corenet_tcp_bind_mssql_port" lineno="40224"> <summary> Bind TCP sockets to the mssql port. </summary> @@ -42567,7 +34052,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mssql_port" lineno="51804"> +<interface name="corenet_udp_bind_mssql_port" lineno="40244"> <summary> Bind UDP sockets to the mssql port. </summary> @@ -42578,7 +34063,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mssql_port" lineno="51823"> +<interface name="corenet_tcp_connect_mssql_port" lineno="40263"> <summary> Make a TCP connection to the mssql port. </summary> @@ -42588,7 +34073,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mssql_client_packets" lineno="51843"> +<interface name="corenet_send_mssql_client_packets" lineno="40283"> <summary> Send mssql_client packets. </summary> @@ -42599,7 +34084,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51862"> +<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="40302"> <summary> Do not audit attempts to send mssql_client packets. </summary> @@ -42610,7 +34095,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mssql_client_packets" lineno="51881"> +<interface name="corenet_receive_mssql_client_packets" lineno="40321"> <summary> Receive mssql_client packets. </summary> @@ -42621,7 +34106,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51900"> +<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="40340"> <summary> Do not audit attempts to receive mssql_client packets. </summary> @@ -42632,7 +34117,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mssql_client_packets" lineno="51919"> +<interface name="corenet_sendrecv_mssql_client_packets" lineno="40359"> <summary> Send and receive mssql_client packets. </summary> @@ -42643,7 +34128,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51935"> +<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="40375"> <summary> Do not audit attempts to send and receive mssql_client packets. </summary> @@ -42654,7 +34139,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mssql_client_packets" lineno="51950"> +<interface name="corenet_relabelto_mssql_client_packets" lineno="40390"> <summary> Relabel packets to mssql_client the packet type. </summary> @@ -42664,7 +34149,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mssql_server_packets" lineno="51970"> +<interface name="corenet_send_mssql_server_packets" lineno="40410"> <summary> Send mssql_server packets. </summary> @@ -42675,7 +34160,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51989"> +<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="40429"> <summary> Do not audit attempts to send mssql_server packets. </summary> @@ -42686,7 +34171,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mssql_server_packets" lineno="52008"> +<interface name="corenet_receive_mssql_server_packets" lineno="40448"> <summary> Receive mssql_server packets. </summary> @@ -42697,7 +34182,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="52027"> +<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="40467"> <summary> Do not audit attempts to receive mssql_server packets. </summary> @@ -42708,7 +34193,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mssql_server_packets" lineno="52046"> +<interface name="corenet_sendrecv_mssql_server_packets" lineno="40486"> <summary> Send and receive mssql_server packets. </summary> @@ -42719,7 +34204,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="52062"> +<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="40502"> <summary> Do not audit attempts to send and receive mssql_server packets. </summary> @@ -42730,7 +34215,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mssql_server_packets" lineno="52077"> +<interface name="corenet_relabelto_mssql_server_packets" lineno="40517"> <summary> Relabel packets to mssql_server the packet type. </summary> @@ -42740,85 +34225,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="52099"> -<summary> -Send and receive TCP traffic on the ms_streaming port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ms_streaming_port" lineno="52114"> -<summary> -Send UDP traffic on the ms_streaming port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="52129"> -<summary> -Do not audit attempts to send UDP traffic on the ms_streaming port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ms_streaming_port" lineno="52144"> -<summary> -Receive UDP traffic on the ms_streaming port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52159"> -<summary> -Do not audit attempts to receive UDP traffic on the ms_streaming port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52174"> -<summary> -Send and receive UDP traffic on the ms_streaming port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52190"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ms_streaming port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52205"> +<interface name="corenet_tcp_bind_ms_streaming_port" lineno="40539"> <summary> Bind TCP sockets to the ms_streaming port. </summary> @@ -42829,7 +34236,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ms_streaming_port" lineno="52225"> +<interface name="corenet_udp_bind_ms_streaming_port" lineno="40559"> <summary> Bind UDP sockets to the ms_streaming port. </summary> @@ -42840,7 +34247,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52244"> +<interface name="corenet_tcp_connect_ms_streaming_port" lineno="40578"> <summary> Make a TCP connection to the ms_streaming port. </summary> @@ -42850,7 +34257,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ms_streaming_client_packets" lineno="52264"> +<interface name="corenet_send_ms_streaming_client_packets" lineno="40598"> <summary> Send ms_streaming_client packets. </summary> @@ -42861,7 +34268,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52283"> +<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="40617"> <summary> Do not audit attempts to send ms_streaming_client packets. </summary> @@ -42872,7 +34279,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ms_streaming_client_packets" lineno="52302"> +<interface name="corenet_receive_ms_streaming_client_packets" lineno="40636"> <summary> Receive ms_streaming_client packets. </summary> @@ -42883,7 +34290,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52321"> +<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="40655"> <summary> Do not audit attempts to receive ms_streaming_client packets. </summary> @@ -42894,7 +34301,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52340"> +<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="40674"> <summary> Send and receive ms_streaming_client packets. </summary> @@ -42905,7 +34312,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52356"> +<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="40690"> <summary> Do not audit attempts to send and receive ms_streaming_client packets. </summary> @@ -42916,7 +34323,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52371"> +<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="40705"> <summary> Relabel packets to ms_streaming_client the packet type. </summary> @@ -42926,7 +34333,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ms_streaming_server_packets" lineno="52391"> +<interface name="corenet_send_ms_streaming_server_packets" lineno="40725"> <summary> Send ms_streaming_server packets. </summary> @@ -42937,7 +34344,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52410"> +<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="40744"> <summary> Do not audit attempts to send ms_streaming_server packets. </summary> @@ -42948,7 +34355,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ms_streaming_server_packets" lineno="52429"> +<interface name="corenet_receive_ms_streaming_server_packets" lineno="40763"> <summary> Receive ms_streaming_server packets. </summary> @@ -42959,7 +34366,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52448"> +<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="40782"> <summary> Do not audit attempts to receive ms_streaming_server packets. </summary> @@ -42970,7 +34377,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52467"> +<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="40801"> <summary> Send and receive ms_streaming_server packets. </summary> @@ -42981,7 +34388,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52483"> +<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="40817"> <summary> Do not audit attempts to send and receive ms_streaming_server packets. </summary> @@ -42992,7 +34399,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52498"> +<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="40832"> <summary> Relabel packets to ms_streaming_server the packet type. </summary> @@ -43002,85 +34409,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_munin_port" lineno="52520"> -<summary> -Send and receive TCP traffic on the munin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_munin_port" lineno="52535"> -<summary> -Send UDP traffic on the munin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52550"> -<summary> -Do not audit attempts to send UDP traffic on the munin port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_munin_port" lineno="52565"> -<summary> -Receive UDP traffic on the munin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52580"> -<summary> -Do not audit attempts to receive UDP traffic on the munin port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_munin_port" lineno="52595"> -<summary> -Send and receive UDP traffic on the munin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52611"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the munin port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_munin_port" lineno="52626"> +<interface name="corenet_tcp_bind_munin_port" lineno="40854"> <summary> Bind TCP sockets to the munin port. </summary> @@ -43091,7 +34420,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_munin_port" lineno="52646"> +<interface name="corenet_udp_bind_munin_port" lineno="40874"> <summary> Bind UDP sockets to the munin port. </summary> @@ -43102,7 +34431,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_munin_port" lineno="52665"> +<interface name="corenet_tcp_connect_munin_port" lineno="40893"> <summary> Make a TCP connection to the munin port. </summary> @@ -43112,7 +34441,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_munin_client_packets" lineno="52685"> +<interface name="corenet_send_munin_client_packets" lineno="40913"> <summary> Send munin_client packets. </summary> @@ -43123,7 +34452,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52704"> +<interface name="corenet_dontaudit_send_munin_client_packets" lineno="40932"> <summary> Do not audit attempts to send munin_client packets. </summary> @@ -43134,7 +34463,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_munin_client_packets" lineno="52723"> +<interface name="corenet_receive_munin_client_packets" lineno="40951"> <summary> Receive munin_client packets. </summary> @@ -43145,7 +34474,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52742"> +<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="40970"> <summary> Do not audit attempts to receive munin_client packets. </summary> @@ -43156,7 +34485,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_munin_client_packets" lineno="52761"> +<interface name="corenet_sendrecv_munin_client_packets" lineno="40989"> <summary> Send and receive munin_client packets. </summary> @@ -43167,7 +34496,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52777"> +<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="41005"> <summary> Do not audit attempts to send and receive munin_client packets. </summary> @@ -43178,7 +34507,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_munin_client_packets" lineno="52792"> +<interface name="corenet_relabelto_munin_client_packets" lineno="41020"> <summary> Relabel packets to munin_client the packet type. </summary> @@ -43188,7 +34517,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_munin_server_packets" lineno="52812"> +<interface name="corenet_send_munin_server_packets" lineno="41040"> <summary> Send munin_server packets. </summary> @@ -43199,7 +34528,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52831"> +<interface name="corenet_dontaudit_send_munin_server_packets" lineno="41059"> <summary> Do not audit attempts to send munin_server packets. </summary> @@ -43210,7 +34539,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_munin_server_packets" lineno="52850"> +<interface name="corenet_receive_munin_server_packets" lineno="41078"> <summary> Receive munin_server packets. </summary> @@ -43221,7 +34550,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52869"> +<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="41097"> <summary> Do not audit attempts to receive munin_server packets. </summary> @@ -43232,7 +34561,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_munin_server_packets" lineno="52888"> +<interface name="corenet_sendrecv_munin_server_packets" lineno="41116"> <summary> Send and receive munin_server packets. </summary> @@ -43243,7 +34572,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52904"> +<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="41132"> <summary> Do not audit attempts to send and receive munin_server packets. </summary> @@ -43254,7 +34583,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_munin_server_packets" lineno="52919"> +<interface name="corenet_relabelto_munin_server_packets" lineno="41147"> <summary> Relabel packets to munin_server the packet type. </summary> @@ -43264,85 +34593,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52941"> -<summary> -Send and receive TCP traffic on the mxi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_mxi_port" lineno="52956"> -<summary> -Send UDP traffic on the mxi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52971"> -<summary> -Do not audit attempts to send UDP traffic on the mxi port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_mxi_port" lineno="52986"> -<summary> -Receive UDP traffic on the mxi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="53001"> -<summary> -Do not audit attempts to receive UDP traffic on the mxi port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_mxi_port" lineno="53016"> -<summary> -Send and receive UDP traffic on the mxi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="53032"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the mxi port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_mxi_port" lineno="53047"> +<interface name="corenet_tcp_bind_mxi_port" lineno="41169"> <summary> Bind TCP sockets to the mxi port. </summary> @@ -43353,7 +34604,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mxi_port" lineno="53067"> +<interface name="corenet_udp_bind_mxi_port" lineno="41189"> <summary> Bind UDP sockets to the mxi port. </summary> @@ -43364,7 +34615,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mxi_port" lineno="53086"> +<interface name="corenet_tcp_connect_mxi_port" lineno="41208"> <summary> Make a TCP connection to the mxi port. </summary> @@ -43374,7 +34625,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mxi_client_packets" lineno="53106"> +<interface name="corenet_send_mxi_client_packets" lineno="41228"> <summary> Send mxi_client packets. </summary> @@ -43385,7 +34636,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="53125"> +<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="41247"> <summary> Do not audit attempts to send mxi_client packets. </summary> @@ -43396,7 +34647,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mxi_client_packets" lineno="53144"> +<interface name="corenet_receive_mxi_client_packets" lineno="41266"> <summary> Receive mxi_client packets. </summary> @@ -43407,7 +34658,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53163"> +<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="41285"> <summary> Do not audit attempts to receive mxi_client packets. </summary> @@ -43418,7 +34669,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mxi_client_packets" lineno="53182"> +<interface name="corenet_sendrecv_mxi_client_packets" lineno="41304"> <summary> Send and receive mxi_client packets. </summary> @@ -43429,7 +34680,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53198"> +<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="41320"> <summary> Do not audit attempts to send and receive mxi_client packets. </summary> @@ -43440,7 +34691,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mxi_client_packets" lineno="53213"> +<interface name="corenet_relabelto_mxi_client_packets" lineno="41335"> <summary> Relabel packets to mxi_client the packet type. </summary> @@ -43450,7 +34701,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mxi_server_packets" lineno="53233"> +<interface name="corenet_send_mxi_server_packets" lineno="41355"> <summary> Send mxi_server packets. </summary> @@ -43461,7 +34712,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53252"> +<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="41374"> <summary> Do not audit attempts to send mxi_server packets. </summary> @@ -43472,7 +34723,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mxi_server_packets" lineno="53271"> +<interface name="corenet_receive_mxi_server_packets" lineno="41393"> <summary> Receive mxi_server packets. </summary> @@ -43483,7 +34734,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53290"> +<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="41412"> <summary> Do not audit attempts to receive mxi_server packets. </summary> @@ -43494,7 +34745,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mxi_server_packets" lineno="53309"> +<interface name="corenet_sendrecv_mxi_server_packets" lineno="41431"> <summary> Send and receive mxi_server packets. </summary> @@ -43505,7 +34756,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53325"> +<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="41447"> <summary> Do not audit attempts to send and receive mxi_server packets. </summary> @@ -43516,7 +34767,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mxi_server_packets" lineno="53340"> +<interface name="corenet_relabelto_mxi_server_packets" lineno="41462"> <summary> Relabel packets to mxi_server the packet type. </summary> @@ -43526,85 +34777,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53362"> -<summary> -Send and receive TCP traffic on the mysqld port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_mysqld_port" lineno="53377"> -<summary> -Send UDP traffic on the mysqld port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53392"> -<summary> -Do not audit attempts to send UDP traffic on the mysqld port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_mysqld_port" lineno="53407"> -<summary> -Receive UDP traffic on the mysqld port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53422"> -<summary> -Do not audit attempts to receive UDP traffic on the mysqld port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53437"> -<summary> -Send and receive UDP traffic on the mysqld port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53453"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the mysqld port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_mysqld_port" lineno="53468"> +<interface name="corenet_tcp_bind_mysqld_port" lineno="41484"> <summary> Bind TCP sockets to the mysqld port. </summary> @@ -43615,7 +34788,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mysqld_port" lineno="53488"> +<interface name="corenet_udp_bind_mysqld_port" lineno="41504"> <summary> Bind UDP sockets to the mysqld port. </summary> @@ -43626,7 +34799,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mysqld_port" lineno="53507"> +<interface name="corenet_tcp_connect_mysqld_port" lineno="41523"> <summary> Make a TCP connection to the mysqld port. </summary> @@ -43636,7 +34809,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mysqld_client_packets" lineno="53527"> +<interface name="corenet_send_mysqld_client_packets" lineno="41543"> <summary> Send mysqld_client packets. </summary> @@ -43647,7 +34820,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53546"> +<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="41562"> <summary> Do not audit attempts to send mysqld_client packets. </summary> @@ -43658,7 +34831,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mysqld_client_packets" lineno="53565"> +<interface name="corenet_receive_mysqld_client_packets" lineno="41581"> <summary> Receive mysqld_client packets. </summary> @@ -43669,7 +34842,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53584"> +<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="41600"> <summary> Do not audit attempts to receive mysqld_client packets. </summary> @@ -43680,7 +34853,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53603"> +<interface name="corenet_sendrecv_mysqld_client_packets" lineno="41619"> <summary> Send and receive mysqld_client packets. </summary> @@ -43691,7 +34864,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53619"> +<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="41635"> <summary> Do not audit attempts to send and receive mysqld_client packets. </summary> @@ -43702,7 +34875,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mysqld_client_packets" lineno="53634"> +<interface name="corenet_relabelto_mysqld_client_packets" lineno="41650"> <summary> Relabel packets to mysqld_client the packet type. </summary> @@ -43712,7 +34885,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mysqld_server_packets" lineno="53654"> +<interface name="corenet_send_mysqld_server_packets" lineno="41670"> <summary> Send mysqld_server packets. </summary> @@ -43723,7 +34896,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53673"> +<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="41689"> <summary> Do not audit attempts to send mysqld_server packets. </summary> @@ -43734,7 +34907,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mysqld_server_packets" lineno="53692"> +<interface name="corenet_receive_mysqld_server_packets" lineno="41708"> <summary> Receive mysqld_server packets. </summary> @@ -43745,7 +34918,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53711"> +<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="41727"> <summary> Do not audit attempts to receive mysqld_server packets. </summary> @@ -43756,7 +34929,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53730"> +<interface name="corenet_sendrecv_mysqld_server_packets" lineno="41746"> <summary> Send and receive mysqld_server packets. </summary> @@ -43767,7 +34940,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53746"> +<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="41762"> <summary> Do not audit attempts to send and receive mysqld_server packets. </summary> @@ -43778,7 +34951,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mysqld_server_packets" lineno="53761"> +<interface name="corenet_relabelto_mysqld_server_packets" lineno="41777"> <summary> Relabel packets to mysqld_server the packet type. </summary> @@ -43788,85 +34961,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53783"> -<summary> -Send and receive TCP traffic on the mysqlmanagerd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53798"> -<summary> -Send UDP traffic on the mysqlmanagerd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53813"> -<summary> -Do not audit attempts to send UDP traffic on the mysqlmanagerd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53828"> -<summary> -Receive UDP traffic on the mysqlmanagerd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53843"> -<summary> -Do not audit attempts to receive UDP traffic on the mysqlmanagerd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53858"> -<summary> -Send and receive UDP traffic on the mysqlmanagerd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53874"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the mysqlmanagerd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53889"> +<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="41799"> <summary> Bind TCP sockets to the mysqlmanagerd port. </summary> @@ -43877,7 +34972,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53909"> +<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="41819"> <summary> Bind UDP sockets to the mysqlmanagerd port. </summary> @@ -43888,7 +34983,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53928"> +<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="41838"> <summary> Make a TCP connection to the mysqlmanagerd port. </summary> @@ -43898,7 +34993,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53948"> +<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="41858"> <summary> Send mysqlmanagerd_client packets. </summary> @@ -43909,7 +35004,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53967"> +<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="41877"> <summary> Do not audit attempts to send mysqlmanagerd_client packets. </summary> @@ -43920,7 +35015,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53986"> +<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="41896"> <summary> Receive mysqlmanagerd_client packets. </summary> @@ -43931,7 +35026,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="54005"> +<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="41915"> <summary> Do not audit attempts to receive mysqlmanagerd_client packets. </summary> @@ -43942,7 +35037,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="54024"> +<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="41934"> <summary> Send and receive mysqlmanagerd_client packets. </summary> @@ -43953,7 +35048,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="54040"> +<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="41950"> <summary> Do not audit attempts to send and receive mysqlmanagerd_client packets. </summary> @@ -43964,7 +35059,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="54055"> +<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="41965"> <summary> Relabel packets to mysqlmanagerd_client the packet type. </summary> @@ -43974,7 +35069,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="54075"> +<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="41985"> <summary> Send mysqlmanagerd_server packets. </summary> @@ -43985,7 +35080,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="54094"> +<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="42004"> <summary> Do not audit attempts to send mysqlmanagerd_server packets. </summary> @@ -43996,7 +35091,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="54113"> +<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="42023"> <summary> Receive mysqlmanagerd_server packets. </summary> @@ -44007,7 +35102,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="54132"> +<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="42042"> <summary> Do not audit attempts to receive mysqlmanagerd_server packets. </summary> @@ -44018,7 +35113,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54151"> +<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="42061"> <summary> Send and receive mysqlmanagerd_server packets. </summary> @@ -44029,7 +35124,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54167"> +<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="42077"> <summary> Do not audit attempts to send and receive mysqlmanagerd_server packets. </summary> @@ -44040,7 +35135,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54182"> +<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="42092"> <summary> Relabel packets to mysqlmanagerd_server the packet type. </summary> @@ -44050,85 +35145,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54204"> -<summary> -Send and receive TCP traffic on the nessus port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_nessus_port" lineno="54219"> -<summary> -Send UDP traffic on the nessus port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54234"> -<summary> -Do not audit attempts to send UDP traffic on the nessus port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_nessus_port" lineno="54249"> -<summary> -Receive UDP traffic on the nessus port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54264"> -<summary> -Do not audit attempts to receive UDP traffic on the nessus port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_nessus_port" lineno="54279"> -<summary> -Send and receive UDP traffic on the nessus port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54295"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the nessus port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_nessus_port" lineno="54310"> +<interface name="corenet_tcp_bind_nessus_port" lineno="42114"> <summary> Bind TCP sockets to the nessus port. </summary> @@ -44139,7 +35156,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_nessus_port" lineno="54330"> +<interface name="corenet_udp_bind_nessus_port" lineno="42134"> <summary> Bind UDP sockets to the nessus port. </summary> @@ -44150,7 +35167,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_nessus_port" lineno="54349"> +<interface name="corenet_tcp_connect_nessus_port" lineno="42153"> <summary> Make a TCP connection to the nessus port. </summary> @@ -44160,7 +35177,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nessus_client_packets" lineno="54369"> +<interface name="corenet_send_nessus_client_packets" lineno="42173"> <summary> Send nessus_client packets. </summary> @@ -44171,7 +35188,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54388"> +<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="42192"> <summary> Do not audit attempts to send nessus_client packets. </summary> @@ -44182,7 +35199,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nessus_client_packets" lineno="54407"> +<interface name="corenet_receive_nessus_client_packets" lineno="42211"> <summary> Receive nessus_client packets. </summary> @@ -44193,7 +35210,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54426"> +<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="42230"> <summary> Do not audit attempts to receive nessus_client packets. </summary> @@ -44204,7 +35221,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nessus_client_packets" lineno="54445"> +<interface name="corenet_sendrecv_nessus_client_packets" lineno="42249"> <summary> Send and receive nessus_client packets. </summary> @@ -44215,7 +35232,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54461"> +<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="42265"> <summary> Do not audit attempts to send and receive nessus_client packets. </summary> @@ -44226,7 +35243,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nessus_client_packets" lineno="54476"> +<interface name="corenet_relabelto_nessus_client_packets" lineno="42280"> <summary> Relabel packets to nessus_client the packet type. </summary> @@ -44236,7 +35253,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nessus_server_packets" lineno="54496"> +<interface name="corenet_send_nessus_server_packets" lineno="42300"> <summary> Send nessus_server packets. </summary> @@ -44247,7 +35264,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54515"> +<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="42319"> <summary> Do not audit attempts to send nessus_server packets. </summary> @@ -44258,7 +35275,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nessus_server_packets" lineno="54534"> +<interface name="corenet_receive_nessus_server_packets" lineno="42338"> <summary> Receive nessus_server packets. </summary> @@ -44269,7 +35286,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54553"> +<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="42357"> <summary> Do not audit attempts to receive nessus_server packets. </summary> @@ -44280,7 +35297,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nessus_server_packets" lineno="54572"> +<interface name="corenet_sendrecv_nessus_server_packets" lineno="42376"> <summary> Send and receive nessus_server packets. </summary> @@ -44291,7 +35308,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54588"> +<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="42392"> <summary> Do not audit attempts to send and receive nessus_server packets. </summary> @@ -44302,7 +35319,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nessus_server_packets" lineno="54603"> +<interface name="corenet_relabelto_nessus_server_packets" lineno="42407"> <summary> Relabel packets to nessus_server the packet type. </summary> @@ -44312,85 +35329,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_netport_port" lineno="54625"> -<summary> -Send and receive TCP traffic on the netport port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_netport_port" lineno="54640"> -<summary> -Send UDP traffic on the netport port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54655"> -<summary> -Do not audit attempts to send UDP traffic on the netport port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_netport_port" lineno="54670"> -<summary> -Receive UDP traffic on the netport port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54685"> -<summary> -Do not audit attempts to receive UDP traffic on the netport port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_netport_port" lineno="54700"> -<summary> -Send and receive UDP traffic on the netport port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54716"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the netport port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_netport_port" lineno="54731"> +<interface name="corenet_tcp_bind_netport_port" lineno="42429"> <summary> Bind TCP sockets to the netport port. </summary> @@ -44401,7 +35340,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_netport_port" lineno="54751"> +<interface name="corenet_udp_bind_netport_port" lineno="42449"> <summary> Bind UDP sockets to the netport port. </summary> @@ -44412,7 +35351,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_netport_port" lineno="54770"> +<interface name="corenet_tcp_connect_netport_port" lineno="42468"> <summary> Make a TCP connection to the netport port. </summary> @@ -44422,7 +35361,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_netport_client_packets" lineno="54790"> +<interface name="corenet_send_netport_client_packets" lineno="42488"> <summary> Send netport_client packets. </summary> @@ -44433,7 +35372,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54809"> +<interface name="corenet_dontaudit_send_netport_client_packets" lineno="42507"> <summary> Do not audit attempts to send netport_client packets. </summary> @@ -44444,7 +35383,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_netport_client_packets" lineno="54828"> +<interface name="corenet_receive_netport_client_packets" lineno="42526"> <summary> Receive netport_client packets. </summary> @@ -44455,7 +35394,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54847"> +<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="42545"> <summary> Do not audit attempts to receive netport_client packets. </summary> @@ -44466,7 +35405,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_netport_client_packets" lineno="54866"> +<interface name="corenet_sendrecv_netport_client_packets" lineno="42564"> <summary> Send and receive netport_client packets. </summary> @@ -44477,7 +35416,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54882"> +<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="42580"> <summary> Do not audit attempts to send and receive netport_client packets. </summary> @@ -44488,7 +35427,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_netport_client_packets" lineno="54897"> +<interface name="corenet_relabelto_netport_client_packets" lineno="42595"> <summary> Relabel packets to netport_client the packet type. </summary> @@ -44498,7 +35437,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_netport_server_packets" lineno="54917"> +<interface name="corenet_send_netport_server_packets" lineno="42615"> <summary> Send netport_server packets. </summary> @@ -44509,7 +35448,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54936"> +<interface name="corenet_dontaudit_send_netport_server_packets" lineno="42634"> <summary> Do not audit attempts to send netport_server packets. </summary> @@ -44520,7 +35459,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_netport_server_packets" lineno="54955"> +<interface name="corenet_receive_netport_server_packets" lineno="42653"> <summary> Receive netport_server packets. </summary> @@ -44531,7 +35470,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54974"> +<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="42672"> <summary> Do not audit attempts to receive netport_server packets. </summary> @@ -44542,7 +35481,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_netport_server_packets" lineno="54993"> +<interface name="corenet_sendrecv_netport_server_packets" lineno="42691"> <summary> Send and receive netport_server packets. </summary> @@ -44553,7 +35492,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="55009"> +<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="42707"> <summary> Do not audit attempts to send and receive netport_server packets. </summary> @@ -44564,7 +35503,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_netport_server_packets" lineno="55024"> +<interface name="corenet_relabelto_netport_server_packets" lineno="42722"> <summary> Relabel packets to netport_server the packet type. </summary> @@ -44574,85 +35513,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="55046"> -<summary> -Send and receive TCP traffic on the netsupport port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_netsupport_port" lineno="55061"> -<summary> -Send UDP traffic on the netsupport port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="55076"> -<summary> -Do not audit attempts to send UDP traffic on the netsupport port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_netsupport_port" lineno="55091"> -<summary> -Receive UDP traffic on the netsupport port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="55106"> -<summary> -Do not audit attempts to receive UDP traffic on the netsupport port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_netsupport_port" lineno="55121"> -<summary> -Send and receive UDP traffic on the netsupport port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="55137"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the netsupport port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_netsupport_port" lineno="55152"> +<interface name="corenet_tcp_bind_netsupport_port" lineno="42744"> <summary> Bind TCP sockets to the netsupport port. </summary> @@ -44663,7 +35524,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_netsupport_port" lineno="55172"> +<interface name="corenet_udp_bind_netsupport_port" lineno="42764"> <summary> Bind UDP sockets to the netsupport port. </summary> @@ -44674,7 +35535,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_netsupport_port" lineno="55191"> +<interface name="corenet_tcp_connect_netsupport_port" lineno="42783"> <summary> Make a TCP connection to the netsupport port. </summary> @@ -44684,7 +35545,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_netsupport_client_packets" lineno="55211"> +<interface name="corenet_send_netsupport_client_packets" lineno="42803"> <summary> Send netsupport_client packets. </summary> @@ -44695,7 +35556,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55230"> +<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="42822"> <summary> Do not audit attempts to send netsupport_client packets. </summary> @@ -44706,7 +35567,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_netsupport_client_packets" lineno="55249"> +<interface name="corenet_receive_netsupport_client_packets" lineno="42841"> <summary> Receive netsupport_client packets. </summary> @@ -44717,7 +35578,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55268"> +<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="42860"> <summary> Do not audit attempts to receive netsupport_client packets. </summary> @@ -44728,7 +35589,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55287"> +<interface name="corenet_sendrecv_netsupport_client_packets" lineno="42879"> <summary> Send and receive netsupport_client packets. </summary> @@ -44739,7 +35600,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55303"> +<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="42895"> <summary> Do not audit attempts to send and receive netsupport_client packets. </summary> @@ -44750,7 +35611,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_netsupport_client_packets" lineno="55318"> +<interface name="corenet_relabelto_netsupport_client_packets" lineno="42910"> <summary> Relabel packets to netsupport_client the packet type. </summary> @@ -44760,7 +35621,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_netsupport_server_packets" lineno="55338"> +<interface name="corenet_send_netsupport_server_packets" lineno="42930"> <summary> Send netsupport_server packets. </summary> @@ -44771,7 +35632,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55357"> +<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="42949"> <summary> Do not audit attempts to send netsupport_server packets. </summary> @@ -44782,7 +35643,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_netsupport_server_packets" lineno="55376"> +<interface name="corenet_receive_netsupport_server_packets" lineno="42968"> <summary> Receive netsupport_server packets. </summary> @@ -44793,7 +35654,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55395"> +<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="42987"> <summary> Do not audit attempts to receive netsupport_server packets. </summary> @@ -44804,7 +35665,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55414"> +<interface name="corenet_sendrecv_netsupport_server_packets" lineno="43006"> <summary> Send and receive netsupport_server packets. </summary> @@ -44815,7 +35676,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55430"> +<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="43022"> <summary> Do not audit attempts to send and receive netsupport_server packets. </summary> @@ -44826,7 +35687,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_netsupport_server_packets" lineno="55445"> +<interface name="corenet_relabelto_netsupport_server_packets" lineno="43037"> <summary> Relabel packets to netsupport_server the packet type. </summary> @@ -44836,85 +35697,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55467"> -<summary> -Send and receive TCP traffic on the nfs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_nfs_port" lineno="55482"> -<summary> -Send UDP traffic on the nfs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55497"> -<summary> -Do not audit attempts to send UDP traffic on the nfs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_nfs_port" lineno="55512"> -<summary> -Receive UDP traffic on the nfs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55527"> -<summary> -Do not audit attempts to receive UDP traffic on the nfs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_nfs_port" lineno="55542"> -<summary> -Send and receive UDP traffic on the nfs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55558"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the nfs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_nfs_port" lineno="55573"> +<interface name="corenet_tcp_bind_nfs_port" lineno="43059"> <summary> Bind TCP sockets to the nfs port. </summary> @@ -44925,7 +35708,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_nfs_port" lineno="55593"> +<interface name="corenet_udp_bind_nfs_port" lineno="43079"> <summary> Bind UDP sockets to the nfs port. </summary> @@ -44936,7 +35719,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_nfs_port" lineno="55612"> +<interface name="corenet_tcp_connect_nfs_port" lineno="43098"> <summary> Make a TCP connection to the nfs port. </summary> @@ -44946,7 +35729,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nfs_client_packets" lineno="55632"> +<interface name="corenet_send_nfs_client_packets" lineno="43118"> <summary> Send nfs_client packets. </summary> @@ -44957,7 +35740,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55651"> +<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="43137"> <summary> Do not audit attempts to send nfs_client packets. </summary> @@ -44968,7 +35751,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nfs_client_packets" lineno="55670"> +<interface name="corenet_receive_nfs_client_packets" lineno="43156"> <summary> Receive nfs_client packets. </summary> @@ -44979,7 +35762,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55689"> +<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="43175"> <summary> Do not audit attempts to receive nfs_client packets. </summary> @@ -44990,7 +35773,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nfs_client_packets" lineno="55708"> +<interface name="corenet_sendrecv_nfs_client_packets" lineno="43194"> <summary> Send and receive nfs_client packets. </summary> @@ -45001,7 +35784,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55724"> +<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="43210"> <summary> Do not audit attempts to send and receive nfs_client packets. </summary> @@ -45012,7 +35795,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nfs_client_packets" lineno="55739"> +<interface name="corenet_relabelto_nfs_client_packets" lineno="43225"> <summary> Relabel packets to nfs_client the packet type. </summary> @@ -45022,7 +35805,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nfs_server_packets" lineno="55759"> +<interface name="corenet_send_nfs_server_packets" lineno="43245"> <summary> Send nfs_server packets. </summary> @@ -45033,7 +35816,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55778"> +<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="43264"> <summary> Do not audit attempts to send nfs_server packets. </summary> @@ -45044,7 +35827,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nfs_server_packets" lineno="55797"> +<interface name="corenet_receive_nfs_server_packets" lineno="43283"> <summary> Receive nfs_server packets. </summary> @@ -45055,7 +35838,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55816"> +<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="43302"> <summary> Do not audit attempts to receive nfs_server packets. </summary> @@ -45066,7 +35849,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nfs_server_packets" lineno="55835"> +<interface name="corenet_sendrecv_nfs_server_packets" lineno="43321"> <summary> Send and receive nfs_server packets. </summary> @@ -45077,7 +35860,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55851"> +<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="43337"> <summary> Do not audit attempts to send and receive nfs_server packets. </summary> @@ -45088,7 +35871,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nfs_server_packets" lineno="55866"> +<interface name="corenet_relabelto_nfs_server_packets" lineno="43352"> <summary> Relabel packets to nfs_server the packet type. </summary> @@ -45098,85 +35881,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55888"> -<summary> -Send and receive TCP traffic on the nfsrdma port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_nfsrdma_port" lineno="55903"> -<summary> -Send UDP traffic on the nfsrdma port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55918"> -<summary> -Do not audit attempts to send UDP traffic on the nfsrdma port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_nfsrdma_port" lineno="55933"> -<summary> -Receive UDP traffic on the nfsrdma port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55948"> -<summary> -Do not audit attempts to receive UDP traffic on the nfsrdma port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55963"> -<summary> -Send and receive UDP traffic on the nfsrdma port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55979"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the nfsrdma port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55994"> +<interface name="corenet_tcp_bind_nfsrdma_port" lineno="43374"> <summary> Bind TCP sockets to the nfsrdma port. </summary> @@ -45187,7 +35892,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_nfsrdma_port" lineno="56014"> +<interface name="corenet_udp_bind_nfsrdma_port" lineno="43394"> <summary> Bind UDP sockets to the nfsrdma port. </summary> @@ -45198,7 +35903,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_nfsrdma_port" lineno="56033"> +<interface name="corenet_tcp_connect_nfsrdma_port" lineno="43413"> <summary> Make a TCP connection to the nfsrdma port. </summary> @@ -45208,7 +35913,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nfsrdma_client_packets" lineno="56053"> +<interface name="corenet_send_nfsrdma_client_packets" lineno="43433"> <summary> Send nfsrdma_client packets. </summary> @@ -45219,7 +35924,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="56072"> +<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="43452"> <summary> Do not audit attempts to send nfsrdma_client packets. </summary> @@ -45230,7 +35935,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nfsrdma_client_packets" lineno="56091"> +<interface name="corenet_receive_nfsrdma_client_packets" lineno="43471"> <summary> Receive nfsrdma_client packets. </summary> @@ -45241,7 +35946,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="56110"> +<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="43490"> <summary> Do not audit attempts to receive nfsrdma_client packets. </summary> @@ -45252,7 +35957,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="56129"> +<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="43509"> <summary> Send and receive nfsrdma_client packets. </summary> @@ -45263,7 +35968,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56145"> +<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="43525"> <summary> Do not audit attempts to send and receive nfsrdma_client packets. </summary> @@ -45274,7 +35979,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56160"> +<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="43540"> <summary> Relabel packets to nfsrdma_client the packet type. </summary> @@ -45284,7 +35989,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nfsrdma_server_packets" lineno="56180"> +<interface name="corenet_send_nfsrdma_server_packets" lineno="43560"> <summary> Send nfsrdma_server packets. </summary> @@ -45295,7 +36000,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56199"> +<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="43579"> <summary> Do not audit attempts to send nfsrdma_server packets. </summary> @@ -45306,7 +36011,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nfsrdma_server_packets" lineno="56218"> +<interface name="corenet_receive_nfsrdma_server_packets" lineno="43598"> <summary> Receive nfsrdma_server packets. </summary> @@ -45317,7 +36022,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56237"> +<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="43617"> <summary> Do not audit attempts to receive nfsrdma_server packets. </summary> @@ -45328,7 +36033,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56256"> +<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="43636"> <summary> Send and receive nfsrdma_server packets. </summary> @@ -45339,7 +36044,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56272"> +<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="43652"> <summary> Do not audit attempts to send and receive nfsrdma_server packets. </summary> @@ -45350,7 +36055,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56287"> +<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="43667"> <summary> Relabel packets to nfsrdma_server the packet type. </summary> @@ -45360,85 +36065,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56309"> -<summary> -Send and receive TCP traffic on the nmbd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_nmbd_port" lineno="56324"> -<summary> -Send UDP traffic on the nmbd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56339"> -<summary> -Do not audit attempts to send UDP traffic on the nmbd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_nmbd_port" lineno="56354"> -<summary> -Receive UDP traffic on the nmbd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56369"> -<summary> -Do not audit attempts to receive UDP traffic on the nmbd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56384"> -<summary> -Send and receive UDP traffic on the nmbd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56400"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the nmbd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_nmbd_port" lineno="56415"> +<interface name="corenet_tcp_bind_nmbd_port" lineno="43689"> <summary> Bind TCP sockets to the nmbd port. </summary> @@ -45449,7 +36076,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_nmbd_port" lineno="56435"> +<interface name="corenet_udp_bind_nmbd_port" lineno="43709"> <summary> Bind UDP sockets to the nmbd port. </summary> @@ -45460,7 +36087,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_nmbd_port" lineno="56454"> +<interface name="corenet_tcp_connect_nmbd_port" lineno="43728"> <summary> Make a TCP connection to the nmbd port. </summary> @@ -45470,7 +36097,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nmbd_client_packets" lineno="56474"> +<interface name="corenet_send_nmbd_client_packets" lineno="43748"> <summary> Send nmbd_client packets. </summary> @@ -45481,7 +36108,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56493"> +<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="43767"> <summary> Do not audit attempts to send nmbd_client packets. </summary> @@ -45492,7 +36119,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nmbd_client_packets" lineno="56512"> +<interface name="corenet_receive_nmbd_client_packets" lineno="43786"> <summary> Receive nmbd_client packets. </summary> @@ -45503,7 +36130,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56531"> +<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="43805"> <summary> Do not audit attempts to receive nmbd_client packets. </summary> @@ -45514,7 +36141,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56550"> +<interface name="corenet_sendrecv_nmbd_client_packets" lineno="43824"> <summary> Send and receive nmbd_client packets. </summary> @@ -45525,7 +36152,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56566"> +<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="43840"> <summary> Do not audit attempts to send and receive nmbd_client packets. </summary> @@ -45536,7 +36163,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nmbd_client_packets" lineno="56581"> +<interface name="corenet_relabelto_nmbd_client_packets" lineno="43855"> <summary> Relabel packets to nmbd_client the packet type. </summary> @@ -45546,7 +36173,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_nmbd_server_packets" lineno="56601"> +<interface name="corenet_send_nmbd_server_packets" lineno="43875"> <summary> Send nmbd_server packets. </summary> @@ -45557,7 +36184,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56620"> +<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="43894"> <summary> Do not audit attempts to send nmbd_server packets. </summary> @@ -45568,7 +36195,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_nmbd_server_packets" lineno="56639"> +<interface name="corenet_receive_nmbd_server_packets" lineno="43913"> <summary> Receive nmbd_server packets. </summary> @@ -45579,7 +36206,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56658"> +<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="43932"> <summary> Do not audit attempts to receive nmbd_server packets. </summary> @@ -45590,7 +36217,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56677"> +<interface name="corenet_sendrecv_nmbd_server_packets" lineno="43951"> <summary> Send and receive nmbd_server packets. </summary> @@ -45601,7 +36228,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56693"> +<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="43967"> <summary> Do not audit attempts to send and receive nmbd_server packets. </summary> @@ -45612,7 +36239,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_nmbd_server_packets" lineno="56708"> +<interface name="corenet_relabelto_nmbd_server_packets" lineno="43982"> <summary> Relabel packets to nmbd_server the packet type. </summary> @@ -45622,85 +36249,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56730"> -<summary> -Send and receive TCP traffic on the ntop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ntop_port" lineno="56745"> -<summary> -Send UDP traffic on the ntop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56760"> -<summary> -Do not audit attempts to send UDP traffic on the ntop port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ntop_port" lineno="56775"> -<summary> -Receive UDP traffic on the ntop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56790"> -<summary> -Do not audit attempts to receive UDP traffic on the ntop port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ntop_port" lineno="56805"> -<summary> -Send and receive UDP traffic on the ntop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56821"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ntop port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ntop_port" lineno="56836"> +<interface name="corenet_tcp_bind_ntop_port" lineno="44004"> <summary> Bind TCP sockets to the ntop port. </summary> @@ -45711,7 +36260,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ntop_port" lineno="56856"> +<interface name="corenet_udp_bind_ntop_port" lineno="44024"> <summary> Bind UDP sockets to the ntop port. </summary> @@ -45722,7 +36271,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ntop_port" lineno="56875"> +<interface name="corenet_tcp_connect_ntop_port" lineno="44043"> <summary> Make a TCP connection to the ntop port. </summary> @@ -45732,7 +36281,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntop_client_packets" lineno="56895"> +<interface name="corenet_send_ntop_client_packets" lineno="44063"> <summary> Send ntop_client packets. </summary> @@ -45743,7 +36292,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56914"> +<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="44082"> <summary> Do not audit attempts to send ntop_client packets. </summary> @@ -45754,7 +36303,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntop_client_packets" lineno="56933"> +<interface name="corenet_receive_ntop_client_packets" lineno="44101"> <summary> Receive ntop_client packets. </summary> @@ -45765,7 +36314,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56952"> +<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="44120"> <summary> Do not audit attempts to receive ntop_client packets. </summary> @@ -45776,7 +36325,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntop_client_packets" lineno="56971"> +<interface name="corenet_sendrecv_ntop_client_packets" lineno="44139"> <summary> Send and receive ntop_client packets. </summary> @@ -45787,7 +36336,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56987"> +<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="44155"> <summary> Do not audit attempts to send and receive ntop_client packets. </summary> @@ -45798,7 +36347,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntop_client_packets" lineno="57002"> +<interface name="corenet_relabelto_ntop_client_packets" lineno="44170"> <summary> Relabel packets to ntop_client the packet type. </summary> @@ -45808,7 +36357,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntop_server_packets" lineno="57022"> +<interface name="corenet_send_ntop_server_packets" lineno="44190"> <summary> Send ntop_server packets. </summary> @@ -45819,7 +36368,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="57041"> +<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="44209"> <summary> Do not audit attempts to send ntop_server packets. </summary> @@ -45830,7 +36379,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntop_server_packets" lineno="57060"> +<interface name="corenet_receive_ntop_server_packets" lineno="44228"> <summary> Receive ntop_server packets. </summary> @@ -45841,7 +36390,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="57079"> +<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="44247"> <summary> Do not audit attempts to receive ntop_server packets. </summary> @@ -45852,7 +36401,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntop_server_packets" lineno="57098"> +<interface name="corenet_sendrecv_ntop_server_packets" lineno="44266"> <summary> Send and receive ntop_server packets. </summary> @@ -45863,7 +36412,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="57114"> +<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="44282"> <summary> Do not audit attempts to send and receive ntop_server packets. </summary> @@ -45874,7 +36423,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntop_server_packets" lineno="57129"> +<interface name="corenet_relabelto_ntop_server_packets" lineno="44297"> <summary> Relabel packets to ntop_server the packet type. </summary> @@ -45884,85 +36433,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57151"> -<summary> -Send and receive TCP traffic on the ntp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ntp_port" lineno="57166"> -<summary> -Send UDP traffic on the ntp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57181"> -<summary> -Do not audit attempts to send UDP traffic on the ntp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ntp_port" lineno="57196"> -<summary> -Receive UDP traffic on the ntp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57211"> -<summary> -Do not audit attempts to receive UDP traffic on the ntp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ntp_port" lineno="57226"> -<summary> -Send and receive UDP traffic on the ntp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57242"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ntp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ntp_port" lineno="57257"> +<interface name="corenet_tcp_bind_ntp_port" lineno="44319"> <summary> Bind TCP sockets to the ntp port. </summary> @@ -45973,7 +36444,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ntp_port" lineno="57277"> +<interface name="corenet_udp_bind_ntp_port" lineno="44339"> <summary> Bind UDP sockets to the ntp port. </summary> @@ -45984,7 +36455,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ntp_port" lineno="57296"> +<interface name="corenet_tcp_connect_ntp_port" lineno="44358"> <summary> Make a TCP connection to the ntp port. </summary> @@ -45994,7 +36465,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntp_client_packets" lineno="57316"> +<interface name="corenet_send_ntp_client_packets" lineno="44378"> <summary> Send ntp_client packets. </summary> @@ -46005,7 +36476,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57335"> +<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="44397"> <summary> Do not audit attempts to send ntp_client packets. </summary> @@ -46016,7 +36487,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntp_client_packets" lineno="57354"> +<interface name="corenet_receive_ntp_client_packets" lineno="44416"> <summary> Receive ntp_client packets. </summary> @@ -46027,7 +36498,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57373"> +<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="44435"> <summary> Do not audit attempts to receive ntp_client packets. </summary> @@ -46038,7 +36509,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntp_client_packets" lineno="57392"> +<interface name="corenet_sendrecv_ntp_client_packets" lineno="44454"> <summary> Send and receive ntp_client packets. </summary> @@ -46049,7 +36520,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57408"> +<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="44470"> <summary> Do not audit attempts to send and receive ntp_client packets. </summary> @@ -46060,7 +36531,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntp_client_packets" lineno="57423"> +<interface name="corenet_relabelto_ntp_client_packets" lineno="44485"> <summary> Relabel packets to ntp_client the packet type. </summary> @@ -46070,7 +36541,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntp_server_packets" lineno="57443"> +<interface name="corenet_send_ntp_server_packets" lineno="44505"> <summary> Send ntp_server packets. </summary> @@ -46081,7 +36552,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57462"> +<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="44524"> <summary> Do not audit attempts to send ntp_server packets. </summary> @@ -46092,7 +36563,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntp_server_packets" lineno="57481"> +<interface name="corenet_receive_ntp_server_packets" lineno="44543"> <summary> Receive ntp_server packets. </summary> @@ -46103,7 +36574,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57500"> +<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="44562"> <summary> Do not audit attempts to receive ntp_server packets. </summary> @@ -46114,7 +36585,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntp_server_packets" lineno="57519"> +<interface name="corenet_sendrecv_ntp_server_packets" lineno="44581"> <summary> Send and receive ntp_server packets. </summary> @@ -46125,7 +36596,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57535"> +<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="44597"> <summary> Do not audit attempts to send and receive ntp_server packets. </summary> @@ -46136,7 +36607,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntp_server_packets" lineno="57550"> +<interface name="corenet_relabelto_ntp_server_packets" lineno="44612"> <summary> Relabel packets to ntp_server the packet type. </summary> @@ -46146,85 +36617,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ntske_port" lineno="57572"> -<summary> -Send and receive TCP traffic on the ntske port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ntske_port" lineno="57587"> -<summary> -Send UDP traffic on the ntske port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ntske_port" lineno="57602"> -<summary> -Do not audit attempts to send UDP traffic on the ntske port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ntske_port" lineno="57617"> -<summary> -Receive UDP traffic on the ntske port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ntske_port" lineno="57632"> -<summary> -Do not audit attempts to receive UDP traffic on the ntske port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ntske_port" lineno="57647"> -<summary> -Send and receive UDP traffic on the ntske port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ntske_port" lineno="57663"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ntske port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ntske_port" lineno="57678"> +<interface name="corenet_tcp_bind_ntske_port" lineno="44634"> <summary> Bind TCP sockets to the ntske port. </summary> @@ -46235,7 +36628,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ntske_port" lineno="57698"> +<interface name="corenet_udp_bind_ntske_port" lineno="44654"> <summary> Bind UDP sockets to the ntske port. </summary> @@ -46246,7 +36639,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ntske_port" lineno="57717"> +<interface name="corenet_tcp_connect_ntske_port" lineno="44673"> <summary> Make a TCP connection to the ntske port. </summary> @@ -46256,7 +36649,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntske_client_packets" lineno="57737"> +<interface name="corenet_send_ntske_client_packets" lineno="44693"> <summary> Send ntske_client packets. </summary> @@ -46267,7 +36660,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="57756"> +<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="44712"> <summary> Do not audit attempts to send ntske_client packets. </summary> @@ -46278,7 +36671,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntske_client_packets" lineno="57775"> +<interface name="corenet_receive_ntske_client_packets" lineno="44731"> <summary> Receive ntske_client packets. </summary> @@ -46289,7 +36682,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="57794"> +<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="44750"> <summary> Do not audit attempts to receive ntske_client packets. </summary> @@ -46300,7 +36693,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntske_client_packets" lineno="57813"> +<interface name="corenet_sendrecv_ntske_client_packets" lineno="44769"> <summary> Send and receive ntske_client packets. </summary> @@ -46311,7 +36704,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="57829"> +<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="44785"> <summary> Do not audit attempts to send and receive ntske_client packets. </summary> @@ -46322,7 +36715,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntske_client_packets" lineno="57844"> +<interface name="corenet_relabelto_ntske_client_packets" lineno="44800"> <summary> Relabel packets to ntske_client the packet type. </summary> @@ -46332,7 +36725,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ntske_server_packets" lineno="57864"> +<interface name="corenet_send_ntske_server_packets" lineno="44820"> <summary> Send ntske_server packets. </summary> @@ -46343,7 +36736,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="57883"> +<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="44839"> <summary> Do not audit attempts to send ntske_server packets. </summary> @@ -46354,7 +36747,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ntske_server_packets" lineno="57902"> +<interface name="corenet_receive_ntske_server_packets" lineno="44858"> <summary> Receive ntske_server packets. </summary> @@ -46365,7 +36758,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="57921"> +<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="44877"> <summary> Do not audit attempts to receive ntske_server packets. </summary> @@ -46376,7 +36769,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ntske_server_packets" lineno="57940"> +<interface name="corenet_sendrecv_ntske_server_packets" lineno="44896"> <summary> Send and receive ntske_server packets. </summary> @@ -46387,7 +36780,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="57956"> +<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="44912"> <summary> Do not audit attempts to send and receive ntske_server packets. </summary> @@ -46398,7 +36791,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ntske_server_packets" lineno="57971"> +<interface name="corenet_relabelto_ntske_server_packets" lineno="44927"> <summary> Relabel packets to ntske_server the packet type. </summary> @@ -46408,85 +36801,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57993"> -<summary> -Send and receive TCP traffic on the oa_system port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_oa_system_port" lineno="58008"> -<summary> -Send UDP traffic on the oa_system port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="58023"> -<summary> -Do not audit attempts to send UDP traffic on the oa_system port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_oa_system_port" lineno="58038"> -<summary> -Receive UDP traffic on the oa_system port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="58053"> -<summary> -Do not audit attempts to receive UDP traffic on the oa_system port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_oa_system_port" lineno="58068"> -<summary> -Send and receive UDP traffic on the oa_system port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="58084"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the oa_system port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_oa_system_port" lineno="58099"> +<interface name="corenet_tcp_bind_oa_system_port" lineno="44949"> <summary> Bind TCP sockets to the oa_system port. </summary> @@ -46497,7 +36812,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_oa_system_port" lineno="58119"> +<interface name="corenet_udp_bind_oa_system_port" lineno="44969"> <summary> Bind UDP sockets to the oa_system port. </summary> @@ -46508,7 +36823,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_oa_system_port" lineno="58138"> +<interface name="corenet_tcp_connect_oa_system_port" lineno="44988"> <summary> Make a TCP connection to the oa_system port. </summary> @@ -46518,7 +36833,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_oa_system_client_packets" lineno="58158"> +<interface name="corenet_send_oa_system_client_packets" lineno="45008"> <summary> Send oa_system_client packets. </summary> @@ -46529,7 +36844,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="58177"> +<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="45027"> <summary> Do not audit attempts to send oa_system_client packets. </summary> @@ -46540,7 +36855,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_oa_system_client_packets" lineno="58196"> +<interface name="corenet_receive_oa_system_client_packets" lineno="45046"> <summary> Receive oa_system_client packets. </summary> @@ -46551,7 +36866,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="58215"> +<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="45065"> <summary> Do not audit attempts to receive oa_system_client packets. </summary> @@ -46562,7 +36877,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_oa_system_client_packets" lineno="58234"> +<interface name="corenet_sendrecv_oa_system_client_packets" lineno="45084"> <summary> Send and receive oa_system_client packets. </summary> @@ -46573,7 +36888,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="58250"> +<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="45100"> <summary> Do not audit attempts to send and receive oa_system_client packets. </summary> @@ -46584,7 +36899,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_oa_system_client_packets" lineno="58265"> +<interface name="corenet_relabelto_oa_system_client_packets" lineno="45115"> <summary> Relabel packets to oa_system_client the packet type. </summary> @@ -46594,7 +36909,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_oa_system_server_packets" lineno="58285"> +<interface name="corenet_send_oa_system_server_packets" lineno="45135"> <summary> Send oa_system_server packets. </summary> @@ -46605,7 +36920,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="58304"> +<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="45154"> <summary> Do not audit attempts to send oa_system_server packets. </summary> @@ -46616,7 +36931,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_oa_system_server_packets" lineno="58323"> +<interface name="corenet_receive_oa_system_server_packets" lineno="45173"> <summary> Receive oa_system_server packets. </summary> @@ -46627,7 +36942,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="58342"> +<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="45192"> <summary> Do not audit attempts to receive oa_system_server packets. </summary> @@ -46638,7 +36953,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_oa_system_server_packets" lineno="58361"> +<interface name="corenet_sendrecv_oa_system_server_packets" lineno="45211"> <summary> Send and receive oa_system_server packets. </summary> @@ -46649,7 +36964,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="58377"> +<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="45227"> <summary> Do not audit attempts to send and receive oa_system_server packets. </summary> @@ -46660,7 +36975,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_oa_system_server_packets" lineno="58392"> +<interface name="corenet_relabelto_oa_system_server_packets" lineno="45242"> <summary> Relabel packets to oa_system_server the packet type. </summary> @@ -46670,85 +36985,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="58414"> -<summary> -Send and receive TCP traffic on the oracledb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_oracledb_port" lineno="58429"> -<summary> -Send UDP traffic on the oracledb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58444"> -<summary> -Do not audit attempts to send UDP traffic on the oracledb port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_oracledb_port" lineno="58459"> -<summary> -Receive UDP traffic on the oracledb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58474"> -<summary> -Do not audit attempts to receive UDP traffic on the oracledb port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58489"> -<summary> -Send and receive UDP traffic on the oracledb port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58505"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the oracledb port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_oracledb_port" lineno="58520"> +<interface name="corenet_tcp_bind_oracledb_port" lineno="45264"> <summary> Bind TCP sockets to the oracledb port. </summary> @@ -46759,7 +36996,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_oracledb_port" lineno="58540"> +<interface name="corenet_udp_bind_oracledb_port" lineno="45284"> <summary> Bind UDP sockets to the oracledb port. </summary> @@ -46770,7 +37007,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_oracledb_port" lineno="58559"> +<interface name="corenet_tcp_connect_oracledb_port" lineno="45303"> <summary> Make a TCP connection to the oracledb port. </summary> @@ -46780,7 +37017,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_oracledb_client_packets" lineno="58579"> +<interface name="corenet_send_oracledb_client_packets" lineno="45323"> <summary> Send oracledb_client packets. </summary> @@ -46791,7 +37028,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58598"> +<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="45342"> <summary> Do not audit attempts to send oracledb_client packets. </summary> @@ -46802,7 +37039,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_oracledb_client_packets" lineno="58617"> +<interface name="corenet_receive_oracledb_client_packets" lineno="45361"> <summary> Receive oracledb_client packets. </summary> @@ -46813,7 +37050,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58636"> +<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="45380"> <summary> Do not audit attempts to receive oracledb_client packets. </summary> @@ -46824,7 +37061,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58655"> +<interface name="corenet_sendrecv_oracledb_client_packets" lineno="45399"> <summary> Send and receive oracledb_client packets. </summary> @@ -46835,7 +37072,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58671"> +<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="45415"> <summary> Do not audit attempts to send and receive oracledb_client packets. </summary> @@ -46846,7 +37083,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_oracledb_client_packets" lineno="58686"> +<interface name="corenet_relabelto_oracledb_client_packets" lineno="45430"> <summary> Relabel packets to oracledb_client the packet type. </summary> @@ -46856,7 +37093,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_oracledb_server_packets" lineno="58706"> +<interface name="corenet_send_oracledb_server_packets" lineno="45450"> <summary> Send oracledb_server packets. </summary> @@ -46867,7 +37104,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58725"> +<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="45469"> <summary> Do not audit attempts to send oracledb_server packets. </summary> @@ -46878,7 +37115,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_oracledb_server_packets" lineno="58744"> +<interface name="corenet_receive_oracledb_server_packets" lineno="45488"> <summary> Receive oracledb_server packets. </summary> @@ -46889,7 +37126,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58763"> +<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="45507"> <summary> Do not audit attempts to receive oracledb_server packets. </summary> @@ -46900,7 +37137,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58782"> +<interface name="corenet_sendrecv_oracledb_server_packets" lineno="45526"> <summary> Send and receive oracledb_server packets. </summary> @@ -46911,7 +37148,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58798"> +<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="45542"> <summary> Do not audit attempts to send and receive oracledb_server packets. </summary> @@ -46922,7 +37159,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_oracledb_server_packets" lineno="58813"> +<interface name="corenet_relabelto_oracledb_server_packets" lineno="45557"> <summary> Relabel packets to oracledb_server the packet type. </summary> @@ -46932,85 +37169,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58835"> -<summary> -Send and receive TCP traffic on the ocsp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ocsp_port" lineno="58850"> -<summary> -Send UDP traffic on the ocsp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58865"> -<summary> -Do not audit attempts to send UDP traffic on the ocsp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ocsp_port" lineno="58880"> -<summary> -Receive UDP traffic on the ocsp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58895"> -<summary> -Do not audit attempts to receive UDP traffic on the ocsp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58910"> -<summary> -Send and receive UDP traffic on the ocsp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58926"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ocsp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ocsp_port" lineno="58941"> +<interface name="corenet_tcp_bind_ocsp_port" lineno="45579"> <summary> Bind TCP sockets to the ocsp port. </summary> @@ -47021,7 +37180,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ocsp_port" lineno="58961"> +<interface name="corenet_udp_bind_ocsp_port" lineno="45599"> <summary> Bind UDP sockets to the ocsp port. </summary> @@ -47032,7 +37191,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ocsp_port" lineno="58980"> +<interface name="corenet_tcp_connect_ocsp_port" lineno="45618"> <summary> Make a TCP connection to the ocsp port. </summary> @@ -47042,7 +37201,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ocsp_client_packets" lineno="59000"> +<interface name="corenet_send_ocsp_client_packets" lineno="45638"> <summary> Send ocsp_client packets. </summary> @@ -47053,7 +37212,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="59019"> +<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="45657"> <summary> Do not audit attempts to send ocsp_client packets. </summary> @@ -47064,7 +37223,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ocsp_client_packets" lineno="59038"> +<interface name="corenet_receive_ocsp_client_packets" lineno="45676"> <summary> Receive ocsp_client packets. </summary> @@ -47075,7 +37234,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="59057"> +<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="45695"> <summary> Do not audit attempts to receive ocsp_client packets. </summary> @@ -47086,7 +37245,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ocsp_client_packets" lineno="59076"> +<interface name="corenet_sendrecv_ocsp_client_packets" lineno="45714"> <summary> Send and receive ocsp_client packets. </summary> @@ -47097,7 +37256,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="59092"> +<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="45730"> <summary> Do not audit attempts to send and receive ocsp_client packets. </summary> @@ -47108,7 +37267,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ocsp_client_packets" lineno="59107"> +<interface name="corenet_relabelto_ocsp_client_packets" lineno="45745"> <summary> Relabel packets to ocsp_client the packet type. </summary> @@ -47118,7 +37277,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ocsp_server_packets" lineno="59127"> +<interface name="corenet_send_ocsp_server_packets" lineno="45765"> <summary> Send ocsp_server packets. </summary> @@ -47129,7 +37288,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="59146"> +<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="45784"> <summary> Do not audit attempts to send ocsp_server packets. </summary> @@ -47140,7 +37299,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ocsp_server_packets" lineno="59165"> +<interface name="corenet_receive_ocsp_server_packets" lineno="45803"> <summary> Receive ocsp_server packets. </summary> @@ -47151,7 +37310,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="59184"> +<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="45822"> <summary> Do not audit attempts to receive ocsp_server packets. </summary> @@ -47162,7 +37321,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ocsp_server_packets" lineno="59203"> +<interface name="corenet_sendrecv_ocsp_server_packets" lineno="45841"> <summary> Send and receive ocsp_server packets. </summary> @@ -47173,7 +37332,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="59219"> +<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="45857"> <summary> Do not audit attempts to send and receive ocsp_server packets. </summary> @@ -47184,7 +37343,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ocsp_server_packets" lineno="59234"> +<interface name="corenet_relabelto_ocsp_server_packets" lineno="45872"> <summary> Relabel packets to ocsp_server the packet type. </summary> @@ -47194,85 +37353,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="59256"> -<summary> -Send and receive TCP traffic on the openhpid port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_openhpid_port" lineno="59271"> -<summary> -Send UDP traffic on the openhpid port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="59286"> -<summary> -Do not audit attempts to send UDP traffic on the openhpid port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_openhpid_port" lineno="59301"> -<summary> -Receive UDP traffic on the openhpid port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="59316"> -<summary> -Do not audit attempts to receive UDP traffic on the openhpid port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_openhpid_port" lineno="59331"> -<summary> -Send and receive UDP traffic on the openhpid port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="59347"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the openhpid port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_openhpid_port" lineno="59362"> +<interface name="corenet_tcp_bind_openhpid_port" lineno="45894"> <summary> Bind TCP sockets to the openhpid port. </summary> @@ -47283,7 +37364,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_openhpid_port" lineno="59382"> +<interface name="corenet_udp_bind_openhpid_port" lineno="45914"> <summary> Bind UDP sockets to the openhpid port. </summary> @@ -47294,7 +37375,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_openhpid_port" lineno="59401"> +<interface name="corenet_tcp_connect_openhpid_port" lineno="45933"> <summary> Make a TCP connection to the openhpid port. </summary> @@ -47304,7 +37385,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_openhpid_client_packets" lineno="59421"> +<interface name="corenet_send_openhpid_client_packets" lineno="45953"> <summary> Send openhpid_client packets. </summary> @@ -47315,7 +37396,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59440"> +<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="45972"> <summary> Do not audit attempts to send openhpid_client packets. </summary> @@ -47326,7 +37407,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_openhpid_client_packets" lineno="59459"> +<interface name="corenet_receive_openhpid_client_packets" lineno="45991"> <summary> Receive openhpid_client packets. </summary> @@ -47337,7 +37418,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59478"> +<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="46010"> <summary> Do not audit attempts to receive openhpid_client packets. </summary> @@ -47348,7 +37429,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59497"> +<interface name="corenet_sendrecv_openhpid_client_packets" lineno="46029"> <summary> Send and receive openhpid_client packets. </summary> @@ -47359,7 +37440,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59513"> +<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="46045"> <summary> Do not audit attempts to send and receive openhpid_client packets. </summary> @@ -47370,7 +37451,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_openhpid_client_packets" lineno="59528"> +<interface name="corenet_relabelto_openhpid_client_packets" lineno="46060"> <summary> Relabel packets to openhpid_client the packet type. </summary> @@ -47380,7 +37461,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_openhpid_server_packets" lineno="59548"> +<interface name="corenet_send_openhpid_server_packets" lineno="46080"> <summary> Send openhpid_server packets. </summary> @@ -47391,7 +37472,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59567"> +<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="46099"> <summary> Do not audit attempts to send openhpid_server packets. </summary> @@ -47402,7 +37483,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_openhpid_server_packets" lineno="59586"> +<interface name="corenet_receive_openhpid_server_packets" lineno="46118"> <summary> Receive openhpid_server packets. </summary> @@ -47413,7 +37494,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59605"> +<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="46137"> <summary> Do not audit attempts to receive openhpid_server packets. </summary> @@ -47424,7 +37505,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59624"> +<interface name="corenet_sendrecv_openhpid_server_packets" lineno="46156"> <summary> Send and receive openhpid_server packets. </summary> @@ -47435,7 +37516,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59640"> +<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="46172"> <summary> Do not audit attempts to send and receive openhpid_server packets. </summary> @@ -47446,7 +37527,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_openhpid_server_packets" lineno="59655"> +<interface name="corenet_relabelto_openhpid_server_packets" lineno="46187"> <summary> Relabel packets to openhpid_server the packet type. </summary> @@ -47456,85 +37537,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59677"> -<summary> -Send and receive TCP traffic on the openvpn port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_openvpn_port" lineno="59692"> -<summary> -Send UDP traffic on the openvpn port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59707"> -<summary> -Do not audit attempts to send UDP traffic on the openvpn port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_openvpn_port" lineno="59722"> -<summary> -Receive UDP traffic on the openvpn port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59737"> -<summary> -Do not audit attempts to receive UDP traffic on the openvpn port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59752"> -<summary> -Send and receive UDP traffic on the openvpn port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59768"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the openvpn port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_openvpn_port" lineno="59783"> +<interface name="corenet_tcp_bind_openvpn_port" lineno="46209"> <summary> Bind TCP sockets to the openvpn port. </summary> @@ -47545,7 +37548,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_openvpn_port" lineno="59803"> +<interface name="corenet_udp_bind_openvpn_port" lineno="46229"> <summary> Bind UDP sockets to the openvpn port. </summary> @@ -47556,7 +37559,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_openvpn_port" lineno="59822"> +<interface name="corenet_tcp_connect_openvpn_port" lineno="46248"> <summary> Make a TCP connection to the openvpn port. </summary> @@ -47566,7 +37569,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_openvpn_client_packets" lineno="59842"> +<interface name="corenet_send_openvpn_client_packets" lineno="46268"> <summary> Send openvpn_client packets. </summary> @@ -47577,7 +37580,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59861"> +<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="46287"> <summary> Do not audit attempts to send openvpn_client packets. </summary> @@ -47588,7 +37591,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_openvpn_client_packets" lineno="59880"> +<interface name="corenet_receive_openvpn_client_packets" lineno="46306"> <summary> Receive openvpn_client packets. </summary> @@ -47599,7 +37602,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59899"> +<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="46325"> <summary> Do not audit attempts to receive openvpn_client packets. </summary> @@ -47610,7 +37613,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59918"> +<interface name="corenet_sendrecv_openvpn_client_packets" lineno="46344"> <summary> Send and receive openvpn_client packets. </summary> @@ -47621,7 +37624,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59934"> +<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="46360"> <summary> Do not audit attempts to send and receive openvpn_client packets. </summary> @@ -47632,7 +37635,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_openvpn_client_packets" lineno="59949"> +<interface name="corenet_relabelto_openvpn_client_packets" lineno="46375"> <summary> Relabel packets to openvpn_client the packet type. </summary> @@ -47642,7 +37645,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_openvpn_server_packets" lineno="59969"> +<interface name="corenet_send_openvpn_server_packets" lineno="46395"> <summary> Send openvpn_server packets. </summary> @@ -47653,7 +37656,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59988"> +<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="46414"> <summary> Do not audit attempts to send openvpn_server packets. </summary> @@ -47664,7 +37667,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_openvpn_server_packets" lineno="60007"> +<interface name="corenet_receive_openvpn_server_packets" lineno="46433"> <summary> Receive openvpn_server packets. </summary> @@ -47675,7 +37678,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="60026"> +<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="46452"> <summary> Do not audit attempts to receive openvpn_server packets. </summary> @@ -47686,7 +37689,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_openvpn_server_packets" lineno="60045"> +<interface name="corenet_sendrecv_openvpn_server_packets" lineno="46471"> <summary> Send and receive openvpn_server packets. </summary> @@ -47697,7 +37700,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="60061"> +<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="46487"> <summary> Do not audit attempts to send and receive openvpn_server packets. </summary> @@ -47708,7 +37711,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_openvpn_server_packets" lineno="60076"> +<interface name="corenet_relabelto_openvpn_server_packets" lineno="46502"> <summary> Relabel packets to openvpn_server the packet type. </summary> @@ -47718,85 +37721,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pdps_port" lineno="60098"> -<summary> -Send and receive TCP traffic on the pdps port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_pdps_port" lineno="60113"> -<summary> -Send UDP traffic on the pdps port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="60128"> -<summary> -Do not audit attempts to send UDP traffic on the pdps port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_pdps_port" lineno="60143"> -<summary> -Receive UDP traffic on the pdps port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="60158"> -<summary> -Do not audit attempts to receive UDP traffic on the pdps port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_pdps_port" lineno="60173"> -<summary> -Send and receive UDP traffic on the pdps port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="60189"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the pdps port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_pdps_port" lineno="60204"> +<interface name="corenet_tcp_bind_pdps_port" lineno="46524"> <summary> Bind TCP sockets to the pdps port. </summary> @@ -47807,7 +37732,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pdps_port" lineno="60224"> +<interface name="corenet_udp_bind_pdps_port" lineno="46544"> <summary> Bind UDP sockets to the pdps port. </summary> @@ -47818,7 +37743,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pdps_port" lineno="60243"> +<interface name="corenet_tcp_connect_pdps_port" lineno="46563"> <summary> Make a TCP connection to the pdps port. </summary> @@ -47828,7 +37753,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pdps_client_packets" lineno="60263"> +<interface name="corenet_send_pdps_client_packets" lineno="46583"> <summary> Send pdps_client packets. </summary> @@ -47839,7 +37764,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="60282"> +<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="46602"> <summary> Do not audit attempts to send pdps_client packets. </summary> @@ -47850,7 +37775,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pdps_client_packets" lineno="60301"> +<interface name="corenet_receive_pdps_client_packets" lineno="46621"> <summary> Receive pdps_client packets. </summary> @@ -47861,7 +37786,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="60320"> +<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="46640"> <summary> Do not audit attempts to receive pdps_client packets. </summary> @@ -47872,7 +37797,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pdps_client_packets" lineno="60339"> +<interface name="corenet_sendrecv_pdps_client_packets" lineno="46659"> <summary> Send and receive pdps_client packets. </summary> @@ -47883,7 +37808,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="60355"> +<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="46675"> <summary> Do not audit attempts to send and receive pdps_client packets. </summary> @@ -47894,7 +37819,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pdps_client_packets" lineno="60370"> +<interface name="corenet_relabelto_pdps_client_packets" lineno="46690"> <summary> Relabel packets to pdps_client the packet type. </summary> @@ -47904,7 +37829,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pdps_server_packets" lineno="60390"> +<interface name="corenet_send_pdps_server_packets" lineno="46710"> <summary> Send pdps_server packets. </summary> @@ -47915,7 +37840,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="60409"> +<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="46729"> <summary> Do not audit attempts to send pdps_server packets. </summary> @@ -47926,7 +37851,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pdps_server_packets" lineno="60428"> +<interface name="corenet_receive_pdps_server_packets" lineno="46748"> <summary> Receive pdps_server packets. </summary> @@ -47937,7 +37862,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60447"> +<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="46767"> <summary> Do not audit attempts to receive pdps_server packets. </summary> @@ -47948,7 +37873,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pdps_server_packets" lineno="60466"> +<interface name="corenet_sendrecv_pdps_server_packets" lineno="46786"> <summary> Send and receive pdps_server packets. </summary> @@ -47959,7 +37884,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60482"> +<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="46802"> <summary> Do not audit attempts to send and receive pdps_server packets. </summary> @@ -47970,7 +37895,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pdps_server_packets" lineno="60497"> +<interface name="corenet_relabelto_pdps_server_packets" lineno="46817"> <summary> Relabel packets to pdps_server the packet type. </summary> @@ -47980,85 +37905,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60519"> -<summary> -Send and receive TCP traffic on the pegasus_http port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_pegasus_http_port" lineno="60534"> -<summary> -Send UDP traffic on the pegasus_http port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60549"> -<summary> -Do not audit attempts to send UDP traffic on the pegasus_http port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_pegasus_http_port" lineno="60564"> -<summary> -Receive UDP traffic on the pegasus_http port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60579"> -<summary> -Do not audit attempts to receive UDP traffic on the pegasus_http port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60594"> -<summary> -Send and receive UDP traffic on the pegasus_http port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60610"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the pegasus_http port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60625"> +<interface name="corenet_tcp_bind_pegasus_http_port" lineno="46839"> <summary> Bind TCP sockets to the pegasus_http port. </summary> @@ -48069,7 +37916,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pegasus_http_port" lineno="60645"> +<interface name="corenet_udp_bind_pegasus_http_port" lineno="46859"> <summary> Bind UDP sockets to the pegasus_http port. </summary> @@ -48080,7 +37927,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60664"> +<interface name="corenet_tcp_connect_pegasus_http_port" lineno="46878"> <summary> Make a TCP connection to the pegasus_http port. </summary> @@ -48090,7 +37937,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pegasus_http_client_packets" lineno="60684"> +<interface name="corenet_send_pegasus_http_client_packets" lineno="46898"> <summary> Send pegasus_http_client packets. </summary> @@ -48101,7 +37948,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60703"> +<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="46917"> <summary> Do not audit attempts to send pegasus_http_client packets. </summary> @@ -48112,7 +37959,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pegasus_http_client_packets" lineno="60722"> +<interface name="corenet_receive_pegasus_http_client_packets" lineno="46936"> <summary> Receive pegasus_http_client packets. </summary> @@ -48123,7 +37970,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60741"> +<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="46955"> <summary> Do not audit attempts to receive pegasus_http_client packets. </summary> @@ -48134,7 +37981,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60760"> +<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="46974"> <summary> Send and receive pegasus_http_client packets. </summary> @@ -48145,7 +37992,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60776"> +<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="46990"> <summary> Do not audit attempts to send and receive pegasus_http_client packets. </summary> @@ -48156,7 +38003,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60791"> +<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="47005"> <summary> Relabel packets to pegasus_http_client the packet type. </summary> @@ -48166,7 +38013,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pegasus_http_server_packets" lineno="60811"> +<interface name="corenet_send_pegasus_http_server_packets" lineno="47025"> <summary> Send pegasus_http_server packets. </summary> @@ -48177,7 +38024,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60830"> +<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="47044"> <summary> Do not audit attempts to send pegasus_http_server packets. </summary> @@ -48188,7 +38035,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pegasus_http_server_packets" lineno="60849"> +<interface name="corenet_receive_pegasus_http_server_packets" lineno="47063"> <summary> Receive pegasus_http_server packets. </summary> @@ -48199,7 +38046,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60868"> +<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="47082"> <summary> Do not audit attempts to receive pegasus_http_server packets. </summary> @@ -48210,7 +38057,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60887"> +<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="47101"> <summary> Send and receive pegasus_http_server packets. </summary> @@ -48221,7 +38068,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60903"> +<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="47117"> <summary> Do not audit attempts to send and receive pegasus_http_server packets. </summary> @@ -48232,7 +38079,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60918"> +<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="47132"> <summary> Relabel packets to pegasus_http_server the packet type. </summary> @@ -48242,85 +38089,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60940"> -<summary> -Send and receive TCP traffic on the pegasus_https port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_pegasus_https_port" lineno="60955"> -<summary> -Send UDP traffic on the pegasus_https port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60970"> -<summary> -Do not audit attempts to send UDP traffic on the pegasus_https port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_pegasus_https_port" lineno="60985"> -<summary> -Receive UDP traffic on the pegasus_https port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="61000"> -<summary> -Do not audit attempts to receive UDP traffic on the pegasus_https port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="61015"> -<summary> -Send and receive UDP traffic on the pegasus_https port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="61031"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the pegasus_https port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_pegasus_https_port" lineno="61046"> +<interface name="corenet_tcp_bind_pegasus_https_port" lineno="47154"> <summary> Bind TCP sockets to the pegasus_https port. </summary> @@ -48331,7 +38100,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pegasus_https_port" lineno="61066"> +<interface name="corenet_udp_bind_pegasus_https_port" lineno="47174"> <summary> Bind UDP sockets to the pegasus_https port. </summary> @@ -48342,7 +38111,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pegasus_https_port" lineno="61085"> +<interface name="corenet_tcp_connect_pegasus_https_port" lineno="47193"> <summary> Make a TCP connection to the pegasus_https port. </summary> @@ -48352,7 +38121,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pegasus_https_client_packets" lineno="61105"> +<interface name="corenet_send_pegasus_https_client_packets" lineno="47213"> <summary> Send pegasus_https_client packets. </summary> @@ -48363,7 +38132,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="61124"> +<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="47232"> <summary> Do not audit attempts to send pegasus_https_client packets. </summary> @@ -48374,7 +38143,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pegasus_https_client_packets" lineno="61143"> +<interface name="corenet_receive_pegasus_https_client_packets" lineno="47251"> <summary> Receive pegasus_https_client packets. </summary> @@ -48385,7 +38154,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="61162"> +<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="47270"> <summary> Do not audit attempts to receive pegasus_https_client packets. </summary> @@ -48396,7 +38165,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="61181"> +<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="47289"> <summary> Send and receive pegasus_https_client packets. </summary> @@ -48407,7 +38176,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="61197"> +<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="47305"> <summary> Do not audit attempts to send and receive pegasus_https_client packets. </summary> @@ -48418,7 +38187,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="61212"> +<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="47320"> <summary> Relabel packets to pegasus_https_client the packet type. </summary> @@ -48428,7 +38197,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pegasus_https_server_packets" lineno="61232"> +<interface name="corenet_send_pegasus_https_server_packets" lineno="47340"> <summary> Send pegasus_https_server packets. </summary> @@ -48439,7 +38208,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="61251"> +<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="47359"> <summary> Do not audit attempts to send pegasus_https_server packets. </summary> @@ -48450,7 +38219,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pegasus_https_server_packets" lineno="61270"> +<interface name="corenet_receive_pegasus_https_server_packets" lineno="47378"> <summary> Receive pegasus_https_server packets. </summary> @@ -48461,7 +38230,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="61289"> +<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="47397"> <summary> Do not audit attempts to receive pegasus_https_server packets. </summary> @@ -48472,7 +38241,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="61308"> +<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="47416"> <summary> Send and receive pegasus_https_server packets. </summary> @@ -48483,7 +38252,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="61324"> +<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="47432"> <summary> Do not audit attempts to send and receive pegasus_https_server packets. </summary> @@ -48494,7 +38263,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="61339"> +<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="47447"> <summary> Relabel packets to pegasus_https_server the packet type. </summary> @@ -48504,85 +38273,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="61361"> -<summary> -Send and receive TCP traffic on the pgpkeyserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_pgpkeyserver_port" lineno="61376"> -<summary> -Send UDP traffic on the pgpkeyserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="61391"> -<summary> -Do not audit attempts to send UDP traffic on the pgpkeyserver port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="61406"> -<summary> -Receive UDP traffic on the pgpkeyserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="61421"> -<summary> -Do not audit attempts to receive UDP traffic on the pgpkeyserver port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="61436"> -<summary> -Send and receive UDP traffic on the pgpkeyserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61452"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the pgpkeyserver port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61467"> +<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="47469"> <summary> Bind TCP sockets to the pgpkeyserver port. </summary> @@ -48593,7 +38284,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61487"> +<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="47489"> <summary> Bind UDP sockets to the pgpkeyserver port. </summary> @@ -48604,7 +38295,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61506"> +<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="47508"> <summary> Make a TCP connection to the pgpkeyserver port. </summary> @@ -48614,7 +38305,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61526"> +<interface name="corenet_send_pgpkeyserver_client_packets" lineno="47528"> <summary> Send pgpkeyserver_client packets. </summary> @@ -48625,7 +38316,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61545"> +<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="47547"> <summary> Do not audit attempts to send pgpkeyserver_client packets. </summary> @@ -48636,7 +38327,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61564"> +<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="47566"> <summary> Receive pgpkeyserver_client packets. </summary> @@ -48647,7 +38338,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61583"> +<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="47585"> <summary> Do not audit attempts to receive pgpkeyserver_client packets. </summary> @@ -48658,7 +38349,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61602"> +<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="47604"> <summary> Send and receive pgpkeyserver_client packets. </summary> @@ -48669,7 +38360,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61618"> +<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="47620"> <summary> Do not audit attempts to send and receive pgpkeyserver_client packets. </summary> @@ -48680,7 +38371,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61633"> +<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="47635"> <summary> Relabel packets to pgpkeyserver_client the packet type. </summary> @@ -48690,7 +38381,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61653"> +<interface name="corenet_send_pgpkeyserver_server_packets" lineno="47655"> <summary> Send pgpkeyserver_server packets. </summary> @@ -48701,7 +38392,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61672"> +<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="47674"> <summary> Do not audit attempts to send pgpkeyserver_server packets. </summary> @@ -48712,7 +38403,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61691"> +<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="47693"> <summary> Receive pgpkeyserver_server packets. </summary> @@ -48723,7 +38414,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61710"> +<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="47712"> <summary> Do not audit attempts to receive pgpkeyserver_server packets. </summary> @@ -48734,7 +38425,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61729"> +<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="47731"> <summary> Send and receive pgpkeyserver_server packets. </summary> @@ -48745,7 +38436,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61745"> +<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="47747"> <summary> Do not audit attempts to send and receive pgpkeyserver_server packets. </summary> @@ -48756,7 +38447,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61760"> +<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="47762"> <summary> Relabel packets to pgpkeyserver_server the packet type. </summary> @@ -48766,85 +38457,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61782"> -<summary> -Send and receive TCP traffic on the pingd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_pingd_port" lineno="61797"> -<summary> -Send UDP traffic on the pingd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61812"> -<summary> -Do not audit attempts to send UDP traffic on the pingd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_pingd_port" lineno="61827"> -<summary> -Receive UDP traffic on the pingd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61842"> -<summary> -Do not audit attempts to receive UDP traffic on the pingd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_pingd_port" lineno="61857"> -<summary> -Send and receive UDP traffic on the pingd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61873"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the pingd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_pingd_port" lineno="61888"> +<interface name="corenet_tcp_bind_pingd_port" lineno="47784"> <summary> Bind TCP sockets to the pingd port. </summary> @@ -48855,7 +38468,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pingd_port" lineno="61908"> +<interface name="corenet_udp_bind_pingd_port" lineno="47804"> <summary> Bind UDP sockets to the pingd port. </summary> @@ -48866,7 +38479,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pingd_port" lineno="61927"> +<interface name="corenet_tcp_connect_pingd_port" lineno="47823"> <summary> Make a TCP connection to the pingd port. </summary> @@ -48876,7 +38489,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pingd_client_packets" lineno="61947"> +<interface name="corenet_send_pingd_client_packets" lineno="47843"> <summary> Send pingd_client packets. </summary> @@ -48887,7 +38500,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61966"> +<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="47862"> <summary> Do not audit attempts to send pingd_client packets. </summary> @@ -48898,7 +38511,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pingd_client_packets" lineno="61985"> +<interface name="corenet_receive_pingd_client_packets" lineno="47881"> <summary> Receive pingd_client packets. </summary> @@ -48909,7 +38522,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="62004"> +<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="47900"> <summary> Do not audit attempts to receive pingd_client packets. </summary> @@ -48920,7 +38533,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pingd_client_packets" lineno="62023"> +<interface name="corenet_sendrecv_pingd_client_packets" lineno="47919"> <summary> Send and receive pingd_client packets. </summary> @@ -48931,7 +38544,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="62039"> +<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="47935"> <summary> Do not audit attempts to send and receive pingd_client packets. </summary> @@ -48942,7 +38555,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pingd_client_packets" lineno="62054"> +<interface name="corenet_relabelto_pingd_client_packets" lineno="47950"> <summary> Relabel packets to pingd_client the packet type. </summary> @@ -48952,7 +38565,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pingd_server_packets" lineno="62074"> +<interface name="corenet_send_pingd_server_packets" lineno="47970"> <summary> Send pingd_server packets. </summary> @@ -48963,7 +38576,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="62093"> +<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="47989"> <summary> Do not audit attempts to send pingd_server packets. </summary> @@ -48974,7 +38587,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pingd_server_packets" lineno="62112"> +<interface name="corenet_receive_pingd_server_packets" lineno="48008"> <summary> Receive pingd_server packets. </summary> @@ -48985,7 +38598,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="62131"> +<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="48027"> <summary> Do not audit attempts to receive pingd_server packets. </summary> @@ -48996,7 +38609,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pingd_server_packets" lineno="62150"> +<interface name="corenet_sendrecv_pingd_server_packets" lineno="48046"> <summary> Send and receive pingd_server packets. </summary> @@ -49007,7 +38620,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="62166"> +<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="48062"> <summary> Do not audit attempts to send and receive pingd_server packets. </summary> @@ -49018,7 +38631,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pingd_server_packets" lineno="62181"> +<interface name="corenet_relabelto_pingd_server_packets" lineno="48077"> <summary> Relabel packets to pingd_server the packet type. </summary> @@ -49028,85 +38641,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="62203"> -<summary> -Send and receive TCP traffic on the pktcable_cops port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_pktcable_cops_port" lineno="62218"> -<summary> -Send UDP traffic on the pktcable_cops port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="62233"> -<summary> -Do not audit attempts to send UDP traffic on the pktcable_cops port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_pktcable_cops_port" lineno="62248"> -<summary> -Receive UDP traffic on the pktcable_cops port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="62263"> -<summary> -Do not audit attempts to receive UDP traffic on the pktcable_cops port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="62278"> -<summary> -Send and receive UDP traffic on the pktcable_cops port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="62294"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the pktcable_cops port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="62309"> +<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="48099"> <summary> Bind TCP sockets to the pktcable_cops port. </summary> @@ -49117,7 +38652,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pktcable_cops_port" lineno="62329"> +<interface name="corenet_udp_bind_pktcable_cops_port" lineno="48119"> <summary> Bind UDP sockets to the pktcable_cops port. </summary> @@ -49128,7 +38663,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="62348"> +<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="48138"> <summary> Make a TCP connection to the pktcable_cops port. </summary> @@ -49138,7 +38673,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pktcable_cops_client_packets" lineno="62368"> +<interface name="corenet_send_pktcable_cops_client_packets" lineno="48158"> <summary> Send pktcable_cops_client packets. </summary> @@ -49149,7 +38684,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="62387"> +<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="48177"> <summary> Do not audit attempts to send pktcable_cops_client packets. </summary> @@ -49160,7 +38695,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pktcable_cops_client_packets" lineno="62406"> +<interface name="corenet_receive_pktcable_cops_client_packets" lineno="48196"> <summary> Receive pktcable_cops_client packets. </summary> @@ -49171,7 +38706,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="62425"> +<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="48215"> <summary> Do not audit attempts to receive pktcable_cops_client packets. </summary> @@ -49182,7 +38717,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62444"> +<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="48234"> <summary> Send and receive pktcable_cops_client packets. </summary> @@ -49193,7 +38728,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62460"> +<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="48250"> <summary> Do not audit attempts to send and receive pktcable_cops_client packets. </summary> @@ -49204,7 +38739,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62475"> +<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="48265"> <summary> Relabel packets to pktcable_cops_client the packet type. </summary> @@ -49214,7 +38749,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pktcable_cops_server_packets" lineno="62495"> +<interface name="corenet_send_pktcable_cops_server_packets" lineno="48285"> <summary> Send pktcable_cops_server packets. </summary> @@ -49225,7 +38760,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62514"> +<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="48304"> <summary> Do not audit attempts to send pktcable_cops_server packets. </summary> @@ -49236,7 +38771,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62533"> +<interface name="corenet_receive_pktcable_cops_server_packets" lineno="48323"> <summary> Receive pktcable_cops_server packets. </summary> @@ -49247,7 +38782,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62552"> +<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="48342"> <summary> Do not audit attempts to receive pktcable_cops_server packets. </summary> @@ -49258,7 +38793,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62571"> +<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="48361"> <summary> Send and receive pktcable_cops_server packets. </summary> @@ -49269,7 +38804,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62587"> +<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="48377"> <summary> Do not audit attempts to send and receive pktcable_cops_server packets. </summary> @@ -49280,7 +38815,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62602"> +<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="48392"> <summary> Relabel packets to pktcable_cops_server the packet type. </summary> @@ -49290,85 +38825,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pop_port" lineno="62624"> -<summary> -Send and receive TCP traffic on the pop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_pop_port" lineno="62639"> -<summary> -Send UDP traffic on the pop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62654"> -<summary> -Do not audit attempts to send UDP traffic on the pop port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_pop_port" lineno="62669"> -<summary> -Receive UDP traffic on the pop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62684"> -<summary> -Do not audit attempts to receive UDP traffic on the pop port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_pop_port" lineno="62699"> -<summary> -Send and receive UDP traffic on the pop port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62715"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the pop port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_pop_port" lineno="62730"> +<interface name="corenet_tcp_bind_pop_port" lineno="48414"> <summary> Bind TCP sockets to the pop port. </summary> @@ -49379,7 +38836,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pop_port" lineno="62750"> +<interface name="corenet_udp_bind_pop_port" lineno="48434"> <summary> Bind UDP sockets to the pop port. </summary> @@ -49390,7 +38847,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pop_port" lineno="62769"> +<interface name="corenet_tcp_connect_pop_port" lineno="48453"> <summary> Make a TCP connection to the pop port. </summary> @@ -49400,7 +38857,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pop_client_packets" lineno="62789"> +<interface name="corenet_send_pop_client_packets" lineno="48473"> <summary> Send pop_client packets. </summary> @@ -49411,7 +38868,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62808"> +<interface name="corenet_dontaudit_send_pop_client_packets" lineno="48492"> <summary> Do not audit attempts to send pop_client packets. </summary> @@ -49422,7 +38879,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pop_client_packets" lineno="62827"> +<interface name="corenet_receive_pop_client_packets" lineno="48511"> <summary> Receive pop_client packets. </summary> @@ -49433,7 +38890,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62846"> +<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="48530"> <summary> Do not audit attempts to receive pop_client packets. </summary> @@ -49444,7 +38901,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pop_client_packets" lineno="62865"> +<interface name="corenet_sendrecv_pop_client_packets" lineno="48549"> <summary> Send and receive pop_client packets. </summary> @@ -49455,7 +38912,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62881"> +<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="48565"> <summary> Do not audit attempts to send and receive pop_client packets. </summary> @@ -49466,7 +38923,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pop_client_packets" lineno="62896"> +<interface name="corenet_relabelto_pop_client_packets" lineno="48580"> <summary> Relabel packets to pop_client the packet type. </summary> @@ -49476,7 +38933,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pop_server_packets" lineno="62916"> +<interface name="corenet_send_pop_server_packets" lineno="48600"> <summary> Send pop_server packets. </summary> @@ -49487,7 +38944,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62935"> +<interface name="corenet_dontaudit_send_pop_server_packets" lineno="48619"> <summary> Do not audit attempts to send pop_server packets. </summary> @@ -49498,7 +38955,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pop_server_packets" lineno="62954"> +<interface name="corenet_receive_pop_server_packets" lineno="48638"> <summary> Receive pop_server packets. </summary> @@ -49509,7 +38966,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62973"> +<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="48657"> <summary> Do not audit attempts to receive pop_server packets. </summary> @@ -49520,7 +38977,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pop_server_packets" lineno="62992"> +<interface name="corenet_sendrecv_pop_server_packets" lineno="48676"> <summary> Send and receive pop_server packets. </summary> @@ -49531,7 +38988,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="63008"> +<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="48692"> <summary> Do not audit attempts to send and receive pop_server packets. </summary> @@ -49542,7 +38999,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pop_server_packets" lineno="63023"> +<interface name="corenet_relabelto_pop_server_packets" lineno="48707"> <summary> Relabel packets to pop_server the packet type. </summary> @@ -49552,85 +39009,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_portmap_port" lineno="63045"> -<summary> -Send and receive TCP traffic on the portmap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_portmap_port" lineno="63060"> -<summary> -Send UDP traffic on the portmap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="63075"> -<summary> -Do not audit attempts to send UDP traffic on the portmap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_portmap_port" lineno="63090"> -<summary> -Receive UDP traffic on the portmap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="63105"> -<summary> -Do not audit attempts to receive UDP traffic on the portmap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_portmap_port" lineno="63120"> -<summary> -Send and receive UDP traffic on the portmap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="63136"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the portmap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_portmap_port" lineno="63151"> +<interface name="corenet_tcp_bind_portmap_port" lineno="48729"> <summary> Bind TCP sockets to the portmap port. </summary> @@ -49641,7 +39020,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_portmap_port" lineno="63171"> +<interface name="corenet_udp_bind_portmap_port" lineno="48749"> <summary> Bind UDP sockets to the portmap port. </summary> @@ -49652,7 +39031,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_portmap_port" lineno="63190"> +<interface name="corenet_tcp_connect_portmap_port" lineno="48768"> <summary> Make a TCP connection to the portmap port. </summary> @@ -49662,7 +39041,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_portmap_client_packets" lineno="63210"> +<interface name="corenet_send_portmap_client_packets" lineno="48788"> <summary> Send portmap_client packets. </summary> @@ -49673,7 +39052,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="63229"> +<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="48807"> <summary> Do not audit attempts to send portmap_client packets. </summary> @@ -49684,7 +39063,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_portmap_client_packets" lineno="63248"> +<interface name="corenet_receive_portmap_client_packets" lineno="48826"> <summary> Receive portmap_client packets. </summary> @@ -49695,7 +39074,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="63267"> +<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="48845"> <summary> Do not audit attempts to receive portmap_client packets. </summary> @@ -49706,7 +39085,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_portmap_client_packets" lineno="63286"> +<interface name="corenet_sendrecv_portmap_client_packets" lineno="48864"> <summary> Send and receive portmap_client packets. </summary> @@ -49717,7 +39096,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="63302"> +<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="48880"> <summary> Do not audit attempts to send and receive portmap_client packets. </summary> @@ -49728,7 +39107,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_portmap_client_packets" lineno="63317"> +<interface name="corenet_relabelto_portmap_client_packets" lineno="48895"> <summary> Relabel packets to portmap_client the packet type. </summary> @@ -49738,7 +39117,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_portmap_server_packets" lineno="63337"> +<interface name="corenet_send_portmap_server_packets" lineno="48915"> <summary> Send portmap_server packets. </summary> @@ -49749,7 +39128,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="63356"> +<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="48934"> <summary> Do not audit attempts to send portmap_server packets. </summary> @@ -49760,7 +39139,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_portmap_server_packets" lineno="63375"> +<interface name="corenet_receive_portmap_server_packets" lineno="48953"> <summary> Receive portmap_server packets. </summary> @@ -49771,7 +39150,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="63394"> +<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="48972"> <summary> Do not audit attempts to receive portmap_server packets. </summary> @@ -49782,7 +39161,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_portmap_server_packets" lineno="63413"> +<interface name="corenet_sendrecv_portmap_server_packets" lineno="48991"> <summary> Send and receive portmap_server packets. </summary> @@ -49793,7 +39172,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="63429"> +<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="49007"> <summary> Do not audit attempts to send and receive portmap_server packets. </summary> @@ -49804,7 +39183,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_portmap_server_packets" lineno="63444"> +<interface name="corenet_relabelto_portmap_server_packets" lineno="49022"> <summary> Relabel packets to portmap_server the packet type. </summary> @@ -49814,85 +39193,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63466"> -<summary> -Send and receive TCP traffic on the postfix_policyd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_postfix_policyd_port" lineno="63481"> -<summary> -Send UDP traffic on the postfix_policyd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63496"> -<summary> -Do not audit attempts to send UDP traffic on the postfix_policyd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63511"> -<summary> -Receive UDP traffic on the postfix_policyd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63526"> -<summary> -Do not audit attempts to receive UDP traffic on the postfix_policyd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63541"> -<summary> -Send and receive UDP traffic on the postfix_policyd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63557"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the postfix_policyd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63572"> +<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="49044"> <summary> Bind TCP sockets to the postfix_policyd port. </summary> @@ -49903,7 +39204,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63592"> +<interface name="corenet_udp_bind_postfix_policyd_port" lineno="49064"> <summary> Bind UDP sockets to the postfix_policyd port. </summary> @@ -49914,7 +39215,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63611"> +<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="49083"> <summary> Make a TCP connection to the postfix_policyd port. </summary> @@ -49924,7 +39225,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postfix_policyd_client_packets" lineno="63631"> +<interface name="corenet_send_postfix_policyd_client_packets" lineno="49103"> <summary> Send postfix_policyd_client packets. </summary> @@ -49935,7 +39236,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63650"> +<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="49122"> <summary> Do not audit attempts to send postfix_policyd_client packets. </summary> @@ -49946,7 +39247,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63669"> +<interface name="corenet_receive_postfix_policyd_client_packets" lineno="49141"> <summary> Receive postfix_policyd_client packets. </summary> @@ -49957,7 +39258,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63688"> +<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="49160"> <summary> Do not audit attempts to receive postfix_policyd_client packets. </summary> @@ -49968,7 +39269,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63707"> +<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="49179"> <summary> Send and receive postfix_policyd_client packets. </summary> @@ -49979,7 +39280,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63723"> +<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="49195"> <summary> Do not audit attempts to send and receive postfix_policyd_client packets. </summary> @@ -49990,7 +39291,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63738"> +<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="49210"> <summary> Relabel packets to postfix_policyd_client the packet type. </summary> @@ -50000,7 +39301,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postfix_policyd_server_packets" lineno="63758"> +<interface name="corenet_send_postfix_policyd_server_packets" lineno="49230"> <summary> Send postfix_policyd_server packets. </summary> @@ -50011,7 +39312,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63777"> +<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="49249"> <summary> Do not audit attempts to send postfix_policyd_server packets. </summary> @@ -50022,7 +39323,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63796"> +<interface name="corenet_receive_postfix_policyd_server_packets" lineno="49268"> <summary> Receive postfix_policyd_server packets. </summary> @@ -50033,7 +39334,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63815"> +<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="49287"> <summary> Do not audit attempts to receive postfix_policyd_server packets. </summary> @@ -50044,7 +39345,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63834"> +<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="49306"> <summary> Send and receive postfix_policyd_server packets. </summary> @@ -50055,7 +39356,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63850"> +<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="49322"> <summary> Do not audit attempts to send and receive postfix_policyd_server packets. </summary> @@ -50066,7 +39367,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63865"> +<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="49337"> <summary> Relabel packets to postfix_policyd_server the packet type. </summary> @@ -50076,85 +39377,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63887"> -<summary> -Send and receive TCP traffic on the postgresql port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_postgresql_port" lineno="63902"> -<summary> -Send UDP traffic on the postgresql port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63917"> -<summary> -Do not audit attempts to send UDP traffic on the postgresql port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_postgresql_port" lineno="63932"> -<summary> -Receive UDP traffic on the postgresql port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63947"> -<summary> -Do not audit attempts to receive UDP traffic on the postgresql port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63962"> -<summary> -Send and receive UDP traffic on the postgresql port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63978"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the postgresql port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_postgresql_port" lineno="63993"> +<interface name="corenet_tcp_bind_postgresql_port" lineno="49359"> <summary> Bind TCP sockets to the postgresql port. </summary> @@ -50165,7 +39388,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_postgresql_port" lineno="64013"> +<interface name="corenet_udp_bind_postgresql_port" lineno="49379"> <summary> Bind UDP sockets to the postgresql port. </summary> @@ -50176,7 +39399,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_postgresql_port" lineno="64032"> +<interface name="corenet_tcp_connect_postgresql_port" lineno="49398"> <summary> Make a TCP connection to the postgresql port. </summary> @@ -50186,7 +39409,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postgresql_client_packets" lineno="64052"> +<interface name="corenet_send_postgresql_client_packets" lineno="49418"> <summary> Send postgresql_client packets. </summary> @@ -50197,7 +39420,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="64071"> +<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="49437"> <summary> Do not audit attempts to send postgresql_client packets. </summary> @@ -50208,7 +39431,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postgresql_client_packets" lineno="64090"> +<interface name="corenet_receive_postgresql_client_packets" lineno="49456"> <summary> Receive postgresql_client packets. </summary> @@ -50219,7 +39442,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="64109"> +<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="49475"> <summary> Do not audit attempts to receive postgresql_client packets. </summary> @@ -50230,7 +39453,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postgresql_client_packets" lineno="64128"> +<interface name="corenet_sendrecv_postgresql_client_packets" lineno="49494"> <summary> Send and receive postgresql_client packets. </summary> @@ -50241,7 +39464,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="64144"> +<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="49510"> <summary> Do not audit attempts to send and receive postgresql_client packets. </summary> @@ -50252,7 +39475,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postgresql_client_packets" lineno="64159"> +<interface name="corenet_relabelto_postgresql_client_packets" lineno="49525"> <summary> Relabel packets to postgresql_client the packet type. </summary> @@ -50262,7 +39485,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postgresql_server_packets" lineno="64179"> +<interface name="corenet_send_postgresql_server_packets" lineno="49545"> <summary> Send postgresql_server packets. </summary> @@ -50273,7 +39496,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="64198"> +<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="49564"> <summary> Do not audit attempts to send postgresql_server packets. </summary> @@ -50284,7 +39507,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postgresql_server_packets" lineno="64217"> +<interface name="corenet_receive_postgresql_server_packets" lineno="49583"> <summary> Receive postgresql_server packets. </summary> @@ -50295,7 +39518,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="64236"> +<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="49602"> <summary> Do not audit attempts to receive postgresql_server packets. </summary> @@ -50306,7 +39529,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postgresql_server_packets" lineno="64255"> +<interface name="corenet_sendrecv_postgresql_server_packets" lineno="49621"> <summary> Send and receive postgresql_server packets. </summary> @@ -50317,7 +39540,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="64271"> +<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="49637"> <summary> Do not audit attempts to send and receive postgresql_server packets. </summary> @@ -50328,7 +39551,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postgresql_server_packets" lineno="64286"> +<interface name="corenet_relabelto_postgresql_server_packets" lineno="49652"> <summary> Relabel packets to postgresql_server the packet type. </summary> @@ -50338,85 +39561,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="64308"> -<summary> -Send and receive TCP traffic on the postgrey port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_postgrey_port" lineno="64323"> -<summary> -Send UDP traffic on the postgrey port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="64338"> -<summary> -Do not audit attempts to send UDP traffic on the postgrey port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_postgrey_port" lineno="64353"> -<summary> -Receive UDP traffic on the postgrey port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="64368"> -<summary> -Do not audit attempts to receive UDP traffic on the postgrey port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_postgrey_port" lineno="64383"> -<summary> -Send and receive UDP traffic on the postgrey port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="64399"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the postgrey port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_postgrey_port" lineno="64414"> +<interface name="corenet_tcp_bind_postgrey_port" lineno="49674"> <summary> Bind TCP sockets to the postgrey port. </summary> @@ -50427,7 +39572,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_postgrey_port" lineno="64434"> +<interface name="corenet_udp_bind_postgrey_port" lineno="49694"> <summary> Bind UDP sockets to the postgrey port. </summary> @@ -50438,7 +39583,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_postgrey_port" lineno="64453"> +<interface name="corenet_tcp_connect_postgrey_port" lineno="49713"> <summary> Make a TCP connection to the postgrey port. </summary> @@ -50448,7 +39593,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postgrey_client_packets" lineno="64473"> +<interface name="corenet_send_postgrey_client_packets" lineno="49733"> <summary> Send postgrey_client packets. </summary> @@ -50459,7 +39604,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64492"> +<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="49752"> <summary> Do not audit attempts to send postgrey_client packets. </summary> @@ -50470,7 +39615,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postgrey_client_packets" lineno="64511"> +<interface name="corenet_receive_postgrey_client_packets" lineno="49771"> <summary> Receive postgrey_client packets. </summary> @@ -50481,7 +39626,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64530"> +<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="49790"> <summary> Do not audit attempts to receive postgrey_client packets. </summary> @@ -50492,7 +39637,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64549"> +<interface name="corenet_sendrecv_postgrey_client_packets" lineno="49809"> <summary> Send and receive postgrey_client packets. </summary> @@ -50503,7 +39648,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64565"> +<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="49825"> <summary> Do not audit attempts to send and receive postgrey_client packets. </summary> @@ -50514,7 +39659,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postgrey_client_packets" lineno="64580"> +<interface name="corenet_relabelto_postgrey_client_packets" lineno="49840"> <summary> Relabel packets to postgrey_client the packet type. </summary> @@ -50524,7 +39669,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_postgrey_server_packets" lineno="64600"> +<interface name="corenet_send_postgrey_server_packets" lineno="49860"> <summary> Send postgrey_server packets. </summary> @@ -50535,7 +39680,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64619"> +<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="49879"> <summary> Do not audit attempts to send postgrey_server packets. </summary> @@ -50546,7 +39691,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_postgrey_server_packets" lineno="64638"> +<interface name="corenet_receive_postgrey_server_packets" lineno="49898"> <summary> Receive postgrey_server packets. </summary> @@ -50557,7 +39702,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64657"> +<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="49917"> <summary> Do not audit attempts to receive postgrey_server packets. </summary> @@ -50568,7 +39713,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64676"> +<interface name="corenet_sendrecv_postgrey_server_packets" lineno="49936"> <summary> Send and receive postgrey_server packets. </summary> @@ -50579,7 +39724,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64692"> +<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="49952"> <summary> Do not audit attempts to send and receive postgrey_server packets. </summary> @@ -50590,7 +39735,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_postgrey_server_packets" lineno="64707"> +<interface name="corenet_relabelto_postgrey_server_packets" lineno="49967"> <summary> Relabel packets to postgrey_server the packet type. </summary> @@ -50600,85 +39745,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64729"> -<summary> -Send and receive TCP traffic on the pptp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_pptp_port" lineno="64744"> -<summary> -Send UDP traffic on the pptp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64759"> -<summary> -Do not audit attempts to send UDP traffic on the pptp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_pptp_port" lineno="64774"> -<summary> -Receive UDP traffic on the pptp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64789"> -<summary> -Do not audit attempts to receive UDP traffic on the pptp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_pptp_port" lineno="64804"> -<summary> -Send and receive UDP traffic on the pptp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64820"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the pptp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_pptp_port" lineno="64835"> +<interface name="corenet_tcp_bind_pptp_port" lineno="49989"> <summary> Bind TCP sockets to the pptp port. </summary> @@ -50689,7 +39756,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pptp_port" lineno="64855"> +<interface name="corenet_udp_bind_pptp_port" lineno="50009"> <summary> Bind UDP sockets to the pptp port. </summary> @@ -50700,7 +39767,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pptp_port" lineno="64874"> +<interface name="corenet_tcp_connect_pptp_port" lineno="50028"> <summary> Make a TCP connection to the pptp port. </summary> @@ -50710,7 +39777,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pptp_client_packets" lineno="64894"> +<interface name="corenet_send_pptp_client_packets" lineno="50048"> <summary> Send pptp_client packets. </summary> @@ -50721,7 +39788,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64913"> +<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="50067"> <summary> Do not audit attempts to send pptp_client packets. </summary> @@ -50732,7 +39799,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pptp_client_packets" lineno="64932"> +<interface name="corenet_receive_pptp_client_packets" lineno="50086"> <summary> Receive pptp_client packets. </summary> @@ -50743,7 +39810,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64951"> +<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="50105"> <summary> Do not audit attempts to receive pptp_client packets. </summary> @@ -50754,7 +39821,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pptp_client_packets" lineno="64970"> +<interface name="corenet_sendrecv_pptp_client_packets" lineno="50124"> <summary> Send and receive pptp_client packets. </summary> @@ -50765,7 +39832,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64986"> +<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="50140"> <summary> Do not audit attempts to send and receive pptp_client packets. </summary> @@ -50776,7 +39843,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pptp_client_packets" lineno="65001"> +<interface name="corenet_relabelto_pptp_client_packets" lineno="50155"> <summary> Relabel packets to pptp_client the packet type. </summary> @@ -50786,7 +39853,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pptp_server_packets" lineno="65021"> +<interface name="corenet_send_pptp_server_packets" lineno="50175"> <summary> Send pptp_server packets. </summary> @@ -50797,7 +39864,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="65040"> +<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="50194"> <summary> Do not audit attempts to send pptp_server packets. </summary> @@ -50808,7 +39875,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pptp_server_packets" lineno="65059"> +<interface name="corenet_receive_pptp_server_packets" lineno="50213"> <summary> Receive pptp_server packets. </summary> @@ -50819,7 +39886,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="65078"> +<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="50232"> <summary> Do not audit attempts to receive pptp_server packets. </summary> @@ -50830,7 +39897,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pptp_server_packets" lineno="65097"> +<interface name="corenet_sendrecv_pptp_server_packets" lineno="50251"> <summary> Send and receive pptp_server packets. </summary> @@ -50841,7 +39908,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="65113"> +<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="50267"> <summary> Do not audit attempts to send and receive pptp_server packets. </summary> @@ -50852,7 +39919,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pptp_server_packets" lineno="65128"> +<interface name="corenet_relabelto_pptp_server_packets" lineno="50282"> <summary> Relabel packets to pptp_server the packet type. </summary> @@ -50862,85 +39929,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_prelude_port" lineno="65150"> -<summary> -Send and receive TCP traffic on the prelude port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_prelude_port" lineno="65165"> -<summary> -Send UDP traffic on the prelude port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="65180"> -<summary> -Do not audit attempts to send UDP traffic on the prelude port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_prelude_port" lineno="65195"> -<summary> -Receive UDP traffic on the prelude port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="65210"> -<summary> -Do not audit attempts to receive UDP traffic on the prelude port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_prelude_port" lineno="65225"> -<summary> -Send and receive UDP traffic on the prelude port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="65241"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the prelude port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_prelude_port" lineno="65256"> +<interface name="corenet_tcp_bind_prelude_port" lineno="50304"> <summary> Bind TCP sockets to the prelude port. </summary> @@ -50951,7 +39940,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_prelude_port" lineno="65276"> +<interface name="corenet_udp_bind_prelude_port" lineno="50324"> <summary> Bind UDP sockets to the prelude port. </summary> @@ -50962,7 +39951,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_prelude_port" lineno="65295"> +<interface name="corenet_tcp_connect_prelude_port" lineno="50343"> <summary> Make a TCP connection to the prelude port. </summary> @@ -50972,7 +39961,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_prelude_client_packets" lineno="65315"> +<interface name="corenet_send_prelude_client_packets" lineno="50363"> <summary> Send prelude_client packets. </summary> @@ -50983,7 +39972,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="65334"> +<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="50382"> <summary> Do not audit attempts to send prelude_client packets. </summary> @@ -50994,7 +39983,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_prelude_client_packets" lineno="65353"> +<interface name="corenet_receive_prelude_client_packets" lineno="50401"> <summary> Receive prelude_client packets. </summary> @@ -51005,7 +39994,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="65372"> +<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="50420"> <summary> Do not audit attempts to receive prelude_client packets. </summary> @@ -51016,7 +40005,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_prelude_client_packets" lineno="65391"> +<interface name="corenet_sendrecv_prelude_client_packets" lineno="50439"> <summary> Send and receive prelude_client packets. </summary> @@ -51027,7 +40016,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="65407"> +<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="50455"> <summary> Do not audit attempts to send and receive prelude_client packets. </summary> @@ -51038,7 +40027,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_prelude_client_packets" lineno="65422"> +<interface name="corenet_relabelto_prelude_client_packets" lineno="50470"> <summary> Relabel packets to prelude_client the packet type. </summary> @@ -51048,7 +40037,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_prelude_server_packets" lineno="65442"> +<interface name="corenet_send_prelude_server_packets" lineno="50490"> <summary> Send prelude_server packets. </summary> @@ -51059,7 +40048,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65461"> +<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="50509"> <summary> Do not audit attempts to send prelude_server packets. </summary> @@ -51070,7 +40059,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_prelude_server_packets" lineno="65480"> +<interface name="corenet_receive_prelude_server_packets" lineno="50528"> <summary> Receive prelude_server packets. </summary> @@ -51081,7 +40070,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65499"> +<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="50547"> <summary> Do not audit attempts to receive prelude_server packets. </summary> @@ -51092,7 +40081,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_prelude_server_packets" lineno="65518"> +<interface name="corenet_sendrecv_prelude_server_packets" lineno="50566"> <summary> Send and receive prelude_server packets. </summary> @@ -51103,7 +40092,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65534"> +<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="50582"> <summary> Do not audit attempts to send and receive prelude_server packets. </summary> @@ -51114,7 +40103,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_prelude_server_packets" lineno="65549"> +<interface name="corenet_relabelto_prelude_server_packets" lineno="50597"> <summary> Relabel packets to prelude_server the packet type. </summary> @@ -51124,85 +40113,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_presence_port" lineno="65571"> -<summary> -Send and receive TCP traffic on the presence port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_presence_port" lineno="65586"> -<summary> -Send UDP traffic on the presence port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65601"> -<summary> -Do not audit attempts to send UDP traffic on the presence port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_presence_port" lineno="65616"> -<summary> -Receive UDP traffic on the presence port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65631"> -<summary> -Do not audit attempts to receive UDP traffic on the presence port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_presence_port" lineno="65646"> -<summary> -Send and receive UDP traffic on the presence port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65662"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the presence port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_presence_port" lineno="65677"> +<interface name="corenet_tcp_bind_presence_port" lineno="50619"> <summary> Bind TCP sockets to the presence port. </summary> @@ -51213,7 +40124,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_presence_port" lineno="65697"> +<interface name="corenet_udp_bind_presence_port" lineno="50639"> <summary> Bind UDP sockets to the presence port. </summary> @@ -51224,7 +40135,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_presence_port" lineno="65716"> +<interface name="corenet_tcp_connect_presence_port" lineno="50658"> <summary> Make a TCP connection to the presence port. </summary> @@ -51234,7 +40145,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_presence_client_packets" lineno="65736"> +<interface name="corenet_send_presence_client_packets" lineno="50678"> <summary> Send presence_client packets. </summary> @@ -51245,7 +40156,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65755"> +<interface name="corenet_dontaudit_send_presence_client_packets" lineno="50697"> <summary> Do not audit attempts to send presence_client packets. </summary> @@ -51256,7 +40167,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_presence_client_packets" lineno="65774"> +<interface name="corenet_receive_presence_client_packets" lineno="50716"> <summary> Receive presence_client packets. </summary> @@ -51267,7 +40178,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65793"> +<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="50735"> <summary> Do not audit attempts to receive presence_client packets. </summary> @@ -51278,7 +40189,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_presence_client_packets" lineno="65812"> +<interface name="corenet_sendrecv_presence_client_packets" lineno="50754"> <summary> Send and receive presence_client packets. </summary> @@ -51289,7 +40200,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65828"> +<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="50770"> <summary> Do not audit attempts to send and receive presence_client packets. </summary> @@ -51300,7 +40211,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_presence_client_packets" lineno="65843"> +<interface name="corenet_relabelto_presence_client_packets" lineno="50785"> <summary> Relabel packets to presence_client the packet type. </summary> @@ -51310,7 +40221,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_presence_server_packets" lineno="65863"> +<interface name="corenet_send_presence_server_packets" lineno="50805"> <summary> Send presence_server packets. </summary> @@ -51321,7 +40232,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65882"> +<interface name="corenet_dontaudit_send_presence_server_packets" lineno="50824"> <summary> Do not audit attempts to send presence_server packets. </summary> @@ -51332,7 +40243,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_presence_server_packets" lineno="65901"> +<interface name="corenet_receive_presence_server_packets" lineno="50843"> <summary> Receive presence_server packets. </summary> @@ -51343,7 +40254,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65920"> +<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="50862"> <summary> Do not audit attempts to receive presence_server packets. </summary> @@ -51354,7 +40265,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_presence_server_packets" lineno="65939"> +<interface name="corenet_sendrecv_presence_server_packets" lineno="50881"> <summary> Send and receive presence_server packets. </summary> @@ -51365,7 +40276,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65955"> +<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="50897"> <summary> Do not audit attempts to send and receive presence_server packets. </summary> @@ -51376,7 +40287,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_presence_server_packets" lineno="65970"> +<interface name="corenet_relabelto_presence_server_packets" lineno="50912"> <summary> Relabel packets to presence_server the packet type. </summary> @@ -51386,85 +40297,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_printer_port" lineno="65992"> -<summary> -Send and receive TCP traffic on the printer port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_printer_port" lineno="66007"> -<summary> -Send UDP traffic on the printer port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_printer_port" lineno="66022"> -<summary> -Do not audit attempts to send UDP traffic on the printer port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_printer_port" lineno="66037"> -<summary> -Receive UDP traffic on the printer port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="66052"> -<summary> -Do not audit attempts to receive UDP traffic on the printer port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_printer_port" lineno="66067"> -<summary> -Send and receive UDP traffic on the printer port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="66083"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the printer port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_printer_port" lineno="66098"> +<interface name="corenet_tcp_bind_printer_port" lineno="50934"> <summary> Bind TCP sockets to the printer port. </summary> @@ -51475,7 +40308,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_printer_port" lineno="66118"> +<interface name="corenet_udp_bind_printer_port" lineno="50954"> <summary> Bind UDP sockets to the printer port. </summary> @@ -51486,7 +40319,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_printer_port" lineno="66137"> +<interface name="corenet_tcp_connect_printer_port" lineno="50973"> <summary> Make a TCP connection to the printer port. </summary> @@ -51496,7 +40329,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_printer_client_packets" lineno="66157"> +<interface name="corenet_send_printer_client_packets" lineno="50993"> <summary> Send printer_client packets. </summary> @@ -51507,7 +40340,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_printer_client_packets" lineno="66176"> +<interface name="corenet_dontaudit_send_printer_client_packets" lineno="51012"> <summary> Do not audit attempts to send printer_client packets. </summary> @@ -51518,7 +40351,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_printer_client_packets" lineno="66195"> +<interface name="corenet_receive_printer_client_packets" lineno="51031"> <summary> Receive printer_client packets. </summary> @@ -51529,7 +40362,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="66214"> +<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="51050"> <summary> Do not audit attempts to receive printer_client packets. </summary> @@ -51540,7 +40373,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_printer_client_packets" lineno="66233"> +<interface name="corenet_sendrecv_printer_client_packets" lineno="51069"> <summary> Send and receive printer_client packets. </summary> @@ -51551,7 +40384,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="66249"> +<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="51085"> <summary> Do not audit attempts to send and receive printer_client packets. </summary> @@ -51562,7 +40395,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_printer_client_packets" lineno="66264"> +<interface name="corenet_relabelto_printer_client_packets" lineno="51100"> <summary> Relabel packets to printer_client the packet type. </summary> @@ -51572,7 +40405,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_printer_server_packets" lineno="66284"> +<interface name="corenet_send_printer_server_packets" lineno="51120"> <summary> Send printer_server packets. </summary> @@ -51583,7 +40416,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_printer_server_packets" lineno="66303"> +<interface name="corenet_dontaudit_send_printer_server_packets" lineno="51139"> <summary> Do not audit attempts to send printer_server packets. </summary> @@ -51594,7 +40427,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_printer_server_packets" lineno="66322"> +<interface name="corenet_receive_printer_server_packets" lineno="51158"> <summary> Receive printer_server packets. </summary> @@ -51605,7 +40438,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="66341"> +<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="51177"> <summary> Do not audit attempts to receive printer_server packets. </summary> @@ -51616,7 +40449,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_printer_server_packets" lineno="66360"> +<interface name="corenet_sendrecv_printer_server_packets" lineno="51196"> <summary> Send and receive printer_server packets. </summary> @@ -51627,7 +40460,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="66376"> +<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="51212"> <summary> Do not audit attempts to send and receive printer_server packets. </summary> @@ -51638,7 +40471,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_printer_server_packets" lineno="66391"> +<interface name="corenet_relabelto_printer_server_packets" lineno="51227"> <summary> Relabel packets to printer_server the packet type. </summary> @@ -51648,85 +40481,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ptal_port" lineno="66413"> -<summary> -Send and receive TCP traffic on the ptal port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ptal_port" lineno="66428"> -<summary> -Send UDP traffic on the ptal port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66443"> -<summary> -Do not audit attempts to send UDP traffic on the ptal port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ptal_port" lineno="66458"> -<summary> -Receive UDP traffic on the ptal port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66473"> -<summary> -Do not audit attempts to receive UDP traffic on the ptal port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ptal_port" lineno="66488"> -<summary> -Send and receive UDP traffic on the ptal port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66504"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ptal port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ptal_port" lineno="66519"> +<interface name="corenet_tcp_bind_ptal_port" lineno="51249"> <summary> Bind TCP sockets to the ptal port. </summary> @@ -51737,7 +40492,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ptal_port" lineno="66539"> +<interface name="corenet_udp_bind_ptal_port" lineno="51269"> <summary> Bind UDP sockets to the ptal port. </summary> @@ -51748,7 +40503,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ptal_port" lineno="66558"> +<interface name="corenet_tcp_connect_ptal_port" lineno="51288"> <summary> Make a TCP connection to the ptal port. </summary> @@ -51758,7 +40513,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ptal_client_packets" lineno="66578"> +<interface name="corenet_send_ptal_client_packets" lineno="51308"> <summary> Send ptal_client packets. </summary> @@ -51769,7 +40524,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66597"> +<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="51327"> <summary> Do not audit attempts to send ptal_client packets. </summary> @@ -51780,7 +40535,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ptal_client_packets" lineno="66616"> +<interface name="corenet_receive_ptal_client_packets" lineno="51346"> <summary> Receive ptal_client packets. </summary> @@ -51791,7 +40546,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66635"> +<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="51365"> <summary> Do not audit attempts to receive ptal_client packets. </summary> @@ -51802,7 +40557,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ptal_client_packets" lineno="66654"> +<interface name="corenet_sendrecv_ptal_client_packets" lineno="51384"> <summary> Send and receive ptal_client packets. </summary> @@ -51813,7 +40568,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66670"> +<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="51400"> <summary> Do not audit attempts to send and receive ptal_client packets. </summary> @@ -51824,7 +40579,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ptal_client_packets" lineno="66685"> +<interface name="corenet_relabelto_ptal_client_packets" lineno="51415"> <summary> Relabel packets to ptal_client the packet type. </summary> @@ -51834,7 +40589,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ptal_server_packets" lineno="66705"> +<interface name="corenet_send_ptal_server_packets" lineno="51435"> <summary> Send ptal_server packets. </summary> @@ -51845,7 +40600,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66724"> +<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="51454"> <summary> Do not audit attempts to send ptal_server packets. </summary> @@ -51856,7 +40611,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ptal_server_packets" lineno="66743"> +<interface name="corenet_receive_ptal_server_packets" lineno="51473"> <summary> Receive ptal_server packets. </summary> @@ -51867,7 +40622,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66762"> +<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="51492"> <summary> Do not audit attempts to receive ptal_server packets. </summary> @@ -51878,7 +40633,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ptal_server_packets" lineno="66781"> +<interface name="corenet_sendrecv_ptal_server_packets" lineno="51511"> <summary> Send and receive ptal_server packets. </summary> @@ -51889,7 +40644,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66797"> +<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="51527"> <summary> Do not audit attempts to send and receive ptal_server packets. </summary> @@ -51900,7 +40655,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ptal_server_packets" lineno="66812"> +<interface name="corenet_relabelto_ptal_server_packets" lineno="51542"> <summary> Relabel packets to ptal_server the packet type. </summary> @@ -51910,85 +40665,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66834"> -<summary> -Send and receive TCP traffic on the pulseaudio port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_pulseaudio_port" lineno="66849"> -<summary> -Send UDP traffic on the pulseaudio port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66864"> -<summary> -Do not audit attempts to send UDP traffic on the pulseaudio port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_pulseaudio_port" lineno="66879"> -<summary> -Receive UDP traffic on the pulseaudio port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66894"> -<summary> -Do not audit attempts to receive UDP traffic on the pulseaudio port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66909"> -<summary> -Send and receive UDP traffic on the pulseaudio port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66925"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the pulseaudio port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66940"> +<interface name="corenet_tcp_bind_pulseaudio_port" lineno="51564"> <summary> Bind TCP sockets to the pulseaudio port. </summary> @@ -51999,7 +40676,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pulseaudio_port" lineno="66960"> +<interface name="corenet_udp_bind_pulseaudio_port" lineno="51584"> <summary> Bind UDP sockets to the pulseaudio port. </summary> @@ -52010,7 +40687,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66979"> +<interface name="corenet_tcp_connect_pulseaudio_port" lineno="51603"> <summary> Make a TCP connection to the pulseaudio port. </summary> @@ -52020,7 +40697,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pulseaudio_client_packets" lineno="66999"> +<interface name="corenet_send_pulseaudio_client_packets" lineno="51623"> <summary> Send pulseaudio_client packets. </summary> @@ -52031,7 +40708,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="67018"> +<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="51642"> <summary> Do not audit attempts to send pulseaudio_client packets. </summary> @@ -52042,7 +40719,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pulseaudio_client_packets" lineno="67037"> +<interface name="corenet_receive_pulseaudio_client_packets" lineno="51661"> <summary> Receive pulseaudio_client packets. </summary> @@ -52053,7 +40730,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="67056"> +<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="51680"> <summary> Do not audit attempts to receive pulseaudio_client packets. </summary> @@ -52064,7 +40741,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="67075"> +<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="51699"> <summary> Send and receive pulseaudio_client packets. </summary> @@ -52075,7 +40752,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="67091"> +<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="51715"> <summary> Do not audit attempts to send and receive pulseaudio_client packets. </summary> @@ -52086,7 +40763,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="67106"> +<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="51730"> <summary> Relabel packets to pulseaudio_client the packet type. </summary> @@ -52096,7 +40773,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pulseaudio_server_packets" lineno="67126"> +<interface name="corenet_send_pulseaudio_server_packets" lineno="51750"> <summary> Send pulseaudio_server packets. </summary> @@ -52107,7 +40784,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="67145"> +<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="51769"> <summary> Do not audit attempts to send pulseaudio_server packets. </summary> @@ -52118,7 +40795,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pulseaudio_server_packets" lineno="67164"> +<interface name="corenet_receive_pulseaudio_server_packets" lineno="51788"> <summary> Receive pulseaudio_server packets. </summary> @@ -52129,7 +40806,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="67183"> +<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="51807"> <summary> Do not audit attempts to receive pulseaudio_server packets. </summary> @@ -52140,7 +40817,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="67202"> +<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="51826"> <summary> Send and receive pulseaudio_server packets. </summary> @@ -52151,7 +40828,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="67218"> +<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="51842"> <summary> Do not audit attempts to send and receive pulseaudio_server packets. </summary> @@ -52162,7 +40839,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="67233"> +<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="51857"> <summary> Relabel packets to pulseaudio_server the packet type. </summary> @@ -52172,85 +40849,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_puppet_port" lineno="67255"> -<summary> -Send and receive TCP traffic on the puppet port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_puppet_port" lineno="67270"> -<summary> -Send UDP traffic on the puppet port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="67285"> -<summary> -Do not audit attempts to send UDP traffic on the puppet port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_puppet_port" lineno="67300"> -<summary> -Receive UDP traffic on the puppet port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="67315"> -<summary> -Do not audit attempts to receive UDP traffic on the puppet port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_puppet_port" lineno="67330"> -<summary> -Send and receive UDP traffic on the puppet port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="67346"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the puppet port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_puppet_port" lineno="67361"> +<interface name="corenet_tcp_bind_puppet_port" lineno="51879"> <summary> Bind TCP sockets to the puppet port. </summary> @@ -52261,7 +40860,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_puppet_port" lineno="67381"> +<interface name="corenet_udp_bind_puppet_port" lineno="51899"> <summary> Bind UDP sockets to the puppet port. </summary> @@ -52272,7 +40871,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_puppet_port" lineno="67400"> +<interface name="corenet_tcp_connect_puppet_port" lineno="51918"> <summary> Make a TCP connection to the puppet port. </summary> @@ -52282,7 +40881,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_puppet_client_packets" lineno="67420"> +<interface name="corenet_send_puppet_client_packets" lineno="51938"> <summary> Send puppet_client packets. </summary> @@ -52293,7 +40892,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67439"> +<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="51957"> <summary> Do not audit attempts to send puppet_client packets. </summary> @@ -52304,7 +40903,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_puppet_client_packets" lineno="67458"> +<interface name="corenet_receive_puppet_client_packets" lineno="51976"> <summary> Receive puppet_client packets. </summary> @@ -52315,7 +40914,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67477"> +<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="51995"> <summary> Do not audit attempts to receive puppet_client packets. </summary> @@ -52326,7 +40925,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_puppet_client_packets" lineno="67496"> +<interface name="corenet_sendrecv_puppet_client_packets" lineno="52014"> <summary> Send and receive puppet_client packets. </summary> @@ -52337,7 +40936,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67512"> +<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="52030"> <summary> Do not audit attempts to send and receive puppet_client packets. </summary> @@ -52348,7 +40947,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_puppet_client_packets" lineno="67527"> +<interface name="corenet_relabelto_puppet_client_packets" lineno="52045"> <summary> Relabel packets to puppet_client the packet type. </summary> @@ -52358,7 +40957,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_puppet_server_packets" lineno="67547"> +<interface name="corenet_send_puppet_server_packets" lineno="52065"> <summary> Send puppet_server packets. </summary> @@ -52369,7 +40968,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67566"> +<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="52084"> <summary> Do not audit attempts to send puppet_server packets. </summary> @@ -52380,7 +40979,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_puppet_server_packets" lineno="67585"> +<interface name="corenet_receive_puppet_server_packets" lineno="52103"> <summary> Receive puppet_server packets. </summary> @@ -52391,7 +40990,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67604"> +<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="52122"> <summary> Do not audit attempts to receive puppet_server packets. </summary> @@ -52402,7 +41001,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_puppet_server_packets" lineno="67623"> +<interface name="corenet_sendrecv_puppet_server_packets" lineno="52141"> <summary> Send and receive puppet_server packets. </summary> @@ -52413,7 +41012,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67639"> +<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="52157"> <summary> Do not audit attempts to send and receive puppet_server packets. </summary> @@ -52424,7 +41023,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_puppet_server_packets" lineno="67654"> +<interface name="corenet_relabelto_puppet_server_packets" lineno="52172"> <summary> Relabel packets to puppet_server the packet type. </summary> @@ -52434,85 +41033,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67676"> -<summary> -Send and receive TCP traffic on the puppetclient port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_puppetclient_port" lineno="67691"> -<summary> -Send UDP traffic on the puppetclient port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67706"> -<summary> -Do not audit attempts to send UDP traffic on the puppetclient port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_puppetclient_port" lineno="67721"> -<summary> -Receive UDP traffic on the puppetclient port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67736"> -<summary> -Do not audit attempts to receive UDP traffic on the puppetclient port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67751"> -<summary> -Send and receive UDP traffic on the puppetclient port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67767"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the puppetclient port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_puppetclient_port" lineno="67782"> +<interface name="corenet_tcp_bind_puppetclient_port" lineno="52194"> <summary> Bind TCP sockets to the puppetclient port. </summary> @@ -52523,7 +41044,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_puppetclient_port" lineno="67802"> +<interface name="corenet_udp_bind_puppetclient_port" lineno="52214"> <summary> Bind UDP sockets to the puppetclient port. </summary> @@ -52534,7 +41055,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_puppetclient_port" lineno="67821"> +<interface name="corenet_tcp_connect_puppetclient_port" lineno="52233"> <summary> Make a TCP connection to the puppetclient port. </summary> @@ -52544,7 +41065,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_puppetclient_client_packets" lineno="67841"> +<interface name="corenet_send_puppetclient_client_packets" lineno="52253"> <summary> Send puppetclient_client packets. </summary> @@ -52555,7 +41076,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67860"> +<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="52272"> <summary> Do not audit attempts to send puppetclient_client packets. </summary> @@ -52566,7 +41087,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_puppetclient_client_packets" lineno="67879"> +<interface name="corenet_receive_puppetclient_client_packets" lineno="52291"> <summary> Receive puppetclient_client packets. </summary> @@ -52577,7 +41098,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67898"> +<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="52310"> <summary> Do not audit attempts to receive puppetclient_client packets. </summary> @@ -52588,7 +41109,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67917"> +<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="52329"> <summary> Send and receive puppetclient_client packets. </summary> @@ -52599,7 +41120,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67933"> +<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="52345"> <summary> Do not audit attempts to send and receive puppetclient_client packets. </summary> @@ -52610,7 +41131,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67948"> +<interface name="corenet_relabelto_puppetclient_client_packets" lineno="52360"> <summary> Relabel packets to puppetclient_client the packet type. </summary> @@ -52620,7 +41141,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_puppetclient_server_packets" lineno="67968"> +<interface name="corenet_send_puppetclient_server_packets" lineno="52380"> <summary> Send puppetclient_server packets. </summary> @@ -52631,7 +41152,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67987"> +<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="52399"> <summary> Do not audit attempts to send puppetclient_server packets. </summary> @@ -52642,7 +41163,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_puppetclient_server_packets" lineno="68006"> +<interface name="corenet_receive_puppetclient_server_packets" lineno="52418"> <summary> Receive puppetclient_server packets. </summary> @@ -52653,7 +41174,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="68025"> +<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="52437"> <summary> Do not audit attempts to receive puppetclient_server packets. </summary> @@ -52664,7 +41185,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="68044"> +<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="52456"> <summary> Send and receive puppetclient_server packets. </summary> @@ -52675,7 +41196,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="68060"> +<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="52472"> <summary> Do not audit attempts to send and receive puppetclient_server packets. </summary> @@ -52686,7 +41207,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_puppetclient_server_packets" lineno="68075"> +<interface name="corenet_relabelto_puppetclient_server_packets" lineno="52487"> <summary> Relabel packets to puppetclient_server the packet type. </summary> @@ -52696,85 +41217,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pxe_port" lineno="68097"> -<summary> -Send and receive TCP traffic on the pxe port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_pxe_port" lineno="68112"> -<summary> -Send UDP traffic on the pxe port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="68127"> -<summary> -Do not audit attempts to send UDP traffic on the pxe port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_pxe_port" lineno="68142"> -<summary> -Receive UDP traffic on the pxe port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="68157"> -<summary> -Do not audit attempts to receive UDP traffic on the pxe port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_pxe_port" lineno="68172"> -<summary> -Send and receive UDP traffic on the pxe port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="68188"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the pxe port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_pxe_port" lineno="68203"> +<interface name="corenet_tcp_bind_pxe_port" lineno="52509"> <summary> Bind TCP sockets to the pxe port. </summary> @@ -52785,7 +41228,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pxe_port" lineno="68223"> +<interface name="corenet_udp_bind_pxe_port" lineno="52529"> <summary> Bind UDP sockets to the pxe port. </summary> @@ -52796,7 +41239,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pxe_port" lineno="68242"> +<interface name="corenet_tcp_connect_pxe_port" lineno="52548"> <summary> Make a TCP connection to the pxe port. </summary> @@ -52806,7 +41249,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pxe_client_packets" lineno="68262"> +<interface name="corenet_send_pxe_client_packets" lineno="52568"> <summary> Send pxe_client packets. </summary> @@ -52817,7 +41260,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="68281"> +<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="52587"> <summary> Do not audit attempts to send pxe_client packets. </summary> @@ -52828,7 +41271,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pxe_client_packets" lineno="68300"> +<interface name="corenet_receive_pxe_client_packets" lineno="52606"> <summary> Receive pxe_client packets. </summary> @@ -52839,7 +41282,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="68319"> +<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="52625"> <summary> Do not audit attempts to receive pxe_client packets. </summary> @@ -52850,7 +41293,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pxe_client_packets" lineno="68338"> +<interface name="corenet_sendrecv_pxe_client_packets" lineno="52644"> <summary> Send and receive pxe_client packets. </summary> @@ -52861,7 +41304,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="68354"> +<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="52660"> <summary> Do not audit attempts to send and receive pxe_client packets. </summary> @@ -52872,7 +41315,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pxe_client_packets" lineno="68369"> +<interface name="corenet_relabelto_pxe_client_packets" lineno="52675"> <summary> Relabel packets to pxe_client the packet type. </summary> @@ -52882,7 +41325,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pxe_server_packets" lineno="68389"> +<interface name="corenet_send_pxe_server_packets" lineno="52695"> <summary> Send pxe_server packets. </summary> @@ -52893,7 +41336,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="68408"> +<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="52714"> <summary> Do not audit attempts to send pxe_server packets. </summary> @@ -52904,7 +41347,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pxe_server_packets" lineno="68427"> +<interface name="corenet_receive_pxe_server_packets" lineno="52733"> <summary> Receive pxe_server packets. </summary> @@ -52915,7 +41358,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68446"> +<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="52752"> <summary> Do not audit attempts to receive pxe_server packets. </summary> @@ -52926,7 +41369,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pxe_server_packets" lineno="68465"> +<interface name="corenet_sendrecv_pxe_server_packets" lineno="52771"> <summary> Send and receive pxe_server packets. </summary> @@ -52937,7 +41380,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68481"> +<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="52787"> <summary> Do not audit attempts to send and receive pxe_server packets. </summary> @@ -52948,7 +41391,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pxe_server_packets" lineno="68496"> +<interface name="corenet_relabelto_pxe_server_packets" lineno="52802"> <summary> Relabel packets to pxe_server the packet type. </summary> @@ -52958,85 +41401,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68518"> -<summary> -Send and receive TCP traffic on the pyzor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_pyzor_port" lineno="68533"> -<summary> -Send UDP traffic on the pyzor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68548"> -<summary> -Do not audit attempts to send UDP traffic on the pyzor port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_pyzor_port" lineno="68563"> -<summary> -Receive UDP traffic on the pyzor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68578"> -<summary> -Do not audit attempts to receive UDP traffic on the pyzor port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68593"> -<summary> -Send and receive UDP traffic on the pyzor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68609"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the pyzor port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_pyzor_port" lineno="68624"> +<interface name="corenet_tcp_bind_pyzor_port" lineno="52824"> <summary> Bind TCP sockets to the pyzor port. </summary> @@ -53047,7 +41412,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_pyzor_port" lineno="68644"> +<interface name="corenet_udp_bind_pyzor_port" lineno="52844"> <summary> Bind UDP sockets to the pyzor port. </summary> @@ -53058,7 +41423,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_pyzor_port" lineno="68663"> +<interface name="corenet_tcp_connect_pyzor_port" lineno="52863"> <summary> Make a TCP connection to the pyzor port. </summary> @@ -53068,7 +41433,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pyzor_client_packets" lineno="68683"> +<interface name="corenet_send_pyzor_client_packets" lineno="52883"> <summary> Send pyzor_client packets. </summary> @@ -53079,7 +41444,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68702"> +<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="52902"> <summary> Do not audit attempts to send pyzor_client packets. </summary> @@ -53090,7 +41455,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pyzor_client_packets" lineno="68721"> +<interface name="corenet_receive_pyzor_client_packets" lineno="52921"> <summary> Receive pyzor_client packets. </summary> @@ -53101,7 +41466,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68740"> +<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="52940"> <summary> Do not audit attempts to receive pyzor_client packets. </summary> @@ -53112,7 +41477,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68759"> +<interface name="corenet_sendrecv_pyzor_client_packets" lineno="52959"> <summary> Send and receive pyzor_client packets. </summary> @@ -53123,7 +41488,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68775"> +<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="52975"> <summary> Do not audit attempts to send and receive pyzor_client packets. </summary> @@ -53134,7 +41499,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pyzor_client_packets" lineno="68790"> +<interface name="corenet_relabelto_pyzor_client_packets" lineno="52990"> <summary> Relabel packets to pyzor_client the packet type. </summary> @@ -53144,7 +41509,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_pyzor_server_packets" lineno="68810"> +<interface name="corenet_send_pyzor_server_packets" lineno="53010"> <summary> Send pyzor_server packets. </summary> @@ -53155,7 +41520,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68829"> +<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="53029"> <summary> Do not audit attempts to send pyzor_server packets. </summary> @@ -53166,7 +41531,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_pyzor_server_packets" lineno="68848"> +<interface name="corenet_receive_pyzor_server_packets" lineno="53048"> <summary> Receive pyzor_server packets. </summary> @@ -53177,7 +41542,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68867"> +<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="53067"> <summary> Do not audit attempts to receive pyzor_server packets. </summary> @@ -53188,7 +41553,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68886"> +<interface name="corenet_sendrecv_pyzor_server_packets" lineno="53086"> <summary> Send and receive pyzor_server packets. </summary> @@ -53199,7 +41564,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68902"> +<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="53102"> <summary> Do not audit attempts to send and receive pyzor_server packets. </summary> @@ -53210,7 +41575,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_pyzor_server_packets" lineno="68917"> +<interface name="corenet_relabelto_pyzor_server_packets" lineno="53117"> <summary> Relabel packets to pyzor_server the packet type. </summary> @@ -53220,85 +41585,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68939"> -<summary> -Send and receive TCP traffic on the radacct port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_radacct_port" lineno="68954"> -<summary> -Send UDP traffic on the radacct port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68969"> -<summary> -Do not audit attempts to send UDP traffic on the radacct port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_radacct_port" lineno="68984"> -<summary> -Receive UDP traffic on the radacct port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68999"> -<summary> -Do not audit attempts to receive UDP traffic on the radacct port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_radacct_port" lineno="69014"> -<summary> -Send and receive UDP traffic on the radacct port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="69030"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the radacct port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_radacct_port" lineno="69045"> +<interface name="corenet_tcp_bind_radacct_port" lineno="53139"> <summary> Bind TCP sockets to the radacct port. </summary> @@ -53309,7 +41596,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_radacct_port" lineno="69065"> +<interface name="corenet_udp_bind_radacct_port" lineno="53159"> <summary> Bind UDP sockets to the radacct port. </summary> @@ -53320,7 +41607,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_radacct_port" lineno="69084"> +<interface name="corenet_tcp_connect_radacct_port" lineno="53178"> <summary> Make a TCP connection to the radacct port. </summary> @@ -53330,7 +41617,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radacct_client_packets" lineno="69104"> +<interface name="corenet_send_radacct_client_packets" lineno="53198"> <summary> Send radacct_client packets. </summary> @@ -53341,7 +41628,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="69123"> +<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="53217"> <summary> Do not audit attempts to send radacct_client packets. </summary> @@ -53352,7 +41639,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radacct_client_packets" lineno="69142"> +<interface name="corenet_receive_radacct_client_packets" lineno="53236"> <summary> Receive radacct_client packets. </summary> @@ -53363,7 +41650,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="69161"> +<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="53255"> <summary> Do not audit attempts to receive radacct_client packets. </summary> @@ -53374,7 +41661,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radacct_client_packets" lineno="69180"> +<interface name="corenet_sendrecv_radacct_client_packets" lineno="53274"> <summary> Send and receive radacct_client packets. </summary> @@ -53385,7 +41672,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="69196"> +<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="53290"> <summary> Do not audit attempts to send and receive radacct_client packets. </summary> @@ -53396,7 +41683,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radacct_client_packets" lineno="69211"> +<interface name="corenet_relabelto_radacct_client_packets" lineno="53305"> <summary> Relabel packets to radacct_client the packet type. </summary> @@ -53406,7 +41693,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radacct_server_packets" lineno="69231"> +<interface name="corenet_send_radacct_server_packets" lineno="53325"> <summary> Send radacct_server packets. </summary> @@ -53417,7 +41704,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="69250"> +<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="53344"> <summary> Do not audit attempts to send radacct_server packets. </summary> @@ -53428,7 +41715,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radacct_server_packets" lineno="69269"> +<interface name="corenet_receive_radacct_server_packets" lineno="53363"> <summary> Receive radacct_server packets. </summary> @@ -53439,7 +41726,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="69288"> +<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="53382"> <summary> Do not audit attempts to receive radacct_server packets. </summary> @@ -53450,7 +41737,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radacct_server_packets" lineno="69307"> +<interface name="corenet_sendrecv_radacct_server_packets" lineno="53401"> <summary> Send and receive radacct_server packets. </summary> @@ -53461,7 +41748,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="69323"> +<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="53417"> <summary> Do not audit attempts to send and receive radacct_server packets. </summary> @@ -53472,7 +41759,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radacct_server_packets" lineno="69338"> +<interface name="corenet_relabelto_radacct_server_packets" lineno="53432"> <summary> Relabel packets to radacct_server the packet type. </summary> @@ -53482,85 +41769,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_radius_port" lineno="69360"> -<summary> -Send and receive TCP traffic on the radius port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_radius_port" lineno="69375"> -<summary> -Send UDP traffic on the radius port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_radius_port" lineno="69390"> -<summary> -Do not audit attempts to send UDP traffic on the radius port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_radius_port" lineno="69405"> -<summary> -Receive UDP traffic on the radius port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="69420"> -<summary> -Do not audit attempts to receive UDP traffic on the radius port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_radius_port" lineno="69435"> -<summary> -Send and receive UDP traffic on the radius port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69451"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the radius port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_radius_port" lineno="69466"> +<interface name="corenet_tcp_bind_radius_port" lineno="53454"> <summary> Bind TCP sockets to the radius port. </summary> @@ -53571,7 +41780,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_radius_port" lineno="69486"> +<interface name="corenet_udp_bind_radius_port" lineno="53474"> <summary> Bind UDP sockets to the radius port. </summary> @@ -53582,7 +41791,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_radius_port" lineno="69505"> +<interface name="corenet_tcp_connect_radius_port" lineno="53493"> <summary> Make a TCP connection to the radius port. </summary> @@ -53592,7 +41801,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radius_client_packets" lineno="69525"> +<interface name="corenet_send_radius_client_packets" lineno="53513"> <summary> Send radius_client packets. </summary> @@ -53603,7 +41812,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69544"> +<interface name="corenet_dontaudit_send_radius_client_packets" lineno="53532"> <summary> Do not audit attempts to send radius_client packets. </summary> @@ -53614,7 +41823,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radius_client_packets" lineno="69563"> +<interface name="corenet_receive_radius_client_packets" lineno="53551"> <summary> Receive radius_client packets. </summary> @@ -53625,7 +41834,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69582"> +<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="53570"> <summary> Do not audit attempts to receive radius_client packets. </summary> @@ -53636,7 +41845,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radius_client_packets" lineno="69601"> +<interface name="corenet_sendrecv_radius_client_packets" lineno="53589"> <summary> Send and receive radius_client packets. </summary> @@ -53647,7 +41856,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69617"> +<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="53605"> <summary> Do not audit attempts to send and receive radius_client packets. </summary> @@ -53658,7 +41867,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radius_client_packets" lineno="69632"> +<interface name="corenet_relabelto_radius_client_packets" lineno="53620"> <summary> Relabel packets to radius_client the packet type. </summary> @@ -53668,7 +41877,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radius_server_packets" lineno="69652"> +<interface name="corenet_send_radius_server_packets" lineno="53640"> <summary> Send radius_server packets. </summary> @@ -53679,7 +41888,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69671"> +<interface name="corenet_dontaudit_send_radius_server_packets" lineno="53659"> <summary> Do not audit attempts to send radius_server packets. </summary> @@ -53690,7 +41899,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radius_server_packets" lineno="69690"> +<interface name="corenet_receive_radius_server_packets" lineno="53678"> <summary> Receive radius_server packets. </summary> @@ -53701,7 +41910,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69709"> +<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="53697"> <summary> Do not audit attempts to receive radius_server packets. </summary> @@ -53712,7 +41921,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radius_server_packets" lineno="69728"> +<interface name="corenet_sendrecv_radius_server_packets" lineno="53716"> <summary> Send and receive radius_server packets. </summary> @@ -53723,7 +41932,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69744"> +<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="53732"> <summary> Do not audit attempts to send and receive radius_server packets. </summary> @@ -53734,7 +41943,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radius_server_packets" lineno="69759"> +<interface name="corenet_relabelto_radius_server_packets" lineno="53747"> <summary> Relabel packets to radius_server the packet type. </summary> @@ -53744,85 +41953,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69781"> -<summary> -Send and receive TCP traffic on the radsec port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_radsec_port" lineno="69796"> -<summary> -Send UDP traffic on the radsec port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69811"> -<summary> -Do not audit attempts to send UDP traffic on the radsec port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_radsec_port" lineno="69826"> -<summary> -Receive UDP traffic on the radsec port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69841"> -<summary> -Do not audit attempts to receive UDP traffic on the radsec port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_radsec_port" lineno="69856"> -<summary> -Send and receive UDP traffic on the radsec port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69872"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the radsec port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_radsec_port" lineno="69887"> +<interface name="corenet_tcp_bind_radsec_port" lineno="53769"> <summary> Bind TCP sockets to the radsec port. </summary> @@ -53833,7 +41964,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_radsec_port" lineno="69907"> +<interface name="corenet_udp_bind_radsec_port" lineno="53789"> <summary> Bind UDP sockets to the radsec port. </summary> @@ -53844,7 +41975,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_radsec_port" lineno="69926"> +<interface name="corenet_tcp_connect_radsec_port" lineno="53808"> <summary> Make a TCP connection to the radsec port. </summary> @@ -53854,7 +41985,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radsec_client_packets" lineno="69946"> +<interface name="corenet_send_radsec_client_packets" lineno="53828"> <summary> Send radsec_client packets. </summary> @@ -53865,7 +41996,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69965"> +<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="53847"> <summary> Do not audit attempts to send radsec_client packets. </summary> @@ -53876,7 +42007,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radsec_client_packets" lineno="69984"> +<interface name="corenet_receive_radsec_client_packets" lineno="53866"> <summary> Receive radsec_client packets. </summary> @@ -53887,7 +42018,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="70003"> +<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="53885"> <summary> Do not audit attempts to receive radsec_client packets. </summary> @@ -53898,7 +42029,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radsec_client_packets" lineno="70022"> +<interface name="corenet_sendrecv_radsec_client_packets" lineno="53904"> <summary> Send and receive radsec_client packets. </summary> @@ -53909,7 +42040,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="70038"> +<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="53920"> <summary> Do not audit attempts to send and receive radsec_client packets. </summary> @@ -53920,7 +42051,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radsec_client_packets" lineno="70053"> +<interface name="corenet_relabelto_radsec_client_packets" lineno="53935"> <summary> Relabel packets to radsec_client the packet type. </summary> @@ -53930,7 +42061,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_radsec_server_packets" lineno="70073"> +<interface name="corenet_send_radsec_server_packets" lineno="53955"> <summary> Send radsec_server packets. </summary> @@ -53941,7 +42072,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="70092"> +<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="53974"> <summary> Do not audit attempts to send radsec_server packets. </summary> @@ -53952,7 +42083,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_radsec_server_packets" lineno="70111"> +<interface name="corenet_receive_radsec_server_packets" lineno="53993"> <summary> Receive radsec_server packets. </summary> @@ -53963,7 +42094,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="70130"> +<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="54012"> <summary> Do not audit attempts to receive radsec_server packets. </summary> @@ -53974,7 +42105,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_radsec_server_packets" lineno="70149"> +<interface name="corenet_sendrecv_radsec_server_packets" lineno="54031"> <summary> Send and receive radsec_server packets. </summary> @@ -53985,7 +42116,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="70165"> +<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="54047"> <summary> Do not audit attempts to send and receive radsec_server packets. </summary> @@ -53996,7 +42127,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_radsec_server_packets" lineno="70180"> +<interface name="corenet_relabelto_radsec_server_packets" lineno="54062"> <summary> Relabel packets to radsec_server the packet type. </summary> @@ -54006,85 +42137,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_razor_port" lineno="70202"> -<summary> -Send and receive TCP traffic on the razor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_razor_port" lineno="70217"> -<summary> -Send UDP traffic on the razor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_razor_port" lineno="70232"> -<summary> -Do not audit attempts to send UDP traffic on the razor port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_razor_port" lineno="70247"> -<summary> -Receive UDP traffic on the razor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="70262"> -<summary> -Do not audit attempts to receive UDP traffic on the razor port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_razor_port" lineno="70277"> -<summary> -Send and receive UDP traffic on the razor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="70293"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the razor port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_razor_port" lineno="70308"> +<interface name="corenet_tcp_bind_razor_port" lineno="54084"> <summary> Bind TCP sockets to the razor port. </summary> @@ -54095,7 +42148,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_razor_port" lineno="70328"> +<interface name="corenet_udp_bind_razor_port" lineno="54104"> <summary> Bind UDP sockets to the razor port. </summary> @@ -54106,7 +42159,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_razor_port" lineno="70347"> +<interface name="corenet_tcp_connect_razor_port" lineno="54123"> <summary> Make a TCP connection to the razor port. </summary> @@ -54116,7 +42169,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_razor_client_packets" lineno="70367"> +<interface name="corenet_send_razor_client_packets" lineno="54143"> <summary> Send razor_client packets. </summary> @@ -54127,7 +42180,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_razor_client_packets" lineno="70386"> +<interface name="corenet_dontaudit_send_razor_client_packets" lineno="54162"> <summary> Do not audit attempts to send razor_client packets. </summary> @@ -54138,7 +42191,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_razor_client_packets" lineno="70405"> +<interface name="corenet_receive_razor_client_packets" lineno="54181"> <summary> Receive razor_client packets. </summary> @@ -54149,7 +42202,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="70424"> +<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="54200"> <summary> Do not audit attempts to receive razor_client packets. </summary> @@ -54160,7 +42213,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_razor_client_packets" lineno="70443"> +<interface name="corenet_sendrecv_razor_client_packets" lineno="54219"> <summary> Send and receive razor_client packets. </summary> @@ -54171,7 +42224,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70459"> +<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="54235"> <summary> Do not audit attempts to send and receive razor_client packets. </summary> @@ -54182,7 +42235,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_razor_client_packets" lineno="70474"> +<interface name="corenet_relabelto_razor_client_packets" lineno="54250"> <summary> Relabel packets to razor_client the packet type. </summary> @@ -54192,7 +42245,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_razor_server_packets" lineno="70494"> +<interface name="corenet_send_razor_server_packets" lineno="54270"> <summary> Send razor_server packets. </summary> @@ -54203,7 +42256,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70513"> +<interface name="corenet_dontaudit_send_razor_server_packets" lineno="54289"> <summary> Do not audit attempts to send razor_server packets. </summary> @@ -54214,7 +42267,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_razor_server_packets" lineno="70532"> +<interface name="corenet_receive_razor_server_packets" lineno="54308"> <summary> Receive razor_server packets. </summary> @@ -54225,7 +42278,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70551"> +<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="54327"> <summary> Do not audit attempts to receive razor_server packets. </summary> @@ -54236,7 +42289,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_razor_server_packets" lineno="70570"> +<interface name="corenet_sendrecv_razor_server_packets" lineno="54346"> <summary> Send and receive razor_server packets. </summary> @@ -54247,7 +42300,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70586"> +<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="54362"> <summary> Do not audit attempts to send and receive razor_server packets. </summary> @@ -54258,7 +42311,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_razor_server_packets" lineno="70601"> +<interface name="corenet_relabelto_razor_server_packets" lineno="54377"> <summary> Relabel packets to razor_server the packet type. </summary> @@ -54268,85 +42321,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_redis_port" lineno="70623"> -<summary> -Send and receive TCP traffic on the redis port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_redis_port" lineno="70638"> -<summary> -Send UDP traffic on the redis port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70653"> -<summary> -Do not audit attempts to send UDP traffic on the redis port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_redis_port" lineno="70668"> -<summary> -Receive UDP traffic on the redis port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70683"> -<summary> -Do not audit attempts to receive UDP traffic on the redis port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_redis_port" lineno="70698"> -<summary> -Send and receive UDP traffic on the redis port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70714"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the redis port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_redis_port" lineno="70729"> +<interface name="corenet_tcp_bind_redis_port" lineno="54399"> <summary> Bind TCP sockets to the redis port. </summary> @@ -54357,7 +42332,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_redis_port" lineno="70749"> +<interface name="corenet_udp_bind_redis_port" lineno="54419"> <summary> Bind UDP sockets to the redis port. </summary> @@ -54368,7 +42343,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_redis_port" lineno="70768"> +<interface name="corenet_tcp_connect_redis_port" lineno="54438"> <summary> Make a TCP connection to the redis port. </summary> @@ -54378,7 +42353,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_redis_client_packets" lineno="70788"> +<interface name="corenet_send_redis_client_packets" lineno="54458"> <summary> Send redis_client packets. </summary> @@ -54389,7 +42364,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70807"> +<interface name="corenet_dontaudit_send_redis_client_packets" lineno="54477"> <summary> Do not audit attempts to send redis_client packets. </summary> @@ -54400,7 +42375,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_redis_client_packets" lineno="70826"> +<interface name="corenet_receive_redis_client_packets" lineno="54496"> <summary> Receive redis_client packets. </summary> @@ -54411,7 +42386,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70845"> +<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="54515"> <summary> Do not audit attempts to receive redis_client packets. </summary> @@ -54422,7 +42397,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_redis_client_packets" lineno="70864"> +<interface name="corenet_sendrecv_redis_client_packets" lineno="54534"> <summary> Send and receive redis_client packets. </summary> @@ -54433,7 +42408,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70880"> +<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="54550"> <summary> Do not audit attempts to send and receive redis_client packets. </summary> @@ -54444,7 +42419,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_redis_client_packets" lineno="70895"> +<interface name="corenet_relabelto_redis_client_packets" lineno="54565"> <summary> Relabel packets to redis_client the packet type. </summary> @@ -54454,7 +42429,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_redis_server_packets" lineno="70915"> +<interface name="corenet_send_redis_server_packets" lineno="54585"> <summary> Send redis_server packets. </summary> @@ -54465,7 +42440,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70934"> +<interface name="corenet_dontaudit_send_redis_server_packets" lineno="54604"> <summary> Do not audit attempts to send redis_server packets. </summary> @@ -54476,7 +42451,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_redis_server_packets" lineno="70953"> +<interface name="corenet_receive_redis_server_packets" lineno="54623"> <summary> Receive redis_server packets. </summary> @@ -54487,7 +42462,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70972"> +<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="54642"> <summary> Do not audit attempts to receive redis_server packets. </summary> @@ -54498,7 +42473,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_redis_server_packets" lineno="70991"> +<interface name="corenet_sendrecv_redis_server_packets" lineno="54661"> <summary> Send and receive redis_server packets. </summary> @@ -54509,7 +42484,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="71007"> +<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="54677"> <summary> Do not audit attempts to send and receive redis_server packets. </summary> @@ -54520,7 +42495,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_redis_server_packets" lineno="71022"> +<interface name="corenet_relabelto_redis_server_packets" lineno="54692"> <summary> Relabel packets to redis_server the packet type. </summary> @@ -54530,85 +42505,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_repository_port" lineno="71044"> -<summary> -Send and receive TCP traffic on the repository port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_repository_port" lineno="71059"> -<summary> -Send UDP traffic on the repository port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_repository_port" lineno="71074"> -<summary> -Do not audit attempts to send UDP traffic on the repository port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_repository_port" lineno="71089"> -<summary> -Receive UDP traffic on the repository port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="71104"> -<summary> -Do not audit attempts to receive UDP traffic on the repository port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_repository_port" lineno="71119"> -<summary> -Send and receive UDP traffic on the repository port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="71135"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the repository port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_repository_port" lineno="71150"> +<interface name="corenet_tcp_bind_repository_port" lineno="54714"> <summary> Bind TCP sockets to the repository port. </summary> @@ -54619,7 +42516,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_repository_port" lineno="71170"> +<interface name="corenet_udp_bind_repository_port" lineno="54734"> <summary> Bind UDP sockets to the repository port. </summary> @@ -54630,7 +42527,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_repository_port" lineno="71189"> +<interface name="corenet_tcp_connect_repository_port" lineno="54753"> <summary> Make a TCP connection to the repository port. </summary> @@ -54640,7 +42537,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_repository_client_packets" lineno="71209"> +<interface name="corenet_send_repository_client_packets" lineno="54773"> <summary> Send repository_client packets. </summary> @@ -54651,7 +42548,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_repository_client_packets" lineno="71228"> +<interface name="corenet_dontaudit_send_repository_client_packets" lineno="54792"> <summary> Do not audit attempts to send repository_client packets. </summary> @@ -54662,7 +42559,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_repository_client_packets" lineno="71247"> +<interface name="corenet_receive_repository_client_packets" lineno="54811"> <summary> Receive repository_client packets. </summary> @@ -54673,7 +42570,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="71266"> +<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="54830"> <summary> Do not audit attempts to receive repository_client packets. </summary> @@ -54684,7 +42581,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_repository_client_packets" lineno="71285"> +<interface name="corenet_sendrecv_repository_client_packets" lineno="54849"> <summary> Send and receive repository_client packets. </summary> @@ -54695,7 +42592,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="71301"> +<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="54865"> <summary> Do not audit attempts to send and receive repository_client packets. </summary> @@ -54706,7 +42603,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_repository_client_packets" lineno="71316"> +<interface name="corenet_relabelto_repository_client_packets" lineno="54880"> <summary> Relabel packets to repository_client the packet type. </summary> @@ -54716,7 +42613,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_repository_server_packets" lineno="71336"> +<interface name="corenet_send_repository_server_packets" lineno="54900"> <summary> Send repository_server packets. </summary> @@ -54727,7 +42624,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_repository_server_packets" lineno="71355"> +<interface name="corenet_dontaudit_send_repository_server_packets" lineno="54919"> <summary> Do not audit attempts to send repository_server packets. </summary> @@ -54738,7 +42635,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_repository_server_packets" lineno="71374"> +<interface name="corenet_receive_repository_server_packets" lineno="54938"> <summary> Receive repository_server packets. </summary> @@ -54749,7 +42646,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="71393"> +<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="54957"> <summary> Do not audit attempts to receive repository_server packets. </summary> @@ -54760,7 +42657,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_repository_server_packets" lineno="71412"> +<interface name="corenet_sendrecv_repository_server_packets" lineno="54976"> <summary> Send and receive repository_server packets. </summary> @@ -54771,7 +42668,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="71428"> +<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="54992"> <summary> Do not audit attempts to send and receive repository_server packets. </summary> @@ -54782,7 +42679,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_repository_server_packets" lineno="71443"> +<interface name="corenet_relabelto_repository_server_packets" lineno="55007"> <summary> Relabel packets to repository_server the packet type. </summary> @@ -54792,85 +42689,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71465"> -<summary> -Send and receive TCP traffic on the ricci port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ricci_port" lineno="71480"> -<summary> -Send UDP traffic on the ricci port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71495"> -<summary> -Do not audit attempts to send UDP traffic on the ricci port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ricci_port" lineno="71510"> -<summary> -Receive UDP traffic on the ricci port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71525"> -<summary> -Do not audit attempts to receive UDP traffic on the ricci port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ricci_port" lineno="71540"> -<summary> -Send and receive UDP traffic on the ricci port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71556"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ricci port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ricci_port" lineno="71571"> +<interface name="corenet_tcp_bind_ricci_port" lineno="55029"> <summary> Bind TCP sockets to the ricci port. </summary> @@ -54881,7 +42700,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ricci_port" lineno="71591"> +<interface name="corenet_udp_bind_ricci_port" lineno="55049"> <summary> Bind UDP sockets to the ricci port. </summary> @@ -54892,7 +42711,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ricci_port" lineno="71610"> +<interface name="corenet_tcp_connect_ricci_port" lineno="55068"> <summary> Make a TCP connection to the ricci port. </summary> @@ -54902,7 +42721,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ricci_client_packets" lineno="71630"> +<interface name="corenet_send_ricci_client_packets" lineno="55088"> <summary> Send ricci_client packets. </summary> @@ -54913,7 +42732,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71649"> +<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="55107"> <summary> Do not audit attempts to send ricci_client packets. </summary> @@ -54924,7 +42743,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ricci_client_packets" lineno="71668"> +<interface name="corenet_receive_ricci_client_packets" lineno="55126"> <summary> Receive ricci_client packets. </summary> @@ -54935,7 +42754,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71687"> +<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="55145"> <summary> Do not audit attempts to receive ricci_client packets. </summary> @@ -54946,7 +42765,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ricci_client_packets" lineno="71706"> +<interface name="corenet_sendrecv_ricci_client_packets" lineno="55164"> <summary> Send and receive ricci_client packets. </summary> @@ -54957,7 +42776,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71722"> +<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="55180"> <summary> Do not audit attempts to send and receive ricci_client packets. </summary> @@ -54968,7 +42787,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ricci_client_packets" lineno="71737"> +<interface name="corenet_relabelto_ricci_client_packets" lineno="55195"> <summary> Relabel packets to ricci_client the packet type. </summary> @@ -54978,7 +42797,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ricci_server_packets" lineno="71757"> +<interface name="corenet_send_ricci_server_packets" lineno="55215"> <summary> Send ricci_server packets. </summary> @@ -54989,7 +42808,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71776"> +<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="55234"> <summary> Do not audit attempts to send ricci_server packets. </summary> @@ -55000,7 +42819,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ricci_server_packets" lineno="71795"> +<interface name="corenet_receive_ricci_server_packets" lineno="55253"> <summary> Receive ricci_server packets. </summary> @@ -55011,7 +42830,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71814"> +<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="55272"> <summary> Do not audit attempts to receive ricci_server packets. </summary> @@ -55022,7 +42841,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ricci_server_packets" lineno="71833"> +<interface name="corenet_sendrecv_ricci_server_packets" lineno="55291"> <summary> Send and receive ricci_server packets. </summary> @@ -55033,7 +42852,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71849"> +<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="55307"> <summary> Do not audit attempts to send and receive ricci_server packets. </summary> @@ -55044,7 +42863,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ricci_server_packets" lineno="71864"> +<interface name="corenet_relabelto_ricci_server_packets" lineno="55322"> <summary> Relabel packets to ricci_server the packet type. </summary> @@ -55054,85 +42873,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71886"> -<summary> -Send and receive TCP traffic on the ricci_modcluster port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71901"> -<summary> -Send UDP traffic on the ricci_modcluster port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71916"> -<summary> -Do not audit attempts to send UDP traffic on the ricci_modcluster port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71931"> -<summary> -Receive UDP traffic on the ricci_modcluster port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71946"> -<summary> -Do not audit attempts to receive UDP traffic on the ricci_modcluster port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71961"> -<summary> -Send and receive UDP traffic on the ricci_modcluster port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71977"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ricci_modcluster port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71992"> +<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="55344"> <summary> Bind TCP sockets to the ricci_modcluster port. </summary> @@ -55143,7 +42884,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="72012"> +<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="55364"> <summary> Bind UDP sockets to the ricci_modcluster port. </summary> @@ -55154,7 +42895,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="72031"> +<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="55383"> <summary> Make a TCP connection to the ricci_modcluster port. </summary> @@ -55164,7 +42905,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ricci_modcluster_client_packets" lineno="72051"> +<interface name="corenet_send_ricci_modcluster_client_packets" lineno="55403"> <summary> Send ricci_modcluster_client packets. </summary> @@ -55175,7 +42916,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="72070"> +<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="55422"> <summary> Do not audit attempts to send ricci_modcluster_client packets. </summary> @@ -55186,7 +42927,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="72089"> +<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="55441"> <summary> Receive ricci_modcluster_client packets. </summary> @@ -55197,7 +42938,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="72108"> +<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="55460"> <summary> Do not audit attempts to receive ricci_modcluster_client packets. </summary> @@ -55208,7 +42949,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="72127"> +<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="55479"> <summary> Send and receive ricci_modcluster_client packets. </summary> @@ -55219,7 +42960,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="72143"> +<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="55495"> <summary> Do not audit attempts to send and receive ricci_modcluster_client packets. </summary> @@ -55230,7 +42971,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="72158"> +<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="55510"> <summary> Relabel packets to ricci_modcluster_client the packet type. </summary> @@ -55240,7 +42981,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ricci_modcluster_server_packets" lineno="72178"> +<interface name="corenet_send_ricci_modcluster_server_packets" lineno="55530"> <summary> Send ricci_modcluster_server packets. </summary> @@ -55251,7 +42992,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="72197"> +<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="55549"> <summary> Do not audit attempts to send ricci_modcluster_server packets. </summary> @@ -55262,7 +43003,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="72216"> +<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="55568"> <summary> Receive ricci_modcluster_server packets. </summary> @@ -55273,7 +43014,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="72235"> +<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="55587"> <summary> Do not audit attempts to receive ricci_modcluster_server packets. </summary> @@ -55284,7 +43025,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="72254"> +<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="55606"> <summary> Send and receive ricci_modcluster_server packets. </summary> @@ -55295,7 +43036,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="72270"> +<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="55622"> <summary> Do not audit attempts to send and receive ricci_modcluster_server packets. </summary> @@ -55306,7 +43047,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="72285"> +<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="55637"> <summary> Relabel packets to ricci_modcluster_server the packet type. </summary> @@ -55316,85 +43057,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="72307"> -<summary> -Send and receive TCP traffic on the rlogind port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_rlogind_port" lineno="72322"> -<summary> -Send UDP traffic on the rlogind port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="72337"> -<summary> -Do not audit attempts to send UDP traffic on the rlogind port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_rlogind_port" lineno="72352"> -<summary> -Receive UDP traffic on the rlogind port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="72367"> -<summary> -Do not audit attempts to receive UDP traffic on the rlogind port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_rlogind_port" lineno="72382"> -<summary> -Send and receive UDP traffic on the rlogind port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="72398"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the rlogind port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_rlogind_port" lineno="72413"> +<interface name="corenet_tcp_bind_rlogind_port" lineno="55659"> <summary> Bind TCP sockets to the rlogind port. </summary> @@ -55405,7 +43068,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rlogind_port" lineno="72433"> +<interface name="corenet_udp_bind_rlogind_port" lineno="55679"> <summary> Bind UDP sockets to the rlogind port. </summary> @@ -55416,7 +43079,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rlogind_port" lineno="72452"> +<interface name="corenet_tcp_connect_rlogind_port" lineno="55698"> <summary> Make a TCP connection to the rlogind port. </summary> @@ -55426,7 +43089,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rlogind_client_packets" lineno="72472"> +<interface name="corenet_send_rlogind_client_packets" lineno="55718"> <summary> Send rlogind_client packets. </summary> @@ -55437,7 +43100,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72491"> +<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="55737"> <summary> Do not audit attempts to send rlogind_client packets. </summary> @@ -55448,7 +43111,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rlogind_client_packets" lineno="72510"> +<interface name="corenet_receive_rlogind_client_packets" lineno="55756"> <summary> Receive rlogind_client packets. </summary> @@ -55459,7 +43122,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72529"> +<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="55775"> <summary> Do not audit attempts to receive rlogind_client packets. </summary> @@ -55470,7 +43133,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72548"> +<interface name="corenet_sendrecv_rlogind_client_packets" lineno="55794"> <summary> Send and receive rlogind_client packets. </summary> @@ -55481,7 +43144,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72564"> +<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="55810"> <summary> Do not audit attempts to send and receive rlogind_client packets. </summary> @@ -55492,7 +43155,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rlogind_client_packets" lineno="72579"> +<interface name="corenet_relabelto_rlogind_client_packets" lineno="55825"> <summary> Relabel packets to rlogind_client the packet type. </summary> @@ -55502,7 +43165,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rlogind_server_packets" lineno="72599"> +<interface name="corenet_send_rlogind_server_packets" lineno="55845"> <summary> Send rlogind_server packets. </summary> @@ -55513,7 +43176,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72618"> +<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="55864"> <summary> Do not audit attempts to send rlogind_server packets. </summary> @@ -55524,7 +43187,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rlogind_server_packets" lineno="72637"> +<interface name="corenet_receive_rlogind_server_packets" lineno="55883"> <summary> Receive rlogind_server packets. </summary> @@ -55535,7 +43198,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72656"> +<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="55902"> <summary> Do not audit attempts to receive rlogind_server packets. </summary> @@ -55546,7 +43209,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72675"> +<interface name="corenet_sendrecv_rlogind_server_packets" lineno="55921"> <summary> Send and receive rlogind_server packets. </summary> @@ -55557,7 +43220,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72691"> +<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="55937"> <summary> Do not audit attempts to send and receive rlogind_server packets. </summary> @@ -55568,7 +43231,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rlogind_server_packets" lineno="72706"> +<interface name="corenet_relabelto_rlogind_server_packets" lineno="55952"> <summary> Relabel packets to rlogind_server the packet type. </summary> @@ -55578,85 +43241,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72728"> -<summary> -Send and receive TCP traffic on the rndc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_rndc_port" lineno="72743"> -<summary> -Send UDP traffic on the rndc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72758"> -<summary> -Do not audit attempts to send UDP traffic on the rndc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_rndc_port" lineno="72773"> -<summary> -Receive UDP traffic on the rndc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72788"> -<summary> -Do not audit attempts to receive UDP traffic on the rndc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_rndc_port" lineno="72803"> -<summary> -Send and receive UDP traffic on the rndc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72819"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the rndc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_rndc_port" lineno="72834"> +<interface name="corenet_tcp_bind_rndc_port" lineno="55974"> <summary> Bind TCP sockets to the rndc port. </summary> @@ -55667,7 +43252,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rndc_port" lineno="72854"> +<interface name="corenet_udp_bind_rndc_port" lineno="55994"> <summary> Bind UDP sockets to the rndc port. </summary> @@ -55678,7 +43263,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rndc_port" lineno="72873"> +<interface name="corenet_tcp_connect_rndc_port" lineno="56013"> <summary> Make a TCP connection to the rndc port. </summary> @@ -55688,7 +43273,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rndc_client_packets" lineno="72893"> +<interface name="corenet_send_rndc_client_packets" lineno="56033"> <summary> Send rndc_client packets. </summary> @@ -55699,7 +43284,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72912"> +<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="56052"> <summary> Do not audit attempts to send rndc_client packets. </summary> @@ -55710,7 +43295,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rndc_client_packets" lineno="72931"> +<interface name="corenet_receive_rndc_client_packets" lineno="56071"> <summary> Receive rndc_client packets. </summary> @@ -55721,7 +43306,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72950"> +<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="56090"> <summary> Do not audit attempts to receive rndc_client packets. </summary> @@ -55732,7 +43317,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rndc_client_packets" lineno="72969"> +<interface name="corenet_sendrecv_rndc_client_packets" lineno="56109"> <summary> Send and receive rndc_client packets. </summary> @@ -55743,7 +43328,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72985"> +<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="56125"> <summary> Do not audit attempts to send and receive rndc_client packets. </summary> @@ -55754,7 +43339,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rndc_client_packets" lineno="73000"> +<interface name="corenet_relabelto_rndc_client_packets" lineno="56140"> <summary> Relabel packets to rndc_client the packet type. </summary> @@ -55764,7 +43349,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rndc_server_packets" lineno="73020"> +<interface name="corenet_send_rndc_server_packets" lineno="56160"> <summary> Send rndc_server packets. </summary> @@ -55775,7 +43360,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="73039"> +<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="56179"> <summary> Do not audit attempts to send rndc_server packets. </summary> @@ -55786,7 +43371,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rndc_server_packets" lineno="73058"> +<interface name="corenet_receive_rndc_server_packets" lineno="56198"> <summary> Receive rndc_server packets. </summary> @@ -55797,7 +43382,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="73077"> +<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="56217"> <summary> Do not audit attempts to receive rndc_server packets. </summary> @@ -55808,7 +43393,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rndc_server_packets" lineno="73096"> +<interface name="corenet_sendrecv_rndc_server_packets" lineno="56236"> <summary> Send and receive rndc_server packets. </summary> @@ -55819,7 +43404,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="73112"> +<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="56252"> <summary> Do not audit attempts to send and receive rndc_server packets. </summary> @@ -55830,7 +43415,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rndc_server_packets" lineno="73127"> +<interface name="corenet_relabelto_rndc_server_packets" lineno="56267"> <summary> Relabel packets to rndc_server the packet type. </summary> @@ -55840,85 +43425,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_router_port" lineno="73149"> -<summary> -Send and receive TCP traffic on the router port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_router_port" lineno="73164"> -<summary> -Send UDP traffic on the router port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_router_port" lineno="73179"> -<summary> -Do not audit attempts to send UDP traffic on the router port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_router_port" lineno="73194"> -<summary> -Receive UDP traffic on the router port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_router_port" lineno="73209"> -<summary> -Do not audit attempts to receive UDP traffic on the router port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_router_port" lineno="73224"> -<summary> -Send and receive UDP traffic on the router port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="73240"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the router port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_router_port" lineno="73255"> +<interface name="corenet_tcp_bind_router_port" lineno="56289"> <summary> Bind TCP sockets to the router port. </summary> @@ -55929,7 +43436,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_router_port" lineno="73275"> +<interface name="corenet_udp_bind_router_port" lineno="56309"> <summary> Bind UDP sockets to the router port. </summary> @@ -55940,7 +43447,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_router_port" lineno="73294"> +<interface name="corenet_tcp_connect_router_port" lineno="56328"> <summary> Make a TCP connection to the router port. </summary> @@ -55950,7 +43457,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_router_client_packets" lineno="73314"> +<interface name="corenet_send_router_client_packets" lineno="56348"> <summary> Send router_client packets. </summary> @@ -55961,7 +43468,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_router_client_packets" lineno="73333"> +<interface name="corenet_dontaudit_send_router_client_packets" lineno="56367"> <summary> Do not audit attempts to send router_client packets. </summary> @@ -55972,7 +43479,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_router_client_packets" lineno="73352"> +<interface name="corenet_receive_router_client_packets" lineno="56386"> <summary> Receive router_client packets. </summary> @@ -55983,7 +43490,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_router_client_packets" lineno="73371"> +<interface name="corenet_dontaudit_receive_router_client_packets" lineno="56405"> <summary> Do not audit attempts to receive router_client packets. </summary> @@ -55994,7 +43501,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_router_client_packets" lineno="73390"> +<interface name="corenet_sendrecv_router_client_packets" lineno="56424"> <summary> Send and receive router_client packets. </summary> @@ -56005,7 +43512,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="73406"> +<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="56440"> <summary> Do not audit attempts to send and receive router_client packets. </summary> @@ -56016,7 +43523,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_router_client_packets" lineno="73421"> +<interface name="corenet_relabelto_router_client_packets" lineno="56455"> <summary> Relabel packets to router_client the packet type. </summary> @@ -56026,7 +43533,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_router_server_packets" lineno="73441"> +<interface name="corenet_send_router_server_packets" lineno="56475"> <summary> Send router_server packets. </summary> @@ -56037,7 +43544,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_router_server_packets" lineno="73460"> +<interface name="corenet_dontaudit_send_router_server_packets" lineno="56494"> <summary> Do not audit attempts to send router_server packets. </summary> @@ -56048,7 +43555,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_router_server_packets" lineno="73479"> +<interface name="corenet_receive_router_server_packets" lineno="56513"> <summary> Receive router_server packets. </summary> @@ -56059,7 +43566,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73498"> +<interface name="corenet_dontaudit_receive_router_server_packets" lineno="56532"> <summary> Do not audit attempts to receive router_server packets. </summary> @@ -56070,7 +43577,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_router_server_packets" lineno="73517"> +<interface name="corenet_sendrecv_router_server_packets" lineno="56551"> <summary> Send and receive router_server packets. </summary> @@ -56081,7 +43588,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73533"> +<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="56567"> <summary> Do not audit attempts to send and receive router_server packets. </summary> @@ -56092,7 +43599,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_router_server_packets" lineno="73548"> +<interface name="corenet_relabelto_router_server_packets" lineno="56582"> <summary> Relabel packets to router_server the packet type. </summary> @@ -56102,85 +43609,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73570"> -<summary> -Send and receive TCP traffic on the rsh port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_rsh_port" lineno="73585"> -<summary> -Send UDP traffic on the rsh port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73600"> -<summary> -Do not audit attempts to send UDP traffic on the rsh port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_rsh_port" lineno="73615"> -<summary> -Receive UDP traffic on the rsh port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73630"> -<summary> -Do not audit attempts to receive UDP traffic on the rsh port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_rsh_port" lineno="73645"> -<summary> -Send and receive UDP traffic on the rsh port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73661"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the rsh port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_rsh_port" lineno="73676"> +<interface name="corenet_tcp_bind_rsh_port" lineno="56604"> <summary> Bind TCP sockets to the rsh port. </summary> @@ -56191,7 +43620,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rsh_port" lineno="73696"> +<interface name="corenet_udp_bind_rsh_port" lineno="56624"> <summary> Bind UDP sockets to the rsh port. </summary> @@ -56202,7 +43631,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rsh_port" lineno="73715"> +<interface name="corenet_tcp_connect_rsh_port" lineno="56643"> <summary> Make a TCP connection to the rsh port. </summary> @@ -56212,7 +43641,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rsh_client_packets" lineno="73735"> +<interface name="corenet_send_rsh_client_packets" lineno="56663"> <summary> Send rsh_client packets. </summary> @@ -56223,7 +43652,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73754"> +<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="56682"> <summary> Do not audit attempts to send rsh_client packets. </summary> @@ -56234,7 +43663,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rsh_client_packets" lineno="73773"> +<interface name="corenet_receive_rsh_client_packets" lineno="56701"> <summary> Receive rsh_client packets. </summary> @@ -56245,7 +43674,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73792"> +<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="56720"> <summary> Do not audit attempts to receive rsh_client packets. </summary> @@ -56256,7 +43685,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rsh_client_packets" lineno="73811"> +<interface name="corenet_sendrecv_rsh_client_packets" lineno="56739"> <summary> Send and receive rsh_client packets. </summary> @@ -56267,7 +43696,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73827"> +<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="56755"> <summary> Do not audit attempts to send and receive rsh_client packets. </summary> @@ -56278,7 +43707,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rsh_client_packets" lineno="73842"> +<interface name="corenet_relabelto_rsh_client_packets" lineno="56770"> <summary> Relabel packets to rsh_client the packet type. </summary> @@ -56288,7 +43717,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rsh_server_packets" lineno="73862"> +<interface name="corenet_send_rsh_server_packets" lineno="56790"> <summary> Send rsh_server packets. </summary> @@ -56299,7 +43728,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73881"> +<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="56809"> <summary> Do not audit attempts to send rsh_server packets. </summary> @@ -56310,7 +43739,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rsh_server_packets" lineno="73900"> +<interface name="corenet_receive_rsh_server_packets" lineno="56828"> <summary> Receive rsh_server packets. </summary> @@ -56321,7 +43750,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73919"> +<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="56847"> <summary> Do not audit attempts to receive rsh_server packets. </summary> @@ -56332,7 +43761,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rsh_server_packets" lineno="73938"> +<interface name="corenet_sendrecv_rsh_server_packets" lineno="56866"> <summary> Send and receive rsh_server packets. </summary> @@ -56343,7 +43772,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73954"> +<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="56882"> <summary> Do not audit attempts to send and receive rsh_server packets. </summary> @@ -56354,7 +43783,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rsh_server_packets" lineno="73969"> +<interface name="corenet_relabelto_rsh_server_packets" lineno="56897"> <summary> Relabel packets to rsh_server the packet type. </summary> @@ -56364,85 +43793,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73991"> -<summary> -Send and receive TCP traffic on the rsync port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_rsync_port" lineno="74006"> -<summary> -Send UDP traffic on the rsync port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="74021"> -<summary> -Do not audit attempts to send UDP traffic on the rsync port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_rsync_port" lineno="74036"> -<summary> -Receive UDP traffic on the rsync port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="74051"> -<summary> -Do not audit attempts to receive UDP traffic on the rsync port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_rsync_port" lineno="74066"> -<summary> -Send and receive UDP traffic on the rsync port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="74082"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the rsync port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_rsync_port" lineno="74097"> +<interface name="corenet_tcp_bind_rsync_port" lineno="56919"> <summary> Bind TCP sockets to the rsync port. </summary> @@ -56453,7 +43804,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rsync_port" lineno="74117"> +<interface name="corenet_udp_bind_rsync_port" lineno="56939"> <summary> Bind UDP sockets to the rsync port. </summary> @@ -56464,7 +43815,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rsync_port" lineno="74136"> +<interface name="corenet_tcp_connect_rsync_port" lineno="56958"> <summary> Make a TCP connection to the rsync port. </summary> @@ -56474,7 +43825,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rsync_client_packets" lineno="74156"> +<interface name="corenet_send_rsync_client_packets" lineno="56978"> <summary> Send rsync_client packets. </summary> @@ -56485,7 +43836,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="74175"> +<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="56997"> <summary> Do not audit attempts to send rsync_client packets. </summary> @@ -56496,7 +43847,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rsync_client_packets" lineno="74194"> +<interface name="corenet_receive_rsync_client_packets" lineno="57016"> <summary> Receive rsync_client packets. </summary> @@ -56507,7 +43858,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="74213"> +<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="57035"> <summary> Do not audit attempts to receive rsync_client packets. </summary> @@ -56518,7 +43869,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rsync_client_packets" lineno="74232"> +<interface name="corenet_sendrecv_rsync_client_packets" lineno="57054"> <summary> Send and receive rsync_client packets. </summary> @@ -56529,7 +43880,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="74248"> +<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="57070"> <summary> Do not audit attempts to send and receive rsync_client packets. </summary> @@ -56540,7 +43891,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rsync_client_packets" lineno="74263"> +<interface name="corenet_relabelto_rsync_client_packets" lineno="57085"> <summary> Relabel packets to rsync_client the packet type. </summary> @@ -56550,7 +43901,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rsync_server_packets" lineno="74283"> +<interface name="corenet_send_rsync_server_packets" lineno="57105"> <summary> Send rsync_server packets. </summary> @@ -56561,7 +43912,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="74302"> +<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="57124"> <summary> Do not audit attempts to send rsync_server packets. </summary> @@ -56572,7 +43923,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rsync_server_packets" lineno="74321"> +<interface name="corenet_receive_rsync_server_packets" lineno="57143"> <summary> Receive rsync_server packets. </summary> @@ -56583,7 +43934,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="74340"> +<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="57162"> <summary> Do not audit attempts to receive rsync_server packets. </summary> @@ -56594,7 +43945,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rsync_server_packets" lineno="74359"> +<interface name="corenet_sendrecv_rsync_server_packets" lineno="57181"> <summary> Send and receive rsync_server packets. </summary> @@ -56605,7 +43956,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="74375"> +<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="57197"> <summary> Do not audit attempts to send and receive rsync_server packets. </summary> @@ -56616,7 +43967,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rsync_server_packets" lineno="74390"> +<interface name="corenet_relabelto_rsync_server_packets" lineno="57212"> <summary> Relabel packets to rsync_server the packet type. </summary> @@ -56626,85 +43977,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="74412"> -<summary> -Send and receive TCP traffic on the rtorrent port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_rtorrent_port" lineno="74427"> -<summary> -Send UDP traffic on the rtorrent port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74442"> -<summary> -Do not audit attempts to send UDP traffic on the rtorrent port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_rtorrent_port" lineno="74457"> -<summary> -Receive UDP traffic on the rtorrent port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74472"> -<summary> -Do not audit attempts to receive UDP traffic on the rtorrent port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74487"> -<summary> -Send and receive UDP traffic on the rtorrent port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74503"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the rtorrent port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_rtorrent_port" lineno="74518"> +<interface name="corenet_tcp_bind_rtorrent_port" lineno="57234"> <summary> Bind TCP sockets to the rtorrent port. </summary> @@ -56715,7 +43988,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rtorrent_port" lineno="74538"> +<interface name="corenet_udp_bind_rtorrent_port" lineno="57254"> <summary> Bind UDP sockets to the rtorrent port. </summary> @@ -56726,7 +43999,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rtorrent_port" lineno="74557"> +<interface name="corenet_tcp_connect_rtorrent_port" lineno="57273"> <summary> Make a TCP connection to the rtorrent port. </summary> @@ -56736,7 +44009,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rtorrent_client_packets" lineno="74577"> +<interface name="corenet_send_rtorrent_client_packets" lineno="57293"> <summary> Send rtorrent_client packets. </summary> @@ -56747,7 +44020,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74596"> +<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="57312"> <summary> Do not audit attempts to send rtorrent_client packets. </summary> @@ -56758,7 +44031,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rtorrent_client_packets" lineno="74615"> +<interface name="corenet_receive_rtorrent_client_packets" lineno="57331"> <summary> Receive rtorrent_client packets. </summary> @@ -56769,7 +44042,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74634"> +<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="57350"> <summary> Do not audit attempts to receive rtorrent_client packets. </summary> @@ -56780,7 +44053,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74653"> +<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="57369"> <summary> Send and receive rtorrent_client packets. </summary> @@ -56791,7 +44064,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74669"> +<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="57385"> <summary> Do not audit attempts to send and receive rtorrent_client packets. </summary> @@ -56802,7 +44075,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74684"> +<interface name="corenet_relabelto_rtorrent_client_packets" lineno="57400"> <summary> Relabel packets to rtorrent_client the packet type. </summary> @@ -56812,7 +44085,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rtorrent_server_packets" lineno="74704"> +<interface name="corenet_send_rtorrent_server_packets" lineno="57420"> <summary> Send rtorrent_server packets. </summary> @@ -56823,7 +44096,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74723"> +<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="57439"> <summary> Do not audit attempts to send rtorrent_server packets. </summary> @@ -56834,7 +44107,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rtorrent_server_packets" lineno="74742"> +<interface name="corenet_receive_rtorrent_server_packets" lineno="57458"> <summary> Receive rtorrent_server packets. </summary> @@ -56845,7 +44118,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74761"> +<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="57477"> <summary> Do not audit attempts to receive rtorrent_server packets. </summary> @@ -56856,7 +44129,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74780"> +<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="57496"> <summary> Send and receive rtorrent_server packets. </summary> @@ -56867,7 +44140,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74796"> +<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="57512"> <summary> Do not audit attempts to send and receive rtorrent_server packets. </summary> @@ -56878,7 +44151,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74811"> +<interface name="corenet_relabelto_rtorrent_server_packets" lineno="57527"> <summary> Relabel packets to rtorrent_server the packet type. </summary> @@ -56888,85 +44161,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74833"> -<summary> -Send and receive TCP traffic on the rtsp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_rtsp_port" lineno="74848"> -<summary> -Send UDP traffic on the rtsp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74863"> -<summary> -Do not audit attempts to send UDP traffic on the rtsp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_rtsp_port" lineno="74878"> -<summary> -Receive UDP traffic on the rtsp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74893"> -<summary> -Do not audit attempts to receive UDP traffic on the rtsp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74908"> -<summary> -Send and receive UDP traffic on the rtsp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74924"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the rtsp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_rtsp_port" lineno="74939"> +<interface name="corenet_tcp_bind_rtsp_port" lineno="57549"> <summary> Bind TCP sockets to the rtsp port. </summary> @@ -56977,7 +44172,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rtsp_port" lineno="74959"> +<interface name="corenet_udp_bind_rtsp_port" lineno="57569"> <summary> Bind UDP sockets to the rtsp port. </summary> @@ -56988,7 +44183,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rtsp_port" lineno="74978"> +<interface name="corenet_tcp_connect_rtsp_port" lineno="57588"> <summary> Make a TCP connection to the rtsp port. </summary> @@ -56998,7 +44193,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rtsp_client_packets" lineno="74998"> +<interface name="corenet_send_rtsp_client_packets" lineno="57608"> <summary> Send rtsp_client packets. </summary> @@ -57009,7 +44204,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="75017"> +<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="57627"> <summary> Do not audit attempts to send rtsp_client packets. </summary> @@ -57020,7 +44215,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rtsp_client_packets" lineno="75036"> +<interface name="corenet_receive_rtsp_client_packets" lineno="57646"> <summary> Receive rtsp_client packets. </summary> @@ -57031,7 +44226,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="75055"> +<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="57665"> <summary> Do not audit attempts to receive rtsp_client packets. </summary> @@ -57042,7 +44237,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rtsp_client_packets" lineno="75074"> +<interface name="corenet_sendrecv_rtsp_client_packets" lineno="57684"> <summary> Send and receive rtsp_client packets. </summary> @@ -57053,7 +44248,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="75090"> +<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="57700"> <summary> Do not audit attempts to send and receive rtsp_client packets. </summary> @@ -57064,7 +44259,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rtsp_client_packets" lineno="75105"> +<interface name="corenet_relabelto_rtsp_client_packets" lineno="57715"> <summary> Relabel packets to rtsp_client the packet type. </summary> @@ -57074,7 +44269,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rtsp_server_packets" lineno="75125"> +<interface name="corenet_send_rtsp_server_packets" lineno="57735"> <summary> Send rtsp_server packets. </summary> @@ -57085,7 +44280,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="75144"> +<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="57754"> <summary> Do not audit attempts to send rtsp_server packets. </summary> @@ -57096,7 +44291,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rtsp_server_packets" lineno="75163"> +<interface name="corenet_receive_rtsp_server_packets" lineno="57773"> <summary> Receive rtsp_server packets. </summary> @@ -57107,7 +44302,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="75182"> +<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="57792"> <summary> Do not audit attempts to receive rtsp_server packets. </summary> @@ -57118,7 +44313,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rtsp_server_packets" lineno="75201"> +<interface name="corenet_sendrecv_rtsp_server_packets" lineno="57811"> <summary> Send and receive rtsp_server packets. </summary> @@ -57129,7 +44324,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="75217"> +<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="57827"> <summary> Do not audit attempts to send and receive rtsp_server packets. </summary> @@ -57140,7 +44335,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rtsp_server_packets" lineno="75232"> +<interface name="corenet_relabelto_rtsp_server_packets" lineno="57842"> <summary> Relabel packets to rtsp_server the packet type. </summary> @@ -57150,85 +44345,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_rwho_port" lineno="75254"> -<summary> -Send and receive TCP traffic on the rwho port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_rwho_port" lineno="75269"> -<summary> -Send UDP traffic on the rwho port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="75284"> -<summary> -Do not audit attempts to send UDP traffic on the rwho port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_rwho_port" lineno="75299"> -<summary> -Receive UDP traffic on the rwho port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="75314"> -<summary> -Do not audit attempts to receive UDP traffic on the rwho port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_rwho_port" lineno="75329"> -<summary> -Send and receive UDP traffic on the rwho port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="75345"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the rwho port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_rwho_port" lineno="75360"> +<interface name="corenet_tcp_bind_rwho_port" lineno="57864"> <summary> Bind TCP sockets to the rwho port. </summary> @@ -57239,7 +44356,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_rwho_port" lineno="75380"> +<interface name="corenet_udp_bind_rwho_port" lineno="57884"> <summary> Bind UDP sockets to the rwho port. </summary> @@ -57250,7 +44367,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_rwho_port" lineno="75399"> +<interface name="corenet_tcp_connect_rwho_port" lineno="57903"> <summary> Make a TCP connection to the rwho port. </summary> @@ -57260,7 +44377,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rwho_client_packets" lineno="75419"> +<interface name="corenet_send_rwho_client_packets" lineno="57923"> <summary> Send rwho_client packets. </summary> @@ -57271,7 +44388,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="75438"> +<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="57942"> <summary> Do not audit attempts to send rwho_client packets. </summary> @@ -57282,7 +44399,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rwho_client_packets" lineno="75457"> +<interface name="corenet_receive_rwho_client_packets" lineno="57961"> <summary> Receive rwho_client packets. </summary> @@ -57293,7 +44410,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75476"> +<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="57980"> <summary> Do not audit attempts to receive rwho_client packets. </summary> @@ -57304,7 +44421,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rwho_client_packets" lineno="75495"> +<interface name="corenet_sendrecv_rwho_client_packets" lineno="57999"> <summary> Send and receive rwho_client packets. </summary> @@ -57315,7 +44432,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75511"> +<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="58015"> <summary> Do not audit attempts to send and receive rwho_client packets. </summary> @@ -57326,7 +44443,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rwho_client_packets" lineno="75526"> +<interface name="corenet_relabelto_rwho_client_packets" lineno="58030"> <summary> Relabel packets to rwho_client the packet type. </summary> @@ -57336,7 +44453,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_rwho_server_packets" lineno="75546"> +<interface name="corenet_send_rwho_server_packets" lineno="58050"> <summary> Send rwho_server packets. </summary> @@ -57347,7 +44464,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75565"> +<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="58069"> <summary> Do not audit attempts to send rwho_server packets. </summary> @@ -57358,7 +44475,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_rwho_server_packets" lineno="75584"> +<interface name="corenet_receive_rwho_server_packets" lineno="58088"> <summary> Receive rwho_server packets. </summary> @@ -57369,7 +44486,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75603"> +<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="58107"> <summary> Do not audit attempts to receive rwho_server packets. </summary> @@ -57380,7 +44497,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_rwho_server_packets" lineno="75622"> +<interface name="corenet_sendrecv_rwho_server_packets" lineno="58126"> <summary> Send and receive rwho_server packets. </summary> @@ -57391,7 +44508,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75638"> +<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="58142"> <summary> Do not audit attempts to send and receive rwho_server packets. </summary> @@ -57402,7 +44519,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_rwho_server_packets" lineno="75653"> +<interface name="corenet_relabelto_rwho_server_packets" lineno="58157"> <summary> Relabel packets to rwho_server the packet type. </summary> @@ -57412,85 +44529,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_salt_port" lineno="75675"> -<summary> -Send and receive TCP traffic on the salt port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_salt_port" lineno="75690"> -<summary> -Send UDP traffic on the salt port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75705"> -<summary> -Do not audit attempts to send UDP traffic on the salt port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_salt_port" lineno="75720"> -<summary> -Receive UDP traffic on the salt port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75735"> -<summary> -Do not audit attempts to receive UDP traffic on the salt port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_salt_port" lineno="75750"> -<summary> -Send and receive UDP traffic on the salt port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75766"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the salt port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_salt_port" lineno="75781"> +<interface name="corenet_tcp_bind_salt_port" lineno="58179"> <summary> Bind TCP sockets to the salt port. </summary> @@ -57501,7 +44540,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_salt_port" lineno="75801"> +<interface name="corenet_udp_bind_salt_port" lineno="58199"> <summary> Bind UDP sockets to the salt port. </summary> @@ -57512,7 +44551,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_salt_port" lineno="75820"> +<interface name="corenet_tcp_connect_salt_port" lineno="58218"> <summary> Make a TCP connection to the salt port. </summary> @@ -57522,7 +44561,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_salt_client_packets" lineno="75840"> +<interface name="corenet_send_salt_client_packets" lineno="58238"> <summary> Send salt_client packets. </summary> @@ -57533,7 +44572,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75859"> +<interface name="corenet_dontaudit_send_salt_client_packets" lineno="58257"> <summary> Do not audit attempts to send salt_client packets. </summary> @@ -57544,7 +44583,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_salt_client_packets" lineno="75878"> +<interface name="corenet_receive_salt_client_packets" lineno="58276"> <summary> Receive salt_client packets. </summary> @@ -57555,7 +44594,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75897"> +<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="58295"> <summary> Do not audit attempts to receive salt_client packets. </summary> @@ -57566,7 +44605,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_salt_client_packets" lineno="75916"> +<interface name="corenet_sendrecv_salt_client_packets" lineno="58314"> <summary> Send and receive salt_client packets. </summary> @@ -57577,7 +44616,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75932"> +<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="58330"> <summary> Do not audit attempts to send and receive salt_client packets. </summary> @@ -57588,7 +44627,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_salt_client_packets" lineno="75947"> +<interface name="corenet_relabelto_salt_client_packets" lineno="58345"> <summary> Relabel packets to salt_client the packet type. </summary> @@ -57598,7 +44637,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_salt_server_packets" lineno="75967"> +<interface name="corenet_send_salt_server_packets" lineno="58365"> <summary> Send salt_server packets. </summary> @@ -57609,7 +44648,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75986"> +<interface name="corenet_dontaudit_send_salt_server_packets" lineno="58384"> <summary> Do not audit attempts to send salt_server packets. </summary> @@ -57620,7 +44659,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_salt_server_packets" lineno="76005"> +<interface name="corenet_receive_salt_server_packets" lineno="58403"> <summary> Receive salt_server packets. </summary> @@ -57631,7 +44670,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="76024"> +<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="58422"> <summary> Do not audit attempts to receive salt_server packets. </summary> @@ -57642,7 +44681,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_salt_server_packets" lineno="76043"> +<interface name="corenet_sendrecv_salt_server_packets" lineno="58441"> <summary> Send and receive salt_server packets. </summary> @@ -57653,7 +44692,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="76059"> +<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="58457"> <summary> Do not audit attempts to send and receive salt_server packets. </summary> @@ -57664,7 +44703,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_salt_server_packets" lineno="76074"> +<interface name="corenet_relabelto_salt_server_packets" lineno="58472"> <summary> Relabel packets to salt_server the packet type. </summary> @@ -57674,85 +44713,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_sap_port" lineno="76096"> -<summary> -Send and receive TCP traffic on the sap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_sap_port" lineno="76111"> -<summary> -Send UDP traffic on the sap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_sap_port" lineno="76126"> -<summary> -Do not audit attempts to send UDP traffic on the sap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_sap_port" lineno="76141"> -<summary> -Receive UDP traffic on the sap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="76156"> -<summary> -Do not audit attempts to receive UDP traffic on the sap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_sap_port" lineno="76171"> -<summary> -Send and receive UDP traffic on the sap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="76187"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the sap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_sap_port" lineno="76202"> +<interface name="corenet_tcp_bind_sap_port" lineno="58494"> <summary> Bind TCP sockets to the sap port. </summary> @@ -57763,7 +44724,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_sap_port" lineno="76222"> +<interface name="corenet_udp_bind_sap_port" lineno="58514"> <summary> Bind UDP sockets to the sap port. </summary> @@ -57774,7 +44735,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_sap_port" lineno="76241"> +<interface name="corenet_tcp_connect_sap_port" lineno="58533"> <summary> Make a TCP connection to the sap port. </summary> @@ -57784,7 +44745,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sap_client_packets" lineno="76261"> +<interface name="corenet_send_sap_client_packets" lineno="58553"> <summary> Send sap_client packets. </summary> @@ -57795,7 +44756,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sap_client_packets" lineno="76280"> +<interface name="corenet_dontaudit_send_sap_client_packets" lineno="58572"> <summary> Do not audit attempts to send sap_client packets. </summary> @@ -57806,7 +44767,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sap_client_packets" lineno="76299"> +<interface name="corenet_receive_sap_client_packets" lineno="58591"> <summary> Receive sap_client packets. </summary> @@ -57817,7 +44778,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="76318"> +<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="58610"> <summary> Do not audit attempts to receive sap_client packets. </summary> @@ -57828,7 +44789,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sap_client_packets" lineno="76337"> +<interface name="corenet_sendrecv_sap_client_packets" lineno="58629"> <summary> Send and receive sap_client packets. </summary> @@ -57839,7 +44800,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="76353"> +<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="58645"> <summary> Do not audit attempts to send and receive sap_client packets. </summary> @@ -57850,7 +44811,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sap_client_packets" lineno="76368"> +<interface name="corenet_relabelto_sap_client_packets" lineno="58660"> <summary> Relabel packets to sap_client the packet type. </summary> @@ -57860,7 +44821,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sap_server_packets" lineno="76388"> +<interface name="corenet_send_sap_server_packets" lineno="58680"> <summary> Send sap_server packets. </summary> @@ -57871,7 +44832,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sap_server_packets" lineno="76407"> +<interface name="corenet_dontaudit_send_sap_server_packets" lineno="58699"> <summary> Do not audit attempts to send sap_server packets. </summary> @@ -57882,7 +44843,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sap_server_packets" lineno="76426"> +<interface name="corenet_receive_sap_server_packets" lineno="58718"> <summary> Receive sap_server packets. </summary> @@ -57893,7 +44854,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76445"> +<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="58737"> <summary> Do not audit attempts to receive sap_server packets. </summary> @@ -57904,7 +44865,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sap_server_packets" lineno="76464"> +<interface name="corenet_sendrecv_sap_server_packets" lineno="58756"> <summary> Send and receive sap_server packets. </summary> @@ -57915,7 +44876,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76480"> +<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="58772"> <summary> Do not audit attempts to send and receive sap_server packets. </summary> @@ -57926,7 +44887,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sap_server_packets" lineno="76495"> +<interface name="corenet_relabelto_sap_server_packets" lineno="58787"> <summary> Relabel packets to sap_server the packet type. </summary> @@ -57936,85 +44897,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76517"> -<summary> -Send and receive TCP traffic on the servistaitsm port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_servistaitsm_port" lineno="76532"> -<summary> -Send UDP traffic on the servistaitsm port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76547"> -<summary> -Do not audit attempts to send UDP traffic on the servistaitsm port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_servistaitsm_port" lineno="76562"> -<summary> -Receive UDP traffic on the servistaitsm port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76577"> -<summary> -Do not audit attempts to receive UDP traffic on the servistaitsm port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76592"> -<summary> -Send and receive UDP traffic on the servistaitsm port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76608"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the servistaitsm port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76623"> +<interface name="corenet_tcp_bind_servistaitsm_port" lineno="58809"> <summary> Bind TCP sockets to the servistaitsm port. </summary> @@ -58025,7 +44908,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_servistaitsm_port" lineno="76643"> +<interface name="corenet_udp_bind_servistaitsm_port" lineno="58829"> <summary> Bind UDP sockets to the servistaitsm port. </summary> @@ -58036,7 +44919,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76662"> +<interface name="corenet_tcp_connect_servistaitsm_port" lineno="58848"> <summary> Make a TCP connection to the servistaitsm port. </summary> @@ -58046,7 +44929,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_servistaitsm_client_packets" lineno="76682"> +<interface name="corenet_send_servistaitsm_client_packets" lineno="58868"> <summary> Send servistaitsm_client packets. </summary> @@ -58057,7 +44940,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76701"> +<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="58887"> <summary> Do not audit attempts to send servistaitsm_client packets. </summary> @@ -58068,7 +44951,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_servistaitsm_client_packets" lineno="76720"> +<interface name="corenet_receive_servistaitsm_client_packets" lineno="58906"> <summary> Receive servistaitsm_client packets. </summary> @@ -58079,7 +44962,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76739"> +<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="58925"> <summary> Do not audit attempts to receive servistaitsm_client packets. </summary> @@ -58090,7 +44973,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76758"> +<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="58944"> <summary> Send and receive servistaitsm_client packets. </summary> @@ -58101,7 +44984,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76774"> +<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="58960"> <summary> Do not audit attempts to send and receive servistaitsm_client packets. </summary> @@ -58112,7 +44995,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76789"> +<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="58975"> <summary> Relabel packets to servistaitsm_client the packet type. </summary> @@ -58122,7 +45005,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_servistaitsm_server_packets" lineno="76809"> +<interface name="corenet_send_servistaitsm_server_packets" lineno="58995"> <summary> Send servistaitsm_server packets. </summary> @@ -58133,7 +45016,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76828"> +<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="59014"> <summary> Do not audit attempts to send servistaitsm_server packets. </summary> @@ -58144,7 +45027,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_servistaitsm_server_packets" lineno="76847"> +<interface name="corenet_receive_servistaitsm_server_packets" lineno="59033"> <summary> Receive servistaitsm_server packets. </summary> @@ -58155,7 +45038,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76866"> +<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="59052"> <summary> Do not audit attempts to receive servistaitsm_server packets. </summary> @@ -58166,7 +45049,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76885"> +<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="59071"> <summary> Send and receive servistaitsm_server packets. </summary> @@ -58177,7 +45060,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76901"> +<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="59087"> <summary> Do not audit attempts to send and receive servistaitsm_server packets. </summary> @@ -58188,7 +45071,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76916"> +<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="59102"> <summary> Relabel packets to servistaitsm_server the packet type. </summary> @@ -58198,85 +45081,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76938"> -<summary> -Send and receive TCP traffic on the sieve port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_sieve_port" lineno="76953"> -<summary> -Send UDP traffic on the sieve port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76968"> -<summary> -Do not audit attempts to send UDP traffic on the sieve port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_sieve_port" lineno="76983"> -<summary> -Receive UDP traffic on the sieve port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76998"> -<summary> -Do not audit attempts to receive UDP traffic on the sieve port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_sieve_port" lineno="77013"> -<summary> -Send and receive UDP traffic on the sieve port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="77029"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the sieve port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_sieve_port" lineno="77044"> +<interface name="corenet_tcp_bind_sieve_port" lineno="59124"> <summary> Bind TCP sockets to the sieve port. </summary> @@ -58287,7 +45092,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_sieve_port" lineno="77064"> +<interface name="corenet_udp_bind_sieve_port" lineno="59144"> <summary> Bind UDP sockets to the sieve port. </summary> @@ -58298,7 +45103,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_sieve_port" lineno="77083"> +<interface name="corenet_tcp_connect_sieve_port" lineno="59163"> <summary> Make a TCP connection to the sieve port. </summary> @@ -58308,7 +45113,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sieve_client_packets" lineno="77103"> +<interface name="corenet_send_sieve_client_packets" lineno="59183"> <summary> Send sieve_client packets. </summary> @@ -58319,7 +45124,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="77122"> +<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="59202"> <summary> Do not audit attempts to send sieve_client packets. </summary> @@ -58330,7 +45135,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sieve_client_packets" lineno="77141"> +<interface name="corenet_receive_sieve_client_packets" lineno="59221"> <summary> Receive sieve_client packets. </summary> @@ -58341,7 +45146,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="77160"> +<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="59240"> <summary> Do not audit attempts to receive sieve_client packets. </summary> @@ -58352,7 +45157,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sieve_client_packets" lineno="77179"> +<interface name="corenet_sendrecv_sieve_client_packets" lineno="59259"> <summary> Send and receive sieve_client packets. </summary> @@ -58363,7 +45168,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="77195"> +<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="59275"> <summary> Do not audit attempts to send and receive sieve_client packets. </summary> @@ -58374,7 +45179,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sieve_client_packets" lineno="77210"> +<interface name="corenet_relabelto_sieve_client_packets" lineno="59290"> <summary> Relabel packets to sieve_client the packet type. </summary> @@ -58384,7 +45189,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sieve_server_packets" lineno="77230"> +<interface name="corenet_send_sieve_server_packets" lineno="59310"> <summary> Send sieve_server packets. </summary> @@ -58395,7 +45200,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="77249"> +<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="59329"> <summary> Do not audit attempts to send sieve_server packets. </summary> @@ -58406,7 +45211,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sieve_server_packets" lineno="77268"> +<interface name="corenet_receive_sieve_server_packets" lineno="59348"> <summary> Receive sieve_server packets. </summary> @@ -58417,7 +45222,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="77287"> +<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="59367"> <summary> Do not audit attempts to receive sieve_server packets. </summary> @@ -58428,7 +45233,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sieve_server_packets" lineno="77306"> +<interface name="corenet_sendrecv_sieve_server_packets" lineno="59386"> <summary> Send and receive sieve_server packets. </summary> @@ -58439,7 +45244,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="77322"> +<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="59402"> <summary> Do not audit attempts to send and receive sieve_server packets. </summary> @@ -58450,7 +45255,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sieve_server_packets" lineno="77337"> +<interface name="corenet_relabelto_sieve_server_packets" lineno="59417"> <summary> Relabel packets to sieve_server the packet type. </summary> @@ -58460,85 +45265,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_sip_port" lineno="77359"> -<summary> -Send and receive TCP traffic on the sip port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_sip_port" lineno="77374"> -<summary> -Send UDP traffic on the sip port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_sip_port" lineno="77389"> -<summary> -Do not audit attempts to send UDP traffic on the sip port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_sip_port" lineno="77404"> -<summary> -Receive UDP traffic on the sip port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="77419"> -<summary> -Do not audit attempts to receive UDP traffic on the sip port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_sip_port" lineno="77434"> -<summary> -Send and receive UDP traffic on the sip port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77450"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the sip port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_sip_port" lineno="77465"> +<interface name="corenet_tcp_bind_sip_port" lineno="59439"> <summary> Bind TCP sockets to the sip port. </summary> @@ -58549,7 +45276,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_sip_port" lineno="77485"> +<interface name="corenet_udp_bind_sip_port" lineno="59459"> <summary> Bind UDP sockets to the sip port. </summary> @@ -58560,7 +45287,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_sip_port" lineno="77504"> +<interface name="corenet_tcp_connect_sip_port" lineno="59478"> <summary> Make a TCP connection to the sip port. </summary> @@ -58570,7 +45297,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sip_client_packets" lineno="77524"> +<interface name="corenet_send_sip_client_packets" lineno="59498"> <summary> Send sip_client packets. </summary> @@ -58581,7 +45308,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77543"> +<interface name="corenet_dontaudit_send_sip_client_packets" lineno="59517"> <summary> Do not audit attempts to send sip_client packets. </summary> @@ -58592,7 +45319,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sip_client_packets" lineno="77562"> +<interface name="corenet_receive_sip_client_packets" lineno="59536"> <summary> Receive sip_client packets. </summary> @@ -58603,7 +45330,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77581"> +<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="59555"> <summary> Do not audit attempts to receive sip_client packets. </summary> @@ -58614,7 +45341,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sip_client_packets" lineno="77600"> +<interface name="corenet_sendrecv_sip_client_packets" lineno="59574"> <summary> Send and receive sip_client packets. </summary> @@ -58625,7 +45352,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77616"> +<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="59590"> <summary> Do not audit attempts to send and receive sip_client packets. </summary> @@ -58636,7 +45363,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sip_client_packets" lineno="77631"> +<interface name="corenet_relabelto_sip_client_packets" lineno="59605"> <summary> Relabel packets to sip_client the packet type. </summary> @@ -58646,7 +45373,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sip_server_packets" lineno="77651"> +<interface name="corenet_send_sip_server_packets" lineno="59625"> <summary> Send sip_server packets. </summary> @@ -58657,7 +45384,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77670"> +<interface name="corenet_dontaudit_send_sip_server_packets" lineno="59644"> <summary> Do not audit attempts to send sip_server packets. </summary> @@ -58668,7 +45395,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sip_server_packets" lineno="77689"> +<interface name="corenet_receive_sip_server_packets" lineno="59663"> <summary> Receive sip_server packets. </summary> @@ -58679,7 +45406,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77708"> +<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="59682"> <summary> Do not audit attempts to receive sip_server packets. </summary> @@ -58690,7 +45417,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sip_server_packets" lineno="77727"> +<interface name="corenet_sendrecv_sip_server_packets" lineno="59701"> <summary> Send and receive sip_server packets. </summary> @@ -58701,7 +45428,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77743"> +<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="59717"> <summary> Do not audit attempts to send and receive sip_server packets. </summary> @@ -58712,7 +45439,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sip_server_packets" lineno="77758"> +<interface name="corenet_relabelto_sip_server_packets" lineno="59732"> <summary> Relabel packets to sip_server the packet type. </summary> @@ -58722,85 +45449,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77780"> -<summary> -Send and receive TCP traffic on the sixxsconfig port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_sixxsconfig_port" lineno="77795"> -<summary> -Send UDP traffic on the sixxsconfig port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77810"> -<summary> -Do not audit attempts to send UDP traffic on the sixxsconfig port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77825"> -<summary> -Receive UDP traffic on the sixxsconfig port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77840"> -<summary> -Do not audit attempts to receive UDP traffic on the sixxsconfig port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77855"> -<summary> -Send and receive UDP traffic on the sixxsconfig port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77871"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the sixxsconfig port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77886"> +<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="59754"> <summary> Bind TCP sockets to the sixxsconfig port. </summary> @@ -58811,7 +45460,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77906"> +<interface name="corenet_udp_bind_sixxsconfig_port" lineno="59774"> <summary> Bind UDP sockets to the sixxsconfig port. </summary> @@ -58822,7 +45471,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77925"> +<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="59793"> <summary> Make a TCP connection to the sixxsconfig port. </summary> @@ -58832,7 +45481,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sixxsconfig_client_packets" lineno="77945"> +<interface name="corenet_send_sixxsconfig_client_packets" lineno="59813"> <summary> Send sixxsconfig_client packets. </summary> @@ -58843,7 +45492,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77964"> +<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="59832"> <summary> Do not audit attempts to send sixxsconfig_client packets. </summary> @@ -58854,7 +45503,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77983"> +<interface name="corenet_receive_sixxsconfig_client_packets" lineno="59851"> <summary> Receive sixxsconfig_client packets. </summary> @@ -58865,7 +45514,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="78002"> +<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="59870"> <summary> Do not audit attempts to receive sixxsconfig_client packets. </summary> @@ -58876,7 +45525,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="78021"> +<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="59889"> <summary> Send and receive sixxsconfig_client packets. </summary> @@ -58887,7 +45536,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="78037"> +<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="59905"> <summary> Do not audit attempts to send and receive sixxsconfig_client packets. </summary> @@ -58898,7 +45547,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="78052"> +<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="59920"> <summary> Relabel packets to sixxsconfig_client the packet type. </summary> @@ -58908,7 +45557,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sixxsconfig_server_packets" lineno="78072"> +<interface name="corenet_send_sixxsconfig_server_packets" lineno="59940"> <summary> Send sixxsconfig_server packets. </summary> @@ -58919,7 +45568,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="78091"> +<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="59959"> <summary> Do not audit attempts to send sixxsconfig_server packets. </summary> @@ -58930,7 +45579,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sixxsconfig_server_packets" lineno="78110"> +<interface name="corenet_receive_sixxsconfig_server_packets" lineno="59978"> <summary> Receive sixxsconfig_server packets. </summary> @@ -58941,7 +45590,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="78129"> +<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="59997"> <summary> Do not audit attempts to receive sixxsconfig_server packets. </summary> @@ -58952,7 +45601,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="78148"> +<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="60016"> <summary> Send and receive sixxsconfig_server packets. </summary> @@ -58963,7 +45612,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="78164"> +<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="60032"> <summary> Do not audit attempts to send and receive sixxsconfig_server packets. </summary> @@ -58974,7 +45623,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="78179"> +<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="60047"> <summary> Relabel packets to sixxsconfig_server the packet type. </summary> @@ -58984,85 +45633,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_smbd_port" lineno="78201"> -<summary> -Send and receive TCP traffic on the smbd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_smbd_port" lineno="78216"> -<summary> -Send UDP traffic on the smbd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="78231"> -<summary> -Do not audit attempts to send UDP traffic on the smbd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_smbd_port" lineno="78246"> -<summary> -Receive UDP traffic on the smbd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="78261"> -<summary> -Do not audit attempts to receive UDP traffic on the smbd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_smbd_port" lineno="78276"> -<summary> -Send and receive UDP traffic on the smbd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="78292"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the smbd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_smbd_port" lineno="78307"> +<interface name="corenet_tcp_bind_smbd_port" lineno="60069"> <summary> Bind TCP sockets to the smbd port. </summary> @@ -59073,7 +45644,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_smbd_port" lineno="78327"> +<interface name="corenet_udp_bind_smbd_port" lineno="60089"> <summary> Bind UDP sockets to the smbd port. </summary> @@ -59084,7 +45655,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_smbd_port" lineno="78346"> +<interface name="corenet_tcp_connect_smbd_port" lineno="60108"> <summary> Make a TCP connection to the smbd port. </summary> @@ -59094,7 +45665,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_smbd_client_packets" lineno="78366"> +<interface name="corenet_send_smbd_client_packets" lineno="60128"> <summary> Send smbd_client packets. </summary> @@ -59105,7 +45676,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="78385"> +<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="60147"> <summary> Do not audit attempts to send smbd_client packets. </summary> @@ -59116,7 +45687,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_smbd_client_packets" lineno="78404"> +<interface name="corenet_receive_smbd_client_packets" lineno="60166"> <summary> Receive smbd_client packets. </summary> @@ -59127,7 +45698,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="78423"> +<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="60185"> <summary> Do not audit attempts to receive smbd_client packets. </summary> @@ -59138,7 +45709,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_smbd_client_packets" lineno="78442"> +<interface name="corenet_sendrecv_smbd_client_packets" lineno="60204"> <summary> Send and receive smbd_client packets. </summary> @@ -59149,7 +45720,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78458"> +<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="60220"> <summary> Do not audit attempts to send and receive smbd_client packets. </summary> @@ -59160,7 +45731,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_smbd_client_packets" lineno="78473"> +<interface name="corenet_relabelto_smbd_client_packets" lineno="60235"> <summary> Relabel packets to smbd_client the packet type. </summary> @@ -59170,7 +45741,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_smbd_server_packets" lineno="78493"> +<interface name="corenet_send_smbd_server_packets" lineno="60255"> <summary> Send smbd_server packets. </summary> @@ -59181,7 +45752,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78512"> +<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="60274"> <summary> Do not audit attempts to send smbd_server packets. </summary> @@ -59192,7 +45763,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_smbd_server_packets" lineno="78531"> +<interface name="corenet_receive_smbd_server_packets" lineno="60293"> <summary> Receive smbd_server packets. </summary> @@ -59203,7 +45774,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78550"> +<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="60312"> <summary> Do not audit attempts to receive smbd_server packets. </summary> @@ -59214,7 +45785,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_smbd_server_packets" lineno="78569"> +<interface name="corenet_sendrecv_smbd_server_packets" lineno="60331"> <summary> Send and receive smbd_server packets. </summary> @@ -59225,7 +45796,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78585"> +<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="60347"> <summary> Do not audit attempts to send and receive smbd_server packets. </summary> @@ -59236,7 +45807,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_smbd_server_packets" lineno="78600"> +<interface name="corenet_relabelto_smbd_server_packets" lineno="60362"> <summary> Relabel packets to smbd_server the packet type. </summary> @@ -59246,85 +45817,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78622"> -<summary> -Send and receive TCP traffic on the smtp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_smtp_port" lineno="78637"> -<summary> -Send UDP traffic on the smtp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78652"> -<summary> -Do not audit attempts to send UDP traffic on the smtp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_smtp_port" lineno="78667"> -<summary> -Receive UDP traffic on the smtp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78682"> -<summary> -Do not audit attempts to receive UDP traffic on the smtp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_smtp_port" lineno="78697"> -<summary> -Send and receive UDP traffic on the smtp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78713"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the smtp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_smtp_port" lineno="78728"> +<interface name="corenet_tcp_bind_smtp_port" lineno="60384"> <summary> Bind TCP sockets to the smtp port. </summary> @@ -59335,7 +45828,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_smtp_port" lineno="78748"> +<interface name="corenet_udp_bind_smtp_port" lineno="60404"> <summary> Bind UDP sockets to the smtp port. </summary> @@ -59346,7 +45839,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_smtp_port" lineno="78767"> +<interface name="corenet_tcp_connect_smtp_port" lineno="60423"> <summary> Make a TCP connection to the smtp port. </summary> @@ -59356,7 +45849,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_smtp_client_packets" lineno="78787"> +<interface name="corenet_send_smtp_client_packets" lineno="60443"> <summary> Send smtp_client packets. </summary> @@ -59367,7 +45860,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78806"> +<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="60462"> <summary> Do not audit attempts to send smtp_client packets. </summary> @@ -59378,7 +45871,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_smtp_client_packets" lineno="78825"> +<interface name="corenet_receive_smtp_client_packets" lineno="60481"> <summary> Receive smtp_client packets. </summary> @@ -59389,7 +45882,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78844"> +<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="60500"> <summary> Do not audit attempts to receive smtp_client packets. </summary> @@ -59400,7 +45893,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_smtp_client_packets" lineno="78863"> +<interface name="corenet_sendrecv_smtp_client_packets" lineno="60519"> <summary> Send and receive smtp_client packets. </summary> @@ -59411,7 +45904,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78879"> +<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="60535"> <summary> Do not audit attempts to send and receive smtp_client packets. </summary> @@ -59422,7 +45915,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_smtp_client_packets" lineno="78894"> +<interface name="corenet_relabelto_smtp_client_packets" lineno="60550"> <summary> Relabel packets to smtp_client the packet type. </summary> @@ -59432,7 +45925,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_smtp_server_packets" lineno="78914"> +<interface name="corenet_send_smtp_server_packets" lineno="60570"> <summary> Send smtp_server packets. </summary> @@ -59443,7 +45936,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78933"> +<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="60589"> <summary> Do not audit attempts to send smtp_server packets. </summary> @@ -59454,7 +45947,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_smtp_server_packets" lineno="78952"> +<interface name="corenet_receive_smtp_server_packets" lineno="60608"> <summary> Receive smtp_server packets. </summary> @@ -59465,7 +45958,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78971"> +<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="60627"> <summary> Do not audit attempts to receive smtp_server packets. </summary> @@ -59476,7 +45969,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_smtp_server_packets" lineno="78990"> +<interface name="corenet_sendrecv_smtp_server_packets" lineno="60646"> <summary> Send and receive smtp_server packets. </summary> @@ -59487,7 +45980,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="79006"> +<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="60662"> <summary> Do not audit attempts to send and receive smtp_server packets. </summary> @@ -59498,7 +45991,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_smtp_server_packets" lineno="79021"> +<interface name="corenet_relabelto_smtp_server_packets" lineno="60677"> <summary> Relabel packets to smtp_server the packet type. </summary> @@ -59508,85 +46001,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_snmp_port" lineno="79043"> -<summary> -Send and receive TCP traffic on the snmp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_snmp_port" lineno="79058"> -<summary> -Send UDP traffic on the snmp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="79073"> -<summary> -Do not audit attempts to send UDP traffic on the snmp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_snmp_port" lineno="79088"> -<summary> -Receive UDP traffic on the snmp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="79103"> -<summary> -Do not audit attempts to receive UDP traffic on the snmp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_snmp_port" lineno="79118"> -<summary> -Send and receive UDP traffic on the snmp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="79134"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the snmp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_snmp_port" lineno="79149"> +<interface name="corenet_tcp_bind_snmp_port" lineno="60699"> <summary> Bind TCP sockets to the snmp port. </summary> @@ -59597,7 +46012,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_snmp_port" lineno="79169"> +<interface name="corenet_udp_bind_snmp_port" lineno="60719"> <summary> Bind UDP sockets to the snmp port. </summary> @@ -59608,7 +46023,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_snmp_port" lineno="79188"> +<interface name="corenet_tcp_connect_snmp_port" lineno="60738"> <summary> Make a TCP connection to the snmp port. </summary> @@ -59618,7 +46033,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_snmp_client_packets" lineno="79208"> +<interface name="corenet_send_snmp_client_packets" lineno="60758"> <summary> Send snmp_client packets. </summary> @@ -59629,7 +46044,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="79227"> +<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="60777"> <summary> Do not audit attempts to send snmp_client packets. </summary> @@ -59640,7 +46055,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_snmp_client_packets" lineno="79246"> +<interface name="corenet_receive_snmp_client_packets" lineno="60796"> <summary> Receive snmp_client packets. </summary> @@ -59651,7 +46066,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="79265"> +<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="60815"> <summary> Do not audit attempts to receive snmp_client packets. </summary> @@ -59662,7 +46077,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_snmp_client_packets" lineno="79284"> +<interface name="corenet_sendrecv_snmp_client_packets" lineno="60834"> <summary> Send and receive snmp_client packets. </summary> @@ -59673,7 +46088,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="79300"> +<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="60850"> <summary> Do not audit attempts to send and receive snmp_client packets. </summary> @@ -59684,7 +46099,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_snmp_client_packets" lineno="79315"> +<interface name="corenet_relabelto_snmp_client_packets" lineno="60865"> <summary> Relabel packets to snmp_client the packet type. </summary> @@ -59694,7 +46109,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_snmp_server_packets" lineno="79335"> +<interface name="corenet_send_snmp_server_packets" lineno="60885"> <summary> Send snmp_server packets. </summary> @@ -59705,7 +46120,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="79354"> +<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="60904"> <summary> Do not audit attempts to send snmp_server packets. </summary> @@ -59716,7 +46131,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_snmp_server_packets" lineno="79373"> +<interface name="corenet_receive_snmp_server_packets" lineno="60923"> <summary> Receive snmp_server packets. </summary> @@ -59727,7 +46142,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="79392"> +<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="60942"> <summary> Do not audit attempts to receive snmp_server packets. </summary> @@ -59738,7 +46153,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_snmp_server_packets" lineno="79411"> +<interface name="corenet_sendrecv_snmp_server_packets" lineno="60961"> <summary> Send and receive snmp_server packets. </summary> @@ -59749,7 +46164,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="79427"> +<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="60977"> <summary> Do not audit attempts to send and receive snmp_server packets. </summary> @@ -59760,7 +46175,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_snmp_server_packets" lineno="79442"> +<interface name="corenet_relabelto_snmp_server_packets" lineno="60992"> <summary> Relabel packets to snmp_server the packet type. </summary> @@ -59770,85 +46185,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_socks_port" lineno="79464"> -<summary> -Send and receive TCP traffic on the socks port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_socks_port" lineno="79479"> -<summary> -Send UDP traffic on the socks port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79494"> -<summary> -Do not audit attempts to send UDP traffic on the socks port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_socks_port" lineno="79509"> -<summary> -Receive UDP traffic on the socks port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79524"> -<summary> -Do not audit attempts to receive UDP traffic on the socks port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_socks_port" lineno="79539"> -<summary> -Send and receive UDP traffic on the socks port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79555"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the socks port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_socks_port" lineno="79570"> +<interface name="corenet_tcp_bind_socks_port" lineno="61014"> <summary> Bind TCP sockets to the socks port. </summary> @@ -59859,7 +46196,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_socks_port" lineno="79590"> +<interface name="corenet_udp_bind_socks_port" lineno="61034"> <summary> Bind UDP sockets to the socks port. </summary> @@ -59870,7 +46207,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_socks_port" lineno="79609"> +<interface name="corenet_tcp_connect_socks_port" lineno="61053"> <summary> Make a TCP connection to the socks port. </summary> @@ -59880,7 +46217,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_socks_client_packets" lineno="79629"> +<interface name="corenet_send_socks_client_packets" lineno="61073"> <summary> Send socks_client packets. </summary> @@ -59891,7 +46228,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79648"> +<interface name="corenet_dontaudit_send_socks_client_packets" lineno="61092"> <summary> Do not audit attempts to send socks_client packets. </summary> @@ -59902,7 +46239,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_socks_client_packets" lineno="79667"> +<interface name="corenet_receive_socks_client_packets" lineno="61111"> <summary> Receive socks_client packets. </summary> @@ -59913,7 +46250,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79686"> +<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="61130"> <summary> Do not audit attempts to receive socks_client packets. </summary> @@ -59924,7 +46261,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_socks_client_packets" lineno="79705"> +<interface name="corenet_sendrecv_socks_client_packets" lineno="61149"> <summary> Send and receive socks_client packets. </summary> @@ -59935,7 +46272,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79721"> +<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="61165"> <summary> Do not audit attempts to send and receive socks_client packets. </summary> @@ -59946,7 +46283,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_socks_client_packets" lineno="79736"> +<interface name="corenet_relabelto_socks_client_packets" lineno="61180"> <summary> Relabel packets to socks_client the packet type. </summary> @@ -59956,7 +46293,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_socks_server_packets" lineno="79756"> +<interface name="corenet_send_socks_server_packets" lineno="61200"> <summary> Send socks_server packets. </summary> @@ -59967,7 +46304,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79775"> +<interface name="corenet_dontaudit_send_socks_server_packets" lineno="61219"> <summary> Do not audit attempts to send socks_server packets. </summary> @@ -59978,7 +46315,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_socks_server_packets" lineno="79794"> +<interface name="corenet_receive_socks_server_packets" lineno="61238"> <summary> Receive socks_server packets. </summary> @@ -59989,7 +46326,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79813"> +<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="61257"> <summary> Do not audit attempts to receive socks_server packets. </summary> @@ -60000,7 +46337,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_socks_server_packets" lineno="79832"> +<interface name="corenet_sendrecv_socks_server_packets" lineno="61276"> <summary> Send and receive socks_server packets. </summary> @@ -60011,7 +46348,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79848"> +<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="61292"> <summary> Do not audit attempts to send and receive socks_server packets. </summary> @@ -60022,7 +46359,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_socks_server_packets" lineno="79863"> +<interface name="corenet_relabelto_socks_server_packets" lineno="61307"> <summary> Relabel packets to socks_server the packet type. </summary> @@ -60032,85 +46369,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79885"> -<summary> -Send and receive TCP traffic on the soundd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_soundd_port" lineno="79900"> -<summary> -Send UDP traffic on the soundd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79915"> -<summary> -Do not audit attempts to send UDP traffic on the soundd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_soundd_port" lineno="79930"> -<summary> -Receive UDP traffic on the soundd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79945"> -<summary> -Do not audit attempts to receive UDP traffic on the soundd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_soundd_port" lineno="79960"> -<summary> -Send and receive UDP traffic on the soundd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79976"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the soundd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_soundd_port" lineno="79991"> +<interface name="corenet_tcp_bind_soundd_port" lineno="61329"> <summary> Bind TCP sockets to the soundd port. </summary> @@ -60121,7 +46380,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_soundd_port" lineno="80011"> +<interface name="corenet_udp_bind_soundd_port" lineno="61349"> <summary> Bind UDP sockets to the soundd port. </summary> @@ -60132,7 +46391,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_soundd_port" lineno="80030"> +<interface name="corenet_tcp_connect_soundd_port" lineno="61368"> <summary> Make a TCP connection to the soundd port. </summary> @@ -60142,7 +46401,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_soundd_client_packets" lineno="80050"> +<interface name="corenet_send_soundd_client_packets" lineno="61388"> <summary> Send soundd_client packets. </summary> @@ -60153,7 +46412,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="80069"> +<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="61407"> <summary> Do not audit attempts to send soundd_client packets. </summary> @@ -60164,7 +46423,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_soundd_client_packets" lineno="80088"> +<interface name="corenet_receive_soundd_client_packets" lineno="61426"> <summary> Receive soundd_client packets. </summary> @@ -60175,7 +46434,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="80107"> +<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="61445"> <summary> Do not audit attempts to receive soundd_client packets. </summary> @@ -60186,7 +46445,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_soundd_client_packets" lineno="80126"> +<interface name="corenet_sendrecv_soundd_client_packets" lineno="61464"> <summary> Send and receive soundd_client packets. </summary> @@ -60197,7 +46456,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="80142"> +<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="61480"> <summary> Do not audit attempts to send and receive soundd_client packets. </summary> @@ -60208,7 +46467,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_soundd_client_packets" lineno="80157"> +<interface name="corenet_relabelto_soundd_client_packets" lineno="61495"> <summary> Relabel packets to soundd_client the packet type. </summary> @@ -60218,7 +46477,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_soundd_server_packets" lineno="80177"> +<interface name="corenet_send_soundd_server_packets" lineno="61515"> <summary> Send soundd_server packets. </summary> @@ -60229,7 +46488,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="80196"> +<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="61534"> <summary> Do not audit attempts to send soundd_server packets. </summary> @@ -60240,7 +46499,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_soundd_server_packets" lineno="80215"> +<interface name="corenet_receive_soundd_server_packets" lineno="61553"> <summary> Receive soundd_server packets. </summary> @@ -60251,7 +46510,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="80234"> +<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="61572"> <summary> Do not audit attempts to receive soundd_server packets. </summary> @@ -60262,7 +46521,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_soundd_server_packets" lineno="80253"> +<interface name="corenet_sendrecv_soundd_server_packets" lineno="61591"> <summary> Send and receive soundd_server packets. </summary> @@ -60273,7 +46532,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="80269"> +<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="61607"> <summary> Do not audit attempts to send and receive soundd_server packets. </summary> @@ -60284,7 +46543,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_soundd_server_packets" lineno="80284"> +<interface name="corenet_relabelto_soundd_server_packets" lineno="61622"> <summary> Relabel packets to soundd_server the packet type. </summary> @@ -60294,85 +46553,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_spamd_port" lineno="80306"> -<summary> -Send and receive TCP traffic on the spamd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_spamd_port" lineno="80321"> -<summary> -Send UDP traffic on the spamd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="80336"> -<summary> -Do not audit attempts to send UDP traffic on the spamd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_spamd_port" lineno="80351"> -<summary> -Receive UDP traffic on the spamd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="80366"> -<summary> -Do not audit attempts to receive UDP traffic on the spamd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_spamd_port" lineno="80381"> -<summary> -Send and receive UDP traffic on the spamd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="80397"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the spamd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_spamd_port" lineno="80412"> +<interface name="corenet_tcp_bind_spamd_port" lineno="61644"> <summary> Bind TCP sockets to the spamd port. </summary> @@ -60383,7 +46564,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_spamd_port" lineno="80432"> +<interface name="corenet_udp_bind_spamd_port" lineno="61664"> <summary> Bind UDP sockets to the spamd port. </summary> @@ -60394,7 +46575,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_spamd_port" lineno="80451"> +<interface name="corenet_tcp_connect_spamd_port" lineno="61683"> <summary> Make a TCP connection to the spamd port. </summary> @@ -60404,7 +46585,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_spamd_client_packets" lineno="80471"> +<interface name="corenet_send_spamd_client_packets" lineno="61703"> <summary> Send spamd_client packets. </summary> @@ -60415,7 +46596,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80490"> +<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="61722"> <summary> Do not audit attempts to send spamd_client packets. </summary> @@ -60426,7 +46607,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_spamd_client_packets" lineno="80509"> +<interface name="corenet_receive_spamd_client_packets" lineno="61741"> <summary> Receive spamd_client packets. </summary> @@ -60437,7 +46618,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80528"> +<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="61760"> <summary> Do not audit attempts to receive spamd_client packets. </summary> @@ -60448,7 +46629,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_spamd_client_packets" lineno="80547"> +<interface name="corenet_sendrecv_spamd_client_packets" lineno="61779"> <summary> Send and receive spamd_client packets. </summary> @@ -60459,7 +46640,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80563"> +<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="61795"> <summary> Do not audit attempts to send and receive spamd_client packets. </summary> @@ -60470,7 +46651,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_spamd_client_packets" lineno="80578"> +<interface name="corenet_relabelto_spamd_client_packets" lineno="61810"> <summary> Relabel packets to spamd_client the packet type. </summary> @@ -60480,7 +46661,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_spamd_server_packets" lineno="80598"> +<interface name="corenet_send_spamd_server_packets" lineno="61830"> <summary> Send spamd_server packets. </summary> @@ -60491,7 +46672,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80617"> +<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="61849"> <summary> Do not audit attempts to send spamd_server packets. </summary> @@ -60502,7 +46683,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_spamd_server_packets" lineno="80636"> +<interface name="corenet_receive_spamd_server_packets" lineno="61868"> <summary> Receive spamd_server packets. </summary> @@ -60513,7 +46694,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80655"> +<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="61887"> <summary> Do not audit attempts to receive spamd_server packets. </summary> @@ -60524,7 +46705,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_spamd_server_packets" lineno="80674"> +<interface name="corenet_sendrecv_spamd_server_packets" lineno="61906"> <summary> Send and receive spamd_server packets. </summary> @@ -60535,7 +46716,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80690"> +<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="61922"> <summary> Do not audit attempts to send and receive spamd_server packets. </summary> @@ -60546,7 +46727,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_spamd_server_packets" lineno="80705"> +<interface name="corenet_relabelto_spamd_server_packets" lineno="61937"> <summary> Relabel packets to spamd_server the packet type. </summary> @@ -60556,85 +46737,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_speech_port" lineno="80727"> -<summary> -Send and receive TCP traffic on the speech port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_speech_port" lineno="80742"> -<summary> -Send UDP traffic on the speech port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80757"> -<summary> -Do not audit attempts to send UDP traffic on the speech port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_speech_port" lineno="80772"> -<summary> -Receive UDP traffic on the speech port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80787"> -<summary> -Do not audit attempts to receive UDP traffic on the speech port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_speech_port" lineno="80802"> -<summary> -Send and receive UDP traffic on the speech port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80818"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the speech port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_speech_port" lineno="80833"> +<interface name="corenet_tcp_bind_speech_port" lineno="61959"> <summary> Bind TCP sockets to the speech port. </summary> @@ -60645,7 +46748,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_speech_port" lineno="80853"> +<interface name="corenet_udp_bind_speech_port" lineno="61979"> <summary> Bind UDP sockets to the speech port. </summary> @@ -60656,7 +46759,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_speech_port" lineno="80872"> +<interface name="corenet_tcp_connect_speech_port" lineno="61998"> <summary> Make a TCP connection to the speech port. </summary> @@ -60666,7 +46769,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_speech_client_packets" lineno="80892"> +<interface name="corenet_send_speech_client_packets" lineno="62018"> <summary> Send speech_client packets. </summary> @@ -60677,7 +46780,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80911"> +<interface name="corenet_dontaudit_send_speech_client_packets" lineno="62037"> <summary> Do not audit attempts to send speech_client packets. </summary> @@ -60688,7 +46791,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_speech_client_packets" lineno="80930"> +<interface name="corenet_receive_speech_client_packets" lineno="62056"> <summary> Receive speech_client packets. </summary> @@ -60699,7 +46802,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80949"> +<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="62075"> <summary> Do not audit attempts to receive speech_client packets. </summary> @@ -60710,7 +46813,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_speech_client_packets" lineno="80968"> +<interface name="corenet_sendrecv_speech_client_packets" lineno="62094"> <summary> Send and receive speech_client packets. </summary> @@ -60721,7 +46824,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80984"> +<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="62110"> <summary> Do not audit attempts to send and receive speech_client packets. </summary> @@ -60732,7 +46835,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_speech_client_packets" lineno="80999"> +<interface name="corenet_relabelto_speech_client_packets" lineno="62125"> <summary> Relabel packets to speech_client the packet type. </summary> @@ -60742,7 +46845,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_speech_server_packets" lineno="81019"> +<interface name="corenet_send_speech_server_packets" lineno="62145"> <summary> Send speech_server packets. </summary> @@ -60753,7 +46856,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_speech_server_packets" lineno="81038"> +<interface name="corenet_dontaudit_send_speech_server_packets" lineno="62164"> <summary> Do not audit attempts to send speech_server packets. </summary> @@ -60764,7 +46867,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_speech_server_packets" lineno="81057"> +<interface name="corenet_receive_speech_server_packets" lineno="62183"> <summary> Receive speech_server packets. </summary> @@ -60775,7 +46878,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="81076"> +<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="62202"> <summary> Do not audit attempts to receive speech_server packets. </summary> @@ -60786,7 +46889,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_speech_server_packets" lineno="81095"> +<interface name="corenet_sendrecv_speech_server_packets" lineno="62221"> <summary> Send and receive speech_server packets. </summary> @@ -60797,7 +46900,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="81111"> +<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="62237"> <summary> Do not audit attempts to send and receive speech_server packets. </summary> @@ -60808,7 +46911,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_speech_server_packets" lineno="81126"> +<interface name="corenet_relabelto_speech_server_packets" lineno="62252"> <summary> Relabel packets to speech_server the packet type. </summary> @@ -60818,85 +46921,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_squid_port" lineno="81148"> -<summary> -Send and receive TCP traffic on the squid port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_squid_port" lineno="81163"> -<summary> -Send UDP traffic on the squid port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_squid_port" lineno="81178"> -<summary> -Do not audit attempts to send UDP traffic on the squid port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_squid_port" lineno="81193"> -<summary> -Receive UDP traffic on the squid port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="81208"> -<summary> -Do not audit attempts to receive UDP traffic on the squid port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_squid_port" lineno="81223"> -<summary> -Send and receive UDP traffic on the squid port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="81239"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the squid port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_squid_port" lineno="81254"> +<interface name="corenet_tcp_bind_squid_port" lineno="62274"> <summary> Bind TCP sockets to the squid port. </summary> @@ -60907,7 +46932,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_squid_port" lineno="81274"> +<interface name="corenet_udp_bind_squid_port" lineno="62294"> <summary> Bind UDP sockets to the squid port. </summary> @@ -60918,7 +46943,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_squid_port" lineno="81293"> +<interface name="corenet_tcp_connect_squid_port" lineno="62313"> <summary> Make a TCP connection to the squid port. </summary> @@ -60928,7 +46953,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_squid_client_packets" lineno="81313"> +<interface name="corenet_send_squid_client_packets" lineno="62333"> <summary> Send squid_client packets. </summary> @@ -60939,7 +46964,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_squid_client_packets" lineno="81332"> +<interface name="corenet_dontaudit_send_squid_client_packets" lineno="62352"> <summary> Do not audit attempts to send squid_client packets. </summary> @@ -60950,7 +46975,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_squid_client_packets" lineno="81351"> +<interface name="corenet_receive_squid_client_packets" lineno="62371"> <summary> Receive squid_client packets. </summary> @@ -60961,7 +46986,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="81370"> +<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="62390"> <summary> Do not audit attempts to receive squid_client packets. </summary> @@ -60972,7 +46997,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_squid_client_packets" lineno="81389"> +<interface name="corenet_sendrecv_squid_client_packets" lineno="62409"> <summary> Send and receive squid_client packets. </summary> @@ -60983,7 +47008,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="81405"> +<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="62425"> <summary> Do not audit attempts to send and receive squid_client packets. </summary> @@ -60994,7 +47019,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_squid_client_packets" lineno="81420"> +<interface name="corenet_relabelto_squid_client_packets" lineno="62440"> <summary> Relabel packets to squid_client the packet type. </summary> @@ -61004,7 +47029,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_squid_server_packets" lineno="81440"> +<interface name="corenet_send_squid_server_packets" lineno="62460"> <summary> Send squid_server packets. </summary> @@ -61015,7 +47040,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81459"> +<interface name="corenet_dontaudit_send_squid_server_packets" lineno="62479"> <summary> Do not audit attempts to send squid_server packets. </summary> @@ -61026,7 +47051,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_squid_server_packets" lineno="81478"> +<interface name="corenet_receive_squid_server_packets" lineno="62498"> <summary> Receive squid_server packets. </summary> @@ -61037,7 +47062,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81497"> +<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="62517"> <summary> Do not audit attempts to receive squid_server packets. </summary> @@ -61048,7 +47073,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_squid_server_packets" lineno="81516"> +<interface name="corenet_sendrecv_squid_server_packets" lineno="62536"> <summary> Send and receive squid_server packets. </summary> @@ -61059,7 +47084,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81532"> +<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="62552"> <summary> Do not audit attempts to send and receive squid_server packets. </summary> @@ -61070,7 +47095,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_squid_server_packets" lineno="81547"> +<interface name="corenet_relabelto_squid_server_packets" lineno="62567"> <summary> Relabel packets to squid_server the packet type. </summary> @@ -61080,85 +47105,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81569"> -<summary> -Send and receive TCP traffic on the ssdp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ssdp_port" lineno="81584"> -<summary> -Send UDP traffic on the ssdp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81599"> -<summary> -Do not audit attempts to send UDP traffic on the ssdp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ssdp_port" lineno="81614"> -<summary> -Receive UDP traffic on the ssdp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81629"> -<summary> -Do not audit attempts to receive UDP traffic on the ssdp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81644"> -<summary> -Send and receive UDP traffic on the ssdp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81660"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ssdp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ssdp_port" lineno="81675"> +<interface name="corenet_tcp_bind_ssdp_port" lineno="62589"> <summary> Bind TCP sockets to the ssdp port. </summary> @@ -61169,7 +47116,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ssdp_port" lineno="81695"> +<interface name="corenet_udp_bind_ssdp_port" lineno="62609"> <summary> Bind UDP sockets to the ssdp port. </summary> @@ -61180,7 +47127,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ssdp_port" lineno="81714"> +<interface name="corenet_tcp_connect_ssdp_port" lineno="62628"> <summary> Make a TCP connection to the ssdp port. </summary> @@ -61190,7 +47137,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ssdp_client_packets" lineno="81734"> +<interface name="corenet_send_ssdp_client_packets" lineno="62648"> <summary> Send ssdp_client packets. </summary> @@ -61201,7 +47148,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81753"> +<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="62667"> <summary> Do not audit attempts to send ssdp_client packets. </summary> @@ -61212,7 +47159,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ssdp_client_packets" lineno="81772"> +<interface name="corenet_receive_ssdp_client_packets" lineno="62686"> <summary> Receive ssdp_client packets. </summary> @@ -61223,7 +47170,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81791"> +<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="62705"> <summary> Do not audit attempts to receive ssdp_client packets. </summary> @@ -61234,7 +47181,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81810"> +<interface name="corenet_sendrecv_ssdp_client_packets" lineno="62724"> <summary> Send and receive ssdp_client packets. </summary> @@ -61245,7 +47192,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81826"> +<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="62740"> <summary> Do not audit attempts to send and receive ssdp_client packets. </summary> @@ -61256,7 +47203,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ssdp_client_packets" lineno="81841"> +<interface name="corenet_relabelto_ssdp_client_packets" lineno="62755"> <summary> Relabel packets to ssdp_client the packet type. </summary> @@ -61266,7 +47213,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ssdp_server_packets" lineno="81861"> +<interface name="corenet_send_ssdp_server_packets" lineno="62775"> <summary> Send ssdp_server packets. </summary> @@ -61277,7 +47224,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81880"> +<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="62794"> <summary> Do not audit attempts to send ssdp_server packets. </summary> @@ -61288,7 +47235,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ssdp_server_packets" lineno="81899"> +<interface name="corenet_receive_ssdp_server_packets" lineno="62813"> <summary> Receive ssdp_server packets. </summary> @@ -61299,7 +47246,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81918"> +<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="62832"> <summary> Do not audit attempts to receive ssdp_server packets. </summary> @@ -61310,7 +47257,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81937"> +<interface name="corenet_sendrecv_ssdp_server_packets" lineno="62851"> <summary> Send and receive ssdp_server packets. </summary> @@ -61321,7 +47268,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81953"> +<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="62867"> <summary> Do not audit attempts to send and receive ssdp_server packets. </summary> @@ -61332,7 +47279,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ssdp_server_packets" lineno="81968"> +<interface name="corenet_relabelto_ssdp_server_packets" lineno="62882"> <summary> Relabel packets to ssdp_server the packet type. </summary> @@ -61342,85 +47289,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81990"> -<summary> -Send and receive TCP traffic on the ssh port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ssh_port" lineno="82005"> -<summary> -Send UDP traffic on the ssh port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="82020"> -<summary> -Do not audit attempts to send UDP traffic on the ssh port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ssh_port" lineno="82035"> -<summary> -Receive UDP traffic on the ssh port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="82050"> -<summary> -Do not audit attempts to receive UDP traffic on the ssh port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ssh_port" lineno="82065"> -<summary> -Send and receive UDP traffic on the ssh port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="82081"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ssh port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ssh_port" lineno="82096"> +<interface name="corenet_tcp_bind_ssh_port" lineno="62904"> <summary> Bind TCP sockets to the ssh port. </summary> @@ -61431,7 +47300,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ssh_port" lineno="82116"> +<interface name="corenet_udp_bind_ssh_port" lineno="62924"> <summary> Bind UDP sockets to the ssh port. </summary> @@ -61442,7 +47311,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ssh_port" lineno="82135"> +<interface name="corenet_tcp_connect_ssh_port" lineno="62943"> <summary> Make a TCP connection to the ssh port. </summary> @@ -61452,7 +47321,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ssh_client_packets" lineno="82155"> +<interface name="corenet_send_ssh_client_packets" lineno="62963"> <summary> Send ssh_client packets. </summary> @@ -61463,7 +47332,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="82174"> +<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="62982"> <summary> Do not audit attempts to send ssh_client packets. </summary> @@ -61474,7 +47343,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ssh_client_packets" lineno="82193"> +<interface name="corenet_receive_ssh_client_packets" lineno="63001"> <summary> Receive ssh_client packets. </summary> @@ -61485,7 +47354,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="82212"> +<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="63020"> <summary> Do not audit attempts to receive ssh_client packets. </summary> @@ -61496,7 +47365,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ssh_client_packets" lineno="82231"> +<interface name="corenet_sendrecv_ssh_client_packets" lineno="63039"> <summary> Send and receive ssh_client packets. </summary> @@ -61507,7 +47376,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="82247"> +<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="63055"> <summary> Do not audit attempts to send and receive ssh_client packets. </summary> @@ -61518,7 +47387,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ssh_client_packets" lineno="82262"> +<interface name="corenet_relabelto_ssh_client_packets" lineno="63070"> <summary> Relabel packets to ssh_client the packet type. </summary> @@ -61528,7 +47397,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ssh_server_packets" lineno="82282"> +<interface name="corenet_send_ssh_server_packets" lineno="63090"> <summary> Send ssh_server packets. </summary> @@ -61539,7 +47408,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="82301"> +<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="63109"> <summary> Do not audit attempts to send ssh_server packets. </summary> @@ -61550,7 +47419,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ssh_server_packets" lineno="82320"> +<interface name="corenet_receive_ssh_server_packets" lineno="63128"> <summary> Receive ssh_server packets. </summary> @@ -61561,7 +47430,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="82339"> +<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="63147"> <summary> Do not audit attempts to receive ssh_server packets. </summary> @@ -61572,7 +47441,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ssh_server_packets" lineno="82358"> +<interface name="corenet_sendrecv_ssh_server_packets" lineno="63166"> <summary> Send and receive ssh_server packets. </summary> @@ -61583,7 +47452,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="82374"> +<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="63182"> <summary> Do not audit attempts to send and receive ssh_server packets. </summary> @@ -61594,7 +47463,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ssh_server_packets" lineno="82389"> +<interface name="corenet_relabelto_ssh_server_packets" lineno="63197"> <summary> Relabel packets to ssh_server the packet type. </summary> @@ -61604,85 +47473,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="82411"> -<summary> -Send and receive TCP traffic on the stunnel port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_stunnel_port" lineno="82426"> -<summary> -Send UDP traffic on the stunnel port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82441"> -<summary> -Do not audit attempts to send UDP traffic on the stunnel port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_stunnel_port" lineno="82456"> -<summary> -Receive UDP traffic on the stunnel port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82471"> -<summary> -Do not audit attempts to receive UDP traffic on the stunnel port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82486"> -<summary> -Send and receive UDP traffic on the stunnel port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82502"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the stunnel port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_stunnel_port" lineno="82517"> +<interface name="corenet_tcp_bind_stunnel_port" lineno="63219"> <summary> Bind TCP sockets to the stunnel port. </summary> @@ -61693,7 +47484,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_stunnel_port" lineno="82537"> +<interface name="corenet_udp_bind_stunnel_port" lineno="63239"> <summary> Bind UDP sockets to the stunnel port. </summary> @@ -61704,7 +47495,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_stunnel_port" lineno="82556"> +<interface name="corenet_tcp_connect_stunnel_port" lineno="63258"> <summary> Make a TCP connection to the stunnel port. </summary> @@ -61714,7 +47505,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_stunnel_client_packets" lineno="82576"> +<interface name="corenet_send_stunnel_client_packets" lineno="63278"> <summary> Send stunnel_client packets. </summary> @@ -61725,7 +47516,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82595"> +<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="63297"> <summary> Do not audit attempts to send stunnel_client packets. </summary> @@ -61736,7 +47527,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_stunnel_client_packets" lineno="82614"> +<interface name="corenet_receive_stunnel_client_packets" lineno="63316"> <summary> Receive stunnel_client packets. </summary> @@ -61747,7 +47538,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82633"> +<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="63335"> <summary> Do not audit attempts to receive stunnel_client packets. </summary> @@ -61758,7 +47549,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82652"> +<interface name="corenet_sendrecv_stunnel_client_packets" lineno="63354"> <summary> Send and receive stunnel_client packets. </summary> @@ -61769,7 +47560,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82668"> +<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="63370"> <summary> Do not audit attempts to send and receive stunnel_client packets. </summary> @@ -61780,7 +47571,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_stunnel_client_packets" lineno="82683"> +<interface name="corenet_relabelto_stunnel_client_packets" lineno="63385"> <summary> Relabel packets to stunnel_client the packet type. </summary> @@ -61790,7 +47581,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_stunnel_server_packets" lineno="82703"> +<interface name="corenet_send_stunnel_server_packets" lineno="63405"> <summary> Send stunnel_server packets. </summary> @@ -61801,7 +47592,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82722"> +<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="63424"> <summary> Do not audit attempts to send stunnel_server packets. </summary> @@ -61812,7 +47603,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_stunnel_server_packets" lineno="82741"> +<interface name="corenet_receive_stunnel_server_packets" lineno="63443"> <summary> Receive stunnel_server packets. </summary> @@ -61823,7 +47614,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82760"> +<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="63462"> <summary> Do not audit attempts to receive stunnel_server packets. </summary> @@ -61834,7 +47625,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82779"> +<interface name="corenet_sendrecv_stunnel_server_packets" lineno="63481"> <summary> Send and receive stunnel_server packets. </summary> @@ -61845,7 +47636,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82795"> +<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="63497"> <summary> Do not audit attempts to send and receive stunnel_server packets. </summary> @@ -61856,7 +47647,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_stunnel_server_packets" lineno="82810"> +<interface name="corenet_relabelto_stunnel_server_packets" lineno="63512"> <summary> Relabel packets to stunnel_server the packet type. </summary> @@ -61866,85 +47657,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_svn_port" lineno="82832"> -<summary> -Send and receive TCP traffic on the svn port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_svn_port" lineno="82847"> -<summary> -Send UDP traffic on the svn port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82862"> -<summary> -Do not audit attempts to send UDP traffic on the svn port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_svn_port" lineno="82877"> -<summary> -Receive UDP traffic on the svn port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82892"> -<summary> -Do not audit attempts to receive UDP traffic on the svn port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_svn_port" lineno="82907"> -<summary> -Send and receive UDP traffic on the svn port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82923"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the svn port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_svn_port" lineno="82938"> +<interface name="corenet_tcp_bind_svn_port" lineno="63534"> <summary> Bind TCP sockets to the svn port. </summary> @@ -61955,7 +47668,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_svn_port" lineno="82958"> +<interface name="corenet_udp_bind_svn_port" lineno="63554"> <summary> Bind UDP sockets to the svn port. </summary> @@ -61966,7 +47679,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_svn_port" lineno="82977"> +<interface name="corenet_tcp_connect_svn_port" lineno="63573"> <summary> Make a TCP connection to the svn port. </summary> @@ -61976,7 +47689,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_svn_client_packets" lineno="82997"> +<interface name="corenet_send_svn_client_packets" lineno="63593"> <summary> Send svn_client packets. </summary> @@ -61987,7 +47700,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_svn_client_packets" lineno="83016"> +<interface name="corenet_dontaudit_send_svn_client_packets" lineno="63612"> <summary> Do not audit attempts to send svn_client packets. </summary> @@ -61998,7 +47711,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_svn_client_packets" lineno="83035"> +<interface name="corenet_receive_svn_client_packets" lineno="63631"> <summary> Receive svn_client packets. </summary> @@ -62009,7 +47722,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="83054"> +<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="63650"> <summary> Do not audit attempts to receive svn_client packets. </summary> @@ -62020,7 +47733,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_svn_client_packets" lineno="83073"> +<interface name="corenet_sendrecv_svn_client_packets" lineno="63669"> <summary> Send and receive svn_client packets. </summary> @@ -62031,7 +47744,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="83089"> +<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="63685"> <summary> Do not audit attempts to send and receive svn_client packets. </summary> @@ -62042,7 +47755,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_svn_client_packets" lineno="83104"> +<interface name="corenet_relabelto_svn_client_packets" lineno="63700"> <summary> Relabel packets to svn_client the packet type. </summary> @@ -62052,7 +47765,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_svn_server_packets" lineno="83124"> +<interface name="corenet_send_svn_server_packets" lineno="63720"> <summary> Send svn_server packets. </summary> @@ -62063,7 +47776,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_svn_server_packets" lineno="83143"> +<interface name="corenet_dontaudit_send_svn_server_packets" lineno="63739"> <summary> Do not audit attempts to send svn_server packets. </summary> @@ -62074,7 +47787,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_svn_server_packets" lineno="83162"> +<interface name="corenet_receive_svn_server_packets" lineno="63758"> <summary> Receive svn_server packets. </summary> @@ -62085,7 +47798,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="83181"> +<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="63777"> <summary> Do not audit attempts to receive svn_server packets. </summary> @@ -62096,7 +47809,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_svn_server_packets" lineno="83200"> +<interface name="corenet_sendrecv_svn_server_packets" lineno="63796"> <summary> Send and receive svn_server packets. </summary> @@ -62107,7 +47820,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="83216"> +<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="63812"> <summary> Do not audit attempts to send and receive svn_server packets. </summary> @@ -62118,7 +47831,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_svn_server_packets" lineno="83231"> +<interface name="corenet_relabelto_svn_server_packets" lineno="63827"> <summary> Relabel packets to svn_server the packet type. </summary> @@ -62128,85 +47841,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="83253"> -<summary> -Send and receive TCP traffic on the svrloc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_svrloc_port" lineno="83268"> -<summary> -Send UDP traffic on the svrloc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="83283"> -<summary> -Do not audit attempts to send UDP traffic on the svrloc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_svrloc_port" lineno="83298"> -<summary> -Receive UDP traffic on the svrloc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="83313"> -<summary> -Do not audit attempts to receive UDP traffic on the svrloc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_svrloc_port" lineno="83328"> -<summary> -Send and receive UDP traffic on the svrloc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="83344"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the svrloc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_svrloc_port" lineno="83359"> +<interface name="corenet_tcp_bind_svrloc_port" lineno="63849"> <summary> Bind TCP sockets to the svrloc port. </summary> @@ -62217,7 +47852,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_svrloc_port" lineno="83379"> +<interface name="corenet_udp_bind_svrloc_port" lineno="63869"> <summary> Bind UDP sockets to the svrloc port. </summary> @@ -62228,7 +47863,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_svrloc_port" lineno="83398"> +<interface name="corenet_tcp_connect_svrloc_port" lineno="63888"> <summary> Make a TCP connection to the svrloc port. </summary> @@ -62238,7 +47873,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_svrloc_client_packets" lineno="83418"> +<interface name="corenet_send_svrloc_client_packets" lineno="63908"> <summary> Send svrloc_client packets. </summary> @@ -62249,7 +47884,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="83437"> +<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="63927"> <summary> Do not audit attempts to send svrloc_client packets. </summary> @@ -62260,7 +47895,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_svrloc_client_packets" lineno="83456"> +<interface name="corenet_receive_svrloc_client_packets" lineno="63946"> <summary> Receive svrloc_client packets. </summary> @@ -62271,7 +47906,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83475"> +<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="63965"> <summary> Do not audit attempts to receive svrloc_client packets. </summary> @@ -62282,7 +47917,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83494"> +<interface name="corenet_sendrecv_svrloc_client_packets" lineno="63984"> <summary> Send and receive svrloc_client packets. </summary> @@ -62293,7 +47928,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83510"> +<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="64000"> <summary> Do not audit attempts to send and receive svrloc_client packets. </summary> @@ -62304,7 +47939,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_svrloc_client_packets" lineno="83525"> +<interface name="corenet_relabelto_svrloc_client_packets" lineno="64015"> <summary> Relabel packets to svrloc_client the packet type. </summary> @@ -62314,7 +47949,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_svrloc_server_packets" lineno="83545"> +<interface name="corenet_send_svrloc_server_packets" lineno="64035"> <summary> Send svrloc_server packets. </summary> @@ -62325,7 +47960,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83564"> +<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="64054"> <summary> Do not audit attempts to send svrloc_server packets. </summary> @@ -62336,7 +47971,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_svrloc_server_packets" lineno="83583"> +<interface name="corenet_receive_svrloc_server_packets" lineno="64073"> <summary> Receive svrloc_server packets. </summary> @@ -62347,7 +47982,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83602"> +<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="64092"> <summary> Do not audit attempts to receive svrloc_server packets. </summary> @@ -62358,7 +47993,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83621"> +<interface name="corenet_sendrecv_svrloc_server_packets" lineno="64111"> <summary> Send and receive svrloc_server packets. </summary> @@ -62369,7 +48004,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83637"> +<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="64127"> <summary> Do not audit attempts to send and receive svrloc_server packets. </summary> @@ -62380,7 +48015,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_svrloc_server_packets" lineno="83652"> +<interface name="corenet_relabelto_svrloc_server_packets" lineno="64142"> <summary> Relabel packets to svrloc_server the packet type. </summary> @@ -62390,85 +48025,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_swat_port" lineno="83674"> -<summary> -Send and receive TCP traffic on the swat port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_swat_port" lineno="83689"> -<summary> -Send UDP traffic on the swat port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83704"> -<summary> -Do not audit attempts to send UDP traffic on the swat port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_swat_port" lineno="83719"> -<summary> -Receive UDP traffic on the swat port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83734"> -<summary> -Do not audit attempts to receive UDP traffic on the swat port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_swat_port" lineno="83749"> -<summary> -Send and receive UDP traffic on the swat port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83765"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the swat port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_swat_port" lineno="83780"> +<interface name="corenet_tcp_bind_swat_port" lineno="64164"> <summary> Bind TCP sockets to the swat port. </summary> @@ -62479,7 +48036,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_swat_port" lineno="83800"> +<interface name="corenet_udp_bind_swat_port" lineno="64184"> <summary> Bind UDP sockets to the swat port. </summary> @@ -62490,7 +48047,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_swat_port" lineno="83819"> +<interface name="corenet_tcp_connect_swat_port" lineno="64203"> <summary> Make a TCP connection to the swat port. </summary> @@ -62500,7 +48057,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_swat_client_packets" lineno="83839"> +<interface name="corenet_send_swat_client_packets" lineno="64223"> <summary> Send swat_client packets. </summary> @@ -62511,7 +48068,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83858"> +<interface name="corenet_dontaudit_send_swat_client_packets" lineno="64242"> <summary> Do not audit attempts to send swat_client packets. </summary> @@ -62522,7 +48079,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_swat_client_packets" lineno="83877"> +<interface name="corenet_receive_swat_client_packets" lineno="64261"> <summary> Receive swat_client packets. </summary> @@ -62533,7 +48090,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83896"> +<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="64280"> <summary> Do not audit attempts to receive swat_client packets. </summary> @@ -62544,7 +48101,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_swat_client_packets" lineno="83915"> +<interface name="corenet_sendrecv_swat_client_packets" lineno="64299"> <summary> Send and receive swat_client packets. </summary> @@ -62555,7 +48112,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83931"> +<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="64315"> <summary> Do not audit attempts to send and receive swat_client packets. </summary> @@ -62566,7 +48123,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_swat_client_packets" lineno="83946"> +<interface name="corenet_relabelto_swat_client_packets" lineno="64330"> <summary> Relabel packets to swat_client the packet type. </summary> @@ -62576,7 +48133,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_swat_server_packets" lineno="83966"> +<interface name="corenet_send_swat_server_packets" lineno="64350"> <summary> Send swat_server packets. </summary> @@ -62587,7 +48144,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83985"> +<interface name="corenet_dontaudit_send_swat_server_packets" lineno="64369"> <summary> Do not audit attempts to send swat_server packets. </summary> @@ -62598,7 +48155,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_swat_server_packets" lineno="84004"> +<interface name="corenet_receive_swat_server_packets" lineno="64388"> <summary> Receive swat_server packets. </summary> @@ -62609,7 +48166,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="84023"> +<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="64407"> <summary> Do not audit attempts to receive swat_server packets. </summary> @@ -62620,7 +48177,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_swat_server_packets" lineno="84042"> +<interface name="corenet_sendrecv_swat_server_packets" lineno="64426"> <summary> Send and receive swat_server packets. </summary> @@ -62631,7 +48188,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="84058"> +<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="64442"> <summary> Do not audit attempts to send and receive swat_server packets. </summary> @@ -62642,7 +48199,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_swat_server_packets" lineno="84073"> +<interface name="corenet_relabelto_swat_server_packets" lineno="64457"> <summary> Relabel packets to swat_server the packet type. </summary> @@ -62652,85 +48209,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="84095"> -<summary> -Send and receive TCP traffic on the syncthing port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_syncthing_port" lineno="84110"> -<summary> -Send UDP traffic on the syncthing port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="84125"> -<summary> -Do not audit attempts to send UDP traffic on the syncthing port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_syncthing_port" lineno="84140"> -<summary> -Receive UDP traffic on the syncthing port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="84155"> -<summary> -Do not audit attempts to receive UDP traffic on the syncthing port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_syncthing_port" lineno="84170"> -<summary> -Send and receive UDP traffic on the syncthing port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="84186"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the syncthing port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_syncthing_port" lineno="84201"> +<interface name="corenet_tcp_bind_syncthing_port" lineno="64479"> <summary> Bind TCP sockets to the syncthing port. </summary> @@ -62741,7 +48220,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_syncthing_port" lineno="84221"> +<interface name="corenet_udp_bind_syncthing_port" lineno="64499"> <summary> Bind UDP sockets to the syncthing port. </summary> @@ -62752,7 +48231,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_syncthing_port" lineno="84240"> +<interface name="corenet_tcp_connect_syncthing_port" lineno="64518"> <summary> Make a TCP connection to the syncthing port. </summary> @@ -62762,7 +48241,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_client_packets" lineno="84260"> +<interface name="corenet_send_syncthing_client_packets" lineno="64538"> <summary> Send syncthing_client packets. </summary> @@ -62773,7 +48252,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="84279"> +<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="64557"> <summary> Do not audit attempts to send syncthing_client packets. </summary> @@ -62784,7 +48263,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_client_packets" lineno="84298"> +<interface name="corenet_receive_syncthing_client_packets" lineno="64576"> <summary> Receive syncthing_client packets. </summary> @@ -62795,7 +48274,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="84317"> +<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="64595"> <summary> Do not audit attempts to receive syncthing_client packets. </summary> @@ -62806,7 +48285,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_client_packets" lineno="84336"> +<interface name="corenet_sendrecv_syncthing_client_packets" lineno="64614"> <summary> Send and receive syncthing_client packets. </summary> @@ -62817,7 +48296,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="84352"> +<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="64630"> <summary> Do not audit attempts to send and receive syncthing_client packets. </summary> @@ -62828,7 +48307,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_client_packets" lineno="84367"> +<interface name="corenet_relabelto_syncthing_client_packets" lineno="64645"> <summary> Relabel packets to syncthing_client the packet type. </summary> @@ -62838,7 +48317,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_server_packets" lineno="84387"> +<interface name="corenet_send_syncthing_server_packets" lineno="64665"> <summary> Send syncthing_server packets. </summary> @@ -62849,7 +48328,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="84406"> +<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="64684"> <summary> Do not audit attempts to send syncthing_server packets. </summary> @@ -62860,7 +48339,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_server_packets" lineno="84425"> +<interface name="corenet_receive_syncthing_server_packets" lineno="64703"> <summary> Receive syncthing_server packets. </summary> @@ -62871,7 +48350,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84444"> +<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="64722"> <summary> Do not audit attempts to receive syncthing_server packets. </summary> @@ -62882,7 +48361,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84463"> +<interface name="corenet_sendrecv_syncthing_server_packets" lineno="64741"> <summary> Send and receive syncthing_server packets. </summary> @@ -62893,7 +48372,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84479"> +<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="64757"> <summary> Do not audit attempts to send and receive syncthing_server packets. </summary> @@ -62904,7 +48383,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_server_packets" lineno="84494"> +<interface name="corenet_relabelto_syncthing_server_packets" lineno="64772"> <summary> Relabel packets to syncthing_server the packet type. </summary> @@ -62914,85 +48393,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84516"> -<summary> -Send and receive TCP traffic on the syncthing_admin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_syncthing_admin_port" lineno="84531"> -<summary> -Send UDP traffic on the syncthing_admin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84546"> -<summary> -Do not audit attempts to send UDP traffic on the syncthing_admin port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84561"> -<summary> -Receive UDP traffic on the syncthing_admin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84576"> -<summary> -Do not audit attempts to receive UDP traffic on the syncthing_admin port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84591"> -<summary> -Send and receive UDP traffic on the syncthing_admin port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84607"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the syncthing_admin port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84622"> +<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="64794"> <summary> Bind TCP sockets to the syncthing_admin port. </summary> @@ -63003,7 +48404,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84642"> +<interface name="corenet_udp_bind_syncthing_admin_port" lineno="64814"> <summary> Bind UDP sockets to the syncthing_admin port. </summary> @@ -63014,7 +48415,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84661"> +<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="64833"> <summary> Make a TCP connection to the syncthing_admin port. </summary> @@ -63024,7 +48425,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_admin_client_packets" lineno="84681"> +<interface name="corenet_send_syncthing_admin_client_packets" lineno="64853"> <summary> Send syncthing_admin_client packets. </summary> @@ -63035,7 +48436,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84700"> +<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="64872"> <summary> Do not audit attempts to send syncthing_admin_client packets. </summary> @@ -63046,7 +48447,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84719"> +<interface name="corenet_receive_syncthing_admin_client_packets" lineno="64891"> <summary> Receive syncthing_admin_client packets. </summary> @@ -63057,7 +48458,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84738"> +<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="64910"> <summary> Do not audit attempts to receive syncthing_admin_client packets. </summary> @@ -63068,7 +48469,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84757"> +<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="64929"> <summary> Send and receive syncthing_admin_client packets. </summary> @@ -63079,7 +48480,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84773"> +<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="64945"> <summary> Do not audit attempts to send and receive syncthing_admin_client packets. </summary> @@ -63090,7 +48491,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84788"> +<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="64960"> <summary> Relabel packets to syncthing_admin_client the packet type. </summary> @@ -63100,7 +48501,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_admin_server_packets" lineno="84808"> +<interface name="corenet_send_syncthing_admin_server_packets" lineno="64980"> <summary> Send syncthing_admin_server packets. </summary> @@ -63111,7 +48512,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84827"> +<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="64999"> <summary> Do not audit attempts to send syncthing_admin_server packets. </summary> @@ -63122,7 +48523,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84846"> +<interface name="corenet_receive_syncthing_admin_server_packets" lineno="65018"> <summary> Receive syncthing_admin_server packets. </summary> @@ -63133,7 +48534,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84865"> +<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="65037"> <summary> Do not audit attempts to receive syncthing_admin_server packets. </summary> @@ -63144,7 +48545,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84884"> +<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="65056"> <summary> Send and receive syncthing_admin_server packets. </summary> @@ -63155,7 +48556,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84900"> +<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="65072"> <summary> Do not audit attempts to send and receive syncthing_admin_server packets. </summary> @@ -63166,7 +48567,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84915"> +<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="65087"> <summary> Relabel packets to syncthing_admin_server the packet type. </summary> @@ -63176,85 +48577,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84937"> -<summary> -Send and receive TCP traffic on the syncthing_discovery port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84952"> -<summary> -Send UDP traffic on the syncthing_discovery port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84967"> -<summary> -Do not audit attempts to send UDP traffic on the syncthing_discovery port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84982"> -<summary> -Receive UDP traffic on the syncthing_discovery port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84997"> -<summary> -Do not audit attempts to receive UDP traffic on the syncthing_discovery port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="85012"> -<summary> -Send and receive UDP traffic on the syncthing_discovery port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="85028"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the syncthing_discovery port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="85043"> +<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="65109"> <summary> Bind TCP sockets to the syncthing_discovery port. </summary> @@ -63265,7 +48588,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="85063"> +<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="65129"> <summary> Bind UDP sockets to the syncthing_discovery port. </summary> @@ -63276,7 +48599,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="85082"> +<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="65148"> <summary> Make a TCP connection to the syncthing_discovery port. </summary> @@ -63286,7 +48609,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_discovery_client_packets" lineno="85102"> +<interface name="corenet_send_syncthing_discovery_client_packets" lineno="65168"> <summary> Send syncthing_discovery_client packets. </summary> @@ -63297,7 +48620,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="85121"> +<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="65187"> <summary> Do not audit attempts to send syncthing_discovery_client packets. </summary> @@ -63308,7 +48631,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="85140"> +<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="65206"> <summary> Receive syncthing_discovery_client packets. </summary> @@ -63319,7 +48642,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="85159"> +<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="65225"> <summary> Do not audit attempts to receive syncthing_discovery_client packets. </summary> @@ -63330,7 +48653,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="85178"> +<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="65244"> <summary> Send and receive syncthing_discovery_client packets. </summary> @@ -63341,7 +48664,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="85194"> +<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="65260"> <summary> Do not audit attempts to send and receive syncthing_discovery_client packets. </summary> @@ -63352,7 +48675,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="85209"> +<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="65275"> <summary> Relabel packets to syncthing_discovery_client the packet type. </summary> @@ -63362,7 +48685,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syncthing_discovery_server_packets" lineno="85229"> +<interface name="corenet_send_syncthing_discovery_server_packets" lineno="65295"> <summary> Send syncthing_discovery_server packets. </summary> @@ -63373,7 +48696,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="85248"> +<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="65314"> <summary> Do not audit attempts to send syncthing_discovery_server packets. </summary> @@ -63384,7 +48707,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="85267"> +<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="65333"> <summary> Receive syncthing_discovery_server packets. </summary> @@ -63395,7 +48718,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="85286"> +<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="65352"> <summary> Do not audit attempts to receive syncthing_discovery_server packets. </summary> @@ -63406,7 +48729,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="85305"> +<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="65371"> <summary> Send and receive syncthing_discovery_server packets. </summary> @@ -63417,7 +48740,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="85321"> +<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="65387"> <summary> Do not audit attempts to send and receive syncthing_discovery_server packets. </summary> @@ -63428,7 +48751,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="85336"> +<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="65402"> <summary> Relabel packets to syncthing_discovery_server the packet type. </summary> @@ -63438,85 +48761,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="85358"> -<summary> -Send and receive TCP traffic on the sype_transport port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_sype_transport_port" lineno="85373"> -<summary> -Send UDP traffic on the sype_transport port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="85388"> -<summary> -Do not audit attempts to send UDP traffic on the sype_transport port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_sype_transport_port" lineno="85403"> -<summary> -Receive UDP traffic on the sype_transport port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="85418"> -<summary> -Do not audit attempts to receive UDP traffic on the sype_transport port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="85433"> -<summary> -Send and receive UDP traffic on the sype_transport port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85449"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the sype_transport port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_sype_transport_port" lineno="85464"> +<interface name="corenet_tcp_bind_sype_transport_port" lineno="65424"> <summary> Bind TCP sockets to the sype_transport port. </summary> @@ -63527,7 +48772,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_sype_transport_port" lineno="85484"> +<interface name="corenet_udp_bind_sype_transport_port" lineno="65444"> <summary> Bind UDP sockets to the sype_transport port. </summary> @@ -63538,7 +48783,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_sype_transport_port" lineno="85503"> +<interface name="corenet_tcp_connect_sype_transport_port" lineno="65463"> <summary> Make a TCP connection to the sype_transport port. </summary> @@ -63548,7 +48793,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sype_transport_client_packets" lineno="85523"> +<interface name="corenet_send_sype_transport_client_packets" lineno="65483"> <summary> Send sype_transport_client packets. </summary> @@ -63559,7 +48804,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85542"> +<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="65502"> <summary> Do not audit attempts to send sype_transport_client packets. </summary> @@ -63570,7 +48815,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sype_transport_client_packets" lineno="85561"> +<interface name="corenet_receive_sype_transport_client_packets" lineno="65521"> <summary> Receive sype_transport_client packets. </summary> @@ -63581,7 +48826,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85580"> +<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="65540"> <summary> Do not audit attempts to receive sype_transport_client packets. </summary> @@ -63592,7 +48837,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85599"> +<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="65559"> <summary> Send and receive sype_transport_client packets. </summary> @@ -63603,7 +48848,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85615"> +<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="65575"> <summary> Do not audit attempts to send and receive sype_transport_client packets. </summary> @@ -63614,7 +48859,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85630"> +<interface name="corenet_relabelto_sype_transport_client_packets" lineno="65590"> <summary> Relabel packets to sype_transport_client the packet type. </summary> @@ -63624,7 +48869,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_sype_transport_server_packets" lineno="85650"> +<interface name="corenet_send_sype_transport_server_packets" lineno="65610"> <summary> Send sype_transport_server packets. </summary> @@ -63635,7 +48880,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85669"> +<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="65629"> <summary> Do not audit attempts to send sype_transport_server packets. </summary> @@ -63646,7 +48891,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_sype_transport_server_packets" lineno="85688"> +<interface name="corenet_receive_sype_transport_server_packets" lineno="65648"> <summary> Receive sype_transport_server packets. </summary> @@ -63657,7 +48902,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85707"> +<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="65667"> <summary> Do not audit attempts to receive sype_transport_server packets. </summary> @@ -63668,7 +48913,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85726"> +<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="65686"> <summary> Send and receive sype_transport_server packets. </summary> @@ -63679,7 +48924,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85742"> +<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="65702"> <summary> Do not audit attempts to send and receive sype_transport_server packets. </summary> @@ -63690,7 +48935,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85757"> +<interface name="corenet_relabelto_sype_transport_server_packets" lineno="65717"> <summary> Relabel packets to sype_transport_server the packet type. </summary> @@ -63700,85 +48945,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85779"> -<summary> -Send and receive TCP traffic on the syslogd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_syslogd_port" lineno="85794"> -<summary> -Send UDP traffic on the syslogd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85809"> -<summary> -Do not audit attempts to send UDP traffic on the syslogd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_syslogd_port" lineno="85824"> -<summary> -Receive UDP traffic on the syslogd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85839"> -<summary> -Do not audit attempts to receive UDP traffic on the syslogd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85854"> -<summary> -Send and receive UDP traffic on the syslogd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85870"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the syslogd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_syslogd_port" lineno="85885"> +<interface name="corenet_tcp_bind_syslogd_port" lineno="65739"> <summary> Bind TCP sockets to the syslogd port. </summary> @@ -63789,7 +48956,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_syslogd_port" lineno="85905"> +<interface name="corenet_udp_bind_syslogd_port" lineno="65759"> <summary> Bind UDP sockets to the syslogd port. </summary> @@ -63800,7 +48967,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_syslogd_port" lineno="85924"> +<interface name="corenet_tcp_connect_syslogd_port" lineno="65778"> <summary> Make a TCP connection to the syslogd port. </summary> @@ -63810,7 +48977,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syslogd_client_packets" lineno="85944"> +<interface name="corenet_send_syslogd_client_packets" lineno="65798"> <summary> Send syslogd_client packets. </summary> @@ -63821,7 +48988,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85963"> +<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="65817"> <summary> Do not audit attempts to send syslogd_client packets. </summary> @@ -63832,7 +48999,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syslogd_client_packets" lineno="85982"> +<interface name="corenet_receive_syslogd_client_packets" lineno="65836"> <summary> Receive syslogd_client packets. </summary> @@ -63843,7 +49010,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="86001"> +<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="65855"> <summary> Do not audit attempts to receive syslogd_client packets. </summary> @@ -63854,7 +49021,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syslogd_client_packets" lineno="86020"> +<interface name="corenet_sendrecv_syslogd_client_packets" lineno="65874"> <summary> Send and receive syslogd_client packets. </summary> @@ -63865,7 +49032,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="86036"> +<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="65890"> <summary> Do not audit attempts to send and receive syslogd_client packets. </summary> @@ -63876,7 +49043,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syslogd_client_packets" lineno="86051"> +<interface name="corenet_relabelto_syslogd_client_packets" lineno="65905"> <summary> Relabel packets to syslogd_client the packet type. </summary> @@ -63886,7 +49053,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syslogd_server_packets" lineno="86071"> +<interface name="corenet_send_syslogd_server_packets" lineno="65925"> <summary> Send syslogd_server packets. </summary> @@ -63897,7 +49064,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="86090"> +<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="65944"> <summary> Do not audit attempts to send syslogd_server packets. </summary> @@ -63908,7 +49075,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syslogd_server_packets" lineno="86109"> +<interface name="corenet_receive_syslogd_server_packets" lineno="65963"> <summary> Receive syslogd_server packets. </summary> @@ -63919,7 +49086,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="86128"> +<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="65982"> <summary> Do not audit attempts to receive syslogd_server packets. </summary> @@ -63930,7 +49097,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syslogd_server_packets" lineno="86147"> +<interface name="corenet_sendrecv_syslogd_server_packets" lineno="66001"> <summary> Send and receive syslogd_server packets. </summary> @@ -63941,7 +49108,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="86163"> +<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="66017"> <summary> Do not audit attempts to send and receive syslogd_server packets. </summary> @@ -63952,7 +49119,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syslogd_server_packets" lineno="86178"> +<interface name="corenet_relabelto_syslogd_server_packets" lineno="66032"> <summary> Relabel packets to syslogd_server the packet type. </summary> @@ -63962,85 +49129,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="86200"> -<summary> -Send and receive TCP traffic on the syslog_tls port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_syslog_tls_port" lineno="86215"> -<summary> -Send UDP traffic on the syslog_tls port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="86230"> -<summary> -Do not audit attempts to send UDP traffic on the syslog_tls port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_syslog_tls_port" lineno="86245"> -<summary> -Receive UDP traffic on the syslog_tls port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="86260"> -<summary> -Do not audit attempts to receive UDP traffic on the syslog_tls port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="86275"> -<summary> -Send and receive UDP traffic on the syslog_tls port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="86291"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the syslog_tls port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_syslog_tls_port" lineno="86306"> +<interface name="corenet_tcp_bind_syslog_tls_port" lineno="66054"> <summary> Bind TCP sockets to the syslog_tls port. </summary> @@ -64051,7 +49140,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_syslog_tls_port" lineno="86326"> +<interface name="corenet_udp_bind_syslog_tls_port" lineno="66074"> <summary> Bind UDP sockets to the syslog_tls port. </summary> @@ -64062,7 +49151,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_syslog_tls_port" lineno="86345"> +<interface name="corenet_tcp_connect_syslog_tls_port" lineno="66093"> <summary> Make a TCP connection to the syslog_tls port. </summary> @@ -64072,7 +49161,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syslog_tls_client_packets" lineno="86365"> +<interface name="corenet_send_syslog_tls_client_packets" lineno="66113"> <summary> Send syslog_tls_client packets. </summary> @@ -64083,7 +49172,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="86384"> +<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="66132"> <summary> Do not audit attempts to send syslog_tls_client packets. </summary> @@ -64094,7 +49183,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syslog_tls_client_packets" lineno="86403"> +<interface name="corenet_receive_syslog_tls_client_packets" lineno="66151"> <summary> Receive syslog_tls_client packets. </summary> @@ -64105,7 +49194,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="86422"> +<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="66170"> <summary> Do not audit attempts to receive syslog_tls_client packets. </summary> @@ -64116,7 +49205,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86441"> +<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="66189"> <summary> Send and receive syslog_tls_client packets. </summary> @@ -64127,7 +49216,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86457"> +<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="66205"> <summary> Do not audit attempts to send and receive syslog_tls_client packets. </summary> @@ -64138,7 +49227,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86472"> +<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="66220"> <summary> Relabel packets to syslog_tls_client the packet type. </summary> @@ -64148,7 +49237,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_syslog_tls_server_packets" lineno="86492"> +<interface name="corenet_send_syslog_tls_server_packets" lineno="66240"> <summary> Send syslog_tls_server packets. </summary> @@ -64159,7 +49248,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86511"> +<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="66259"> <summary> Do not audit attempts to send syslog_tls_server packets. </summary> @@ -64170,7 +49259,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_syslog_tls_server_packets" lineno="86530"> +<interface name="corenet_receive_syslog_tls_server_packets" lineno="66278"> <summary> Receive syslog_tls_server packets. </summary> @@ -64181,7 +49270,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86549"> +<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="66297"> <summary> Do not audit attempts to receive syslog_tls_server packets. </summary> @@ -64192,7 +49281,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86568"> +<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="66316"> <summary> Send and receive syslog_tls_server packets. </summary> @@ -64203,7 +49292,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86584"> +<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="66332"> <summary> Do not audit attempts to send and receive syslog_tls_server packets. </summary> @@ -64214,7 +49303,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86599"> +<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="66347"> <summary> Relabel packets to syslog_tls_server the packet type. </summary> @@ -64224,85 +49313,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86621"> -<summary> -Send and receive TCP traffic on the tcs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_tcs_port" lineno="86636"> -<summary> -Send UDP traffic on the tcs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86651"> -<summary> -Do not audit attempts to send UDP traffic on the tcs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_tcs_port" lineno="86666"> -<summary> -Receive UDP traffic on the tcs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86681"> -<summary> -Do not audit attempts to receive UDP traffic on the tcs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_tcs_port" lineno="86696"> -<summary> -Send and receive UDP traffic on the tcs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86712"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the tcs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_tcs_port" lineno="86727"> +<interface name="corenet_tcp_bind_tcs_port" lineno="66369"> <summary> Bind TCP sockets to the tcs port. </summary> @@ -64313,7 +49324,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_tcs_port" lineno="86747"> +<interface name="corenet_udp_bind_tcs_port" lineno="66389"> <summary> Bind UDP sockets to the tcs port. </summary> @@ -64324,7 +49335,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_tcs_port" lineno="86766"> +<interface name="corenet_tcp_connect_tcs_port" lineno="66408"> <summary> Make a TCP connection to the tcs port. </summary> @@ -64334,7 +49345,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tcs_client_packets" lineno="86786"> +<interface name="corenet_send_tcs_client_packets" lineno="66428"> <summary> Send tcs_client packets. </summary> @@ -64345,7 +49356,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86805"> +<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="66447"> <summary> Do not audit attempts to send tcs_client packets. </summary> @@ -64356,7 +49367,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tcs_client_packets" lineno="86824"> +<interface name="corenet_receive_tcs_client_packets" lineno="66466"> <summary> Receive tcs_client packets. </summary> @@ -64367,7 +49378,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86843"> +<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="66485"> <summary> Do not audit attempts to receive tcs_client packets. </summary> @@ -64378,7 +49389,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tcs_client_packets" lineno="86862"> +<interface name="corenet_sendrecv_tcs_client_packets" lineno="66504"> <summary> Send and receive tcs_client packets. </summary> @@ -64389,7 +49400,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86878"> +<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="66520"> <summary> Do not audit attempts to send and receive tcs_client packets. </summary> @@ -64400,7 +49411,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tcs_client_packets" lineno="86893"> +<interface name="corenet_relabelto_tcs_client_packets" lineno="66535"> <summary> Relabel packets to tcs_client the packet type. </summary> @@ -64410,7 +49421,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tcs_server_packets" lineno="86913"> +<interface name="corenet_send_tcs_server_packets" lineno="66555"> <summary> Send tcs_server packets. </summary> @@ -64421,7 +49432,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86932"> +<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="66574"> <summary> Do not audit attempts to send tcs_server packets. </summary> @@ -64432,7 +49443,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tcs_server_packets" lineno="86951"> +<interface name="corenet_receive_tcs_server_packets" lineno="66593"> <summary> Receive tcs_server packets. </summary> @@ -64443,7 +49454,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86970"> +<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="66612"> <summary> Do not audit attempts to receive tcs_server packets. </summary> @@ -64454,7 +49465,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tcs_server_packets" lineno="86989"> +<interface name="corenet_sendrecv_tcs_server_packets" lineno="66631"> <summary> Send and receive tcs_server packets. </summary> @@ -64465,7 +49476,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="87005"> +<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="66647"> <summary> Do not audit attempts to send and receive tcs_server packets. </summary> @@ -64476,7 +49487,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tcs_server_packets" lineno="87020"> +<interface name="corenet_relabelto_tcs_server_packets" lineno="66662"> <summary> Relabel packets to tcs_server the packet type. </summary> @@ -64486,85 +49497,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="87042"> -<summary> -Send and receive TCP traffic on the telnetd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_telnetd_port" lineno="87057"> -<summary> -Send UDP traffic on the telnetd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="87072"> -<summary> -Do not audit attempts to send UDP traffic on the telnetd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_telnetd_port" lineno="87087"> -<summary> -Receive UDP traffic on the telnetd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="87102"> -<summary> -Do not audit attempts to receive UDP traffic on the telnetd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_telnetd_port" lineno="87117"> -<summary> -Send and receive UDP traffic on the telnetd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="87133"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the telnetd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_telnetd_port" lineno="87148"> +<interface name="corenet_tcp_bind_telnetd_port" lineno="66684"> <summary> Bind TCP sockets to the telnetd port. </summary> @@ -64575,7 +49508,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_telnetd_port" lineno="87168"> +<interface name="corenet_udp_bind_telnetd_port" lineno="66704"> <summary> Bind UDP sockets to the telnetd port. </summary> @@ -64586,7 +49519,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_telnetd_port" lineno="87187"> +<interface name="corenet_tcp_connect_telnetd_port" lineno="66723"> <summary> Make a TCP connection to the telnetd port. </summary> @@ -64596,7 +49529,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_telnetd_client_packets" lineno="87207"> +<interface name="corenet_send_telnetd_client_packets" lineno="66743"> <summary> Send telnetd_client packets. </summary> @@ -64607,7 +49540,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="87226"> +<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="66762"> <summary> Do not audit attempts to send telnetd_client packets. </summary> @@ -64618,7 +49551,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_telnetd_client_packets" lineno="87245"> +<interface name="corenet_receive_telnetd_client_packets" lineno="66781"> <summary> Receive telnetd_client packets. </summary> @@ -64629,7 +49562,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="87264"> +<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="66800"> <summary> Do not audit attempts to receive telnetd_client packets. </summary> @@ -64640,7 +49573,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_telnetd_client_packets" lineno="87283"> +<interface name="corenet_sendrecv_telnetd_client_packets" lineno="66819"> <summary> Send and receive telnetd_client packets. </summary> @@ -64651,7 +49584,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="87299"> +<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="66835"> <summary> Do not audit attempts to send and receive telnetd_client packets. </summary> @@ -64662,7 +49595,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_telnetd_client_packets" lineno="87314"> +<interface name="corenet_relabelto_telnetd_client_packets" lineno="66850"> <summary> Relabel packets to telnetd_client the packet type. </summary> @@ -64672,7 +49605,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_telnetd_server_packets" lineno="87334"> +<interface name="corenet_send_telnetd_server_packets" lineno="66870"> <summary> Send telnetd_server packets. </summary> @@ -64683,7 +49616,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="87353"> +<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="66889"> <summary> Do not audit attempts to send telnetd_server packets. </summary> @@ -64694,7 +49627,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_telnetd_server_packets" lineno="87372"> +<interface name="corenet_receive_telnetd_server_packets" lineno="66908"> <summary> Receive telnetd_server packets. </summary> @@ -64705,7 +49638,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="87391"> +<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="66927"> <summary> Do not audit attempts to receive telnetd_server packets. </summary> @@ -64716,7 +49649,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_telnetd_server_packets" lineno="87410"> +<interface name="corenet_sendrecv_telnetd_server_packets" lineno="66946"> <summary> Send and receive telnetd_server packets. </summary> @@ -64727,7 +49660,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="87426"> +<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="66962"> <summary> Do not audit attempts to send and receive telnetd_server packets. </summary> @@ -64738,7 +49671,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_telnetd_server_packets" lineno="87441"> +<interface name="corenet_relabelto_telnetd_server_packets" lineno="66977"> <summary> Relabel packets to telnetd_server the packet type. </summary> @@ -64748,85 +49681,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87463"> -<summary> -Send and receive TCP traffic on the tftp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_tftp_port" lineno="87478"> -<summary> -Send UDP traffic on the tftp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87493"> -<summary> -Do not audit attempts to send UDP traffic on the tftp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_tftp_port" lineno="87508"> -<summary> -Receive UDP traffic on the tftp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87523"> -<summary> -Do not audit attempts to receive UDP traffic on the tftp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_tftp_port" lineno="87538"> -<summary> -Send and receive UDP traffic on the tftp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87554"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the tftp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_tftp_port" lineno="87569"> +<interface name="corenet_tcp_bind_tftp_port" lineno="66999"> <summary> Bind TCP sockets to the tftp port. </summary> @@ -64837,7 +49692,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_tftp_port" lineno="87589"> +<interface name="corenet_udp_bind_tftp_port" lineno="67019"> <summary> Bind UDP sockets to the tftp port. </summary> @@ -64848,7 +49703,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_tftp_port" lineno="87608"> +<interface name="corenet_tcp_connect_tftp_port" lineno="67038"> <summary> Make a TCP connection to the tftp port. </summary> @@ -64858,7 +49713,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tftp_client_packets" lineno="87628"> +<interface name="corenet_send_tftp_client_packets" lineno="67058"> <summary> Send tftp_client packets. </summary> @@ -64869,7 +49724,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87647"> +<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="67077"> <summary> Do not audit attempts to send tftp_client packets. </summary> @@ -64880,7 +49735,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tftp_client_packets" lineno="87666"> +<interface name="corenet_receive_tftp_client_packets" lineno="67096"> <summary> Receive tftp_client packets. </summary> @@ -64891,7 +49746,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87685"> +<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="67115"> <summary> Do not audit attempts to receive tftp_client packets. </summary> @@ -64902,7 +49757,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tftp_client_packets" lineno="87704"> +<interface name="corenet_sendrecv_tftp_client_packets" lineno="67134"> <summary> Send and receive tftp_client packets. </summary> @@ -64913,7 +49768,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87720"> +<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="67150"> <summary> Do not audit attempts to send and receive tftp_client packets. </summary> @@ -64924,7 +49779,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tftp_client_packets" lineno="87735"> +<interface name="corenet_relabelto_tftp_client_packets" lineno="67165"> <summary> Relabel packets to tftp_client the packet type. </summary> @@ -64934,7 +49789,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tftp_server_packets" lineno="87755"> +<interface name="corenet_send_tftp_server_packets" lineno="67185"> <summary> Send tftp_server packets. </summary> @@ -64945,7 +49800,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87774"> +<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="67204"> <summary> Do not audit attempts to send tftp_server packets. </summary> @@ -64956,7 +49811,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tftp_server_packets" lineno="87793"> +<interface name="corenet_receive_tftp_server_packets" lineno="67223"> <summary> Receive tftp_server packets. </summary> @@ -64967,7 +49822,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87812"> +<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="67242"> <summary> Do not audit attempts to receive tftp_server packets. </summary> @@ -64978,7 +49833,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tftp_server_packets" lineno="87831"> +<interface name="corenet_sendrecv_tftp_server_packets" lineno="67261"> <summary> Send and receive tftp_server packets. </summary> @@ -64989,7 +49844,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87847"> +<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="67277"> <summary> Do not audit attempts to send and receive tftp_server packets. </summary> @@ -65000,7 +49855,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tftp_server_packets" lineno="87862"> +<interface name="corenet_relabelto_tftp_server_packets" lineno="67292"> <summary> Relabel packets to tftp_server the packet type. </summary> @@ -65010,85 +49865,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_tor_port" lineno="87884"> -<summary> -Send and receive TCP traffic on the tor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_tor_port" lineno="87899"> -<summary> -Send UDP traffic on the tor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87914"> -<summary> -Do not audit attempts to send UDP traffic on the tor port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_tor_port" lineno="87929"> -<summary> -Receive UDP traffic on the tor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87944"> -<summary> -Do not audit attempts to receive UDP traffic on the tor port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_tor_port" lineno="87959"> -<summary> -Send and receive UDP traffic on the tor port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87975"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the tor port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_tor_port" lineno="87990"> +<interface name="corenet_tcp_bind_tor_port" lineno="67314"> <summary> Bind TCP sockets to the tor port. </summary> @@ -65099,7 +49876,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_tor_port" lineno="88010"> +<interface name="corenet_udp_bind_tor_port" lineno="67334"> <summary> Bind UDP sockets to the tor port. </summary> @@ -65110,7 +49887,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_tor_port" lineno="88029"> +<interface name="corenet_tcp_connect_tor_port" lineno="67353"> <summary> Make a TCP connection to the tor port. </summary> @@ -65120,7 +49897,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tor_client_packets" lineno="88049"> +<interface name="corenet_send_tor_client_packets" lineno="67373"> <summary> Send tor_client packets. </summary> @@ -65131,7 +49908,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tor_client_packets" lineno="88068"> +<interface name="corenet_dontaudit_send_tor_client_packets" lineno="67392"> <summary> Do not audit attempts to send tor_client packets. </summary> @@ -65142,7 +49919,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tor_client_packets" lineno="88087"> +<interface name="corenet_receive_tor_client_packets" lineno="67411"> <summary> Receive tor_client packets. </summary> @@ -65153,7 +49930,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="88106"> +<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="67430"> <summary> Do not audit attempts to receive tor_client packets. </summary> @@ -65164,7 +49941,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tor_client_packets" lineno="88125"> +<interface name="corenet_sendrecv_tor_client_packets" lineno="67449"> <summary> Send and receive tor_client packets. </summary> @@ -65175,7 +49952,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="88141"> +<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="67465"> <summary> Do not audit attempts to send and receive tor_client packets. </summary> @@ -65186,7 +49963,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tor_client_packets" lineno="88156"> +<interface name="corenet_relabelto_tor_client_packets" lineno="67480"> <summary> Relabel packets to tor_client the packet type. </summary> @@ -65196,7 +49973,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_tor_server_packets" lineno="88176"> +<interface name="corenet_send_tor_server_packets" lineno="67500"> <summary> Send tor_server packets. </summary> @@ -65207,7 +49984,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_tor_server_packets" lineno="88195"> +<interface name="corenet_dontaudit_send_tor_server_packets" lineno="67519"> <summary> Do not audit attempts to send tor_server packets. </summary> @@ -65218,7 +49995,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_tor_server_packets" lineno="88214"> +<interface name="corenet_receive_tor_server_packets" lineno="67538"> <summary> Receive tor_server packets. </summary> @@ -65229,7 +50006,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="88233"> +<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="67557"> <summary> Do not audit attempts to receive tor_server packets. </summary> @@ -65240,7 +50017,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_tor_server_packets" lineno="88252"> +<interface name="corenet_sendrecv_tor_server_packets" lineno="67576"> <summary> Send and receive tor_server packets. </summary> @@ -65251,7 +50028,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="88268"> +<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="67592"> <summary> Do not audit attempts to send and receive tor_server packets. </summary> @@ -65262,7 +50039,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_tor_server_packets" lineno="88283"> +<interface name="corenet_relabelto_tor_server_packets" lineno="67607"> <summary> Relabel packets to tor_server the packet type. </summary> @@ -65272,85 +50049,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="88305"> -<summary> -Send and receive TCP traffic on the traceroute port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_traceroute_port" lineno="88320"> -<summary> -Send UDP traffic on the traceroute port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="88335"> -<summary> -Do not audit attempts to send UDP traffic on the traceroute port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_traceroute_port" lineno="88350"> -<summary> -Receive UDP traffic on the traceroute port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="88365"> -<summary> -Do not audit attempts to receive UDP traffic on the traceroute port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_traceroute_port" lineno="88380"> -<summary> -Send and receive UDP traffic on the traceroute port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="88396"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the traceroute port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_traceroute_port" lineno="88411"> +<interface name="corenet_tcp_bind_traceroute_port" lineno="67629"> <summary> Bind TCP sockets to the traceroute port. </summary> @@ -65361,7 +50060,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_traceroute_port" lineno="88431"> +<interface name="corenet_udp_bind_traceroute_port" lineno="67649"> <summary> Bind UDP sockets to the traceroute port. </summary> @@ -65372,7 +50071,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_traceroute_port" lineno="88450"> +<interface name="corenet_tcp_connect_traceroute_port" lineno="67668"> <summary> Make a TCP connection to the traceroute port. </summary> @@ -65382,7 +50081,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_traceroute_client_packets" lineno="88470"> +<interface name="corenet_send_traceroute_client_packets" lineno="67688"> <summary> Send traceroute_client packets. </summary> @@ -65393,7 +50092,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88489"> +<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="67707"> <summary> Do not audit attempts to send traceroute_client packets. </summary> @@ -65404,7 +50103,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_traceroute_client_packets" lineno="88508"> +<interface name="corenet_receive_traceroute_client_packets" lineno="67726"> <summary> Receive traceroute_client packets. </summary> @@ -65415,7 +50114,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88527"> +<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="67745"> <summary> Do not audit attempts to receive traceroute_client packets. </summary> @@ -65426,7 +50125,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88546"> +<interface name="corenet_sendrecv_traceroute_client_packets" lineno="67764"> <summary> Send and receive traceroute_client packets. </summary> @@ -65437,7 +50136,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88562"> +<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="67780"> <summary> Do not audit attempts to send and receive traceroute_client packets. </summary> @@ -65448,7 +50147,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_traceroute_client_packets" lineno="88577"> +<interface name="corenet_relabelto_traceroute_client_packets" lineno="67795"> <summary> Relabel packets to traceroute_client the packet type. </summary> @@ -65458,7 +50157,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_traceroute_server_packets" lineno="88597"> +<interface name="corenet_send_traceroute_server_packets" lineno="67815"> <summary> Send traceroute_server packets. </summary> @@ -65469,7 +50168,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88616"> +<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="67834"> <summary> Do not audit attempts to send traceroute_server packets. </summary> @@ -65480,7 +50179,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_traceroute_server_packets" lineno="88635"> +<interface name="corenet_receive_traceroute_server_packets" lineno="67853"> <summary> Receive traceroute_server packets. </summary> @@ -65491,7 +50190,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88654"> +<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="67872"> <summary> Do not audit attempts to receive traceroute_server packets. </summary> @@ -65502,7 +50201,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88673"> +<interface name="corenet_sendrecv_traceroute_server_packets" lineno="67891"> <summary> Send and receive traceroute_server packets. </summary> @@ -65513,7 +50212,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88689"> +<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="67907"> <summary> Do not audit attempts to send and receive traceroute_server packets. </summary> @@ -65524,7 +50223,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_traceroute_server_packets" lineno="88704"> +<interface name="corenet_relabelto_traceroute_server_packets" lineno="67922"> <summary> Relabel packets to traceroute_server the packet type. </summary> @@ -65534,85 +50233,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88726"> -<summary> -Send and receive TCP traffic on the transproxy port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_transproxy_port" lineno="88741"> -<summary> -Send UDP traffic on the transproxy port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88756"> -<summary> -Do not audit attempts to send UDP traffic on the transproxy port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_transproxy_port" lineno="88771"> -<summary> -Receive UDP traffic on the transproxy port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88786"> -<summary> -Do not audit attempts to receive UDP traffic on the transproxy port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88801"> -<summary> -Send and receive UDP traffic on the transproxy port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88817"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the transproxy port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_transproxy_port" lineno="88832"> +<interface name="corenet_tcp_bind_transproxy_port" lineno="67944"> <summary> Bind TCP sockets to the transproxy port. </summary> @@ -65623,7 +50244,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_transproxy_port" lineno="88852"> +<interface name="corenet_udp_bind_transproxy_port" lineno="67964"> <summary> Bind UDP sockets to the transproxy port. </summary> @@ -65634,7 +50255,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_transproxy_port" lineno="88871"> +<interface name="corenet_tcp_connect_transproxy_port" lineno="67983"> <summary> Make a TCP connection to the transproxy port. </summary> @@ -65644,7 +50265,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_transproxy_client_packets" lineno="88891"> +<interface name="corenet_send_transproxy_client_packets" lineno="68003"> <summary> Send transproxy_client packets. </summary> @@ -65655,7 +50276,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88910"> +<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="68022"> <summary> Do not audit attempts to send transproxy_client packets. </summary> @@ -65666,7 +50287,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_transproxy_client_packets" lineno="88929"> +<interface name="corenet_receive_transproxy_client_packets" lineno="68041"> <summary> Receive transproxy_client packets. </summary> @@ -65677,7 +50298,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88948"> +<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="68060"> <summary> Do not audit attempts to receive transproxy_client packets. </summary> @@ -65688,7 +50309,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88967"> +<interface name="corenet_sendrecv_transproxy_client_packets" lineno="68079"> <summary> Send and receive transproxy_client packets. </summary> @@ -65699,7 +50320,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88983"> +<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="68095"> <summary> Do not audit attempts to send and receive transproxy_client packets. </summary> @@ -65710,7 +50331,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_transproxy_client_packets" lineno="88998"> +<interface name="corenet_relabelto_transproxy_client_packets" lineno="68110"> <summary> Relabel packets to transproxy_client the packet type. </summary> @@ -65720,7 +50341,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_transproxy_server_packets" lineno="89018"> +<interface name="corenet_send_transproxy_server_packets" lineno="68130"> <summary> Send transproxy_server packets. </summary> @@ -65731,7 +50352,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="89037"> +<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="68149"> <summary> Do not audit attempts to send transproxy_server packets. </summary> @@ -65742,7 +50363,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_transproxy_server_packets" lineno="89056"> +<interface name="corenet_receive_transproxy_server_packets" lineno="68168"> <summary> Receive transproxy_server packets. </summary> @@ -65753,7 +50374,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="89075"> +<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="68187"> <summary> Do not audit attempts to receive transproxy_server packets. </summary> @@ -65764,7 +50385,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_transproxy_server_packets" lineno="89094"> +<interface name="corenet_sendrecv_transproxy_server_packets" lineno="68206"> <summary> Send and receive transproxy_server packets. </summary> @@ -65775,7 +50396,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="89110"> +<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="68222"> <summary> Do not audit attempts to send and receive transproxy_server packets. </summary> @@ -65786,7 +50407,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_transproxy_server_packets" lineno="89125"> +<interface name="corenet_relabelto_transproxy_server_packets" lineno="68237"> <summary> Relabel packets to transproxy_server the packet type. </summary> @@ -65796,85 +50417,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="89147"> -<summary> -Send and receive TCP traffic on the trisoap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_trisoap_port" lineno="89162"> -<summary> -Send UDP traffic on the trisoap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="89177"> -<summary> -Do not audit attempts to send UDP traffic on the trisoap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_trisoap_port" lineno="89192"> -<summary> -Receive UDP traffic on the trisoap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="89207"> -<summary> -Do not audit attempts to receive UDP traffic on the trisoap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_trisoap_port" lineno="89222"> -<summary> -Send and receive UDP traffic on the trisoap port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="89238"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the trisoap port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_trisoap_port" lineno="89253"> +<interface name="corenet_tcp_bind_trisoap_port" lineno="68259"> <summary> Bind TCP sockets to the trisoap port. </summary> @@ -65885,7 +50428,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_trisoap_port" lineno="89273"> +<interface name="corenet_udp_bind_trisoap_port" lineno="68279"> <summary> Bind UDP sockets to the trisoap port. </summary> @@ -65896,7 +50439,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_trisoap_port" lineno="89292"> +<interface name="corenet_tcp_connect_trisoap_port" lineno="68298"> <summary> Make a TCP connection to the trisoap port. </summary> @@ -65906,7 +50449,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_trisoap_client_packets" lineno="89312"> +<interface name="corenet_send_trisoap_client_packets" lineno="68318"> <summary> Send trisoap_client packets. </summary> @@ -65917,7 +50460,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="89331"> +<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="68337"> <summary> Do not audit attempts to send trisoap_client packets. </summary> @@ -65928,7 +50471,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_trisoap_client_packets" lineno="89350"> +<interface name="corenet_receive_trisoap_client_packets" lineno="68356"> <summary> Receive trisoap_client packets. </summary> @@ -65939,7 +50482,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="89369"> +<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="68375"> <summary> Do not audit attempts to receive trisoap_client packets. </summary> @@ -65950,7 +50493,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_trisoap_client_packets" lineno="89388"> +<interface name="corenet_sendrecv_trisoap_client_packets" lineno="68394"> <summary> Send and receive trisoap_client packets. </summary> @@ -65961,7 +50504,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="89404"> +<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="68410"> <summary> Do not audit attempts to send and receive trisoap_client packets. </summary> @@ -65972,7 +50515,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_trisoap_client_packets" lineno="89419"> +<interface name="corenet_relabelto_trisoap_client_packets" lineno="68425"> <summary> Relabel packets to trisoap_client the packet type. </summary> @@ -65982,7 +50525,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_trisoap_server_packets" lineno="89439"> +<interface name="corenet_send_trisoap_server_packets" lineno="68445"> <summary> Send trisoap_server packets. </summary> @@ -65993,7 +50536,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89458"> +<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="68464"> <summary> Do not audit attempts to send trisoap_server packets. </summary> @@ -66004,7 +50547,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_trisoap_server_packets" lineno="89477"> +<interface name="corenet_receive_trisoap_server_packets" lineno="68483"> <summary> Receive trisoap_server packets. </summary> @@ -66015,7 +50558,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89496"> +<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="68502"> <summary> Do not audit attempts to receive trisoap_server packets. </summary> @@ -66026,7 +50569,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89515"> +<interface name="corenet_sendrecv_trisoap_server_packets" lineno="68521"> <summary> Send and receive trisoap_server packets. </summary> @@ -66037,7 +50580,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89531"> +<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="68537"> <summary> Do not audit attempts to send and receive trisoap_server packets. </summary> @@ -66048,7 +50591,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_trisoap_server_packets" lineno="89546"> +<interface name="corenet_relabelto_trisoap_server_packets" lineno="68552"> <summary> Relabel packets to trisoap_server the packet type. </summary> @@ -66058,85 +50601,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89568"> -<summary> -Send and receive TCP traffic on the trivnet1 port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_trivnet1_port" lineno="89583"> -<summary> -Send UDP traffic on the trivnet1 port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89598"> -<summary> -Do not audit attempts to send UDP traffic on the trivnet1 port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_trivnet1_port" lineno="89613"> -<summary> -Receive UDP traffic on the trivnet1 port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89628"> -<summary> -Do not audit attempts to receive UDP traffic on the trivnet1 port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89643"> -<summary> -Send and receive UDP traffic on the trivnet1 port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89659"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the trivnet1 port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_trivnet1_port" lineno="89674"> +<interface name="corenet_tcp_bind_trivnet1_port" lineno="68574"> <summary> Bind TCP sockets to the trivnet1 port. </summary> @@ -66147,7 +50612,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_trivnet1_port" lineno="89694"> +<interface name="corenet_udp_bind_trivnet1_port" lineno="68594"> <summary> Bind UDP sockets to the trivnet1 port. </summary> @@ -66158,7 +50623,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_trivnet1_port" lineno="89713"> +<interface name="corenet_tcp_connect_trivnet1_port" lineno="68613"> <summary> Make a TCP connection to the trivnet1 port. </summary> @@ -66168,7 +50633,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_trivnet1_client_packets" lineno="89733"> +<interface name="corenet_send_trivnet1_client_packets" lineno="68633"> <summary> Send trivnet1_client packets. </summary> @@ -66179,7 +50644,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89752"> +<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="68652"> <summary> Do not audit attempts to send trivnet1_client packets. </summary> @@ -66190,7 +50655,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_trivnet1_client_packets" lineno="89771"> +<interface name="corenet_receive_trivnet1_client_packets" lineno="68671"> <summary> Receive trivnet1_client packets. </summary> @@ -66201,7 +50666,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89790"> +<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="68690"> <summary> Do not audit attempts to receive trivnet1_client packets. </summary> @@ -66212,7 +50677,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89809"> +<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="68709"> <summary> Send and receive trivnet1_client packets. </summary> @@ -66223,7 +50688,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89825"> +<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="68725"> <summary> Do not audit attempts to send and receive trivnet1_client packets. </summary> @@ -66234,7 +50699,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89840"> +<interface name="corenet_relabelto_trivnet1_client_packets" lineno="68740"> <summary> Relabel packets to trivnet1_client the packet type. </summary> @@ -66244,7 +50709,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_trivnet1_server_packets" lineno="89860"> +<interface name="corenet_send_trivnet1_server_packets" lineno="68760"> <summary> Send trivnet1_server packets. </summary> @@ -66255,7 +50720,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89879"> +<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="68779"> <summary> Do not audit attempts to send trivnet1_server packets. </summary> @@ -66266,7 +50731,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_trivnet1_server_packets" lineno="89898"> +<interface name="corenet_receive_trivnet1_server_packets" lineno="68798"> <summary> Receive trivnet1_server packets. </summary> @@ -66277,7 +50742,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89917"> +<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="68817"> <summary> Do not audit attempts to receive trivnet1_server packets. </summary> @@ -66288,7 +50753,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89936"> +<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="68836"> <summary> Send and receive trivnet1_server packets. </summary> @@ -66299,7 +50764,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89952"> +<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="68852"> <summary> Do not audit attempts to send and receive trivnet1_server packets. </summary> @@ -66310,7 +50775,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89967"> +<interface name="corenet_relabelto_trivnet1_server_packets" lineno="68867"> <summary> Relabel packets to trivnet1_server the packet type. </summary> @@ -66320,85 +50785,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_ups_port" lineno="89989"> -<summary> -Send and receive TCP traffic on the ups port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_ups_port" lineno="90004"> -<summary> -Send UDP traffic on the ups port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_ups_port" lineno="90019"> -<summary> -Do not audit attempts to send UDP traffic on the ups port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_ups_port" lineno="90034"> -<summary> -Receive UDP traffic on the ups port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="90049"> -<summary> -Do not audit attempts to receive UDP traffic on the ups port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_ups_port" lineno="90064"> -<summary> -Send and receive UDP traffic on the ups port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="90080"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the ups port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_ups_port" lineno="90095"> +<interface name="corenet_tcp_bind_ups_port" lineno="68889"> <summary> Bind TCP sockets to the ups port. </summary> @@ -66409,7 +50796,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_ups_port" lineno="90115"> +<interface name="corenet_udp_bind_ups_port" lineno="68909"> <summary> Bind UDP sockets to the ups port. </summary> @@ -66420,7 +50807,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_ups_port" lineno="90134"> +<interface name="corenet_tcp_connect_ups_port" lineno="68928"> <summary> Make a TCP connection to the ups port. </summary> @@ -66430,7 +50817,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ups_client_packets" lineno="90154"> +<interface name="corenet_send_ups_client_packets" lineno="68948"> <summary> Send ups_client packets. </summary> @@ -66441,7 +50828,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ups_client_packets" lineno="90173"> +<interface name="corenet_dontaudit_send_ups_client_packets" lineno="68967"> <summary> Do not audit attempts to send ups_client packets. </summary> @@ -66452,7 +50839,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ups_client_packets" lineno="90192"> +<interface name="corenet_receive_ups_client_packets" lineno="68986"> <summary> Receive ups_client packets. </summary> @@ -66463,7 +50850,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="90211"> +<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="69005"> <summary> Do not audit attempts to receive ups_client packets. </summary> @@ -66474,7 +50861,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ups_client_packets" lineno="90230"> +<interface name="corenet_sendrecv_ups_client_packets" lineno="69024"> <summary> Send and receive ups_client packets. </summary> @@ -66485,7 +50872,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="90246"> +<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="69040"> <summary> Do not audit attempts to send and receive ups_client packets. </summary> @@ -66496,7 +50883,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ups_client_packets" lineno="90261"> +<interface name="corenet_relabelto_ups_client_packets" lineno="69055"> <summary> Relabel packets to ups_client the packet type. </summary> @@ -66506,7 +50893,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_ups_server_packets" lineno="90281"> +<interface name="corenet_send_ups_server_packets" lineno="69075"> <summary> Send ups_server packets. </summary> @@ -66517,7 +50904,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_ups_server_packets" lineno="90300"> +<interface name="corenet_dontaudit_send_ups_server_packets" lineno="69094"> <summary> Do not audit attempts to send ups_server packets. </summary> @@ -66528,7 +50915,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_ups_server_packets" lineno="90319"> +<interface name="corenet_receive_ups_server_packets" lineno="69113"> <summary> Receive ups_server packets. </summary> @@ -66539,7 +50926,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="90338"> +<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="69132"> <summary> Do not audit attempts to receive ups_server packets. </summary> @@ -66550,7 +50937,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_ups_server_packets" lineno="90357"> +<interface name="corenet_sendrecv_ups_server_packets" lineno="69151"> <summary> Send and receive ups_server packets. </summary> @@ -66561,7 +50948,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="90373"> +<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="69167"> <summary> Do not audit attempts to send and receive ups_server packets. </summary> @@ -66572,7 +50959,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_ups_server_packets" lineno="90388"> +<interface name="corenet_relabelto_ups_server_packets" lineno="69182"> <summary> Relabel packets to ups_server the packet type. </summary> @@ -66582,85 +50969,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="90410"> -<summary> -Send and receive TCP traffic on the utcpserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_utcpserver_port" lineno="90425"> -<summary> -Send UDP traffic on the utcpserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90440"> -<summary> -Do not audit attempts to send UDP traffic on the utcpserver port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_utcpserver_port" lineno="90455"> -<summary> -Receive UDP traffic on the utcpserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90470"> -<summary> -Do not audit attempts to receive UDP traffic on the utcpserver port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90485"> -<summary> -Send and receive UDP traffic on the utcpserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90501"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the utcpserver port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_utcpserver_port" lineno="90516"> +<interface name="corenet_tcp_bind_utcpserver_port" lineno="69204"> <summary> Bind TCP sockets to the utcpserver port. </summary> @@ -66671,7 +50980,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_utcpserver_port" lineno="90536"> +<interface name="corenet_udp_bind_utcpserver_port" lineno="69224"> <summary> Bind UDP sockets to the utcpserver port. </summary> @@ -66682,7 +50991,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_utcpserver_port" lineno="90555"> +<interface name="corenet_tcp_connect_utcpserver_port" lineno="69243"> <summary> Make a TCP connection to the utcpserver port. </summary> @@ -66692,7 +51001,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_utcpserver_client_packets" lineno="90575"> +<interface name="corenet_send_utcpserver_client_packets" lineno="69263"> <summary> Send utcpserver_client packets. </summary> @@ -66703,7 +51012,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90594"> +<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="69282"> <summary> Do not audit attempts to send utcpserver_client packets. </summary> @@ -66714,7 +51023,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_utcpserver_client_packets" lineno="90613"> +<interface name="corenet_receive_utcpserver_client_packets" lineno="69301"> <summary> Receive utcpserver_client packets. </summary> @@ -66725,7 +51034,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90632"> +<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="69320"> <summary> Do not audit attempts to receive utcpserver_client packets. </summary> @@ -66736,7 +51045,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90651"> +<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="69339"> <summary> Send and receive utcpserver_client packets. </summary> @@ -66747,7 +51056,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90667"> +<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="69355"> <summary> Do not audit attempts to send and receive utcpserver_client packets. </summary> @@ -66758,7 +51067,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90682"> +<interface name="corenet_relabelto_utcpserver_client_packets" lineno="69370"> <summary> Relabel packets to utcpserver_client the packet type. </summary> @@ -66768,7 +51077,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_utcpserver_server_packets" lineno="90702"> +<interface name="corenet_send_utcpserver_server_packets" lineno="69390"> <summary> Send utcpserver_server packets. </summary> @@ -66779,7 +51088,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90721"> +<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="69409"> <summary> Do not audit attempts to send utcpserver_server packets. </summary> @@ -66790,7 +51099,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_utcpserver_server_packets" lineno="90740"> +<interface name="corenet_receive_utcpserver_server_packets" lineno="69428"> <summary> Receive utcpserver_server packets. </summary> @@ -66801,7 +51110,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90759"> +<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="69447"> <summary> Do not audit attempts to receive utcpserver_server packets. </summary> @@ -66812,7 +51121,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90778"> +<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="69466"> <summary> Send and receive utcpserver_server packets. </summary> @@ -66823,7 +51132,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90794"> +<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="69482"> <summary> Do not audit attempts to send and receive utcpserver_server packets. </summary> @@ -66834,7 +51143,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90809"> +<interface name="corenet_relabelto_utcpserver_server_packets" lineno="69497"> <summary> Relabel packets to utcpserver_server the packet type. </summary> @@ -66844,85 +51153,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90831"> -<summary> -Send and receive TCP traffic on the uucpd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_uucpd_port" lineno="90846"> -<summary> -Send UDP traffic on the uucpd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90861"> -<summary> -Do not audit attempts to send UDP traffic on the uucpd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_uucpd_port" lineno="90876"> -<summary> -Receive UDP traffic on the uucpd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90891"> -<summary> -Do not audit attempts to receive UDP traffic on the uucpd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90906"> -<summary> -Send and receive UDP traffic on the uucpd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90922"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the uucpd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_uucpd_port" lineno="90937"> +<interface name="corenet_tcp_bind_uucpd_port" lineno="69519"> <summary> Bind TCP sockets to the uucpd port. </summary> @@ -66933,7 +51164,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_uucpd_port" lineno="90957"> +<interface name="corenet_udp_bind_uucpd_port" lineno="69539"> <summary> Bind UDP sockets to the uucpd port. </summary> @@ -66944,7 +51175,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_uucpd_port" lineno="90976"> +<interface name="corenet_tcp_connect_uucpd_port" lineno="69558"> <summary> Make a TCP connection to the uucpd port. </summary> @@ -66954,7 +51185,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_uucpd_client_packets" lineno="90996"> +<interface name="corenet_send_uucpd_client_packets" lineno="69578"> <summary> Send uucpd_client packets. </summary> @@ -66965,7 +51196,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="91015"> +<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="69597"> <summary> Do not audit attempts to send uucpd_client packets. </summary> @@ -66976,7 +51207,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_uucpd_client_packets" lineno="91034"> +<interface name="corenet_receive_uucpd_client_packets" lineno="69616"> <summary> Receive uucpd_client packets. </summary> @@ -66987,7 +51218,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="91053"> +<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="69635"> <summary> Do not audit attempts to receive uucpd_client packets. </summary> @@ -66998,7 +51229,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_uucpd_client_packets" lineno="91072"> +<interface name="corenet_sendrecv_uucpd_client_packets" lineno="69654"> <summary> Send and receive uucpd_client packets. </summary> @@ -67009,7 +51240,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="91088"> +<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="69670"> <summary> Do not audit attempts to send and receive uucpd_client packets. </summary> @@ -67020,7 +51251,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_uucpd_client_packets" lineno="91103"> +<interface name="corenet_relabelto_uucpd_client_packets" lineno="69685"> <summary> Relabel packets to uucpd_client the packet type. </summary> @@ -67030,7 +51261,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_uucpd_server_packets" lineno="91123"> +<interface name="corenet_send_uucpd_server_packets" lineno="69705"> <summary> Send uucpd_server packets. </summary> @@ -67041,7 +51272,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="91142"> +<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="69724"> <summary> Do not audit attempts to send uucpd_server packets. </summary> @@ -67052,7 +51283,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_uucpd_server_packets" lineno="91161"> +<interface name="corenet_receive_uucpd_server_packets" lineno="69743"> <summary> Receive uucpd_server packets. </summary> @@ -67063,7 +51294,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="91180"> +<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="69762"> <summary> Do not audit attempts to receive uucpd_server packets. </summary> @@ -67074,7 +51305,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_uucpd_server_packets" lineno="91199"> +<interface name="corenet_sendrecv_uucpd_server_packets" lineno="69781"> <summary> Send and receive uucpd_server packets. </summary> @@ -67085,7 +51316,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="91215"> +<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="69797"> <summary> Do not audit attempts to send and receive uucpd_server packets. </summary> @@ -67096,7 +51327,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_uucpd_server_packets" lineno="91230"> +<interface name="corenet_relabelto_uucpd_server_packets" lineno="69812"> <summary> Relabel packets to uucpd_server the packet type. </summary> @@ -67106,85 +51337,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="91252"> -<summary> -Send and receive TCP traffic on the varnishd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_varnishd_port" lineno="91267"> -<summary> -Send UDP traffic on the varnishd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="91282"> -<summary> -Do not audit attempts to send UDP traffic on the varnishd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_varnishd_port" lineno="91297"> -<summary> -Receive UDP traffic on the varnishd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="91312"> -<summary> -Do not audit attempts to receive UDP traffic on the varnishd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_varnishd_port" lineno="91327"> -<summary> -Send and receive UDP traffic on the varnishd port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="91343"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the varnishd port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_varnishd_port" lineno="91358"> +<interface name="corenet_tcp_bind_varnishd_port" lineno="69834"> <summary> Bind TCP sockets to the varnishd port. </summary> @@ -67195,7 +51348,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_varnishd_port" lineno="91378"> +<interface name="corenet_udp_bind_varnishd_port" lineno="69854"> <summary> Bind UDP sockets to the varnishd port. </summary> @@ -67206,7 +51359,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_varnishd_port" lineno="91397"> +<interface name="corenet_tcp_connect_varnishd_port" lineno="69873"> <summary> Make a TCP connection to the varnishd port. </summary> @@ -67216,7 +51369,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_varnishd_client_packets" lineno="91417"> +<interface name="corenet_send_varnishd_client_packets" lineno="69893"> <summary> Send varnishd_client packets. </summary> @@ -67227,7 +51380,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="91436"> +<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="69912"> <summary> Do not audit attempts to send varnishd_client packets. </summary> @@ -67238,7 +51391,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_varnishd_client_packets" lineno="91455"> +<interface name="corenet_receive_varnishd_client_packets" lineno="69931"> <summary> Receive varnishd_client packets. </summary> @@ -67249,7 +51402,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91474"> +<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="69950"> <summary> Do not audit attempts to receive varnishd_client packets. </summary> @@ -67260,7 +51413,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91493"> +<interface name="corenet_sendrecv_varnishd_client_packets" lineno="69969"> <summary> Send and receive varnishd_client packets. </summary> @@ -67271,7 +51424,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91509"> +<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="69985"> <summary> Do not audit attempts to send and receive varnishd_client packets. </summary> @@ -67282,7 +51435,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_varnishd_client_packets" lineno="91524"> +<interface name="corenet_relabelto_varnishd_client_packets" lineno="70000"> <summary> Relabel packets to varnishd_client the packet type. </summary> @@ -67292,7 +51445,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_varnishd_server_packets" lineno="91544"> +<interface name="corenet_send_varnishd_server_packets" lineno="70020"> <summary> Send varnishd_server packets. </summary> @@ -67303,7 +51456,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91563"> +<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="70039"> <summary> Do not audit attempts to send varnishd_server packets. </summary> @@ -67314,7 +51467,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_varnishd_server_packets" lineno="91582"> +<interface name="corenet_receive_varnishd_server_packets" lineno="70058"> <summary> Receive varnishd_server packets. </summary> @@ -67325,7 +51478,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91601"> +<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="70077"> <summary> Do not audit attempts to receive varnishd_server packets. </summary> @@ -67336,7 +51489,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91620"> +<interface name="corenet_sendrecv_varnishd_server_packets" lineno="70096"> <summary> Send and receive varnishd_server packets. </summary> @@ -67347,7 +51500,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91636"> +<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="70112"> <summary> Do not audit attempts to send and receive varnishd_server packets. </summary> @@ -67358,7 +51511,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_varnishd_server_packets" lineno="91651"> +<interface name="corenet_relabelto_varnishd_server_packets" lineno="70127"> <summary> Relabel packets to varnishd_server the packet type. </summary> @@ -67368,85 +51521,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_virt_port" lineno="91673"> -<summary> -Send and receive TCP traffic on the virt port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_virt_port" lineno="91688"> -<summary> -Send UDP traffic on the virt port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91703"> -<summary> -Do not audit attempts to send UDP traffic on the virt port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_virt_port" lineno="91718"> -<summary> -Receive UDP traffic on the virt port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91733"> -<summary> -Do not audit attempts to receive UDP traffic on the virt port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_virt_port" lineno="91748"> -<summary> -Send and receive UDP traffic on the virt port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91764"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the virt port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_virt_port" lineno="91779"> +<interface name="corenet_tcp_bind_virt_port" lineno="70149"> <summary> Bind TCP sockets to the virt port. </summary> @@ -67457,7 +51532,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_virt_port" lineno="91799"> +<interface name="corenet_udp_bind_virt_port" lineno="70169"> <summary> Bind UDP sockets to the virt port. </summary> @@ -67468,7 +51543,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_virt_port" lineno="91818"> +<interface name="corenet_tcp_connect_virt_port" lineno="70188"> <summary> Make a TCP connection to the virt port. </summary> @@ -67478,7 +51553,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virt_client_packets" lineno="91838"> +<interface name="corenet_send_virt_client_packets" lineno="70208"> <summary> Send virt_client packets. </summary> @@ -67489,7 +51564,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91857"> +<interface name="corenet_dontaudit_send_virt_client_packets" lineno="70227"> <summary> Do not audit attempts to send virt_client packets. </summary> @@ -67500,7 +51575,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virt_client_packets" lineno="91876"> +<interface name="corenet_receive_virt_client_packets" lineno="70246"> <summary> Receive virt_client packets. </summary> @@ -67511,7 +51586,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91895"> +<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="70265"> <summary> Do not audit attempts to receive virt_client packets. </summary> @@ -67522,7 +51597,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virt_client_packets" lineno="91914"> +<interface name="corenet_sendrecv_virt_client_packets" lineno="70284"> <summary> Send and receive virt_client packets. </summary> @@ -67533,7 +51608,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91930"> +<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="70300"> <summary> Do not audit attempts to send and receive virt_client packets. </summary> @@ -67544,7 +51619,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virt_client_packets" lineno="91945"> +<interface name="corenet_relabelto_virt_client_packets" lineno="70315"> <summary> Relabel packets to virt_client the packet type. </summary> @@ -67554,7 +51629,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virt_server_packets" lineno="91965"> +<interface name="corenet_send_virt_server_packets" lineno="70335"> <summary> Send virt_server packets. </summary> @@ -67565,7 +51640,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91984"> +<interface name="corenet_dontaudit_send_virt_server_packets" lineno="70354"> <summary> Do not audit attempts to send virt_server packets. </summary> @@ -67576,7 +51651,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virt_server_packets" lineno="92003"> +<interface name="corenet_receive_virt_server_packets" lineno="70373"> <summary> Receive virt_server packets. </summary> @@ -67587,7 +51662,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="92022"> +<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="70392"> <summary> Do not audit attempts to receive virt_server packets. </summary> @@ -67598,7 +51673,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virt_server_packets" lineno="92041"> +<interface name="corenet_sendrecv_virt_server_packets" lineno="70411"> <summary> Send and receive virt_server packets. </summary> @@ -67609,7 +51684,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="92057"> +<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="70427"> <summary> Do not audit attempts to send and receive virt_server packets. </summary> @@ -67620,7 +51695,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virt_server_packets" lineno="92072"> +<interface name="corenet_relabelto_virt_server_packets" lineno="70442"> <summary> Relabel packets to virt_server the packet type. </summary> @@ -67630,85 +51705,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="92094"> -<summary> -Send and receive TCP traffic on the virtual_places port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_virtual_places_port" lineno="92109"> -<summary> -Send UDP traffic on the virtual_places port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="92124"> -<summary> -Do not audit attempts to send UDP traffic on the virtual_places port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_virtual_places_port" lineno="92139"> -<summary> -Receive UDP traffic on the virtual_places port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="92154"> -<summary> -Do not audit attempts to receive UDP traffic on the virtual_places port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="92169"> -<summary> -Send and receive UDP traffic on the virtual_places port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="92185"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the virtual_places port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_virtual_places_port" lineno="92200"> +<interface name="corenet_tcp_bind_virtual_places_port" lineno="70464"> <summary> Bind TCP sockets to the virtual_places port. </summary> @@ -67719,7 +51716,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_virtual_places_port" lineno="92220"> +<interface name="corenet_udp_bind_virtual_places_port" lineno="70484"> <summary> Bind UDP sockets to the virtual_places port. </summary> @@ -67730,7 +51727,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_virtual_places_port" lineno="92239"> +<interface name="corenet_tcp_connect_virtual_places_port" lineno="70503"> <summary> Make a TCP connection to the virtual_places port. </summary> @@ -67740,7 +51737,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virtual_places_client_packets" lineno="92259"> +<interface name="corenet_send_virtual_places_client_packets" lineno="70523"> <summary> Send virtual_places_client packets. </summary> @@ -67751,7 +51748,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="92278"> +<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="70542"> <summary> Do not audit attempts to send virtual_places_client packets. </summary> @@ -67762,7 +51759,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virtual_places_client_packets" lineno="92297"> +<interface name="corenet_receive_virtual_places_client_packets" lineno="70561"> <summary> Receive virtual_places_client packets. </summary> @@ -67773,7 +51770,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="92316"> +<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="70580"> <summary> Do not audit attempts to receive virtual_places_client packets. </summary> @@ -67784,7 +51781,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="92335"> +<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="70599"> <summary> Send and receive virtual_places_client packets. </summary> @@ -67795,7 +51792,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="92351"> +<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="70615"> <summary> Do not audit attempts to send and receive virtual_places_client packets. </summary> @@ -67806,7 +51803,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virtual_places_client_packets" lineno="92366"> +<interface name="corenet_relabelto_virtual_places_client_packets" lineno="70630"> <summary> Relabel packets to virtual_places_client the packet type. </summary> @@ -67816,7 +51813,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virtual_places_server_packets" lineno="92386"> +<interface name="corenet_send_virtual_places_server_packets" lineno="70650"> <summary> Send virtual_places_server packets. </summary> @@ -67827,7 +51824,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="92405"> +<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="70669"> <summary> Do not audit attempts to send virtual_places_server packets. </summary> @@ -67838,7 +51835,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virtual_places_server_packets" lineno="92424"> +<interface name="corenet_receive_virtual_places_server_packets" lineno="70688"> <summary> Receive virtual_places_server packets. </summary> @@ -67849,7 +51846,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92443"> +<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="70707"> <summary> Do not audit attempts to receive virtual_places_server packets. </summary> @@ -67860,7 +51857,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92462"> +<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="70726"> <summary> Send and receive virtual_places_server packets. </summary> @@ -67871,7 +51868,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92478"> +<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="70742"> <summary> Do not audit attempts to send and receive virtual_places_server packets. </summary> @@ -67882,7 +51879,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92493"> +<interface name="corenet_relabelto_virtual_places_server_packets" lineno="70757"> <summary> Relabel packets to virtual_places_server the packet type. </summary> @@ -67892,85 +51889,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92515"> -<summary> -Send and receive TCP traffic on the virt_migration port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_virt_migration_port" lineno="92530"> -<summary> -Send UDP traffic on the virt_migration port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92545"> -<summary> -Do not audit attempts to send UDP traffic on the virt_migration port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_virt_migration_port" lineno="92560"> -<summary> -Receive UDP traffic on the virt_migration port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92575"> -<summary> -Do not audit attempts to receive UDP traffic on the virt_migration port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92590"> -<summary> -Send and receive UDP traffic on the virt_migration port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92606"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the virt_migration port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_virt_migration_port" lineno="92621"> +<interface name="corenet_tcp_bind_virt_migration_port" lineno="70779"> <summary> Bind TCP sockets to the virt_migration port. </summary> @@ -67981,7 +51900,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_virt_migration_port" lineno="92641"> +<interface name="corenet_udp_bind_virt_migration_port" lineno="70799"> <summary> Bind UDP sockets to the virt_migration port. </summary> @@ -67992,7 +51911,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_virt_migration_port" lineno="92660"> +<interface name="corenet_tcp_connect_virt_migration_port" lineno="70818"> <summary> Make a TCP connection to the virt_migration port. </summary> @@ -68002,7 +51921,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virt_migration_client_packets" lineno="92680"> +<interface name="corenet_send_virt_migration_client_packets" lineno="70838"> <summary> Send virt_migration_client packets. </summary> @@ -68013,7 +51932,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92699"> +<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="70857"> <summary> Do not audit attempts to send virt_migration_client packets. </summary> @@ -68024,7 +51943,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virt_migration_client_packets" lineno="92718"> +<interface name="corenet_receive_virt_migration_client_packets" lineno="70876"> <summary> Receive virt_migration_client packets. </summary> @@ -68035,7 +51954,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92737"> +<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="70895"> <summary> Do not audit attempts to receive virt_migration_client packets. </summary> @@ -68046,7 +51965,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92756"> +<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="70914"> <summary> Send and receive virt_migration_client packets. </summary> @@ -68057,7 +51976,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92772"> +<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="70930"> <summary> Do not audit attempts to send and receive virt_migration_client packets. </summary> @@ -68068,7 +51987,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92787"> +<interface name="corenet_relabelto_virt_migration_client_packets" lineno="70945"> <summary> Relabel packets to virt_migration_client the packet type. </summary> @@ -68078,7 +51997,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_virt_migration_server_packets" lineno="92807"> +<interface name="corenet_send_virt_migration_server_packets" lineno="70965"> <summary> Send virt_migration_server packets. </summary> @@ -68089,7 +52008,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92826"> +<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="70984"> <summary> Do not audit attempts to send virt_migration_server packets. </summary> @@ -68100,7 +52019,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_virt_migration_server_packets" lineno="92845"> +<interface name="corenet_receive_virt_migration_server_packets" lineno="71003"> <summary> Receive virt_migration_server packets. </summary> @@ -68111,7 +52030,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92864"> +<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="71022"> <summary> Do not audit attempts to receive virt_migration_server packets. </summary> @@ -68122,7 +52041,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92883"> +<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="71041"> <summary> Send and receive virt_migration_server packets. </summary> @@ -68133,7 +52052,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92899"> +<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="71057"> <summary> Do not audit attempts to send and receive virt_migration_server packets. </summary> @@ -68144,7 +52063,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92914"> +<interface name="corenet_relabelto_virt_migration_server_packets" lineno="71072"> <summary> Relabel packets to virt_migration_server the packet type. </summary> @@ -68154,85 +52073,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92936"> -<summary> -Send and receive TCP traffic on the vnc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_vnc_port" lineno="92951"> -<summary> -Send UDP traffic on the vnc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92966"> -<summary> -Do not audit attempts to send UDP traffic on the vnc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_vnc_port" lineno="92981"> -<summary> -Receive UDP traffic on the vnc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92996"> -<summary> -Do not audit attempts to receive UDP traffic on the vnc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_vnc_port" lineno="93011"> -<summary> -Send and receive UDP traffic on the vnc port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="93027"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the vnc port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_vnc_port" lineno="93042"> +<interface name="corenet_tcp_bind_vnc_port" lineno="71094"> <summary> Bind TCP sockets to the vnc port. </summary> @@ -68243,7 +52084,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_vnc_port" lineno="93062"> +<interface name="corenet_udp_bind_vnc_port" lineno="71114"> <summary> Bind UDP sockets to the vnc port. </summary> @@ -68254,7 +52095,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_vnc_port" lineno="93081"> +<interface name="corenet_tcp_connect_vnc_port" lineno="71133"> <summary> Make a TCP connection to the vnc port. </summary> @@ -68264,7 +52105,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_vnc_client_packets" lineno="93101"> +<interface name="corenet_send_vnc_client_packets" lineno="71153"> <summary> Send vnc_client packets. </summary> @@ -68275,7 +52116,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="93120"> +<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="71172"> <summary> Do not audit attempts to send vnc_client packets. </summary> @@ -68286,7 +52127,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_vnc_client_packets" lineno="93139"> +<interface name="corenet_receive_vnc_client_packets" lineno="71191"> <summary> Receive vnc_client packets. </summary> @@ -68297,7 +52138,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="93158"> +<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="71210"> <summary> Do not audit attempts to receive vnc_client packets. </summary> @@ -68308,7 +52149,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_vnc_client_packets" lineno="93177"> +<interface name="corenet_sendrecv_vnc_client_packets" lineno="71229"> <summary> Send and receive vnc_client packets. </summary> @@ -68319,7 +52160,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="93193"> +<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="71245"> <summary> Do not audit attempts to send and receive vnc_client packets. </summary> @@ -68330,7 +52171,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_vnc_client_packets" lineno="93208"> +<interface name="corenet_relabelto_vnc_client_packets" lineno="71260"> <summary> Relabel packets to vnc_client the packet type. </summary> @@ -68340,7 +52181,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_vnc_server_packets" lineno="93228"> +<interface name="corenet_send_vnc_server_packets" lineno="71280"> <summary> Send vnc_server packets. </summary> @@ -68351,7 +52192,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="93247"> +<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="71299"> <summary> Do not audit attempts to send vnc_server packets. </summary> @@ -68362,7 +52203,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_vnc_server_packets" lineno="93266"> +<interface name="corenet_receive_vnc_server_packets" lineno="71318"> <summary> Receive vnc_server packets. </summary> @@ -68373,7 +52214,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="93285"> +<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="71337"> <summary> Do not audit attempts to receive vnc_server packets. </summary> @@ -68384,7 +52225,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_vnc_server_packets" lineno="93304"> +<interface name="corenet_sendrecv_vnc_server_packets" lineno="71356"> <summary> Send and receive vnc_server packets. </summary> @@ -68395,7 +52236,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="93320"> +<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="71372"> <summary> Do not audit attempts to send and receive vnc_server packets. </summary> @@ -68406,7 +52247,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_vnc_server_packets" lineno="93335"> +<interface name="corenet_relabelto_vnc_server_packets" lineno="71387"> <summary> Relabel packets to vnc_server the packet type. </summary> @@ -68416,85 +52257,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_wccp_port" lineno="93357"> -<summary> -Send and receive TCP traffic on the wccp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_wccp_port" lineno="93372"> -<summary> -Send UDP traffic on the wccp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="93387"> -<summary> -Do not audit attempts to send UDP traffic on the wccp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_wccp_port" lineno="93402"> -<summary> -Receive UDP traffic on the wccp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="93417"> -<summary> -Do not audit attempts to receive UDP traffic on the wccp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_wccp_port" lineno="93432"> -<summary> -Send and receive UDP traffic on the wccp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93448"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the wccp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_wccp_port" lineno="93463"> +<interface name="corenet_tcp_bind_wccp_port" lineno="71409"> <summary> Bind TCP sockets to the wccp port. </summary> @@ -68505,7 +52268,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_wccp_port" lineno="93483"> +<interface name="corenet_udp_bind_wccp_port" lineno="71429"> <summary> Bind UDP sockets to the wccp port. </summary> @@ -68516,7 +52279,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_wccp_port" lineno="93502"> +<interface name="corenet_tcp_connect_wccp_port" lineno="71448"> <summary> Make a TCP connection to the wccp port. </summary> @@ -68526,7 +52289,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wccp_client_packets" lineno="93522"> +<interface name="corenet_send_wccp_client_packets" lineno="71468"> <summary> Send wccp_client packets. </summary> @@ -68537,7 +52300,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93541"> +<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="71487"> <summary> Do not audit attempts to send wccp_client packets. </summary> @@ -68548,7 +52311,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wccp_client_packets" lineno="93560"> +<interface name="corenet_receive_wccp_client_packets" lineno="71506"> <summary> Receive wccp_client packets. </summary> @@ -68559,7 +52322,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93579"> +<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="71525"> <summary> Do not audit attempts to receive wccp_client packets. </summary> @@ -68570,7 +52333,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wccp_client_packets" lineno="93598"> +<interface name="corenet_sendrecv_wccp_client_packets" lineno="71544"> <summary> Send and receive wccp_client packets. </summary> @@ -68581,7 +52344,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93614"> +<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="71560"> <summary> Do not audit attempts to send and receive wccp_client packets. </summary> @@ -68592,7 +52355,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wccp_client_packets" lineno="93629"> +<interface name="corenet_relabelto_wccp_client_packets" lineno="71575"> <summary> Relabel packets to wccp_client the packet type. </summary> @@ -68602,7 +52365,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wccp_server_packets" lineno="93649"> +<interface name="corenet_send_wccp_server_packets" lineno="71595"> <summary> Send wccp_server packets. </summary> @@ -68613,7 +52376,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93668"> +<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="71614"> <summary> Do not audit attempts to send wccp_server packets. </summary> @@ -68624,7 +52387,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wccp_server_packets" lineno="93687"> +<interface name="corenet_receive_wccp_server_packets" lineno="71633"> <summary> Receive wccp_server packets. </summary> @@ -68635,7 +52398,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93706"> +<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="71652"> <summary> Do not audit attempts to receive wccp_server packets. </summary> @@ -68646,7 +52409,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wccp_server_packets" lineno="93725"> +<interface name="corenet_sendrecv_wccp_server_packets" lineno="71671"> <summary> Send and receive wccp_server packets. </summary> @@ -68657,7 +52420,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93741"> +<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="71687"> <summary> Do not audit attempts to send and receive wccp_server packets. </summary> @@ -68668,7 +52431,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wccp_server_packets" lineno="93756"> +<interface name="corenet_relabelto_wccp_server_packets" lineno="71702"> <summary> Relabel packets to wccp_server the packet type. </summary> @@ -68678,85 +52441,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_websm_port" lineno="93778"> -<summary> -Send and receive TCP traffic on the websm port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_websm_port" lineno="93793"> -<summary> -Send UDP traffic on the websm port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93808"> -<summary> -Do not audit attempts to send UDP traffic on the websm port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_websm_port" lineno="93823"> -<summary> -Receive UDP traffic on the websm port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93838"> -<summary> -Do not audit attempts to receive UDP traffic on the websm port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_websm_port" lineno="93853"> -<summary> -Send and receive UDP traffic on the websm port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93869"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the websm port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_websm_port" lineno="93884"> +<interface name="corenet_tcp_bind_websm_port" lineno="71724"> <summary> Bind TCP sockets to the websm port. </summary> @@ -68767,7 +52452,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_websm_port" lineno="93904"> +<interface name="corenet_udp_bind_websm_port" lineno="71744"> <summary> Bind UDP sockets to the websm port. </summary> @@ -68778,7 +52463,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_websm_port" lineno="93923"> +<interface name="corenet_tcp_connect_websm_port" lineno="71763"> <summary> Make a TCP connection to the websm port. </summary> @@ -68788,7 +52473,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_websm_client_packets" lineno="93943"> +<interface name="corenet_send_websm_client_packets" lineno="71783"> <summary> Send websm_client packets. </summary> @@ -68799,7 +52484,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93962"> +<interface name="corenet_dontaudit_send_websm_client_packets" lineno="71802"> <summary> Do not audit attempts to send websm_client packets. </summary> @@ -68810,7 +52495,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_websm_client_packets" lineno="93981"> +<interface name="corenet_receive_websm_client_packets" lineno="71821"> <summary> Receive websm_client packets. </summary> @@ -68821,7 +52506,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="94000"> +<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="71840"> <summary> Do not audit attempts to receive websm_client packets. </summary> @@ -68832,7 +52517,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_websm_client_packets" lineno="94019"> +<interface name="corenet_sendrecv_websm_client_packets" lineno="71859"> <summary> Send and receive websm_client packets. </summary> @@ -68843,7 +52528,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="94035"> +<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="71875"> <summary> Do not audit attempts to send and receive websm_client packets. </summary> @@ -68854,7 +52539,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_websm_client_packets" lineno="94050"> +<interface name="corenet_relabelto_websm_client_packets" lineno="71890"> <summary> Relabel packets to websm_client the packet type. </summary> @@ -68864,7 +52549,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_websm_server_packets" lineno="94070"> +<interface name="corenet_send_websm_server_packets" lineno="71910"> <summary> Send websm_server packets. </summary> @@ -68875,7 +52560,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_websm_server_packets" lineno="94089"> +<interface name="corenet_dontaudit_send_websm_server_packets" lineno="71929"> <summary> Do not audit attempts to send websm_server packets. </summary> @@ -68886,7 +52571,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_websm_server_packets" lineno="94108"> +<interface name="corenet_receive_websm_server_packets" lineno="71948"> <summary> Receive websm_server packets. </summary> @@ -68897,7 +52582,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="94127"> +<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="71967"> <summary> Do not audit attempts to receive websm_server packets. </summary> @@ -68908,7 +52593,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_websm_server_packets" lineno="94146"> +<interface name="corenet_sendrecv_websm_server_packets" lineno="71986"> <summary> Send and receive websm_server packets. </summary> @@ -68919,7 +52604,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="94162"> +<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="72002"> <summary> Do not audit attempts to send and receive websm_server packets. </summary> @@ -68930,7 +52615,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_websm_server_packets" lineno="94177"> +<interface name="corenet_relabelto_websm_server_packets" lineno="72017"> <summary> Relabel packets to websm_server the packet type. </summary> @@ -68940,85 +52625,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_whois_port" lineno="94199"> -<summary> -Send and receive TCP traffic on the whois port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_whois_port" lineno="94214"> -<summary> -Send UDP traffic on the whois port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_whois_port" lineno="94229"> -<summary> -Do not audit attempts to send UDP traffic on the whois port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_whois_port" lineno="94244"> -<summary> -Receive UDP traffic on the whois port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="94259"> -<summary> -Do not audit attempts to receive UDP traffic on the whois port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_whois_port" lineno="94274"> -<summary> -Send and receive UDP traffic on the whois port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="94290"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the whois port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_whois_port" lineno="94305"> +<interface name="corenet_tcp_bind_whois_port" lineno="72039"> <summary> Bind TCP sockets to the whois port. </summary> @@ -69029,7 +52636,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_whois_port" lineno="94325"> +<interface name="corenet_udp_bind_whois_port" lineno="72059"> <summary> Bind UDP sockets to the whois port. </summary> @@ -69040,7 +52647,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_whois_port" lineno="94344"> +<interface name="corenet_tcp_connect_whois_port" lineno="72078"> <summary> Make a TCP connection to the whois port. </summary> @@ -69050,7 +52657,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_whois_client_packets" lineno="94364"> +<interface name="corenet_send_whois_client_packets" lineno="72098"> <summary> Send whois_client packets. </summary> @@ -69061,7 +52668,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_whois_client_packets" lineno="94383"> +<interface name="corenet_dontaudit_send_whois_client_packets" lineno="72117"> <summary> Do not audit attempts to send whois_client packets. </summary> @@ -69072,7 +52679,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_whois_client_packets" lineno="94402"> +<interface name="corenet_receive_whois_client_packets" lineno="72136"> <summary> Receive whois_client packets. </summary> @@ -69083,7 +52690,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="94421"> +<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="72155"> <summary> Do not audit attempts to receive whois_client packets. </summary> @@ -69094,7 +52701,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_whois_client_packets" lineno="94440"> +<interface name="corenet_sendrecv_whois_client_packets" lineno="72174"> <summary> Send and receive whois_client packets. </summary> @@ -69105,7 +52712,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94456"> +<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="72190"> <summary> Do not audit attempts to send and receive whois_client packets. </summary> @@ -69116,7 +52723,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_whois_client_packets" lineno="94471"> +<interface name="corenet_relabelto_whois_client_packets" lineno="72205"> <summary> Relabel packets to whois_client the packet type. </summary> @@ -69126,7 +52733,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_whois_server_packets" lineno="94491"> +<interface name="corenet_send_whois_server_packets" lineno="72225"> <summary> Send whois_server packets. </summary> @@ -69137,7 +52744,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94510"> +<interface name="corenet_dontaudit_send_whois_server_packets" lineno="72244"> <summary> Do not audit attempts to send whois_server packets. </summary> @@ -69148,7 +52755,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_whois_server_packets" lineno="94529"> +<interface name="corenet_receive_whois_server_packets" lineno="72263"> <summary> Receive whois_server packets. </summary> @@ -69159,7 +52766,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94548"> +<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="72282"> <summary> Do not audit attempts to receive whois_server packets. </summary> @@ -69170,7 +52777,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_whois_server_packets" lineno="94567"> +<interface name="corenet_sendrecv_whois_server_packets" lineno="72301"> <summary> Send and receive whois_server packets. </summary> @@ -69181,7 +52788,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94583"> +<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="72317"> <summary> Do not audit attempts to send and receive whois_server packets. </summary> @@ -69192,7 +52799,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_whois_server_packets" lineno="94598"> +<interface name="corenet_relabelto_whois_server_packets" lineno="72332"> <summary> Relabel packets to whois_server the packet type. </summary> @@ -69202,85 +52809,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94620"> -<summary> -Send and receive TCP traffic on the winshadow port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_winshadow_port" lineno="94635"> -<summary> -Send UDP traffic on the winshadow port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94650"> -<summary> -Do not audit attempts to send UDP traffic on the winshadow port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_winshadow_port" lineno="94665"> -<summary> -Receive UDP traffic on the winshadow port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94680"> -<summary> -Do not audit attempts to receive UDP traffic on the winshadow port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94695"> -<summary> -Send and receive UDP traffic on the winshadow port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94711"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the winshadow port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_winshadow_port" lineno="94726"> +<interface name="corenet_tcp_bind_winshadow_port" lineno="72354"> <summary> Bind TCP sockets to the winshadow port. </summary> @@ -69291,7 +52820,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_winshadow_port" lineno="94746"> +<interface name="corenet_udp_bind_winshadow_port" lineno="72374"> <summary> Bind UDP sockets to the winshadow port. </summary> @@ -69302,7 +52831,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_winshadow_port" lineno="94765"> +<interface name="corenet_tcp_connect_winshadow_port" lineno="72393"> <summary> Make a TCP connection to the winshadow port. </summary> @@ -69312,7 +52841,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_winshadow_client_packets" lineno="94785"> +<interface name="corenet_send_winshadow_client_packets" lineno="72413"> <summary> Send winshadow_client packets. </summary> @@ -69323,7 +52852,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94804"> +<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="72432"> <summary> Do not audit attempts to send winshadow_client packets. </summary> @@ -69334,7 +52863,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_winshadow_client_packets" lineno="94823"> +<interface name="corenet_receive_winshadow_client_packets" lineno="72451"> <summary> Receive winshadow_client packets. </summary> @@ -69345,7 +52874,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94842"> +<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="72470"> <summary> Do not audit attempts to receive winshadow_client packets. </summary> @@ -69356,7 +52885,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94861"> +<interface name="corenet_sendrecv_winshadow_client_packets" lineno="72489"> <summary> Send and receive winshadow_client packets. </summary> @@ -69367,7 +52896,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94877"> +<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="72505"> <summary> Do not audit attempts to send and receive winshadow_client packets. </summary> @@ -69378,7 +52907,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_winshadow_client_packets" lineno="94892"> +<interface name="corenet_relabelto_winshadow_client_packets" lineno="72520"> <summary> Relabel packets to winshadow_client the packet type. </summary> @@ -69388,7 +52917,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_winshadow_server_packets" lineno="94912"> +<interface name="corenet_send_winshadow_server_packets" lineno="72540"> <summary> Send winshadow_server packets. </summary> @@ -69399,7 +52928,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94931"> +<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="72559"> <summary> Do not audit attempts to send winshadow_server packets. </summary> @@ -69410,7 +52939,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_winshadow_server_packets" lineno="94950"> +<interface name="corenet_receive_winshadow_server_packets" lineno="72578"> <summary> Receive winshadow_server packets. </summary> @@ -69421,7 +52950,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94969"> +<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="72597"> <summary> Do not audit attempts to receive winshadow_server packets. </summary> @@ -69432,7 +52961,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94988"> +<interface name="corenet_sendrecv_winshadow_server_packets" lineno="72616"> <summary> Send and receive winshadow_server packets. </summary> @@ -69443,7 +52972,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="95004"> +<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="72632"> <summary> Do not audit attempts to send and receive winshadow_server packets. </summary> @@ -69454,7 +52983,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_winshadow_server_packets" lineno="95019"> +<interface name="corenet_relabelto_winshadow_server_packets" lineno="72647"> <summary> Relabel packets to winshadow_server the packet type. </summary> @@ -69464,85 +52993,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="95041"> -<summary> -Send and receive TCP traffic on the wsdapi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_wsdapi_port" lineno="95056"> -<summary> -Send UDP traffic on the wsdapi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="95071"> -<summary> -Do not audit attempts to send UDP traffic on the wsdapi port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_wsdapi_port" lineno="95086"> -<summary> -Receive UDP traffic on the wsdapi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="95101"> -<summary> -Do not audit attempts to receive UDP traffic on the wsdapi port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="95116"> -<summary> -Send and receive UDP traffic on the wsdapi port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="95132"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the wsdapi port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_wsdapi_port" lineno="95147"> +<interface name="corenet_tcp_bind_wsdapi_port" lineno="72669"> <summary> Bind TCP sockets to the wsdapi port. </summary> @@ -69553,7 +53004,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_wsdapi_port" lineno="95167"> +<interface name="corenet_udp_bind_wsdapi_port" lineno="72689"> <summary> Bind UDP sockets to the wsdapi port. </summary> @@ -69564,7 +53015,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_wsdapi_port" lineno="95186"> +<interface name="corenet_tcp_connect_wsdapi_port" lineno="72708"> <summary> Make a TCP connection to the wsdapi port. </summary> @@ -69574,7 +53025,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wsdapi_client_packets" lineno="95206"> +<interface name="corenet_send_wsdapi_client_packets" lineno="72728"> <summary> Send wsdapi_client packets. </summary> @@ -69585,7 +53036,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="95225"> +<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="72747"> <summary> Do not audit attempts to send wsdapi_client packets. </summary> @@ -69596,7 +53047,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wsdapi_client_packets" lineno="95244"> +<interface name="corenet_receive_wsdapi_client_packets" lineno="72766"> <summary> Receive wsdapi_client packets. </summary> @@ -69607,7 +53058,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="95263"> +<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="72785"> <summary> Do not audit attempts to receive wsdapi_client packets. </summary> @@ -69618,7 +53069,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="95282"> +<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="72804"> <summary> Send and receive wsdapi_client packets. </summary> @@ -69629,7 +53080,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="95298"> +<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="72820"> <summary> Do not audit attempts to send and receive wsdapi_client packets. </summary> @@ -69640,7 +53091,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wsdapi_client_packets" lineno="95313"> +<interface name="corenet_relabelto_wsdapi_client_packets" lineno="72835"> <summary> Relabel packets to wsdapi_client the packet type. </summary> @@ -69650,7 +53101,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wsdapi_server_packets" lineno="95333"> +<interface name="corenet_send_wsdapi_server_packets" lineno="72855"> <summary> Send wsdapi_server packets. </summary> @@ -69661,7 +53112,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="95352"> +<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="72874"> <summary> Do not audit attempts to send wsdapi_server packets. </summary> @@ -69672,7 +53123,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wsdapi_server_packets" lineno="95371"> +<interface name="corenet_receive_wsdapi_server_packets" lineno="72893"> <summary> Receive wsdapi_server packets. </summary> @@ -69683,7 +53134,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="95390"> +<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="72912"> <summary> Do not audit attempts to receive wsdapi_server packets. </summary> @@ -69694,7 +53145,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="95409"> +<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="72931"> <summary> Send and receive wsdapi_server packets. </summary> @@ -69705,7 +53156,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="95425"> +<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="72947"> <summary> Do not audit attempts to send and receive wsdapi_server packets. </summary> @@ -69716,7 +53167,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95440"> +<interface name="corenet_relabelto_wsdapi_server_packets" lineno="72962"> <summary> Relabel packets to wsdapi_server the packet type. </summary> @@ -69726,85 +53177,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95462"> -<summary> -Send and receive TCP traffic on the wsicopy port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_wsicopy_port" lineno="95477"> -<summary> -Send UDP traffic on the wsicopy port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95492"> -<summary> -Do not audit attempts to send UDP traffic on the wsicopy port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_wsicopy_port" lineno="95507"> -<summary> -Receive UDP traffic on the wsicopy port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95522"> -<summary> -Do not audit attempts to receive UDP traffic on the wsicopy port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95537"> -<summary> -Send and receive UDP traffic on the wsicopy port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95553"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the wsicopy port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_wsicopy_port" lineno="95568"> +<interface name="corenet_tcp_bind_wsicopy_port" lineno="72984"> <summary> Bind TCP sockets to the wsicopy port. </summary> @@ -69815,7 +53188,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_wsicopy_port" lineno="95588"> +<interface name="corenet_udp_bind_wsicopy_port" lineno="73004"> <summary> Bind UDP sockets to the wsicopy port. </summary> @@ -69826,7 +53199,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_wsicopy_port" lineno="95607"> +<interface name="corenet_tcp_connect_wsicopy_port" lineno="73023"> <summary> Make a TCP connection to the wsicopy port. </summary> @@ -69836,7 +53209,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wsicopy_client_packets" lineno="95627"> +<interface name="corenet_send_wsicopy_client_packets" lineno="73043"> <summary> Send wsicopy_client packets. </summary> @@ -69847,7 +53220,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95646"> +<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="73062"> <summary> Do not audit attempts to send wsicopy_client packets. </summary> @@ -69858,7 +53231,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wsicopy_client_packets" lineno="95665"> +<interface name="corenet_receive_wsicopy_client_packets" lineno="73081"> <summary> Receive wsicopy_client packets. </summary> @@ -69869,7 +53242,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95684"> +<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="73100"> <summary> Do not audit attempts to receive wsicopy_client packets. </summary> @@ -69880,7 +53253,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95703"> +<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="73119"> <summary> Send and receive wsicopy_client packets. </summary> @@ -69891,7 +53264,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95719"> +<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="73135"> <summary> Do not audit attempts to send and receive wsicopy_client packets. </summary> @@ -69902,7 +53275,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95734"> +<interface name="corenet_relabelto_wsicopy_client_packets" lineno="73150"> <summary> Relabel packets to wsicopy_client the packet type. </summary> @@ -69912,7 +53285,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_wsicopy_server_packets" lineno="95754"> +<interface name="corenet_send_wsicopy_server_packets" lineno="73170"> <summary> Send wsicopy_server packets. </summary> @@ -69923,7 +53296,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95773"> +<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="73189"> <summary> Do not audit attempts to send wsicopy_server packets. </summary> @@ -69934,7 +53307,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_wsicopy_server_packets" lineno="95792"> +<interface name="corenet_receive_wsicopy_server_packets" lineno="73208"> <summary> Receive wsicopy_server packets. </summary> @@ -69945,7 +53318,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95811"> +<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="73227"> <summary> Do not audit attempts to receive wsicopy_server packets. </summary> @@ -69956,7 +53329,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95830"> +<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="73246"> <summary> Send and receive wsicopy_server packets. </summary> @@ -69967,7 +53340,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95846"> +<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="73262"> <summary> Do not audit attempts to send and receive wsicopy_server packets. </summary> @@ -69978,7 +53351,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95861"> +<interface name="corenet_relabelto_wsicopy_server_packets" lineno="73277"> <summary> Relabel packets to wsicopy_server the packet type. </summary> @@ -69988,85 +53361,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95883"> -<summary> -Send and receive TCP traffic on the xdmcp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_xdmcp_port" lineno="95898"> -<summary> -Send UDP traffic on the xdmcp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95913"> -<summary> -Do not audit attempts to send UDP traffic on the xdmcp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_xdmcp_port" lineno="95928"> -<summary> -Receive UDP traffic on the xdmcp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95943"> -<summary> -Do not audit attempts to receive UDP traffic on the xdmcp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95958"> -<summary> -Send and receive UDP traffic on the xdmcp port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95974"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the xdmcp port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_xdmcp_port" lineno="95989"> +<interface name="corenet_tcp_bind_xdmcp_port" lineno="73299"> <summary> Bind TCP sockets to the xdmcp port. </summary> @@ -70077,7 +53372,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_xdmcp_port" lineno="96009"> +<interface name="corenet_udp_bind_xdmcp_port" lineno="73319"> <summary> Bind UDP sockets to the xdmcp port. </summary> @@ -70088,7 +53383,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_xdmcp_port" lineno="96028"> +<interface name="corenet_tcp_connect_xdmcp_port" lineno="73338"> <summary> Make a TCP connection to the xdmcp port. </summary> @@ -70098,7 +53393,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xdmcp_client_packets" lineno="96048"> +<interface name="corenet_send_xdmcp_client_packets" lineno="73358"> <summary> Send xdmcp_client packets. </summary> @@ -70109,7 +53404,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="96067"> +<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="73377"> <summary> Do not audit attempts to send xdmcp_client packets. </summary> @@ -70120,7 +53415,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xdmcp_client_packets" lineno="96086"> +<interface name="corenet_receive_xdmcp_client_packets" lineno="73396"> <summary> Receive xdmcp_client packets. </summary> @@ -70131,7 +53426,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="96105"> +<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="73415"> <summary> Do not audit attempts to receive xdmcp_client packets. </summary> @@ -70142,7 +53437,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="96124"> +<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="73434"> <summary> Send and receive xdmcp_client packets. </summary> @@ -70153,7 +53448,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="96140"> +<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="73450"> <summary> Do not audit attempts to send and receive xdmcp_client packets. </summary> @@ -70164,7 +53459,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xdmcp_client_packets" lineno="96155"> +<interface name="corenet_relabelto_xdmcp_client_packets" lineno="73465"> <summary> Relabel packets to xdmcp_client the packet type. </summary> @@ -70174,7 +53469,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xdmcp_server_packets" lineno="96175"> +<interface name="corenet_send_xdmcp_server_packets" lineno="73485"> <summary> Send xdmcp_server packets. </summary> @@ -70185,7 +53480,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="96194"> +<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="73504"> <summary> Do not audit attempts to send xdmcp_server packets. </summary> @@ -70196,7 +53491,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xdmcp_server_packets" lineno="96213"> +<interface name="corenet_receive_xdmcp_server_packets" lineno="73523"> <summary> Receive xdmcp_server packets. </summary> @@ -70207,7 +53502,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="96232"> +<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="73542"> <summary> Do not audit attempts to receive xdmcp_server packets. </summary> @@ -70218,7 +53513,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="96251"> +<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="73561"> <summary> Send and receive xdmcp_server packets. </summary> @@ -70229,7 +53524,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="96267"> +<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="73577"> <summary> Do not audit attempts to send and receive xdmcp_server packets. </summary> @@ -70240,7 +53535,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xdmcp_server_packets" lineno="96282"> +<interface name="corenet_relabelto_xdmcp_server_packets" lineno="73592"> <summary> Relabel packets to xdmcp_server the packet type. </summary> @@ -70250,85 +53545,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_xen_port" lineno="96304"> -<summary> -Send and receive TCP traffic on the xen port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_xen_port" lineno="96319"> -<summary> -Send UDP traffic on the xen port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_xen_port" lineno="96334"> -<summary> -Do not audit attempts to send UDP traffic on the xen port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_xen_port" lineno="96349"> -<summary> -Receive UDP traffic on the xen port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="96364"> -<summary> -Do not audit attempts to receive UDP traffic on the xen port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_xen_port" lineno="96379"> -<summary> -Send and receive UDP traffic on the xen port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="96395"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the xen port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_xen_port" lineno="96410"> +<interface name="corenet_tcp_bind_xen_port" lineno="73614"> <summary> Bind TCP sockets to the xen port. </summary> @@ -70339,7 +53556,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_xen_port" lineno="96430"> +<interface name="corenet_udp_bind_xen_port" lineno="73634"> <summary> Bind UDP sockets to the xen port. </summary> @@ -70350,7 +53567,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_xen_port" lineno="96449"> +<interface name="corenet_tcp_connect_xen_port" lineno="73653"> <summary> Make a TCP connection to the xen port. </summary> @@ -70360,7 +53577,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xen_client_packets" lineno="96469"> +<interface name="corenet_send_xen_client_packets" lineno="73673"> <summary> Send xen_client packets. </summary> @@ -70371,7 +53588,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96488"> +<interface name="corenet_dontaudit_send_xen_client_packets" lineno="73692"> <summary> Do not audit attempts to send xen_client packets. </summary> @@ -70382,7 +53599,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xen_client_packets" lineno="96507"> +<interface name="corenet_receive_xen_client_packets" lineno="73711"> <summary> Receive xen_client packets. </summary> @@ -70393,7 +53610,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96526"> +<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="73730"> <summary> Do not audit attempts to receive xen_client packets. </summary> @@ -70404,7 +53621,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xen_client_packets" lineno="96545"> +<interface name="corenet_sendrecv_xen_client_packets" lineno="73749"> <summary> Send and receive xen_client packets. </summary> @@ -70415,7 +53632,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96561"> +<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="73765"> <summary> Do not audit attempts to send and receive xen_client packets. </summary> @@ -70426,7 +53643,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xen_client_packets" lineno="96576"> +<interface name="corenet_relabelto_xen_client_packets" lineno="73780"> <summary> Relabel packets to xen_client the packet type. </summary> @@ -70436,7 +53653,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xen_server_packets" lineno="96596"> +<interface name="corenet_send_xen_server_packets" lineno="73800"> <summary> Send xen_server packets. </summary> @@ -70447,7 +53664,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96615"> +<interface name="corenet_dontaudit_send_xen_server_packets" lineno="73819"> <summary> Do not audit attempts to send xen_server packets. </summary> @@ -70458,7 +53675,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xen_server_packets" lineno="96634"> +<interface name="corenet_receive_xen_server_packets" lineno="73838"> <summary> Receive xen_server packets. </summary> @@ -70469,7 +53686,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96653"> +<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="73857"> <summary> Do not audit attempts to receive xen_server packets. </summary> @@ -70480,7 +53697,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xen_server_packets" lineno="96672"> +<interface name="corenet_sendrecv_xen_server_packets" lineno="73876"> <summary> Send and receive xen_server packets. </summary> @@ -70491,7 +53708,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96688"> +<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="73892"> <summary> Do not audit attempts to send and receive xen_server packets. </summary> @@ -70502,7 +53719,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xen_server_packets" lineno="96703"> +<interface name="corenet_relabelto_xen_server_packets" lineno="73907"> <summary> Relabel packets to xen_server the packet type. </summary> @@ -70512,85 +53729,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96725"> -<summary> -Send and receive TCP traffic on the xfs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_xfs_port" lineno="96740"> -<summary> -Send UDP traffic on the xfs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96755"> -<summary> -Do not audit attempts to send UDP traffic on the xfs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_xfs_port" lineno="96770"> -<summary> -Receive UDP traffic on the xfs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96785"> -<summary> -Do not audit attempts to receive UDP traffic on the xfs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_xfs_port" lineno="96800"> -<summary> -Send and receive UDP traffic on the xfs port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96816"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the xfs port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_xfs_port" lineno="96831"> +<interface name="corenet_tcp_bind_xfs_port" lineno="73929"> <summary> Bind TCP sockets to the xfs port. </summary> @@ -70601,7 +53740,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_xfs_port" lineno="96851"> +<interface name="corenet_udp_bind_xfs_port" lineno="73949"> <summary> Bind UDP sockets to the xfs port. </summary> @@ -70612,7 +53751,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_xfs_port" lineno="96870"> +<interface name="corenet_tcp_connect_xfs_port" lineno="73968"> <summary> Make a TCP connection to the xfs port. </summary> @@ -70622,7 +53761,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xfs_client_packets" lineno="96890"> +<interface name="corenet_send_xfs_client_packets" lineno="73988"> <summary> Send xfs_client packets. </summary> @@ -70633,7 +53772,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96909"> +<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="74007"> <summary> Do not audit attempts to send xfs_client packets. </summary> @@ -70644,7 +53783,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xfs_client_packets" lineno="96928"> +<interface name="corenet_receive_xfs_client_packets" lineno="74026"> <summary> Receive xfs_client packets. </summary> @@ -70655,7 +53794,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96947"> +<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="74045"> <summary> Do not audit attempts to receive xfs_client packets. </summary> @@ -70666,7 +53805,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xfs_client_packets" lineno="96966"> +<interface name="corenet_sendrecv_xfs_client_packets" lineno="74064"> <summary> Send and receive xfs_client packets. </summary> @@ -70677,7 +53816,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96982"> +<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="74080"> <summary> Do not audit attempts to send and receive xfs_client packets. </summary> @@ -70688,7 +53827,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xfs_client_packets" lineno="96997"> +<interface name="corenet_relabelto_xfs_client_packets" lineno="74095"> <summary> Relabel packets to xfs_client the packet type. </summary> @@ -70698,7 +53837,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xfs_server_packets" lineno="97017"> +<interface name="corenet_send_xfs_server_packets" lineno="74115"> <summary> Send xfs_server packets. </summary> @@ -70709,7 +53848,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="97036"> +<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="74134"> <summary> Do not audit attempts to send xfs_server packets. </summary> @@ -70720,7 +53859,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xfs_server_packets" lineno="97055"> +<interface name="corenet_receive_xfs_server_packets" lineno="74153"> <summary> Receive xfs_server packets. </summary> @@ -70731,7 +53870,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="97074"> +<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="74172"> <summary> Do not audit attempts to receive xfs_server packets. </summary> @@ -70742,7 +53881,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xfs_server_packets" lineno="97093"> +<interface name="corenet_sendrecv_xfs_server_packets" lineno="74191"> <summary> Send and receive xfs_server packets. </summary> @@ -70753,7 +53892,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="97109"> +<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="74207"> <summary> Do not audit attempts to send and receive xfs_server packets. </summary> @@ -70764,7 +53903,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xfs_server_packets" lineno="97124"> +<interface name="corenet_relabelto_xfs_server_packets" lineno="74222"> <summary> Relabel packets to xfs_server the packet type. </summary> @@ -70774,85 +53913,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_xserver_port" lineno="97146"> -<summary> -Send and receive TCP traffic on the xserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_xserver_port" lineno="97161"> -<summary> -Send UDP traffic on the xserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="97176"> -<summary> -Do not audit attempts to send UDP traffic on the xserver port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_xserver_port" lineno="97191"> -<summary> -Receive UDP traffic on the xserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="97206"> -<summary> -Do not audit attempts to receive UDP traffic on the xserver port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_xserver_port" lineno="97221"> -<summary> -Send and receive UDP traffic on the xserver port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="97237"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the xserver port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_xserver_port" lineno="97252"> +<interface name="corenet_tcp_bind_xserver_port" lineno="74244"> <summary> Bind TCP sockets to the xserver port. </summary> @@ -70863,7 +53924,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_xserver_port" lineno="97272"> +<interface name="corenet_udp_bind_xserver_port" lineno="74264"> <summary> Bind UDP sockets to the xserver port. </summary> @@ -70874,7 +53935,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_xserver_port" lineno="97291"> +<interface name="corenet_tcp_connect_xserver_port" lineno="74283"> <summary> Make a TCP connection to the xserver port. </summary> @@ -70884,7 +53945,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xserver_client_packets" lineno="97311"> +<interface name="corenet_send_xserver_client_packets" lineno="74303"> <summary> Send xserver_client packets. </summary> @@ -70895,7 +53956,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="97330"> +<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="74322"> <summary> Do not audit attempts to send xserver_client packets. </summary> @@ -70906,7 +53967,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xserver_client_packets" lineno="97349"> +<interface name="corenet_receive_xserver_client_packets" lineno="74341"> <summary> Receive xserver_client packets. </summary> @@ -70917,7 +53978,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="97368"> +<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="74360"> <summary> Do not audit attempts to receive xserver_client packets. </summary> @@ -70928,7 +53989,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xserver_client_packets" lineno="97387"> +<interface name="corenet_sendrecv_xserver_client_packets" lineno="74379"> <summary> Send and receive xserver_client packets. </summary> @@ -70939,7 +54000,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="97403"> +<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="74395"> <summary> Do not audit attempts to send and receive xserver_client packets. </summary> @@ -70950,7 +54011,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xserver_client_packets" lineno="97418"> +<interface name="corenet_relabelto_xserver_client_packets" lineno="74410"> <summary> Relabel packets to xserver_client the packet type. </summary> @@ -70960,7 +54021,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_xserver_server_packets" lineno="97438"> +<interface name="corenet_send_xserver_server_packets" lineno="74430"> <summary> Send xserver_server packets. </summary> @@ -70971,7 +54032,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97457"> +<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="74449"> <summary> Do not audit attempts to send xserver_server packets. </summary> @@ -70982,7 +54043,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_xserver_server_packets" lineno="97476"> +<interface name="corenet_receive_xserver_server_packets" lineno="74468"> <summary> Receive xserver_server packets. </summary> @@ -70993,7 +54054,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97495"> +<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="74487"> <summary> Do not audit attempts to receive xserver_server packets. </summary> @@ -71004,7 +54065,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_xserver_server_packets" lineno="97514"> +<interface name="corenet_sendrecv_xserver_server_packets" lineno="74506"> <summary> Send and receive xserver_server packets. </summary> @@ -71015,7 +54076,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97530"> +<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="74522"> <summary> Do not audit attempts to send and receive xserver_server packets. </summary> @@ -71026,7 +54087,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_xserver_server_packets" lineno="97545"> +<interface name="corenet_relabelto_xserver_server_packets" lineno="74537"> <summary> Relabel packets to xserver_server the packet type. </summary> @@ -71036,85 +54097,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97567"> -<summary> -Send and receive TCP traffic on the zarafa port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_zarafa_port" lineno="97582"> -<summary> -Send UDP traffic on the zarafa port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97597"> -<summary> -Do not audit attempts to send UDP traffic on the zarafa port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_zarafa_port" lineno="97612"> -<summary> -Receive UDP traffic on the zarafa port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97627"> -<summary> -Do not audit attempts to receive UDP traffic on the zarafa port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97642"> -<summary> -Send and receive UDP traffic on the zarafa port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97658"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the zarafa port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_zarafa_port" lineno="97673"> +<interface name="corenet_tcp_bind_zarafa_port" lineno="74559"> <summary> Bind TCP sockets to the zarafa port. </summary> @@ -71125,7 +54108,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zarafa_port" lineno="97693"> +<interface name="corenet_udp_bind_zarafa_port" lineno="74579"> <summary> Bind UDP sockets to the zarafa port. </summary> @@ -71136,7 +54119,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zarafa_port" lineno="97712"> +<interface name="corenet_tcp_connect_zarafa_port" lineno="74598"> <summary> Make a TCP connection to the zarafa port. </summary> @@ -71146,7 +54129,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zarafa_client_packets" lineno="97732"> +<interface name="corenet_send_zarafa_client_packets" lineno="74618"> <summary> Send zarafa_client packets. </summary> @@ -71157,7 +54140,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97751"> +<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="74637"> <summary> Do not audit attempts to send zarafa_client packets. </summary> @@ -71168,7 +54151,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zarafa_client_packets" lineno="97770"> +<interface name="corenet_receive_zarafa_client_packets" lineno="74656"> <summary> Receive zarafa_client packets. </summary> @@ -71179,7 +54162,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97789"> +<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="74675"> <summary> Do not audit attempts to receive zarafa_client packets. </summary> @@ -71190,7 +54173,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97808"> +<interface name="corenet_sendrecv_zarafa_client_packets" lineno="74694"> <summary> Send and receive zarafa_client packets. </summary> @@ -71201,7 +54184,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97824"> +<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="74710"> <summary> Do not audit attempts to send and receive zarafa_client packets. </summary> @@ -71212,7 +54195,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zarafa_client_packets" lineno="97839"> +<interface name="corenet_relabelto_zarafa_client_packets" lineno="74725"> <summary> Relabel packets to zarafa_client the packet type. </summary> @@ -71222,7 +54205,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zarafa_server_packets" lineno="97859"> +<interface name="corenet_send_zarafa_server_packets" lineno="74745"> <summary> Send zarafa_server packets. </summary> @@ -71233,7 +54216,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97878"> +<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="74764"> <summary> Do not audit attempts to send zarafa_server packets. </summary> @@ -71244,7 +54227,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zarafa_server_packets" lineno="97897"> +<interface name="corenet_receive_zarafa_server_packets" lineno="74783"> <summary> Receive zarafa_server packets. </summary> @@ -71255,7 +54238,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97916"> +<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="74802"> <summary> Do not audit attempts to receive zarafa_server packets. </summary> @@ -71266,7 +54249,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97935"> +<interface name="corenet_sendrecv_zarafa_server_packets" lineno="74821"> <summary> Send and receive zarafa_server packets. </summary> @@ -71277,7 +54260,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97951"> +<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="74837"> <summary> Do not audit attempts to send and receive zarafa_server packets. </summary> @@ -71288,7 +54271,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zarafa_server_packets" lineno="97966"> +<interface name="corenet_relabelto_zarafa_server_packets" lineno="74852"> <summary> Relabel packets to zarafa_server the packet type. </summary> @@ -71298,85 +54281,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97988"> -<summary> -Send and receive TCP traffic on the zabbix port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_zabbix_port" lineno="98003"> -<summary> -Send UDP traffic on the zabbix port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="98018"> -<summary> -Do not audit attempts to send UDP traffic on the zabbix port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_zabbix_port" lineno="98033"> -<summary> -Receive UDP traffic on the zabbix port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="98048"> -<summary> -Do not audit attempts to receive UDP traffic on the zabbix port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_zabbix_port" lineno="98063"> -<summary> -Send and receive UDP traffic on the zabbix port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="98079"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the zabbix port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_zabbix_port" lineno="98094"> +<interface name="corenet_tcp_bind_zabbix_port" lineno="74874"> <summary> Bind TCP sockets to the zabbix port. </summary> @@ -71387,7 +54292,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zabbix_port" lineno="98114"> +<interface name="corenet_udp_bind_zabbix_port" lineno="74894"> <summary> Bind UDP sockets to the zabbix port. </summary> @@ -71398,7 +54303,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zabbix_port" lineno="98133"> +<interface name="corenet_tcp_connect_zabbix_port" lineno="74913"> <summary> Make a TCP connection to the zabbix port. </summary> @@ -71408,7 +54313,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zabbix_client_packets" lineno="98153"> +<interface name="corenet_send_zabbix_client_packets" lineno="74933"> <summary> Send zabbix_client packets. </summary> @@ -71419,7 +54324,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="98172"> +<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="74952"> <summary> Do not audit attempts to send zabbix_client packets. </summary> @@ -71430,7 +54335,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zabbix_client_packets" lineno="98191"> +<interface name="corenet_receive_zabbix_client_packets" lineno="74971"> <summary> Receive zabbix_client packets. </summary> @@ -71441,7 +54346,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="98210"> +<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="74990"> <summary> Do not audit attempts to receive zabbix_client packets. </summary> @@ -71452,7 +54357,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zabbix_client_packets" lineno="98229"> +<interface name="corenet_sendrecv_zabbix_client_packets" lineno="75009"> <summary> Send and receive zabbix_client packets. </summary> @@ -71463,7 +54368,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="98245"> +<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="75025"> <summary> Do not audit attempts to send and receive zabbix_client packets. </summary> @@ -71474,7 +54379,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zabbix_client_packets" lineno="98260"> +<interface name="corenet_relabelto_zabbix_client_packets" lineno="75040"> <summary> Relabel packets to zabbix_client the packet type. </summary> @@ -71484,7 +54389,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zabbix_server_packets" lineno="98280"> +<interface name="corenet_send_zabbix_server_packets" lineno="75060"> <summary> Send zabbix_server packets. </summary> @@ -71495,7 +54400,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="98299"> +<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="75079"> <summary> Do not audit attempts to send zabbix_server packets. </summary> @@ -71506,7 +54411,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zabbix_server_packets" lineno="98318"> +<interface name="corenet_receive_zabbix_server_packets" lineno="75098"> <summary> Receive zabbix_server packets. </summary> @@ -71517,7 +54422,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="98337"> +<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="75117"> <summary> Do not audit attempts to receive zabbix_server packets. </summary> @@ -71528,7 +54433,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zabbix_server_packets" lineno="98356"> +<interface name="corenet_sendrecv_zabbix_server_packets" lineno="75136"> <summary> Send and receive zabbix_server packets. </summary> @@ -71539,7 +54444,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="98372"> +<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="75152"> <summary> Do not audit attempts to send and receive zabbix_server packets. </summary> @@ -71550,7 +54455,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zabbix_server_packets" lineno="98387"> +<interface name="corenet_relabelto_zabbix_server_packets" lineno="75167"> <summary> Relabel packets to zabbix_server the packet type. </summary> @@ -71560,85 +54465,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="98409"> -<summary> -Send and receive TCP traffic on the zabbix_agent port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_zabbix_agent_port" lineno="98424"> -<summary> -Send UDP traffic on the zabbix_agent port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98439"> -<summary> -Do not audit attempts to send UDP traffic on the zabbix_agent port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98454"> -<summary> -Receive UDP traffic on the zabbix_agent port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98469"> -<summary> -Do not audit attempts to receive UDP traffic on the zabbix_agent port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98484"> -<summary> -Send and receive UDP traffic on the zabbix_agent port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98500"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the zabbix_agent port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98515"> +<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="75189"> <summary> Bind TCP sockets to the zabbix_agent port. </summary> @@ -71649,7 +54476,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98535"> +<interface name="corenet_udp_bind_zabbix_agent_port" lineno="75209"> <summary> Bind UDP sockets to the zabbix_agent port. </summary> @@ -71660,7 +54487,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98554"> +<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="75228"> <summary> Make a TCP connection to the zabbix_agent port. </summary> @@ -71670,7 +54497,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zabbix_agent_client_packets" lineno="98574"> +<interface name="corenet_send_zabbix_agent_client_packets" lineno="75248"> <summary> Send zabbix_agent_client packets. </summary> @@ -71681,7 +54508,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98593"> +<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="75267"> <summary> Do not audit attempts to send zabbix_agent_client packets. </summary> @@ -71692,7 +54519,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98612"> +<interface name="corenet_receive_zabbix_agent_client_packets" lineno="75286"> <summary> Receive zabbix_agent_client packets. </summary> @@ -71703,7 +54530,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98631"> +<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="75305"> <summary> Do not audit attempts to receive zabbix_agent_client packets. </summary> @@ -71714,7 +54541,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98650"> +<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="75324"> <summary> Send and receive zabbix_agent_client packets. </summary> @@ -71725,7 +54552,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98666"> +<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="75340"> <summary> Do not audit attempts to send and receive zabbix_agent_client packets. </summary> @@ -71736,7 +54563,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98681"> +<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="75355"> <summary> Relabel packets to zabbix_agent_client the packet type. </summary> @@ -71746,7 +54573,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zabbix_agent_server_packets" lineno="98701"> +<interface name="corenet_send_zabbix_agent_server_packets" lineno="75375"> <summary> Send zabbix_agent_server packets. </summary> @@ -71757,7 +54584,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98720"> +<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="75394"> <summary> Do not audit attempts to send zabbix_agent_server packets. </summary> @@ -71768,7 +54595,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98739"> +<interface name="corenet_receive_zabbix_agent_server_packets" lineno="75413"> <summary> Receive zabbix_agent_server packets. </summary> @@ -71779,7 +54606,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98758"> +<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="75432"> <summary> Do not audit attempts to receive zabbix_agent_server packets. </summary> @@ -71790,7 +54617,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98777"> +<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="75451"> <summary> Send and receive zabbix_agent_server packets. </summary> @@ -71801,7 +54628,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98793"> +<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="75467"> <summary> Do not audit attempts to send and receive zabbix_agent_server packets. </summary> @@ -71812,7 +54639,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98808"> +<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="75482"> <summary> Relabel packets to zabbix_agent_server the packet type. </summary> @@ -71822,85 +54649,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98830"> -<summary> -Send and receive TCP traffic on the zookeeper_client port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_zookeeper_client_port" lineno="98845"> -<summary> -Send UDP traffic on the zookeeper_client port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98860"> -<summary> -Do not audit attempts to send UDP traffic on the zookeeper_client port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98875"> -<summary> -Receive UDP traffic on the zookeeper_client port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98890"> -<summary> -Do not audit attempts to receive UDP traffic on the zookeeper_client port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98905"> -<summary> -Send and receive UDP traffic on the zookeeper_client port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98921"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the zookeeper_client port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98936"> +<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="75504"> <summary> Bind TCP sockets to the zookeeper_client port. </summary> @@ -71911,7 +54660,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98956"> +<interface name="corenet_udp_bind_zookeeper_client_port" lineno="75524"> <summary> Bind UDP sockets to the zookeeper_client port. </summary> @@ -71922,7 +54671,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98975"> +<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="75543"> <summary> Make a TCP connection to the zookeeper_client port. </summary> @@ -71932,7 +54681,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_client_client_packets" lineno="98995"> +<interface name="corenet_send_zookeeper_client_client_packets" lineno="75563"> <summary> Send zookeeper_client_client packets. </summary> @@ -71943,7 +54692,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="99014"> +<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="75582"> <summary> Do not audit attempts to send zookeeper_client_client packets. </summary> @@ -71954,7 +54703,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_client_client_packets" lineno="99033"> +<interface name="corenet_receive_zookeeper_client_client_packets" lineno="75601"> <summary> Receive zookeeper_client_client packets. </summary> @@ -71965,7 +54714,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="99052"> +<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="75620"> <summary> Do not audit attempts to receive zookeeper_client_client packets. </summary> @@ -71976,7 +54725,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="99071"> +<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="75639"> <summary> Send and receive zookeeper_client_client packets. </summary> @@ -71987,7 +54736,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="99087"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="75655"> <summary> Do not audit attempts to send and receive zookeeper_client_client packets. </summary> @@ -71998,7 +54747,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="99102"> +<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="75670"> <summary> Relabel packets to zookeeper_client_client the packet type. </summary> @@ -72008,7 +54757,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_client_server_packets" lineno="99122"> +<interface name="corenet_send_zookeeper_client_server_packets" lineno="75690"> <summary> Send zookeeper_client_server packets. </summary> @@ -72019,7 +54768,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="99141"> +<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="75709"> <summary> Do not audit attempts to send zookeeper_client_server packets. </summary> @@ -72030,7 +54779,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_client_server_packets" lineno="99160"> +<interface name="corenet_receive_zookeeper_client_server_packets" lineno="75728"> <summary> Receive zookeeper_client_server packets. </summary> @@ -72041,7 +54790,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="99179"> +<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="75747"> <summary> Do not audit attempts to receive zookeeper_client_server packets. </summary> @@ -72052,7 +54801,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="99198"> +<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="75766"> <summary> Send and receive zookeeper_client_server packets. </summary> @@ -72063,7 +54812,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="99214"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="75782"> <summary> Do not audit attempts to send and receive zookeeper_client_server packets. </summary> @@ -72074,7 +54823,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="99229"> +<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="75797"> <summary> Relabel packets to zookeeper_client_server the packet type. </summary> @@ -72084,85 +54833,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="99251"> -<summary> -Send and receive TCP traffic on the zookeeper_election port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_zookeeper_election_port" lineno="99266"> -<summary> -Send UDP traffic on the zookeeper_election port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="99281"> -<summary> -Do not audit attempts to send UDP traffic on the zookeeper_election port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_zookeeper_election_port" lineno="99296"> -<summary> -Receive UDP traffic on the zookeeper_election port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="99311"> -<summary> -Do not audit attempts to receive UDP traffic on the zookeeper_election port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="99326"> -<summary> -Send and receive UDP traffic on the zookeeper_election port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="99342"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the zookeeper_election port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="99357"> +<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="75819"> <summary> Bind TCP sockets to the zookeeper_election port. </summary> @@ -72173,7 +54844,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zookeeper_election_port" lineno="99377"> +<interface name="corenet_udp_bind_zookeeper_election_port" lineno="75839"> <summary> Bind UDP sockets to the zookeeper_election port. </summary> @@ -72184,7 +54855,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="99396"> +<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="75858"> <summary> Make a TCP connection to the zookeeper_election port. </summary> @@ -72194,7 +54865,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_election_client_packets" lineno="99416"> +<interface name="corenet_send_zookeeper_election_client_packets" lineno="75878"> <summary> Send zookeeper_election_client packets. </summary> @@ -72205,7 +54876,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="99435"> +<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="75897"> <summary> Do not audit attempts to send zookeeper_election_client packets. </summary> @@ -72216,7 +54887,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99454"> +<interface name="corenet_receive_zookeeper_election_client_packets" lineno="75916"> <summary> Receive zookeeper_election_client packets. </summary> @@ -72227,7 +54898,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99473"> +<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="75935"> <summary> Do not audit attempts to receive zookeeper_election_client packets. </summary> @@ -72238,7 +54909,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99492"> +<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="75954"> <summary> Send and receive zookeeper_election_client packets. </summary> @@ -72249,7 +54920,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99508"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="75970"> <summary> Do not audit attempts to send and receive zookeeper_election_client packets. </summary> @@ -72260,7 +54931,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99523"> +<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="75985"> <summary> Relabel packets to zookeeper_election_client the packet type. </summary> @@ -72270,7 +54941,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_election_server_packets" lineno="99543"> +<interface name="corenet_send_zookeeper_election_server_packets" lineno="76005"> <summary> Send zookeeper_election_server packets. </summary> @@ -72281,7 +54952,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99562"> +<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="76024"> <summary> Do not audit attempts to send zookeeper_election_server packets. </summary> @@ -72292,7 +54963,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99581"> +<interface name="corenet_receive_zookeeper_election_server_packets" lineno="76043"> <summary> Receive zookeeper_election_server packets. </summary> @@ -72303,7 +54974,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99600"> +<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="76062"> <summary> Do not audit attempts to receive zookeeper_election_server packets. </summary> @@ -72314,7 +54985,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99619"> +<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="76081"> <summary> Send and receive zookeeper_election_server packets. </summary> @@ -72325,7 +54996,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99635"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="76097"> <summary> Do not audit attempts to send and receive zookeeper_election_server packets. </summary> @@ -72336,7 +55007,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99650"> +<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="76112"> <summary> Relabel packets to zookeeper_election_server the packet type. </summary> @@ -72346,85 +55017,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99672"> -<summary> -Send and receive TCP traffic on the zookeeper_leader port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99687"> -<summary> -Send UDP traffic on the zookeeper_leader port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99702"> -<summary> -Do not audit attempts to send UDP traffic on the zookeeper_leader port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99717"> -<summary> -Receive UDP traffic on the zookeeper_leader port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99732"> -<summary> -Do not audit attempts to receive UDP traffic on the zookeeper_leader port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99747"> -<summary> -Send and receive UDP traffic on the zookeeper_leader port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99763"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the zookeeper_leader port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99778"> +<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="76134"> <summary> Bind TCP sockets to the zookeeper_leader port. </summary> @@ -72435,7 +55028,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99798"> +<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="76154"> <summary> Bind UDP sockets to the zookeeper_leader port. </summary> @@ -72446,7 +55039,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99817"> +<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="76173"> <summary> Make a TCP connection to the zookeeper_leader port. </summary> @@ -72456,7 +55049,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99837"> +<interface name="corenet_send_zookeeper_leader_client_packets" lineno="76193"> <summary> Send zookeeper_leader_client packets. </summary> @@ -72467,7 +55060,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99856"> +<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="76212"> <summary> Do not audit attempts to send zookeeper_leader_client packets. </summary> @@ -72478,7 +55071,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99875"> +<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="76231"> <summary> Receive zookeeper_leader_client packets. </summary> @@ -72489,7 +55082,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99894"> +<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="76250"> <summary> Do not audit attempts to receive zookeeper_leader_client packets. </summary> @@ -72500,7 +55093,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99913"> +<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="76269"> <summary> Send and receive zookeeper_leader_client packets. </summary> @@ -72511,7 +55104,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99929"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="76285"> <summary> Do not audit attempts to send and receive zookeeper_leader_client packets. </summary> @@ -72522,7 +55115,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99944"> +<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="76300"> <summary> Relabel packets to zookeeper_leader_client the packet type. </summary> @@ -72532,7 +55125,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99964"> +<interface name="corenet_send_zookeeper_leader_server_packets" lineno="76320"> <summary> Send zookeeper_leader_server packets. </summary> @@ -72543,7 +55136,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99983"> +<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="76339"> <summary> Do not audit attempts to send zookeeper_leader_server packets. </summary> @@ -72554,7 +55147,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="100002"> +<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="76358"> <summary> Receive zookeeper_leader_server packets. </summary> @@ -72565,7 +55158,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="100021"> +<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="76377"> <summary> Do not audit attempts to receive zookeeper_leader_server packets. </summary> @@ -72576,7 +55169,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="100040"> +<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="76396"> <summary> Send and receive zookeeper_leader_server packets. </summary> @@ -72587,7 +55180,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="100056"> +<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="76412"> <summary> Do not audit attempts to send and receive zookeeper_leader_server packets. </summary> @@ -72598,7 +55191,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="100071"> +<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="76427"> <summary> Relabel packets to zookeeper_leader_server the packet type. </summary> @@ -72608,85 +55201,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zebra_port" lineno="100093"> -<summary> -Send and receive TCP traffic on the zebra port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_zebra_port" lineno="100108"> -<summary> -Send UDP traffic on the zebra port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="100123"> -<summary> -Do not audit attempts to send UDP traffic on the zebra port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_zebra_port" lineno="100138"> -<summary> -Receive UDP traffic on the zebra port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="100153"> -<summary> -Do not audit attempts to receive UDP traffic on the zebra port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_zebra_port" lineno="100168"> -<summary> -Send and receive UDP traffic on the zebra port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="100184"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the zebra port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_zebra_port" lineno="100199"> +<interface name="corenet_tcp_bind_zebra_port" lineno="76449"> <summary> Bind TCP sockets to the zebra port. </summary> @@ -72697,7 +55212,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zebra_port" lineno="100219"> +<interface name="corenet_udp_bind_zebra_port" lineno="76469"> <summary> Bind UDP sockets to the zebra port. </summary> @@ -72708,7 +55223,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zebra_port" lineno="100238"> +<interface name="corenet_tcp_connect_zebra_port" lineno="76488"> <summary> Make a TCP connection to the zebra port. </summary> @@ -72718,7 +55233,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zebra_client_packets" lineno="100258"> +<interface name="corenet_send_zebra_client_packets" lineno="76508"> <summary> Send zebra_client packets. </summary> @@ -72729,7 +55244,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="100277"> +<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="76527"> <summary> Do not audit attempts to send zebra_client packets. </summary> @@ -72740,7 +55255,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zebra_client_packets" lineno="100296"> +<interface name="corenet_receive_zebra_client_packets" lineno="76546"> <summary> Receive zebra_client packets. </summary> @@ -72751,7 +55266,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="100315"> +<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="76565"> <summary> Do not audit attempts to receive zebra_client packets. </summary> @@ -72762,7 +55277,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zebra_client_packets" lineno="100334"> +<interface name="corenet_sendrecv_zebra_client_packets" lineno="76584"> <summary> Send and receive zebra_client packets. </summary> @@ -72773,7 +55288,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="100350"> +<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="76600"> <summary> Do not audit attempts to send and receive zebra_client packets. </summary> @@ -72784,7 +55299,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zebra_client_packets" lineno="100365"> +<interface name="corenet_relabelto_zebra_client_packets" lineno="76615"> <summary> Relabel packets to zebra_client the packet type. </summary> @@ -72794,7 +55309,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zebra_server_packets" lineno="100385"> +<interface name="corenet_send_zebra_server_packets" lineno="76635"> <summary> Send zebra_server packets. </summary> @@ -72805,7 +55320,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="100404"> +<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="76654"> <summary> Do not audit attempts to send zebra_server packets. </summary> @@ -72816,7 +55331,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zebra_server_packets" lineno="100423"> +<interface name="corenet_receive_zebra_server_packets" lineno="76673"> <summary> Receive zebra_server packets. </summary> @@ -72827,7 +55342,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100442"> +<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="76692"> <summary> Do not audit attempts to receive zebra_server packets. </summary> @@ -72838,7 +55353,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zebra_server_packets" lineno="100461"> +<interface name="corenet_sendrecv_zebra_server_packets" lineno="76711"> <summary> Send and receive zebra_server packets. </summary> @@ -72849,7 +55364,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100477"> +<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="76727"> <summary> Do not audit attempts to send and receive zebra_server packets. </summary> @@ -72860,7 +55375,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zebra_server_packets" lineno="100492"> +<interface name="corenet_relabelto_zebra_server_packets" lineno="76742"> <summary> Relabel packets to zebra_server the packet type. </summary> @@ -72870,85 +55385,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zented_port" lineno="100514"> -<summary> -Send and receive TCP traffic on the zented port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_zented_port" lineno="100529"> -<summary> -Send UDP traffic on the zented port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100544"> -<summary> -Do not audit attempts to send UDP traffic on the zented port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_zented_port" lineno="100559"> -<summary> -Receive UDP traffic on the zented port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100574"> -<summary> -Do not audit attempts to receive UDP traffic on the zented port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_zented_port" lineno="100589"> -<summary> -Send and receive UDP traffic on the zented port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100605"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the zented port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_zented_port" lineno="100620"> +<interface name="corenet_tcp_bind_zented_port" lineno="76764"> <summary> Bind TCP sockets to the zented port. </summary> @@ -72959,7 +55396,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zented_port" lineno="100640"> +<interface name="corenet_udp_bind_zented_port" lineno="76784"> <summary> Bind UDP sockets to the zented port. </summary> @@ -72970,7 +55407,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zented_port" lineno="100659"> +<interface name="corenet_tcp_connect_zented_port" lineno="76803"> <summary> Make a TCP connection to the zented port. </summary> @@ -72980,7 +55417,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zented_client_packets" lineno="100679"> +<interface name="corenet_send_zented_client_packets" lineno="76823"> <summary> Send zented_client packets. </summary> @@ -72991,7 +55428,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100698"> +<interface name="corenet_dontaudit_send_zented_client_packets" lineno="76842"> <summary> Do not audit attempts to send zented_client packets. </summary> @@ -73002,7 +55439,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zented_client_packets" lineno="100717"> +<interface name="corenet_receive_zented_client_packets" lineno="76861"> <summary> Receive zented_client packets. </summary> @@ -73013,7 +55450,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100736"> +<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="76880"> <summary> Do not audit attempts to receive zented_client packets. </summary> @@ -73024,7 +55461,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zented_client_packets" lineno="100755"> +<interface name="corenet_sendrecv_zented_client_packets" lineno="76899"> <summary> Send and receive zented_client packets. </summary> @@ -73035,7 +55472,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100771"> +<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="76915"> <summary> Do not audit attempts to send and receive zented_client packets. </summary> @@ -73046,7 +55483,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zented_client_packets" lineno="100786"> +<interface name="corenet_relabelto_zented_client_packets" lineno="76930"> <summary> Relabel packets to zented_client the packet type. </summary> @@ -73056,7 +55493,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zented_server_packets" lineno="100806"> +<interface name="corenet_send_zented_server_packets" lineno="76950"> <summary> Send zented_server packets. </summary> @@ -73067,7 +55504,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100825"> +<interface name="corenet_dontaudit_send_zented_server_packets" lineno="76969"> <summary> Do not audit attempts to send zented_server packets. </summary> @@ -73078,7 +55515,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zented_server_packets" lineno="100844"> +<interface name="corenet_receive_zented_server_packets" lineno="76988"> <summary> Receive zented_server packets. </summary> @@ -73089,7 +55526,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100863"> +<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="77007"> <summary> Do not audit attempts to receive zented_server packets. </summary> @@ -73100,7 +55537,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zented_server_packets" lineno="100882"> +<interface name="corenet_sendrecv_zented_server_packets" lineno="77026"> <summary> Send and receive zented_server packets. </summary> @@ -73111,7 +55548,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100898"> +<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="77042"> <summary> Do not audit attempts to send and receive zented_server packets. </summary> @@ -73122,7 +55559,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zented_server_packets" lineno="100913"> +<interface name="corenet_relabelto_zented_server_packets" lineno="77057"> <summary> Relabel packets to zented_server the packet type. </summary> @@ -73132,85 +55569,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_zope_port" lineno="100935"> -<summary> -Send and receive TCP traffic on the zope port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_udp_send_zope_port" lineno="100950"> -<summary> -Send UDP traffic on the zope port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100965"> -<summary> -Do not audit attempts to send UDP traffic on the zope port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_receive_zope_port" lineno="100980"> -<summary> -Receive UDP traffic on the zope port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="read" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100995"> -<summary> -Do not audit attempts to receive UDP traffic on the zope port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_udp_sendrecv_zope_port" lineno="101010"> -<summary> -Send and receive UDP traffic on the zope port. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<infoflow type="both" weight="10"/> -</interface> -<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="101026"> -<summary> -Do not audit attempts to send and receive -UDP traffic on the zope port. -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="corenet_tcp_bind_zope_port" lineno="101041"> +<interface name="corenet_tcp_bind_zope_port" lineno="77079"> <summary> Bind TCP sockets to the zope port. </summary> @@ -73221,7 +55580,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_udp_bind_zope_port" lineno="101061"> +<interface name="corenet_udp_bind_zope_port" lineno="77099"> <summary> Bind UDP sockets to the zope port. </summary> @@ -73232,7 +55591,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_tcp_connect_zope_port" lineno="101080"> +<interface name="corenet_tcp_connect_zope_port" lineno="77118"> <summary> Make a TCP connection to the zope port. </summary> @@ -73242,7 +55601,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zope_client_packets" lineno="101100"> +<interface name="corenet_send_zope_client_packets" lineno="77138"> <summary> Send zope_client packets. </summary> @@ -73253,7 +55612,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zope_client_packets" lineno="101119"> +<interface name="corenet_dontaudit_send_zope_client_packets" lineno="77157"> <summary> Do not audit attempts to send zope_client packets. </summary> @@ -73264,7 +55623,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zope_client_packets" lineno="101138"> +<interface name="corenet_receive_zope_client_packets" lineno="77176"> <summary> Receive zope_client packets. </summary> @@ -73275,7 +55634,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="101157"> +<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="77195"> <summary> Do not audit attempts to receive zope_client packets. </summary> @@ -73286,7 +55645,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zope_client_packets" lineno="101176"> +<interface name="corenet_sendrecv_zope_client_packets" lineno="77214"> <summary> Send and receive zope_client packets. </summary> @@ -73297,7 +55656,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="101192"> +<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="77230"> <summary> Do not audit attempts to send and receive zope_client packets. </summary> @@ -73308,7 +55667,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zope_client_packets" lineno="101207"> +<interface name="corenet_relabelto_zope_client_packets" lineno="77245"> <summary> Relabel packets to zope_client the packet type. </summary> @@ -73318,7 +55677,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_send_zope_server_packets" lineno="101227"> +<interface name="corenet_send_zope_server_packets" lineno="77265"> <summary> Send zope_server packets. </summary> @@ -73329,7 +55688,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_dontaudit_send_zope_server_packets" lineno="101246"> +<interface name="corenet_dontaudit_send_zope_server_packets" lineno="77284"> <summary> Do not audit attempts to send zope_server packets. </summary> @@ -73340,7 +55699,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_receive_zope_server_packets" lineno="101265"> +<interface name="corenet_receive_zope_server_packets" lineno="77303"> <summary> Receive zope_server packets. </summary> @@ -73351,7 +55710,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="101284"> +<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="77322"> <summary> Do not audit attempts to receive zope_server packets. </summary> @@ -73362,7 +55721,7 @@ Domain allowed access. </param> <infoflow type="none"/> </interface> -<interface name="corenet_sendrecv_zope_server_packets" lineno="101303"> +<interface name="corenet_sendrecv_zope_server_packets" lineno="77341"> <summary> Send and receive zope_server packets. </summary> @@ -73373,7 +55732,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="101319"> +<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="77357"> <summary> Do not audit attempts to send and receive zope_server packets. </summary> @@ -73384,7 +55743,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="corenet_relabelto_zope_server_packets" lineno="101334"> +<interface name="corenet_relabelto_zope_server_packets" lineno="77372"> <summary> Relabel packets to zope_server the packet type. </summary> @@ -73394,7 +55753,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="corenet_tcp_sendrecv_lo_if" lineno="101357"> +<interface name="corenet_tcp_sendrecv_lo_if" lineno="77395"> <summary> Send and receive TCP network traffic on the lo interface. </summary> @@ -73405,7 +55764,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_udp_send_lo_if" lineno="101376"> +<interface name="corenet_udp_send_lo_if" lineno="77414"> <summary> Send UDP network traffic on the lo interface. </summary> @@ -73416,7 +55775,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_udp_receive_lo_if" lineno="101395"> +<interface name="corenet_udp_receive_lo_if" lineno="77433"> <summary> Receive UDP network traffic on the lo interface. </summary> @@ -73427,7 +55786,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_udp_sendrecv_lo_if" lineno="101414"> +<interface name="corenet_udp_sendrecv_lo_if" lineno="77452"> <summary> Send and receive UDP network traffic on the lo interface. </summary> @@ -73438,7 +55797,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="corenet_raw_send_lo_if" lineno="101430"> +<interface name="corenet_raw_send_lo_if" lineno="77468"> <summary> Send raw IP packets on the lo interface. </summary> @@ -73449,7 +55808,7 @@ Domain allowed access. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="corenet_raw_receive_lo_if" lineno="101449"> +<interface name="corenet_raw_receive_lo_if" lineno="77487"> <summary> Receive raw IP packets on the lo interface. </summary> @@ -73460,7 +55819,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="corenet_raw_sendrecv_lo_if" lineno="101468"> +<interface name="corenet_raw_sendrecv_lo_if" lineno="77506"> <summary> Send and receive raw IP packets on the lo interface. </summary> @@ -74829,7 +57188,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_kmsg" lineno="2417"> +<interface name="dev_rw_infiniband" lineno="2417"> +<summary> +Allow read/write access to InfiniBand devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_kmsg" lineno="2435"> <summary> Read the kernel messages </summary> @@ -74839,7 +57208,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_read_kmsg" lineno="2435"> +<interface name="dev_dontaudit_read_kmsg" lineno="2453"> <summary> Do not audit attempts to read the kernel messages </summary> @@ -74849,7 +57218,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_write_kmsg" lineno="2453"> +<interface name="dev_write_kmsg" lineno="2471"> <summary> Write to the kernel messages device </summary> @@ -74859,7 +57228,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_kmsg" lineno="2471"> +<interface name="dev_rw_kmsg" lineno="2489"> <summary> Read and write to the kernel messages device </summary> @@ -74869,7 +57238,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_mounton_kmsg" lineno="2489"> +<interface name="dev_mounton_kmsg" lineno="2507"> <summary> Mount on the kernel messages device </summary> @@ -74879,7 +57248,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_ksm_dev" lineno="2507"> +<interface name="dev_getattr_ksm_dev" lineno="2525"> <summary> Get the attributes of the ksm devices. </summary> @@ -74889,7 +57258,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_ksm_dev" lineno="2525"> +<interface name="dev_setattr_ksm_dev" lineno="2543"> <summary> Set the attributes of the ksm devices. </summary> @@ -74899,7 +57268,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_ksm" lineno="2543"> +<interface name="dev_read_ksm" lineno="2561"> <summary> Read the ksm devices. </summary> @@ -74909,7 +57278,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_ksm" lineno="2561"> +<interface name="dev_rw_ksm" lineno="2579"> <summary> Read and write to ksm devices. </summary> @@ -74919,7 +57288,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_kvm_dev" lineno="2579"> +<interface name="dev_getattr_kvm_dev" lineno="2597"> <summary> Get the attributes of the kvm devices. </summary> @@ -74929,7 +57298,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_kvm_dev" lineno="2597"> +<interface name="dev_setattr_kvm_dev" lineno="2615"> <summary> Set the attributes of the kvm devices. </summary> @@ -74939,7 +57308,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_kvm" lineno="2615"> +<interface name="dev_read_kvm" lineno="2633"> <summary> Read the kvm devices. </summary> @@ -74949,7 +57318,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_kvm" lineno="2633"> +<interface name="dev_rw_kvm" lineno="2651"> <summary> Read and write to kvm devices. </summary> @@ -74959,7 +57328,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_lirc" lineno="2651"> +<interface name="dev_read_lirc" lineno="2669"> <summary> Read the lirc device. </summary> @@ -74969,7 +57338,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_lirc" lineno="2669"> +<interface name="dev_rw_lirc" lineno="2687"> <summary> Read and write the lirc device. </summary> @@ -74979,7 +57348,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_filetrans_lirc" lineno="2693"> +<interface name="dev_filetrans_lirc" lineno="2711"> <summary> Automatic type transition to the type for lirc device nodes when created in /dev. @@ -74995,7 +57364,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="dev_rw_loop_control" lineno="2711"> +<interface name="dev_rw_loop_control" lineno="2729"> <summary> Read and write the loop-control device. </summary> @@ -75005,7 +57374,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_lvm_control" lineno="2729"> +<interface name="dev_getattr_lvm_control" lineno="2747"> <summary> Get the attributes of the lvm comtrol device. </summary> @@ -75015,7 +57384,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_lvm_control" lineno="2747"> +<interface name="dev_read_lvm_control" lineno="2765"> <summary> Read the lvm comtrol device. </summary> @@ -75025,7 +57394,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_lvm_control" lineno="2765"> +<interface name="dev_rw_lvm_control" lineno="2783"> <summary> Read and write the lvm control device. </summary> @@ -75035,7 +57404,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_rw_lvm_control" lineno="2783"> +<interface name="dev_dontaudit_rw_lvm_control" lineno="2801"> <summary> Do not audit attempts to read and write lvm control device. </summary> @@ -75045,7 +57414,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_delete_lvm_control_dev" lineno="2801"> +<interface name="dev_delete_lvm_control_dev" lineno="2819"> <summary> Delete the lvm control device. </summary> @@ -75055,7 +57424,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_memory_dev" lineno="2819"> +<interface name="dev_dontaudit_getattr_memory_dev" lineno="2837"> <summary> dontaudit getattr raw memory devices (e.g. /dev/mem). </summary> @@ -75065,7 +57434,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_read_raw_memory" lineno="2840"> +<interface name="dev_read_raw_memory" lineno="2858"> <summary> Read raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -75078,7 +57447,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_raw_memory_cond" lineno="2870"> +<interface name="dev_read_raw_memory_cond" lineno="2888"> <summary> Read raw memory devices (e.g. /dev/mem) if a tunable is set. This is extremely dangerous as it can bypass the @@ -75096,7 +57465,7 @@ Tunable to depend on </summary> </param> </interface> -<interface name="dev_dontaudit_read_raw_memory" lineno="2897"> +<interface name="dev_dontaudit_read_raw_memory" lineno="2915"> <summary> Do not audit attempts to read raw memory devices (e.g. /dev/mem). @@ -75110,7 +57479,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_write_raw_memory" lineno="2918"> +<interface name="dev_write_raw_memory" lineno="2936"> <summary> Write raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -75123,7 +57492,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_raw_memory_cond" lineno="2948"> +<interface name="dev_write_raw_memory_cond" lineno="2966"> <summary> Write raw memory devices (e.g. /dev/mem) if a tunable is set. This is extremely dangerous as it can bypass the @@ -75141,7 +57510,7 @@ Tunable to depend on </summary> </param> </interface> -<interface name="dev_rx_raw_memory" lineno="2974"> +<interface name="dev_rx_raw_memory" lineno="2992"> <summary> Read and execute raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -75154,7 +57523,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_wx_raw_memory" lineno="2996"> +<interface name="dev_wx_raw_memory" lineno="3014"> <summary> Write and execute raw memory devices (e.g. /dev/mem). This is extremely dangerous as it can bypass the @@ -75167,7 +57536,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_wx_raw_memory_cond" lineno="3023"> +<interface name="dev_wx_raw_memory_cond" lineno="3041"> <summary> Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set. This is extremely dangerous as it can bypass the @@ -75185,7 +57554,7 @@ Tunable to depend on </summary> </param> </interface> -<interface name="dev_getattr_misc_dev" lineno="3046"> +<interface name="dev_getattr_misc_dev" lineno="3064"> <summary> Get the attributes of miscellaneous devices. </summary> @@ -75195,7 +57564,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_misc_dev" lineno="3065"> +<interface name="dev_dontaudit_getattr_misc_dev" lineno="3083"> <summary> Do not audit attempts to get the attributes of miscellaneous devices. @@ -75206,7 +57575,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_setattr_misc_dev" lineno="3083"> +<interface name="dev_setattr_misc_dev" lineno="3101"> <summary> Set the attributes of miscellaneous devices. </summary> @@ -75216,7 +57585,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_misc_dev" lineno="3102"> +<interface name="dev_dontaudit_setattr_misc_dev" lineno="3120"> <summary> Do not audit attempts to set the attributes of miscellaneous devices. @@ -75227,7 +57596,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_read_misc" lineno="3120"> +<interface name="dev_read_misc" lineno="3138"> <summary> Read miscellaneous devices. </summary> @@ -75237,7 +57606,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_misc" lineno="3138"> +<interface name="dev_write_misc" lineno="3156"> <summary> Write miscellaneous devices. </summary> @@ -75247,7 +57616,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_rw_misc" lineno="3156"> +<interface name="dev_dontaudit_rw_misc" lineno="3174"> <summary> Do not audit attempts to read and write miscellaneous devices. </summary> @@ -75257,7 +57626,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_modem_dev" lineno="3174"> +<interface name="dev_getattr_modem_dev" lineno="3192"> <summary> Get the attributes of the modem devices. </summary> @@ -75267,7 +57636,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_modem_dev" lineno="3192"> +<interface name="dev_setattr_modem_dev" lineno="3210"> <summary> Set the attributes of the modem devices. </summary> @@ -75277,7 +57646,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_modem" lineno="3210"> +<interface name="dev_read_modem" lineno="3228"> <summary> Read the modem devices. </summary> @@ -75287,7 +57656,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_modem" lineno="3228"> +<interface name="dev_rw_modem" lineno="3246"> <summary> Read and write to modem devices. </summary> @@ -75297,7 +57666,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_mouse_dev" lineno="3246"> +<interface name="dev_getattr_mouse_dev" lineno="3264"> <summary> Get the attributes of the mouse devices. </summary> @@ -75307,7 +57676,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_mouse_dev" lineno="3264"> +<interface name="dev_setattr_mouse_dev" lineno="3282"> <summary> Set the attributes of the mouse devices. </summary> @@ -75317,7 +57686,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_mouse" lineno="3282"> +<interface name="dev_read_mouse" lineno="3300"> <summary> Read the mouse devices. </summary> @@ -75327,7 +57696,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_mouse" lineno="3300"> +<interface name="dev_rw_mouse" lineno="3318"> <summary> Read and write to mouse devices. </summary> @@ -75337,7 +57706,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_mtrr_dev" lineno="3319"> +<interface name="dev_getattr_mtrr_dev" lineno="3337"> <summary> Get the attributes of the memory type range registers (MTRR) device. @@ -75348,7 +57717,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_write_mtrr" lineno="3339"> +<interface name="dev_dontaudit_write_mtrr" lineno="3357"> <summary> Do not audit attempts to write the memory type range registers (MTRR). @@ -75359,7 +57728,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_rw_mtrr" lineno="3358"> +<interface name="dev_rw_mtrr" lineno="3376"> <summary> Read and write the memory type range registers (MTRR). </summary> @@ -75369,37 +57738,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_netcontrol_dev" lineno="3377"> -<summary> -Get the attributes of the network control device (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="dev_read_netcontrol" lineno="3392"> -<summary> -Read the network control identity. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="dev_rw_netcontrol" lineno="3407"> -<summary> -Read and write the the network control device. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="dev_getattr_null_dev" lineno="3422"> +<interface name="dev_getattr_null_dev" lineno="3395"> <summary> Get the attributes of the null device nodes. </summary> @@ -75409,7 +57748,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_null_dev" lineno="3440"> +<interface name="dev_setattr_null_dev" lineno="3413"> <summary> Set the attributes of the null device nodes. </summary> @@ -75419,7 +57758,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_null_dev" lineno="3459"> +<interface name="dev_dontaudit_setattr_null_dev" lineno="3432"> <summary> Do not audit attempts to set the attributes of the null device nodes. @@ -75430,7 +57769,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_delete_null" lineno="3477"> +<interface name="dev_delete_null" lineno="3450"> <summary> Delete the null device (/dev/null). </summary> @@ -75440,7 +57779,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_null" lineno="3495"> +<interface name="dev_rw_null" lineno="3468"> <summary> Read and write to the null device (/dev/null). </summary> @@ -75450,7 +57789,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_null_dev" lineno="3513"> +<interface name="dev_create_null_dev" lineno="3486"> <summary> Create the null device (/dev/null). </summary> @@ -75460,7 +57799,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_null_service" lineno="3532"> +<interface name="dev_manage_null_service" lineno="3505"> <summary> Manage services with script type null_device_t for when /lib/systemd/system/something.service is a link to /dev/null @@ -75471,7 +57810,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3552"> +<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3525"> <summary> Do not audit attempts to get the attributes of the BIOS non-volatile RAM device. @@ -75482,7 +57821,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_rw_nvram" lineno="3570"> +<interface name="dev_rw_nvram" lineno="3543"> <summary> Read and write BIOS non-volatile RAM. </summary> @@ -75492,7 +57831,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_printer_dev" lineno="3588"> +<interface name="dev_getattr_printer_dev" lineno="3561"> <summary> Get the attributes of the printer device nodes. </summary> @@ -75502,7 +57841,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_printer_dev" lineno="3606"> +<interface name="dev_setattr_printer_dev" lineno="3579"> <summary> Set the attributes of the printer device nodes. </summary> @@ -75512,7 +57851,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_append_printer" lineno="3625"> +<interface name="dev_append_printer" lineno="3598"> <summary> Append the printer device. </summary> @@ -75522,7 +57861,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_printer" lineno="3643"> +<interface name="dev_rw_printer" lineno="3616"> <summary> Read and write the printer device. </summary> @@ -75532,7 +57871,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_pmqos_dev" lineno="3661"> +<interface name="dev_getattr_pmqos_dev" lineno="3634"> <summary> Get the attributes of PM QoS devices </summary> @@ -75542,7 +57881,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_pmqos" lineno="3679"> +<interface name="dev_read_pmqos" lineno="3652"> <summary> Read the PM QoS devices. </summary> @@ -75552,7 +57891,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_pmqos" lineno="3697"> +<interface name="dev_rw_pmqos" lineno="3670"> <summary> Read and write the the PM QoS devices. </summary> @@ -75562,7 +57901,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_qemu_dev" lineno="3716"> +<interface name="dev_getattr_qemu_dev" lineno="3689"> <summary> Get the attributes of the QEMU microcode and id interfaces. @@ -75573,7 +57912,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_qemu_dev" lineno="3735"> +<interface name="dev_setattr_qemu_dev" lineno="3708"> <summary> Set the attributes of the QEMU microcode and id interfaces. @@ -75584,7 +57923,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_qemu" lineno="3753"> +<interface name="dev_read_qemu" lineno="3726"> <summary> Read the QEMU device </summary> @@ -75594,7 +57933,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_qemu" lineno="3771"> +<interface name="dev_rw_qemu" lineno="3744"> <summary> Read and write the the QEMU device. </summary> @@ -75604,7 +57943,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_rand" lineno="3805"> +<interface name="dev_read_rand" lineno="3778"> <summary> Read from random number generator devices (e.g., /dev/random). @@ -75630,7 +57969,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="dev_dontaudit_read_rand" lineno="3824"> +<interface name="dev_dontaudit_read_rand" lineno="3797"> <summary> Do not audit attempts to read from random number generator devices (e.g., /dev/random) @@ -75641,7 +57980,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_dontaudit_append_rand" lineno="3843"> +<interface name="dev_dontaudit_append_rand" lineno="3816"> <summary> Do not audit attempts to append to random number generator devices (e.g., /dev/random) @@ -75652,7 +57991,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_write_rand" lineno="3863"> +<interface name="dev_write_rand" lineno="3836"> <summary> Write to the random device (e.g., /dev/random). This adds entropy used to generate the random data read from the @@ -75664,7 +58003,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_rand_dev" lineno="3881"> +<interface name="dev_create_rand_dev" lineno="3854"> <summary> Create the random device (/dev/random). </summary> @@ -75674,7 +58013,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_realtime_clock" lineno="3899"> +<interface name="dev_read_realtime_clock" lineno="3872"> <summary> Read the realtime clock (/dev/rtc). </summary> @@ -75684,7 +58023,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_realtime_clock" lineno="3917"> +<interface name="dev_write_realtime_clock" lineno="3890"> <summary> Set the realtime clock (/dev/rtc). </summary> @@ -75694,7 +58033,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_realtime_clock" lineno="3937"> +<interface name="dev_rw_realtime_clock" lineno="3910"> <summary> Read and set the realtime clock (/dev/rtc). </summary> @@ -75704,7 +58043,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_scanner_dev" lineno="3952"> +<interface name="dev_getattr_scanner_dev" lineno="3925"> <summary> Get the attributes of the scanner device. </summary> @@ -75714,7 +58053,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3971"> +<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3944"> <summary> Do not audit attempts to get the attributes of the scanner device. @@ -75725,7 +58064,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_setattr_scanner_dev" lineno="3989"> +<interface name="dev_setattr_scanner_dev" lineno="3962"> <summary> Set the attributes of the scanner device. </summary> @@ -75735,7 +58074,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_scanner_dev" lineno="4008"> +<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3981"> <summary> Do not audit attempts to set the attributes of the scanner device. @@ -75746,7 +58085,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_rw_scanner" lineno="4026"> +<interface name="dev_rw_scanner" lineno="3999"> <summary> Read and write the scanner device. </summary> @@ -75756,7 +58095,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_sound_dev" lineno="4044"> +<interface name="dev_getattr_sound_dev" lineno="4017"> <summary> Get the attributes of the sound devices. </summary> @@ -75766,7 +58105,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_sound_dev" lineno="4062"> +<interface name="dev_setattr_sound_dev" lineno="4035"> <summary> Set the attributes of the sound devices. </summary> @@ -75776,7 +58115,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_sound" lineno="4080"> +<interface name="dev_read_sound" lineno="4053"> <summary> Read the sound devices. </summary> @@ -75786,7 +58125,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_sound" lineno="4099"> +<interface name="dev_write_sound" lineno="4072"> <summary> Write the sound devices. </summary> @@ -75796,7 +58135,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_sound_mixer" lineno="4118"> +<interface name="dev_read_sound_mixer" lineno="4091"> <summary> Read the sound mixer devices. </summary> @@ -75806,7 +58145,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_sound_mixer" lineno="4137"> +<interface name="dev_write_sound_mixer" lineno="4110"> <summary> Write the sound mixer devices. </summary> @@ -75816,7 +58155,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_power_mgmt_dev" lineno="4156"> +<interface name="dev_getattr_power_mgmt_dev" lineno="4129"> <summary> Get the attributes of the the power management device. </summary> @@ -75826,7 +58165,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_power_mgmt_dev" lineno="4174"> +<interface name="dev_setattr_power_mgmt_dev" lineno="4147"> <summary> Set the attributes of the the power management device. </summary> @@ -75836,7 +58175,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_power_management" lineno="4192"> +<interface name="dev_rw_power_management" lineno="4165"> <summary> Read and write the the power management device. </summary> @@ -75846,7 +58185,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_smartcard_dev" lineno="4210"> +<interface name="dev_getattr_smartcard_dev" lineno="4183"> <summary> Getattr on smartcard devices </summary> @@ -75856,7 +58195,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4229"> +<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4202"> <summary> dontaudit getattr on smartcard devices </summary> @@ -75866,7 +58205,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_rw_smartcard" lineno="4248"> +<interface name="dev_rw_smartcard" lineno="4221"> <summary> Read and write smartcard devices. </summary> @@ -75876,7 +58215,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_smartcard" lineno="4266"> +<interface name="dev_manage_smartcard" lineno="4239"> <summary> Create, read, write, and delete smartcard devices. </summary> @@ -75886,7 +58225,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_sysdig" lineno="4284"> +<interface name="dev_rw_sysdig" lineno="4257"> <summary> Read, write and map the sysdig device. </summary> @@ -75896,7 +58235,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_mounton_sysfs" lineno="4303"> +<interface name="dev_mounton_sysfs" lineno="4276"> <summary> Mount a filesystem on sysfs. (Deprecated) </summary> @@ -75906,7 +58245,7 @@ Domain allow access. </summary> </param> </interface> -<interface name="dev_associate_sysfs" lineno="4318"> +<interface name="dev_associate_sysfs" lineno="4291"> <summary> Associate a file to a sysfs filesystem. </summary> @@ -75916,7 +58255,7 @@ The type of the file to be associated to sysfs. </summary> </param> </interface> -<interface name="dev_getattr_sysfs_dirs" lineno="4336"> +<interface name="dev_getattr_sysfs_dirs" lineno="4309"> <summary> Get the attributes of sysfs directories. </summary> @@ -75926,7 +58265,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_sysfs" lineno="4354"> +<interface name="dev_getattr_sysfs" lineno="4327"> <summary> Get the attributes of sysfs filesystem </summary> @@ -75936,7 +58275,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_mount_sysfs" lineno="4372"> +<interface name="dev_mount_sysfs" lineno="4345"> <summary> mount a sysfs filesystem </summary> @@ -75946,7 +58285,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_remount_sysfs" lineno="4390"> +<interface name="dev_remount_sysfs" lineno="4363"> <summary> Remount a sysfs filesystem. </summary> @@ -75956,7 +58295,7 @@ Domain allow access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_sysfs" lineno="4408"> +<interface name="dev_dontaudit_getattr_sysfs" lineno="4381"> <summary> Do not audit getting the attributes of sysfs filesystem </summary> @@ -75966,7 +58305,7 @@ Domain to dontaudit access from </summary> </param> </interface> -<interface name="dev_dontaudit_read_sysfs" lineno="4426"> +<interface name="dev_dontaudit_read_sysfs" lineno="4399"> <summary> Dont audit attempts to read hardware state information </summary> @@ -75976,7 +58315,7 @@ Domain for which the attempts do not need to be audited </summary> </param> </interface> -<interface name="dev_mounton_sysfs_dirs" lineno="4446"> +<interface name="dev_mounton_sysfs_dirs" lineno="4419"> <summary> Mount on sysfs directories. </summary> @@ -75986,7 +58325,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_search_sysfs" lineno="4464"> +<interface name="dev_search_sysfs" lineno="4437"> <summary> Search the sysfs directories. </summary> @@ -75996,7 +58335,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_search_sysfs" lineno="4482"> +<interface name="dev_dontaudit_search_sysfs" lineno="4455"> <summary> Do not audit attempts to search sysfs. </summary> @@ -76006,7 +58345,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_list_sysfs" lineno="4500"> +<interface name="dev_list_sysfs" lineno="4473"> <summary> List the contents of the sysfs directories. </summary> @@ -76016,7 +58355,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_sysfs_dirs" lineno="4519"> +<interface name="dev_write_sysfs_dirs" lineno="4492"> <summary> Write in a sysfs directories. </summary> @@ -76026,7 +58365,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4537"> +<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4510"> <summary> Do not audit attempts to write in a sysfs directory. </summary> @@ -76036,7 +58375,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_dontaudit_write_sysfs_files" lineno="4555"> +<interface name="dev_dontaudit_write_sysfs_files" lineno="4528"> <summary> Do not audit attempts to write to a sysfs file. </summary> @@ -76046,7 +58385,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_manage_sysfs_dirs" lineno="4574"> +<interface name="dev_manage_sysfs_dirs" lineno="4547"> <summary> Create, read, write, and delete sysfs directories. @@ -76057,7 +58396,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_sysfs" lineno="4601"> +<interface name="dev_read_sysfs" lineno="4574"> <summary> Read hardware state information. </summary> @@ -76076,7 +58415,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="dev_write_sysfs" lineno="4629"> +<interface name="dev_write_sysfs" lineno="4602"> <summary> Write to hardware state information. </summary> @@ -76093,7 +58432,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="dev_rw_sysfs" lineno="4648"> +<interface name="dev_rw_sysfs" lineno="4621"> <summary> Allow caller to modify hardware state information. </summary> @@ -76103,7 +58442,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_sysfs_files" lineno="4669"> +<interface name="dev_create_sysfs_files" lineno="4642"> <summary> Add a sysfs file </summary> @@ -76113,7 +58452,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabel_sysfs_dirs" lineno="4687"> +<interface name="dev_relabel_sysfs_dirs" lineno="4660"> <summary> Relabel hardware state directories. </summary> @@ -76123,7 +58462,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabel_all_sysfs" lineno="4705"> +<interface name="dev_relabel_all_sysfs" lineno="4678"> <summary> Relabel from/to all sysfs types. </summary> @@ -76133,7 +58472,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_all_sysfs" lineno="4725"> +<interface name="dev_setattr_all_sysfs" lineno="4698"> <summary> Set the attributes of sysfs files, directories and symlinks. </summary> @@ -76143,7 +58482,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_tpm" lineno="4745"> +<interface name="dev_rw_tpm" lineno="4718"> <summary> Read and write the TPM device. </summary> @@ -76153,7 +58492,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_urand" lineno="4786"> +<interface name="dev_read_urand" lineno="4759"> <summary> Read from pseudo random number generator devices (e.g., /dev/urandom). </summary> @@ -76186,7 +58525,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="dev_dontaudit_read_urand" lineno="4805"> +<interface name="dev_dontaudit_read_urand" lineno="4778"> <summary> Do not audit attempts to read from pseudo random devices (e.g., /dev/urandom) @@ -76197,7 +58536,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_write_urand" lineno="4824"> +<interface name="dev_write_urand" lineno="4797"> <summary> Write to the pseudo random device (e.g., /dev/urandom). This sets the random number generator seed. @@ -76208,7 +58547,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_urand_dev" lineno="4842"> +<interface name="dev_create_urand_dev" lineno="4815"> <summary> Create the urandom device (/dev/urandom). </summary> @@ -76218,7 +58557,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_generic_usb_dev" lineno="4860"> +<interface name="dev_setattr_urand_dev" lineno="4833"> +<summary> +Set attributes on the urandom device (/dev/urandom). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_generic_usb_dev" lineno="4851"> <summary> Getattr generic the USB devices. </summary> @@ -76228,7 +58577,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_generic_usb_dev" lineno="4878"> +<interface name="dev_setattr_generic_usb_dev" lineno="4869"> <summary> Setattr generic the USB devices. </summary> @@ -76238,7 +58587,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_generic_usb_dev" lineno="4896"> +<interface name="dev_read_generic_usb_dev" lineno="4887"> <summary> Read generic the USB devices. </summary> @@ -76248,7 +58597,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_generic_usb_dev" lineno="4914"> +<interface name="dev_rw_generic_usb_dev" lineno="4905"> <summary> Read and write generic the USB devices. </summary> @@ -76258,7 +58607,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabel_generic_usb_dev" lineno="4932"> +<interface name="dev_relabel_generic_usb_dev" lineno="4923"> <summary> Relabel generic the USB devices. </summary> @@ -76268,7 +58617,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_usbmon_dev" lineno="4950"> +<interface name="dev_read_usbmon_dev" lineno="4941"> <summary> Read USB monitor devices. </summary> @@ -76278,7 +58627,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_usbmon_dev" lineno="4968"> +<interface name="dev_write_usbmon_dev" lineno="4959"> <summary> Write USB monitor devices. </summary> @@ -76288,7 +58637,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_mount_usbfs" lineno="4986"> +<interface name="dev_mount_usbfs" lineno="4977"> <summary> Mount a usbfs filesystem. </summary> @@ -76298,7 +58647,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_associate_usbfs" lineno="5004"> +<interface name="dev_associate_usbfs" lineno="4995"> <summary> Associate a file to a usbfs filesystem. </summary> @@ -76308,7 +58657,7 @@ The type of the file to be associated to usbfs. </summary> </param> </interface> -<interface name="dev_getattr_usbfs_dirs" lineno="5022"> +<interface name="dev_getattr_usbfs_dirs" lineno="5013"> <summary> Get the attributes of a directory in the usb filesystem. </summary> @@ -76318,7 +58667,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5041"> +<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5032"> <summary> Do not audit attempts to get the attributes of a directory in the usb filesystem. @@ -76329,7 +58678,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_search_usbfs" lineno="5059"> +<interface name="dev_search_usbfs" lineno="5050"> <summary> Search the directory containing USB hardware information. </summary> @@ -76339,7 +58688,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_list_usbfs" lineno="5077"> +<interface name="dev_list_usbfs" lineno="5068"> <summary> Allow caller to get a list of usb hardware. </summary> @@ -76349,7 +58698,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_usbfs_files" lineno="5098"> +<interface name="dev_setattr_usbfs_files" lineno="5089"> <summary> Set the attributes of usbfs filesystem. </summary> @@ -76359,7 +58708,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_usbfs" lineno="5118"> +<interface name="dev_read_usbfs" lineno="5109"> <summary> Read USB hardware information using the usbfs filesystem interface. @@ -76370,7 +58719,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_usbfs" lineno="5138"> +<interface name="dev_rw_usbfs" lineno="5129"> <summary> Allow caller to modify usb hardware configuration files. </summary> @@ -76380,7 +58729,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_getattr_video_dev" lineno="5158"> +<interface name="dev_getattr_video_dev" lineno="5149"> <summary> Get the attributes of video4linux devices. </summary> @@ -76390,7 +58739,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_userio_dev" lineno="5176"> +<interface name="dev_rw_userio_dev" lineno="5167"> <summary> Read and write userio device. </summary> @@ -76400,7 +58749,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_getattr_video_dev" lineno="5195"> +<interface name="dev_dontaudit_getattr_video_dev" lineno="5186"> <summary> Do not audit attempts to get the attributes of video4linux device nodes. @@ -76411,7 +58760,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_setattr_video_dev" lineno="5213"> +<interface name="dev_setattr_video_dev" lineno="5204"> <summary> Set the attributes of video4linux device nodes. </summary> @@ -76421,7 +58770,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_setattr_video_dev" lineno="5232"> +<interface name="dev_dontaudit_setattr_video_dev" lineno="5223"> <summary> Do not audit attempts to set the attributes of video4linux device nodes. @@ -76432,7 +58781,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="dev_read_video_dev" lineno="5250"> +<interface name="dev_read_video_dev" lineno="5241"> <summary> Read the video4linux devices. </summary> @@ -76442,7 +58791,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_video_dev" lineno="5268"> +<interface name="dev_write_video_dev" lineno="5259"> <summary> Write the video4linux devices. </summary> @@ -76452,7 +58801,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_vfio_dev" lineno="5286"> +<interface name="dev_rw_vfio_dev" lineno="5277"> <summary> Read and write vfio devices. </summary> @@ -76462,7 +58811,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabelfrom_vfio_dev" lineno="5304"> +<interface name="dev_relabelfrom_vfio_dev" lineno="5295"> <summary> Relabel vfio devices. </summary> @@ -76472,7 +58821,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_vhost" lineno="5322"> +<interface name="dev_rw_vhost" lineno="5313"> <summary> Allow read/write the vhost devices </summary> @@ -76482,7 +58831,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_vmware" lineno="5340"> +<interface name="dev_rw_vmware" lineno="5331"> <summary> Read and write VMWare devices. </summary> @@ -76492,7 +58841,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rwx_vmware" lineno="5358"> +<interface name="dev_rwx_vmware" lineno="5349"> <summary> Read, write, and mmap VMWare devices. </summary> @@ -76502,7 +58851,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_watchdog" lineno="5377"> +<interface name="dev_read_watchdog" lineno="5368"> <summary> Read from watchdog devices. </summary> @@ -76512,7 +58861,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_write_watchdog" lineno="5395"> +<interface name="dev_write_watchdog" lineno="5386"> <summary> Write to watchdog devices. </summary> @@ -76522,7 +58871,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_wireless" lineno="5413"> +<interface name="dev_read_wireless" lineno="5404"> <summary> Read the wireless device. </summary> @@ -76532,7 +58881,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_wireless" lineno="5431"> +<interface name="dev_rw_wireless" lineno="5422"> <summary> Read and write the the wireless device. </summary> @@ -76542,7 +58891,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_wireless" lineno="5449"> +<interface name="dev_manage_wireless" lineno="5440"> <summary> manage the wireless device. </summary> @@ -76552,7 +58901,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_xen" lineno="5467"> +<interface name="dev_rw_xen" lineno="5458"> <summary> Read and write Xen devices. </summary> @@ -76562,7 +58911,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_manage_xen" lineno="5486"> +<interface name="dev_manage_xen" lineno="5477"> <summary> Create, read, write, and delete Xen devices. </summary> @@ -76572,7 +58921,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_filetrans_xen" lineno="5510"> +<interface name="dev_filetrans_xen" lineno="5501"> <summary> Automatic type transition to the type for xen device nodes when created in /dev. @@ -76588,7 +58937,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="dev_getattr_xserver_misc_dev" lineno="5528"> +<interface name="dev_getattr_xserver_misc_dev" lineno="5519"> <summary> Get the attributes of X server miscellaneous devices. </summary> @@ -76598,7 +58947,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_setattr_xserver_misc_dev" lineno="5546"> +<interface name="dev_setattr_xserver_misc_dev" lineno="5537"> <summary> Set the attributes of X server miscellaneous devices. </summary> @@ -76608,7 +58957,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_xserver_misc" lineno="5564"> +<interface name="dev_rw_xserver_misc" lineno="5555"> <summary> Read and write X server miscellaneous devices. </summary> @@ -76618,7 +58967,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_map_xserver_misc" lineno="5582"> +<interface name="dev_map_xserver_misc" lineno="5573"> <summary> Map X server miscellaneous devices. </summary> @@ -76628,7 +58977,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rw_zero" lineno="5600"> +<interface name="dev_rw_zero" lineno="5591"> <summary> Read and write to the zero device (/dev/zero). </summary> @@ -76638,7 +58987,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_rwx_zero" lineno="5618"> +<interface name="dev_rwx_zero" lineno="5609"> <summary> Read, write, and execute the zero device (/dev/zero). </summary> @@ -76648,7 +58997,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_execmod_zero" lineno="5637"> +<interface name="dev_execmod_zero" lineno="5628"> <summary> Execmod the zero device (/dev/zero). </summary> @@ -76658,7 +59007,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_create_zero_dev" lineno="5656"> +<interface name="dev_create_zero_dev" lineno="5647"> <summary> Create the zero device (/dev/zero). </summary> @@ -76668,7 +59017,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_read_cpu_online" lineno="5679"> +<interface name="dev_read_cpu_online" lineno="5670"> <summary> Read cpu online hardware state information </summary> @@ -76683,7 +59032,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_unconfined" lineno="5699"> +<interface name="dev_unconfined" lineno="5690"> <summary> Unconfined access to devices. </summary> @@ -76693,7 +59042,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_relabel_cpu_online" lineno="5719"> +<interface name="dev_relabel_cpu_online" lineno="5710"> <summary> Relabel cpu online hardware state information. </summary> @@ -76703,7 +59052,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dev_dontaudit_read_usbmon_dev" lineno="5738"> +<interface name="dev_dontaudit_read_usbmon_dev" lineno="5729"> <summary> Dont audit attempts to read usbmon devices </summary> @@ -77806,46 +60155,7 @@ Type to be used for mount points. </summary> </param> </interface> -<interface name="files_pid_file" lineno="231"> -<summary> -Make the specified type usable for -runtime process ID files. (Deprecated) -</summary> -<desc> -<p> -Make the specified type usable for runtime process ID files, -typically found in /var/run. -This will also make the type usable for files, making -calls to files_type() redundant. Failure to use this interface -for a PID file type may result in problems with starting -or stopping services. -</p> -<p> -Related interfaces: -</p> -<ul> -<li>files_runtime_filetrans()</li> -</ul> -<p> -Example usage with a domain that can create and -write its PID file with a private PID file type in the -/var/run directory: -</p> -<p> -type mypidfile_t; -files_runtime_file(mypidfile_t) -allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; -files_runtime_filetrans(mydomain_t, mypidfile_t, file) -</p> -</desc> -<param name="type"> -<summary> -Type to be used for PID files. -</summary> -</param> -<infoflow type="none"/> -</interface> -<interface name="files_runtime_file" lineno="275"> +<interface name="files_runtime_file" lineno="231"> <summary> Make the specified type usable for runtime process ID files. @@ -77884,7 +60194,7 @@ Type to be used for PID files. </param> <infoflow type="none"/> </interface> -<interface name="files_config_file" lineno="315"> +<interface name="files_config_file" lineno="271"> <summary> Make the specified type a configuration file. @@ -77915,7 +60225,7 @@ Type to be used as a configuration file. </param> <infoflow type="none"/> </interface> -<interface name="files_poly" lineno="335"> +<interface name="files_poly" lineno="291"> <summary> Make the specified type a polyinstantiated directory. @@ -77927,7 +60237,7 @@ polyinstantiated directory. </summary> </param> </interface> -<interface name="files_poly_parent" lineno="356"> +<interface name="files_poly_parent" lineno="312"> <summary> Make the specified type a parent of a polyinstantiated directory. @@ -77939,7 +60249,7 @@ parent directory. </summary> </param> </interface> -<interface name="files_poly_member" lineno="377"> +<interface name="files_poly_member" lineno="333"> <summary> Make the specified type a polyinstantiation member directory. @@ -77951,7 +60261,7 @@ member directory. </summary> </param> </interface> -<interface name="files_poly_member_tmp" lineno="404"> +<interface name="files_poly_member_tmp" lineno="360"> <summary> Make the domain use the specified type of polyinstantiated directory. @@ -77969,7 +60279,7 @@ member directory. </summary> </param> </interface> -<interface name="files_tmp_file" lineno="451"> +<interface name="files_tmp_file" lineno="407"> <summary> Make the specified type a file used for temporary files. @@ -78008,7 +60318,7 @@ temporary file. </param> <infoflow type="none"/> </interface> -<interface name="files_tmpfs_file" lineno="472"> +<interface name="files_tmpfs_file" lineno="428"> <summary> Transform the type into a file, for use on a virtual memory filesystem (tmpfs). @@ -78019,7 +60329,7 @@ The type to be transformed. </summary> </param> </interface> -<interface name="files_getattr_all_dirs" lineno="491"> +<interface name="files_getattr_all_dirs" lineno="447"> <summary> Get the attributes of all directories. </summary> @@ -78029,7 +60339,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_all_dirs" lineno="510"> +<interface name="files_dontaudit_getattr_all_dirs" lineno="466"> <summary> Do not audit attempts to get the attributes of all directories. @@ -78040,7 +60350,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_non_security" lineno="528"> +<interface name="files_list_non_security" lineno="484"> <summary> List all non-security directories. </summary> @@ -78050,7 +60360,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_non_security" lineno="547"> +<interface name="files_dontaudit_list_non_security" lineno="503"> <summary> Do not audit attempts to list all non-security directories. @@ -78061,7 +60371,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_mounton_non_security" lineno="566"> +<interface name="files_mounton_non_security" lineno="522"> <summary> Mount a filesystem on all non-security directories and files. @@ -78072,7 +60382,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_write_non_security_dirs" lineno="585"> +<interface name="files_write_non_security_dirs" lineno="541"> <summary> Allow attempts to modify any directory </summary> @@ -78082,7 +60392,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_non_security_dirs" lineno="603"> +<interface name="files_manage_non_security_dirs" lineno="559"> <summary> Allow attempts to manage non-security directories </summary> @@ -78092,7 +60402,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_non_security_dirs" lineno="621"> +<interface name="files_create_non_security_dirs" lineno="577"> +<summary> +Create non-security directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_relabel_non_security_dirs" lineno="595"> <summary> Relabel from/to non-security directories. </summary> @@ -78102,7 +60422,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_all_files" lineno="639"> +<interface name="files_getattr_all_files" lineno="613"> <summary> Get the attributes of all files. </summary> @@ -78112,7 +60432,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_all_files" lineno="659"> +<interface name="files_dontaudit_getattr_all_files" lineno="633"> <summary> Do not audit attempts to get the attributes of all files. @@ -78123,7 +60443,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_non_security_files" lineno="678"> +<interface name="files_dontaudit_getattr_non_security_files" lineno="652"> <summary> Do not audit attempts to get the attributes of non security files. @@ -78134,7 +60454,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_non_security_files" lineno="697"> +<interface name="files_manage_non_security_files" lineno="671"> <summary> Create, read, write, and delete all non-security files. </summary> @@ -78145,7 +60465,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabel_non_security_files" lineno="716"> +<interface name="files_relabel_non_security_files" lineno="690"> <summary> Relabel from/to all non-security files. </summary> @@ -78156,7 +60476,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_all_files" lineno="734"> +<interface name="files_read_all_files" lineno="708"> <summary> Read all files. </summary> @@ -78166,7 +60486,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_execmod_all_files" lineno="765"> +<interface name="files_execmod_all_files" lineno="739"> <summary> Allow shared library text relocations in all files. </summary> @@ -78184,7 +60504,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_non_security_files" lineno="784"> +<interface name="files_read_non_security_files" lineno="758"> <summary> Read all non-security files. </summary> @@ -78195,7 +60515,29 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_all_dirs_except" lineno="810"> +<interface name="files_write_non_security_files" lineno="778"> +<summary> +Write all non-security files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_create_non_security_files" lineno="798"> +<summary> +Create all non-security files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_read_all_dirs_except" lineno="824"> <summary> Read all directories on the filesystem, except the listed exceptions. @@ -78212,7 +60554,7 @@ must be negated by the caller. </summary> </param> </interface> -<interface name="files_read_all_files_except" lineno="835"> +<interface name="files_read_all_files_except" lineno="849"> <summary> Read all files on the filesystem, except the listed exceptions. @@ -78229,7 +60571,7 @@ must be negated by the caller. </summary> </param> </interface> -<interface name="files_read_all_symlinks_except" lineno="860"> +<interface name="files_read_all_symlinks_except" lineno="874"> <summary> Read all symbolic links on the filesystem, except the listed exceptions. @@ -78246,7 +60588,7 @@ must be negated by the caller. </summary> </param> </interface> -<interface name="files_getattr_all_symlinks" lineno="878"> +<interface name="files_getattr_all_symlinks" lineno="892"> <summary> Get the attributes of all symbolic links. </summary> @@ -78256,7 +60598,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_all_symlinks" lineno="897"> +<interface name="files_dontaudit_getattr_all_symlinks" lineno="911"> <summary> Do not audit attempts to get the attributes of all symbolic links. @@ -78267,7 +60609,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_read_all_symlinks" lineno="915"> +<interface name="files_dontaudit_read_all_symlinks" lineno="929"> <summary> Do not audit attempts to read all symbolic links. </summary> @@ -78277,7 +60619,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="934"> +<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="948"> <summary> Do not audit attempts to get the attributes of non security symbolic links. @@ -78288,7 +60630,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="953"> +<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="967"> <summary> Do not audit attempts to get the attributes of non security block devices. @@ -78299,7 +60641,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="972"> +<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="986"> <summary> Do not audit attempts to get the attributes of non security character devices. @@ -78310,7 +60652,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_read_all_symlinks" lineno="991"> +<interface name="files_read_all_symlinks" lineno="1005"> <summary> Read all symbolic links. </summary> @@ -78321,7 +60663,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_getattr_all_pipes" lineno="1010"> +<interface name="files_getattr_all_pipes" lineno="1024"> <summary> Get the attributes of all named pipes. </summary> @@ -78331,7 +60673,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_all_pipes" lineno="1030"> +<interface name="files_dontaudit_getattr_all_pipes" lineno="1044"> <summary> Do not audit attempts to get the attributes of all named pipes. @@ -78342,7 +60684,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1049"> +<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1063"> <summary> Do not audit attempts to get the attributes of non security named pipes. @@ -78353,7 +60695,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_getattr_all_sockets" lineno="1067"> +<interface name="files_getattr_all_sockets" lineno="1081"> <summary> Get the attributes of all named sockets. </summary> @@ -78363,7 +60705,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_all_sockets" lineno="1087"> +<interface name="files_dontaudit_getattr_all_sockets" lineno="1101"> <summary> Do not audit attempts to get the attributes of all named sockets. @@ -78374,7 +60716,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1106"> +<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1120"> <summary> Do not audit attempts to get the attributes of non security named sockets. @@ -78385,7 +60727,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_read_all_blk_files" lineno="1124"> +<interface name="files_read_all_blk_files" lineno="1138"> <summary> Read all block nodes with file types. </summary> @@ -78395,7 +60737,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_all_chr_files" lineno="1142"> +<interface name="files_read_all_chr_files" lineno="1156"> <summary> Read all character nodes with file types. </summary> @@ -78405,7 +60747,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_files" lineno="1168"> +<interface name="files_relabel_all_files" lineno="1182"> <summary> Relabel all files on the filesystem, except the listed exceptions. @@ -78423,7 +60765,7 @@ must be negated by the caller. </param> <rolecap/> </interface> -<interface name="files_rw_all_files" lineno="1206"> +<interface name="files_rw_all_files" lineno="1220"> <summary> rw all files on the filesystem, except the listed exceptions. @@ -78441,7 +60783,7 @@ must be negated by the caller. </param> <rolecap/> </interface> -<interface name="files_manage_all_files" lineno="1232"> +<interface name="files_manage_all_files" lineno="1246"> <summary> Manage all files on the filesystem, except the listed exceptions. @@ -78459,7 +60801,7 @@ must be negated by the caller. </param> <rolecap/> </interface> -<interface name="files_search_all" lineno="1255"> +<interface name="files_search_all" lineno="1269"> <summary> Search the contents of all directories on extended attribute filesystems. @@ -78470,7 +60812,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_all" lineno="1274"> +<interface name="files_list_all" lineno="1288"> <summary> List the contents of all directories on extended attribute filesystems. @@ -78481,7 +60823,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_all_files_as" lineno="1292"> +<interface name="files_create_all_files_as" lineno="1306"> <summary> Create all files as is. </summary> @@ -78491,7 +60833,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_all_dirs" lineno="1312"> +<interface name="files_dontaudit_search_all_dirs" lineno="1326"> <summary> Do not audit attempts to search the contents of any directories on extended @@ -78503,7 +60845,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_getattr_all_file_type_fs" lineno="1335"> +<interface name="files_getattr_all_file_type_fs" lineno="1349"> <summary> Get the attributes of all filesystems with the type of a file. @@ -78514,7 +60856,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelto_all_file_type_fs" lineno="1353"> +<interface name="files_relabelto_all_file_type_fs" lineno="1367"> <summary> Relabel a filesystem to the type of a file. </summary> @@ -78524,7 +60866,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_file_type_fs" lineno="1371"> +<interface name="files_relabel_all_file_type_fs" lineno="1385"> <summary> Relabel a filesystem to and from the type of a file. </summary> @@ -78534,7 +60876,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mount_all_file_type_fs" lineno="1389"> +<interface name="files_mount_all_file_type_fs" lineno="1403"> <summary> Mount all filesystems with the type of a file. </summary> @@ -78544,7 +60886,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_unmount_all_file_type_fs" lineno="1407"> +<interface name="files_unmount_all_file_type_fs" lineno="1421"> <summary> Unmount all filesystems with the type of a file. </summary> @@ -78554,7 +60896,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_non_auth_dirs" lineno="1426"> +<interface name="files_list_non_auth_dirs" lineno="1440"> <summary> Read all non-authentication related directories. @@ -78565,7 +60907,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_non_auth_files" lineno="1445"> +<interface name="files_read_non_auth_files" lineno="1459"> <summary> Read all non-authentication related files. @@ -78576,7 +60918,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_non_auth_symlinks" lineno="1464"> +<interface name="files_read_non_auth_symlinks" lineno="1478"> <summary> Read all non-authentication related symbolic links. @@ -78587,7 +60929,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_non_auth_files" lineno="1482"> +<interface name="files_rw_non_auth_files" lineno="1496"> <summary> rw non-authentication related files. </summary> @@ -78597,7 +60939,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_non_auth_files" lineno="1502"> +<interface name="files_manage_non_auth_files" lineno="1516"> <summary> Manage non-authentication related files. @@ -78609,7 +60951,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_map_non_auth_files" lineno="1526"> +<interface name="files_map_non_auth_files" lineno="1540"> <summary> Mmap non-authentication related files. @@ -78621,7 +60963,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabel_non_auth_files" lineno="1546"> +<interface name="files_relabel_non_auth_files" lineno="1560"> <summary> Relabel all non-authentication related files. @@ -78633,7 +60975,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_config_dirs" lineno="1579"> +<interface name="files_manage_config_dirs" lineno="1593"> <summary> Manage all configuration directories on filesystem </summary> @@ -78644,7 +60986,7 @@ Domain allowed access. </param> </interface> -<interface name="files_relabel_config_dirs" lineno="1598"> +<interface name="files_relabel_config_dirs" lineno="1612"> <summary> Relabel configuration directories </summary> @@ -78655,7 +60997,7 @@ Domain allowed access. </param> </interface> -<interface name="files_dontaudit_relabel_config_dirs" lineno="1617"> +<interface name="files_dontaudit_relabel_config_dirs" lineno="1631"> <summary> Do not audit attempts to relabel configuration directories </summary> @@ -78666,7 +61008,7 @@ Domain not to audit. </param> </interface> -<interface name="files_read_config_files" lineno="1635"> +<interface name="files_read_config_files" lineno="1649"> <summary> Read config files in /etc. </summary> @@ -78676,7 +61018,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_config_files" lineno="1656"> +<interface name="files_manage_config_files" lineno="1670"> <summary> Manage all configuration files on filesystem </summary> @@ -78687,7 +61029,7 @@ Domain allowed access. </param> </interface> -<interface name="files_relabel_config_files" lineno="1675"> +<interface name="files_relabel_config_files" lineno="1689"> <summary> Relabel configuration files </summary> @@ -78698,7 +61040,7 @@ Domain allowed access. </param> </interface> -<interface name="files_dontaudit_relabel_config_files" lineno="1694"> +<interface name="files_dontaudit_relabel_config_files" lineno="1708"> <summary> Do not audit attempts to relabel configuration files </summary> @@ -78709,7 +61051,7 @@ Domain not to audit. </param> </interface> -<interface name="files_mounton_all_mountpoints" lineno="1712"> +<interface name="files_mounton_all_mountpoints" lineno="1726"> <summary> Mount a filesystem on all mount points. </summary> @@ -78719,7 +61061,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_all_mountpoints" lineno="1733"> +<interface name="files_getattr_all_mountpoints" lineno="1747"> <summary> Get the attributes of all mount points. </summary> @@ -78729,7 +61071,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_all_mountpoints" lineno="1751"> +<interface name="files_setattr_all_mountpoints" lineno="1765"> <summary> Set the attributes of all mount points. </summary> @@ -78739,7 +61081,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1769"> +<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1783"> <summary> Do not audit attempts to set the attributes on all mount points. </summary> @@ -78749,7 +61091,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_all_mountpoints" lineno="1787"> +<interface name="files_search_all_mountpoints" lineno="1801"> <summary> Search all mount points. </summary> @@ -78759,7 +61101,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_all_mountpoints" lineno="1805"> +<interface name="files_dontaudit_search_all_mountpoints" lineno="1819"> <summary> Do not audit searching of all mount points. </summary> @@ -78769,7 +61111,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_all_mountpoints" lineno="1823"> +<interface name="files_list_all_mountpoints" lineno="1837"> <summary> List all mount points. </summary> @@ -78779,7 +61121,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_all_mountpoints" lineno="1841"> +<interface name="files_dontaudit_list_all_mountpoints" lineno="1855"> <summary> Do not audit listing of all mount points. </summary> @@ -78789,7 +61131,27 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_write_all_mountpoints" lineno="1859"> +<interface name="files_watch_all_mountpoints" lineno="1873"> +<summary> +Watch all mountpoints. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_watch_all_mount_perm" lineno="1891"> +<summary> +Watch all mountpoints. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_write_all_mountpoints" lineno="1909"> <summary> Check if all mountpoints are writable. </summary> @@ -78799,7 +61161,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_all_mountpoints" lineno="1877"> +<interface name="files_dontaudit_write_all_mountpoints" lineno="1927"> <summary> Do not audit attempts to write to mount points. </summary> @@ -78809,7 +61171,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_root" lineno="1895"> +<interface name="files_list_root" lineno="1945"> <summary> List the contents of the root directory. </summary> @@ -78819,7 +61181,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_root_symlinks" lineno="1915"> +<interface name="files_delete_root_symlinks" lineno="1965"> <summary> Delete symbolic links in the root directory. @@ -78830,7 +61192,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_root_dirs" lineno="1933"> +<interface name="files_dontaudit_write_root_dirs" lineno="1983"> <summary> Do not audit attempts to write to / dirs. </summary> @@ -78840,7 +61202,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_rw_root_dir" lineno="1952"> +<interface name="files_dontaudit_rw_root_dir" lineno="2002"> <summary> Do not audit attempts to write files in the root directory. @@ -78851,7 +61213,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_watch_root_dirs" lineno="1970"> +<interface name="files_watch_root_dirs" lineno="2020"> <summary> Watch the root directory. </summary> @@ -78861,7 +61223,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_root_filetrans" lineno="2004"> +<interface name="files_root_filetrans" lineno="2054"> <summary> Create an object in the root directory, with a private type using a type transition. @@ -78887,7 +61249,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_dontaudit_read_root_files" lineno="2023"> +<interface name="files_dontaudit_read_root_files" lineno="2073"> <summary> Do not audit attempts to read files in the root directory. @@ -78898,7 +61260,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_rw_root_files" lineno="2042"> +<interface name="files_dontaudit_rw_root_files" lineno="2092"> <summary> Do not audit attempts to read or write files in the root directory. @@ -78909,7 +61271,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_rw_root_chr_files" lineno="2061"> +<interface name="files_dontaudit_rw_root_chr_files" lineno="2111"> <summary> Do not audit attempts to read or write character device nodes in the root directory. @@ -78920,7 +61282,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_delete_root_chr_files" lineno="2080"> +<interface name="files_delete_root_chr_files" lineno="2130"> <summary> Delete character device nodes in the root directory. @@ -78931,7 +61293,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_root_files" lineno="2098"> +<interface name="files_delete_root_files" lineno="2148"> <summary> Delete files in the root directory. </summary> @@ -78941,7 +61303,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_exec_root_files" lineno="2116"> +<interface name="files_exec_root_files" lineno="2166"> <summary> Execute files in the root directory. </summary> @@ -78951,7 +61313,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_root_dir_entry" lineno="2134"> +<interface name="files_delete_root_dir_entry" lineno="2184"> <summary> Remove entries from the root directory. </summary> @@ -78961,7 +61323,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_root_dir" lineno="2152"> +<interface name="files_manage_root_dir" lineno="2202"> <summary> Manage the root directory. </summary> @@ -78971,7 +61333,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_rootfs" lineno="2171"> +<interface name="files_getattr_rootfs" lineno="2221"> <summary> Get the attributes of a rootfs file system. @@ -78982,7 +61344,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_associate_rootfs" lineno="2189"> +<interface name="files_associate_rootfs" lineno="2239"> <summary> Associate to root file system. </summary> @@ -78992,7 +61354,7 @@ Type of the file to associate. </summary> </param> </interface> -<interface name="files_relabel_rootfs" lineno="2207"> +<interface name="files_relabel_rootfs" lineno="2257"> <summary> Relabel to and from rootfs file system. </summary> @@ -79002,7 +61364,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_unmount_rootfs" lineno="2225"> +<interface name="files_unmount_rootfs" lineno="2275"> <summary> Unmount a rootfs filesystem. </summary> @@ -79012,7 +61374,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_root" lineno="2243"> +<interface name="files_mounton_root" lineno="2293"> <summary> Mount on the root directory (/) </summary> @@ -79022,7 +61384,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_boot_fs" lineno="2262"> +<interface name="files_getattr_boot_fs" lineno="2312"> <summary> Get the attributes of a filesystem mounted on /boot. @@ -79033,7 +61395,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_remount_boot" lineno="2280"> +<interface name="files_remount_boot" lineno="2330"> <summary> Remount a filesystem mounted on /boot. </summary> @@ -79043,7 +61405,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_boot_dirs" lineno="2298"> +<interface name="files_getattr_boot_dirs" lineno="2348"> <summary> Get attributes of the /boot directory. </summary> @@ -79053,7 +61415,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_boot_dirs" lineno="2317"> +<interface name="files_dontaudit_getattr_boot_dirs" lineno="2367"> <summary> Do not audit attempts to get attributes of the /boot directory. @@ -79064,7 +61426,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_boot" lineno="2335"> +<interface name="files_search_boot" lineno="2385"> <summary> Search the /boot directory. </summary> @@ -79074,7 +61436,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_boot" lineno="2353"> +<interface name="files_dontaudit_search_boot" lineno="2403"> <summary> Do not audit attempts to search the /boot directory. </summary> @@ -79084,7 +61446,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_boot" lineno="2371"> +<interface name="files_list_boot" lineno="2421"> <summary> List the /boot directory. </summary> @@ -79094,7 +61456,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_boot" lineno="2389"> +<interface name="files_dontaudit_list_boot" lineno="2439"> <summary> Do not audit attempts to list the /boot directory. </summary> @@ -79104,7 +61466,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_boot_dirs" lineno="2407"> +<interface name="files_create_boot_dirs" lineno="2457"> <summary> Create directories in /boot </summary> @@ -79114,7 +61476,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_boot_dirs" lineno="2426"> +<interface name="files_manage_boot_dirs" lineno="2476"> <summary> Create, read, write, and delete directories in /boot. @@ -79125,7 +61487,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_boot_filetrans" lineno="2460"> +<interface name="files_boot_filetrans" lineno="2510"> <summary> Create a private type object in boot with an automatic type transition @@ -79151,7 +61513,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_read_boot_files" lineno="2479"> +<interface name="files_read_boot_files" lineno="2529"> <summary> read files in the /boot directory. </summary> @@ -79162,7 +61524,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_boot_files" lineno="2499"> +<interface name="files_manage_boot_files" lineno="2549"> <summary> Create, read, write, and delete files in the /boot directory. @@ -79174,7 +61536,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabelfrom_boot_files" lineno="2517"> +<interface name="files_relabelfrom_boot_files" lineno="2567"> <summary> Relabel from files in the /boot directory. </summary> @@ -79184,7 +61546,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_boot_symlinks" lineno="2535"> +<interface name="files_read_boot_symlinks" lineno="2585"> <summary> Read symbolic links in the /boot directory. </summary> @@ -79194,7 +61556,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_boot_symlinks" lineno="2554"> +<interface name="files_rw_boot_symlinks" lineno="2604"> <summary> Read and write symbolic links in the /boot directory. @@ -79205,7 +61567,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_boot_symlinks" lineno="2574"> +<interface name="files_manage_boot_symlinks" lineno="2624"> <summary> Create, read, write, and delete symbolic links in the /boot directory. @@ -79216,7 +61578,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_kernel_img" lineno="2592"> +<interface name="files_read_kernel_img" lineno="2642"> <summary> Read kernel files in the /boot directory. </summary> @@ -79226,7 +61588,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_kernel_img" lineno="2613"> +<interface name="files_create_kernel_img" lineno="2663"> <summary> Install a kernel into the /boot directory. </summary> @@ -79237,7 +61599,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_delete_kernel" lineno="2633"> +<interface name="files_delete_kernel" lineno="2683"> <summary> Delete a kernel from /boot. </summary> @@ -79248,7 +61610,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_getattr_default_dirs" lineno="2651"> +<interface name="files_getattr_default_dirs" lineno="2701"> <summary> Getattr of directories with the default file type. </summary> @@ -79258,7 +61620,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_default_dirs" lineno="2670"> +<interface name="files_dontaudit_getattr_default_dirs" lineno="2720"> <summary> Do not audit attempts to get the attributes of directories with the default file type. @@ -79269,7 +61631,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_default" lineno="2688"> +<interface name="files_search_default" lineno="2738"> <summary> Search the contents of directories with the default file type. </summary> @@ -79279,7 +61641,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_default" lineno="2706"> +<interface name="files_list_default" lineno="2756"> <summary> List contents of directories with the default file type. </summary> @@ -79289,7 +61651,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_default" lineno="2725"> +<interface name="files_dontaudit_list_default" lineno="2775"> <summary> Do not audit attempts to list contents of directories with the default file type. @@ -79300,7 +61662,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_default_dirs" lineno="2744"> +<interface name="files_manage_default_dirs" lineno="2794"> <summary> Create, read, write, and delete directories with the default file type. @@ -79311,7 +61673,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_default" lineno="2762"> +<interface name="files_mounton_default" lineno="2812"> <summary> Mount a filesystem on a directory with the default file type. </summary> @@ -79321,7 +61683,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_default_files" lineno="2781"> +<interface name="files_dontaudit_getattr_default_files" lineno="2831"> <summary> Do not audit attempts to get the attributes of files with the default file type. @@ -79332,7 +61694,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_read_default_files" lineno="2799"> +<interface name="files_read_default_files" lineno="2849"> <summary> Read files with the default file type. </summary> @@ -79342,7 +61704,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_read_default_files" lineno="2818"> +<interface name="files_dontaudit_read_default_files" lineno="2868"> <summary> Do not audit attempts to read files with the default file type. @@ -79353,7 +61715,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_default_files" lineno="2837"> +<interface name="files_manage_default_files" lineno="2887"> <summary> Create, read, write, and delete files with the default file type. @@ -79364,7 +61726,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_default_symlinks" lineno="2855"> +<interface name="files_read_default_symlinks" lineno="2905"> <summary> Read symbolic links with the default file type. </summary> @@ -79374,7 +61736,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_default_sockets" lineno="2873"> +<interface name="files_read_default_sockets" lineno="2923"> <summary> Read sockets with the default file type. </summary> @@ -79384,7 +61746,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_default_pipes" lineno="2891"> +<interface name="files_read_default_pipes" lineno="2941"> <summary> Read named pipes with the default file type. </summary> @@ -79394,7 +61756,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_etc" lineno="2909"> +<interface name="files_search_etc" lineno="2959"> <summary> Search the contents of /etc directories. </summary> @@ -79404,7 +61766,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_etc_dirs" lineno="2927"> +<interface name="files_setattr_etc_dirs" lineno="2977"> <summary> Set the attributes of the /etc directories. </summary> @@ -79414,7 +61776,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_etc" lineno="2945"> +<interface name="files_list_etc" lineno="2995"> <summary> List the contents of /etc directories. </summary> @@ -79424,7 +61786,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_etc_dirs" lineno="2963"> +<interface name="files_dontaudit_write_etc_dirs" lineno="3013"> <summary> Do not audit attempts to write to /etc dirs. </summary> @@ -79434,7 +61796,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_rw_etc_dirs" lineno="2981"> +<interface name="files_rw_etc_dirs" lineno="3031"> <summary> Add and remove entries from /etc directories. </summary> @@ -79444,7 +61806,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_etc_dirs" lineno="3000"> +<interface name="files_manage_etc_dirs" lineno="3050"> <summary> Manage generic directories in /etc </summary> @@ -79455,7 +61817,7 @@ Domain allowed access </param> </interface> -<interface name="files_relabelto_etc_dirs" lineno="3018"> +<interface name="files_relabelto_etc_dirs" lineno="3068"> <summary> Relabel directories to etc_t. </summary> @@ -79465,7 +61827,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_etc_dirs" lineno="3037"> +<interface name="files_mounton_etc_dirs" lineno="3087"> <summary> Mount a filesystem on the etc directories. @@ -79476,7 +61838,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_etc_dirs" lineno="3055"> +<interface name="files_remount_etc" lineno="3105"> +<summary> +Remount etc filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_watch_etc_dirs" lineno="3123"> <summary> Watch /etc directories </summary> @@ -79486,7 +61858,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_etc_files" lineno="3107"> +<interface name="files_read_etc_files" lineno="3175"> <summary> Read generic files in /etc. </summary> @@ -79530,7 +61902,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_map_etc_files" lineno="3139"> +<interface name="files_map_etc_files" lineno="3207"> <summary> Map generic files in /etc. </summary> @@ -79552,7 +61924,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_dontaudit_write_etc_files" lineno="3157"> +<interface name="files_dontaudit_write_etc_files" lineno="3225"> <summary> Do not audit attempts to write generic files in /etc. </summary> @@ -79562,7 +61934,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_etc_files" lineno="3176"> +<interface name="files_rw_etc_files" lineno="3244"> <summary> Read and write generic files in /etc. </summary> @@ -79573,7 +61945,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_etc_files" lineno="3198"> +<interface name="files_manage_etc_files" lineno="3266"> <summary> Create, read, write, and delete generic files in /etc. @@ -79585,7 +61957,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_manage_etc_files" lineno="3219"> +<interface name="files_dontaudit_manage_etc_files" lineno="3287"> <summary> Do not audit attempts to create, read, write, and delete generic files in /etc. @@ -79597,7 +61969,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="files_delete_etc_files" lineno="3237"> +<interface name="files_delete_etc_files" lineno="3305"> <summary> Delete system configuration files in /etc. </summary> @@ -79607,7 +61979,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_exec_etc_files" lineno="3255"> +<interface name="files_exec_etc_files" lineno="3323"> <summary> Execute generic files in /etc. </summary> @@ -79617,7 +61989,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_etc_files" lineno="3275"> +<interface name="files_watch_etc_files" lineno="3343"> <summary> Watch /etc files. </summary> @@ -79627,7 +61999,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_get_etc_unit_status" lineno="3293"> +<interface name="files_get_etc_unit_status" lineno="3361"> <summary> Get etc_t service status. </summary> @@ -79637,7 +62009,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_start_etc_service" lineno="3312"> +<interface name="files_start_etc_service" lineno="3380"> <summary> start etc_t service </summary> @@ -79647,7 +62019,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_stop_etc_service" lineno="3331"> +<interface name="files_stop_etc_service" lineno="3399"> <summary> stop etc_t service </summary> @@ -79657,7 +62029,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_etc_files" lineno="3350"> +<interface name="files_relabel_etc_files" lineno="3418"> <summary> Relabel from and to generic files in /etc. </summary> @@ -79667,7 +62039,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_etc_symlinks" lineno="3369"> +<interface name="files_read_etc_symlinks" lineno="3437"> <summary> Read symbolic links in /etc. </summary> @@ -79677,7 +62049,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_etc_symlinks" lineno="3387"> +<interface name="files_watch_etc_symlinks" lineno="3455"> <summary> Watch /etc symlinks </summary> @@ -79687,7 +62059,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_etc_symlinks" lineno="3405"> +<interface name="files_manage_etc_symlinks" lineno="3473"> <summary> Create, read, write, and delete symbolic links in /etc. </summary> @@ -79697,7 +62069,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_etc_filetrans" lineno="3439"> +<interface name="files_etc_filetrans" lineno="3507"> <summary> Create objects in /etc with a private type using a type_transition. @@ -79723,7 +62095,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_create_boot_flag" lineno="3469"> +<interface name="files_create_boot_flag" lineno="3537"> <summary> Create a boot flag. </summary> @@ -79745,7 +62117,7 @@ The name of the object being created. </param> <rolecap/> </interface> -<interface name="files_delete_boot_flag" lineno="3495"> +<interface name="files_delete_boot_flag" lineno="3563"> <summary> Delete a boot flag. </summary> @@ -79762,7 +62134,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_getattr_etc_runtime_dirs" lineno="3514"> +<interface name="files_getattr_etc_runtime_dirs" lineno="3582"> <summary> Get the attributes of the etc_runtime directories. @@ -79773,7 +62145,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_etc_runtime_dirs" lineno="3533"> +<interface name="files_mounton_etc_runtime_dirs" lineno="3601"> <summary> Mount a filesystem on the etc_runtime directories. @@ -79784,7 +62156,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelto_etc_runtime_dirs" lineno="3551"> +<interface name="files_relabelto_etc_runtime_dirs" lineno="3619"> <summary> Relabel to etc_runtime_t dirs. </summary> @@ -79794,7 +62166,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3569"> +<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3637"> <summary> Do not audit attempts to set the attributes of the etc_runtime files </summary> @@ -79804,7 +62176,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_read_etc_runtime_files" lineno="3607"> +<interface name="files_read_etc_runtime_files" lineno="3675"> <summary> Read files in /etc that are dynamically created on boot, such as mtab. @@ -79834,7 +62206,7 @@ Domain allowed access. <infoflow type="read" weight="10" /> <rolecap/> </interface> -<interface name="files_dontaudit_read_etc_runtime_files" lineno="3629"> +<interface name="files_dontaudit_read_etc_runtime_files" lineno="3697"> <summary> Do not audit attempts to read files in /etc that are dynamically @@ -79846,7 +62218,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_read_etc_files" lineno="3648"> +<interface name="files_dontaudit_read_etc_files" lineno="3716"> <summary> Do not audit attempts to read files in /etc @@ -79857,7 +62229,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_write_etc_runtime_files" lineno="3667"> +<interface name="files_dontaudit_write_etc_runtime_files" lineno="3735"> <summary> Do not audit attempts to write etc runtime files. @@ -79868,7 +62240,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_rw_etc_runtime_files" lineno="3687"> +<interface name="files_rw_etc_runtime_files" lineno="3755"> <summary> Read and write files in /etc that are dynamically created on boot, such as mtab. @@ -79880,7 +62252,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_etc_runtime_files" lineno="3709"> +<interface name="files_manage_etc_runtime_files" lineno="3777"> <summary> Create, read, write, and delete files in /etc that are dynamically created on boot, @@ -79893,7 +62265,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabelto_etc_runtime_files" lineno="3727"> +<interface name="files_relabelto_etc_runtime_files" lineno="3795"> <summary> Relabel to etc_runtime_t files. </summary> @@ -79903,7 +62275,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_etc_filetrans_etc_runtime" lineno="3756"> +<interface name="files_etc_filetrans_etc_runtime" lineno="3824"> <summary> Create, etc runtime objects with an automatic type transition. @@ -79924,7 +62296,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_getattr_home_dir" lineno="3775"> +<interface name="files_getattr_home_dir" lineno="3843"> <summary> Get the attributes of the home directories root (/home). @@ -79935,7 +62307,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_home_dir" lineno="3796"> +<interface name="files_dontaudit_getattr_home_dir" lineno="3864"> <summary> Do not audit attempts to get the attributes of the home directories root @@ -79947,7 +62319,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_search_home" lineno="3815"> +<interface name="files_search_home" lineno="3883"> <summary> Search home directories root (/home). </summary> @@ -79957,7 +62329,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_home" lineno="3835"> +<interface name="files_dontaudit_search_home" lineno="3903"> <summary> Do not audit attempts to search home directories root (/home). @@ -79968,7 +62340,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_list_home" lineno="3855"> +<interface name="files_dontaudit_list_home" lineno="3923"> <summary> Do not audit attempts to list home directories root (/home). @@ -79979,7 +62351,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_home" lineno="3874"> +<interface name="files_list_home" lineno="3942"> <summary> Get listing of home directories. </summary> @@ -79989,7 +62361,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelto_home" lineno="3893"> +<interface name="files_relabelto_home" lineno="3961"> <summary> Relabel to user home root (/home). </summary> @@ -79999,7 +62371,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelfrom_home" lineno="3911"> +<interface name="files_relabelfrom_home" lineno="3979"> <summary> Relabel from user home root (/home). </summary> @@ -80009,7 +62381,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_home" lineno="3929"> +<interface name="files_watch_home" lineno="3997"> <summary> Watch the user home root (/home). </summary> @@ -80019,7 +62391,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_home_filetrans" lineno="3962"> +<interface name="files_home_filetrans" lineno="4030"> <summary> Create objects in /home. </summary> @@ -80044,7 +62416,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_getattr_lost_found_dirs" lineno="3980"> +<interface name="files_getattr_lost_found_dirs" lineno="4048"> <summary> Get the attributes of lost+found directories. </summary> @@ -80054,7 +62426,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3999"> +<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="4067"> <summary> Do not audit attempts to get the attributes of lost+found directories. @@ -80065,7 +62437,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_lost_found" lineno="4017"> +<interface name="files_list_lost_found" lineno="4085"> <summary> List the contents of lost+found directories. </summary> @@ -80075,7 +62447,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_lost_found" lineno="4037"> +<interface name="files_manage_lost_found" lineno="4105"> <summary> Create, read, write, and delete objects in lost+found directories. @@ -80087,7 +62459,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_search_mnt" lineno="4059"> +<interface name="files_search_mnt" lineno="4127"> <summary> Search the contents of /mnt. </summary> @@ -80097,7 +62469,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_mnt" lineno="4077"> +<interface name="files_dontaudit_search_mnt" lineno="4145"> <summary> Do not audit attempts to search /mnt. </summary> @@ -80107,7 +62479,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_mnt" lineno="4095"> +<interface name="files_list_mnt" lineno="4163"> <summary> List the contents of /mnt. </summary> @@ -80117,7 +62489,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_mnt" lineno="4113"> +<interface name="files_dontaudit_list_mnt" lineno="4181"> <summary> Do not audit attempts to list the contents of /mnt. </summary> @@ -80127,7 +62499,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_mnt" lineno="4131"> +<interface name="files_mounton_mnt" lineno="4199"> <summary> Mount a filesystem on /mnt. </summary> @@ -80137,7 +62509,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_mnt_dirs" lineno="4150"> +<interface name="files_manage_mnt_dirs" lineno="4218"> <summary> Create, read, write, and delete directories in /mnt. </summary> @@ -80148,7 +62520,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_mnt_files" lineno="4168"> +<interface name="files_manage_mnt_files" lineno="4236"> <summary> Create, read, write, and delete files in /mnt. </summary> @@ -80158,7 +62530,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_mnt_files" lineno="4186"> +<interface name="files_read_mnt_files" lineno="4254"> <summary> read files in /mnt. </summary> @@ -80168,7 +62540,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_mnt_symlinks" lineno="4204"> +<interface name="files_read_mnt_symlinks" lineno="4272"> <summary> Read symbolic links in /mnt. </summary> @@ -80178,7 +62550,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_mnt_symlinks" lineno="4222"> +<interface name="files_manage_mnt_symlinks" lineno="4290"> <summary> Create, read, write, and delete symbolic links in /mnt. </summary> @@ -80188,7 +62560,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_kernel_modules" lineno="4240"> +<interface name="files_search_kernel_modules" lineno="4308"> <summary> Search the contents of the kernel module directories. </summary> @@ -80198,7 +62570,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_kernel_modules" lineno="4259"> +<interface name="files_list_kernel_modules" lineno="4327"> <summary> List the contents of the kernel module directories. </summary> @@ -80208,7 +62580,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_kernel_modules" lineno="4278"> +<interface name="files_getattr_kernel_modules" lineno="4346"> <summary> Get the attributes of kernel module files. </summary> @@ -80218,7 +62590,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_kernel_modules" lineno="4296"> +<interface name="files_read_kernel_modules" lineno="4364"> <summary> Read kernel module files. </summary> @@ -80228,7 +62600,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mmap_read_kernel_modules" lineno="4316"> +<interface name="files_mmap_read_kernel_modules" lineno="4384"> <summary> Read and mmap kernel module files. </summary> @@ -80238,7 +62610,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_write_kernel_modules" lineno="4337"> +<interface name="files_write_kernel_modules" lineno="4405"> <summary> Write kernel module files. </summary> @@ -80248,7 +62620,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_kernel_modules" lineno="4356"> +<interface name="files_delete_kernel_modules" lineno="4424"> <summary> Delete kernel module files. </summary> @@ -80258,7 +62630,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_kernel_modules" lineno="4376"> +<interface name="files_manage_kernel_modules" lineno="4444"> <summary> Create, read, write, and delete kernel module files. @@ -80270,7 +62642,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabel_kernel_modules" lineno="4396"> +<interface name="files_relabel_kernel_modules" lineno="4464"> <summary> Relabel from and to kernel module files. </summary> @@ -80280,7 +62652,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_kernel_modules_filetrans" lineno="4431"> +<interface name="files_mounton_kernel_modules_dirs" lineno="4483"> +<summary> +Mount on kernel module directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_kernel_modules_filetrans" lineno="4517"> <summary> Create objects in the kernel module directories with a private type via an automatic type transition. @@ -80306,7 +62688,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_load_kernel_modules" lineno="4449"> +<interface name="files_load_kernel_modules" lineno="4535"> <summary> Load kernel module files. </summary> @@ -80316,7 +62698,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_load_kernel_modules" lineno="4468"> +<interface name="files_dontaudit_load_kernel_modules" lineno="4554"> <summary> Load kernel module files. </summary> @@ -80326,7 +62708,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_world_readable" lineno="4488"> +<interface name="files_list_world_readable" lineno="4574"> <summary> List world-readable directories. </summary> @@ -80337,7 +62719,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_world_readable_files" lineno="4507"> +<interface name="files_read_world_readable_files" lineno="4593"> <summary> Read world-readable files. </summary> @@ -80348,7 +62730,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_world_readable_symlinks" lineno="4526"> +<interface name="files_read_world_readable_symlinks" lineno="4612"> <summary> Read world-readable symbolic links. </summary> @@ -80359,7 +62741,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_world_readable_pipes" lineno="4544"> +<interface name="files_read_world_readable_pipes" lineno="4630"> <summary> Read world-readable named pipes. </summary> @@ -80369,7 +62751,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_world_readable_sockets" lineno="4562"> +<interface name="files_read_world_readable_sockets" lineno="4648"> <summary> Read world-readable sockets. </summary> @@ -80379,7 +62761,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_associate_tmp" lineno="4582"> +<interface name="files_associate_tmp" lineno="4668"> <summary> Allow the specified type to associate to a filesystem with the type of the @@ -80391,7 +62773,7 @@ Type of the file to associate. </summary> </param> </interface> -<interface name="files_getattr_tmp_dirs" lineno="4600"> +<interface name="files_getattr_tmp_dirs" lineno="4686"> <summary> Get the attributes of the tmp directory (/tmp). </summary> @@ -80401,7 +62783,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4619"> +<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4705"> <summary> Do not audit attempts to get the attributes of the tmp directory (/tmp). @@ -80412,7 +62794,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_tmp" lineno="4637"> +<interface name="files_search_tmp" lineno="4723"> <summary> Search the tmp directory (/tmp). </summary> @@ -80422,7 +62804,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_tmp" lineno="4655"> +<interface name="files_dontaudit_search_tmp" lineno="4741"> <summary> Do not audit attempts to search the tmp directory (/tmp). </summary> @@ -80432,7 +62814,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_tmp" lineno="4673"> +<interface name="files_list_tmp" lineno="4759"> <summary> Read the tmp directory (/tmp). </summary> @@ -80442,7 +62824,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_tmp" lineno="4691"> +<interface name="files_dontaudit_list_tmp" lineno="4777"> <summary> Do not audit listing of the tmp directory (/tmp). </summary> @@ -80452,7 +62834,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="files_delete_tmp_dir_entry" lineno="4709"> +<interface name="files_delete_tmp_dir_entry" lineno="4795"> <summary> Remove entries from the tmp directory. </summary> @@ -80462,7 +62844,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_generic_tmp_files" lineno="4727"> +<interface name="files_read_generic_tmp_files" lineno="4813"> <summary> Read files in the tmp directory (/tmp). </summary> @@ -80472,7 +62854,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_tmp_dirs" lineno="4745"> +<interface name="files_manage_generic_tmp_dirs" lineno="4831"> <summary> Manage temporary directories in /tmp. </summary> @@ -80482,7 +62864,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_generic_tmp_dirs" lineno="4763"> +<interface name="files_relabel_generic_tmp_dirs" lineno="4849"> <summary> Relabel temporary directories in /tmp. </summary> @@ -80492,7 +62874,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_tmp_files" lineno="4781"> +<interface name="files_manage_generic_tmp_files" lineno="4867"> <summary> Manage temporary files and directories in /tmp. </summary> @@ -80502,7 +62884,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_generic_tmp_symlinks" lineno="4799"> +<interface name="files_read_generic_tmp_symlinks" lineno="4885"> <summary> Read symbolic links in the tmp directory (/tmp). </summary> @@ -80512,7 +62894,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_generic_tmp_sockets" lineno="4817"> +<interface name="files_rw_generic_tmp_sockets" lineno="4903"> <summary> Read and write generic named sockets in the tmp directory (/tmp). </summary> @@ -80522,7 +62904,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_mounton_tmp" lineno="4835"> +<interface name="files_mounton_tmp" lineno="4921"> <summary> Mount filesystems in the tmp directory (/tmp) </summary> @@ -80532,7 +62914,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_all_tmp_dirs" lineno="4853"> +<interface name="files_setattr_all_tmp_dirs" lineno="4939"> <summary> Set the attributes of all tmp directories. </summary> @@ -80542,7 +62924,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_all_tmp" lineno="4871"> +<interface name="files_list_all_tmp" lineno="4957"> <summary> List all tmp directories. </summary> @@ -80552,7 +62934,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_tmp_dirs" lineno="4891"> +<interface name="files_relabel_all_tmp_dirs" lineno="4977"> <summary> Relabel to and from all temporary directory types. @@ -80564,7 +62946,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4912"> +<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4998"> <summary> Do not audit attempts to get the attributes of all tmp files. @@ -80575,7 +62957,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="files_getattr_all_tmp_files" lineno="4931"> +<interface name="files_getattr_all_tmp_files" lineno="5017"> <summary> Allow attempts to get the attributes of all tmp files. @@ -80586,7 +62968,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_tmp_files" lineno="4951"> +<interface name="files_relabel_all_tmp_files" lineno="5037"> <summary> Relabel to and from all temporary file types. @@ -80598,7 +62980,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4972"> +<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="5058"> <summary> Do not audit attempts to get the attributes of all tmp sock_file. @@ -80609,7 +62991,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="files_read_all_tmp_files" lineno="4990"> +<interface name="files_read_all_tmp_files" lineno="5076"> <summary> Read all tmp files. </summary> @@ -80619,7 +63001,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_tmp_filetrans" lineno="5024"> +<interface name="files_tmp_filetrans" lineno="5110"> <summary> Create an object in the tmp directories, with a private type using a type transition. @@ -80645,7 +63027,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_purge_tmp" lineno="5042"> +<interface name="files_purge_tmp" lineno="5128"> <summary> Delete the contents of /tmp. </summary> @@ -80655,7 +63037,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_all_tmpfs_files" lineno="5065"> +<interface name="files_getattr_all_tmpfs_files" lineno="5151"> <summary> Get the attributes of all tmpfs files. </summary> @@ -80665,7 +63047,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_usr_dirs" lineno="5084"> +<interface name="files_setattr_usr_dirs" lineno="5170"> <summary> Set the attributes of the /usr directory. </summary> @@ -80675,7 +63057,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_usr" lineno="5102"> +<interface name="files_search_usr" lineno="5188"> <summary> Search the content of /usr. </summary> @@ -80685,7 +63067,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_usr" lineno="5121"> +<interface name="files_list_usr" lineno="5207"> <summary> List the contents of generic directories in /usr. @@ -80696,7 +63078,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_usr_dirs" lineno="5139"> +<interface name="files_dontaudit_write_usr_dirs" lineno="5225"> <summary> Do not audit write of /usr dirs </summary> @@ -80706,7 +63088,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_rw_usr_dirs" lineno="5157"> +<interface name="files_rw_usr_dirs" lineno="5243"> <summary> Add and remove entries from /usr directories. </summary> @@ -80716,7 +63098,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_rw_usr_dirs" lineno="5176"> +<interface name="files_dontaudit_rw_usr_dirs" lineno="5262"> <summary> Do not audit attempts to add and remove entries from /usr directories. @@ -80727,7 +63109,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_delete_usr_dirs" lineno="5194"> +<interface name="files_delete_usr_dirs" lineno="5280"> <summary> Delete generic directories in /usr in the caller domain. </summary> @@ -80737,7 +63119,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_usr_dirs" lineno="5212"> +<interface name="files_watch_usr_dirs" lineno="5298"> <summary> Watch generic directories in /usr. </summary> @@ -80747,7 +63129,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_usr_files" lineno="5230"> +<interface name="files_delete_usr_files" lineno="5316"> <summary> Delete generic files in /usr in the caller domain. </summary> @@ -80757,7 +63139,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_getattr_usr_files" lineno="5248"> +<interface name="files_getattr_usr_files" lineno="5334"> <summary> Get the attributes of files in /usr. </summary> @@ -80767,7 +63149,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_map_usr_files" lineno="5267"> +<interface name="files_map_usr_files" lineno="5353"> <summary> Map generic files in /usr. </summary> @@ -80778,7 +63160,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_read_usr_files" lineno="5303"> +<interface name="files_read_usr_files" lineno="5389"> <summary> Read generic files in /usr. </summary> @@ -80806,7 +63188,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="files_exec_usr_files" lineno="5323"> +<interface name="files_exec_usr_files" lineno="5409"> <summary> Execute generic programs in /usr in the caller domain. </summary> @@ -80816,7 +63198,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_usr_files" lineno="5343"> +<interface name="files_dontaudit_write_usr_files" lineno="5429"> <summary> dontaudit write of /usr files </summary> @@ -80826,7 +63208,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_usr_files" lineno="5361"> +<interface name="files_manage_usr_files" lineno="5447"> <summary> Create, read, write, and delete files in the /usr directory. </summary> @@ -80836,7 +63218,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelto_usr_files" lineno="5379"> +<interface name="files_relabelto_usr_files" lineno="5465"> <summary> Relabel a file to the type used in /usr. </summary> @@ -80846,7 +63228,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabelfrom_usr_files" lineno="5397"> +<interface name="files_relabelfrom_usr_files" lineno="5483"> <summary> Relabel a file from the type used in /usr. </summary> @@ -80856,7 +63238,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_usr_symlinks" lineno="5415"> +<interface name="files_read_usr_symlinks" lineno="5501"> <summary> Read symbolic links in /usr. </summary> @@ -80866,7 +63248,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_usr_filetrans" lineno="5448"> +<interface name="files_usr_filetrans" lineno="5534"> <summary> Create objects in the /usr directory </summary> @@ -80891,7 +63273,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_search_src" lineno="5466"> +<interface name="files_search_src" lineno="5552"> <summary> Search directories in /usr/src. </summary> @@ -80901,7 +63283,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_src" lineno="5484"> +<interface name="files_dontaudit_search_src" lineno="5570"> <summary> Do not audit attempts to search /usr/src. </summary> @@ -80911,7 +63293,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_getattr_usr_src_files" lineno="5502"> +<interface name="files_getattr_usr_src_files" lineno="5588"> <summary> Get the attributes of files in /usr/src. </summary> @@ -80921,7 +63303,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_usr_src_files" lineno="5523"> +<interface name="files_read_usr_src_files" lineno="5609"> <summary> Read files in /usr/src. </summary> @@ -80931,7 +63313,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_exec_usr_src_files" lineno="5544"> +<interface name="files_exec_usr_src_files" lineno="5630"> <summary> Execute programs in /usr/src in the caller domain. </summary> @@ -80941,7 +63323,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_kernel_symbol_table" lineno="5564"> +<interface name="files_create_kernel_symbol_table" lineno="5650"> <summary> Install a system.map into the /boot directory. </summary> @@ -80951,7 +63333,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_kernel_symbol_table" lineno="5583"> +<interface name="files_read_kernel_symbol_table" lineno="5669"> <summary> Read system.map in the /boot directory. </summary> @@ -80961,7 +63343,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_kernel_symbol_table" lineno="5602"> +<interface name="files_delete_kernel_symbol_table" lineno="5688"> <summary> Delete a system.map in the /boot directory. </summary> @@ -80971,7 +63353,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_var" lineno="5621"> +<interface name="files_search_var" lineno="5707"> <summary> Search the contents of /var. </summary> @@ -80981,7 +63363,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_write_var_dirs" lineno="5639"> +<interface name="files_dontaudit_write_var_dirs" lineno="5725"> <summary> Do not audit attempts to write to /var. </summary> @@ -80991,7 +63373,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_write_var_dirs" lineno="5657"> +<interface name="files_write_var_dirs" lineno="5743"> <summary> Allow attempts to write to /var.dirs </summary> @@ -81001,7 +63383,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_var" lineno="5676"> +<interface name="files_dontaudit_search_var" lineno="5762"> <summary> Do not audit attempts to search the contents of /var. @@ -81012,7 +63394,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_var" lineno="5694"> +<interface name="files_list_var" lineno="5780"> <summary> List the contents of /var. </summary> @@ -81022,7 +63404,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_list_var" lineno="5713"> +<interface name="files_dontaudit_list_var" lineno="5799"> <summary> Do not audit attempts to list the contents of /var. @@ -81033,7 +63415,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_var_dirs" lineno="5732"> +<interface name="files_manage_var_dirs" lineno="5818"> <summary> Create, read, write, and delete directories in the /var directory. @@ -81044,7 +63426,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_var_dirs" lineno="5750"> +<interface name="files_relabel_var_dirs" lineno="5836"> <summary> relabelto/from var directories </summary> @@ -81054,7 +63436,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_var_files" lineno="5768"> +<interface name="files_read_var_files" lineno="5854"> <summary> Read files in the /var directory. </summary> @@ -81064,7 +63446,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_append_var_files" lineno="5786"> +<interface name="files_append_var_files" lineno="5872"> <summary> Append files in the /var directory. </summary> @@ -81074,7 +63456,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_var_files" lineno="5804"> +<interface name="files_rw_var_files" lineno="5890"> <summary> Read and write files in the /var directory. </summary> @@ -81084,7 +63466,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_rw_var_files" lineno="5823"> +<interface name="files_dontaudit_rw_var_files" lineno="5909"> <summary> Do not audit attempts to read and write files in the /var directory. @@ -81095,7 +63477,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_manage_var_files" lineno="5841"> +<interface name="files_manage_var_files" lineno="5927"> <summary> Create, read, write, and delete files in the /var directory. </summary> @@ -81105,7 +63487,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_var_symlinks" lineno="5859"> +<interface name="files_read_var_symlinks" lineno="5945"> <summary> Read symbolic links in the /var directory. </summary> @@ -81115,7 +63497,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_var_symlinks" lineno="5878"> +<interface name="files_manage_var_symlinks" lineno="5964"> <summary> Create, read, write, and delete symbolic links in the /var directory. @@ -81126,7 +63508,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_var_filetrans" lineno="5911"> +<interface name="files_var_filetrans" lineno="5997"> <summary> Create objects in the /var directory </summary> @@ -81151,7 +63533,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_getattr_var_lib_dirs" lineno="5929"> +<interface name="files_getattr_var_lib_dirs" lineno="6015"> <summary> Get the attributes of the /var/lib directory. </summary> @@ -81161,7 +63543,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_var_lib" lineno="5961"> +<interface name="files_search_var_lib" lineno="6047"> <summary> Search the /var/lib directory. </summary> @@ -81185,7 +63567,7 @@ Domain allowed access. </param> <infoflow type="read" weight="5"/> </interface> -<interface name="files_dontaudit_search_var_lib" lineno="5981"> +<interface name="files_dontaudit_search_var_lib" lineno="6067"> <summary> Do not audit attempts to search the contents of /var/lib. @@ -81197,7 +63579,7 @@ Domain to not audit. </param> <infoflow type="read" weight="5"/> </interface> -<interface name="files_list_var_lib" lineno="5999"> +<interface name="files_list_var_lib" lineno="6085"> <summary> List the contents of the /var/lib directory. </summary> @@ -81207,7 +63589,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_var_lib_dirs" lineno="6017"> +<interface name="files_rw_var_lib_dirs" lineno="6103"> <summary> Read-write /var/lib directories </summary> @@ -81217,7 +63599,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_var_lib_dirs" lineno="6035"> +<interface name="files_manage_var_lib_dirs" lineno="6121"> <summary> manage var_lib_t dirs </summary> @@ -81227,7 +63609,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_var_lib_dirs" lineno="6054"> +<interface name="files_relabel_var_lib_dirs" lineno="6140"> <summary> relabel var_lib_t dirs </summary> @@ -81237,7 +63619,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_var_lib_filetrans" lineno="6088"> +<interface name="files_var_lib_filetrans" lineno="6174"> <summary> Create objects in the /var/lib directory </summary> @@ -81262,7 +63644,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_read_var_lib_files" lineno="6107"> +<interface name="files_read_var_lib_files" lineno="6193"> <summary> Read generic files in /var/lib. </summary> @@ -81272,7 +63654,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_var_lib_symlinks" lineno="6126"> +<interface name="files_read_var_lib_symlinks" lineno="6212"> <summary> Read generic symbolic links in /var/lib </summary> @@ -81282,7 +63664,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_urandom_seed" lineno="6148"> +<interface name="files_manage_urandom_seed" lineno="6234"> <summary> Create, read, write, and delete the pseudorandom number generator seed. @@ -81293,7 +63675,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_mounttab" lineno="6168"> +<interface name="files_manage_mounttab" lineno="6254"> <summary> Allow domain to manage mount tables necessary for rpcd, nfsd, etc. @@ -81304,7 +63686,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_lock_dirs" lineno="6187"> +<interface name="files_setattr_lock_dirs" lineno="6273"> <summary> Set the attributes of the generic lock directories. </summary> @@ -81314,7 +63696,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_locks" lineno="6205"> +<interface name="files_search_locks" lineno="6291"> <summary> Search the locks directory (/var/lock). </summary> @@ -81324,7 +63706,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_locks" lineno="6225"> +<interface name="files_dontaudit_search_locks" lineno="6311"> <summary> Do not audit attempts to search the locks directory (/var/lock). @@ -81335,7 +63717,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_locks" lineno="6244"> +<interface name="files_list_locks" lineno="6330"> <summary> List generic lock directories. </summary> @@ -81345,7 +63727,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_check_write_lock_dirs" lineno="6263"> +<interface name="files_check_write_lock_dirs" lineno="6349"> <summary> Test write access on lock directories. </summary> @@ -81355,7 +63737,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_add_entry_lock_dirs" lineno="6282"> +<interface name="files_add_entry_lock_dirs" lineno="6368"> <summary> Add entries in the /var/lock directories. </summary> @@ -81365,7 +63747,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_lock_dirs" lineno="6302"> +<interface name="files_rw_lock_dirs" lineno="6388"> <summary> Add and remove entries in the /var/lock directories. @@ -81376,7 +63758,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_lock_dirs" lineno="6321"> +<interface name="files_create_lock_dirs" lineno="6407"> <summary> Create lock directories </summary> @@ -81386,7 +63768,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_relabel_all_lock_dirs" lineno="6342"> +<interface name="files_relabel_all_lock_dirs" lineno="6428"> <summary> Relabel to and from all lock directory types. </summary> @@ -81397,7 +63779,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_getattr_generic_locks" lineno="6363"> +<interface name="files_getattr_generic_locks" lineno="6449"> <summary> Get the attributes of generic lock files. </summary> @@ -81407,7 +63789,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_generic_locks" lineno="6384"> +<interface name="files_delete_generic_locks" lineno="6470"> <summary> Delete generic lock files. </summary> @@ -81417,7 +63799,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_locks" lineno="6405"> +<interface name="files_manage_generic_locks" lineno="6491"> <summary> Create, read, write, and delete generic lock files. @@ -81428,7 +63810,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_locks" lineno="6427"> +<interface name="files_delete_all_locks" lineno="6513"> <summary> Delete all lock files. </summary> @@ -81439,7 +63821,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_read_all_locks" lineno="6448"> +<interface name="files_read_all_locks" lineno="6534"> <summary> Read all lock files. </summary> @@ -81449,7 +63831,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_all_locks" lineno="6471"> +<interface name="files_manage_all_locks" lineno="6557"> <summary> manage all lock files. </summary> @@ -81459,7 +63841,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_locks" lineno="6494"> +<interface name="files_relabel_all_locks" lineno="6580"> <summary> Relabel from/to all lock files. </summary> @@ -81469,7 +63851,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_lock_filetrans" lineno="6533"> +<interface name="files_lock_filetrans" lineno="6619"> <summary> Create an object in the locks directory, with a private type using a type transition. @@ -81495,91 +63877,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_pid_dirs" lineno="6554"> -<summary> -Do not audit attempts to get the attributes -of the /var/run directory. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -</interface> -<interface name="files_mounton_pid_dirs" lineno="6569"> -<summary> -mounton a /var/run directory. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_setattr_pid_dirs" lineno="6584"> -<summary> -Set the attributes of the /var/run directory. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_search_pids" lineno="6600"> -<summary> -Search the contents of runtime process -ID directories (/var/run). (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_dontaudit_search_pids" lineno="6616"> -<summary> -Do not audit attempts to search -the /var/run directory. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -</interface> -<interface name="files_list_pids" lineno="6632"> -<summary> -List the contents of the runtime process -ID directories (/var/run). (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_check_write_pid_dirs" lineno="6647"> -<summary> -Check write access on /var/run directories. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_create_pid_dirs" lineno="6662"> -<summary> -Create a /var/run directory. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6678"> +<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6640"> <summary> Do not audit attempts to get the attributes of the /var/run directory. @@ -81590,7 +63888,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_mounton_runtime_dirs" lineno="6697"> +<interface name="files_mounton_runtime_dirs" lineno="6659"> <summary> mounton a /var/run directory. </summary> @@ -81600,7 +63898,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_setattr_runtime_dirs" lineno="6715"> +<interface name="files_setattr_runtime_dirs" lineno="6677"> <summary> Set the attributes of the /var/run directory. </summary> @@ -81610,7 +63908,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_runtime" lineno="6735"> +<interface name="files_search_runtime" lineno="6697"> <summary> Search the contents of runtime process ID directories (/var/run). @@ -81621,7 +63919,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_runtime" lineno="6755"> +<interface name="files_dontaudit_search_runtime" lineno="6717"> <summary> Do not audit attempts to search the /var/run directory. @@ -81632,7 +63930,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_runtime" lineno="6775"> +<interface name="files_list_runtime" lineno="6737"> <summary> List the contents of the runtime process ID directories (/var/run). @@ -81643,7 +63941,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_check_write_runtime_dirs" lineno="6794"> +<interface name="files_check_write_runtime_dirs" lineno="6756"> <summary> Check write access on /var/run directories. </summary> @@ -81653,7 +63951,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_runtime_dirs" lineno="6812"> +<interface name="files_create_runtime_dirs" lineno="6774"> <summary> Create a /var/run directory. </summary> @@ -81663,7 +63961,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_watch_runtime_dirs" lineno="6830"> +<interface name="files_watch_runtime_dirs" lineno="6792"> <summary> Watch /var/run directories. </summary> @@ -81673,208 +63971,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_generic_pids" lineno="6848"> -<summary> -Read generic process ID files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_write_generic_pid_pipes" lineno="6863"> -<summary> -Write named generic process ID pipes. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_pid_filetrans" lineno="6920"> -<summary> -Create an object in the process ID directory, with a private type. (Deprecated) -</summary> -<desc> -<p> -Create an object in the process ID directory (e.g., /var/run) -with a private type. Typically this is used for creating -private PID files in /var/run with the private type instead -of the general PID file type. To accomplish this goal, -either the program must be SELinux-aware, or use this interface. -</p> -<p> -Related interfaces: -</p> -<ul> -<li>files_runtime_file()</li> -</ul> -<p> -Example usage with a domain that can create and -write its PID file with a private PID file type in the -/var/run directory: -</p> -<p> -type mypidfile_t; -files_runtime_file(mypidfile_t) -allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; -files_runtime_filetrans(mydomain_t, mypidfile_t, file) -</p> -</desc> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<param name="private type"> -<summary> -The type of the object to be created. -</summary> -</param> -<param name="object"> -<summary> -The object class of the object being created. -</summary> -</param> -<param name="name" optional="true"> -<summary> -The name of the object being created. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="files_pid_filetrans_lock_dir" lineno="6940"> -<summary> -Create a generic lock directory within the run directories. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access -</summary> -</param> -<param name="name" optional="true"> -<summary> -The name of the object being created. -</summary> -</param> -</interface> -<interface name="files_rw_generic_pids" lineno="6955"> -<summary> -Read and write generic process ID files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_dontaudit_getattr_all_pids" lineno="6971"> -<summary> -Do not audit attempts to get the attributes of -daemon runtime data files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -</interface> -<interface name="files_dontaudit_write_all_pids" lineno="6986"> -<summary> -Do not audit attempts to write to daemon runtime data files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -</interface> -<interface name="files_dontaudit_ioctl_all_pids" lineno="7001"> -<summary> -Do not audit attempts to ioctl daemon runtime data files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -</interface> -<interface name="files_manage_all_pid_dirs" lineno="7017"> -<summary> -manage all pidfile directories -in the /var/run directory. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_read_all_pids" lineno="7033"> -<summary> -Read all process ID files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<rolecap/> -</interface> -<interface name="files_exec_generic_pid_files" lineno="7048"> -<summary> -Execute generic programs in /var/run in the caller domain. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_relabel_all_pid_files" lineno="7063"> -<summary> -Relabel all pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_delete_all_pids" lineno="7079"> -<summary> -Delete all process IDs. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<rolecap/> -</interface> -<interface name="files_create_all_pid_sockets" lineno="7098"> -<summary> -Create all pid sockets. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_create_all_pid_pipes" lineno="7113"> -<summary> -Create all pid named pipes. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_read_runtime_files" lineno="7128"> +<interface name="files_read_runtime_files" lineno="6810"> <summary> Read generic runtime files. </summary> @@ -81884,7 +63981,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_exec_runtime" lineno="7148"> +<interface name="files_exec_runtime" lineno="6830"> <summary> Execute generic programs in /var/run in the caller domain. </summary> @@ -81894,7 +63991,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_rw_runtime_files" lineno="7166"> +<interface name="files_rw_runtime_files" lineno="6848"> <summary> Read and write generic runtime files. </summary> @@ -81904,7 +64001,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_runtime_symlinks" lineno="7186"> +<interface name="files_delete_runtime_symlinks" lineno="6868"> <summary> Delete generic runtime symlinks. </summary> @@ -81914,7 +64011,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_write_runtime_pipes" lineno="7204"> +<interface name="files_write_runtime_pipes" lineno="6886"> <summary> Write named generic runtime pipes. </summary> @@ -81924,7 +64021,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_runtime_dirs" lineno="7224"> +<interface name="files_delete_all_runtime_dirs" lineno="6906"> <summary> Delete all runtime dirs. </summary> @@ -81935,7 +64032,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_all_runtime_dirs" lineno="7242"> +<interface name="files_manage_all_runtime_dirs" lineno="6924"> <summary> Create, read, write, and delete all runtime directories. </summary> @@ -81945,7 +64042,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_runtime_dirs" lineno="7260"> +<interface name="files_relabel_all_runtime_dirs" lineno="6942"> <summary> Relabel all runtime directories. </summary> @@ -81955,7 +64052,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7279"> +<interface name="files_dontaudit_getattr_all_runtime_files" lineno="6961"> <summary> Do not audit attempts to get the attributes of all runtime data files. @@ -81966,7 +64063,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_read_all_runtime_files" lineno="7300"> +<interface name="files_read_all_runtime_files" lineno="6982"> <summary> Read all runtime files. </summary> @@ -81977,7 +64074,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7321"> +<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7003"> <summary> Do not audit attempts to ioctl all runtime files. </summary> @@ -81987,7 +64084,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_dontaudit_write_all_runtime_files" lineno="7341"> +<interface name="files_dontaudit_write_all_runtime_files" lineno="7023"> <summary> Do not audit attempts to write to all runtime files. </summary> @@ -81997,7 +64094,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_delete_all_runtime_files" lineno="7362"> +<interface name="files_delete_all_runtime_files" lineno="7044"> <summary> Delete all runtime files. </summary> @@ -82008,7 +64105,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_all_runtime_files" lineno="7381"> +<interface name="files_manage_all_runtime_files" lineno="7063"> <summary> Create, read, write and delete all var_run (pid) files @@ -82019,7 +64116,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_runtime_files" lineno="7399"> +<interface name="files_relabel_all_runtime_files" lineno="7081"> <summary> Relabel all runtime files. </summary> @@ -82029,7 +64126,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_runtime_symlinks" lineno="7418"> +<interface name="files_delete_all_runtime_symlinks" lineno="7100"> <summary> Delete all runtime symlinks. </summary> @@ -82040,7 +64137,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_all_runtime_symlinks" lineno="7437"> +<interface name="files_manage_all_runtime_symlinks" lineno="7119"> <summary> Create, read, write and delete all var_run (pid) symbolic links. @@ -82051,7 +64148,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_runtime_symlinks" lineno="7455"> +<interface name="files_relabel_all_runtime_symlinks" lineno="7137"> <summary> Relabel all runtime symbolic links. </summary> @@ -82061,7 +64158,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_all_runtime_pipes" lineno="7473"> +<interface name="files_create_all_runtime_pipes" lineno="7155"> <summary> Create all runtime named pipes </summary> @@ -82071,7 +64168,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_runtime_pipes" lineno="7492"> +<interface name="files_delete_all_runtime_pipes" lineno="7174"> <summary> Delete all runtime named pipes </summary> @@ -82081,7 +64178,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_create_all_runtime_sockets" lineno="7511"> +<interface name="files_create_all_runtime_sockets" lineno="7193"> <summary> Create all runtime sockets. </summary> @@ -82091,7 +64188,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_runtime_sockets" lineno="7529"> +<interface name="files_delete_all_runtime_sockets" lineno="7211"> <summary> Delete all runtime sockets. </summary> @@ -82101,7 +64198,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_relabel_all_runtime_sockets" lineno="7547"> +<interface name="files_relabel_all_runtime_sockets" lineno="7229"> <summary> Relabel all runtime named sockets. </summary> @@ -82111,7 +64208,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_runtime_filetrans" lineno="7607"> +<interface name="files_runtime_filetrans" lineno="7289"> <summary> Create an object in the /run directory, with a private type. </summary> @@ -82163,7 +64260,7 @@ The name of the object being created. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="files_runtime_filetrans_lock_dir" lineno="7632"> +<interface name="files_runtime_filetrans_lock_dir" lineno="7314"> <summary> Create a generic lock directory within the run directories. </summary> @@ -82178,7 +64275,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_create_all_spool_sockets" lineno="7650"> +<interface name="files_create_all_spool_sockets" lineno="7332"> <summary> Create all spool sockets </summary> @@ -82188,7 +64285,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_spool_sockets" lineno="7668"> +<interface name="files_delete_all_spool_sockets" lineno="7350"> <summary> Delete all spool sockets </summary> @@ -82198,58 +64295,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_delete_all_pid_dirs" lineno="7686"> -<summary> -Delete all process ID directories. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_manage_all_pids" lineno="7702"> -<summary> -Create, read, write and delete all -var_run (pid) content (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_relabel_all_pid_dirs" lineno="7719"> -<summary> -Relabel to/from all var_run (pid) directories (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_relabel_all_pid_sock_files" lineno="7734"> -<summary> -Relabel to/from all var_run (pid) socket files (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_relabel_all_pids" lineno="7749"> -<summary> -Relabel to/from all var_run (pid) files and directories (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="files_mounton_all_poly_members" lineno="7767"> +<interface name="files_mounton_all_poly_members" lineno="7369"> <summary> Mount filesystems on all polyinstantiation member directories. @@ -82260,7 +64306,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_search_spool" lineno="7786"> +<interface name="files_search_spool" lineno="7388"> <summary> Search the contents of generic spool directories (/var/spool). @@ -82271,7 +64317,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_dontaudit_search_spool" lineno="7805"> +<interface name="files_dontaudit_search_spool" lineno="7407"> <summary> Do not audit attempts to search generic spool directories. @@ -82282,7 +64328,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="files_list_spool" lineno="7824"> +<interface name="files_list_spool" lineno="7426"> <summary> List the contents of generic spool (/var/spool) directories. @@ -82293,7 +64339,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_spool_dirs" lineno="7843"> +<interface name="files_manage_generic_spool_dirs" lineno="7445"> <summary> Create, read, write, and delete generic spool directories (/var/spool). @@ -82304,7 +64350,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_read_generic_spool" lineno="7862"> +<interface name="files_read_generic_spool" lineno="7464"> <summary> Read generic spool files. </summary> @@ -82314,7 +64360,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_generic_spool" lineno="7882"> +<interface name="files_manage_generic_spool" lineno="7484"> <summary> Create, read, write, and delete generic spool files. @@ -82325,7 +64371,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_spool_filetrans" lineno="7918"> +<interface name="files_spool_filetrans" lineno="7520"> <summary> Create objects in the spool directory with a private type with a type transition. @@ -82352,7 +64398,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="files_polyinstantiate_all" lineno="7938"> +<interface name="files_polyinstantiate_all" lineno="7540"> <summary> Allow access to manage all polyinstantiated directories on the system. @@ -82363,7 +64409,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_unconfined" lineno="7992"> +<interface name="files_unconfined" lineno="7594"> <summary> Unconfined access to files. </summary> @@ -82373,7 +64419,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_manage_etc_runtime_lnk_files" lineno="8014"> +<interface name="files_manage_etc_runtime_lnk_files" lineno="7616"> <summary> Create, read, write, and delete symbolic links in /etc that are dynamically created on boot. @@ -82385,7 +64431,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_dontaudit_read_etc_runtime" lineno="8032"> +<interface name="files_dontaudit_read_etc_runtime" lineno="7634"> <summary> Do not audit attempts to read etc_runtime resources </summary> @@ -82395,7 +64441,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="files_list_src" lineno="8050"> +<interface name="files_list_src" lineno="7652"> <summary> List usr/src files </summary> @@ -82405,7 +64451,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_read_src_files" lineno="8068"> +<interface name="files_read_src_files" lineno="7670"> <summary> Read usr/src files </summary> @@ -82415,7 +64461,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_manage_src_files" lineno="8086"> +<interface name="files_manage_src_files" lineno="7688"> <summary> Manage /usr/src files </summary> @@ -82425,7 +64471,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_lib_filetrans_kernel_modules" lineno="8117"> +<interface name="files_lib_filetrans_kernel_modules" lineno="7719"> <summary> Create a resource in the generic lib location with an automatic type transition towards the kernel modules @@ -82447,7 +64493,7 @@ Optional name of the resource </summary> </param> </interface> -<interface name="files_read_etc_runtime" lineno="8135"> +<interface name="files_read_etc_runtime" lineno="7737"> <summary> Read etc runtime resources </summary> @@ -82457,7 +64503,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="files_relabel_all_non_security_file_types" lineno="8157"> +<interface name="files_relabel_all_non_security_file_types" lineno="7759"> <summary> Allow relabel from and to non-security types </summary> @@ -82468,7 +64514,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_manage_all_non_security_file_types" lineno="8187"> +<interface name="files_manage_all_non_security_file_types" lineno="7789"> <summary> Manage non-security-sensitive resource types </summary> @@ -82479,7 +64525,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="files_relabel_all_pidfiles" lineno="8209"> +<interface name="files_relabel_all_pidfiles" lineno="7811"> <summary> Allow relabeling from and to any pidfile associated type </summary> @@ -82897,7 +64943,37 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_mount_cgroup" lineno="672"> +<interface name="fs_mount_bpf" lineno="672"> +<summary> +Mount a bpf filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_create_bpf_dirs" lineno="690"> +<summary> +Create bpf directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_bpf_files" lineno="708"> +<summary> +Manage bpf files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_mount_cgroup" lineno="726"> <summary> Mount cgroup filesystems. </summary> @@ -82907,7 +64983,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_cgroup" lineno="690"> +<interface name="fs_remount_cgroup" lineno="744"> <summary> Remount cgroup filesystems. </summary> @@ -82917,7 +64993,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_cgroup" lineno="708"> +<interface name="fs_unmount_cgroup" lineno="762"> <summary> Unmount cgroup filesystems. </summary> @@ -82927,7 +65003,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_cgroup" lineno="726"> +<interface name="fs_getattr_cgroup" lineno="780"> <summary> Get attributes of cgroup filesystems. </summary> @@ -82937,7 +65013,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_cgroup_dirs" lineno="744"> +<interface name="fs_search_cgroup_dirs" lineno="798"> <summary> Search cgroup directories. </summary> @@ -82947,7 +65023,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_cgroup_dirs" lineno="764"> +<interface name="fs_list_cgroup_dirs" lineno="818"> <summary> list cgroup directories. </summary> @@ -82957,7 +65033,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_ioctl_cgroup_dirs" lineno="783"> +<interface name="fs_ioctl_cgroup_dirs" lineno="837"> <summary> Ioctl cgroup directories. </summary> @@ -82967,7 +65043,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_delete_cgroup_dirs" lineno="802"> +<interface name="fs_delete_cgroup_dirs" lineno="856"> <summary> Delete cgroup directories. </summary> @@ -82977,7 +65053,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_cgroup_dirs" lineno="821"> +<interface name="fs_manage_cgroup_dirs" lineno="875"> <summary> Manage cgroup directories. </summary> @@ -82987,7 +65063,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_cgroup_dirs" lineno="841"> +<interface name="fs_relabel_cgroup_dirs" lineno="895"> <summary> Relabel cgroup directories. </summary> @@ -82997,7 +65073,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_cgroup_files" lineno="859"> +<interface name="fs_getattr_cgroup_files" lineno="913"> <summary> Get attributes of cgroup files. </summary> @@ -83007,7 +65083,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_cgroup_files" lineno="879"> +<interface name="fs_read_cgroup_files" lineno="933"> <summary> Read cgroup files. </summary> @@ -83017,7 +65093,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_watch_cgroup_files" lineno="900"> +<interface name="fs_watch_cgroup_files" lineno="954"> <summary> Watch cgroup files. </summary> @@ -83027,7 +65103,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_create_cgroup_links" lineno="919"> +<interface name="fs_create_cgroup_links" lineno="973"> <summary> Create cgroup lnk_files. </summary> @@ -83037,7 +65113,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_write_cgroup_files" lineno="939"> +<interface name="fs_write_cgroup_files" lineno="993"> <summary> Write cgroup files. </summary> @@ -83047,7 +65123,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_cgroup_files" lineno="958"> +<interface name="fs_rw_cgroup_files" lineno="1012"> <summary> Read and write cgroup files. </summary> @@ -83057,7 +65133,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_rw_cgroup_files" lineno="980"> +<interface name="fs_dontaudit_rw_cgroup_files" lineno="1034"> <summary> Do not audit attempts to open, get attributes, read and write @@ -83069,7 +65145,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_cgroup_files" lineno="998"> +<interface name="fs_manage_cgroup_files" lineno="1052"> <summary> Manage cgroup files. </summary> @@ -83079,7 +65155,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_cgroup_symlinks" lineno="1018"> +<interface name="fs_relabel_cgroup_symlinks" lineno="1072"> <summary> Relabel cgroup symbolic links. </summary> @@ -83089,7 +65165,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mounton_cgroup" lineno="1036"> +<interface name="fs_watch_cgroup_dirs" lineno="1090"> +<summary> +Watch cgroup directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_mounton_cgroup" lineno="1108"> <summary> Mount on cgroup directories. </summary> @@ -83099,7 +65185,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_cgroup_filetrans" lineno="1070"> +<interface name="fs_cgroup_filetrans" lineno="1142"> <summary> Create an object in a cgroup tmpfs filesystem, with a private type using a type transition. @@ -83125,7 +65211,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="fs_dontaudit_list_cifs_dirs" lineno="1091"> +<interface name="fs_dontaudit_list_cifs_dirs" lineno="1163"> <summary> Do not audit attempts to read dirs on a CIFS or SMB filesystem. @@ -83136,7 +65222,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mount_cifs" lineno="1109"> +<interface name="fs_mount_cifs" lineno="1181"> <summary> Mount a CIFS or SMB network filesystem. </summary> @@ -83146,7 +65232,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_cifs" lineno="1128"> +<interface name="fs_remount_cifs" lineno="1200"> <summary> Remount a CIFS or SMB network filesystem. This allows some mount options to be changed. @@ -83157,7 +65243,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_cifs" lineno="1146"> +<interface name="fs_unmount_cifs" lineno="1218"> <summary> Unmount a CIFS or SMB network filesystem. </summary> @@ -83167,7 +65253,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_cifs" lineno="1166"> +<interface name="fs_getattr_cifs" lineno="1238"> <summary> Get the attributes of a CIFS or SMB network filesystem. @@ -83179,7 +65265,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_search_cifs" lineno="1184"> +<interface name="fs_search_cifs" lineno="1256"> <summary> Search directories on a CIFS or SMB filesystem. </summary> @@ -83189,7 +65275,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_cifs" lineno="1203"> +<interface name="fs_list_cifs" lineno="1275"> <summary> List the contents of directories on a CIFS or SMB filesystem. @@ -83200,7 +65286,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_cifs" lineno="1222"> +<interface name="fs_dontaudit_list_cifs" lineno="1294"> <summary> Do not audit attempts to list the contents of directories on a CIFS or SMB filesystem. @@ -83211,7 +65297,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mounton_cifs" lineno="1240"> +<interface name="fs_mounton_cifs" lineno="1312"> <summary> Mounton a CIFS filesystem. </summary> @@ -83221,7 +65307,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_cifs_files" lineno="1259"> +<interface name="fs_read_cifs_files" lineno="1331"> <summary> Read files on a CIFS or SMB filesystem. </summary> @@ -83232,7 +65318,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_read_all_inherited_image_files" lineno="1279"> +<interface name="fs_read_all_inherited_image_files" lineno="1351"> <summary> Read all inherited filesystem image files. </summary> @@ -83243,7 +65329,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_read_all_image_files" lineno="1298"> +<interface name="fs_read_all_image_files" lineno="1370"> <summary> Read all filesystem image files. </summary> @@ -83254,7 +65340,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_mmap_read_all_image_files" lineno="1317"> +<interface name="fs_mmap_read_all_image_files" lineno="1389"> <summary> Mmap-read all filesystem image files. </summary> @@ -83265,7 +65351,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_rw_all_image_files" lineno="1336"> +<interface name="fs_rw_all_image_files" lineno="1408"> <summary> Read and write all filesystem image files. </summary> @@ -83276,7 +65362,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_mmap_rw_all_image_files" lineno="1355"> +<interface name="fs_mmap_rw_all_image_files" lineno="1427"> <summary> Mmap-Read-write all filesystem image files. </summary> @@ -83287,7 +65373,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_write_all_image_files" lineno="1374"> +<interface name="fs_dontaudit_write_all_image_files" lineno="1446"> <summary> Do not audit attempts to write all filesystem image files. </summary> @@ -83298,7 +65384,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_noxattr_fs" lineno="1394"> +<interface name="fs_getattr_noxattr_fs" lineno="1466"> <summary> Get the attributes of filesystems that do not have extended attribute support. @@ -83310,7 +65396,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_list_noxattr_fs" lineno="1412"> +<interface name="fs_list_noxattr_fs" lineno="1484"> <summary> Read all noxattrfs directories. </summary> @@ -83320,7 +65406,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_noxattr_fs" lineno="1431"> +<interface name="fs_dontaudit_list_noxattr_fs" lineno="1503"> <summary> Do not audit attempts to list all noxattrfs directories. @@ -83331,7 +65417,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_noxattr_fs_dirs" lineno="1449"> +<interface name="fs_manage_noxattr_fs_dirs" lineno="1521"> <summary> Create, read, write, and delete all noxattrfs directories. </summary> @@ -83341,7 +65427,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_noxattr_fs_files" lineno="1467"> +<interface name="fs_read_noxattr_fs_files" lineno="1539"> <summary> Read all noxattrfs files. </summary> @@ -83351,7 +65437,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1487"> +<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1559"> <summary> Do not audit attempts to read all noxattrfs files. @@ -83362,7 +65448,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1505"> +<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1577"> <summary> Dont audit attempts to write to noxattrfs files. </summary> @@ -83372,7 +65458,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_noxattr_fs_files" lineno="1523"> +<interface name="fs_manage_noxattr_fs_files" lineno="1595"> <summary> Create, read, write, and delete all noxattrfs files. </summary> @@ -83382,7 +65468,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_noxattr_fs_symlinks" lineno="1542"> +<interface name="fs_read_noxattr_fs_symlinks" lineno="1614"> <summary> Read all noxattrfs symbolic links. </summary> @@ -83392,7 +65478,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_noxattr_fs_symlinks" lineno="1561"> +<interface name="fs_manage_noxattr_fs_symlinks" lineno="1633"> <summary> Manage all noxattrfs symbolic links. </summary> @@ -83402,7 +65488,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_noxattr_fs" lineno="1581"> +<interface name="fs_relabelfrom_noxattr_fs" lineno="1653"> <summary> Relabel all objects from filesystems that do not support extended attributes. @@ -83413,7 +65499,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_cifs_files" lineno="1607"> +<interface name="fs_dontaudit_read_cifs_files" lineno="1679"> <summary> Do not audit attempts to read files on a CIFS or SMB filesystem. @@ -83424,7 +65510,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_append_cifs_files" lineno="1627"> +<interface name="fs_append_cifs_files" lineno="1699"> <summary> Append files on a CIFS filesystem. @@ -83436,7 +65522,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_append_cifs_files" lineno="1647"> +<interface name="fs_dontaudit_append_cifs_files" lineno="1719"> <summary> dontaudit Append files on a CIFS filesystem. @@ -83448,7 +65534,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_rw_cifs_files" lineno="1666"> +<interface name="fs_dontaudit_rw_cifs_files" lineno="1738"> <summary> Do not audit attempts to read or write files on a CIFS or SMB filesystem. @@ -83459,7 +65545,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_cifs_symlinks" lineno="1684"> +<interface name="fs_read_cifs_symlinks" lineno="1756"> <summary> Read symbolic links on a CIFS or SMB filesystem. </summary> @@ -83469,7 +65555,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_cifs_named_pipes" lineno="1704"> +<interface name="fs_read_cifs_named_pipes" lineno="1776"> <summary> Read named pipes on a CIFS or SMB network filesystem. @@ -83480,7 +65566,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_cifs_named_sockets" lineno="1723"> +<interface name="fs_read_cifs_named_sockets" lineno="1795"> <summary> Read named sockets on a CIFS or SMB network filesystem. @@ -83491,7 +65577,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_exec_cifs_files" lineno="1744"> +<interface name="fs_exec_cifs_files" lineno="1816"> <summary> Execute files on a CIFS or SMB network filesystem, in the caller @@ -83504,7 +65590,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_cifs_dirs" lineno="1765"> +<interface name="fs_manage_cifs_dirs" lineno="1837"> <summary> Create, read, write, and delete directories on a CIFS or SMB network filesystem. @@ -83516,7 +65602,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1785"> +<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1857"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -83528,7 +65614,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_cifs_files" lineno="1805"> +<interface name="fs_manage_cifs_files" lineno="1877"> <summary> Create, read, write, and delete files on a CIFS or SMB network filesystem. @@ -83540,7 +65626,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_cifs_files" lineno="1825"> +<interface name="fs_dontaudit_manage_cifs_files" lineno="1897"> <summary> Do not audit attempts to create, read, write, and delete files @@ -83552,7 +65638,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_cifs_symlinks" lineno="1844"> +<interface name="fs_manage_cifs_symlinks" lineno="1916"> <summary> Create, read, write, and delete symbolic links on a CIFS or SMB network filesystem. @@ -83563,7 +65649,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_cifs_named_pipes" lineno="1863"> +<interface name="fs_manage_cifs_named_pipes" lineno="1935"> <summary> Create, read, write, and delete named pipes on a CIFS or SMB network filesystem. @@ -83574,7 +65660,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_cifs_named_sockets" lineno="1882"> +<interface name="fs_manage_cifs_named_sockets" lineno="1954"> <summary> Create, read, write, and delete named sockets on a CIFS or SMB network filesystem. @@ -83585,7 +65671,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_cifs_domtrans" lineno="1925"> +<interface name="fs_cifs_domtrans" lineno="1997"> <summary> Execute a file on a CIFS or SMB filesystem in the specified domain. @@ -83620,7 +65706,7 @@ The type of the new process. </summary> </param> </interface> -<interface name="fs_manage_configfs_dirs" lineno="1945"> +<interface name="fs_manage_configfs_dirs" lineno="2017"> <summary> Create, read, write, and delete dirs on a configfs filesystem. @@ -83631,7 +65717,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_configfs_files" lineno="1964"> +<interface name="fs_manage_configfs_files" lineno="2036"> <summary> Create, read, write, and delete files on a configfs filesystem. @@ -83642,7 +65728,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_dos_fs" lineno="1983"> +<interface name="fs_mount_dos_fs" lineno="2055"> <summary> Mount a DOS filesystem, such as FAT32 or NTFS. @@ -83653,7 +65739,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_dos_fs" lineno="2003"> +<interface name="fs_remount_dos_fs" lineno="2075"> <summary> Remount a DOS filesystem, such as FAT32 or NTFS. This allows @@ -83665,7 +65751,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_dos_fs" lineno="2022"> +<interface name="fs_unmount_dos_fs" lineno="2094"> <summary> Unmount a DOS filesystem, such as FAT32 or NTFS. @@ -83676,7 +65762,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_dos_fs" lineno="2042"> +<interface name="fs_getattr_dos_fs" lineno="2114"> <summary> Get the attributes of a DOS filesystem, such as FAT32 or NTFS. @@ -83688,7 +65774,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_relabelfrom_dos_fs" lineno="2061"> +<interface name="fs_relabelfrom_dos_fs" lineno="2133"> <summary> Allow changing of the label of a DOS filesystem using the context= mount option. @@ -83699,7 +65785,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_dos_dirs" lineno="2079"> +<interface name="fs_getattr_dos_dirs" lineno="2151"> <summary> Get attributes of directories on a dosfs filesystem. </summary> @@ -83709,7 +65795,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_dos" lineno="2097"> +<interface name="fs_search_dos" lineno="2169"> <summary> Search dosfs filesystem. </summary> @@ -83719,7 +65805,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_dos" lineno="2115"> +<interface name="fs_list_dos" lineno="2187"> <summary> List dirs DOS filesystem. </summary> @@ -83729,7 +65815,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_dos_dirs" lineno="2134"> +<interface name="fs_manage_dos_dirs" lineno="2206"> <summary> Create, read, write, and delete dirs on a DOS filesystem. @@ -83740,7 +65826,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_dos_files" lineno="2152"> +<interface name="fs_read_dos_files" lineno="2224"> <summary> Read files on a DOS filesystem. </summary> @@ -83750,7 +65836,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mmap_read_dos_files" lineno="2170"> +<interface name="fs_mmap_read_dos_files" lineno="2242"> <summary> Read and map files on a DOS filesystem. </summary> @@ -83760,7 +65846,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_dos_files" lineno="2190"> +<interface name="fs_manage_dos_files" lineno="2262"> <summary> Create, read, write, and delete files on a DOS filesystem. @@ -83771,7 +65857,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_ecryptfs" lineno="2208"> +<interface name="fs_list_ecryptfs" lineno="2280"> <summary> Read symbolic links on an eCryptfs filesystem. </summary> @@ -83781,7 +65867,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_ecryptfs_dirs" lineno="2229"> +<interface name="fs_manage_ecryptfs_dirs" lineno="2301"> <summary> Create, read, write, and delete directories on an eCryptfs filesystem. @@ -83793,7 +65879,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_ecryptfs_files" lineno="2249"> +<interface name="fs_manage_ecryptfs_files" lineno="2321"> <summary> Create, read, write, and delete files on an eCryptfs filesystem. @@ -83805,7 +65891,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_ecryptfs_named_sockets" lineno="2268"> +<interface name="fs_manage_ecryptfs_named_sockets" lineno="2340"> <summary> Create, read, write, and delete named sockets on an eCryptfs filesystem. @@ -83816,7 +65902,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_efivarfs" lineno="2286"> +<interface name="fs_getattr_efivarfs" lineno="2358"> <summary> Get the attributes of efivarfs filesystems. </summary> @@ -83826,7 +65912,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_efivars" lineno="2304"> +<interface name="fs_list_efivars" lineno="2376"> <summary> List dirs in efivarfs filesystem. </summary> @@ -83836,7 +65922,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_efivarfs_files" lineno="2324"> +<interface name="fs_read_efivarfs_files" lineno="2396"> <summary> Read files in efivarfs - contains Linux Kernel configuration options for UEFI systems @@ -83848,7 +65934,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_efivarfs_files" lineno="2344"> +<interface name="fs_manage_efivarfs_files" lineno="2416"> <summary> Create, read, write, and delete files on a efivarfs filesystem. @@ -83860,7 +65946,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_fusefs" lineno="2362"> +<interface name="fs_getattr_fusefs" lineno="2434"> <summary> stat a FUSE filesystem </summary> @@ -83870,7 +65956,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_fusefs" lineno="2380"> +<interface name="fs_mount_fusefs" lineno="2452"> <summary> Mount a FUSE filesystem. </summary> @@ -83880,7 +65966,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_fusefs" lineno="2398"> +<interface name="fs_unmount_fusefs" lineno="2470"> <summary> Unmount a FUSE filesystem. </summary> @@ -83890,7 +65976,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_fusefs" lineno="2416"> +<interface name="fs_remount_fusefs" lineno="2488"> <summary> Remount a FUSE filesystem. </summary> @@ -83900,7 +65986,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mounton_fusefs" lineno="2434"> +<interface name="fs_mounton_fusefs" lineno="2506"> <summary> Mounton a FUSEFS filesystem. </summary> @@ -83910,7 +65996,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_fusefs_entry_type" lineno="2453"> +<interface name="fs_fusefs_entry_type" lineno="2525"> <summary> Make FUSEFS files an entrypoint for the specified domain. @@ -83921,7 +66007,7 @@ The domain for which fusefs_t is an entrypoint. </summary> </param> </interface> -<interface name="fs_fusefs_domtrans" lineno="2486"> +<interface name="fs_fusefs_domtrans" lineno="2558"> <summary> Execute FUSEFS files in a specified domain. </summary> @@ -83946,7 +66032,7 @@ Domain to transition to. </summary> </param> </interface> -<interface name="fs_search_fusefs" lineno="2506"> +<interface name="fs_search_fusefs" lineno="2578"> <summary> Search directories on a FUSEFS filesystem. @@ -83958,7 +66044,19 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_list_fusefs" lineno="2525"> +<interface name="fs_list_fusefs" lineno="2598"> +<summary> +List the contents of directories +on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_list_fusefs" lineno="2617"> <summary> Do not audit attempts to list the contents of directories on a FUSEFS filesystem. @@ -83969,7 +66067,19 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_fusefs_dirs" lineno="2545"> +<interface name="fs_setattr_fusefs_dirs" lineno="2637"> +<summary> +Set the attributes of directories +on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_manage_fusefs_dirs" lineno="2657"> <summary> Create, read, write, and delete directories on a FUSEFS filesystem. @@ -83981,7 +66091,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2565"> +<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2677"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -83993,7 +66103,19 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_fusefs_files" lineno="2584"> +<interface name="fs_getattr_fusefs_files" lineno="2697"> +<summary> +Get the attributes of files on a +FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_read_fusefs_files" lineno="2716"> <summary> Read, a FUSEFS filesystem. </summary> @@ -84004,7 +66126,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_exec_fusefs_files" lineno="2603"> +<interface name="fs_exec_fusefs_files" lineno="2735"> <summary> Execute files on a FUSEFS filesystem. </summary> @@ -84015,7 +66137,19 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_fusefs_files" lineno="2623"> +<interface name="fs_setattr_fusefs_files" lineno="2755"> +<summary> +Set the attributes of files on a +FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_manage_fusefs_files" lineno="2775"> <summary> Create, read, write, and delete files on a FUSEFS filesystem. @@ -84027,7 +66161,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_fusefs_files" lineno="2643"> +<interface name="fs_dontaudit_manage_fusefs_files" lineno="2795"> <summary> Do not audit attempts to create, read, write, and delete files @@ -84039,7 +66173,19 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_fusefs_symlinks" lineno="2661"> +<interface name="fs_getattr_fusefs_symlinks" lineno="2815"> +<summary> +Get the attributes of symlinks +on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_read_fusefs_symlinks" lineno="2833"> <summary> Read symbolic links on a FUSEFS filesystem. </summary> @@ -84049,7 +66195,19 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_fusefs_symlinks" lineno="2681"> +<interface name="fs_setattr_fusefs_symlinks" lineno="2854"> +<summary> +Set the attributes of symlinks +on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_manage_fusefs_symlinks" lineno="2873"> <summary> Manage symlinks on a FUSEFS filesystem. </summary> @@ -84060,7 +66218,115 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_hugetlbfs" lineno="2700"> +<interface name="fs_getattr_fusefs_fifo_files" lineno="2893"> +<summary> +Get the attributes of named pipes +on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_setattr_fusefs_fifo_files" lineno="2913"> +<summary> +Set the attributes of named pipes +on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_manage_fusefs_fifo_files" lineno="2933"> +<summary> +Manage named pipes on a FUSEFS +filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_getattr_fusefs_sock_files" lineno="2953"> +<summary> +Get the attributes of named sockets +on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_setattr_fusefs_sock_files" lineno="2973"> +<summary> +Set the attributes of named sockets +on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_manage_fusefs_sock_files" lineno="2993"> +<summary> +Manage named sockets on a FUSEFS +filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_getattr_fusefs_chr_files" lineno="3013"> +<summary> +Get the attributes of character files +on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_setattr_fusefs_chr_files" lineno="3033"> +<summary> +Set the attributes of character files +on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_manage_fusefs_chr_files" lineno="3053"> +<summary> +Manage character files on a FUSEFS +filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_getattr_hugetlbfs" lineno="3072"> <summary> Get the attributes of an hugetlbfs filesystem. @@ -84071,7 +66337,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_hugetlbfs" lineno="2718"> +<interface name="fs_list_hugetlbfs" lineno="3090"> <summary> List hugetlbfs. </summary> @@ -84081,7 +66347,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_hugetlbfs_dirs" lineno="2736"> +<interface name="fs_manage_hugetlbfs_dirs" lineno="3108"> <summary> Manage hugetlbfs dirs. </summary> @@ -84091,7 +66357,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2754"> +<interface name="fs_rw_inherited_hugetlbfs_files" lineno="3126"> <summary> Read and write inherited hugetlbfs files. </summary> @@ -84101,7 +66367,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_hugetlbfs_files" lineno="2772"> +<interface name="fs_rw_hugetlbfs_files" lineno="3144"> <summary> Read and write hugetlbfs files. </summary> @@ -84111,7 +66377,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2790"> +<interface name="fs_mmap_rw_hugetlbfs_files" lineno="3162"> <summary> Read, map and write hugetlbfs files. </summary> @@ -84121,7 +66387,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_associate_hugetlbfs" lineno="2809"> +<interface name="fs_associate_hugetlbfs" lineno="3181"> <summary> Allow the type to associate to hugetlbfs filesystems. </summary> @@ -84131,7 +66397,7 @@ The type of the object to be associated. </summary> </param> </interface> -<interface name="fs_search_inotifyfs" lineno="2827"> +<interface name="fs_search_inotifyfs" lineno="3199"> <summary> Search inotifyfs filesystem. </summary> @@ -84141,7 +66407,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_inotifyfs" lineno="2845"> +<interface name="fs_list_inotifyfs" lineno="3217"> <summary> List inotifyfs filesystem. </summary> @@ -84151,7 +66417,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_inotifyfs" lineno="2863"> +<interface name="fs_dontaudit_list_inotifyfs" lineno="3235"> <summary> Dontaudit List inotifyfs filesystem. </summary> @@ -84161,7 +66427,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_hugetlbfs_filetrans" lineno="2897"> +<interface name="fs_hugetlbfs_filetrans" lineno="3269"> <summary> Create an object in a hugetlbfs filesystem, with a private type using a type transition. @@ -84187,7 +66453,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="fs_mount_iso9660_fs" lineno="2917"> +<interface name="fs_mount_iso9660_fs" lineno="3289"> <summary> Mount an iso9660 filesystem, which is usually used on CDs. @@ -84198,7 +66464,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_iso9660_fs" lineno="2937"> +<interface name="fs_remount_iso9660_fs" lineno="3309"> <summary> Remount an iso9660 filesystem, which is usually used on CDs. This allows @@ -84210,7 +66476,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_iso9660_fs" lineno="2956"> +<interface name="fs_relabelfrom_iso9660_fs" lineno="3328"> <summary> Allow changing of the label of a filesystem with iso9660 type @@ -84221,7 +66487,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_iso9660_fs" lineno="2975"> +<interface name="fs_unmount_iso9660_fs" lineno="3347"> <summary> Unmount an iso9660 filesystem, which is usually used on CDs. @@ -84232,7 +66498,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_iso9660_fs" lineno="2995"> +<interface name="fs_getattr_iso9660_fs" lineno="3367"> <summary> Get the attributes of an iso9660 filesystem, which is usually used on CDs. @@ -84244,7 +66510,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_iso9660_files" lineno="3014"> +<interface name="fs_getattr_iso9660_files" lineno="3386"> <summary> Get the attributes of files on an iso9660 filesystem, which is usually used on CDs. @@ -84255,7 +66521,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_iso9660_files" lineno="3034"> +<interface name="fs_read_iso9660_files" lineno="3406"> <summary> Read files on an iso9660 filesystem, which is usually used on CDs. @@ -84266,7 +66532,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_nfs" lineno="3054"> +<interface name="fs_mount_nfs" lineno="3426"> <summary> Mount a NFS filesystem. </summary> @@ -84276,7 +66542,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_nfs" lineno="3073"> +<interface name="fs_remount_nfs" lineno="3445"> <summary> Remount a NFS filesystem. This allows some mount options to be changed. @@ -84287,7 +66553,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_nfs" lineno="3091"> +<interface name="fs_unmount_nfs" lineno="3463"> <summary> Unmount a NFS filesystem. </summary> @@ -84297,7 +66563,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nfs" lineno="3110"> +<interface name="fs_getattr_nfs" lineno="3482"> <summary> Get the attributes of a NFS filesystem. </summary> @@ -84308,7 +66574,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_search_nfs" lineno="3128"> +<interface name="fs_search_nfs" lineno="3500"> <summary> Search directories on a NFS filesystem. </summary> @@ -84318,7 +66584,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_nfs" lineno="3146"> +<interface name="fs_list_nfs" lineno="3518"> <summary> List NFS filesystem. </summary> @@ -84328,7 +66594,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_nfs" lineno="3165"> +<interface name="fs_dontaudit_list_nfs" lineno="3537"> <summary> Do not audit attempts to list the contents of directories on a NFS filesystem. @@ -84339,7 +66605,18 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mounton_nfs" lineno="3183"> +<interface name="fs_watch_nfs_dirs" lineno="3556"> +<summary> +Add a watch on directories on an NFS +filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_mounton_nfs" lineno="3574"> <summary> Mounton a NFS filesystem. </summary> @@ -84349,7 +66626,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_nfs_files" lineno="3202"> +<interface name="fs_read_nfs_files" lineno="3593"> <summary> Read files on a NFS filesystem. </summary> @@ -84360,7 +66637,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_read_nfs_files" lineno="3222"> +<interface name="fs_dontaudit_read_nfs_files" lineno="3613"> <summary> Do not audit attempts to read files on a NFS filesystem. @@ -84371,7 +66648,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_write_nfs_files" lineno="3240"> +<interface name="fs_write_nfs_files" lineno="3631"> <summary> Read files on a NFS filesystem. </summary> @@ -84381,7 +66658,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_exec_nfs_files" lineno="3260"> +<interface name="fs_exec_nfs_files" lineno="3651"> <summary> Execute files on a NFS filesystem. </summary> @@ -84392,7 +66669,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_append_nfs_files" lineno="3281"> +<interface name="fs_append_nfs_files" lineno="3672"> <summary> Append files on a NFS filesystem. @@ -84404,7 +66681,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_append_nfs_files" lineno="3301"> +<interface name="fs_dontaudit_append_nfs_files" lineno="3692"> <summary> dontaudit Append files on a NFS filesystem. @@ -84416,7 +66693,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_rw_nfs_files" lineno="3320"> +<interface name="fs_dontaudit_rw_nfs_files" lineno="3711"> <summary> Do not audit attempts to read or write files on a NFS filesystem. @@ -84427,7 +66704,17 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_nfs_symlinks" lineno="3338"> +<interface name="fs_watch_nfs_files" lineno="3729"> +<summary> +Add a watch on files on an NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_nfs_symlinks" lineno="3747"> <summary> Read symbolic links on a NFS filesystem. </summary> @@ -84437,7 +66724,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3357"> +<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3766"> <summary> Dontaudit read symbolic links on a NFS filesystem. </summary> @@ -84447,7 +66734,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_read_nfs_named_sockets" lineno="3375"> +<interface name="fs_read_nfs_named_sockets" lineno="3784"> <summary> Read named sockets on a NFS filesystem. </summary> @@ -84457,7 +66744,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_nfs_named_pipes" lineno="3394"> +<interface name="fs_read_nfs_named_pipes" lineno="3803"> <summary> Read named pipes on a NFS network filesystem. </summary> @@ -84468,7 +66755,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_getattr_rpc_dirs" lineno="3413"> +<interface name="fs_getattr_rpc_dirs" lineno="3822"> <summary> Get the attributes of directories of RPC file system pipes. @@ -84479,7 +66766,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_rpc" lineno="3432"> +<interface name="fs_search_rpc" lineno="3841"> <summary> Search directories of RPC file system pipes. </summary> @@ -84489,7 +66776,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_removable" lineno="3450"> +<interface name="fs_search_removable" lineno="3859"> <summary> Search removable storage directories. </summary> @@ -84499,7 +66786,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_removable" lineno="3468"> +<interface name="fs_dontaudit_list_removable" lineno="3877"> <summary> Do not audit attempts to list removable storage directories. </summary> @@ -84509,7 +66796,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="fs_read_removable_files" lineno="3486"> +<interface name="fs_read_removable_files" lineno="3895"> <summary> Read removable storage files. </summary> @@ -84519,7 +66806,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_removable_files" lineno="3504"> +<interface name="fs_dontaudit_read_removable_files" lineno="3913"> <summary> Do not audit attempts to read removable storage files. </summary> @@ -84529,7 +66816,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="fs_dontaudit_write_removable_files" lineno="3522"> +<interface name="fs_dontaudit_write_removable_files" lineno="3931"> <summary> Do not audit attempts to write removable storage files. </summary> @@ -84539,7 +66826,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="fs_read_removable_symlinks" lineno="3540"> +<interface name="fs_read_removable_symlinks" lineno="3949"> <summary> Read removable storage symbolic links. </summary> @@ -84549,7 +66836,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_removable_blk_files" lineno="3558"> +<interface name="fs_read_removable_blk_files" lineno="3967"> <summary> Read block nodes on removable filesystems. </summary> @@ -84559,7 +66846,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_removable_blk_files" lineno="3577"> +<interface name="fs_rw_removable_blk_files" lineno="3986"> <summary> Read and write block nodes on removable filesystems. </summary> @@ -84569,7 +66856,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_rpc" lineno="3596"> +<interface name="fs_list_rpc" lineno="4005"> <summary> Read directories of RPC file system pipes. </summary> @@ -84579,7 +66866,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_rpc_files" lineno="3614"> +<interface name="fs_read_rpc_files" lineno="4023"> <summary> Read files of RPC file system pipes. </summary> @@ -84589,7 +66876,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_rpc_symlinks" lineno="3632"> +<interface name="fs_read_rpc_symlinks" lineno="4041"> <summary> Read symbolic links of RPC file system pipes. </summary> @@ -84599,7 +66886,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_rpc_sockets" lineno="3650"> +<interface name="fs_read_rpc_sockets" lineno="4059"> <summary> Read sockets of RPC file system pipes. </summary> @@ -84609,7 +66896,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_rpc_sockets" lineno="3668"> +<interface name="fs_rw_rpc_sockets" lineno="4077"> <summary> Read and write sockets of RPC file system pipes. </summary> @@ -84619,7 +66906,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_nfs_dirs" lineno="3688"> +<interface name="fs_manage_nfs_dirs" lineno="4097"> <summary> Create, read, write, and delete directories on a NFS filesystem. @@ -84631,7 +66918,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3708"> +<interface name="fs_dontaudit_manage_nfs_dirs" lineno="4117"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -84643,7 +66930,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_nfs_files" lineno="3728"> +<interface name="fs_manage_nfs_files" lineno="4137"> <summary> Create, read, write, and delete files on a NFS filesystem. @@ -84655,7 +66942,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_nfs_files" lineno="3748"> +<interface name="fs_dontaudit_manage_nfs_files" lineno="4157"> <summary> Do not audit attempts to create, read, write, and delete files @@ -84667,7 +66954,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_nfs_symlinks" lineno="3768"> +<interface name="fs_manage_nfs_symlinks" lineno="4177"> <summary> Create, read, write, and delete symbolic links on a NFS network filesystem. @@ -84679,7 +66966,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_manage_nfs_named_pipes" lineno="3787"> +<interface name="fs_manage_nfs_named_pipes" lineno="4196"> <summary> Create, read, write, and delete named pipes on a NFS filesystem. @@ -84690,7 +66977,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_nfs_named_sockets" lineno="3806"> +<interface name="fs_manage_nfs_named_sockets" lineno="4215"> <summary> Create, read, write, and delete named sockets on a NFS filesystem. @@ -84701,7 +66988,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_nfs_domtrans" lineno="3849"> +<interface name="fs_nfs_domtrans" lineno="4258"> <summary> Execute a file on a NFS filesystem in the specified domain. @@ -84736,7 +67023,7 @@ The type of the new process. </summary> </param> </interface> -<interface name="fs_mount_nfsd_fs" lineno="3868"> +<interface name="fs_mount_nfsd_fs" lineno="4277"> <summary> Mount a NFS server pseudo filesystem. </summary> @@ -84746,7 +67033,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_nfsd_fs" lineno="3887"> +<interface name="fs_remount_nfsd_fs" lineno="4296"> <summary> Mount a NFS server pseudo filesystem. This allows some mount options to be changed. @@ -84757,7 +67044,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_nfsd_fs" lineno="3905"> +<interface name="fs_unmount_nfsd_fs" lineno="4314"> <summary> Unmount a NFS server pseudo filesystem. </summary> @@ -84767,7 +67054,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nfsd_fs" lineno="3924"> +<interface name="fs_getattr_nfsd_fs" lineno="4333"> <summary> Get the attributes of a NFS server pseudo filesystem. @@ -84778,7 +67065,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_nfsd_fs" lineno="3942"> +<interface name="fs_search_nfsd_fs" lineno="4351"> <summary> Search NFS server directories. </summary> @@ -84788,7 +67075,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_nfsd_fs" lineno="3960"> +<interface name="fs_list_nfsd_fs" lineno="4369"> <summary> List NFS server directories. </summary> @@ -84798,7 +67085,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_watch_nfsd_dirs" lineno="3978"> +<interface name="fs_watch_nfsd_dirs" lineno="4387"> <summary> Watch NFS server directories. </summary> @@ -84808,7 +67095,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nfsd_files" lineno="3996"> +<interface name="fs_getattr_nfsd_files" lineno="4405"> <summary> Getattr files on an nfsd filesystem </summary> @@ -84818,7 +67105,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_nfsd_fs" lineno="4014"> +<interface name="fs_rw_nfsd_fs" lineno="4423"> <summary> Read and write NFS server files. </summary> @@ -84828,7 +67115,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nsfs_files" lineno="4032"> +<interface name="fs_getattr_nsfs_files" lineno="4441"> <summary> Get the attributes of nsfs inodes (e.g. /proc/pid/ns/uts) </summary> @@ -84838,7 +67125,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_nsfs_files" lineno="4050"> +<interface name="fs_read_nsfs_files" lineno="4459"> <summary> Read nsfs inodes (e.g. /proc/pid/ns/uts) </summary> @@ -84848,7 +67135,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_nsfs" lineno="4068"> +<interface name="fs_watch_nfsd_files" lineno="4477"> +<summary> +Watch NFS server files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_nsfs" lineno="4495"> <summary> Get the attributes of an nsfs filesystem. </summary> @@ -84858,7 +67155,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_nsfs" lineno="4086"> +<interface name="fs_unmount_nsfs" lineno="4513"> <summary> Unmount an nsfs filesystem. </summary> @@ -84868,7 +67165,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_pstorefs" lineno="4104"> +<interface name="fs_getattr_pstorefs" lineno="4531"> <summary> Get the attributes of a pstore filesystem. </summary> @@ -84878,7 +67175,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_pstore_dirs" lineno="4123"> +<interface name="fs_getattr_pstore_dirs" lineno="4550"> <summary> Get the attributes of directories of a pstore filesystem. @@ -84889,7 +67186,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_create_pstore_dirs" lineno="4142"> +<interface name="fs_create_pstore_dirs" lineno="4569"> <summary> Create pstore directories. </summary> @@ -84899,7 +67196,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_pstore_dirs" lineno="4161"> +<interface name="fs_relabel_pstore_dirs" lineno="4588"> <summary> Relabel to/from pstore_t directories. </summary> @@ -84909,7 +67206,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_pstore_dirs" lineno="4180"> +<interface name="fs_list_pstore_dirs" lineno="4607"> <summary> List the directories of a pstore filesystem. @@ -84920,7 +67217,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_pstore_files" lineno="4199"> +<interface name="fs_read_pstore_files" lineno="4626"> <summary> Read pstore_t files </summary> @@ -84930,7 +67227,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_delete_pstore_files" lineno="4218"> +<interface name="fs_delete_pstore_files" lineno="4645"> <summary> Delete the files of a pstore filesystem. @@ -84941,7 +67238,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_associate_ramfs" lineno="4237"> +<interface name="fs_associate_ramfs" lineno="4664"> <summary> Allow the type to associate to ramfs filesystems. </summary> @@ -84951,7 +67248,7 @@ The type of the object to be associated. </summary> </param> </interface> -<interface name="fs_mount_ramfs" lineno="4255"> +<interface name="fs_mount_ramfs" lineno="4682"> <summary> Mount a RAM filesystem. </summary> @@ -84961,7 +67258,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_ramfs" lineno="4274"> +<interface name="fs_remount_ramfs" lineno="4701"> <summary> Remount a RAM filesystem. This allows some mount options to be changed. @@ -84972,7 +67269,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_ramfs" lineno="4292"> +<interface name="fs_unmount_ramfs" lineno="4719"> <summary> Unmount a RAM filesystem. </summary> @@ -84982,7 +67279,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_ramfs" lineno="4310"> +<interface name="fs_getattr_ramfs" lineno="4737"> <summary> Get the attributes of a RAM filesystem. </summary> @@ -84992,7 +67289,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_ramfs" lineno="4328"> +<interface name="fs_search_ramfs" lineno="4755"> <summary> Search directories on a ramfs </summary> @@ -85002,7 +67299,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_search_ramfs" lineno="4346"> +<interface name="fs_dontaudit_search_ramfs" lineno="4773"> <summary> Dontaudit Search directories on a ramfs </summary> @@ -85012,7 +67309,18 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_ramfs_dirs" lineno="4365"> +<interface name="fs_setattr_ramfs_dirs" lineno="4792"> +<summary> +Set the attributes of directories on +a ramfs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_ramfs_dirs" lineno="4811"> <summary> Create, read, write, and delete directories on a ramfs. @@ -85023,7 +67331,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_read_ramfs_files" lineno="4383"> +<interface name="fs_dontaudit_read_ramfs_files" lineno="4829"> <summary> Dontaudit read on a ramfs files. </summary> @@ -85033,7 +67341,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4401"> +<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4847"> <summary> Dontaudit read on a ramfs fifo_files. </summary> @@ -85043,7 +67351,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_ramfs_files" lineno="4420"> +<interface name="fs_manage_ramfs_files" lineno="4866"> <summary> Create, read, write, and delete files on a ramfs filesystem. @@ -85054,7 +67362,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_write_ramfs_pipes" lineno="4438"> +<interface name="fs_write_ramfs_pipes" lineno="4884"> <summary> Write to named pipe on a ramfs filesystem. </summary> @@ -85064,7 +67372,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4457"> +<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4903"> <summary> Do not audit attempts to write to named pipes on a ramfs filesystem. @@ -85075,7 +67383,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_rw_ramfs_pipes" lineno="4475"> +<interface name="fs_rw_ramfs_pipes" lineno="4921"> <summary> Read and write a named pipe on a ramfs filesystem. </summary> @@ -85085,7 +67393,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_ramfs_pipes" lineno="4494"> +<interface name="fs_manage_ramfs_pipes" lineno="4940"> <summary> Create, read, write, and delete named pipes on a ramfs filesystem. @@ -85096,7 +67404,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_write_ramfs_sockets" lineno="4512"> +<interface name="fs_write_ramfs_sockets" lineno="4958"> <summary> Write to named socket on a ramfs filesystem. </summary> @@ -85106,7 +67414,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_ramfs_sockets" lineno="4531"> +<interface name="fs_manage_ramfs_sockets" lineno="4977"> <summary> Create, read, write, and delete named sockets on a ramfs filesystem. @@ -85117,7 +67425,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_romfs" lineno="4549"> +<interface name="fs_mount_romfs" lineno="4995"> <summary> Mount a ROM filesystem. </summary> @@ -85127,7 +67435,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_romfs" lineno="4568"> +<interface name="fs_remount_romfs" lineno="5014"> <summary> Remount a ROM filesystem. This allows some mount options to be changed. @@ -85138,7 +67446,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_romfs" lineno="4586"> +<interface name="fs_unmount_romfs" lineno="5032"> <summary> Unmount a ROM filesystem. </summary> @@ -85148,7 +67456,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_romfs" lineno="4605"> +<interface name="fs_getattr_romfs" lineno="5051"> <summary> Get the attributes of a ROM filesystem. @@ -85159,7 +67467,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_rpc_pipefs" lineno="4623"> +<interface name="fs_mount_rpc_pipefs" lineno="5069"> <summary> Mount a RPC pipe filesystem. </summary> @@ -85169,7 +67477,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_rpc_pipefs" lineno="4642"> +<interface name="fs_remount_rpc_pipefs" lineno="5088"> <summary> Remount a RPC pipe filesystem. This allows some mount option to be changed. @@ -85180,7 +67488,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_rpc_pipefs" lineno="4660"> +<interface name="fs_unmount_rpc_pipefs" lineno="5106"> <summary> Unmount a RPC pipe filesystem. </summary> @@ -85190,7 +67498,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_rpc_pipefs" lineno="4679"> +<interface name="fs_getattr_rpc_pipefs" lineno="5125"> <summary> Get the attributes of a RPC pipe filesystem. @@ -85201,7 +67509,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_rpc_named_pipes" lineno="4697"> +<interface name="fs_rw_rpc_named_pipes" lineno="5143"> <summary> Read and write RPC pipe filesystem named pipes. </summary> @@ -85211,7 +67519,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_tmpfs" lineno="4715"> +<interface name="fs_watch_rpc_pipefs_dirs" lineno="5161"> +<summary> +Watch RPC pipe filesystem directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_mount_tmpfs" lineno="5179"> <summary> Mount a tmpfs filesystem. </summary> @@ -85221,7 +67539,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_tmpfs" lineno="4733"> +<interface name="fs_remount_tmpfs" lineno="5197"> <summary> Remount a tmpfs filesystem. </summary> @@ -85231,7 +67549,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_tmpfs" lineno="4751"> +<interface name="fs_unmount_tmpfs" lineno="5215"> <summary> Unmount a tmpfs filesystem. </summary> @@ -85241,7 +67559,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_tmpfs" lineno="4769"> +<interface name="fs_dontaudit_getattr_tmpfs" lineno="5233"> <summary> Do not audit getting the attributes of a tmpfs filesystem </summary> @@ -85251,7 +67569,7 @@ Domain to not audit </summary> </param> </interface> -<interface name="fs_getattr_tmpfs" lineno="4789"> +<interface name="fs_getattr_tmpfs" lineno="5253"> <summary> Get the attributes of a tmpfs filesystem. @@ -85263,7 +67581,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_associate_tmpfs" lineno="4807"> +<interface name="fs_associate_tmpfs" lineno="5271"> <summary> Allow the type to associate to tmpfs filesystems. </summary> @@ -85273,7 +67591,7 @@ The type of the object to be associated. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs" lineno="4825"> +<interface name="fs_relabelfrom_tmpfs" lineno="5289"> <summary> Relabel from tmpfs filesystem. </summary> @@ -85283,7 +67601,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tmpfs_dirs" lineno="4843"> +<interface name="fs_getattr_tmpfs_dirs" lineno="5307"> <summary> Get the attributes of tmpfs directories. </summary> @@ -85293,7 +67611,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4862"> +<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="5326"> <summary> Do not audit attempts to get the attributes of tmpfs directories. @@ -85304,7 +67622,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mounton_tmpfs" lineno="4880"> +<interface name="fs_mounton_tmpfs" lineno="5344"> <summary> Mount on tmpfs directories. </summary> @@ -85314,7 +67632,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mounton_tmpfs_files" lineno="4898"> +<interface name="fs_mounton_tmpfs_files" lineno="5362"> <summary> Mount on tmpfs files. </summary> @@ -85324,7 +67642,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_setattr_tmpfs_dirs" lineno="4916"> +<interface name="fs_setattr_tmpfs_dirs" lineno="5380"> <summary> Set the attributes of tmpfs directories. </summary> @@ -85334,7 +67652,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_tmpfs" lineno="4934"> +<interface name="fs_search_tmpfs" lineno="5398"> <summary> Search tmpfs directories. </summary> @@ -85344,7 +67662,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_tmpfs" lineno="4952"> +<interface name="fs_list_tmpfs" lineno="5416"> <summary> List the contents of generic tmpfs directories. </summary> @@ -85354,7 +67672,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_list_tmpfs" lineno="4971"> +<interface name="fs_dontaudit_list_tmpfs" lineno="5435"> <summary> Do not audit attempts to list the contents of generic tmpfs directories. @@ -85365,7 +67683,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_dirs" lineno="4990"> +<interface name="fs_manage_tmpfs_dirs" lineno="5454"> <summary> Create, read, write, and delete tmpfs directories @@ -85376,7 +67694,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="5009"> +<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="5473"> <summary> Do not audit attempts to write tmpfs directories @@ -85387,7 +67705,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs_dirs" lineno="5027"> +<interface name="fs_relabelfrom_tmpfs_dirs" lineno="5491"> <summary> Relabel from tmpfs_t dir </summary> @@ -85397,7 +67715,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_dirs" lineno="5045"> +<interface name="fs_relabel_tmpfs_dirs" lineno="5509"> <summary> Relabel directory on tmpfs filesystems. </summary> @@ -85407,7 +67725,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_tmpfs_filetrans" lineno="5078"> +<interface name="fs_watch_tmpfs_dirs" lineno="5526"> +<summary> +Watch directories on tmpfs filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_tmpfs_filetrans" lineno="5560"> <summary> Create an object in a tmpfs filesystem, with a private type using a type transition. @@ -85433,7 +67761,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="5098"> +<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="5580"> <summary> Do not audit attempts to getattr generic tmpfs files. @@ -85444,7 +67772,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5117"> +<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5599"> <summary> Do not audit attempts to read or write generic tmpfs files. @@ -85455,7 +67783,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_delete_tmpfs_symlinks" lineno="5135"> +<interface name="fs_delete_tmpfs_symlinks" lineno="5617"> <summary> Delete tmpfs symbolic links. </summary> @@ -85465,7 +67793,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_auto_mountpoints" lineno="5154"> +<interface name="fs_manage_auto_mountpoints" lineno="5636"> <summary> Create, read, write, and delete auto moutpoints. @@ -85476,7 +67804,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_tmpfs_files" lineno="5172"> +<interface name="fs_read_tmpfs_files" lineno="5654"> <summary> Read generic tmpfs files. </summary> @@ -85486,7 +67814,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_tmpfs_files" lineno="5190"> +<interface name="fs_rw_tmpfs_files" lineno="5672"> <summary> Read and write generic tmpfs files. </summary> @@ -85496,7 +67824,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_files" lineno="5208"> +<interface name="fs_relabel_tmpfs_files" lineno="5690"> <summary> Relabel files on tmpfs filesystems. </summary> @@ -85506,7 +67834,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_read_tmpfs_symlinks" lineno="5226"> +<interface name="fs_read_tmpfs_symlinks" lineno="5708"> <summary> Read tmpfs link files. </summary> @@ -85516,7 +67844,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5244"> +<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5726"> <summary> Relabelfrom socket files on tmpfs filesystems. </summary> @@ -85526,7 +67854,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5262"> +<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5744"> <summary> Relabelfrom tmpfs link files. </summary> @@ -85536,7 +67864,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_tmpfs_chr_files" lineno="5280"> +<interface name="fs_rw_tmpfs_chr_files" lineno="5762"> <summary> Read and write character nodes on tmpfs filesystems. </summary> @@ -85546,7 +67874,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5299"> +<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5781"> <summary> dontaudit Read and write character nodes on tmpfs filesystems. </summary> @@ -85556,17 +67884,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_chr_files" lineno="5318"> -<summary> -Relabel character nodes on tmpfs filesystems. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="fs_relabel_tmpfs_chr_file" lineno="5337"> +<interface name="fs_relabel_tmpfs_chr_files" lineno="5800"> <summary> Relabel character nodes on tmpfs filesystems. </summary> @@ -85576,7 +67894,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_rw_tmpfs_blk_files" lineno="5352"> +<interface name="fs_rw_tmpfs_blk_files" lineno="5819"> <summary> Read and write block nodes on tmpfs filesystems. </summary> @@ -85586,17 +67904,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_blk_files" lineno="5371"> -<summary> -Relabel block nodes on tmpfs filesystems. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="fs_relabel_tmpfs_blk_file" lineno="5390"> +<interface name="fs_relabel_tmpfs_blk_files" lineno="5838"> <summary> Relabel block nodes on tmpfs filesystems. </summary> @@ -85606,7 +67914,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_relabel_tmpfs_fifo_files" lineno="5405"> +<interface name="fs_relabel_tmpfs_fifo_files" lineno="5857"> <summary> Relabel named pipes on tmpfs filesystems. </summary> @@ -85616,7 +67924,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_files" lineno="5425"> +<interface name="fs_manage_tmpfs_files" lineno="5877"> <summary> Read and write, create and delete generic files on tmpfs filesystems. @@ -85627,7 +67935,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_symlinks" lineno="5444"> +<interface name="fs_manage_tmpfs_symlinks" lineno="5896"> <summary> Read and write, create and delete symbolic links on tmpfs filesystems. @@ -85638,7 +67946,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_sockets" lineno="5463"> +<interface name="fs_manage_tmpfs_sockets" lineno="5915"> <summary> Read and write, create and delete socket files on tmpfs filesystems. @@ -85649,7 +67957,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_chr_files" lineno="5482"> +<interface name="fs_manage_tmpfs_chr_files" lineno="5934"> <summary> Read and write, create and delete character nodes on tmpfs filesystems. @@ -85660,7 +67968,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_tmpfs_blk_files" lineno="5501"> +<interface name="fs_manage_tmpfs_blk_files" lineno="5953"> <summary> Read and write, create and delete block nodes on tmpfs filesystems. @@ -85671,7 +67979,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tracefs" lineno="5519"> +<interface name="fs_getattr_tracefs" lineno="5971"> <summary> Get the attributes of a trace filesystem. </summary> @@ -85681,7 +67989,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tracefs_dirs" lineno="5537"> +<interface name="fs_getattr_tracefs_dirs" lineno="5989"> <summary> Get attributes of dirs on tracefs filesystem. </summary> @@ -85691,7 +67999,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_tracefs" lineno="5555"> +<interface name="fs_search_tracefs" lineno="6007"> <summary> search directories on a tracefs filesystem </summary> @@ -85701,7 +68009,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_tracefs_files" lineno="5574"> +<interface name="fs_getattr_tracefs_files" lineno="6026"> <summary> Get the attributes of files on a trace filesystem. @@ -85712,7 +68020,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_mount_xenfs" lineno="5592"> +<interface name="fs_mount_xenfs" lineno="6044"> <summary> Mount a XENFS filesystem. </summary> @@ -85722,7 +68030,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_xenfs" lineno="5610"> +<interface name="fs_search_xenfs" lineno="6062"> <summary> Search the XENFS filesystem. </summary> @@ -85732,7 +68040,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_manage_xenfs_dirs" lineno="5630"> +<interface name="fs_manage_xenfs_dirs" lineno="6082"> <summary> Create, read, write, and delete directories on a XENFS filesystem. @@ -85744,7 +68052,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5650"> +<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="6102"> <summary> Do not audit attempts to create, read, write, and delete directories @@ -85756,7 +68064,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_manage_xenfs_files" lineno="5670"> +<interface name="fs_manage_xenfs_files" lineno="6122"> <summary> Create, read, write, and delete files on a XENFS filesystem. @@ -85768,7 +68076,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_mmap_xenfs_files" lineno="5688"> +<interface name="fs_mmap_xenfs_files" lineno="6140"> <summary> Map files a XENFS filesystem. </summary> @@ -85778,7 +68086,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_manage_xenfs_files" lineno="5708"> +<interface name="fs_dontaudit_manage_xenfs_files" lineno="6160"> <summary> Do not audit attempts to create, read, write, and delete files @@ -85790,7 +68098,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_mount_all_fs" lineno="5726"> +<interface name="fs_mount_all_fs" lineno="6178"> <summary> Mount all filesystems. </summary> @@ -85800,7 +68108,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_remount_all_fs" lineno="5745"> +<interface name="fs_remount_all_fs" lineno="6197"> <summary> Remount all filesystems. This allows some mount options to be changed. @@ -85811,7 +68119,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unmount_all_fs" lineno="5763"> +<interface name="fs_unmount_all_fs" lineno="6215"> <summary> Unmount all filesystems. </summary> @@ -85821,7 +68129,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_fs" lineno="5795"> +<interface name="fs_getattr_all_fs" lineno="6247"> <summary> Get the attributes of all filesystems. </summary> @@ -85845,7 +68153,7 @@ Domain allowed access. <infoflow type="read" weight="5"/> <rolecap/> </interface> -<interface name="fs_dontaudit_getattr_all_fs" lineno="5815"> +<interface name="fs_dontaudit_getattr_all_fs" lineno="6267"> <summary> Do not audit attempts to get the attributes all filesystems. @@ -85856,7 +68164,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_get_all_fs_quotas" lineno="5834"> +<interface name="fs_get_all_fs_quotas" lineno="6286"> <summary> Get the quotas of all filesystems. </summary> @@ -85867,7 +68175,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_set_all_quotas" lineno="5853"> +<interface name="fs_set_all_quotas" lineno="6305"> <summary> Set the quotas of all filesystems. </summary> @@ -85878,7 +68186,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="fs_relabelfrom_all_fs" lineno="5871"> +<interface name="fs_relabelfrom_all_fs" lineno="6323"> <summary> Relabelfrom all filesystems. </summary> @@ -85888,7 +68196,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_dirs" lineno="5890"> +<interface name="fs_getattr_all_dirs" lineno="6342"> <summary> Get the attributes of all directories with a filesystem type. @@ -85899,7 +68207,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_search_all" lineno="5908"> +<interface name="fs_search_all" lineno="6360"> <summary> Search all directories with a filesystem type. </summary> @@ -85909,7 +68217,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_list_all" lineno="5926"> +<interface name="fs_list_all" lineno="6378"> <summary> List all directories with a filesystem type. </summary> @@ -85919,7 +68227,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_files" lineno="5945"> +<interface name="fs_getattr_all_files" lineno="6397"> <summary> Get the attributes of all files with a filesystem type. @@ -85930,7 +68238,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_files" lineno="5964"> +<interface name="fs_dontaudit_getattr_all_files" lineno="6416"> <summary> Do not audit attempts to get the attributes of all files with a filesystem type. @@ -85941,7 +68249,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_symlinks" lineno="5983"> +<interface name="fs_getattr_all_symlinks" lineno="6435"> <summary> Get the attributes of all symbolic links with a filesystem type. @@ -85952,7 +68260,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_symlinks" lineno="6002"> +<interface name="fs_dontaudit_getattr_all_symlinks" lineno="6454"> <summary> Do not audit attempts to get the attributes of all symbolic links with a filesystem type. @@ -85963,7 +68271,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_pipes" lineno="6021"> +<interface name="fs_getattr_all_pipes" lineno="6473"> <summary> Get the attributes of all named pipes with a filesystem type. @@ -85974,7 +68282,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_pipes" lineno="6040"> +<interface name="fs_dontaudit_getattr_all_pipes" lineno="6492"> <summary> Do not audit attempts to get the attributes of all named pipes with a filesystem type. @@ -85985,7 +68293,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_sockets" lineno="6059"> +<interface name="fs_getattr_all_sockets" lineno="6511"> <summary> Get the attributes of all named sockets with a filesystem type. @@ -85996,7 +68304,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_dontaudit_getattr_all_sockets" lineno="6078"> +<interface name="fs_dontaudit_getattr_all_sockets" lineno="6530"> <summary> Do not audit attempts to get the attributes of all named sockets with a filesystem type. @@ -86007,7 +68315,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="fs_getattr_all_blk_files" lineno="6097"> +<interface name="fs_getattr_all_blk_files" lineno="6549"> <summary> Get the attributes of all block device nodes with a filesystem type. @@ -86018,7 +68326,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_getattr_all_chr_files" lineno="6116"> +<interface name="fs_getattr_all_chr_files" lineno="6568"> <summary> Get the attributes of all character device nodes with a filesystem type. @@ -86029,7 +68337,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fs_unconfined" lineno="6134"> +<interface name="fs_unconfined" lineno="6586"> <summary> Unconfined access to filesystems </summary> @@ -86108,7 +68416,18 @@ The type of the directory to use as a mountpoint. </summary> </param> </interface> -<interface name="kernel_setpgid" lineno="122"> +<interface name="kernel_read_state" lineno="123"> +<summary> +Read the process state (/proc/pid) +of kernel threads. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_setpgid" lineno="141"> <summary> Set the process group of kernel threads. </summary> @@ -86118,7 +68437,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_setsched" lineno="140"> +<interface name="kernel_setsched" lineno="159"> <summary> Set the priority of kernel threads. </summary> @@ -86128,7 +68447,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_sigchld" lineno="158"> +<interface name="kernel_sigchld" lineno="177"> <summary> Send a SIGCHLD signal to kernel threads. </summary> @@ -86138,7 +68457,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_kill" lineno="176"> +<interface name="kernel_kill" lineno="195"> <summary> Send a kill signal to kernel threads. </summary> @@ -86148,7 +68467,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_signal" lineno="194"> +<interface name="kernel_signal" lineno="213"> <summary> Send a generic signal to kernel threads. </summary> @@ -86158,7 +68477,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_share_state" lineno="213"> +<interface name="kernel_share_state" lineno="232"> <summary> Allows the kernel to share state information with the caller. @@ -86169,7 +68488,7 @@ The type of the process with which to share state information. </summary> </param> </interface> -<interface name="kernel_use_fds" lineno="231"> +<interface name="kernel_use_fds" lineno="250"> <summary> Permits caller to use kernel file descriptors. </summary> @@ -86179,7 +68498,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_use_fds" lineno="250"> +<interface name="kernel_dontaudit_use_fds" lineno="269"> <summary> Do not audit attempts to use kernel file descriptors. @@ -86190,7 +68509,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_rw_pipes" lineno="268"> +<interface name="kernel_rw_pipes" lineno="287"> <summary> Read and write kernel unnamed pipes. </summary> @@ -86200,7 +68519,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_rw_stream_sockets" lineno="287"> +<interface name="kernel_rw_stream_sockets" lineno="306"> <summary> Read/write to kernel using a unix domain stream socket. @@ -86211,7 +68530,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_stream_connect" lineno="306"> +<interface name="kernel_stream_connect" lineno="325"> <summary> Connect to kernel using a unix domain stream socket. @@ -86222,7 +68541,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_getattr_dgram_sockets" lineno="324"> +<interface name="kernel_getattr_dgram_sockets" lineno="343"> <summary> Getattr on kernel unix datagram sockets. </summary> @@ -86232,7 +68551,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_rw_unix_dgram_sockets" lineno="342"> +<interface name="kernel_rw_unix_dgram_sockets" lineno="361"> <summary> Read and write kernel unix datagram sockets. </summary> @@ -86242,7 +68561,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dgram_send" lineno="360"> +<interface name="kernel_dgram_send" lineno="379"> <summary> Send messages to kernel unix datagram sockets. </summary> @@ -86252,7 +68571,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_rw_netlink_audit_sockets" lineno="378"> +<interface name="kernel_rw_netlink_audit_sockets" lineno="397"> <summary> Send messages to kernel netlink audit sockets. </summary> @@ -86262,7 +68581,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_load_module" lineno="396"> +<interface name="kernel_load_module" lineno="415"> <summary> Allows caller to load kernel modules </summary> @@ -86272,7 +68591,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_search_key" lineno="414"> +<interface name="kernel_search_key" lineno="433"> <summary> Allow search the kernel key ring. </summary> @@ -86282,7 +68601,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_search_key" lineno="432"> +<interface name="kernel_dontaudit_search_key" lineno="451"> <summary> dontaudit search the kernel key ring. </summary> @@ -86292,7 +68611,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_link_key" lineno="450"> +<interface name="kernel_link_key" lineno="469"> <summary> Allow link to the kernel key ring. </summary> @@ -86302,7 +68621,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_link_key" lineno="468"> +<interface name="kernel_dontaudit_link_key" lineno="487"> <summary> dontaudit link to the kernel key ring. </summary> @@ -86312,7 +68631,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_view_key" lineno="486"> +<interface name="kernel_view_key" lineno="505"> <summary> Allow view the kernel key ring. </summary> @@ -86322,7 +68641,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_view_key" lineno="504"> +<interface name="kernel_dontaudit_view_key" lineno="523"> <summary> dontaudit view the kernel key ring. </summary> @@ -86332,7 +68651,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_write_key" lineno="522"> +<interface name="kernel_write_key" lineno="541"> <summary> allow write access to the kernel key ring. </summary> @@ -86342,7 +68661,7 @@ Domain to allow. </summary> </param> </interface> -<interface name="kernel_read_ring_buffer" lineno="541"> +<interface name="kernel_read_ring_buffer" lineno="560"> <summary> Allows caller to read the ring buffer. </summary> @@ -86353,7 +68672,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_dontaudit_read_ring_buffer" lineno="560"> +<interface name="kernel_dontaudit_read_ring_buffer" lineno="579"> <summary> Do not audit attempts to read the ring buffer. </summary> @@ -86363,7 +68682,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_change_ring_buffer_level" lineno="579"> +<interface name="kernel_change_ring_buffer_level" lineno="598"> <summary> Change the level of kernel messages logged to the console. </summary> @@ -86374,7 +68693,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_clear_ring_buffer" lineno="599"> +<interface name="kernel_clear_ring_buffer" lineno="618"> <summary> Allows the caller to clear the ring buffer. </summary> @@ -86385,7 +68704,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_request_load_module" lineno="631"> +<interface name="kernel_request_load_module" lineno="650"> <summary> Allows caller to request the kernel to load a module </summary> @@ -86408,7 +68727,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_request_load_module" lineno="649"> +<interface name="kernel_dontaudit_request_load_module" lineno="668"> <summary> Do not audit requests to the kernel to load a module. </summary> @@ -86418,7 +68737,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_get_sysvipc_info" lineno="667"> +<interface name="kernel_get_sysvipc_info" lineno="686"> <summary> Get information on all System V IPC objects. </summary> @@ -86428,7 +68747,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_getattr_debugfs" lineno="685"> +<interface name="kernel_getattr_debugfs" lineno="704"> <summary> Get the attributes of a kernel debugging filesystem. </summary> @@ -86438,7 +68757,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_mount_debugfs" lineno="703"> +<interface name="kernel_mount_debugfs" lineno="722"> <summary> Mount a kernel debugging filesystem. </summary> @@ -86448,7 +68767,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_unmount_debugfs" lineno="721"> +<interface name="kernel_unmount_debugfs" lineno="740"> <summary> Unmount a kernel debugging filesystem. </summary> @@ -86458,7 +68777,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_remount_debugfs" lineno="739"> +<interface name="kernel_remount_debugfs" lineno="758"> <summary> Remount a kernel debugging filesystem. </summary> @@ -86468,7 +68787,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_search_debugfs" lineno="757"> +<interface name="kernel_search_debugfs" lineno="776"> <summary> Search the contents of a kernel debugging filesystem. </summary> @@ -86478,7 +68797,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_search_debugfs" lineno="775"> +<interface name="kernel_dontaudit_search_debugfs" lineno="794"> <summary> Do not audit attempts to search the kernel debugging filesystem. </summary> @@ -86488,7 +68807,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_read_debugfs" lineno="793"> +<interface name="kernel_read_debugfs" lineno="812"> <summary> Read information from the debugging filesystem. </summary> @@ -86498,7 +68817,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_write_debugfs_dirs" lineno="813"> +<interface name="kernel_dontaudit_write_debugfs_dirs" lineno="832"> <summary> Do not audit attempts to write kernel debugging filesystem dirs. </summary> @@ -86508,7 +68827,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_manage_debugfs" lineno="831"> +<interface name="kernel_manage_debugfs" lineno="850"> <summary> Manage information from the debugging filesystem. </summary> @@ -86518,7 +68837,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_mount_kvmfs" lineno="851"> +<interface name="kernel_mount_kvmfs" lineno="870"> <summary> Mount a kernel VM filesystem. </summary> @@ -86528,7 +68847,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_mount_proc" lineno="869"> +<interface name="kernel_mount_proc" lineno="888"> <summary> mount the proc filesystem. </summary> @@ -86538,7 +68857,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_remount_proc" lineno="887"> +<interface name="kernel_remount_proc" lineno="906"> <summary> remount the proc filesystem. </summary> @@ -86548,7 +68867,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_unmount_proc" lineno="905"> +<interface name="kernel_unmount_proc" lineno="924"> <summary> Unmount the proc filesystem. </summary> @@ -86558,7 +68877,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_getattr_proc" lineno="923"> +<interface name="kernel_getattr_proc" lineno="942"> <summary> Get the attributes of the proc filesystem. </summary> @@ -86568,7 +68887,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_getattr_proc" lineno="941"> +<interface name="kernel_dontaudit_getattr_proc" lineno="960"> <summary> Do not audit attempts to get the attributes of the proc filesystem. </summary> @@ -86578,7 +68897,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_mounton_proc" lineno="960"> +<interface name="kernel_mounton_proc" lineno="979"> <summary> Mount on proc directories. (Deprecated) </summary> @@ -86589,7 +68908,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="976"> +<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="995"> <summary> Do not audit attempts to set the attributes of directories in /proc. @@ -86600,7 +68919,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_search_proc" lineno="994"> +<interface name="kernel_search_proc" lineno="1013"> <summary> Search directories in /proc. </summary> @@ -86610,7 +68929,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_list_proc" lineno="1012"> +<interface name="kernel_list_proc" lineno="1031"> <summary> List the contents of directories in /proc. </summary> @@ -86620,7 +68939,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_list_proc" lineno="1031"> +<interface name="kernel_dontaudit_list_proc" lineno="1050"> <summary> Do not audit attempts to list the contents of directories in /proc. @@ -86631,7 +68950,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_dontaudit_write_proc_dirs" lineno="1050"> +<interface name="kernel_dontaudit_write_proc_dirs" lineno="1069"> <summary> Do not audit attempts to write the directories in /proc. @@ -86642,7 +68961,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_mounton_proc_dirs" lineno="1068"> +<interface name="kernel_mounton_proc_dirs" lineno="1087"> <summary> Mount on the directories in /proc. </summary> @@ -86652,7 +68971,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_getattr_proc_files" lineno="1086"> +<interface name="kernel_getattr_proc_files" lineno="1105"> <summary> Get the attributes of files in /proc. </summary> @@ -86662,7 +68981,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_read_proc_symlinks" lineno="1113"> +<interface name="kernel_read_proc_symlinks" lineno="1132"> <summary> Read generic symbolic links in /proc. </summary> @@ -86681,7 +69000,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="kernel_read_system_state" lineno="1152"> +<interface name="kernel_read_system_state" lineno="1171"> <summary> Allows caller to read system state information in /proc. </summary> @@ -86712,7 +69031,7 @@ Domain allowed access. <infoflow type="read" weight="10"/> <rolecap/> </interface> -<interface name="kernel_write_proc_files" lineno="1178"> +<interface name="kernel_write_proc_files" lineno="1197"> <summary> Write to generic proc entries. </summary> @@ -86723,7 +69042,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_dontaudit_read_system_state" lineno="1197"> +<interface name="kernel_dontaudit_read_system_state" lineno="1216"> <summary> Do not audit attempts by caller to read system state information in proc. @@ -86734,7 +69053,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1216"> +<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1235"> <summary> Do not audit attempts by caller to read symbolic links in proc. @@ -86745,7 +69064,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_rw_afs_state" lineno="1235"> +<interface name="kernel_rw_afs_state" lineno="1254"> <summary> Allow caller to read and write state information for AFS. </summary> @@ -86756,7 +69075,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_read_software_raid_state" lineno="1255"> +<interface name="kernel_read_software_raid_state" lineno="1274"> <summary> Allow caller to read the state information for software raid. </summary> @@ -86767,7 +69086,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_software_raid_state" lineno="1275"> +<interface name="kernel_rw_software_raid_state" lineno="1294"> <summary> Allow caller to read and set the state information for software raid. </summary> @@ -86777,7 +69096,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_getattr_core_if" lineno="1295"> +<interface name="kernel_getattr_core_if" lineno="1314"> <summary> Allows caller to get attributes of core kernel interface. </summary> @@ -86787,7 +69106,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_getattr_core_if" lineno="1316"> +<interface name="kernel_dontaudit_getattr_core_if" lineno="1335"> <summary> Do not audit attempts to get the attributes of core kernel interfaces. @@ -86798,7 +69117,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_read_core_if" lineno="1334"> +<interface name="kernel_read_core_if" lineno="1353"> <summary> Allows caller to read the core kernel interface. </summary> @@ -86808,7 +69127,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_read_messages" lineno="1358"> +<interface name="kernel_read_messages" lineno="1377"> <summary> Allow caller to read kernel messages using the /proc/kmsg interface. @@ -86819,7 +69138,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_getattr_message_if" lineno="1380"> +<interface name="kernel_getattr_message_if" lineno="1399"> <summary> Allow caller to get the attributes of kernel message interface (/proc/kmsg). @@ -86830,7 +69149,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_getattr_message_if" lineno="1399"> +<interface name="kernel_dontaudit_getattr_message_if" lineno="1418"> <summary> Do not audit attempts by caller to get the attributes of kernel message interfaces. @@ -86841,7 +69160,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_mounton_message_if" lineno="1418"> +<interface name="kernel_mounton_message_if" lineno="1437"> <summary> Mount on kernel message interfaces files. </summary> @@ -86852,7 +69171,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_dontaudit_search_network_state" lineno="1439"> +<interface name="kernel_dontaudit_search_network_state" lineno="1458"> <summary> Do not audit attempts to search the network state directory. @@ -86864,7 +69183,7 @@ Domain to not audit. </param> </interface> -<interface name="kernel_search_network_state" lineno="1458"> +<interface name="kernel_search_network_state" lineno="1477"> <summary> Allow searching of network state directory. </summary> @@ -86875,7 +69194,7 @@ Domain allowed access. </param> </interface> -<interface name="kernel_read_network_state" lineno="1488"> +<interface name="kernel_read_network_state" lineno="1507"> <summary> Read the network state information. </summary> @@ -86897,7 +69216,7 @@ Domain allowed access. <infoflow type="read" weight="10"/> <rolecap/> </interface> -<interface name="kernel_read_network_state_symlinks" lineno="1509"> +<interface name="kernel_read_network_state_symlinks" lineno="1528"> <summary> Allow caller to read the network state symbolic links. </summary> @@ -86907,7 +69226,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_search_xen_state" lineno="1530"> +<interface name="kernel_search_xen_state" lineno="1549"> <summary> Allow searching of xen state directory. </summary> @@ -86918,7 +69237,7 @@ Domain allowed access. </param> </interface> -<interface name="kernel_dontaudit_search_xen_state" lineno="1550"> +<interface name="kernel_dontaudit_search_xen_state" lineno="1569"> <summary> Do not audit attempts to search the xen state directory. @@ -86930,7 +69249,7 @@ Domain to not audit. </param> </interface> -<interface name="kernel_read_xen_state" lineno="1569"> +<interface name="kernel_read_xen_state" lineno="1588"> <summary> Allow caller to read the xen state information. </summary> @@ -86941,7 +69260,7 @@ Domain allowed access. </param> </interface> -<interface name="kernel_read_xen_state_symlinks" lineno="1591"> +<interface name="kernel_read_xen_state_symlinks" lineno="1610"> <summary> Allow caller to read the xen state symbolic links. </summary> @@ -86952,7 +69271,7 @@ Domain allowed access. </param> </interface> -<interface name="kernel_write_xen_state" lineno="1612"> +<interface name="kernel_write_xen_state" lineno="1631"> <summary> Allow caller to write xen state information. </summary> @@ -86963,7 +69282,7 @@ Domain allowed access. </param> </interface> -<interface name="kernel_list_all_proc" lineno="1630"> +<interface name="kernel_list_all_proc" lineno="1649"> <summary> Allow attempts to list all proc directories. </summary> @@ -86973,7 +69292,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_list_all_proc" lineno="1649"> +<interface name="kernel_dontaudit_list_all_proc" lineno="1668"> <summary> Do not audit attempts to list all proc directories. </summary> @@ -86983,7 +69302,27 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_dontaudit_search_sysctl" lineno="1670"> +<interface name="kernel_write_non_proc_init_mountpoint_files" lineno="1687"> +<summary> +Write systemd mountpoint files except proc entries. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_create_non_proc_init_mountpoint_files" lineno="1705"> +<summary> +Create systemd mountpoint files except proc entries. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_search_sysctl" lineno="1725"> <summary> Do not audit attempts by caller to search the base directory of sysctls. @@ -86995,7 +69334,7 @@ Domain to not audit. </param> </interface> -<interface name="kernel_mounton_sysctl_dirs" lineno="1689"> +<interface name="kernel_mounton_sysctl_dirs" lineno="1744"> <summary> Mount on sysctl_t dirs. </summary> @@ -87006,7 +69345,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_read_sysctl" lineno="1709"> +<interface name="kernel_read_sysctl" lineno="1764"> <summary> Allow access to read sysctl directories. </summary> @@ -87017,7 +69356,7 @@ Domain allowed access. </param> </interface> -<interface name="kernel_mounton_sysctl_files" lineno="1729"> +<interface name="kernel_mounton_sysctl_files" lineno="1784"> <summary> Mount on sysctl files. </summary> @@ -87028,7 +69367,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_read_device_sysctls" lineno="1749"> +<interface name="kernel_read_device_sysctls" lineno="1804"> <summary> Allow caller to read the device sysctls. </summary> @@ -87039,7 +69378,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_device_sysctls" lineno="1770"> +<interface name="kernel_rw_device_sysctls" lineno="1825"> <summary> Read and write device sysctls. </summary> @@ -87050,7 +69389,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_search_vm_sysctl" lineno="1790"> +<interface name="kernel_search_vm_sysctl" lineno="1845"> <summary> Allow caller to search virtual memory sysctls. </summary> @@ -87060,7 +69399,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_read_vm_sysctls" lineno="1809"> +<interface name="kernel_read_vm_sysctls" lineno="1864"> <summary> Allow caller to read virtual memory sysctls. </summary> @@ -87071,7 +69410,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_vm_sysctls" lineno="1830"> +<interface name="kernel_rw_vm_sysctls" lineno="1885"> <summary> Read and write virtual memory sysctls. </summary> @@ -87082,7 +69421,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_search_network_sysctl" lineno="1852"> +<interface name="kernel_search_network_sysctl" lineno="1907"> <summary> Search network sysctl directories. </summary> @@ -87092,7 +69431,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_search_network_sysctl" lineno="1870"> +<interface name="kernel_dontaudit_search_network_sysctl" lineno="1925"> <summary> Do not audit attempts by caller to search network sysctl directories. </summary> @@ -87102,7 +69441,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_read_net_sysctls" lineno="1889"> +<interface name="kernel_read_net_sysctls" lineno="1944"> <summary> Allow caller to read network sysctls. </summary> @@ -87113,7 +69452,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_net_sysctls" lineno="1910"> +<interface name="kernel_rw_net_sysctls" lineno="1965"> <summary> Allow caller to modiry contents of sysctl network files. </summary> @@ -87124,7 +69463,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_read_unix_sysctls" lineno="1932"> +<interface name="kernel_read_unix_sysctls" lineno="1987"> <summary> Allow caller to read unix domain socket sysctls. @@ -87136,7 +69475,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_unix_sysctls" lineno="1954"> +<interface name="kernel_rw_unix_sysctls" lineno="2009"> <summary> Read and write unix domain socket sysctls. @@ -87148,7 +69487,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_read_hotplug_sysctls" lineno="1975"> +<interface name="kernel_read_hotplug_sysctls" lineno="2030"> <summary> Read the hotplug sysctl. </summary> @@ -87159,7 +69498,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_hotplug_sysctls" lineno="1996"> +<interface name="kernel_rw_hotplug_sysctls" lineno="2051"> <summary> Read and write the hotplug sysctl. </summary> @@ -87170,7 +69509,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_read_modprobe_sysctls" lineno="2017"> +<interface name="kernel_read_modprobe_sysctls" lineno="2072"> <summary> Read the modprobe sysctl. </summary> @@ -87181,7 +69520,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_modprobe_sysctls" lineno="2038"> +<interface name="kernel_rw_modprobe_sysctls" lineno="2093"> <summary> Read and write the modprobe sysctl. </summary> @@ -87192,7 +69531,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2058"> +<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2113"> <summary> Do not audit attempts to search generic kernel sysctls. </summary> @@ -87202,7 +69541,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2076"> +<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2131"> <summary> Do not audit attempted reading of kernel sysctls </summary> @@ -87212,7 +69551,7 @@ Domain to not audit accesses from </summary> </param> </interface> -<interface name="kernel_read_crypto_sysctls" lineno="2094"> +<interface name="kernel_read_crypto_sysctls" lineno="2149"> <summary> Read generic crypto sysctls. </summary> @@ -87222,7 +69561,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_read_kernel_sysctls" lineno="2135"> +<interface name="kernel_read_kernel_sysctls" lineno="2190"> <summary> Read general kernel sysctls. </summary> @@ -87254,7 +69593,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2155"> +<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2210"> <summary> Do not audit attempts to write generic kernel sysctls. </summary> @@ -87264,7 +69603,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_rw_kernel_sysctl" lineno="2174"> +<interface name="kernel_rw_kernel_sysctl" lineno="2229"> <summary> Read and write generic kernel sysctls. </summary> @@ -87275,7 +69614,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_mounton_kernel_sysctl_files" lineno="2195"> +<interface name="kernel_mounton_kernel_sysctl_files" lineno="2250"> <summary> Mount on kernel sysctl files. </summary> @@ -87286,7 +69625,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2215"> +<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2270"> <summary> Read kernel ns lastpid sysctls. </summary> @@ -87297,7 +69636,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2235"> +<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2290"> <summary> Do not audit attempts to write kernel ns lastpid sysctls. </summary> @@ -87307,7 +69646,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2254"> +<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2309"> <summary> Read and write kernel ns lastpid sysctls. </summary> @@ -87318,7 +69657,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_search_fs_sysctls" lineno="2275"> +<interface name="kernel_search_fs_sysctls" lineno="2330"> <summary> Search filesystem sysctl directories. </summary> @@ -87329,7 +69668,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_read_fs_sysctls" lineno="2294"> +<interface name="kernel_read_fs_sysctls" lineno="2349"> <summary> Read filesystem sysctls. </summary> @@ -87340,7 +69679,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_fs_sysctls" lineno="2315"> +<interface name="kernel_rw_fs_sysctls" lineno="2370"> <summary> Read and write filesystem sysctls. </summary> @@ -87351,7 +69690,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_read_irq_sysctls" lineno="2336"> +<interface name="kernel_read_irq_sysctls" lineno="2391"> <summary> Read IRQ sysctls. </summary> @@ -87362,7 +69701,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_dontaudit_search_fs_sysctls" lineno="2358"> +<interface name="kernel_dontaudit_search_fs_sysctls" lineno="2413"> <summary> Do not audit attempts to search filesystem sysctl directories. @@ -87374,7 +69713,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="kernel_rw_irq_sysctls" lineno="2377"> +<interface name="kernel_rw_irq_sysctls" lineno="2432"> <summary> Read and write IRQ sysctls. </summary> @@ -87385,7 +69724,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_read_rpc_sysctls" lineno="2398"> +<interface name="kernel_read_rpc_sysctls" lineno="2453"> <summary> Read RPC sysctls. </summary> @@ -87396,7 +69735,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_rpc_sysctls" lineno="2419"> +<interface name="kernel_rw_rpc_sysctls" lineno="2474"> <summary> Read and write RPC sysctls. </summary> @@ -87407,7 +69746,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_dontaudit_list_all_sysctls" lineno="2439"> +<interface name="kernel_dontaudit_list_all_sysctls" lineno="2494"> <summary> Do not audit attempts to list all sysctl directories. </summary> @@ -87417,7 +69756,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_read_all_sysctls" lineno="2459"> +<interface name="kernel_read_all_sysctls" lineno="2514"> <summary> Allow caller to read all sysctls. </summary> @@ -87428,7 +69767,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_all_sysctls" lineno="2482"> +<interface name="kernel_rw_all_sysctls" lineno="2537"> <summary> Read and write all sysctls. </summary> @@ -87439,7 +69778,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_associate_proc" lineno="2507"> +<interface name="kernel_associate_proc" lineno="2562"> <summary> Associate a file to proc_t (/proc) </summary> @@ -87450,7 +69789,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_kill_unlabeled" lineno="2524"> +<interface name="kernel_kill_unlabeled" lineno="2579"> <summary> Send a kill signal to unlabeled processes. </summary> @@ -87460,7 +69799,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_mount_unlabeled" lineno="2542"> +<interface name="kernel_mount_unlabeled" lineno="2597"> <summary> Mount a kernel unlabeled filesystem. </summary> @@ -87470,7 +69809,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_unmount_unlabeled" lineno="2560"> +<interface name="kernel_unmount_unlabeled" lineno="2615"> <summary> Unmount a kernel unlabeled filesystem. </summary> @@ -87480,7 +69819,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_signal_unlabeled" lineno="2578"> +<interface name="kernel_signal_unlabeled" lineno="2633"> <summary> Send general signals to unlabeled processes. </summary> @@ -87490,7 +69829,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_signull_unlabeled" lineno="2596"> +<interface name="kernel_signull_unlabeled" lineno="2651"> <summary> Send a null signal to unlabeled processes. </summary> @@ -87500,7 +69839,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_sigstop_unlabeled" lineno="2614"> +<interface name="kernel_sigstop_unlabeled" lineno="2669"> <summary> Send a stop signal to unlabeled processes. </summary> @@ -87510,7 +69849,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_sigchld_unlabeled" lineno="2632"> +<interface name="kernel_sigchld_unlabeled" lineno="2687"> <summary> Send a child terminated signal to unlabeled processes. </summary> @@ -87520,7 +69859,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_getattr_unlabeled_dirs" lineno="2650"> +<interface name="kernel_getattr_unlabeled_dirs" lineno="2705"> <summary> Get the attributes of unlabeled directories. </summary> @@ -87530,7 +69869,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_search_unlabeled" lineno="2668"> +<interface name="kernel_dontaudit_search_unlabeled" lineno="2723"> <summary> Do not audit attempts to search unlabeled directories. </summary> @@ -87540,7 +69879,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_list_unlabeled" lineno="2686"> +<interface name="kernel_list_unlabeled" lineno="2741"> <summary> List unlabeled directories. </summary> @@ -87550,7 +69889,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_read_unlabeled_state" lineno="2704"> +<interface name="kernel_read_unlabeled_state" lineno="2759"> <summary> Read the process state (/proc/pid) of all unlabeled_t. </summary> @@ -87560,7 +69899,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_list_unlabeled" lineno="2724"> +<interface name="kernel_dontaudit_list_unlabeled" lineno="2779"> <summary> Do not audit attempts to list unlabeled directories. </summary> @@ -87570,7 +69909,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_rw_unlabeled_dirs" lineno="2742"> +<interface name="kernel_rw_unlabeled_dirs" lineno="2797"> <summary> Read and write unlabeled directories. </summary> @@ -87580,7 +69919,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_delete_unlabeled_dirs" lineno="2760"> +<interface name="kernel_delete_unlabeled_dirs" lineno="2815"> <summary> Delete unlabeled directories. </summary> @@ -87590,7 +69929,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_manage_unlabeled_dirs" lineno="2778"> +<interface name="kernel_manage_unlabeled_dirs" lineno="2833"> <summary> Create, read, write, and delete unlabeled directories. </summary> @@ -87600,7 +69939,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_mounton_unlabeled_dirs" lineno="2796"> +<interface name="kernel_mounton_unlabeled_dirs" lineno="2851"> <summary> Mount a filesystem on an unlabeled directory. </summary> @@ -87610,7 +69949,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_read_unlabeled_files" lineno="2814"> +<interface name="kernel_read_unlabeled_files" lineno="2869"> <summary> Read unlabeled files. </summary> @@ -87620,7 +69959,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_rw_unlabeled_files" lineno="2832"> +<interface name="kernel_rw_unlabeled_files" lineno="2887"> <summary> Read and write unlabeled files. </summary> @@ -87630,7 +69969,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_delete_unlabeled_files" lineno="2850"> +<interface name="kernel_delete_unlabeled_files" lineno="2905"> <summary> Delete unlabeled files. </summary> @@ -87640,7 +69979,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_manage_unlabeled_files" lineno="2868"> +<interface name="kernel_manage_unlabeled_files" lineno="2923"> <summary> Create, read, write, and delete unlabeled files. </summary> @@ -87650,7 +69989,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2887"> +<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2942"> <summary> Do not audit attempts by caller to get the attributes of an unlabeled file. @@ -87661,7 +70000,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2906"> +<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2961"> <summary> Do not audit attempts by caller to read an unlabeled file. @@ -87672,7 +70011,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_unlabeled_filetrans" lineno="2940"> +<interface name="kernel_unlabeled_filetrans" lineno="2995"> <summary> Create an object in unlabeled directories with a private type. @@ -87698,7 +70037,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="kernel_delete_unlabeled_symlinks" lineno="2958"> +<interface name="kernel_delete_unlabeled_symlinks" lineno="3013"> <summary> Delete unlabeled symbolic links. </summary> @@ -87708,7 +70047,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_manage_unlabeled_symlinks" lineno="2976"> +<interface name="kernel_manage_unlabeled_symlinks" lineno="3031"> <summary> Create, read, write, and delete unlabeled symbolic links. </summary> @@ -87718,7 +70057,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2995"> +<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="3050"> <summary> Do not audit attempts by caller to get the attributes of unlabeled symbolic links. @@ -87729,7 +70068,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="3014"> +<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="3069"> <summary> Do not audit attempts by caller to get the attributes of unlabeled named pipes. @@ -87740,7 +70079,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="3033"> +<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="3088"> <summary> Do not audit attempts by caller to get the attributes of unlabeled named sockets. @@ -87751,7 +70090,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="3052"> +<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="3107"> <summary> Do not audit attempts by caller to get attributes for unlabeled block devices. @@ -87762,7 +70101,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_rw_unlabeled_blk_files" lineno="3070"> +<interface name="kernel_rw_unlabeled_blk_files" lineno="3125"> <summary> Read and write unlabeled block device nodes. </summary> @@ -87772,7 +70111,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_delete_unlabeled_blk_files" lineno="3088"> +<interface name="kernel_delete_unlabeled_blk_files" lineno="3143"> <summary> Delete unlabeled block device nodes. </summary> @@ -87782,7 +70121,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_manage_unlabeled_blk_files" lineno="3106"> +<interface name="kernel_manage_unlabeled_blk_files" lineno="3161"> <summary> Create, read, write, and delete unlabeled block device nodes. </summary> @@ -87792,7 +70131,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3125"> +<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3180"> <summary> Do not audit attempts by caller to get attributes for unlabeled character devices. @@ -87803,7 +70142,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3144"> +<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3199"> <summary> Do not audit attempts to write unlabeled character devices. @@ -87814,7 +70153,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_delete_unlabeled_chr_files" lineno="3162"> +<interface name="kernel_delete_unlabeled_chr_files" lineno="3217"> <summary> Delete unlabeled character device nodes. </summary> @@ -87824,7 +70163,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_manage_unlabeled_chr_files" lineno="3181"> +<interface name="kernel_manage_unlabeled_chr_files" lineno="3236"> <summary> Create, read, write, and delete unlabeled character device nodes. </summary> @@ -87834,7 +70173,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3199"> +<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3254"> <summary> Allow caller to relabel unlabeled directories. </summary> @@ -87844,7 +70183,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_relabelfrom_unlabeled_files" lineno="3217"> +<interface name="kernel_relabelfrom_unlabeled_files" lineno="3272"> <summary> Allow caller to relabel unlabeled files. </summary> @@ -87854,7 +70193,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3236"> +<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3291"> <summary> Allow caller to relabel unlabeled symbolic links. </summary> @@ -87864,7 +70203,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3255"> +<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3310"> <summary> Allow caller to relabel unlabeled named pipes. </summary> @@ -87874,7 +70213,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_delete_unlabeled_pipes" lineno="3274"> +<interface name="kernel_delete_unlabeled_pipes" lineno="3329"> <summary> Delete unlabeled named pipes </summary> @@ -87884,7 +70223,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3292"> +<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3347"> <summary> Allow caller to relabel unlabeled named sockets. </summary> @@ -87894,7 +70233,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_delete_unlabeled_sockets" lineno="3311"> +<interface name="kernel_delete_unlabeled_sockets" lineno="3366"> <summary> Delete unlabeled named sockets. </summary> @@ -87904,7 +70243,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_relabelfrom_unlabeled_blk_devs" lineno="3329"> +<interface name="kernel_relabelfrom_unlabeled_blk_devs" lineno="3384"> <summary> Allow caller to relabel from unlabeled block devices. </summary> @@ -87914,7 +70253,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_relabelfrom_unlabeled_chr_devs" lineno="3347"> +<interface name="kernel_relabelfrom_unlabeled_chr_devs" lineno="3402"> <summary> Allow caller to relabel from unlabeled character devices. </summary> @@ -87924,7 +70263,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_sendrecv_unlabeled_association" lineno="3380"> +<interface name="kernel_sendrecv_unlabeled_association" lineno="3435"> <summary> Send and receive messages from an unlabeled IPSEC association. @@ -87949,7 +70288,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3413"> +<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3468"> <summary> Do not audit attempts to send and receive messages from an unlabeled IPSEC association. @@ -87974,7 +70313,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3440"> +<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3495"> <summary> Receive TCP packets from an unlabeled connection. </summary> @@ -87993,7 +70332,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3469"> +<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3524"> <summary> Do not audit attempts to receive TCP packets from an unlabeled connection. @@ -88014,7 +70353,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_udp_recvfrom_unlabeled" lineno="3496"> +<interface name="kernel_udp_recvfrom_unlabeled" lineno="3551"> <summary> Receive UDP packets from an unlabeled connection. </summary> @@ -88033,7 +70372,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3525"> +<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3580"> <summary> Do not audit attempts to receive UDP packets from an unlabeled connection. @@ -88054,7 +70393,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_raw_recvfrom_unlabeled" lineno="3552"> +<interface name="kernel_raw_recvfrom_unlabeled" lineno="3607"> <summary> Receive Raw IP packets from an unlabeled connection. </summary> @@ -88073,7 +70412,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3581"> +<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3636"> <summary> Do not audit attempts to receive Raw IP packets from an unlabeled connection. @@ -88094,7 +70433,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_sendrecv_unlabeled_packets" lineno="3611"> +<interface name="kernel_sendrecv_unlabeled_packets" lineno="3666"> <summary> Send and receive unlabeled packets. </summary> @@ -88116,7 +70455,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_recvfrom_unlabeled_peer" lineno="3639"> +<interface name="kernel_recvfrom_unlabeled_peer" lineno="3694"> <summary> Receive packets from an unlabeled peer. </summary> @@ -88136,7 +70475,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3667"> +<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3722"> <summary> Do not audit attempts to receive packets from an unlabeled peer. </summary> @@ -88156,7 +70495,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="kernel_relabelfrom_unlabeled_database" lineno="3685"> +<interface name="kernel_relabelfrom_unlabeled_database" lineno="3740"> <summary> Relabel from unlabeled database objects. </summary> @@ -88166,7 +70505,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_unconfined" lineno="3722"> +<interface name="kernel_unconfined" lineno="3777"> <summary> Unconfined access to kernel module resources. </summary> @@ -88176,7 +70515,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_read_vm_overcommit_sysctl" lineno="3742"> +<interface name="kernel_read_vm_overcommit_sysctl" lineno="3797"> <summary> Read virtual memory overcommit sysctl. </summary> @@ -88187,7 +70526,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3762"> +<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3817"> <summary> Read and write virtual memory overcommit sysctl. </summary> @@ -88198,7 +70537,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3781"> +<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3836"> <summary> Access unlabeled infiniband pkeys. </summary> @@ -88208,7 +70547,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3799"> +<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3854"> <summary> Manage subnet on unlabeled Infiniband endports. </summary> @@ -89290,17 +71629,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="selinux_map_security_files" lineno="711"> -<summary> -Allows caller to map secuirty_t files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="selinux_unconfined" lineno="732"> +<interface name="selinux_unconfined" lineno="710"> <summary> Unconfined access to the SELinux kernel security server. </summary> @@ -89339,7 +71668,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_getattr_fixed_disk_dev" lineno="34"> +<interface name="storage_dontaudit_getattr_fixed_disk_dev" lineno="35"> <summary> Do not audit attempts made by the caller to get the attributes of fixed disk device nodes. @@ -89350,7 +71679,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_setattr_fixed_disk_dev" lineno="54"> +<interface name="storage_setattr_fixed_disk_dev" lineno="55"> <summary> Allow the caller to set the attributes of fixed disk device nodes. @@ -89361,7 +71690,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_setattr_fixed_disk_dev" lineno="74"> +<interface name="storage_dontaudit_setattr_fixed_disk_dev" lineno="76"> <summary> Do not audit attempts made by the caller to set the attributes of fixed disk device nodes. @@ -89372,7 +71701,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_raw_read_fixed_disk" lineno="95"> +<interface name="storage_raw_read_fixed_disk" lineno="98"> <summary> Allow the caller to directly read from a fixed disk. This is extremely dangerous as it can bypass the @@ -89385,7 +71714,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_raw_read_fixed_disk_cond" lineno="126"> +<interface name="storage_raw_read_fixed_disk_cond" lineno="129"> <summary> Allow the caller to directly read from a fixed disk if a tunable is set. @@ -89404,7 +71733,7 @@ Tunable to depend on </summary> </param> </interface> -<interface name="storage_dontaudit_read_fixed_disk" lineno="151"> +<interface name="storage_dontaudit_read_fixed_disk" lineno="154"> <summary> Do not audit attempts made by the caller to read fixed disk device nodes. @@ -89415,7 +71744,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_raw_write_fixed_disk" lineno="174"> +<interface name="storage_raw_write_fixed_disk" lineno="177"> <summary> Allow the caller to directly write to a fixed disk. This is extremely dangerous as it can bypass the @@ -89428,7 +71757,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_write_fixed_disk" lineno="197"> +<interface name="storage_dontaudit_write_fixed_disk" lineno="200"> <summary> Do not audit attempts made by the caller to write fixed disk device nodes. @@ -89439,7 +71768,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_raw_rw_fixed_disk" lineno="219"> +<interface name="storage_raw_rw_fixed_disk" lineno="222"> <summary> Allow the caller to directly read and write to a fixed disk. This is extremely dangerous as it can bypass the @@ -89452,7 +71781,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_create_fixed_disk_dev" lineno="234"> +<interface name="storage_create_fixed_disk_dev" lineno="237"> <summary> Allow the caller to create fixed disk device nodes. </summary> @@ -89462,7 +71791,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_delete_fixed_disk_dev" lineno="254"> +<interface name="storage_delete_fixed_disk_dev" lineno="257"> <summary> Allow the caller to delete fixed disk device nodes. </summary> @@ -89472,7 +71801,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_manage_fixed_disk" lineno="273"> +<interface name="storage_manage_fixed_disk" lineno="276"> <summary> Create, read, write, and delete fixed disk device nodes. </summary> @@ -89482,7 +71811,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dev_filetrans_fixed_disk" lineno="302"> +<interface name="storage_dev_filetrans_fixed_disk" lineno="305"> <summary> Create block devices in /dev with the fixed disk type via an automatic type transition. @@ -89498,7 +71827,7 @@ Optional filename of the block device to be created </summary> </param> </interface> -<interface name="storage_tmpfs_filetrans_fixed_disk" lineno="321"> +<interface name="storage_tmpfs_filetrans_fixed_disk" lineno="324"> <summary> Create block devices in on a tmpfs filesystem with the fixed disk type via an automatic type transition. @@ -89509,7 +71838,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_relabel_fixed_disk" lineno="339"> +<interface name="storage_relabel_fixed_disk" lineno="342"> <summary> Relabel fixed disk device nodes. </summary> @@ -89519,7 +71848,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_swapon_fixed_disk" lineno="358"> +<interface name="storage_swapon_fixed_disk" lineno="361"> <summary> Enable a fixed disk device as swap space </summary> @@ -89529,7 +71858,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_watch_fixed_disk" lineno="377"> +<interface name="storage_watch_fixed_disk" lineno="380"> <summary> Watch fixed disk device nodes. </summary> @@ -89539,7 +71868,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_getattr_fuse_dev" lineno="398"> +<interface name="storage_getattr_fuse_dev" lineno="401"> <summary> Allow the caller to get the attributes of device nodes of fuse devices. @@ -89550,7 +71879,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_rw_fuse" lineno="417"> +<interface name="storage_rw_fuse" lineno="420"> <summary> read or write fuse device interfaces. </summary> @@ -89560,7 +71889,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_rw_fuse" lineno="436"> +<interface name="storage_dontaudit_rw_fuse" lineno="439"> <summary> Do not audit attempts to read or write fuse device interfaces. @@ -89571,7 +71900,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_getattr_scsi_generic_dev" lineno="455"> +<interface name="storage_getattr_scsi_generic_dev" lineno="458"> <summary> Allow the caller to get the attributes of the generic SCSI interface device nodes. @@ -89582,7 +71911,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_setattr_scsi_generic_dev" lineno="475"> +<interface name="storage_setattr_scsi_generic_dev" lineno="478"> <summary> Allow the caller to set the attributes of the generic SCSI interface device nodes. @@ -89593,7 +71922,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_read_scsi_generic" lineno="498"> +<interface name="storage_read_scsi_generic" lineno="501"> <summary> Allow the caller to directly read, in a generic fashion, from any SCSI device. @@ -89607,7 +71936,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_write_scsi_generic" lineno="523"> +<interface name="storage_write_scsi_generic" lineno="526"> <summary> Allow the caller to directly write, in a generic fashion, from any SCSI device. @@ -89621,7 +71950,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_setattr_scsi_generic_dev_dev" lineno="545"> +<interface name="storage_setattr_scsi_generic_dev_dev" lineno="548"> <summary> Set attributes of the device nodes for the SCSI generic interface. @@ -89632,7 +71961,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_rw_scsi_generic" lineno="565"> +<interface name="storage_dontaudit_rw_scsi_generic" lineno="568"> <summary> Do not audit attempts to read or write SCSI generic device interfaces. @@ -89643,7 +71972,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_getattr_removable_dev" lineno="584"> +<interface name="storage_getattr_removable_dev" lineno="587"> <summary> Allow the caller to get the attributes of removable devices device nodes. @@ -89654,7 +71983,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_getattr_removable_dev" lineno="604"> +<interface name="storage_dontaudit_getattr_removable_dev" lineno="607"> <summary> Do not audit attempts made by the caller to get the attributes of removable devices device nodes. @@ -89665,7 +71994,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_dontaudit_read_removable_device" lineno="623"> +<interface name="storage_dontaudit_read_removable_device" lineno="626"> <summary> Do not audit attempts made by the caller to read removable devices device nodes. @@ -89676,7 +72005,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_dontaudit_write_removable_device" lineno="643"> +<interface name="storage_dontaudit_write_removable_device" lineno="646"> <summary> Do not audit attempts made by the caller to write removable devices device nodes. @@ -89687,7 +72016,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_setattr_removable_dev" lineno="662"> +<interface name="storage_setattr_removable_dev" lineno="665"> <summary> Allow the caller to set the attributes of removable devices device nodes. @@ -89698,7 +72027,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_setattr_removable_dev" lineno="682"> +<interface name="storage_dontaudit_setattr_removable_dev" lineno="685"> <summary> Do not audit attempts made by the caller to set the attributes of removable devices device nodes. @@ -89709,7 +72038,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_raw_read_removable_device" lineno="704"> +<interface name="storage_raw_read_removable_device" lineno="707"> <summary> Allow the caller to directly read from a removable device. @@ -89723,7 +72052,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_raw_read_removable_device" lineno="723"> +<interface name="storage_dontaudit_raw_read_removable_device" lineno="726"> <summary> Do not audit attempts to directly read removable devices. </summary> @@ -89733,7 +72062,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_raw_write_removable_device" lineno="745"> +<interface name="storage_raw_write_removable_device" lineno="748"> <summary> Allow the caller to directly write to a removable device. @@ -89747,7 +72076,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_dontaudit_raw_write_removable_device" lineno="764"> +<interface name="storage_dontaudit_raw_write_removable_device" lineno="767"> <summary> Do not audit attempts to directly write removable devices. </summary> @@ -89757,7 +72086,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="storage_read_tape" lineno="783"> +<interface name="storage_read_tape" lineno="786"> <summary> Allow the caller to directly read a tape device. @@ -89768,7 +72097,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_write_tape" lineno="803"> +<interface name="storage_write_tape" lineno="806"> <summary> Allow the caller to directly write a tape device. @@ -89779,7 +72108,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_getattr_tape_dev" lineno="823"> +<interface name="storage_getattr_tape_dev" lineno="826"> <summary> Allow the caller to get the attributes of device nodes of tape devices. @@ -89790,7 +72119,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_setattr_tape_dev" lineno="843"> +<interface name="storage_setattr_tape_dev" lineno="846"> <summary> Allow the caller to set the attributes of device nodes of tape devices. @@ -89801,7 +72130,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="storage_unconfined" lineno="862"> +<interface name="storage_unconfined" lineno="865"> <summary> Unconfined access to storage devices. </summary> @@ -90863,6 +73192,14 @@ Role allowed access. </param> <rolecap/> </interface> +<tunable name="guest_connect_network" dftval="false"> +<desc> +<p> +Determine whether guest can +configure network manager. +</p> +</desc> +</tunable> </module> <module name="logadm" filename="policy/modules/roles/logadm.if"> <summary>Log administrator role</summary> @@ -91399,28 +73736,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="abrt_read_pid_files" lineno="234"> -<summary> -Read abrt PID files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="abrt_manage_pid_files" lineno="249"> -<summary> -Create, read, write, and delete -abrt PID files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="abrt_manage_runtime_files" lineno="265"> +<interface name="abrt_manage_runtime_files" lineno="235"> <summary> Create, read, write, and delete abrt runtime files. @@ -91431,7 +73747,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="abrt_admin" lineno="291"> +<interface name="abrt_admin" lineno="261"> <summary> All of the rules required to administrate an abrt environment, @@ -91871,27 +74187,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="amavis_setattr_pid_files" lineno="184"> -<summary> -Set attributes of amavis pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="amavis_create_pid_files" lineno="199"> -<summary> -Create amavis pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="amavis_setattr_runtime_files" lineno="214"> +<interface name="amavis_setattr_runtime_files" lineno="184"> <summary> Set attributes of amavis runtime files. </summary> @@ -91901,7 +74197,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="amavis_create_runtime_files" lineno="233"> +<interface name="amavis_create_runtime_files" lineno="203"> <summary> Create amavis runtime files. </summary> @@ -91911,7 +74207,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="amavis_admin" lineno="259"> +<interface name="amavis_admin" lineno="229"> <summary> All of the rules required to administrate an amavis environment. @@ -92665,6 +74961,17 @@ Domain allowed access. </summary> </param> </interface> +<interface name="apache_map_sys_content" lineno="1481"> +<summary> +Map httpd sys content files. +This interface is Gentoo-specific. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> <tunable name="allow_httpd_anon_write" dftval="false"> <desc> <p> @@ -92973,17 +75280,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="apcupsd_read_pid_files" lineno="52"> -<summary> -Read apcupsd PID files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="apcupsd_read_log" lineno="67"> +<interface name="apcupsd_read_log" lineno="53"> <summary> Read apcupsd log files. </summary> @@ -92994,7 +75291,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="apcupsd_append_log" lineno="87"> +<interface name="apcupsd_append_log" lineno="73"> <summary> Append apcupsd log files. </summary> @@ -93004,7 +75301,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="apcupsd_cgi_script_domtrans" lineno="108"> +<interface name="apcupsd_cgi_script_domtrans" lineno="94"> <summary> Execute a domain transition to run httpd_apcupsd_cgi_script. @@ -93015,7 +75312,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="apcupsd_admin" lineno="138"> +<interface name="apcupsd_admin" lineno="124"> <summary> All of the rules required to administrate an apcupsd environment. @@ -93242,18 +75539,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="asterisk_setattr_pid_files" lineno="93"> -<summary> -Set attributes of the asterisk -PID content. -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="asterisk_admin" lineno="114"> +<interface name="asterisk_admin" lineno="99"> <summary> All of the rules required to administrate an asterisk environment. @@ -93430,27 +75716,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="avahi_create_pid_dirs" lineno="146"> -<summary> -Create avahi pid directories. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="avahi_setattr_pid_dirs" lineno="161"> -<summary> -Set attributes of avahi pid directories. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="avahi_setattr_runtime_dirs" lineno="176"> +<interface name="avahi_setattr_runtime_dirs" lineno="146"> <summary> Set attributes of avahi runtime directories. </summary> @@ -93460,7 +75726,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="avahi_create_runtime_dirs" lineno="195"> +<interface name="avahi_create_runtime_dirs" lineno="165"> <summary> Create avahi runtime directories. </summary> @@ -93470,49 +75736,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="avahi_manage_pid_files" lineno="214"> -<summary> -Create, read, and write avahi pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="avahi_dontaudit_search_pid" lineno="230"> -<summary> -Do not audit attempts to search -avahi pid directories. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -</interface> -<interface name="avahi_filetrans_pid" lineno="256"> -<summary> -Create specified objects in generic -pid directories with the avahi pid file type. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<param name="object_class"> -<summary> -Class of the object being created. -</summary> -</param> -<param name="name" optional="true"> -<summary> -The name of the object being created. -</summary> -</param> -</interface> -<interface name="avahi_manage_runtime_files" lineno="271"> +<interface name="avahi_manage_runtime_files" lineno="184"> <summary> Create, read, and write avahi runtime files. </summary> @@ -93522,7 +75746,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="avahi_dontaudit_search_runtime" lineno="291"> +<interface name="avahi_dontaudit_search_runtime" lineno="204"> <summary> Do not audit attempts to search avahi runtime directories. @@ -93533,7 +75757,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="avahi_filetrans_runtime" lineno="320"> +<interface name="avahi_filetrans_runtime" lineno="233"> <summary> Create specified objects in generic runtime directories with the avahi runtime file type. @@ -93554,7 +75778,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="avahi_admin" lineno="345"> +<interface name="avahi_admin" lineno="258"> <summary> All of the rules required to administrate an avahi environment. @@ -93714,17 +75938,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="bind_setattr_pid_dirs" lineno="267"> -<summary> -Set attributes of bind pid directories. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="bind_setattr_zone_dirs" lineno="281"> +<interface name="bind_setattr_zone_dirs" lineno="267"> <summary> Set attributes of bind zone directories. </summary> @@ -93734,7 +75948,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="bind_read_zone" lineno="299"> +<interface name="bind_read_zone" lineno="285"> <summary> Read bind zone files. </summary> @@ -93744,7 +75958,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="bind_manage_zone" lineno="319"> +<interface name="bind_manage_zone" lineno="305"> <summary> Create, read, write, and delete bind zone files. @@ -93755,7 +75969,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="bind_admin" lineno="345"> +<interface name="bind_admin" lineno="331"> <summary> All of the rules required to administrate an bind environment. @@ -94222,17 +76436,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="certmonger_read_pid_files" lineno="72"> -<summary> -Read certmonger PID files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="certmonger_search_lib" lineno="86"> +<interface name="certmonger_search_lib" lineno="72"> <summary> Search certmonger lib directories. </summary> @@ -94242,7 +76446,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="certmonger_read_lib_files" lineno="105"> +<interface name="certmonger_read_lib_files" lineno="91"> <summary> Read certmonger lib files. </summary> @@ -94252,7 +76456,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="certmonger_manage_lib_files" lineno="125"> +<interface name="certmonger_manage_lib_files" lineno="111"> <summary> Create, read, write, and delete certmonger lib files. @@ -94263,7 +76467,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="certmonger_admin" lineno="151"> +<interface name="certmonger_admin" lineno="137"> <summary> All of the rules required to administrate an certmonger environment. @@ -94651,18 +76855,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="clamav_manage_pid_content" lineno="101"> -<summary> -Create, read, write, and delete -clamav pid content. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="clamav_read_config" lineno="115"> +<interface name="clamav_read_config" lineno="100"> <summary> Read clamav configuration files. </summary> @@ -94672,7 +76865,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="clamav_search_lib" lineno="134"> +<interface name="clamav_search_lib" lineno="119"> <summary> Search clamav library directories. </summary> @@ -94682,7 +76875,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="clamav_domtrans_clamscan" lineno="153"> +<interface name="clamav_domtrans_clamscan" lineno="138"> <summary> Execute a domain transition to run clamscan. </summary> @@ -94692,7 +76885,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="clamav_exec_clamscan" lineno="172"> +<interface name="clamav_exec_clamscan" lineno="157"> <summary> Execute clamscan in the caller domain. </summary> @@ -94702,7 +76895,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="clamav_read_state_clamd" lineno="191"> +<interface name="clamav_read_state_clamd" lineno="176"> <summary> Read clamd process state files. </summary> @@ -94712,7 +76905,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="clamav_read_signatures" lineno="219"> +<interface name="clamav_read_signatures" lineno="204"> <summary> Read clam virus signature files </summary> @@ -94729,7 +76922,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="clamav_scannable_files" lineno="240"> +<interface name="clamav_scannable_files" lineno="225"> <summary> Denote a particular type to be scanned by ClamAV </summary> @@ -94739,7 +76932,7 @@ Type that clamd_t and clamscan_t can read. </summary> </param> </interface> -<interface name="clamav_domtrans_freshclam" lineno="258"> +<interface name="clamav_domtrans_freshclam" lineno="243"> <summary> Execute a domain transition to run freshclam. </summary> @@ -94749,7 +76942,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="clamav_run_freshclam" lineno="284"> +<interface name="clamav_run_freshclam" lineno="269"> <summary> Execute freshclam in the freshclam domain, and allow the specified role the freshclam domain. @@ -94766,7 +76959,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="clamav_exec_freshclam" lineno="303"> +<interface name="clamav_exec_freshclam" lineno="288"> <summary> Execute freshclam in the caller domain. </summary> @@ -94776,7 +76969,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="clamav_enabledisable_clamd" lineno="322"> +<interface name="clamav_enabledisable_clamd" lineno="307"> <summary> Allow specified domain to enable clamd units </summary> @@ -94786,7 +76979,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="clamav_startstop_clamd" lineno="341"> +<interface name="clamav_startstop_clamd" lineno="326"> <summary> Allow specified domain to start clamd units </summary> @@ -94796,7 +76989,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="clamav_status_clamd" lineno="360"> +<interface name="clamav_status_clamd" lineno="345"> <summary> Allow specified domain to get status of clamd </summary> @@ -94806,7 +76999,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="clamav_reload_clamd" lineno="379"> +<interface name="clamav_reload_clamd" lineno="364"> <summary> Allow specified domain reload of clamd </summary> @@ -94816,7 +77009,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="clamav_admin" lineno="405"> +<interface name="clamav_admin" lineno="390"> <summary> All of the rules required to administrate an clamav environment. @@ -94833,7 +77026,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="clamav_filetrans_log" lineno="444"> +<interface name="clamav_filetrans_log" lineno="429"> <summary> specified domain creates /var/log/clamav/freshclam.log with correct type </summary> @@ -94843,7 +77036,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="clamav_filetrans_runtime_dir" lineno="462"> +<interface name="clamav_filetrans_runtime_dir" lineno="447"> <summary> specified domain creates /run/clamav with correct type </summary> @@ -95162,19 +77355,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="consolesetup_pid_filetrans_runtime" lineno="98"> -<summary> -Create a console-setup directory in -the runtime directory. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<rolecap/> -</interface> -<interface name="consolesetup_runtime_filetrans_runtime_dir" lineno="115"> +<interface name="consolesetup_runtime_filetrans_runtime_dir" lineno="98"> <summary> Create a console-setup directory in the runtime directory. @@ -95432,7 +77613,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_engine_tmp_files" lineno="474"> +<interface name="container_search_engine_tmp" lineno="474"> +<summary> +Allow the specified domain to search +container engine temporary directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_engine_tmp_files" lineno="494"> <summary> Allow the specified domain to manage container engine temporary files. @@ -95443,7 +77635,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_engine_tmp_sock_files" lineno="494"> +<interface name="container_manage_engine_tmp_sock_files" lineno="514"> <summary> Allow the specified domain to manage container engine temporary named sockets. @@ -95454,7 +77646,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_engine_tmp_filetrans" lineno="526"> +<interface name="container_engine_tmp_filetrans" lineno="546"> <summary> Allow the specified domain to create objects in generic temporary directories @@ -95477,7 +77669,18 @@ The name of the object being created. </summary> </param> </interface> -<interface name="container_read_system_container_state" lineno="545"> +<interface name="container_read_all_container_state" lineno="565"> +<summary> +Read the process state (/proc/pid) +of all containers. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_read_system_container_state" lineno="584"> <summary> Read the process state (/proc/pid) of all system containers. @@ -95488,7 +77691,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_read_user_container_state" lineno="564"> +<interface name="container_read_user_container_state" lineno="603"> <summary> Read the process state (/proc/pid) of all user containers. @@ -95499,7 +77702,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_all_containers" lineno="584"> +<interface name="container_read_all_container_engine_state" lineno="622"> +<summary> +Read the process state (/proc/pid) +of all container engines. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_all_containers" lineno="642"> <summary> All of the permissions necessary for a container engine to manage @@ -95511,7 +77725,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_domtrans" lineno="604"> +<interface name="container_domtrans" lineno="662"> <summary> Allow the specified domain to perform a type transition to @@ -95523,7 +77737,18 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="container_stream_connect_system_containers" lineno="623"> +<interface name="container_stream_connect_system_engine" lineno="681"> +<summary> +Connect to a system container engine +domain over a unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_stream_connect_system_containers" lineno="703"> <summary> Connect to a system container domain over a unix stream socket. @@ -95534,7 +77759,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_stream_connect_user_containers" lineno="645"> +<interface name="container_stream_connect_user_containers" lineno="725"> <summary> Connect to a user container domain over a unix stream socket. @@ -95545,7 +77770,29 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_stream_connect_all_containers" lineno="667"> +<interface name="container_stream_connect_spc" lineno="747"> +<summary> +Connect to super privileged containers +over a unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_rw_spc_tcp_sockets" lineno="769"> +<summary> +Read and write super privileged +container TCP sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_stream_connect_all_containers" lineno="788"> <summary> Connect to a container domain over a unix stream socket. @@ -95556,7 +77803,29 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_signal_all_containers" lineno="690"> +<interface name="container_stream_connect_spec_container" lineno="810"> +<summary> +Connect to the specified container +domain over a unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_kill_all_containers" lineno="831"> +<summary> +Allow the specified domain to +send a kill signal to all containers. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="container_signal_all_containers" lineno="851"> <summary> Allow the specified domain to send all signals to a container @@ -95568,7 +77837,58 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="container_setattr_container_ptys" lineno="708"> +<interface name="container_dev_filetrans" lineno="880"> +<summary> +Create objects in /dev with an automatic +transition to the container device type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +<param name="name" optional="true"> +<summary> +The name of the object being created. +</summary> +</param> +</interface> +<interface name="container_rw_device_files" lineno="898"> +<summary> +Read and write container device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_device_files" lineno="916"> +<summary> +Manage container device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_mounton_all_devices" lineno="934"> +<summary> +Mount on all container devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_setattr_container_ptys" lineno="952"> <summary> Set the attributes of container ptys. </summary> @@ -95578,7 +77898,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_use_container_ptys" lineno="726"> +<interface name="container_use_container_ptys" lineno="970"> <summary> Read and write container ptys. </summary> @@ -95588,7 +77908,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_mountpoint" lineno="745"> +<interface name="container_mountpoint" lineno="989"> <summary> Make the specified type usable as a mountpoint for containers. @@ -95599,10 +77919,34 @@ Type to be used as a mountpoint. </summary> </param> </interface> -<interface name="container_create_config_files" lineno="764"> +<interface name="container_list_plugin_dirs" lineno="1009"> <summary> Allow the specified domain to -create container config files. +list the contents of container +plugin directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_watch_plugin_dirs" lineno="1029"> +<summary> +Allow the specified domain to +add a watch on container plugin +directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_plugin_files" lineno="1048"> +<summary> +Allow the specified domain to +manage container plugin files. </summary> <param name="domain"> <summary> @@ -95610,10 +77954,10 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_write_config_files" lineno="783"> +<interface name="container_exec_plugins" lineno="1067"> <summary> Allow the specified domain to -write container config files. +execute container plugins. </summary> <param name="domain"> <summary> @@ -95621,7 +77965,51 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_config_files" lineno="802"> +<interface name="container_read_config" lineno="1087"> +<summary> +Allow the specified domain to +read container config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_watch_config_dirs" lineno="1107"> +<summary> +Allow the specified domain to +watch container config directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_create_config_files" lineno="1126"> +<summary> +Allow the specified domain to +create container config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_rw_config_files" lineno="1145"> +<summary> +Allow the specified domain to read +and write container config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_config_files" lineno="1164"> <summary> Allow the specified domain to manage container config files. @@ -95632,7 +78020,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_file_root_filetrans" lineno="823"> +<interface name="container_file_root_filetrans" lineno="1185"> <summary> Allow the specified domain to create container files in the @@ -95645,7 +78033,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_dirs" lineno="842"> +<interface name="container_manage_dirs" lineno="1204"> <summary> Allow the specified domain to manage container file directories. @@ -95656,7 +78044,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_files" lineno="861"> +<interface name="container_watch_dirs" lineno="1223"> +<summary> +Allow the specified domain to +watch container file directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_files" lineno="1242"> <summary> Allow the specified domain to manage container files. @@ -95667,7 +78066,29 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_lnk_files" lineno="880"> +<interface name="container_dontaudit_relabel_dirs" lineno="1261"> +<summary> +Do not audit attempts to relabel +container file directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="container_dontaudit_relabel_files" lineno="1280"> +<summary> +Do not audit attempts to relabel +container files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="container_manage_lnk_files" lineno="1299"> <summary> Allow the specified domain to manage container lnk files. @@ -95678,7 +78099,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_fifo_files" lineno="899"> +<interface name="container_rw_fifo_files" lineno="1318"> +<summary> +Allow the specified domain to +read and write container fifo files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_fifo_files" lineno="1337"> <summary> Allow the specified domain to manage container fifo files. @@ -95689,7 +78121,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_sock_files" lineno="918"> +<interface name="container_manage_sock_files" lineno="1356"> <summary> Allow the specified domain to manage container sock files. @@ -95700,7 +78132,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_rw_chr_files" lineno="937"> +<interface name="container_rw_chr_files" lineno="1375"> <summary> Allow the specified domain to read and write container chr files. @@ -95711,7 +78143,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_dontaudit_rw_chr_files" lineno="956"> +<interface name="container_dontaudit_rw_chr_files" lineno="1394"> <summary> Do not audit attempts to read and write container chr files. @@ -95722,7 +78154,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_chr_files" lineno="975"> +<interface name="container_manage_chr_files" lineno="1413"> <summary> Allow the specified domain to manage container chr files. @@ -95733,7 +78165,47 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_home_config" lineno="994"> +<interface name="container_spec_filetrans_file" lineno="1449"> +<summary> +Allow the specified domain to create +objects in specified directories with +an automatic type transition to the +container file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="domain"> +<summary> +Directory to transition on. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +<param name="name" optional="true"> +<summary> +The name of the object being created. +</summary> +</param> +</interface> +<interface name="container_list_ro_dirs" lineno="1469"> +<summary> +Allow the specified domain to list +the contents of read-only container +file directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_home_config" lineno="1488"> <summary> Allow the specified domain to manage container config home content. @@ -95744,7 +78216,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_config_home_filetrans" lineno="1026"> +<interface name="container_config_home_filetrans" lineno="1520"> <summary> Allow the specified domain to create objects in an xdg_config directory @@ -95767,7 +78239,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="container_manage_home_data_files" lineno="1046"> +<interface name="container_manage_home_data_files" lineno="1540"> <summary> Allow the specified domain to manage container data home files. @@ -95778,7 +78250,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_home_data_fifo_files" lineno="1066"> +<interface name="container_manage_home_data_fifo_files" lineno="1560"> <summary> Allow the specified domain to manage container data home named @@ -95790,7 +78262,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_home_data_sock_files" lineno="1086"> +<interface name="container_manage_home_data_sock_files" lineno="1580"> <summary> Allow the specified domain to manage container data home named @@ -95802,7 +78274,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_admin_all_files" lineno="1104"> +<interface name="container_admin_all_files" lineno="1598"> <summary> Administrate all container files. </summary> @@ -95812,7 +78284,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_admin_all_ro_files" lineno="1124"> +<interface name="container_admin_all_ro_files" lineno="1618"> <summary> Administrate all container read-only files. </summary> @@ -95822,7 +78294,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_admin_all_user_runtime_content" lineno="1146"> +<interface name="container_admin_all_user_runtime_content" lineno="1640"> <summary> All of the rules necessary for a user to manage user container runtime data @@ -95834,7 +78306,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_all_home_content" lineno="1166"> +<interface name="container_manage_all_home_content" lineno="1660"> <summary> All of the rules necessary for a user to manage container data in their home @@ -95846,7 +78318,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_relabel_all_content" lineno="1210"> +<interface name="container_relabel_all_content" lineno="1704"> <summary> Allow the specified domain to relabel container files and @@ -95858,7 +78330,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_remount_fs" lineno="1229"> +<interface name="container_remount_fs" lineno="1723"> <summary> Allow the specified domain to remount container filesystems. @@ -95869,7 +78341,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_relabel_fs" lineno="1248"> +<interface name="container_relabel_fs" lineno="1742"> <summary> Allow the specified domain to relabel container filesystems. @@ -95880,7 +78352,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_getattr_fs" lineno="1268"> +<interface name="container_getattr_fs" lineno="1762"> <summary> Allow the specified domain to get the attributes of container @@ -95892,7 +78364,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_search_runtime" lineno="1287"> +<interface name="container_search_runtime" lineno="1781"> <summary> Allow the specified domain to search runtime container directories. @@ -95903,7 +78375,30 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_runtime_files" lineno="1307"> +<interface name="container_read_runtime_files" lineno="1801"> +<summary> +Allow the specified domain to read +runtime container files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_getattr_runtime_sock_files" lineno="1822"> +<summary> +Allow the specified domain to get +the attributes runtime container of +container runtime named sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_runtime_files" lineno="1841"> <summary> Allow the specified domain to manage runtime container files. @@ -95914,7 +78409,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_runtime_fifo_files" lineno="1326"> +<interface name="container_manage_runtime_fifo_files" lineno="1860"> <summary> Allow the specified domain to manage runtime container named pipes. @@ -95925,7 +78420,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_runtime_sock_files" lineno="1345"> +<interface name="container_manage_runtime_lnk_files" lineno="1879"> +<summary> +Allow the specified domain to manage +runtime container symlinks. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_runtime_sock_files" lineno="1898"> <summary> Allow the specified domain to manage runtime container named sockets. @@ -95936,7 +78442,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_user_runtime_files" lineno="1364"> +<interface name="container_manage_user_runtime_files" lineno="1917"> <summary> Allow the specified domain to manage user runtime container files. @@ -95947,7 +78453,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_rw_user_runtime_sock_files" lineno="1383"> +<interface name="container_rw_user_runtime_sock_files" lineno="1936"> <summary> Allow the specified domain to read and write user runtime container named sockets. @@ -95958,7 +78464,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_search_var_lib" lineno="1402"> +<interface name="container_search_var_lib" lineno="1955"> <summary> Allow the specified domain to search container directories in /var/lib. @@ -95969,7 +78475,41 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_var_lib_files" lineno="1422"> +<interface name="container_list_var_lib" lineno="1976"> +<summary> +Allow the specified domain to list +the contents of container directories +in /var/lib. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_var_lib_dirs" lineno="1996"> +<summary> +Allow the specified domain to manage +container file directories in /var/lib. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_read_var_lib_files" lineno="2015"> +<summary> +Allow the specified domain to read +container files in /var/lib. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_var_lib_files" lineno="2034"> <summary> Allow the specified domain to manage container files in /var/lib. @@ -95980,7 +78520,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_var_lib_fifo_files" lineno="1441"> +<interface name="container_map_var_lib_files" lineno="2053"> +<summary> +Allow the specified domain to memory +map container files in /var/lib. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_var_lib_fifo_files" lineno="2072"> <summary> Allow the specified domain to manage container named pipes in /var/lib. @@ -95991,7 +78542,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_manage_var_lib_sock_files" lineno="1460"> +<interface name="container_manage_var_lib_lnk_files" lineno="2091"> +<summary> +Allow the specified domain to manage +container symlinks in /var/lib. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_var_lib_sock_files" lineno="2110"> <summary> Allow the specified domain to manage container named sockets in /var/lib. @@ -96002,7 +78564,74 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_unlabeled_var_lib_filetrans" lineno="1491"> +<interface name="container_var_lib_filetrans" lineno="2140"> +<summary> +Allow the specified domain to create +objects in /var/lib with an automatic +transition to the container var lib type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +<param name="name" optional="true"> +<summary> +The name of the object being created. +</summary> +</param> +</interface> +<interface name="container_var_lib_filetrans_file" lineno="2170"> +<summary> +Allow the specified domain to create +objects in /var/lib with an automatic +transition to the container file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +<param name="name" optional="true"> +<summary> +The name of the object being created. +</summary> +</param> +</interface> +<interface name="container_filetrans_var_lib_file" lineno="2201"> +<summary> +Allow the specified domain to create +objects in container /var/lib directories +with an automatic transition to the +container file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +<param name="name" optional="true"> +<summary> +The name of the object being created. +</summary> +</param> +</interface> +<interface name="container_unlabeled_var_lib_filetrans" lineno="2233"> <summary> Allow the specified domain to create objects in unlabeled directories with @@ -96025,7 +78654,140 @@ The name of the object being created. </summary> </param> </interface> -<interface name="container_start_units" lineno="1512"> +<interface name="container_search_logs" lineno="2254"> +<summary> +Allow the specified domain to search +container log file directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_list_log_dirs" lineno="2274"> +<summary> +Allow the specified domain to list +the contents of container log directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_create_log_dirs" lineno="2293"> +<summary> +Allow the specified domain to create +container log file directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_log_dirs" lineno="2312"> +<summary> +Allow the specified domain to manage +container log file directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_watch_log_dirs" lineno="2331"> +<summary> +Allow the specified domain to watch +container log file directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_create_log_files" lineno="2350"> +<summary> +Allow the specified domain to create +container log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_append_log_files" lineno="2369"> +<summary> +Allow the specified domain to append +data to container log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_manage_log_files" lineno="2388"> +<summary> +Allow the specified domain to manage +container log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_watch_log_files" lineno="2407"> +<summary> +Allow the specified domain to watch +container log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_log_filetrans" lineno="2438"> +<summary> +Allow the specified domain to create +objects in log directories with an +automatic transition to the container +log type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +<param name="name" optional="true"> +<summary> +The name of the object being created. +</summary> +</param> +</interface> +<interface name="container_manage_log_symlinks" lineno="2458"> +<summary> +Allow the specified domain to manage +container log symlinks. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="container_start_units" lineno="2477"> <summary> Allow the specified domain to start systemd units for containers. @@ -96036,7 +78798,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="container_admin" lineno="1539"> +<interface name="container_admin" lineno="2504"> <summary> All of the rules required to administrate a container @@ -96084,6 +78846,27 @@ Allow containers to read all public content. </p> </desc> </tunable> +<tunable name="container_spc_create_nfs_servers" dftval="false"> +<desc> +<p> +Allow super privileged containers to create NFS servers. +</p> +</desc> +</tunable> +<tunable name="container_spc_use_tun_tap_dev" dftval="false"> +<desc> +<p> +Allow super privileged containers to use tun-tap devices. +</p> +</desc> +</tunable> +<tunable name="container_use_dri" dftval="false"> +<desc> +<p> +Allow containers to use direct rendering devices. +</p> +</desc> +</tunable> <tunable name="container_use_ecryptfs" dftval="false"> <desc> <p> @@ -96091,6 +78874,13 @@ Allow containers to use eCryptfs filesystems. </p> </desc> </tunable> +<tunable name="container_use_hugetlbfs" dftval="false"> +<desc> +<p> +Allow containers to use huge pages. +</p> +</desc> +</tunable> <tunable name="container_use_nfs" dftval="false"> <desc> <p> @@ -96240,17 +79030,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="couchdb_read_pid_files" lineno="70"> -<summary> -Read couchdb pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="couchdb_read_runtime_files" lineno="85"> +<interface name="couchdb_read_runtime_files" lineno="70"> <summary> Read couchdb runtime files. </summary> @@ -96260,7 +79040,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="couchdb_admin" lineno="111"> +<interface name="couchdb_admin" lineno="96"> <summary> All of the rules required to administrate an couchdb environment. @@ -96389,6 +79169,64 @@ Domain allowed access. </param> </interface> </module> +<module name="crio" filename="policy/modules/services/crio.if"> +<summary>policy for cri-o</summary> +<interface name="crio_domtrans" lineno="13"> +<summary> +Execute CRI-O in the crio domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="crio_run" lineno="39"> +<summary> +Execute CRI-O in the crio domain, +and allow the specified role the +kubelet domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed the crio domain. +</summary> +</param> +</interface> +<interface name="crio_read_conmon_state" lineno="60"> +<summary> +Read the process state (/proc/pid) +of CRI-O conmon. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="crio_admin" lineno="85"> +<summary> +All of the rules required to administrate +a CRI-O environment. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> <module name="cron" filename="policy/modules/services/cron.if"> <summary>Periodic execution of scheduled commands.</summary> <template name="cron_common_crontab_template" lineno="13"> @@ -96670,18 +79508,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cron_manage_pid_files" lineno="674"> -<summary> -Create, read, write, and delete -crond pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="cron_anacron_domtrans_system_job" lineno="689"> +<interface name="cron_anacron_domtrans_system_job" lineno="674"> <summary> Execute anacron in the cron system domain. @@ -96692,7 +79519,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="cron_use_system_job_fds" lineno="708"> +<interface name="cron_use_system_job_fds" lineno="693"> <summary> Use system cron job file descriptors. </summary> @@ -96702,7 +79529,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cron_manage_system_spool" lineno="726"> +<interface name="cron_manage_system_spool" lineno="711"> <summary> Create, read, write, and delete the system spool. </summary> @@ -96712,7 +79539,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cron_read_system_spool" lineno="745"> +<interface name="cron_read_system_spool" lineno="730"> <summary> Read the system spool. </summary> @@ -96722,7 +79549,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cron_rw_tmp_files" lineno="765"> +<interface name="cron_rw_tmp_files" lineno="750"> <summary> Read and write crond temporary files. </summary> @@ -96732,7 +79559,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cron_read_system_job_lib_files" lineno="783"> +<interface name="cron_read_system_job_lib_files" lineno="768"> <summary> Read system cron job lib files. </summary> @@ -96742,7 +79569,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cron_manage_system_job_lib_files" lineno="803"> +<interface name="cron_manage_system_job_lib_files" lineno="788"> <summary> Create, read, write, and delete system cron job lib files. @@ -96753,7 +79580,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cron_write_system_job_pipes" lineno="822"> +<interface name="cron_write_system_job_pipes" lineno="807"> <summary> Write system cron job unnamed pipes. </summary> @@ -96763,7 +79590,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cron_rw_system_job_pipes" lineno="841"> +<interface name="cron_rw_system_job_pipes" lineno="826"> <summary> Read and write system cron job unnamed pipes. @@ -96774,7 +79601,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cron_rw_system_job_stream_sockets" lineno="860"> +<interface name="cron_rw_system_job_stream_sockets" lineno="845"> <summary> Read and write inherited system cron job unix domain stream sockets. @@ -96785,7 +79612,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cron_read_system_job_tmp_files" lineno="878"> +<interface name="cron_read_system_job_tmp_files" lineno="863"> <summary> Read system cron job temporary files. </summary> @@ -96795,7 +79622,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="898"> +<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="883"> <summary> Do not audit attempts to append temporary system cron job files. @@ -96806,7 +79633,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="cron_rw_inherited_system_job_tmp_files" lineno="916"> +<interface name="cron_rw_inherited_system_job_tmp_files" lineno="901"> <summary> Read and write to inherited system cron job temporary files. </summary> @@ -96816,7 +79643,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="935"> +<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="920"> <summary> Do not audit attempts to write temporary system cron job files. @@ -96827,7 +79654,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="cron_exec_crontab" lineno="954"> +<interface name="cron_exec_crontab" lineno="939"> <summary> Execute crontab in the caller domain. </summary> @@ -96838,7 +79665,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="cron_admin" lineno="980"> +<interface name="cron_admin" lineno="965"> <summary> All of the rules required to administrate a cron environment. @@ -97002,17 +79829,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cups_read_pid_files" lineno="107"> -<summary> -Read cups PID files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="cups_read_runtime_files" lineno="122"> +<interface name="cups_read_runtime_files" lineno="107"> <summary> Read cups runtime files. </summary> @@ -97022,7 +79839,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cups_domtrans_config" lineno="142"> +<interface name="cups_domtrans_config" lineno="127"> <summary> Execute cups_config in the cups config domain. @@ -97033,7 +79850,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="cups_signal_config" lineno="162"> +<interface name="cups_signal_config" lineno="147"> <summary> Send generic signals to the cups configuration daemon. @@ -97044,7 +79861,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cups_dbus_chat_config" lineno="181"> +<interface name="cups_dbus_chat_config" lineno="166"> <summary> Send and receive messages from cupsd_config over dbus. @@ -97055,7 +79872,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cups_read_config" lineno="202"> +<interface name="cups_read_config" lineno="187"> <summary> Read cups configuration files. </summary> @@ -97066,7 +79883,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="cups_read_rw_config" lineno="222"> +<interface name="cups_read_rw_config" lineno="207"> <summary> Read cups-writable configuration files. </summary> @@ -97077,7 +79894,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="cups_read_log" lineno="242"> +<interface name="cups_read_log" lineno="227"> <summary> Read cups log files. </summary> @@ -97088,7 +79905,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="cups_append_log" lineno="261"> +<interface name="cups_append_log" lineno="246"> <summary> Append cups log files. </summary> @@ -97098,7 +79915,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cups_write_log" lineno="280"> +<interface name="cups_write_log" lineno="265"> <summary> Write cups log files. </summary> @@ -97108,7 +79925,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cups_stream_connect_ptal" lineno="300"> +<interface name="cups_stream_connect_ptal" lineno="285"> <summary> Connect to ptal over an unix domain stream socket. @@ -97119,7 +79936,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cups_read_state" lineno="319"> +<interface name="cups_read_state" lineno="304"> <summary> Read the process state (/proc/pid) of cupsd. </summary> @@ -97129,7 +79946,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="cups_domtrans_hplip" lineno="341"> +<interface name="cups_domtrans_hplip" lineno="326"> <summary> Execute HP Linux Imaging and Printing applications in their @@ -97141,7 +79958,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="cups_admin" lineno="367"> +<interface name="cups_admin" lineno="352"> <summary> All of the rules required to administrate an cups environment. @@ -97671,7 +80488,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_unconfined" lineno="733"> +<interface name="dbus_dontaudit_write_system_bus_runtime_named_sockets" lineno="734"> +<summary> +Do not audit attempts to write to +system bus runtime named sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dbus_unconfined" lineno="752"> <summary> Unconfined access to DBUS. </summary> @@ -97681,7 +80509,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="763"> +<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="782"> <summary> Create resources in /run or /var/run with the system_dbusd_runtime_t label. This method is deprecated in favor of the init_daemon_run_dir @@ -97703,7 +80531,7 @@ Optional file name used for the resource </summary> </param> </interface> -<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="777"> +<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="796"> <summary> Create directories with the system_dbusd_runtime_t label </summary> @@ -97896,28 +80724,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="devicekit_read_pid_files" lineno="212"> -<summary> -Read devicekit PID files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="devicekit_manage_pid_files" lineno="228"> -<summary> -Create, read, write, and delete -devicekit PID files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="devicekit_read_runtime_files" lineno="243"> +<interface name="devicekit_read_runtime_files" lineno="212"> <summary> Read devicekit runtime files. </summary> @@ -97927,7 +80734,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="devicekit_manage_runtime_files" lineno="263"> +<interface name="devicekit_manage_runtime_files" lineno="232"> <summary> Create, read, write, and delete devicekit runtime files. @@ -97938,7 +80745,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="devicekit_admin" lineno="289"> +<interface name="devicekit_admin" lineno="258"> <summary> All of the rules required to administrate an devicekit environment. @@ -98267,75 +81074,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dnsmasq_delete_pid_files" lineno="149"> -<summary> -Delete dnsmasq pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="dnsmasq_manage_pid_files" lineno="165"> -<summary> -Create, read, write, and delete -dnsmasq pid files (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="dnsmasq_read_pid_files" lineno="181"> -<summary> -Read dnsmasq pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="dnsmasq_create_pid_dirs" lineno="196"> -<summary> -Create dnsmasq pid directories. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="dnsmasq_spec_filetrans_pid" lineno="228"> -<summary> -Create specified objects in specified -directories with a type transition to -the dnsmasq pid file type. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<param name="file_type"> -<summary> -Directory to transition on. -</summary> -</param> -<param name="object"> -<summary> -The object class of the object being created. -</summary> -</param> -<param name="name" optional="true"> -<summary> -The name of the object being created. -</summary> -</param> -</interface> -<interface name="dnsmasq_create_runtime_dirs" lineno="243"> +<interface name="dnsmasq_create_runtime_dirs" lineno="148"> <summary> Create dnsmasq runtime directories. </summary> @@ -98345,7 +81084,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dnsmasq_virt_runtime_filetrans_runtime" lineno="274"> +<interface name="dnsmasq_virt_runtime_filetrans_runtime" lineno="179"> <summary> Create specified objects in specified directories with a type transition to @@ -98367,7 +81106,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="dnsmasq_read_runtime_files" lineno="293"> +<interface name="dnsmasq_read_runtime_files" lineno="198"> <summary> Read dnsmasq runtime files. </summary> @@ -98377,7 +81116,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dnsmasq_delete_runtime_files" lineno="312"> +<interface name="dnsmasq_delete_runtime_files" lineno="217"> <summary> Delete dnsmasq runtime files. </summary> @@ -98387,7 +81126,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dnsmasq_manage_runtime_files" lineno="331"> +<interface name="dnsmasq_manage_runtime_files" lineno="236"> <summary> Create, read, write, and delete dnsmasq runtime files @@ -98398,7 +81137,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="dnsmasq_admin" lineno="357"> +<interface name="dnsmasq_admin" lineno="262"> <summary> All of the rules required to administrate an dnsmasq environment. @@ -98783,17 +81522,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="exim_read_pid_files" lineno="116"> -<summary> -Read exim pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="exim_read_log" lineno="131"> +<interface name="exim_read_log" lineno="117"> <summary> Read exim log files. </summary> @@ -98804,7 +81533,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="exim_append_log" lineno="150"> +<interface name="exim_append_log" lineno="136"> <summary> Append exim log files. </summary> @@ -98814,7 +81543,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="exim_manage_log" lineno="171"> +<interface name="exim_manage_log" lineno="157"> <summary> Create, read, write, and delete exim log files. @@ -98826,7 +81555,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="exim_manage_spool_dirs" lineno="191"> +<interface name="exim_manage_spool_dirs" lineno="177"> <summary> Create, read, write, and delete exim spool directories. @@ -98837,7 +81566,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="exim_read_spool_files" lineno="210"> +<interface name="exim_read_spool_files" lineno="196"> <summary> Read exim spool files. </summary> @@ -98847,7 +81576,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="exim_manage_spool_files" lineno="231"> +<interface name="exim_manage_spool_files" lineno="217"> <summary> Create, read, write, and delete exim spool files. @@ -98858,7 +81587,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="exim_read_var_lib_files" lineno="250"> +<interface name="exim_read_var_lib_files" lineno="236"> <summary> Read exim var lib files. </summary> @@ -98868,7 +81597,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="exim_manage_var_lib_files" lineno="269"> +<interface name="exim_manage_var_lib_files" lineno="255"> <summary> Create, read, and write exim var lib files. </summary> @@ -98878,7 +81607,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="exim_admin" lineno="295"> +<interface name="exim_admin" lineno="281"> <summary> All of the rules required to administrate an exim environment. @@ -99047,17 +81776,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="fail2ban_read_pid_files" lineno="233"> -<summary> -Read fail2ban pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="fail2ban_admin" lineno="254"> +<interface name="fail2ban_admin" lineno="240"> <summary> All of the rules required to administrate an fail2ban environment. @@ -99743,35 +82462,44 @@ Domain allowed access. </summary> </param> </interface> -<interface name="glance_read_pid_files" lineno="192"> +<interface name="glance_admin" lineno="199"> <summary> -Read glance pid files. (Deprecated) +All of the rules required to +administrate an glance environment. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> </interface> -<interface name="glance_manage_pid_files" lineno="207"> +</module> +<module name="glusterfs" filename="policy/modules/services/glusterfs.if"> +<summary>Cluster File System binary, daemon and command line.</summary> +<interface name="glusterfs_domtrans_daemon" lineno="13"> <summary> -Create, read, write, and delete -glance pid files. (Deprecated) +Execute glusterd in the glusterd domain. </summary> <param name="domain"> <summary> -Domain allowed access. +Domain allowed to transition. </summary> </param> </interface> -<interface name="glance_admin" lineno="228"> +<interface name="glusterfs_run_daemon" lineno="39"> <summary> -All of the rules required to -administrate an glance environment. +Execute glusterd in the glusterd domain, and +allow the specified role the glusterd domain. </summary> <param name="domain"> <summary> -Domain allowed access. +Domain allowed to transition. </summary> </param> <param name="role"> @@ -99781,10 +82509,38 @@ Role allowed access. </param> <rolecap/> </interface> -</module> -<module name="glusterfs" filename="policy/modules/services/glusterfs.if"> -<summary>Cluster File System binary, daemon and command line.</summary> -<interface name="glusterfs_admin" lineno="20"> +<interface name="glusterfs_stream_connect_daemon" lineno="58"> +<summary> +Connect to glusterd over a unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="glusterfs_use_daemon_fds" lineno="79"> +<summary> +Inherit and use glusterd file descriptors. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="glusterfs_search_bricks" lineno="98"> +<summary> +Search through the contents of gluster brick +directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="glusterfs_admin" lineno="123"> <summary> All of the rules required to administrate an glusterfs environment. @@ -99801,6 +82557,16 @@ Role allowed access. </param> <rolecap/> </interface> +<tunable name="glusterfs_modify_policy" dftval="false"> +<desc> +<p> +Allow the gluster daemon to automatically +add and remove file contexts from the local +SELinux policy when adding and removing +bricks. +</p> +</desc> +</tunable> </module> <module name="gnomeclock" filename="policy/modules/services/gnomeclock.if"> <summary>Gnome clock handler for setting the time.</summary> @@ -100029,17 +82795,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="gssproxy_read_pid_files" lineno="108"> -<summary> -Read gssproxy PID files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="gssproxy_stream_connect" lineno="123"> +<interface name="gssproxy_stream_connect" lineno="109"> <summary> Connect to gssproxy over an unix domain stream socket. @@ -100050,7 +82806,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="gssproxy_admin" lineno="145"> +<interface name="gssproxy_admin" lineno="131"> <summary> All of the rules required to administrate an gssproxy environment @@ -100286,7 +83042,24 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="hddtemp_exec" lineno="32"> +<interface name="hddtemp_run" lineno="39"> +<summary> +Execute hddtemp in the hddtemp domain, and +allow the specified role the hdd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="hddtemp_exec" lineno="59"> <summary> Execute hddtemp in the caller domain. </summary> @@ -100296,7 +83069,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="hddtemp_admin" lineno="58"> +<interface name="hddtemp_admin" lineno="85"> <summary> All of the rules required to administrate an hddtemp environment. @@ -100396,17 +83169,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="icecast_read_pid_files" lineno="68"> -<summary> -Read icecast pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="icecast_manage_pid_files" lineno="83"> +<interface name="icecast_manage_pid_files" lineno="69"> <summary> Create, read, write, and delete icecast pid files. @@ -100417,7 +83180,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="icecast_read_log" lineno="103"> +<interface name="icecast_read_log" lineno="89"> <summary> Read icecast log files. </summary> @@ -100428,7 +83191,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="icecast_append_log" lineno="122"> +<interface name="icecast_append_log" lineno="108"> <summary> Append icecast log files. </summary> @@ -100438,7 +83201,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="icecast_manage_log" lineno="142"> +<interface name="icecast_manage_log" lineno="128"> <summary> Create, read, write, and delete icecast log files. @@ -100449,7 +83212,7 @@ Domain allow access. </summary> </param> </interface> -<interface name="icecast_admin" lineno="168"> +<interface name="icecast_admin" lineno="154"> <summary> All of the rules required to administrate an icecast environment. @@ -100518,17 +83281,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ifplugd_read_pid_files" lineno="90"> -<summary> -Read ifplugd pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="ifplugd_admin" lineno="111"> +<interface name="ifplugd_admin" lineno="97"> <summary> All of the rules required to administrate an ifplugd environment. @@ -100703,18 +83456,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="inn_manage_pid" lineno="100"> -<summary> -Create, read, write, and delete -innd pid content. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="inn_manage_runtime_dirs" lineno="118"> +<interface name="inn_manage_runtime_dirs" lineno="100"> <summary> Create, read, write, and delete innd runtime dirs. @@ -100725,7 +83467,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="inn_manage_runtime_files" lineno="138"> +<interface name="inn_manage_runtime_files" lineno="120"> <summary> Create, read, write, and delete innd runtime files. @@ -100736,7 +83478,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="inn_manage_runtime_sockets" lineno="158"> +<interface name="inn_manage_runtime_sockets" lineno="140"> <summary> Create, read, write, and delete innd runtime named sockets. @@ -100747,7 +83489,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="inn_read_config" lineno="178"> +<interface name="inn_read_config" lineno="160"> <summary> Read innd configuration content. </summary> @@ -100757,7 +83499,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="inn_read_news_lib" lineno="198"> +<interface name="inn_read_news_lib" lineno="180"> <summary> Read innd news library content. </summary> @@ -100767,7 +83509,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="inn_read_news_spool" lineno="217"> +<interface name="inn_read_news_spool" lineno="199"> <summary> Read innd news spool content. </summary> @@ -100777,7 +83519,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="inn_dgram_send" lineno="237"> +<interface name="inn_dgram_send" lineno="219"> <summary> Send to a innd unix dgram socket. </summary> @@ -100787,7 +83529,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="inn_domtrans" lineno="256"> +<interface name="inn_domtrans" lineno="238"> <summary> Execute innd in the innd domain. </summary> @@ -100797,7 +83539,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="inn_admin" lineno="282"> +<interface name="inn_admin" lineno="264"> <summary> All of the rules required to administrate an inn environment. @@ -101360,6 +84102,480 @@ Role allowed access. <rolecap/> </interface> </module> +<module name="kubernetes" filename="policy/modules/services/kubernetes.if"> +<summary>policy for kubernetes</summary> +<template name="kubernetes_kubectl_role" lineno="29"> +<summary> +Role access for kubectl. +</summary> +<param name="role_prefix"> +<summary> +The prefix of the user role (e.g., user +is the prefix for user_r). +</summary> +</param> +<param name="user_domain"> +<summary> +User domain for the role. +</summary> +</param> +<param name="user_exec_domain"> +<summary> +User exec domain for execute and transition access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +</template> +<interface name="kubernetes_domtrans_kubelet" lineno="81"> +<summary> +Execute kubelet in the kubelet domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="kubernetes_run_kubelet" lineno="107"> +<summary> +Execute kubelet in the kubelet domain, +and allow the specified role the +kubelet domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed the kubelet domain. +</summary> +</param> +</interface> +<interface name="kubernetes_stream_connect_kubelet" lineno="127"> +<summary> +Connect to kubelet over a unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_read_kubelet_state" lineno="149"> +<summary> +Read the process state (/proc/pid) +of kubelet. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_use_kubelet_fds" lineno="168"> +<summary> +Inherit and use file descriptors from +kubelet. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_kubelet_kill" lineno="187"> +<summary> +Allow kubelet to send a kill signal +to the specified domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_domtrans_kubeadm" lineno="205"> +<summary> +Execute kubeadm in the kubeadm domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="kubernetes_run_kubeadm" lineno="231"> +<summary> +Execute kubeadm in the kubeadm domain, +and allow the specified role the +kubeadm domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed the kubeadm domain. +</summary> +</param> +</interface> +<interface name="kubernetes_container_engine" lineno="254"> +<summary> +Associated the specified domain to +be a domain which is capable of +operating as a kubernetes container +engine. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_container" lineno="276"> +<summary> +Associated the specified domain to +be a domain which is capable of +operating as a container domain +which can be spawned by kubernetes. +engine. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_mountpoint" lineno="295"> +<summary> +Allow the specified file type to be +mounted on by kubernetes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_getpgid_containers" lineno="315"> +<summary> +Allow the specified domain to +get the process group ID of all +kubernetes containers. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="kubernetes_run_engine_bpf" lineno="334"> +<summary> +Run kubernetes container engine bpf +programs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_search_config" lineno="352"> +<summary> +Search kubernetes config directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_read_config" lineno="371"> +<summary> +Read kubernetes config files and symlinks. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_mounton_config_dirs" lineno="391"> +<summary> +Mount on kubernetes config directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_watch_config_dirs" lineno="410"> +<summary> +Allow the specified domain to watch +kubernetes config directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_manage_config_files" lineno="428"> +<summary> +Manage kubernetes config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_mounton_config_files" lineno="446"> +<summary> +Mount on kubernetes config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_watch_config_files" lineno="465"> +<summary> +Allow the specified domain to watch +kubernetes config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_search_plugin_dirs" lineno="485"> +<summary> +Allow the specified domain to search +through the contents of kubernetes plugin +directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_list_plugins" lineno="506"> +<summary> +Allow the specified domain to list +the contents of kubernetes plugin +directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_watch_plugin_dirs" lineno="525"> +<summary> +Allow the specified domain to watch +kubernetes plugin directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_manage_plugin_files" lineno="544"> +<summary> +Allow the specified domain to manage +kubernetes plugin files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_list_tmpfs" lineno="563"> +<summary> +List the contents of kubernetes tmpfs +directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_manage_tmpfs_dirs" lineno="581"> +<summary> +Manage kubernetes tmpfs directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_watch_tmpfs_dirs" lineno="599"> +<summary> +Watch kubernetes tmpfs directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_read_tmpfs_files" lineno="617"> +<summary> +Read kubernetes tmpfs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_manage_tmpfs_files" lineno="635"> +<summary> +Manage kubernetes tmpfs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_watch_tmpfs_files" lineno="653"> +<summary> +Watch kubernetes tmpfs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_read_tmpfs_symlinks" lineno="671"> +<summary> +Read kubernetes tmpfs symlinks. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_manage_tmpfs_symlinks" lineno="689"> +<summary> +Manage kubernetes tmpfs symlinks. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_relabelfrom_tmpfs_dirs" lineno="708"> +<summary> +Relabel directories from the kubernetes +tmpfs type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_relabelfrom_tmpfs_files" lineno="726"> +<summary> +Relabel files from the kubernetes tmpfs type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_relabelfrom_tmpfs_symlinks" lineno="744"> +<summary> +Relabel symlinks from the kubernetes tmpfs type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_get_unit_status" lineno="762"> +<summary> +Get the status of kubernetes systemd units. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_start_unit" lineno="781"> +<summary> +Start kubernetes systemd units. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_stop_unit" lineno="800"> +<summary> +Stop kubernetes systemd units. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_reload_unit" lineno="819"> +<summary> +Reload kubernetes systemd units. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kubernetes_admin" lineno="845"> +<summary> +All of the rules required to administrate +a kubernetes environment. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> <module name="l2tp" filename="policy/modules/services/l2tp.if"> <summary>Layer 2 Tunneling Protocol.</summary> <interface name="l2tpd_dgram_send" lineno="14"> @@ -102043,28 +85259,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="memcached_manage_pid_files" lineno="33"> -<summary> -Create, read, write, and delete -memcached pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="memcached_read_pid_files" lineno="48"> -<summary> -Read memcached pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="memcached_manage_runtime_files" lineno="63"> +<interface name="memcached_manage_runtime_files" lineno="33"> <summary> Create, read, write, and delete memcached runtime files. @@ -102075,7 +85270,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="memcached_stream_connect" lineno="83"> +<interface name="memcached_stream_connect" lineno="53"> <summary> Connect to memcached using a unix domain stream socket. @@ -102086,7 +85281,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="memcached_tcp_connect" lineno="102"> +<interface name="memcached_tcp_connect" lineno="72"> <summary> Connect to memcache over the network. </summary> @@ -102096,7 +85291,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="memcached_admin" lineno="129"> +<interface name="memcached_admin" lineno="99"> <summary> All of the rules required to administrate an memcached environment. @@ -103088,7 +86283,17 @@ Domain to not audit. </summary> </param> </interface> -<interface name="mta_dontaudit_read_spool_symlinks" lineno="855"> +<interface name="mta_rw_inherited_delivery_pipes" lineno="854"> +<summary> +read and write fifo files inherited from delivery domains +</summary> +<param name="domain"> +<summary> +Domain to use fifo files +</summary> +</param> +</interface> +<interface name="mta_dontaudit_read_spool_symlinks" lineno="875"> <summary> Do not audit attempts to read mail spool symlinks. @@ -103099,7 +86304,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="mta_getattr_spool" lineno="873"> +<interface name="mta_getattr_spool" lineno="893"> <summary> Get attributes of mail spool content. </summary> @@ -103109,7 +86314,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_dontaudit_getattr_spool_files" lineno="895"> +<interface name="mta_dontaudit_getattr_spool_files" lineno="915"> <summary> Do not audit attempts to get attributes of mail spool files. @@ -103120,7 +86325,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="mta_spool_filetrans" lineno="933"> +<interface name="mta_spool_filetrans" lineno="953"> <summary> Create specified objects in the mail spool directory with a @@ -103147,7 +86352,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="mta_read_spool_files" lineno="952"> +<interface name="mta_read_spool_files" lineno="972"> <summary> Read mail spool files. </summary> @@ -103157,7 +86362,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_rw_spool" lineno="972"> +<interface name="mta_rw_spool" lineno="992"> <summary> Read and write mail spool files. </summary> @@ -103167,7 +86372,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_append_spool" lineno="993"> +<interface name="mta_append_spool" lineno="1013"> <summary> Create, read, and write mail spool files. </summary> @@ -103177,7 +86382,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_delete_spool" lineno="1014"> +<interface name="mta_delete_spool" lineno="1034"> <summary> Delete mail spool files. </summary> @@ -103187,7 +86392,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_manage_spool" lineno="1034"> +<interface name="mta_manage_spool" lineno="1054"> <summary> Create, read, write, and delete mail spool content. @@ -103198,7 +86403,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_watch_spool" lineno="1056"> +<interface name="mta_watch_spool" lineno="1076"> <summary> Watch mail spool content. </summary> @@ -103208,7 +86413,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_queue_filetrans" lineno="1091"> +<interface name="mta_queue_filetrans" lineno="1111"> <summary> Create specified objects in the mail queue spool directory with a @@ -103235,7 +86440,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="mta_search_queue" lineno="1110"> +<interface name="mta_search_queue" lineno="1130"> <summary> Search mail queue directories. </summary> @@ -103245,7 +86450,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_list_queue" lineno="1129"> +<interface name="mta_list_queue" lineno="1149"> <summary> List mail queue directories. </summary> @@ -103255,7 +86460,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_read_queue" lineno="1148"> +<interface name="mta_read_queue" lineno="1168"> <summary> Read mail queue files. </summary> @@ -103265,7 +86470,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_dontaudit_rw_queue" lineno="1168"> +<interface name="mta_dontaudit_rw_queue" lineno="1188"> <summary> Do not audit attempts to read and write mail queue content. @@ -103276,7 +86481,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="mta_manage_queue" lineno="1188"> +<interface name="mta_manage_queue" lineno="1208"> <summary> Create, read, write, and delete mail queue content. @@ -103287,7 +86492,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_read_sendmail_bin" lineno="1208"> +<interface name="mta_read_sendmail_bin" lineno="1228"> <summary> Read sendmail binary. </summary> @@ -103297,7 +86502,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mta_rw_user_mail_stream_sockets" lineno="1227"> +<interface name="mta_rw_user_mail_stream_sockets" lineno="1247"> <summary> Read and write unix domain stream sockets of all base mail domains. @@ -103618,28 +86823,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="mysql_read_pid_files" lineno="399"> -<summary> -Read mysqld pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="mysql_search_pid_files" lineno="414"> -<summary> -Search mysqld pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> - -</interface> -<interface name="mysql_admin" lineno="435"> +<interface name="mysql_admin" lineno="406"> <summary> All of the rules required to administrate an mysqld environment. @@ -103656,7 +86840,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="mysql_setattr_run_dirs" lineno="477"> +<interface name="mysql_setattr_run_dirs" lineno="448"> <summary> Set the attributes of the MySQL run directories </summary> @@ -103666,7 +86850,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="mysql_create_run_dirs" lineno="495"> +<interface name="mysql_create_run_dirs" lineno="466"> <summary> Create MySQL run directories </summary> @@ -103676,7 +86860,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="mysql_generic_run_filetrans_run" lineno="526"> +<interface name="mysql_generic_run_filetrans_run" lineno="497"> <summary> Automatically use the MySQL run label for created resources in generic run locations. This method is deprecated in favor of the @@ -103988,17 +87172,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="networkmanager_read_pid_files" lineno="284"> -<summary> -Read networkmanager pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="networkmanager_read_runtime_files" lineno="299"> +<interface name="networkmanager_read_runtime_files" lineno="284"> <summary> Read networkmanager runtime files. </summary> @@ -104008,7 +87182,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="networkmanager_stream_connect" lineno="319"> +<interface name="networkmanager_stream_connect" lineno="304"> <summary> Connect to networkmanager over a unix domain stream socket. @@ -104019,7 +87193,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="networkmanager_enabledisable" lineno="338"> +<interface name="networkmanager_enabledisable" lineno="323"> <summary> Allow specified domain to enable/disable NetworkManager units </summary> @@ -104029,7 +87203,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="networkmanager_startstop" lineno="357"> +<interface name="networkmanager_startstop" lineno="342"> <summary> Allow specified domain to start/stop NetworkManager units </summary> @@ -104039,7 +87213,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="networkmanager_status" lineno="376"> +<interface name="networkmanager_status" lineno="361"> <summary> Allow specified domain to get status of NetworkManager </summary> @@ -104049,7 +87223,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="networkmanager_admin" lineno="402"> +<interface name="networkmanager_admin" lineno="387"> <summary> All of the rules required to administrate an networkmanager environment. @@ -104066,7 +87240,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="441"> +<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="426"> <summary> Do not audit use of wpa_cli file descriptors </summary> @@ -104076,7 +87250,7 @@ Domain to dontaudit access. </summary> </param> </interface> -<interface name="networkmanager_domtrans_wpa_cli" lineno="460"> +<interface name="networkmanager_domtrans_wpa_cli" lineno="445"> <summary> Execute wpa_cli in the wpa_cli domain. </summary> @@ -104086,7 +87260,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="networkmanager_run_wpa_cli" lineno="486"> +<interface name="networkmanager_run_wpa_cli" lineno="471"> <summary> Execute wpa cli in the wpa_cli domain, and allow the specified role the wpa_cli domain. @@ -104103,7 +87277,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="networkmanager_rw_rawip_sockets" lineno="507"> +<interface name="networkmanager_rw_rawip_sockets" lineno="492"> <summary> Read and write networkmanager rawip sockets. </summary> @@ -104230,17 +87404,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="nis_read_ypbind_pid" lineno="223"> -<summary> -Read ypbind pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="nis_read_ypbind_runtime_files" lineno="238"> +<interface name="nis_read_ypbind_runtime_files" lineno="223"> <summary> Read ypbind runtime files. </summary> @@ -104250,17 +87414,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="nis_delete_ypbind_pid" lineno="257"> -<summary> -Delete ypbind pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="nis_read_ypserv_config" lineno="271"> +<interface name="nis_read_ypserv_config" lineno="242"> <summary> Read ypserv configuration files. </summary> @@ -104270,7 +87424,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="nis_domtrans_ypxfr" lineno="290"> +<interface name="nis_domtrans_ypxfr" lineno="261"> <summary> Execute ypxfr in the ypxfr domain. </summary> @@ -104280,7 +87434,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="nis_initrc_domtrans" lineno="311"> +<interface name="nis_initrc_domtrans" lineno="282"> <summary> Execute nis init scripts in the init script domain. @@ -104291,7 +87445,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="nis_initrc_domtrans_ypbind" lineno="330"> +<interface name="nis_initrc_domtrans_ypbind" lineno="301"> <summary> Execute ypbind init scripts in the init script domain. @@ -104302,7 +87456,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="nis_admin" lineno="355"> +<interface name="nis_admin" lineno="326"> <summary> All of the rules required to administrate an nis environment. @@ -104408,28 +87562,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="nscd_dontaudit_search_pid" lineno="186"> -<summary> -Do not audit attempts to search -nscd pid directories. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -</interface> -<interface name="nscd_read_pid" lineno="201"> -<summary> -Read nscd pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="nscd_dontaudit_search_runtime" lineno="217"> +<interface name="nscd_dontaudit_search_runtime" lineno="186"> <summary> Do not audit attempts to search nscd runtime directories. @@ -104440,7 +87573,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="nscd_read_runtime_files" lineno="235"> +<interface name="nscd_read_runtime_files" lineno="204"> <summary> Read nscd runtime files. </summary> @@ -104450,7 +87583,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="nscd_unconfined" lineno="254"> +<interface name="nscd_unconfined" lineno="223"> <summary> Unconfined access to nscd services. </summary> @@ -104460,7 +87593,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="nscd_run" lineno="279"> +<interface name="nscd_run" lineno="248"> <summary> Execute nscd in the nscd domain, and allow the specified role the nscd domain. @@ -104476,7 +87609,7 @@ Role allowed access. </summary> </param> </interface> -<interface name="nscd_initrc_domtrans" lineno="299"> +<interface name="nscd_initrc_domtrans" lineno="268"> <summary> Execute the nscd server init script in the initrc domain. @@ -104487,7 +87620,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="nscd_admin" lineno="324"> +<interface name="nscd_admin" lineno="293"> <summary> All of the rules required to administrate an nscd environment. @@ -104555,17 +87688,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="nslcd_read_pid_files" lineno="50"> -<summary> -Read nslcd pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="nslcd_stream_connect" lineno="65"> +<interface name="nslcd_stream_connect" lineno="51"> <summary> Connect to nslcd over an unix domain stream socket. @@ -104576,7 +87699,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="nslcd_admin" lineno="91"> +<interface name="nslcd_admin" lineno="77"> <summary> All of the rules required to administrate an nslcd environment. @@ -105215,17 +88338,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="openct_read_pid_files" lineno="69"> -<summary> -Read openct pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="openct_read_runtime_files" lineno="84"> +<interface name="openct_read_runtime_files" lineno="69"> <summary> Read openct runtime files. </summary> @@ -105235,7 +88348,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="openct_stream_connect" lineno="104"> +<interface name="openct_stream_connect" lineno="89"> <summary> Connect to openct over an unix domain stream socket. @@ -105246,7 +88359,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="openct_admin" lineno="130"> +<interface name="openct_admin" lineno="115"> <summary> All of the rules required to administrate an openct environment. @@ -105284,6 +88397,53 @@ Role allowed access. <rolecap/> </interface> </module> +<module name="opensm" filename="policy/modules/services/opensm.if"> +<summary>OpenSM is a software implementation of an InfiniBand subnet manager.</summary> +<interface name="opensm_domtrans" lineno="13"> +<summary> +Execute opensm in the opensm domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="opensm_run" lineno="39"> +<summary> +Execute opensm in the opensm domain, and +allow the specified role the opensm domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="opensm_admin" lineno="66"> +<summary> +All of the rules required to administrate +an opensm environment. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> <module name="openvpn" filename="policy/modules/services/openvpn.if"> <summary>full-featured SSL VPN solution.</summary> <interface name="openvpn_domtrans" lineno="14"> @@ -105402,17 +88562,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="openvswitch_read_pid_files" lineno="32"> -<summary> -Read openvswitch pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="openvswitch_read_runtime_files" lineno="47"> +<interface name="openvswitch_read_runtime_files" lineno="32"> <summary> Read openvswitch runtime files. </summary> @@ -105422,7 +88572,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="openvswitch_admin" lineno="73"> +<interface name="openvswitch_admin" lineno="58"> <summary> All of the rules required to administrate an openvswitch environment. @@ -105499,17 +88649,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="pcscd_read_pid_files" lineno="32"> -<summary> -Read pcscd pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="pcscd_read_runtime_files" lineno="47"> +<interface name="pcscd_read_runtime_files" lineno="32"> <summary> Read pcscd runtime files. </summary> @@ -105519,7 +88659,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="pcscd_stream_connect" lineno="67"> +<interface name="pcscd_stream_connect" lineno="52"> <summary> Connect to pcscd over an unix domain stream socket. @@ -105530,7 +88670,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="pcscd_admin" lineno="96"> +<interface name="pcscd_admin" lineno="81"> <summary> All of the rules required to administrate an pcscd environment. @@ -105784,27 +88924,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="plymouthd_read_pid_files" lineno="244"> -<summary> -Read plymouthd pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="plymouthd_delete_pid_files" lineno="259"> -<summary> -Delete the plymouthd pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="plymouthd_read_runtime_files" lineno="274"> +<interface name="plymouthd_read_runtime_files" lineno="244"> <summary> Read plymouthd runtime files. </summary> @@ -105814,7 +88934,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="plymouthd_delete_runtime_files" lineno="293"> +<interface name="plymouthd_delete_runtime_files" lineno="263"> <summary> Delete the plymouthd runtime files. </summary> @@ -105824,7 +88944,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="plymouthd_admin" lineno="319"> +<interface name="plymouthd_admin" lineno="289"> <summary> All of the rules required to administrate an plymouthd environment. @@ -105989,7 +89109,7 @@ MLS range to transition to. </interface> <interface name="podman_rw_conmon_pipes" lineno="272"> <summary> -Read and write podman conmon unnamed pipes. +Read and write conmon unnamed pipes. </summary> <param name="domain"> <summary> @@ -105997,10 +89117,10 @@ Domain allowed access. </summary> </param> </interface> -<interface name="podman_use_conmon_fds" lineno="293"> +<interface name="podman_use_conmon_fds" lineno="291"> <summary> Allow the specified domain to inherit -file descriptors from podman conmon. +and use file descriptors from conmon. </summary> <param name="domain"> <summary> @@ -106008,7 +89128,7 @@ Domain allowed access. </summary> </param> </interface> -<template name="podman_user_role" lineno="330"> +<template name="podman_user_role" lineno="326"> <summary> Role access for rootless podman. </summary> @@ -106035,7 +89155,7 @@ Role allowed access. </param> <rolecap/> </template> -<interface name="podman_admin" lineno="367"> +<interface name="podman_admin" lineno="363"> <summary> All of the rules required to administrate a podman @@ -107296,49 +90416,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ppp_read_pid_files" lineno="366"> -<summary> -Read ppp pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="ppp_manage_pid_files" lineno="382"> -<summary> -Create, read, write, and delete -ppp pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="ppp_pid_filetrans" lineno="408"> -<summary> -Create specified pppd pid objects -with a type transition. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<param name="object_class"> -<summary> -Class of the object being created. -</summary> -</param> -<param name="name" optional="true"> -<summary> -The name of the object being created. -</summary> -</param> -</interface> -<interface name="ppp_read_runtime_files" lineno="423"> +<interface name="ppp_read_runtime_files" lineno="366"> <summary> Read ppp runtime files. </summary> @@ -107348,7 +90426,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ppp_manage_runtime_files" lineno="443"> +<interface name="ppp_manage_runtime_files" lineno="386"> <summary> Create, read, write, and delete ppp runtime files. @@ -107359,7 +90437,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ppp_runtime_filetrans" lineno="473"> +<interface name="ppp_runtime_filetrans" lineno="416"> <summary> Create specified pppd runtime objects with a type transition. @@ -107380,7 +90458,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="ppp_initrc_domtrans" lineno="492"> +<interface name="ppp_initrc_domtrans" lineno="435"> <summary> Execute pppd init script in the initrc domain. @@ -107391,7 +90469,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="ppp_admin" lineno="517"> +<interface name="ppp_admin" lineno="460"> <summary> All of the rules required to administrate an ppp environment. @@ -107683,27 +90761,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="psad_read_pid_files" lineno="111"> -<summary> -Read psad pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="psad_rw_pid_files" lineno="125"> -<summary> -Read and write psad pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="psad_read_log" lineno="140"> +<interface name="psad_read_log" lineno="112"> <summary> Read psad log content. </summary> @@ -107714,7 +90772,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="psad_append_log" lineno="161"> +<interface name="psad_append_log" lineno="133"> <summary> Append psad log files. </summary> @@ -107725,7 +90783,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="psad_rw_fifo_file" lineno="180"> +<interface name="psad_rw_fifo_file" lineno="152"> <summary> Read and write psad fifo files. </summary> @@ -107735,7 +90793,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="psad_rw_tmp_files" lineno="199"> +<interface name="psad_rw_tmp_files" lineno="171"> <summary> Read and write psad temporary files. </summary> @@ -107745,7 +90803,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="psad_admin" lineno="225"> +<interface name="psad_admin" lineno="197"> <summary> All of the rules required to administrate an psad environment. @@ -108015,17 +91073,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="qpidd_read_pid_files" lineno="87"> -<summary> -Read qpidd pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="qpidd_search_lib" lineno="101"> +<interface name="qpidd_search_lib" lineno="87"> <summary> Search qpidd lib directories. </summary> @@ -108035,7 +91083,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="qpidd_read_lib_files" lineno="120"> +<interface name="qpidd_read_lib_files" lineno="106"> <summary> Read qpidd lib files. </summary> @@ -108045,7 +91093,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="qpidd_manage_lib_files" lineno="140"> +<interface name="qpidd_manage_lib_files" lineno="126"> <summary> Create, read, write, and delete qpidd lib files. @@ -108056,7 +91104,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="qpidd_admin" lineno="166"> +<interface name="qpidd_admin" lineno="152"> <summary> All of the rules required to administrate an qpidd environment. @@ -108463,17 +91511,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="rhsmcertd_read_pid_files" lineno="190"> -<summary> -Read rhsmcertd pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="rhsmcertd_stream_connect" lineno="205"> +<interface name="rhsmcertd_stream_connect" lineno="191"> <summary> Connect to rhsmcertd with a unix domain stream socket. @@ -108484,7 +91522,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="rhsmcertd_dbus_chat" lineno="225"> +<interface name="rhsmcertd_dbus_chat" lineno="211"> <summary> Send and receive messages from rhsmcertd over dbus. @@ -108495,7 +91533,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="rhsmcertd_dontaudit_dbus_chat" lineno="247"> +<interface name="rhsmcertd_dontaudit_dbus_chat" lineno="233"> <summary> Do not audit attempts to send and receive messages from @@ -108507,7 +91545,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="rhsmcertd_admin" lineno="274"> +<interface name="rhsmcertd_admin" lineno="260"> <summary> All of the rules required to administrate an rhsmcertd environment. @@ -108793,7 +91831,29 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="rpc_read_nfs_content" lineno="195"> +<interface name="rpc_read_rpcd_state" lineno="195"> +<summary> +Read the process state (/proc/pid) of +rpcd. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpc_use_nfsd_fds" lineno="214"> +<summary> +Inherit and use file descriptors from +nfsd. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpc_read_nfs_content" lineno="233"> <summary> Read nfs exported content. </summary> @@ -108804,7 +91864,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="rpc_manage_nfs_rw_content" lineno="217"> +<interface name="rpc_manage_nfs_rw_content" lineno="255"> <summary> Create, read, write, and delete nfs exported read write content. @@ -108816,7 +91876,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="rpc_manage_nfs_ro_content" lineno="239"> +<interface name="rpc_manage_nfs_ro_content" lineno="277"> <summary> Create, read, write, and delete nfs exported read only content. @@ -108828,7 +91888,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="rpc_tcp_rw_nfs_sockets" lineno="259"> +<interface name="rpc_tcp_rw_nfs_sockets" lineno="297"> <summary> Read and write to nfsd tcp sockets. </summary> @@ -108838,7 +91898,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="rpc_udp_rw_nfs_sockets" lineno="277"> +<interface name="rpc_udp_rw_nfs_sockets" lineno="315"> <summary> Read and write to nfsd udp sockets. </summary> @@ -108848,7 +91908,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="rpc_search_nfs_state_data" lineno="295"> +<interface name="rpc_search_nfs_state_data" lineno="333"> <summary> Search nfs lib directories. </summary> @@ -108858,7 +91918,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="rpc_read_nfs_state_data" lineno="314"> +<interface name="rpc_create_nfs_state_data_dirs" lineno="352"> +<summary> +Create nfs lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpc_read_nfs_state_data" lineno="371"> <summary> Read nfs lib files. </summary> @@ -108868,7 +91938,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="rpc_manage_nfs_state_data" lineno="334"> +<interface name="rpc_manage_nfs_state_data" lineno="391"> <summary> Create, read, write, and delete nfs lib files. @@ -108879,7 +91949,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="rpc_admin" lineno="364"> +<interface name="rpc_admin" lineno="421"> <summary> All of the rules required to administrate an rpc environment. @@ -108946,17 +92016,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="rpcbind_read_pid_files" lineno="52"> -<summary> -Read rpcbind pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="rpcbind_search_lib" lineno="66"> +<interface name="rpcbind_search_lib" lineno="52"> <summary> Search rpcbind lib directories. </summary> @@ -108966,7 +92026,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="rpcbind_read_lib_files" lineno="85"> +<interface name="rpcbind_read_lib_files" lineno="71"> <summary> Read rpcbind lib files. </summary> @@ -108976,7 +92036,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="rpcbind_manage_lib_files" lineno="105"> +<interface name="rpcbind_manage_lib_files" lineno="91"> <summary> Create, read, write, and delete rpcbind lib files. @@ -108987,7 +92047,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="rpcbind_signull" lineno="124"> +<interface name="rpcbind_signull" lineno="110"> <summary> Send null signals to rpcbind. </summary> @@ -108997,7 +92057,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="rpcbind_admin" lineno="149"> +<interface name="rpcbind_admin" lineno="135"> <summary> All of the rules required to administrate an rpcbind environment. @@ -109774,17 +92834,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="samba_read_winbind_pid" lineno="718"> -<summary> -Read winbind pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="samba_read_winbind_runtime_files" lineno="733"> +<interface name="samba_read_winbind_runtime_files" lineno="718"> <summary> Read winbind runtime files. </summary> @@ -109794,7 +92844,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="samba_stream_connect_winbind" lineno="753"> +<interface name="samba_stream_connect_winbind" lineno="738"> <summary> Connect to winbind with a unix domain stream socket. @@ -109805,7 +92855,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="samba_admin" lineno="779"> +<interface name="samba_admin" lineno="764"> <summary> All of the rules required to administrate an samba environment. @@ -109937,18 +92987,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="sanlock_manage_pid_files" lineno="52"> -<summary> -Create, read, write, and delete -sanlock pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="sanlock_stream_connect" lineno="67"> +<interface name="sanlock_stream_connect" lineno="52"> <summary> Connect to sanlock with a unix domain stream socket. @@ -109959,7 +92998,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sanlock_admin" lineno="93"> +<interface name="sanlock_admin" lineno="78"> <summary> All of the rules required to administrate an sanlock environment. @@ -110005,7 +93044,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sasl_admin" lineno="39"> +<interface name="sasl_read_keytab" lineno="32"> +<summary> +Read SASL keytab files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sasl_admin" lineno="58"> <summary> All of the rules required to administrate an sasl environment. @@ -110471,28 +93520,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="smokeping_read_pid_files" lineno="51"> -<summary> -Read smokeping pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="smokeping_manage_pid_files" lineno="66"> -<summary> -Create, read, write, and delete -smokeping pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="smokeping_getattr_lib_files" lineno="80"> +<interface name="smokeping_getattr_lib_files" lineno="51"> <summary> Get attributes of smokeping lib files. </summary> @@ -110502,7 +93530,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="smokeping_read_lib_files" lineno="99"> +<interface name="smokeping_read_lib_files" lineno="70"> <summary> Read smokeping lib files. </summary> @@ -110512,7 +93540,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="smokeping_manage_lib_files" lineno="119"> +<interface name="smokeping_manage_lib_files" lineno="90"> <summary> Create, read, write, and delete smokeping lib files. @@ -110523,7 +93551,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="smokeping_admin" lineno="145"> +<interface name="smokeping_admin" lineno="116"> <summary> All of the rules required to administrate a smokeping environment. @@ -110929,17 +93957,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="spamassassin_read_spamd_pid_files" lineno="376"> -<summary> -Read spamd pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="spamassassin_read_spamd_runtime_files" lineno="391"> +<interface name="spamassassin_read_spamd_runtime_files" lineno="376"> <summary> Read spamd runtime files. </summary> @@ -110949,7 +93967,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="spamassassin_read_spamd_tmp_files" lineno="410"> +<interface name="spamassassin_read_spamd_tmp_files" lineno="395"> <summary> Read temporary spamd files. </summary> @@ -110959,7 +93977,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="429"> +<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="414"> <summary> Do not audit attempts to get attributes of temporary spamd sockets. @@ -110970,7 +93988,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="spamassassin_stream_connect_spamd" lineno="448"> +<interface name="spamassassin_stream_connect_spamd" lineno="433"> <summary> Connect to spamd with a unix domain stream socket. @@ -110981,7 +93999,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="spamassassin_admin" lineno="474"> +<interface name="spamassassin_admin" lineno="459"> <summary> All of the rules required to administrate an spamassassin environment. @@ -111238,7 +94256,7 @@ is the prefix for sshd_t). </summary> </param> </template> -<template name="ssh_role_template" lineno="322"> +<template name="ssh_role_template" lineno="321"> <summary> Role access for ssh </summary> @@ -111264,7 +94282,7 @@ Role allowed access </summary> </param> </template> -<interface name="ssh_sigchld" lineno="487"> +<interface name="ssh_sigchld" lineno="486"> <summary> Send a SIGCHLD signal to the ssh server. </summary> @@ -111274,7 +94292,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_signal" lineno="505"> +<interface name="ssh_signal" lineno="504"> <summary> Send a generic signal to the ssh server. </summary> @@ -111284,7 +94302,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_signull" lineno="523"> +<interface name="ssh_signull" lineno="522"> <summary> Send a null signal to sshd processes. </summary> @@ -111294,7 +94312,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_read_pipes" lineno="541"> +<interface name="ssh_read_pipes" lineno="540"> <summary> Read a ssh server unnamed pipe. </summary> @@ -111304,7 +94322,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_rw_pipes" lineno="558"> +<interface name="ssh_rw_pipes" lineno="557"> <summary> Read and write a ssh server unnamed pipe. </summary> @@ -111314,7 +94332,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_rw_stream_sockets" lineno="576"> +<interface name="ssh_rw_stream_sockets" lineno="575"> <summary> Read and write ssh server unix domain stream sockets. </summary> @@ -111324,7 +94342,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_rw_tcp_sockets" lineno="594"> +<interface name="ssh_rw_tcp_sockets" lineno="593"> <summary> Read and write ssh server TCP sockets. </summary> @@ -111334,7 +94352,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="613"> +<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="612"> <summary> Do not audit attempts to read and write ssh server TCP sockets. @@ -111345,7 +94363,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="ssh_exec_sshd" lineno="631"> +<interface name="ssh_exec_sshd" lineno="630"> <summary> Execute the ssh daemon in the caller domain. </summary> @@ -111355,7 +94373,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_domtrans" lineno="650"> +<interface name="ssh_domtrans" lineno="649"> <summary> Execute the ssh daemon sshd domain. </summary> @@ -111365,7 +94383,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="ssh_client_domtrans" lineno="668"> +<interface name="ssh_client_domtrans" lineno="667"> <summary> Execute the ssh client in the ssh client domain. </summary> @@ -111375,7 +94393,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="ssh_exec" lineno="686"> +<interface name="ssh_exec" lineno="685"> <summary> Execute the ssh client in the caller domain. </summary> @@ -111385,7 +94403,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_setattr_key_files" lineno="705"> +<interface name="ssh_setattr_key_files" lineno="704"> <summary> Set the attributes of sshd key files. </summary> @@ -111395,7 +94413,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_agent_exec" lineno="724"> +<interface name="ssh_agent_exec" lineno="723"> <summary> Execute the ssh agent client in the caller domain. </summary> @@ -111405,7 +94423,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_setattr_home_dirs" lineno="743"> +<interface name="ssh_setattr_home_dirs" lineno="742"> <summary> Set the attributes of ssh home directory (~/.ssh) </summary> @@ -111415,7 +94433,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_create_home_dirs" lineno="761"> +<interface name="ssh_create_home_dirs" lineno="760"> <summary> Create ssh home directory (~/.ssh) </summary> @@ -111425,7 +94443,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_read_user_home_files" lineno="780"> +<interface name="ssh_read_user_home_files" lineno="779"> <summary> Read ssh home directory content </summary> @@ -111435,7 +94453,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_domtrans_keygen" lineno="801"> +<interface name="ssh_domtrans_keygen" lineno="800"> <summary> Execute the ssh key generator in the ssh keygen domain. </summary> @@ -111445,7 +94463,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="ssh_read_server_keys" lineno="819"> +<interface name="ssh_read_server_keys" lineno="818"> <summary> Read ssh server keys </summary> @@ -111455,7 +94473,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_dontaudit_read_server_keys" lineno="837"> +<interface name="ssh_dontaudit_read_server_keys" lineno="836"> <summary> Do not audit denials on reading ssh server keys </summary> @@ -111465,7 +94483,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="ssh_manage_home_files" lineno="855"> +<interface name="ssh_manage_home_files" lineno="854"> <summary> Manage ssh home directory content </summary> @@ -111475,7 +94493,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_delete_tmp" lineno="874"> +<interface name="ssh_delete_tmp" lineno="873"> <summary> Delete from the ssh temp files. </summary> @@ -111485,7 +94503,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ssh_dontaudit_agent_tmp" lineno="893"> +<interface name="ssh_dontaudit_agent_tmp" lineno="892"> <summary> dontaudit access to ssh agent tmp dirs </summary> @@ -111602,28 +94620,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sssd_read_pid_files" lineno="168"> -<summary> -Read sssd pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="sssd_manage_pids" lineno="184"> -<summary> -Create, read, write, and delete -sssd pid content. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="sssd_read_runtime_files" lineno="198"> +<interface name="sssd_read_runtime_files" lineno="168"> <summary> Read sssd runtime files. </summary> @@ -111633,7 +94630,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sssd_search_lib" lineno="217"> +<interface name="sssd_search_lib" lineno="187"> <summary> Search sssd lib directories. </summary> @@ -111643,7 +94640,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sssd_dontaudit_search_lib" lineno="237"> +<interface name="sssd_dontaudit_search_lib" lineno="207"> <summary> Do not audit attempts to search sssd lib directories. @@ -111654,7 +94651,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="sssd_read_lib_files" lineno="255"> +<interface name="sssd_read_lib_files" lineno="225"> <summary> Read sssd lib files. </summary> @@ -111664,7 +94661,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sssd_manage_lib_files" lineno="276"> +<interface name="sssd_manage_lib_files" lineno="246"> <summary> Create, read, write, and delete sssd lib files. @@ -111675,7 +94672,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sssd_dbus_chat" lineno="297"> +<interface name="sssd_dbus_chat" lineno="267"> <summary> Send and receive messages from sssd over dbus. @@ -111686,7 +94683,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sssd_stream_connect" lineno="318"> +<interface name="sssd_stream_connect" lineno="288"> <summary> Connect to sssd with a unix domain stream socket. @@ -111697,7 +94694,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sssd_admin" lineno="344"> +<interface name="sssd_admin" lineno="314"> <summary> All of the rules required to administrate an sssd environment. @@ -111766,6 +94763,113 @@ Role allowed access. <rolecap/> </interface> </module> +<module name="sympa" filename="policy/modules/services/sympa.if"> +<summary>Sympa mailing list manager</summary> +<desc> +Sympa is a popular mailing list manager. +https://www.sympa.org/ +</desc> +<interface name="sympa_append_inherited_var_files" lineno="17"> +<summary> +Allow appending to sympa_var_t (for error log) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sympa_read_var_files" lineno="36"> +<summary> +Allow reading sympa_var_t files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sympa_manage_var_files" lineno="55"> +<summary> +Allow managing sympa_var_t files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sympa_map_var_files" lineno="73"> +<summary> +Allow mapping sympa_var_t files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sympa_domtrans" lineno="91"> +<summary> +Transition to sympa_t when executing sympa_exec_t +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="symba_dontaudit_rw_inherited_tcp_sockets" lineno="109"> +<summary> +Dontaudit access to inherited sympa tcp sockets +</summary> +<param name="domain"> +<summary> +Domain to not audit +</summary> +</param> +</interface> +<interface name="sympa_read_conf" lineno="127"> +<summary> +Allow reading sympa config files +</summary> +<param name="domain"> +<summary> +Domain to allow +</summary> +</param> +</interface> +<interface name="sympa_manage_runtime_files" lineno="146"> +<summary> +Allow rw sympa runtime dirs and manage sympa runtime files +</summary> +<param name="domain"> +<summary> +Domain to allow +</summary> +</param> +</interface> +<interface name="sympa_manage_runtime_sock_files" lineno="165"> +<summary> +Allow rw sympa runtime dirs and manage sympa runtime sock files +</summary> +<param name="domain"> +<summary> +Domain to allow +</summary> +</param> +</interface> +<interface name="sympa_connect_runtime_sock_files" lineno="184"> +<summary> +Allow domain to connect to sympa socket +</summary> +<param name="domain"> +<summary> +Domain to allow +</summary> +</param> +</interface> +</module> <module name="sysstat" filename="policy/modules/services/sysstat.if"> <summary>Reports on various system states.</summary> <interface name="sysstat_manage_log" lineno="15"> @@ -112345,28 +95449,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="tuned_read_pid_files" lineno="51"> -<summary> -Read tuned pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="tuned_manage_pid_files" lineno="66"> -<summary> -Create, read, write, and delete -tuned pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="tuned_initrc_domtrans" lineno="81"> +<interface name="tuned_initrc_domtrans" lineno="52"> <summary> Execute tuned init scripts in the initrc domain. @@ -112377,7 +95460,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="tuned_admin" lineno="106"> +<interface name="tuned_admin" lineno="77"> <summary> All of the rules required to administrate an tuned environment. @@ -112656,17 +95739,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="uuidd_read_pid_files" lineno="129"> -<summary> -Read uuidd pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="uuidd_stream_connect_manager" lineno="144"> +<interface name="uuidd_stream_connect_manager" lineno="130"> <summary> Connect to uuidd with an unix domain stream socket. @@ -112677,7 +95750,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="uuidd_admin" lineno="170"> +<interface name="uuidd_admin" lineno="156"> <summary> All of the rules required to administrate an uuidd environment. @@ -112856,17 +95929,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="vdagent_read_pid_files" lineno="69"> -<summary> -Read vdagent pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="vdagent_stream_connect" lineno="84"> +<interface name="vdagent_stream_connect" lineno="70"> <summary> Connect to vdagent with a unix domain stream socket. @@ -112877,7 +95940,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="vdagent_admin" lineno="110"> +<interface name="vdagent_admin" lineno="96"> <summary> All of the rules required to administrate an vdagent environment. @@ -112960,28 +96023,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="vhostmd_read_pid_files" lineno="128"> -<summary> -Read vhostmd pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="vhostmd_manage_pid_files" lineno="143"> -<summary> -Create, read, write, and delete -vhostmd pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="vhostmd_stream_connect" lineno="158"> +<interface name="vhostmd_stream_connect" lineno="129"> <summary> Connect to vhostmd with a unix domain stream socket. @@ -112992,7 +96034,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="vhostmd_dontaudit_rw_stream_connect" lineno="178"> +<interface name="vhostmd_dontaudit_rw_stream_connect" lineno="149"> <summary> Do not audit attempts to read and write vhostmd unix domain stream sockets. @@ -113003,7 +96045,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="vhostmd_admin" lineno="203"> +<interface name="vhostmd_admin" lineno="174"> <summary> All of the rules required to administrate an vhostmd environment. @@ -113366,28 +96408,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="virt_read_pid_files" lineno="753"> -<summary> -Read virt pid files. (Depprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="virt_manage_pid_files" lineno="769"> -<summary> -Create, read, write, and delete -virt pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="virt_read_runtime_files" lineno="783"> +<interface name="virt_read_runtime_files" lineno="753"> <summary> Read virt runtime files. </summary> @@ -113397,7 +96418,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_runtime_filetrans" lineno="818"> +<interface name="virt_runtime_filetrans" lineno="788"> <summary> Create an object in the libvirt runtime directory, with a private type. </summary> @@ -113423,7 +96444,7 @@ The name of the object being created. </param> <infoflow type="write" weight="10"/> </interface> -<interface name="virt_search_lib" lineno="836"> +<interface name="virt_search_lib" lineno="806"> <summary> Search virt lib directories. </summary> @@ -113433,7 +96454,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_read_lib_files" lineno="855"> +<interface name="virt_read_lib_files" lineno="825"> <summary> Read virt lib files. </summary> @@ -113443,7 +96464,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_manage_lib_files" lineno="876"> +<interface name="virt_manage_lib_files" lineno="846"> <summary> Create, read, write, and delete virt lib files. @@ -113454,34 +96475,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_pid_filetrans" lineno="912"> -<summary> -Create objects in virt pid -directories with a private type. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<param name="private type"> -<summary> -The type of the object to be created. -</summary> -</param> -<param name="object"> -<summary> -The object class of the object being created. -</summary> -</param> -<param name="name" optional="true"> -<summary> -The name of the object being created. -</summary> -</param> -<infoflow type="write" weight="10"/> -</interface> -<interface name="virt_read_log" lineno="928"> +<interface name="virt_read_log" lineno="866"> <summary> Read virt log files. </summary> @@ -113492,7 +96486,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="virt_append_log" lineno="947"> +<interface name="virt_append_log" lineno="885"> <summary> Append virt log files. </summary> @@ -113502,7 +96496,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_manage_log" lineno="967"> +<interface name="virt_manage_log" lineno="905"> <summary> Create, read, write, and delete virt log files. @@ -113513,7 +96507,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_search_images" lineno="988"> +<interface name="virt_search_images" lineno="926"> <summary> Search virt image directories. </summary> @@ -113523,7 +96517,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_read_images" lineno="1007"> +<interface name="virt_read_images" lineno="945"> <summary> Read virt image files. </summary> @@ -113533,7 +96527,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_rw_all_image_chr_files" lineno="1043"> +<interface name="virt_rw_all_image_chr_files" lineno="981"> <summary> Read and write all virt image character files. @@ -113544,7 +96538,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_manage_virt_cache" lineno="1064"> +<interface name="virt_manage_virt_cache" lineno="1002"> <summary> Create, read, write, and delete virt cache content. @@ -113555,7 +96549,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_manage_images" lineno="1086"> +<interface name="virt_manage_images" lineno="1024"> <summary> Create, read, write, and delete virt image files. @@ -113566,7 +96560,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_lxc_use_fds" lineno="1122"> +<interface name="virt_lxc_use_fds" lineno="1060"> <summary> Inherit and use virtd lxc file descriptors. @@ -113577,7 +96571,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_lxc_sigchld" lineno="1140"> +<interface name="virt_lxc_sigchld" lineno="1078"> <summary> Send a SIGCHLD to virtd lxc. </summary> @@ -113587,7 +96581,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_lxc_rw_pipes" lineno="1158"> +<interface name="virt_lxc_rw_pipes" lineno="1096"> <summary> Read and write virtd lxc unamed pipes. </summary> @@ -113597,7 +96591,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_lxc_stream_connect" lineno="1177"> +<interface name="virt_lxc_stream_connect" lineno="1115"> <summary> Connect to virtd lxc over a unix stream socket. @@ -113608,7 +96602,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_lxc_list_runtime" lineno="1197"> +<interface name="virt_lxc_list_runtime" lineno="1135"> <summary> List the contents of virtd lxc directories. @@ -113619,7 +96613,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_lxc_read_runtime" lineno="1215"> +<interface name="virt_lxc_read_runtime" lineno="1153"> <summary> Read virtd lxc runtime files. </summary> @@ -113629,7 +96623,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_virsh_use_fds" lineno="1234"> +<interface name="virt_virsh_use_fds" lineno="1172"> <summary> Inherit and use virsh file descriptors. @@ -113640,7 +96634,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_virsh_sigchld" lineno="1252"> +<interface name="virt_virsh_sigchld" lineno="1190"> <summary> Send a SIGCHLD to virsh. </summary> @@ -113650,7 +96644,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_virsh_rw_pipes" lineno="1270"> +<interface name="virt_virsh_rw_pipes" lineno="1208"> <summary> Read and write virsh unamed pipes. </summary> @@ -113660,7 +96654,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="virt_admin" lineno="1295"> +<interface name="virt_admin" lineno="1233"> <summary> All of the rules required to administrate an virt environment. @@ -114399,17 +97393,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_read_xdm_pid" lineno="1007"> -<summary> -Read XDM pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="xserver_read_xdm_runtime_files" lineno="1022"> +<interface name="xserver_read_xdm_runtime_files" lineno="1007"> <summary> Read XDM runtime files. </summary> @@ -114419,7 +97403,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_read_xdm_lib_files" lineno="1041"> +<interface name="xserver_read_xdm_lib_files" lineno="1026"> <summary> Read XDM var lib files. </summary> @@ -114429,7 +97413,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_xsession_entry_type" lineno="1059"> +<interface name="xserver_xsession_entry_type" lineno="1044"> <summary> Make an X session script an entrypoint for the specified domain. </summary> @@ -114439,7 +97423,7 @@ The domain for which the shell is an entrypoint. </summary> </param> </interface> -<interface name="xserver_xsession_spec_domtrans" lineno="1096"> +<interface name="xserver_xsession_spec_domtrans" lineno="1081"> <summary> Execute an X session in the target domain. This is an explicit transition, requiring the @@ -114468,7 +97452,7 @@ The type of the shell process. </summary> </param> </interface> -<interface name="xserver_write_inherited_xsession_log" lineno="1115"> +<interface name="xserver_write_inherited_xsession_log" lineno="1100"> <summary> Write to inherited xsession log files such as .xsession-errors. @@ -114479,7 +97463,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_rw_xsession_log" lineno="1135"> +<interface name="xserver_rw_xsession_log" lineno="1120"> <summary> Read and write xsession log files such as .xsession-errors. @@ -114490,7 +97474,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_manage_xsession_log" lineno="1154"> +<interface name="xserver_manage_xsession_log" lineno="1139"> <summary> Manage xsession log files such as .xsession-errors. @@ -114501,7 +97485,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_write_inherited_log" lineno="1173"> +<interface name="xserver_write_inherited_log" lineno="1158"> <summary> Write to inherited X server log files like /var/log/lightdm/lightdm.log @@ -114512,7 +97496,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_getattr_log" lineno="1191"> +<interface name="xserver_getattr_log" lineno="1176"> <summary> Get the attributes of X server logs. </summary> @@ -114522,7 +97506,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_dontaudit_write_log" lineno="1211"> +<interface name="xserver_dontaudit_write_log" lineno="1196"> <summary> Do not audit attempts to write the X server log files. @@ -114533,7 +97517,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="xserver_delete_log" lineno="1229"> +<interface name="xserver_delete_log" lineno="1214"> <summary> Delete X server log files. </summary> @@ -114543,7 +97527,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_read_xkb_libs" lineno="1250"> +<interface name="xserver_read_xkb_libs" lineno="1235"> <summary> Read X keyboard extension libraries. </summary> @@ -114553,7 +97537,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_create_xdm_tmp_dirs" lineno="1271"> +<interface name="xserver_create_xdm_tmp_dirs" lineno="1256"> <summary> Create xdm temporary directories. </summary> @@ -114563,7 +97547,7 @@ Domain to allow access. </summary> </param> </interface> -<interface name="xserver_read_xdm_tmp_files" lineno="1289"> +<interface name="xserver_read_xdm_tmp_files" lineno="1274"> <summary> Read xdm temporary files. </summary> @@ -114573,7 +97557,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1308"> +<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1293"> <summary> Do not audit attempts to read xdm temporary files. </summary> @@ -114583,7 +97567,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="xserver_rw_xdm_tmp_files" lineno="1327"> +<interface name="xserver_rw_xdm_tmp_files" lineno="1312"> <summary> Read write xdm temporary files. </summary> @@ -114593,7 +97577,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_manage_xdm_tmp_files" lineno="1346"> +<interface name="xserver_manage_xdm_tmp_files" lineno="1331"> <summary> Create, read, write, and delete xdm temporary files. </summary> @@ -114603,7 +97587,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1365"> +<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1350"> <summary> Do not audit attempts to get the attributes of xdm temporary named sockets. @@ -114614,7 +97598,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="xserver_list_xdm_tmp" lineno="1383"> +<interface name="xserver_list_xdm_tmp" lineno="1368"> <summary> list xdm_tmp_t directories </summary> @@ -114624,7 +97608,7 @@ Domain to allow </summary> </param> </interface> -<interface name="xserver_domtrans" lineno="1401"> +<interface name="xserver_domtrans" lineno="1386"> <summary> Execute the X server in the X server domain. </summary> @@ -114634,7 +97618,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="xserver_signal" lineno="1420"> +<interface name="xserver_signal" lineno="1405"> <summary> Signal X servers </summary> @@ -114644,7 +97628,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_kill" lineno="1438"> +<interface name="xserver_kill" lineno="1423"> <summary> Kill X servers </summary> @@ -114654,7 +97638,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_read_state" lineno="1456"> +<interface name="xserver_read_state" lineno="1441"> <summary> Allow reading xserver_t files to get cgroup and sessionid </summary> @@ -114664,7 +97648,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_rw_shm" lineno="1476"> +<interface name="xserver_rw_shm" lineno="1461"> <summary> Read and write X server Sys V Shared memory segments. @@ -114675,7 +97659,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1495"> +<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1480"> <summary> Do not audit attempts to read and write to X server sockets. @@ -114686,7 +97670,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1514"> +<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1499"> <summary> Do not audit attempts to read and write X server unix domain stream sockets. @@ -114697,7 +97681,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="xserver_stream_connect" lineno="1533"> +<interface name="xserver_stream_connect" lineno="1518"> <summary> Connect to the X server over a unix domain stream socket. @@ -114708,7 +97692,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_read_tmp_files" lineno="1552"> +<interface name="xserver_read_tmp_files" lineno="1537"> <summary> Read X server temporary files. </summary> @@ -114718,7 +97702,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_dbus_chat" lineno="1571"> +<interface name="xserver_dbus_chat" lineno="1556"> <summary> talk to xserver_t by dbus </summary> @@ -114728,7 +97712,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_manage_core_devices" lineno="1593"> +<interface name="xserver_manage_core_devices" lineno="1578"> <summary> Interface to provide X object permissions on a given X server to an X client domain. Gives the domain permission to read the @@ -114740,7 +97724,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_unconfined" lineno="1616"> +<interface name="xserver_unconfined" lineno="1601"> <summary> Interface to provide X object permissions on a given X server to an X client domain. Gives the domain complete control over the @@ -114752,7 +97736,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_rw_xdm_keys" lineno="1636"> +<interface name="xserver_rw_xdm_keys" lineno="1621"> <summary> Manage keys for xdm. </summary> @@ -114762,7 +97746,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_link_xdm_keys" lineno="1654"> +<interface name="xserver_link_xdm_keys" lineno="1639"> <summary> Manage keys for xdm. </summary> @@ -114772,7 +97756,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_rw_mesa_shader_cache" lineno="1672"> +<interface name="xserver_rw_mesa_shader_cache" lineno="1657"> <summary> Read and write the mesa shader cache. </summary> @@ -114782,7 +97766,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xserver_manage_mesa_shader_cache" lineno="1693"> +<interface name="xserver_manage_mesa_shader_cache" lineno="1678"> <summary> Manage the mesa shader cache. </summary> @@ -114873,17 +97857,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="zabbix_read_pid_files" lineno="91"> -<summary> -Read zabbix pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="zabbix_agent_tcp_connect" lineno="105"> +<interface name="zabbix_agent_tcp_connect" lineno="91"> <summary> Connect to zabbix agent on the TCP network. </summary> @@ -114893,7 +97867,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="zabbix_admin" lineno="132"> +<interface name="zabbix_admin" lineno="118"> <summary> All of the rules required to administrate an zabbix environment. @@ -115040,6 +98014,94 @@ manage its configuration files. </desc> </tunable> </module> +<module name="zfs" filename="policy/modules/services/zfs.if"> +<summary>Tools for the Zettabyte File System.</summary> +<interface name="zfs_domtrans" lineno="14"> +<summary> +Execute ZFS tools in the +ZFS domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="zfs_exec" lineno="33"> +<summary> +Execute ZFS tools in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="zfs_run" lineno="59"> +<summary> +Execute ZFS tools in the ZFS domain, and +allow the specified role the ZFS domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="zfs_search_config" lineno="78"> +<summary> +Search ZFS config directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="zfs_read_config" lineno="97"> +<summary> +Read ZFS config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="zfs_rw_zpool_cache" lineno="117"> +<summary> +Read and write zpool cache files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="zfs_admin" lineno="143"> +<summary> +All of the rules required to +administrate a ZFS environment. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> <module name="zosremote" filename="policy/modules/services/zosremote.if"> <summary>z/OS Remote-services Audit dispatcher plugin.</summary> <interface name="zosremote_domtrans" lineno="13"> @@ -115763,70 +98825,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_read_pam_pid" lineno="1136"> -<summary> -Read PAM PID files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="auth_dontaudit_read_pam_pid" lineno="1151"> -<summary> -Do not audit attempts to read PAM PID files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain to not audit. -</summary> -</param> -</interface> -<interface name="auth_pid_filetrans_pam_var_run" lineno="1179"> -<summary> -Create specified objects in -pid directories with the pam var -run file type using a -file type transition. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<param name="object_class"> -<summary> -Class of the object being created. -</summary> -</param> -<param name="name" optional="true"> -<summary> -The name of the object being created. -</summary> -</param> -</interface> -<interface name="auth_delete_pam_pid" lineno="1194"> -<summary> -Delete pam PID files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="auth_manage_pam_pid" lineno="1209"> -<summary> -Manage pam PID files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="auth_manage_pam_runtime_dirs" lineno="1225"> +<interface name="auth_manage_pam_runtime_dirs" lineno="1136"> <summary> Manage pam runtime dirs. </summary> @@ -115836,7 +98835,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_runtime_filetrans_pam_runtime" lineno="1256"> +<interface name="auth_runtime_filetrans_pam_runtime" lineno="1167"> <summary> Create specified objects in pid directories with the pam runtime @@ -115858,7 +98857,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="auth_read_pam_runtime_files" lineno="1274"> +<interface name="auth_read_pam_runtime_files" lineno="1185"> <summary> Read PAM runtime files. </summary> @@ -115868,7 +98867,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_dontaudit_read_pam_runtime_files" lineno="1294"> +<interface name="auth_dontaudit_read_pam_runtime_files" lineno="1205"> <summary> Do not audit attempts to read PAM runtime files. </summary> @@ -115878,7 +98877,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="auth_delete_pam_runtime_files" lineno="1312"> +<interface name="auth_delete_pam_runtime_files" lineno="1223"> <summary> Delete pam runtime files. </summary> @@ -115888,7 +98887,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_manage_pam_runtime_files" lineno="1331"> +<interface name="auth_manage_pam_runtime_files" lineno="1242"> <summary> Create, read, write, and delete pam runtime files. </summary> @@ -115898,7 +98897,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_domtrans_pam_console" lineno="1350"> +<interface name="auth_domtrans_pam_console" lineno="1261"> <summary> Execute pam_console with a domain transition. </summary> @@ -115908,7 +98907,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="auth_search_pam_console_data" lineno="1369"> +<interface name="auth_search_pam_console_data" lineno="1280"> <summary> Search the contents of the pam_console data directory. @@ -115919,7 +98918,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_list_pam_console_data" lineno="1389"> +<interface name="auth_list_pam_console_data" lineno="1300"> <summary> List the contents of the pam_console data directory. @@ -115930,7 +98929,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_create_pam_console_data_dirs" lineno="1408"> +<interface name="auth_create_pam_console_data_dirs" lineno="1319"> <summary> Create pam var console pid directories. </summary> @@ -115940,7 +98939,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_relabel_pam_console_data_dirs" lineno="1427"> +<interface name="auth_relabel_pam_console_data_dirs" lineno="1338"> <summary> Relabel pam_console data directories. </summary> @@ -115950,7 +98949,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_read_pam_console_data" lineno="1445"> +<interface name="auth_read_pam_console_data" lineno="1356"> <summary> Read pam_console data files. </summary> @@ -115960,7 +98959,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_manage_pam_console_data" lineno="1466"> +<interface name="auth_manage_pam_console_data" lineno="1377"> <summary> Create, read, write, and delete pam_console data files. @@ -115971,7 +98970,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_delete_pam_console_data" lineno="1486"> +<interface name="auth_delete_pam_console_data" lineno="1397"> <summary> Delete pam_console data. </summary> @@ -115981,30 +98980,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_pid_filetrans_pam_var_console" lineno="1519"> -<summary> -Create specified objects in -pid directories with the pam var -console pid file type using a -file type transition. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<param name="object_class"> -<summary> -Class of the object being created. -</summary> -</param> -<param name="name" optional="true"> -<summary> -The name of the object being created. -</summary> -</param> -</interface> -<interface name="auth_runtime_filetrans_pam_var_console" lineno="1547"> +<interface name="auth_runtime_filetrans_pam_var_console" lineno="1430"> <summary> Create specified objects in generic runtime directories with the pam var @@ -116027,7 +99003,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="auth_domtrans_utempter" lineno="1565"> +<interface name="auth_domtrans_utempter" lineno="1448"> <summary> Execute utempter programs in the utempter domain. </summary> @@ -116037,7 +99013,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="auth_run_utempter" lineno="1588"> +<interface name="auth_run_utempter" lineno="1471"> <summary> Execute utempter programs in the utempter domain. </summary> @@ -116052,7 +99028,7 @@ The role to allow the utempter domain. </summary> </param> </interface> -<interface name="auth_dontaudit_exec_utempter" lineno="1607"> +<interface name="auth_dontaudit_exec_utempter" lineno="1490"> <summary> Do not audit attempts to execute utempter executable. </summary> @@ -116062,7 +99038,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="auth_setattr_login_records" lineno="1625"> +<interface name="auth_setattr_login_records" lineno="1508"> <summary> Set the attributes of login record files. </summary> @@ -116072,7 +99048,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_read_login_records" lineno="1645"> +<interface name="auth_read_login_records" lineno="1528"> <summary> Read login records files (/var/log/wtmp). </summary> @@ -116083,7 +99059,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="auth_dontaudit_read_login_records" lineno="1666"> +<interface name="auth_dontaudit_read_login_records" lineno="1549"> <summary> Do not audit attempts to read login records files (/var/log/wtmp). @@ -116095,7 +99071,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="auth_dontaudit_write_login_records" lineno="1685"> +<interface name="auth_dontaudit_write_login_records" lineno="1568"> <summary> Do not audit attempts to write to login records files. @@ -116106,7 +99082,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="auth_append_login_records" lineno="1703"> +<interface name="auth_append_login_records" lineno="1586"> <summary> Append to login records (wtmp). </summary> @@ -116116,7 +99092,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_write_login_records" lineno="1722"> +<interface name="auth_write_login_records" lineno="1605"> <summary> Write to login records (wtmp). </summary> @@ -116126,7 +99102,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_rw_login_records" lineno="1740"> +<interface name="auth_rw_login_records" lineno="1623"> <summary> Read and write login records. </summary> @@ -116136,7 +99112,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_log_filetrans_login_records" lineno="1760"> +<interface name="auth_log_filetrans_login_records" lineno="1643"> <summary> Create a login records in the log directory using a type transition. @@ -116147,7 +99123,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_manage_login_records" lineno="1779"> +<interface name="auth_manage_login_records" lineno="1662"> <summary> Create, read, write, and delete login records files. @@ -116158,7 +99134,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_relabel_login_records" lineno="1798"> +<interface name="auth_relabel_login_records" lineno="1681"> <summary> Relabel login record files. </summary> @@ -116168,7 +99144,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="auth_use_nsswitch" lineno="1826"> +<interface name="auth_use_nsswitch" lineno="1709"> <summary> Use nsswitch to look up user, password, group, or host information. @@ -116188,7 +99164,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="auth_unconfined" lineno="1854"> +<interface name="auth_unconfined" lineno="1737"> <summary> Unconfined access to the authlogin module. </summary> @@ -117016,28 +99992,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_daemon_pid_file" lineno="662"> -<summary> -Mark the file type as a daemon pid file, allowing initrc_t -to create it (Deprecated) -</summary> -<param name="filetype"> -<summary> -Type to mark as a daemon pid file -</summary> -</param> -<param name="class"> -<summary> -Class on which the type is applied -</summary> -</param> -<param name="filename"> -<summary> -Filename of the file that the init script creates -</summary> -</param> -</interface> -<interface name="init_daemon_runtime_file" lineno="689"> +<interface name="init_daemon_runtime_file" lineno="662"> <summary> Mark the file type as a daemon runtime file, allowing initrc_t to create it @@ -117058,7 +100013,7 @@ Filename of the file that the init script creates </summary> </param> </interface> -<interface name="init_daemon_lock_file" lineno="722"> +<interface name="init_daemon_lock_file" lineno="695"> <summary> Mark the file type as a daemon lock file, allowing initrc_t to create it @@ -117079,7 +100034,7 @@ Filename of the file that the init script creates </summary> </param> </interface> -<interface name="init_domtrans" lineno="744"> +<interface name="init_domtrans" lineno="717"> <summary> Execute init (/sbin/init) with a domain transition. </summary> @@ -117089,7 +100044,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_pgm_spec_user_daemon_domain" lineno="768"> +<interface name="init_pgm_spec_user_daemon_domain" lineno="741"> <summary> Execute init (/sbin/init) with a domain transition to the provided domain. @@ -117105,7 +100060,7 @@ The type to be used as a systemd --user domain. </summary> </param> </interface> -<interface name="init_exec" lineno="796"> +<interface name="init_exec" lineno="769"> <summary> Execute the init program in the caller domain. </summary> @@ -117116,7 +100071,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_pgm_entrypoint" lineno="817"> +<interface name="init_pgm_entrypoint" lineno="790"> <summary> Allow the init program to be an entrypoint for the specified domain. @@ -117128,7 +100083,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_exec_rc" lineno="846"> +<interface name="init_exec_rc" lineno="819"> <summary> Execute the rc application in the caller domain. </summary> @@ -117149,7 +100104,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_getpgid" lineno="865"> +<interface name="init_getpgid" lineno="838"> <summary> Get the process group of init. </summary> @@ -117159,7 +100114,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_signal" lineno="883"> +<interface name="init_signal" lineno="856"> <summary> Send init a generic signal. </summary> @@ -117169,7 +100124,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_signull" lineno="901"> +<interface name="init_signull" lineno="874"> <summary> Send init a null signal. </summary> @@ -117179,7 +100134,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_sigchld" lineno="919"> +<interface name="init_sigchld" lineno="892"> <summary> Send init a SIGCHLD signal. </summary> @@ -117189,7 +100144,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_setsched" lineno="937"> +<interface name="init_setsched" lineno="910"> <summary> Set the nice level of init. </summary> @@ -117199,7 +100154,39 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stream_connect" lineno="955"> +<interface name="init_write_mountpoint_files" lineno="934"> +<summary> +Write systemd mountpoint files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +</interface> +<interface name="init_create_mountpoint_files" lineno="958"> +<summary> +Create systemd mountpoint files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +</interface> +<interface name="init_stream_connect" lineno="976"> <summary> Connect to init with a unix socket. </summary> @@ -117209,7 +100196,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_unix_stream_socket_connectto" lineno="976"> +<interface name="init_unix_stream_socket_connectto" lineno="997"> <summary> Connect to init with a unix socket. Without any additional permissions. @@ -117220,7 +100207,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_use_fds" lineno="1034"> +<interface name="init_use_fds" lineno="1055"> <summary> Inherit and use file descriptors from init. </summary> @@ -117270,7 +100257,7 @@ Domain allowed access. </param> <infoflow type="read" weight="1"/> </interface> -<interface name="init_dontaudit_use_fds" lineno="1053"> +<interface name="init_dontaudit_use_fds" lineno="1074"> <summary> Do not audit attempts to inherit file descriptors from init. @@ -117281,7 +100268,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_dgram_send" lineno="1072"> +<interface name="init_dgram_send" lineno="1093"> <summary> Send messages to init unix datagram sockets. </summary> @@ -117292,7 +100279,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_rw_inherited_stream_socket" lineno="1092"> +<interface name="init_rw_inherited_stream_socket" lineno="1113"> <summary> Read and write to inherited init unix streams. </summary> @@ -117302,7 +100289,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rw_stream_sockets" lineno="1111"> +<interface name="init_rw_stream_sockets" lineno="1132"> <summary> Allow the specified domain to read/write to init with unix domain stream sockets. @@ -117313,7 +100300,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_search_keys" lineno="1129"> +<interface name="init_dontaudit_search_keys" lineno="1150"> <summary> Do not audit attempts to search init keys. </summary> @@ -117323,7 +100310,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_start_system" lineno="1147"> +<interface name="init_start_system" lineno="1168"> <summary> start service (systemd). </summary> @@ -117333,7 +100320,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stop_system" lineno="1165"> +<interface name="init_stop_system" lineno="1186"> <summary> stop service (systemd). </summary> @@ -117343,7 +100330,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_get_system_status" lineno="1183"> +<interface name="init_get_system_status" lineno="1204"> <summary> Get all service status (systemd). </summary> @@ -117353,7 +100340,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_enable" lineno="1201"> +<interface name="init_enable" lineno="1222"> <summary> Enable all systemd services (systemd). </summary> @@ -117363,7 +100350,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_disable" lineno="1219"> +<interface name="init_disable" lineno="1240"> <summary> Disable all services (systemd). </summary> @@ -117373,7 +100360,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_reload" lineno="1237"> +<interface name="init_reload" lineno="1258"> <summary> Reload all services (systemd). </summary> @@ -117383,7 +100370,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_reboot_system" lineno="1255"> +<interface name="init_reboot_system" lineno="1276"> <summary> Reboot the system (systemd). </summary> @@ -117393,7 +100380,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_shutdown_system" lineno="1273"> +<interface name="init_shutdown_system" lineno="1294"> <summary> Shutdown (halt) the system (systemd). </summary> @@ -117403,7 +100390,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_service_status" lineno="1291"> +<interface name="init_service_status" lineno="1312"> <summary> Allow specified domain to get init status </summary> @@ -117413,7 +100400,7 @@ Domain to allow access. </summary> </param> </interface> -<interface name="init_service_start" lineno="1310"> +<interface name="init_service_start" lineno="1331"> <summary> Allow specified domain to get init start </summary> @@ -117423,7 +100410,7 @@ Domain to allow access. </summary> </param> </interface> -<interface name="init_dbus_chat" lineno="1330"> +<interface name="init_dbus_chat" lineno="1351"> <summary> Send and receive messages from systemd over dbus. @@ -117434,7 +100421,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_run_bpf" lineno="1350"> +<interface name="init_run_bpf" lineno="1371"> <summary> Run init BPF programs. </summary> @@ -117444,7 +100431,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_var_lib_links" lineno="1369"> +<interface name="init_read_var_lib_links" lineno="1390"> <summary> read/follow symlinks under /var/lib/systemd/ </summary> @@ -117454,7 +100441,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_search_var_lib_dirs" lineno="1388"> +<interface name="init_search_var_lib_dirs" lineno="1409"> <summary> Search /var/lib/systemd/ dirs </summary> @@ -117464,7 +100451,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_list_var_lib_dirs" lineno="1407"> +<interface name="init_list_var_lib_dirs" lineno="1428"> <summary> List /var/lib/systemd/ dir </summary> @@ -117474,7 +100461,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_relabel_var_lib_dirs" lineno="1425"> +<interface name="init_relabel_var_lib_dirs" lineno="1446"> <summary> Relabel dirs in /var/lib/systemd/. </summary> @@ -117484,7 +100471,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_var_lib_files" lineno="1443"> +<interface name="init_manage_var_lib_files" lineno="1464"> <summary> Manage files in /var/lib/systemd/. </summary> @@ -117494,7 +100481,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_var_lib_filetrans" lineno="1478"> +<interface name="init_var_lib_filetrans" lineno="1499"> <summary> Create files in /var/lib/systemd with an automatic type transition. @@ -117520,93 +100507,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="init_search_pids" lineno="1497"> -<summary> -Allow search directory in the /run/systemd directory. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="init_list_pids" lineno="1512"> -<summary> -Allow listing of the /run/systemd directory. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="init_manage_pid_symlinks" lineno="1527"> -<summary> -Create symbolic links in the /run/systemd directory. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="init_create_pid_files" lineno="1542"> -<summary> -Create files in the /run/systemd directory. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="init_write_pid_files" lineno="1557"> -<summary> -Write files in the /run/systemd directory. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="init_manage_pid_dirs" lineno="1573"> -<summary> -Create, read, write, and delete -directories in the /run/systemd directory. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="init_pid_filetrans" lineno="1603"> -<summary> -Create files in an init PID directory. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<param name="file_type"> -<summary> -The type of the object to be created -</summary> -</param> -<param name="object_class"> -<summary> -The object class. -</summary> -</param> -<param name="name" optional="true"> -<summary> -The name of the object being created. -</summary> -</param> -</interface> -<interface name="init_search_runtime" lineno="1618"> +<interface name="init_search_runtime" lineno="1518"> <summary> Search init runtime directories, e.g. /run/systemd. </summary> @@ -117616,7 +100517,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_list_runtime" lineno="1636"> +<interface name="init_list_runtime" lineno="1536"> <summary> List init runtime directories, e.g. /run/systemd. </summary> @@ -117626,7 +100527,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_runtime_dirs" lineno="1656"> +<interface name="init_manage_runtime_dirs" lineno="1556"> <summary> Create, read, write, and delete directories in the /run/systemd directory. @@ -117637,7 +100538,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_runtime_filetrans" lineno="1689"> +<interface name="init_runtime_filetrans" lineno="1589"> <summary> Create files in an init runtime directory with a private type. </summary> @@ -117662,7 +100563,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="init_write_runtime_files" lineno="1708"> +<interface name="init_write_runtime_files" lineno="1608"> <summary> Write init runtime files, e.g. in /run/systemd. </summary> @@ -117672,7 +100573,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_create_runtime_files" lineno="1726"> +<interface name="init_create_runtime_files" lineno="1626"> <summary> Create init runtime files, e.g. in /run/systemd. </summary> @@ -117682,7 +100583,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_runtime_symlinks" lineno="1744"> +<interface name="init_manage_runtime_symlinks" lineno="1644"> <summary> Create init runtime symbolic links, e.g. in /run/systemd. </summary> @@ -117692,7 +100593,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_getattr_initctl" lineno="1762"> +<interface name="init_getattr_initctl" lineno="1662"> <summary> Get the attributes of initctl. </summary> @@ -117702,7 +100603,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_getattr_initctl" lineno="1783"> +<interface name="init_dontaudit_getattr_initctl" lineno="1683"> <summary> Do not audit attempts to get the attributes of initctl. @@ -117713,7 +100614,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_write_initctl" lineno="1801"> +<interface name="init_write_initctl" lineno="1701"> <summary> Write to initctl. </summary> @@ -117723,7 +100624,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_telinit" lineno="1822"> +<interface name="init_telinit" lineno="1722"> <summary> Use telinit (Read and write initctl). </summary> @@ -117734,7 +100635,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_rw_initctl" lineno="1855"> +<interface name="init_rw_initctl" lineno="1755"> <summary> Read and write initctl. </summary> @@ -117744,7 +100645,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_rw_initctl" lineno="1876"> +<interface name="init_dontaudit_rw_initctl" lineno="1776"> <summary> Do not audit attempts to read and write initctl. @@ -117755,7 +100656,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_script_file_entry_type" lineno="1895"> +<interface name="init_script_file_entry_type" lineno="1795"> <summary> Make init scripts an entry point for the specified domain. @@ -117766,7 +100667,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_spec_domtrans_script" lineno="1918"> +<interface name="init_spec_domtrans_script" lineno="1818"> <summary> Execute init scripts with a specified domain transition. </summary> @@ -117776,7 +100677,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_domtrans_script" lineno="1945"> +<interface name="init_domtrans_script" lineno="1845"> <summary> Execute init scripts with an automatic domain transition. </summary> @@ -117786,7 +100687,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_domtrans_labeled_script" lineno="1980"> +<interface name="init_domtrans_labeled_script" lineno="1880"> <summary> Execute labelled init scripts with an automatic domain transition. </summary> @@ -117796,7 +100697,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_script_file_domtrans" lineno="2026"> +<interface name="init_script_file_domtrans" lineno="1926"> <summary> Execute a init script in a specified domain. </summary> @@ -117821,7 +100722,7 @@ Domain to transition to. </summary> </param> </interface> -<interface name="init_kill_scripts" lineno="2045"> +<interface name="init_kill_scripts" lineno="1945"> <summary> Send a kill signal to init scripts. </summary> @@ -117831,7 +100732,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_script_service" lineno="2063"> +<interface name="init_manage_script_service" lineno="1963"> <summary> Allow manage service for initrc_exec_t scripts </summary> @@ -117841,7 +100742,7 @@ Target domain </summary> </param> </interface> -<interface name="init_labeled_script_domtrans" lineno="2088"> +<interface name="init_labeled_script_domtrans" lineno="1988"> <summary> Transition to the init script domain on a specified labeled init script. @@ -117857,7 +100758,7 @@ Labeled init script file. </summary> </param> </interface> -<interface name="init_all_labeled_script_domtrans" lineno="2110"> +<interface name="init_all_labeled_script_domtrans" lineno="2010"> <summary> Transition to the init script domain for all labeled init script types @@ -117868,7 +100769,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="init_get_script_status" lineno="2128"> +<interface name="init_get_script_status" lineno="2028"> <summary> Allow getting service status of initrc_exec_t scripts </summary> @@ -117878,7 +100779,7 @@ Target domain </summary> </param> </interface> -<interface name="init_startstop_service" lineno="2168"> +<interface name="init_startstop_service" lineno="2068"> <summary> Allow the role to start and stop labeled services. @@ -117909,7 +100810,7 @@ Systemd unit file type. </summary> </param> </interface> -<interface name="init_run_daemon" lineno="2224"> +<interface name="init_run_daemon" lineno="2124"> <summary> Start and stop daemon programs directly. </summary> @@ -117931,7 +100832,7 @@ The role to be performing this action. </summary> </param> </interface> -<interface name="init_startstop_all_script_services" lineno="2246"> +<interface name="init_startstop_all_script_services" lineno="2146"> <summary> Start and stop init_script_file_type services </summary> @@ -117941,7 +100842,7 @@ domain that can start and stop the services </summary> </param> </interface> -<interface name="init_read_state" lineno="2265"> +<interface name="init_read_state" lineno="2165"> <summary> Read the process state (/proc/pid) of init. </summary> @@ -117951,7 +100852,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_read_state" lineno="2285"> +<interface name="init_dontaudit_read_state" lineno="2185"> <summary> Dontaudit read the process state (/proc/pid) of init. </summary> @@ -117961,7 +100862,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_ptrace" lineno="2306"> +<interface name="init_ptrace" lineno="2206"> <summary> Ptrace init </summary> @@ -117972,7 +100873,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_getattr" lineno="2325"> +<interface name="init_getattr" lineno="2225"> <summary> get init process stats </summary> @@ -117983,7 +100884,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="init_read_script_pipes" lineno="2343"> +<interface name="init_read_script_pipes" lineno="2243"> <summary> Read an init script unnamed pipe. </summary> @@ -117993,7 +100894,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_write_script_pipes" lineno="2361"> +<interface name="init_write_script_pipes" lineno="2261"> <summary> Write an init script unnamed pipe. </summary> @@ -118003,7 +100904,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_getattr_script_files" lineno="2379"> +<interface name="init_getattr_script_files" lineno="2279"> <summary> Get the attribute of init script entrypoint files. </summary> @@ -118013,7 +100914,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_script_files" lineno="2398"> +<interface name="init_read_script_files" lineno="2298"> <summary> Read init scripts. </summary> @@ -118023,7 +100924,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_exec_script_files" lineno="2417"> +<interface name="init_exec_script_files" lineno="2317"> <summary> Execute init scripts in the caller domain. </summary> @@ -118033,7 +100934,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_getattr_all_script_files" lineno="2436"> +<interface name="init_getattr_all_script_files" lineno="2336"> <summary> Get the attribute of all init script entrypoint files. </summary> @@ -118043,7 +100944,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_all_script_files" lineno="2455"> +<interface name="init_read_all_script_files" lineno="2355"> <summary> Read all init script files. </summary> @@ -118053,7 +100954,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_read_all_script_files" lineno="2479"> +<interface name="init_dontaudit_read_all_script_files" lineno="2379"> <summary> Dontaudit read all init script files. </summary> @@ -118063,7 +100964,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_exec_all_script_files" lineno="2497"> +<interface name="init_exec_all_script_files" lineno="2397"> <summary> Execute all init scripts in the caller domain. </summary> @@ -118073,7 +100974,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_script_state" lineno="2516"> +<interface name="init_read_script_state" lineno="2416"> <summary> Read the process state (/proc/pid) of the init scripts. </summary> @@ -118083,7 +100984,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_use_script_fds" lineno="2535"> +<interface name="init_use_script_fds" lineno="2435"> <summary> Inherit and use init script file descriptors. </summary> @@ -118093,7 +100994,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_use_script_fds" lineno="2554"> +<interface name="init_dontaudit_use_script_fds" lineno="2454"> <summary> Do not audit attempts to inherit init script file descriptors. @@ -118104,7 +101005,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_search_script_keys" lineno="2572"> +<interface name="init_search_script_keys" lineno="2472"> <summary> Search init script keys. </summary> @@ -118114,7 +101015,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_getpgid_script" lineno="2590"> +<interface name="init_getpgid_script" lineno="2490"> <summary> Get the process group ID of init scripts. </summary> @@ -118124,7 +101025,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_sigchld_script" lineno="2608"> +<interface name="init_sigchld_script" lineno="2508"> <summary> Send SIGCHLD signals to init scripts. </summary> @@ -118134,7 +101035,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_signal_script" lineno="2626"> +<interface name="init_signal_script" lineno="2526"> <summary> Send generic signals to init scripts. </summary> @@ -118144,7 +101045,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_signull_script" lineno="2644"> +<interface name="init_signull_script" lineno="2544"> <summary> Send null signals to init scripts. </summary> @@ -118154,7 +101055,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rw_script_pipes" lineno="2662"> +<interface name="init_rw_script_pipes" lineno="2562"> <summary> Read and write init script unnamed pipes. </summary> @@ -118164,7 +101065,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stream_connect_script" lineno="2681"> +<interface name="init_stream_connect_script" lineno="2581"> <summary> Allow the specified domain to connect to init scripts with a unix socket. @@ -118175,7 +101076,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rw_script_stream_sockets" lineno="2700"> +<interface name="init_rw_script_stream_sockets" lineno="2600"> <summary> Allow the specified domain to read/write to init scripts with a unix domain stream sockets. @@ -118186,7 +101087,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_stream_connect_script" lineno="2719"> +<interface name="init_dontaudit_stream_connect_script" lineno="2619"> <summary> Dont audit the specified domain connecting to init scripts with a unix domain stream socket. @@ -118197,7 +101098,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_dbus_send_script" lineno="2736"> +<interface name="init_dbus_send_script" lineno="2636"> <summary> Send messages to init scripts over dbus. </summary> @@ -118207,7 +101108,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dbus_chat_script" lineno="2756"> +<interface name="init_dbus_chat_script" lineno="2656"> <summary> Send and receive messages from init scripts over dbus. @@ -118218,7 +101119,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_use_script_ptys" lineno="2785"> +<interface name="init_use_script_ptys" lineno="2685"> <summary> Read and write the init script pty. </summary> @@ -118237,7 +101138,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_use_inherited_script_ptys" lineno="2804"> +<interface name="init_use_inherited_script_ptys" lineno="2704"> <summary> Read and write inherited init script ptys. </summary> @@ -118247,7 +101148,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_use_script_ptys" lineno="2826"> +<interface name="init_dontaudit_use_script_ptys" lineno="2726"> <summary> Do not audit attempts to read and write the init script pty. @@ -118258,7 +101159,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_getattr_script_status_files" lineno="2845"> +<interface name="init_getattr_script_status_files" lineno="2745"> <summary> Get the attributes of init script status files. @@ -118269,7 +101170,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_read_script_status_files" lineno="2864"> +<interface name="init_dontaudit_read_script_status_files" lineno="2764"> <summary> Do not audit attempts to read init script status files. @@ -118280,7 +101181,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_search_run" lineno="2883"> +<interface name="init_search_run" lineno="2783"> <summary> Search the /run/systemd directory. </summary> @@ -118290,7 +101191,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_script_tmp_files" lineno="2902"> +<interface name="init_read_script_tmp_files" lineno="2802"> <summary> Read init script temporary data. </summary> @@ -118300,7 +101201,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rw_inherited_script_tmp_files" lineno="2921"> +<interface name="init_rw_inherited_script_tmp_files" lineno="2821"> <summary> Read and write init script inherited temporary data. </summary> @@ -118310,7 +101211,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_rw_script_tmp_files" lineno="2939"> +<interface name="init_rw_script_tmp_files" lineno="2839"> <summary> Read and write init script temporary data. </summary> @@ -118320,7 +101221,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_script_tmp_filetrans" lineno="2974"> +<interface name="init_script_tmp_filetrans" lineno="2874"> <summary> Create files in a init script temporary data directory. @@ -118346,7 +101247,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="init_getattr_utmp" lineno="2993"> +<interface name="init_getattr_utmp" lineno="2893"> <summary> Get the attributes of init script process id files. </summary> @@ -118356,7 +101257,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_utmp" lineno="3011"> +<interface name="init_read_utmp" lineno="2911"> <summary> Read utmp. </summary> @@ -118366,7 +101267,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_write_utmp" lineno="3030"> +<interface name="init_dontaudit_write_utmp" lineno="2930"> <summary> Do not audit attempts to write utmp. </summary> @@ -118376,7 +101277,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_write_utmp" lineno="3048"> +<interface name="init_write_utmp" lineno="2948"> <summary> Write to utmp. </summary> @@ -118386,7 +101287,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_lock_utmp" lineno="3068"> +<interface name="init_dontaudit_lock_utmp" lineno="2968"> <summary> Do not audit attempts to lock init script pid files. @@ -118397,7 +101298,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_rw_utmp" lineno="3086"> +<interface name="init_rw_utmp" lineno="2986"> <summary> Read and write utmp. </summary> @@ -118407,7 +101308,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_dontaudit_rw_utmp" lineno="3105"> +<interface name="init_dontaudit_rw_utmp" lineno="3005"> <summary> Do not audit attempts to read and write utmp. </summary> @@ -118417,7 +101318,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_manage_utmp" lineno="3123"> +<interface name="init_manage_utmp" lineno="3023"> <summary> Create, read, write, and delete utmp. </summary> @@ -118427,7 +101328,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_watch_utmp" lineno="3142"> +<interface name="init_watch_utmp" lineno="3042"> <summary> Add a watch on utmp. </summary> @@ -118437,7 +101338,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_relabel_utmp" lineno="3160"> +<interface name="init_relabel_utmp" lineno="3060"> <summary> Relabel utmp. </summary> @@ -118447,7 +101348,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_runtime_filetrans_utmp" lineno="3179"> +<interface name="init_runtime_filetrans_utmp" lineno="3079"> <summary> Create files in /var/run with the utmp file type. @@ -118458,7 +101359,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_create_runtime_dirs" lineno="3197"> +<interface name="init_create_runtime_dirs" lineno="3097"> <summary> Create a directory in the /run/systemd directory. </summary> @@ -118468,7 +101369,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_runtime_files" lineno="3216"> +<interface name="init_read_runtime_files" lineno="3116"> <summary> Read init_runtime_t files </summary> @@ -118478,7 +101379,7 @@ domain </summary> </param> </interface> -<interface name="init_rename_runtime_files" lineno="3234"> +<interface name="init_rename_runtime_files" lineno="3134"> <summary> Rename init_runtime_t files </summary> @@ -118488,7 +101389,7 @@ domain </summary> </param> </interface> -<interface name="init_setattr_runtime_files" lineno="3252"> +<interface name="init_setattr_runtime_files" lineno="3152"> <summary> Setattr init_runtime_t files </summary> @@ -118498,7 +101399,7 @@ domain </summary> </param> </interface> -<interface name="init_delete_runtime_files" lineno="3270"> +<interface name="init_delete_runtime_files" lineno="3170"> <summary> Delete init_runtime_t files </summary> @@ -118508,7 +101409,7 @@ domain </summary> </param> </interface> -<interface name="init_write_runtime_socket" lineno="3289"> +<interface name="init_write_runtime_socket" lineno="3189"> <summary> Allow the specified domain to write to init sock file. @@ -118519,7 +101420,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_runtime_pipes" lineno="3307"> +<interface name="init_dontaudit_write_runtime_socket" lineno="3208"> +<summary> +Do not audit attempts to write to +init sock files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="init_read_runtime_pipes" lineno="3226"> <summary> Read init unnamed pipes. </summary> @@ -118529,7 +101441,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_runtime_symlinks" lineno="3325"> +<interface name="init_read_runtime_symlinks" lineno="3244"> <summary> read systemd unit symlinks (usually under /run/systemd/units/) </summary> @@ -118539,7 +101451,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_tcp_recvfrom_all_daemons" lineno="3343"> +<interface name="init_tcp_recvfrom_all_daemons" lineno="3262"> <summary> Allow the specified domain to connect to daemon with a tcp socket </summary> @@ -118549,7 +101461,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_udp_recvfrom_all_daemons" lineno="3361"> +<interface name="init_udp_recvfrom_all_daemons" lineno="3280"> <summary> Allow the specified domain to connect to daemon with a udp socket </summary> @@ -118559,7 +101471,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_script_status_files" lineno="3380"> +<interface name="init_read_script_status_files" lineno="3299"> <summary> Allow reading the init script state files </summary> @@ -118569,7 +101481,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="init_relabelto_script_state" lineno="3398"> +<interface name="init_relabelto_script_state" lineno="3317"> <summary> Label to init script status files </summary> @@ -118579,7 +101491,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="init_script_readable_type" lineno="3417"> +<interface name="init_script_readable_type" lineno="3336"> <summary> Mark as a readable type for the initrc_t domain </summary> @@ -118589,7 +101501,7 @@ Type that initrc_t needs read access to </summary> </param> </interface> -<interface name="init_search_units" lineno="3435"> +<interface name="init_search_units" lineno="3354"> <summary> Search systemd unit dirs. </summary> @@ -118599,7 +101511,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_list_unit_dirs" lineno="3460"> +<interface name="init_list_unit_dirs" lineno="3379"> <summary> List systemd unit dirs. </summary> @@ -118609,7 +101521,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_getattr_generic_units_files" lineno="3480"> +<interface name="init_getattr_generic_units_files" lineno="3399"> <summary> Get the attributes of systemd unit files </summary> @@ -118619,7 +101531,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_generic_units_files" lineno="3498"> +<interface name="init_read_generic_units_files" lineno="3417"> <summary> Read systemd unit files </summary> @@ -118629,7 +101541,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_read_generic_units_symlinks" lineno="3516"> +<interface name="init_read_generic_units_symlinks" lineno="3435"> <summary> Read systemd unit links </summary> @@ -118639,7 +101551,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_get_generic_units_status" lineno="3534"> +<interface name="init_get_generic_units_status" lineno="3453"> <summary> Get status of generic systemd units. </summary> @@ -118649,7 +101561,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_start_generic_units" lineno="3553"> +<interface name="init_start_generic_units" lineno="3472"> <summary> Start generic systemd units. </summary> @@ -118659,7 +101571,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stop_generic_units" lineno="3572"> +<interface name="init_stop_generic_units" lineno="3491"> <summary> Stop generic systemd units. </summary> @@ -118669,7 +101581,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_reload_generic_units" lineno="3591"> +<interface name="init_reload_generic_units" lineno="3510"> <summary> Reload generic systemd units. </summary> @@ -118679,7 +101591,37 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_get_transient_units_status" lineno="3610"> +<interface name="init_get_runtime_units_status" lineno="3529"> +<summary> +Get the status of runtime systemd units. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_start_runtime_units" lineno="3548"> +<summary> +Start runtime systemd units. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_stop_runtime_units" lineno="3567"> +<summary> +Stop runtime systemd units. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_get_transient_units_status" lineno="3586"> <summary> Get status of transient systemd units. </summary> @@ -118689,7 +101631,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_start_transient_units" lineno="3629"> +<interface name="init_start_transient_units" lineno="3605"> <summary> Start transient systemd units. </summary> @@ -118699,7 +101641,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stop_transient_units" lineno="3648"> +<interface name="init_stop_transient_units" lineno="3624"> <summary> Stop transient systemd units. </summary> @@ -118709,7 +101651,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_reload_transient_units" lineno="3667"> +<interface name="init_reload_transient_units" lineno="3643"> <summary> Reload transient systemd units. </summary> @@ -118719,7 +101661,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_get_all_units_status" lineno="3687"> +<interface name="init_get_all_units_status" lineno="3663"> <summary> Get status of all systemd units. </summary> @@ -118729,7 +101671,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_all_units" lineno="3706"> +<interface name="init_manage_all_units" lineno="3682"> <summary> All perms on all systemd units. </summary> @@ -118739,7 +101681,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_start_all_units" lineno="3726"> +<interface name="init_start_all_units" lineno="3702"> <summary> Start all systemd units. </summary> @@ -118749,7 +101691,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_stop_all_units" lineno="3745"> +<interface name="init_stop_all_units" lineno="3721"> <summary> Stop all systemd units. </summary> @@ -118759,7 +101701,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="init_reload_all_units" lineno="3764"> +<interface name="init_reload_all_units" lineno="3740"> <summary> Reload all systemd units. </summary> @@ -118769,7 +101711,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_manage_all_unit_files" lineno="3783"> +<interface name="init_manage_all_unit_files" lineno="3759"> <summary> Manage systemd unit dirs and the files in them </summary> @@ -118779,7 +101721,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="init_linkable_keyring" lineno="3804"> +<interface name="init_linkable_keyring" lineno="3780"> <summary> Associate the specified domain to be a domain whose keyring init should be allowed to link. @@ -118790,7 +101732,7 @@ Domain whose keyring init should be allowed to link. </summary> </param> </interface> -<interface name="init_admin" lineno="3822"> +<interface name="init_admin" lineno="3798"> <summary> Allow unconfined access to send instructions to init </summary> @@ -118800,7 +101742,7 @@ Target domain </summary> </param> </interface> -<interface name="init_getrlimit" lineno="3854"> +<interface name="init_getrlimit" lineno="3830"> <summary> Allow getting init_t rlimit </summary> @@ -118817,6 +101759,13 @@ Enable support for upstart as the init program. </p> </desc> </tunable> +<tunable name="init_create_mountpoints" dftval="false"> +<desc> +<p> +Enable systemd to create mountpoints. +</p> +</desc> +</tunable> <tunable name="init_daemons_use_tty" dftval="false"> <desc> <p> @@ -118967,28 +101916,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ipsec_write_pid" lineno="259"> -<summary> -write the ipsec_runtime_t files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="ipsec_manage_pid" lineno="275"> -<summary> -Create, read, write, and delete the IPSEC pid files. -(Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="ipsec_write_runtime_files" lineno="290"> +<interface name="ipsec_write_runtime_files" lineno="259"> <summary> Write ipsec runtime files. </summary> @@ -118998,7 +101926,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ipsec_manage_runtime_files" lineno="309"> +<interface name="ipsec_manage_runtime_files" lineno="278"> <summary> Create, read, write, and delete the IPSEC runtime files. </summary> @@ -119008,7 +101936,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="ipsec_domtrans_racoon" lineno="328"> +<interface name="ipsec_domtrans_racoon" lineno="297"> <summary> Execute racoon in the racoon domain. </summary> @@ -119018,7 +101946,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="ipsec_run_racoon" lineno="352"> +<interface name="ipsec_run_racoon" lineno="321"> <summary> Execute racoon and allow the specified role the domain. </summary> @@ -119034,7 +101962,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="ipsec_domtrans_setkey" lineno="371"> +<interface name="ipsec_domtrans_setkey" lineno="340"> <summary> Execute setkey in the setkey domain. </summary> @@ -119044,7 +101972,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="ipsec_run_setkey" lineno="395"> +<interface name="ipsec_run_setkey" lineno="364"> <summary> Execute setkey and allow the specified role the domains. </summary> @@ -119060,7 +101988,7 @@ Role allowed access.. </param> <rolecap/> </interface> -<interface name="ipsec_admin" lineno="421"> +<interface name="ipsec_admin" lineno="390"> <summary> All of the rules required to administrate an ipsec environment. @@ -119124,7 +102052,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_initrc_domtrans" lineno="80"> +<interface name="iptables_read_state" lineno="80"> +<summary> +Read the process state (/proc/pid) +of iptables. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="iptables_initrc_domtrans" lineno="99"> <summary> Execute iptables init scripts in the init script domain. @@ -119135,7 +102074,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="iptables_setattr_config" lineno="98"> +<interface name="iptables_setattr_config" lineno="117"> <summary> Set the attributes of iptables config files. </summary> @@ -119145,7 +102084,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_read_config" lineno="117"> +<interface name="iptables_read_config" lineno="136"> <summary> Read iptables config files. </summary> @@ -119155,7 +102094,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_etc_filetrans_config" lineno="138"> +<interface name="iptables_etc_filetrans_config" lineno="157"> <summary> Create files in /etc with the type used for the iptables config files. @@ -119166,7 +102105,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_manage_config" lineno="156"> +<interface name="iptables_manage_config" lineno="175"> <summary> Manage iptables config files. </summary> @@ -119176,17 +102115,37 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_dontaudit_read_pids" lineno="175"> +<interface name="iptables_getattr_runtime_files" lineno="194"> <summary> -dontaudit reading iptables_runtime_t (Deprecated) +Get the attributes of iptables runtime files. </summary> <param name="domain"> <summary> -Domain to not audit. +Domain allowed access. +</summary> +</param> +</interface> +<interface name="iptables_read_runtime_files" lineno="212"> +<summary> +Read iptables runtime files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. </summary> </param> </interface> -<interface name="iptables_dontaudit_read_runtime_files" lineno="190"> +<interface name="iptables_mounton_runtime_files" lineno="230"> +<summary> +Mount on iptables runtime files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="iptables_dontaudit_read_runtime_files" lineno="248"> <summary> Do not audit reading iptables runtime files. </summary> @@ -119196,7 +102155,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="iptables_startstop" lineno="208"> +<interface name="iptables_startstop" lineno="266"> <summary> Allow specified domain to start and stop iptables service </summary> @@ -119206,7 +102165,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_status" lineno="227"> +<interface name="iptables_status" lineno="285"> <summary> Allow specified domain to get status of iptables service </summary> @@ -119216,7 +102175,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="iptables_admin" lineno="254"> +<interface name="iptables_admin" lineno="312"> <summary> All of the rules required to administrate an iptables @@ -119455,7 +102414,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_dontaudit_setattr_lib_files" lineno="289"> +<interface name="libs_watch_lib_dirs" lineno="289"> +<summary> +Watch /usr/lib directories +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_dontaudit_setattr_lib_files" lineno="307"> <summary> dontaudit attempts to setattr on library files </summary> @@ -119465,7 +102434,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="libs_read_lib_files" lineno="308"> +<interface name="libs_read_lib_files" lineno="326"> <summary> Read files in the library directories, such as static libraries. @@ -119476,7 +102445,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_exec_lib_files" lineno="329"> +<interface name="libs_exec_lib_files" lineno="347"> <summary> Execute library scripts in the caller domain. </summary> @@ -119486,7 +102455,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_manage_lib_files" lineno="352"> +<interface name="libs_manage_lib_files" lineno="370"> <summary> Create, read, write, and delete generic files in library directories. @@ -119497,7 +102466,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_dontaudit_manage_lib_files" lineno="371"> +<interface name="libs_dontaudit_manage_lib_files" lineno="389"> <summary> Do not audit attempts to create, read, write, and delete generic files in library directories. @@ -119508,7 +102477,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="libs_relabelto_lib_files" lineno="389"> +<interface name="libs_relabelto_lib_files" lineno="407"> <summary> Relabel files to the type used in library directories. </summary> @@ -119518,7 +102487,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_relabel_lib_files" lineno="409"> +<interface name="libs_relabel_lib_files" lineno="427"> <summary> Relabel to and from the type used for generic lib files. @@ -119529,7 +102498,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_delete_lib_symlinks" lineno="428"> +<interface name="libs_delete_lib_symlinks" lineno="446"> <summary> Delete generic symlinks in library directories. </summary> @@ -119539,7 +102508,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_manage_lib_symlinks" lineno="446"> +<interface name="libs_manage_lib_symlinks" lineno="464"> <summary> Manage generic symlinks in library directories. </summary> @@ -119549,7 +102518,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_manage_shared_libs" lineno="465"> +<interface name="libs_manage_shared_libs" lineno="483"> <summary> Create, read, write, and delete shared libraries. </summary> @@ -119559,7 +102528,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_use_shared_libs" lineno="483"> +<interface name="libs_use_shared_libs" lineno="501"> <summary> Load and execute functions from shared libraries. </summary> @@ -119569,7 +102538,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_legacy_use_shared_libs" lineno="506"> +<interface name="libs_legacy_use_shared_libs" lineno="524"> <summary> Load and execute functions from shared libraries, with legacy support. @@ -119580,7 +102549,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_relabel_shared_libs" lineno="527"> +<interface name="libs_relabel_shared_libs" lineno="545"> <summary> Relabel to and from the type used for shared libraries. @@ -119591,7 +102560,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="560"> +<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="578"> <summary> Create an object in etc with a type transition to the ld_so_cache_t type @@ -119614,7 +102583,7 @@ Name of the resource created for which a type transition occurs </summary> </param> </interface> -<interface name="libs_lib_filetrans" lineno="594"> +<interface name="libs_lib_filetrans" lineno="612"> <summary> Create an object in the generic lib location with a type transition to the provided type @@ -119640,7 +102609,7 @@ Name of the resource created for which a type transition should occur </summary> </param> </interface> -<interface name="libs_relabel_lib_dirs" lineno="615"> +<interface name="libs_relabel_lib_dirs" lineno="633"> <summary> Relabel to and from the type used for generic lib directories. @@ -120158,7 +103127,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_use_syslogd_fd" lineno="721"> +<interface name="logging_use_syslogd_fd" lineno="722"> <summary> Allow domain to use a file descriptor from syslogd. @@ -120169,7 +103138,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_relabelto_devlog_sock_files" lineno="740"> +<interface name="logging_relabelto_devlog_sock_files" lineno="741"> <summary> Allow domain to relabelto devlog sock_files </summary> @@ -120180,7 +103149,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_create_devlog" lineno="758"> +<interface name="logging_create_devlog" lineno="759"> <summary> Connect to the syslog control unix stream socket. </summary> @@ -120190,7 +103159,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_read_audit_config" lineno="779"> +<interface name="logging_read_audit_config" lineno="780"> <summary> Read the auditd configuration files. </summary> @@ -120201,7 +103170,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_dontaudit_search_audit_config" lineno="802"> +<interface name="logging_dontaudit_search_audit_config" lineno="803"> <summary> dontaudit search of auditd configuration files. </summary> @@ -120212,7 +103181,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="logging_read_syslog_config" lineno="821"> +<interface name="logging_read_syslog_config" lineno="822"> <summary> Read syslog configuration files. </summary> @@ -120223,7 +103192,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_watch_runtime_dirs" lineno="839"> +<interface name="logging_watch_runtime_dirs" lineno="840"> <summary> Watch syslog runtime dirs. </summary> @@ -120233,7 +103202,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_delete_devlog_socket" lineno="858"> +<interface name="logging_delete_devlog_socket" lineno="859"> <summary> Delete the syslog socket files </summary> @@ -120244,17 +103213,7 @@ Domain allowed access </param> <rolecap/> </interface> -<interface name="logging_manage_pid_sockets" lineno="876"> -<summary> -Create, read, write, and delete syslog PID sockets. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="logging_manage_runtime_sockets" lineno="891"> +<interface name="logging_manage_runtime_sockets" lineno="877"> <summary> Create, read, write, and delete syslog PID sockets. </summary> @@ -120264,7 +103223,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_search_logs" lineno="912"> +<interface name="logging_search_logs" lineno="898"> <summary> Allows the domain to open a file in the log directory, but does not allow the listing @@ -120276,7 +103235,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_dontaudit_search_logs" lineno="932"> +<interface name="logging_dontaudit_search_logs" lineno="918"> <summary> Do not audit attempts to search the var log directory. </summary> @@ -120286,7 +103245,7 @@ Domain not to audit. </summary> </param> </interface> -<interface name="logging_list_logs" lineno="950"> +<interface name="logging_list_logs" lineno="936"> <summary> List the contents of the generic log directory (/var/log). </summary> @@ -120296,7 +103255,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_rw_generic_log_dirs" lineno="970"> +<interface name="logging_rw_generic_log_dirs" lineno="956"> <summary> Read and write the generic log directory (/var/log). </summary> @@ -120306,7 +103265,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_search_all_logs" lineno="991"> +<interface name="logging_search_all_logs" lineno="977"> <summary> Search through all log dirs. </summary> @@ -120317,7 +103276,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_setattr_all_log_dirs" lineno="1010"> +<interface name="logging_setattr_all_log_dirs" lineno="996"> <summary> Set attributes on all log dirs. </summary> @@ -120328,7 +103287,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_dontaudit_getattr_all_logs" lineno="1029"> +<interface name="logging_dontaudit_getattr_all_logs" lineno="1015"> <summary> Do not audit attempts to get the attributes of any log files. @@ -120339,7 +103298,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="logging_getattr_all_logs" lineno="1047"> +<interface name="logging_getattr_all_logs" lineno="1033"> <summary> Read the attributes of any log file </summary> @@ -120349,7 +103308,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="logging_append_all_logs" lineno="1065"> +<interface name="logging_append_all_logs" lineno="1051"> <summary> Append to all log files. </summary> @@ -120359,7 +103318,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_append_all_inherited_logs" lineno="1086"> +<interface name="logging_append_all_inherited_logs" lineno="1072"> <summary> Append to all log files. </summary> @@ -120369,7 +103328,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_read_all_logs" lineno="1105"> +<interface name="logging_read_all_logs" lineno="1091"> <summary> Read all log files. </summary> @@ -120380,7 +103339,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_watch_all_logs" lineno="1126"> +<interface name="logging_watch_all_logs" lineno="1112"> <summary> Watch all log files. </summary> @@ -120391,7 +103350,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_exec_all_logs" lineno="1146"> +<interface name="logging_exec_all_logs" lineno="1132"> <summary> Execute all log files in the caller domain. </summary> @@ -120401,7 +103360,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_rw_all_logs" lineno="1166"> +<interface name="logging_rw_all_logs" lineno="1152"> <summary> read/write to all log files. </summary> @@ -120411,7 +103370,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_manage_all_logs" lineno="1186"> +<interface name="logging_manage_all_logs" lineno="1172"> <summary> Create, read, write, and delete all log files. </summary> @@ -120422,7 +103381,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_manage_generic_log_dirs" lineno="1207"> +<interface name="logging_manage_generic_log_dirs" lineno="1193"> <summary> Create, read, write, and delete generic log directories. </summary> @@ -120433,7 +103392,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_relabel_generic_log_dirs" lineno="1227"> +<interface name="logging_relabel_generic_log_dirs" lineno="1213"> <summary> Relabel from and to generic log directory type. </summary> @@ -120444,7 +103403,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_read_generic_logs" lineno="1247"> +<interface name="logging_read_generic_logs" lineno="1233"> <summary> Read generic log files. </summary> @@ -120455,7 +103414,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_mmap_generic_logs" lineno="1268"> +<interface name="logging_mmap_generic_logs" lineno="1254"> <summary> Map generic log files. </summary> @@ -120466,7 +103425,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_write_generic_logs" lineno="1286"> +<interface name="logging_write_generic_logs" lineno="1272"> <summary> Write generic log files. </summary> @@ -120476,7 +103435,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_dontaudit_write_generic_logs" lineno="1307"> +<interface name="logging_dontaudit_write_generic_logs" lineno="1293"> <summary> Dontaudit Write generic log files. </summary> @@ -120486,7 +103445,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="logging_rw_generic_logs" lineno="1325"> +<interface name="logging_rw_generic_logs" lineno="1311"> <summary> Read and write generic log files. </summary> @@ -120496,7 +103455,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_manage_generic_logs" lineno="1348"> +<interface name="logging_manage_generic_logs" lineno="1334"> <summary> Create, read, write, and delete generic log files. @@ -120508,7 +103467,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="logging_watch_generic_logs_dir" lineno="1367"> +<interface name="logging_watch_generic_logs_dir" lineno="1353"> <summary> Watch generic log dirs. </summary> @@ -120518,7 +103477,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="logging_admin_audit" lineno="1392"> +<interface name="logging_admin_audit" lineno="1378"> <summary> All of the rules required to administrate the audit environment @@ -120535,7 +103494,7 @@ User role allowed access. </param> <rolecap/> </interface> -<interface name="logging_admin_syslog" lineno="1436"> +<interface name="logging_admin_syslog" lineno="1422"> <summary> All of the rules required to administrate the syslog environment @@ -120552,7 +103511,7 @@ User role allowed access. </param> <rolecap/> </interface> -<interface name="logging_admin" lineno="1492"> +<interface name="logging_admin" lineno="1478"> <summary> All of the rules required to administrate the logging environment @@ -120569,7 +103528,7 @@ User role allowed access. </param> <rolecap/> </interface> -<interface name="logging_syslog_managed_log_file" lineno="1515"> +<interface name="logging_syslog_managed_log_file" lineno="1501"> <summary> Mark the type as a syslog managed log file and introduce the proper file transition when @@ -120587,7 +103546,7 @@ Name to use for the file </summary> </param> </interface> -<interface name="logging_syslog_managed_log_dir" lineno="1554"> +<interface name="logging_syslog_managed_log_dir" lineno="1540"> <summary> Mark the type as a syslog managed log dir and introduce the proper file transition when @@ -120614,7 +103573,7 @@ Name to use for the directory </summary> </param> </interface> -<interface name="logging_mmap_journal" lineno="1576"> +<interface name="logging_mmap_journal" lineno="1562"> <summary> Map files in /run/log/journal/ directory. </summary> @@ -120727,17 +103686,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="lvm_rw_inherited_pid_pipes" lineno="185"> -<summary> -Read and write a lvm unnamed pipe. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="lvm_admin" lineno="205"> +<interface name="lvm_admin" lineno="191"> <summary> All of the rules required to administrate an lvm environment. @@ -120901,7 +103850,18 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="miscfiles_read_generic_tls_privkey" lineno="235"> +<interface name="miscfiles_mounton_generic_cert_dirs" lineno="234"> +<summary> +Mount on generic SSL/TLS certificate directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="miscfiles_read_generic_tls_privkey" lineno="254"> <summary> Read generic SSL/TLS private keys. @@ -120913,7 +103873,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="miscfiles_manage_generic_tls_privkey_dirs" lineno="256"> +<interface name="miscfiles_manage_generic_tls_privkey_dirs" lineno="275"> <summary> Manage generic SSL/TLS private keys. @@ -120924,7 +103884,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_manage_generic_tls_privkey_files" lineno="276"> +<interface name="miscfiles_manage_generic_tls_privkey_files" lineno="295"> <summary> Manage generic SSL/TLS private keys. @@ -120936,7 +103896,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="miscfiles_manage_generic_tls_privkey_symlinks" lineno="297"> +<interface name="miscfiles_manage_generic_tls_privkey_symlinks" lineno="316"> <summary> Manage generic SSL/TLS private keys. @@ -120948,7 +103908,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="miscfiles_read_fonts" lineno="316"> +<interface name="miscfiles_read_fonts" lineno="335"> <summary> Read fonts. </summary> @@ -120959,7 +103919,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="miscfiles_setattr_fonts_dirs" lineno="347"> +<interface name="miscfiles_setattr_fonts_dirs" lineno="366"> <summary> Set the attributes on a fonts directory. </summary> @@ -120970,7 +103930,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="miscfiles_dontaudit_setattr_fonts_dirs" lineno="367"> +<interface name="miscfiles_dontaudit_setattr_fonts_dirs" lineno="386"> <summary> Do not audit attempts to set the attributes on a fonts directory. @@ -120982,7 +103942,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="miscfiles_dontaudit_write_fonts" lineno="386"> +<interface name="miscfiles_dontaudit_write_fonts" lineno="405"> <summary> Do not audit attempts to write fonts. </summary> @@ -120993,7 +103953,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="miscfiles_manage_fonts" lineno="406"> +<interface name="miscfiles_manage_fonts" lineno="425"> <summary> Create, read, write, and delete fonts. </summary> @@ -121004,7 +103964,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="miscfiles_watch_fonts_dirs" lineno="431"> +<interface name="miscfiles_watch_fonts_dirs" lineno="450"> <summary> Watch fonts directories. </summary> @@ -121015,7 +103975,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="miscfiles_setattr_fonts_cache_dirs" lineno="449"> +<interface name="miscfiles_setattr_fonts_cache_dirs" lineno="468"> <summary> Set the attributes on a fonts cache directory. </summary> @@ -121025,7 +103985,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_dontaudit_setattr_fonts_cache_dirs" lineno="468"> +<interface name="miscfiles_dontaudit_setattr_fonts_cache_dirs" lineno="487"> <summary> Do not audit attempts to set the attributes on a fonts cache directory. @@ -121036,7 +103996,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="miscfiles_manage_fonts_cache" lineno="487"> +<interface name="miscfiles_manage_fonts_cache" lineno="506"> <summary> Create, read, write, and delete fonts cache. </summary> @@ -121047,7 +104007,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="miscfiles_read_hwdata" lineno="509"> +<interface name="miscfiles_read_hwdata" lineno="528"> <summary> Read hardware identification data. </summary> @@ -121057,7 +104017,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_getattr_localization" lineno="529"> +<interface name="miscfiles_getattr_localization" lineno="548"> <summary> Allow process to get the attributes of localization info </summary> @@ -121067,7 +104027,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_setattr_localization" lineno="549"> +<interface name="miscfiles_setattr_localization" lineno="568"> <summary> Allow process to setattr localization info </summary> @@ -121077,7 +104037,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_read_localization" lineno="581"> +<interface name="miscfiles_read_localization" lineno="600"> <summary> Allow process to read localization information. </summary> @@ -121099,7 +104059,7 @@ Domain allowed access. </param> <infoflow type="read" weight="10"/> </interface> -<interface name="miscfiles_rw_localization" lineno="604"> +<interface name="miscfiles_rw_localization" lineno="623"> <summary> Allow process to write localization info </summary> @@ -121109,7 +104069,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_relabel_localization" lineno="624"> +<interface name="miscfiles_relabel_localization" lineno="643"> <summary> Allow process to relabel localization info </summary> @@ -121119,7 +104079,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_legacy_read_localization" lineno="643"> +<interface name="miscfiles_legacy_read_localization" lineno="662"> <summary> Allow process to read legacy time localization info </summary> @@ -121129,7 +104089,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_watch_localization" lineno="662"> +<interface name="miscfiles_watch_localization" lineno="681"> <summary> Watch time localization info </summary> @@ -121139,7 +104099,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_search_man_pages" lineno="680"> +<interface name="miscfiles_search_man_pages" lineno="699"> <summary> Search man pages. </summary> @@ -121149,7 +104109,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_dontaudit_search_man_pages" lineno="699"> +<interface name="miscfiles_dontaudit_search_man_pages" lineno="718"> <summary> Do not audit attempts to search man pages. </summary> @@ -121159,7 +104119,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="miscfiles_read_man_pages" lineno="718"> +<interface name="miscfiles_read_man_pages" lineno="737"> <summary> Read man pages </summary> @@ -121170,7 +104130,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="miscfiles_delete_man_pages" lineno="740"> +<interface name="miscfiles_delete_man_pages" lineno="759"> <summary> Delete man pages </summary> @@ -121180,7 +104140,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_manage_man_pages" lineno="762"> +<interface name="miscfiles_manage_man_pages" lineno="781"> <summary> Create, read, write, and delete man pages </summary> @@ -121190,7 +104150,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_read_man_cache" lineno="783"> +<interface name="miscfiles_read_man_cache" lineno="802"> <summary> Read man cache content. </summary> @@ -121200,7 +104160,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_map_man_cache" lineno="804"> +<interface name="miscfiles_map_man_cache" lineno="823"> <summary> Map man cache content. </summary> @@ -121210,7 +104170,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_manage_man_cache" lineno="823"> +<interface name="miscfiles_manage_man_cache" lineno="842"> <summary> Create, read, write, and delete man cache content. @@ -121221,7 +104181,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_relabel_man_cache" lineno="844"> +<interface name="miscfiles_relabel_man_cache" lineno="863"> <summary> Relabel from and to man cache. </summary> @@ -121231,7 +104191,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_read_public_files" lineno="865"> +<interface name="miscfiles_search_public_dirs" lineno="882"> +<summary> +Search public directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_read_public_files" lineno="904"> <summary> Read public files used for file transfer services. @@ -121243,7 +104213,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="miscfiles_manage_public_files" lineno="887"> +<interface name="miscfiles_manage_public_files" lineno="926"> <summary> Create, read, write, and delete public files and directories used for file transfer services. @@ -121255,7 +104225,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="miscfiles_watch_public_dirs" lineno="907"> +<interface name="miscfiles_watch_public_dirs" lineno="946"> <summary> Watch public files </summary> @@ -121265,7 +104235,38 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_read_tetex_data" lineno="925"> +<interface name="miscfiles_mounton_all_public_dirs" lineno="964"> +<summary> +Mount on all public content directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_mounton_all_public_files" lineno="984"> +<summary> +Mount on all public content files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_rangetrans_all_public_content" lineno="1005"> +<summary> +Transition to the specified sensitivity +when creating all public content objects. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_read_tetex_data" lineno="1031"> <summary> Read TeX data </summary> @@ -121275,7 +104276,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_exec_tetex_data" lineno="949"> +<interface name="miscfiles_exec_tetex_data" lineno="1055"> <summary> Execute TeX data programs in the caller domain. </summary> @@ -121285,7 +104286,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_domain_entry_test_files" lineno="973"> +<interface name="miscfiles_domain_entry_test_files" lineno="1079"> <summary> Let test files be an entry point for a specified domain. @@ -121296,7 +104297,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_read_test_files" lineno="991"> +<interface name="miscfiles_read_test_files" lineno="1097"> <summary> Read test files and directories. </summary> @@ -121306,7 +104307,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_exec_test_files" lineno="1010"> +<interface name="miscfiles_exec_test_files" lineno="1116"> <summary> Execute test files. </summary> @@ -121316,7 +104317,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_etc_filetrans_localization" lineno="1030"> +<interface name="miscfiles_etc_filetrans_localization" lineno="1136"> <summary> Create files in etc directories with localization file type. @@ -121327,7 +104328,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="miscfiles_manage_localization" lineno="1050"> +<interface name="miscfiles_manage_localization" lineno="1156"> <summary> Create, read, write, and delete localization </summary> @@ -121361,17 +104362,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="modutils_read_module_objects" lineno="51"> -<summary> -Read the kernel modules. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="modutils_read_module_config" lineno="68"> +<interface name="modutils_read_module_config" lineno="53"> <summary> Read the configuration options used when loading modules. @@ -121383,7 +104374,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="modutils_rename_module_config" lineno="94"> +<interface name="modutils_rename_module_config" lineno="79"> <summary> Rename a file with the configuration options used when loading modules. @@ -121394,7 +104385,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="modutils_delete_module_config" lineno="113"> +<interface name="modutils_delete_module_config" lineno="98"> <summary> Unlink a file with the configuration options used when loading modules. @@ -121405,7 +104396,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="modutils_manage_module_config" lineno="132"> +<interface name="modutils_manage_module_config" lineno="117"> <summary> Manage files with the configuration options used when loading modules. @@ -121416,7 +104407,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="modutils_domtrans" lineno="152"> +<interface name="modutils_domtrans" lineno="137"> <summary> Execute any modutil, like insmod, kmod, depmod or updates-modules, @@ -121428,7 +104419,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="modutils_run" lineno="181"> +<interface name="modutils_run" lineno="166"> <summary> Execute any modutil, like insmod, kmod, depmod or updates-modules, @@ -121448,7 +104439,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="modutils_exec" lineno="202"> +<interface name="modutils_exec" lineno="187"> <summary> Execute any modutil, like insmod, kmod, depmod or updates-modules, @@ -121501,7 +104492,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_signal" lineno="82"> +<interface name="mount_read_state" lineno="82"> +<summary> +Read the process state (/proc/pid) of mount. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mount_signal" lineno="100"> <summary> Send a generic signal to mount. </summary> @@ -121511,7 +104512,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_use_fds" lineno="100"> +<interface name="mount_use_fds" lineno="118"> <summary> Use file descriptors for mount. </summary> @@ -121521,7 +104522,7 @@ The type of the process performing this action. </summary> </param> </interface> -<interface name="mount_domtrans_unconfined" lineno="118"> +<interface name="mount_domtrans_unconfined" lineno="136"> <summary> Execute mount in the unconfined mount domain. </summary> @@ -121531,7 +104532,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="mount_run_unconfined" lineno="144"> +<interface name="mount_run_unconfined" lineno="162"> <summary> Execute mount in the unconfined mount domain, and allow the specified role the unconfined mount domain, @@ -121549,7 +104550,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="mount_read_loopback_files" lineno="163"> +<interface name="mount_read_loopback_files" lineno="181"> <summary> Read loopback filesystem image files. </summary> @@ -121559,7 +104560,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_rw_loopback_files" lineno="181"> +<interface name="mount_rw_loopback_files" lineno="199"> <summary> Read and write loopback filesystem image files. </summary> @@ -121569,7 +104570,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_list_runtime" lineno="199"> +<interface name="mount_list_runtime" lineno="217"> <summary> List mount runtime files. </summary> @@ -121579,7 +104580,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_watch_runtime_dirs" lineno="217"> +<interface name="mount_watch_runtime_dirs" lineno="235"> <summary> Watch mount runtime dirs. </summary> @@ -121589,7 +104590,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_watch_runtime_files" lineno="235"> +<interface name="mount_watch_runtime_files" lineno="253"> <summary> Watch mount runtime files. </summary> @@ -121599,7 +104600,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_watch_reads_runtime_files" lineno="253"> +<interface name="mount_watch_reads_runtime_files" lineno="271"> <summary> Watch reads on mount runtime files. </summary> @@ -121609,7 +104610,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_getattr_runtime_files" lineno="271"> +<interface name="mount_getattr_runtime_files" lineno="289"> <summary> Getattr on mount_runtime_t files </summary> @@ -121619,7 +104620,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_read_runtime_files" lineno="289"> +<interface name="mount_read_runtime_files" lineno="307"> <summary> Read mount runtime files. </summary> @@ -121629,7 +104630,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_rw_runtime_files" lineno="307"> +<interface name="mount_rw_runtime_files" lineno="325"> <summary> Read and write mount runtime files. </summary> @@ -121639,7 +104640,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="mount_rw_pipes" lineno="327"> +<interface name="mount_rw_pipes" lineno="345"> <summary> Read and write mount unnamed pipes </summary> @@ -121717,28 +104718,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="raid_read_mdadm_pid" lineno="59"> -<summary> -read mdadm pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="raid_manage_mdadm_pid" lineno="75"> -<summary> -Create, read, write, and delete -mdadm pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="raid_read_mdadm_runtime_files" lineno="90"> +<interface name="raid_read_mdadm_runtime_files" lineno="59"> <summary> Read mdadm runtime files. </summary> @@ -121748,7 +104728,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="raid_manage_mdadm_runtime_files" lineno="111"> +<interface name="raid_manage_mdadm_runtime_files" lineno="80"> <summary> Create, read, write, and delete mdadm runtime files. @@ -121759,7 +104739,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="raid_admin_mdadm" lineno="137"> +<interface name="raid_admin_mdadm" lineno="106"> <summary> All of the rules required to administrate an mdadm environment. @@ -122128,7 +105108,17 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_dontaudit_search_config" lineno="588"> +<interface name="seutil_dontaudit_exec_setfiles" lineno="587"> +<summary> +Do not audit attempts to execute setfiles. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="seutil_dontaudit_search_config" lineno="606"> <summary> Do not audit attempts to search the SELinux configuration directory (/etc/selinux). @@ -122139,7 +105129,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="seutil_dontaudit_read_config" lineno="607"> +<interface name="seutil_dontaudit_read_config" lineno="625"> <summary> Do not audit attempts to read the SELinux userland configuration (/etc/selinux). @@ -122150,7 +105140,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="seutil_read_config" lineno="627"> +<interface name="seutil_read_config" lineno="645"> <summary> Read the general SELinux configuration files. </summary> @@ -122161,7 +105151,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="seutil_rw_config" lineno="649"> +<interface name="seutil_rw_config" lineno="667"> <summary> Read and write the general SELinux configuration files. </summary> @@ -122172,7 +105162,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="seutil_manage_config" lineno="671"> +<interface name="seutil_manage_config" lineno="689"> <summary> Create, read, write, and delete the general selinux configuration files. @@ -122184,7 +105174,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="seutil_manage_config_dirs" lineno="693"> +<interface name="seutil_manage_config_dirs" lineno="711"> <summary> Create, read, write, and delete the general selinux configuration directories. @@ -122196,7 +105186,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="seutil_search_default_contexts" lineno="712"> +<interface name="seutil_search_default_contexts" lineno="730"> <summary> Search the policy directory with default_context files. </summary> @@ -122206,7 +105196,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_read_default_contexts" lineno="732"> +<interface name="seutil_read_default_contexts" lineno="750"> <summary> Read the default_contexts files. </summary> @@ -122217,7 +105207,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="seutil_manage_default_contexts" lineno="752"> +<interface name="seutil_manage_default_contexts" lineno="770"> <summary> Create, read, write, and delete the default_contexts files. </summary> @@ -122227,7 +105217,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_read_file_contexts" lineno="773"> +<interface name="seutil_read_file_contexts" lineno="791"> <summary> Read the file_contexts files. </summary> @@ -122238,7 +105228,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="seutil_dontaudit_read_file_contexts" lineno="795"> +<interface name="seutil_dontaudit_read_file_contexts" lineno="813"> <summary> Do not audit attempts to read the file_contexts files. </summary> @@ -122249,7 +105239,7 @@ Domain to not audit. </param> <rolecap/> </interface> -<interface name="seutil_rw_file_contexts" lineno="815"> +<interface name="seutil_rw_file_contexts" lineno="833"> <summary> Read and write the file_contexts files. </summary> @@ -122259,7 +105249,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_manage_file_contexts" lineno="837"> +<interface name="seutil_manage_file_contexts" lineno="855"> <summary> Create, read, write, and delete the file_contexts files. </summary> @@ -122270,7 +105260,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="seutil_read_bin_policy" lineno="858"> +<interface name="seutil_read_bin_policy" lineno="876"> <summary> Read the SELinux binary policy. </summary> @@ -122280,7 +105270,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_create_bin_policy" lineno="885"> +<interface name="seutil_create_bin_policy" lineno="903"> <summary> Create the SELinux binary policy. </summary> @@ -122290,7 +105280,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_relabelto_bin_policy" lineno="908"> +<interface name="seutil_relabelto_bin_policy" lineno="926"> <summary> Allow the caller to relabel a file to the binary policy type. </summary> @@ -122300,7 +105290,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_manage_bin_policy" lineno="929"> +<interface name="seutil_manage_bin_policy" lineno="947"> <summary> Create, read, write, and delete the SELinux binary policy. @@ -122311,7 +105301,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_read_src_policy" lineno="951"> +<interface name="seutil_read_src_policy" lineno="969"> <summary> Read SELinux policy source files. </summary> @@ -122321,7 +105311,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_manage_src_policy" lineno="973"> +<interface name="seutil_manage_src_policy" lineno="991"> <summary> Create, read, write, and delete SELinux policy source files. @@ -122333,7 +105323,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="seutil_domtrans_semanage" lineno="994"> +<interface name="seutil_domtrans_semanage" lineno="1012"> <summary> Execute a domain transition to run semanage. </summary> @@ -122343,7 +105333,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="seutil_run_semanage" lineno="1022"> +<interface name="seutil_run_semanage" lineno="1040"> <summary> Execute semanage in the semanage domain, and allow the specified role the semanage domain, @@ -122361,7 +105351,17 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="seutil_read_module_store" lineno="1041"> +<interface name="seutil_dontaudit_exec_semanage" lineno="1059"> +<summary> +Do not audit attempts to execute semanage. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="seutil_read_module_store" lineno="1077"> <summary> Read the semanage module store. </summary> @@ -122371,7 +105371,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_manage_module_store" lineno="1066"> +<interface name="seutil_manage_module_store" lineno="1102"> <summary> Full management of the semanage module store. @@ -122382,7 +105382,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_get_semanage_read_lock" lineno="1090"> +<interface name="seutil_get_semanage_read_lock" lineno="1126"> <summary> Get read lock on module store </summary> @@ -122392,7 +105392,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_get_semanage_trans_lock" lineno="1109"> +<interface name="seutil_get_semanage_trans_lock" lineno="1145"> <summary> Get trans lock on module store </summary> @@ -122402,7 +105402,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_libselinux_linked" lineno="1137"> +<interface name="seutil_libselinux_linked" lineno="1173"> <summary> SELinux-enabled program access for libselinux-linked programs. @@ -122421,7 +105421,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="seutil_dontaudit_libselinux_linked" lineno="1167"> +<interface name="seutil_dontaudit_libselinux_linked" lineno="1203"> <summary> Do not audit SELinux-enabled program access for libselinux-linked programs. @@ -122693,7 +105693,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_mmap_config_files" lineno="385"> +<interface name="sysnet_mmap_config_files" lineno="386"> <summary> Map network config files. </summary> @@ -122709,7 +105709,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_mmap_read_config" lineno="410"> +<interface name="sysnet_mmap_read_config" lineno="411"> <summary> map network config files. </summary> @@ -122725,7 +105725,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_dontaudit_read_config" lineno="429"> +<interface name="sysnet_dontaudit_read_config" lineno="430"> <summary> Do not audit attempts to read network config files. </summary> @@ -122735,7 +105735,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="sysnet_write_config" lineno="447"> +<interface name="sysnet_write_config" lineno="448"> <summary> Write network config files. </summary> @@ -122745,7 +105745,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_create_config" lineno="466"> +<interface name="sysnet_create_config" lineno="467"> <summary> Create network config files. </summary> @@ -122755,7 +105755,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_relabel_config" lineno="485"> +<interface name="sysnet_relabel_config" lineno="486"> <summary> Relabel network config files. </summary> @@ -122765,7 +105765,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_etc_filetrans_config" lineno="510"> +<interface name="sysnet_etc_filetrans_config" lineno="511"> <summary> Create files in /etc with the type used for the network config files. @@ -122781,7 +105781,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="sysnet_manage_config" lineno="528"> +<interface name="sysnet_manage_config" lineno="529"> <summary> Create, read, write, and delete network config files. </summary> @@ -122791,27 +105791,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_read_dhcpc_pid" lineno="560"> -<summary> -Read the dhcp client pid file. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="sysnet_delete_dhcpc_pid" lineno="575"> -<summary> -Delete the dhcp client pid file. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="sysnet_read_dhcpc_runtime_files" lineno="590"> +<interface name="sysnet_read_dhcpc_runtime_files" lineno="561"> <summary> Read dhcp client runtime files. </summary> @@ -122821,7 +105801,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_delete_dhcpc_runtime_files" lineno="609"> +<interface name="sysnet_delete_dhcpc_runtime_files" lineno="580"> <summary> Delete the dhcp client runtime files. </summary> @@ -122831,7 +105811,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_manage_dhcpc_runtime_files" lineno="627"> +<interface name="sysnet_manage_dhcpc_runtime_files" lineno="598"> <summary> Create, read, write, and delete dhcp client runtime files. </summary> @@ -122841,7 +105821,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_domtrans_ifconfig" lineno="645"> +<interface name="sysnet_domtrans_ifconfig" lineno="616"> <summary> Execute ifconfig in the ifconfig domain. </summary> @@ -122851,7 +105831,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="sysnet_run_ifconfig" lineno="672"> +<interface name="sysnet_run_ifconfig" lineno="643"> <summary> Execute ifconfig in the ifconfig domain, and allow the specified role the ifconfig domain, @@ -122869,7 +105849,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="sysnet_exec_ifconfig" lineno="692"> +<interface name="sysnet_exec_ifconfig" lineno="663"> <summary> Execute ifconfig in the caller domain. </summary> @@ -122879,7 +105859,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_signal_ifconfig" lineno="712"> +<interface name="sysnet_signal_ifconfig" lineno="683"> <summary> Send a generic signal to ifconfig. </summary> @@ -122890,7 +105870,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="sysnet_signull_ifconfig" lineno="731"> +<interface name="sysnet_signull_ifconfig" lineno="702"> <summary> Send null signals to ifconfig. </summary> @@ -122901,7 +105881,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="sysnet_create_netns_dirs" lineno="750"> +<interface name="sysnet_create_netns_dirs" lineno="721"> <summary> Create the /run/netns directory with an automatic type transition. @@ -122912,7 +105892,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_netns_filetrans" lineno="784"> +<interface name="sysnet_netns_filetrans" lineno="755"> <summary> Create an object in the /run/netns directory with a private type. @@ -122938,7 +105918,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="sysnet_read_dhcp_config" lineno="805"> +<interface name="sysnet_read_dhcp_config" lineno="776"> <summary> Read the DHCP configuration files. </summary> @@ -122948,7 +105928,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_search_dhcp_state" lineno="825"> +<interface name="sysnet_search_dhcp_state" lineno="796"> <summary> Search the DHCP state data directory. </summary> @@ -122958,7 +105938,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_dhcp_state_filetrans" lineno="869"> +<interface name="sysnet_dhcp_state_filetrans" lineno="840"> <summary> Create DHCP state data. </summary> @@ -122993,7 +105973,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="sysnet_dns_name_resolve" lineno="889"> +<interface name="sysnet_dns_name_resolve" lineno="860"> <summary> Perform a DNS name resolution. </summary> @@ -123004,7 +105984,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="sysnet_use_ldap" lineno="940"> +<interface name="sysnet_use_ldap" lineno="911"> <summary> Connect and use a LDAP server. </summary> @@ -123014,7 +105994,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_use_portmap" lineno="967"> +<interface name="sysnet_use_portmap" lineno="938"> <summary> Connect and use remote port mappers. </summary> @@ -123024,7 +106004,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="sysnet_dhcpc_script_entry" lineno="1001"> +<interface name="sysnet_dhcpc_script_entry" lineno="972"> <summary> Make the specified program domain accessable from the DHCP hooks/scripts. @@ -123076,7 +106056,7 @@ The type for the user pty </summary> </param> </template> -<template name="systemd_user_daemon_domain" lineno="221"> +<template name="systemd_user_daemon_domain" lineno="222"> <summary> Allow the specified domain to be started as a daemon by the specified systemd user instance. @@ -123097,7 +106077,7 @@ Domain to allow the systemd user domain to run. </summary> </param> </template> -<interface name="systemd_user_activated_sock_file" lineno="242"> +<interface name="systemd_user_activated_sock_file" lineno="243"> <summary> Associate the specified file type to be a type whose sock files can be managed by systemd user instances for socket activation. @@ -123108,7 +106088,7 @@ File type to be associated. </summary> </param> </interface> -<interface name="systemd_user_unix_stream_activated_socket" lineno="267"> +<interface name="systemd_user_unix_stream_activated_socket" lineno="268"> <summary> Associate the specified domain to be a domain whose unix stream sockets and sock files can be managed by systemd user instances @@ -123125,7 +106105,7 @@ File type of the domain's sock files to be associated. </summary> </param> </interface> -<template name="systemd_user_send_systemd_notify" lineno="293"> +<template name="systemd_user_send_systemd_notify" lineno="294"> <summary> Allow the target domain the permissions necessary to use systemd notify when started by the specified @@ -123142,7 +106122,7 @@ Domain to be allowed systemd notify permissions. </summary> </param> </template> -<template name="systemd_user_app_status" lineno="321"> +<template name="systemd_user_app_status" lineno="322"> <summary> Allow the target domain to be monitored and have its output captured by the specified systemd user instance domain. @@ -123158,7 +106138,7 @@ Domain to allow the systemd user instance to monitor. </summary> </param> </template> -<template name="systemd_read_user_manager_state" lineno="361"> +<template name="systemd_read_user_manager_state" lineno="362"> <summary> Read the process state (/proc/pid) of the specified systemd user instance. @@ -123174,7 +106154,7 @@ Domain allowed access. </summary> </param> </template> -<template name="systemd_user_manager_system_start" lineno="385"> +<template name="systemd_user_manager_system_start" lineno="386"> <summary> Send a start request to the specified systemd user instance system object. @@ -123190,7 +106170,7 @@ Domain allowed access. </summary> </param> </template> -<template name="systemd_user_manager_system_stop" lineno="409"> +<template name="systemd_user_manager_system_stop" lineno="410"> <summary> Send a stop request to the specified systemd user instance system object. @@ -123206,7 +106186,7 @@ Domain allowed access. </summary> </param> </template> -<template name="systemd_user_manager_system_status" lineno="433"> +<template name="systemd_user_manager_system_status" lineno="434"> <summary> Get the status of the specified systemd user instance system object. @@ -123222,7 +106202,7 @@ Domain allowed access. </summary> </param> </template> -<template name="systemd_user_manager_dbus_chat" lineno="457"> +<template name="systemd_user_manager_dbus_chat" lineno="458"> <summary> Send and receive messages from the specified systemd user instance over dbus. @@ -123238,7 +106218,7 @@ Domain allowed access. </summary> </param> </template> -<interface name="systemd_search_conf_home_content" lineno="478"> +<interface name="systemd_search_conf_home_content" lineno="479"> <summary> Allow the specified domain to search systemd config home content. @@ -123249,7 +106229,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_conf_home_content" lineno="497"> +<interface name="systemd_manage_conf_home_content" lineno="498"> <summary> Allow the specified domain to manage systemd config home content. @@ -123260,7 +106240,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabel_conf_home_content" lineno="518"> +<interface name="systemd_relabel_conf_home_content" lineno="519"> <summary> Allow the specified domain to relabel systemd config home content. @@ -123271,7 +106251,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_search_data_home_content" lineno="539"> +<interface name="systemd_search_data_home_content" lineno="540"> <summary> Allow the specified domain to search systemd data home content. @@ -123282,7 +106262,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_data_home_content" lineno="558"> +<interface name="systemd_manage_data_home_content" lineno="559"> <summary> Allow the specified domain to manage systemd data home content. @@ -123293,7 +106273,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabel_data_home_content" lineno="579"> +<interface name="systemd_relabel_data_home_content" lineno="580"> <summary> Allow the specified domain to relabel systemd data home content. @@ -123304,7 +106284,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_search_user_runtime" lineno="600"> +<interface name="systemd_search_user_runtime" lineno="601"> <summary> Allow the specified domain to search systemd user runtime content. @@ -123315,7 +106295,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_user_runtime_files" lineno="618"> +<interface name="systemd_read_user_runtime_files" lineno="619"> <summary> Allow the specified domain to read systemd user runtime files. </summary> @@ -123325,7 +106305,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_user_runtime_lnk_files" lineno="636"> +<interface name="systemd_read_user_runtime_lnk_files" lineno="637"> <summary> Allow the specified domain to read systemd user runtime lnk files. </summary> @@ -123335,7 +106315,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_user_runtime_socket" lineno="655"> +<interface name="systemd_write_user_runtime_socket" lineno="656"> <summary> Allow the specified domain to write to the systemd user runtime named socket. @@ -123346,7 +106326,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_user_unit_files" lineno="674"> +<interface name="systemd_read_user_unit_files" lineno="675"> <summary> Allow the specified domain to read system-wide systemd user unit files. (Deprecated) @@ -123357,7 +106337,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_user_units_files" lineno="690"> +<interface name="systemd_read_user_units_files" lineno="691"> <summary> Allow the specified domain to read system-wide systemd user unit files. @@ -123368,7 +106348,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_user_runtime_units" lineno="710"> +<interface name="systemd_read_user_runtime_units" lineno="711"> <summary> Allow the specified domain to read systemd user runtime unit files. (Deprecated) </summary> @@ -123378,7 +106358,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_user_runtime_units_files" lineno="725"> +<interface name="systemd_read_user_runtime_units_files" lineno="726"> <summary> Allow the specified domain to read systemd user runtime unit files. </summary> @@ -123388,7 +106368,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_search_user_runtime_unit_dirs" lineno="745"> +<interface name="systemd_search_user_runtime_unit_dirs" lineno="746"> <summary> Allow the specified domain to search systemd user runtime unit directories. @@ -123399,7 +106379,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_list_user_runtime_unit_dirs" lineno="764"> +<interface name="systemd_list_user_runtime_unit_dirs" lineno="765"> <summary> Allow the specified domain to list the contents of systemd user runtime unit directories. @@ -123410,7 +106390,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_status_user_runtime_units" lineno="782"> +<interface name="systemd_status_user_runtime_units" lineno="783"> <summary> Allow the specified domain to get the status of systemd user runtime units. (Deprecated) </summary> @@ -123420,7 +106400,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_get_user_runtime_units_status" lineno="797"> +<interface name="systemd_get_user_runtime_units_status" lineno="798"> <summary> Allow the specified domain to get the status of systemd user runtime units. </summary> @@ -123430,7 +106410,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_start_user_runtime_units" lineno="816"> +<interface name="systemd_start_user_runtime_units" lineno="817"> <summary> Allow the specified domain to start systemd user runtime units. </summary> @@ -123440,7 +106420,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_stop_user_runtime_units" lineno="835"> +<interface name="systemd_stop_user_runtime_units" lineno="836"> <summary> Allow the specified domain to stop systemd user runtime units. </summary> @@ -123450,7 +106430,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_reload_user_runtime_units" lineno="854"> +<interface name="systemd_reload_user_runtime_units" lineno="855"> <summary> Allow the specified domain to reload systemd user runtime units. </summary> @@ -123460,7 +106440,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_user_transient_units_files" lineno="873"> +<interface name="systemd_read_user_transient_units_files" lineno="874"> <summary> Allow the specified domain to read systemd user transient unit files. </summary> @@ -123470,7 +106450,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_search_user_transient_unit_dirs" lineno="893"> +<interface name="systemd_search_user_transient_unit_dirs" lineno="894"> <summary> Allow the specified domain to search systemd user transient unit directories. @@ -123481,7 +106461,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_list_user_transient_unit_dirs" lineno="912"> +<interface name="systemd_list_user_transient_unit_dirs" lineno="913"> <summary> Allow the specified domain to list the contents of systemd user transient unit directories. @@ -123492,7 +106472,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_get_user_transient_units_status" lineno="930"> +<interface name="systemd_get_user_transient_units_status" lineno="931"> <summary> Allow the specified domain to get the status of systemd user transient units. </summary> @@ -123502,7 +106482,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_start_user_transient_units" lineno="949"> +<interface name="systemd_start_user_transient_units" lineno="950"> <summary> Allow the specified domain to start systemd user transient units. </summary> @@ -123512,7 +106492,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_stop_user_transient_units" lineno="968"> +<interface name="systemd_stop_user_transient_units" lineno="969"> <summary> Allow the specified domain to stop systemd user transient units. </summary> @@ -123522,7 +106502,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_reload_user_transient_units" lineno="987"> +<interface name="systemd_reload_user_transient_units" lineno="988"> <summary> Allow the specified domain to reload systemd user transient units. </summary> @@ -123532,7 +106512,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_log_parse_environment" lineno="1007"> +<interface name="systemd_log_parse_environment" lineno="1008"> <summary> Make the specified type usable as an log parse environment type. @@ -123543,7 +106523,7 @@ Type to be used as a log parse environment type. </summary> </param> </interface> -<interface name="systemd_use_nss" lineno="1027"> +<interface name="systemd_use_nss" lineno="1028"> <summary> Allow domain to use systemd's Name Service Switch (NSS) module. This module provides UNIX user and group name resolution for dynamic users @@ -123555,7 +106535,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="systemd_PrivateDevices" lineno="1054"> +<interface name="systemd_PrivateDevices" lineno="1055"> <summary> Allow domain to be used as a systemd service with a unit that uses PrivateDevices=yes in section [Service]. @@ -123566,7 +106546,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="systemd_rw_homework_semaphores" lineno="1071"> +<interface name="systemd_rw_homework_semaphores" lineno="1072"> <summary> Read and write systemd-homework semaphores. </summary> @@ -123576,7 +106556,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="systemd_read_hwdb" lineno="1089"> +<interface name="systemd_read_hwdb" lineno="1090"> <summary> Allow domain to read udev hwdb file </summary> @@ -123586,7 +106566,7 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_map_hwdb" lineno="1107"> +<interface name="systemd_map_hwdb" lineno="1108"> <summary> Allow domain to map udev hwdb file </summary> @@ -123596,9 +106576,9 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_read_logind_pids" lineno="1125"> +<interface name="systemd_watch_logind_runtime_dirs" lineno="1126"> <summary> -Read systemd_login PID files. (Deprecated) +Watch systemd-logind runtime dirs. </summary> <param name="domain"> <summary> @@ -123606,9 +106586,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_logind_pid_pipes" lineno="1140"> +<interface name="systemd_read_logind_runtime_files" lineno="1145"> <summary> -Manage systemd_login PID pipes. (Deprecated) +Read systemd-logind runtime files. </summary> <param name="domain"> <summary> @@ -123616,9 +106596,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_logind_pid_pipes" lineno="1155"> +<interface name="systemd_manage_logind_runtime_pipes" lineno="1165"> <summary> -Write systemd_login named pipe. (Deprecated) +Manage systemd-logind runtime pipes. </summary> <param name="domain"> <summary> @@ -123626,9 +106606,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_watch_logind_runtime_dirs" lineno="1170"> +<interface name="systemd_write_logind_runtime_pipes" lineno="1184"> <summary> -Watch systemd-logind runtime dirs. +Write systemd-logind runtime named pipe. </summary> <param name="domain"> <summary> @@ -123636,9 +106616,10 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_logind_runtime_files" lineno="1189"> +<interface name="systemd_use_logind_fds" lineno="1205"> <summary> -Read systemd-logind runtime files. +Use inherited systemd +logind file descriptors. </summary> <param name="domain"> <summary> @@ -123646,9 +106627,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_logind_runtime_pipes" lineno="1209"> +<interface name="systemd_watch_logind_sessions_dirs" lineno="1223"> <summary> -Manage systemd-logind runtime pipes. +Watch logind sessions dirs. </summary> <param name="domain"> <summary> @@ -123656,9 +106637,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_logind_runtime_pipes" lineno="1228"> +<interface name="systemd_read_logind_sessions_files" lineno="1242"> <summary> -Write systemd-logind runtime named pipe. +Read logind sessions files. </summary> <param name="domain"> <summary> @@ -123666,10 +106647,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_use_logind_fds" lineno="1249"> +<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1263"> <summary> -Use inherited systemd -logind file descriptors. +Write inherited logind sessions pipes. </summary> <param name="domain"> <summary> @@ -123677,9 +106657,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_watch_logind_sessions_dirs" lineno="1267"> +<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1283"> <summary> -Watch logind sessions dirs. +Write inherited logind inhibit pipes. </summary> <param name="domain"> <summary> @@ -123687,9 +106667,10 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_logind_sessions_files" lineno="1286"> +<interface name="systemd_dbus_chat_logind" lineno="1304"> <summary> -Read logind sessions files. +Send and receive messages from +systemd logind over dbus. </summary> <param name="domain"> <summary> @@ -123697,9 +106678,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1307"> +<interface name="systemd_status_logind" lineno="1324"> <summary> -Write inherited logind sessions pipes. +Get the system status information from systemd_login </summary> <param name="domain"> <summary> @@ -123707,9 +106688,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1327"> +<interface name="systemd_signull_logind" lineno="1343"> <summary> -Write inherited logind inhibit pipes. +Send systemd_login a null signal. </summary> <param name="domain"> <summary> @@ -123717,10 +106698,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_dbus_chat_logind" lineno="1348"> +<interface name="systemd_list_userdb_runtime_dirs" lineno="1361"> <summary> -Send and receive messages from -systemd logind over dbus. +List the contents of systemd userdb runtime directories. </summary> <param name="domain"> <summary> @@ -123728,9 +106708,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_status_logind" lineno="1368"> +<interface name="systemd_manage_userdb_runtime_dirs" lineno="1379"> <summary> -Get the system status information from systemd_login +Manage systemd userdb runtime directories. </summary> <param name="domain"> <summary> @@ -123738,9 +106718,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_signull_logind" lineno="1387"> +<interface name="systemd_read_userdb_runtime_files" lineno="1397"> <summary> -Send systemd_login a null signal. +Read systemd userdb runtime files. </summary> <param name="domain"> <summary> @@ -123748,9 +106728,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_userdb_runtime_dirs" lineno="1405"> +<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1415"> <summary> -Manage systemd userdb runtime directories. +Manage socket files under /run/systemd/userdb . </summary> <param name="domain"> <summary> @@ -123758,9 +106738,9 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1423"> +<interface name="systemd_stream_connect_userdb" lineno="1433"> <summary> -Manage socket files under /run/systemd/userdb . +Connect to /run/systemd/userdb/io.systemd.DynamicUser . </summary> <param name="domain"> <summary> @@ -123768,27 +106748,27 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_stream_connect_userdb" lineno="1441"> +<interface name="systemd_read_machines" lineno="1455"> <summary> -Connect to /run/systemd/userdb/io.systemd.DynamicUser . +Allow reading /run/systemd/machines </summary> <param name="domain"> <summary> -Domain allowed access. +Domain that can access the machines files </summary> </param> </interface> -<interface name="systemd_read_machines" lineno="1463"> +<interface name="systemd_watch_machines_dirs" lineno="1474"> <summary> -Allow reading /run/systemd/machines +Allow watching /run/systemd/machines </summary> <param name="domain"> <summary> -Domain that can access the machines files +Domain allowed access. </summary> </param> </interface> -<interface name="systemd_connect_machined" lineno="1482"> +<interface name="systemd_connect_machined" lineno="1492"> <summary> Allow connecting to /run/systemd/userdb/io.systemd.Machine socket </summary> @@ -123798,7 +106778,7 @@ Domain that can access the socket </summary> </param> </interface> -<interface name="systemd_dbus_chat_machined" lineno="1501"> +<interface name="systemd_dbus_chat_machined" lineno="1511"> <summary> Send and receive messages from systemd machined over dbus. @@ -123809,7 +106789,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_dbus_chat_hostnamed" lineno="1522"> +<interface name="systemd_dbus_chat_hostnamed" lineno="1532"> <summary> Send and receive messages from systemd hostnamed over dbus. @@ -123820,7 +106800,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_use_passwd_agent_fds" lineno="1542"> +<interface name="systemd_use_passwd_agent_fds" lineno="1552"> <summary> allow systemd_passwd_agent to inherit fds </summary> @@ -123830,7 +106810,7 @@ Domain that owns the fds </summary> </param> </interface> -<interface name="systemd_run_passwd_agent" lineno="1565"> +<interface name="systemd_run_passwd_agent" lineno="1575"> <summary> allow systemd_passwd_agent to be run by admin </summary> @@ -123845,7 +106825,7 @@ role that it runs in </summary> </param> </interface> -<interface name="systemd_use_passwd_agent" lineno="1586"> +<interface name="systemd_use_passwd_agent" lineno="1596"> <summary> Allow a systemd_passwd_agent_t process to interact with a daemon that needs a password from the sysadmin. @@ -123856,7 +106836,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1610"> +<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1620"> <summary> Transition to systemd_passwd_runtime_t when creating dirs </summary> @@ -123866,7 +106846,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1631"> +<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1641"> <summary> Transition to systemd_userdbd_runtime_t when creating the userdb directory inside an init runtime @@ -123878,7 +106858,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1649"> +<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1659"> <summary> Allow to domain to create systemd-passwd symlink </summary> @@ -123888,7 +106868,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_watch_passwd_runtime_dirs" lineno="1667"> +<interface name="systemd_watch_passwd_runtime_dirs" lineno="1677"> <summary> Allow a domain to watch systemd-passwd runtime dirs. </summary> @@ -123898,17 +106878,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_all_units" lineno="1685"> -<summary> -manage systemd unit dirs and the files in them (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="systemd_list_journal_dirs" lineno="1700"> +<interface name="systemd_list_journal_dirs" lineno="1695"> <summary> Allow domain to list the contents of systemd_journal_t dirs </summary> @@ -123918,7 +106888,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_journal_files" lineno="1718"> +<interface name="systemd_read_journal_files" lineno="1713"> <summary> Allow domain to read systemd_journal_t files </summary> @@ -123928,7 +106898,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_journal_files" lineno="1737"> +<interface name="systemd_manage_journal_files" lineno="1732"> <summary> Allow domain to create/manage systemd_journal_t files </summary> @@ -123938,7 +106908,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_watch_journal_dirs" lineno="1757"> +<interface name="systemd_watch_journal_dirs" lineno="1752"> <summary> Allow domain to add a watch on systemd_journal_t directories </summary> @@ -123948,7 +106918,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_journal_dirs" lineno="1775"> +<interface name="systemd_relabelto_journal_dirs" lineno="1770"> <summary> Relabel to systemd-journald directory type. </summary> @@ -123958,7 +106928,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_journal_files" lineno="1794"> +<interface name="systemd_relabelto_journal_files" lineno="1789"> <summary> Relabel to systemd-journald file type. </summary> @@ -123968,7 +106938,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_networkd_units" lineno="1814"> +<interface name="systemd_read_networkd_units" lineno="1809"> <summary> Allow domain to read systemd_networkd_t unit files </summary> @@ -123978,7 +106948,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_manage_networkd_units" lineno="1834"> +<interface name="systemd_manage_networkd_units" lineno="1829"> <summary> Allow domain to create/manage systemd_networkd_t unit files </summary> @@ -123988,7 +106958,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_enabledisable_networkd" lineno="1854"> +<interface name="systemd_enabledisable_networkd" lineno="1849"> <summary> Allow specified domain to enable systemd-networkd units </summary> @@ -123998,7 +106968,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_startstop_networkd" lineno="1873"> +<interface name="systemd_startstop_networkd" lineno="1868"> <summary> Allow specified domain to start systemd-networkd units </summary> @@ -124008,7 +106978,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_dbus_chat_networkd" lineno="1893"> +<interface name="systemd_dbus_chat_networkd" lineno="1888"> <summary> Send and receive messages from systemd networkd over dbus. @@ -124019,7 +106989,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_status_networkd" lineno="1913"> +<interface name="systemd_status_networkd" lineno="1908"> <summary> Allow specified domain to get status of systemd-networkd </summary> @@ -124029,7 +106999,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1932"> +<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1927"> <summary> Relabel systemd_networkd tun socket. </summary> @@ -124039,7 +107009,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1950"> +<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1945"> <summary> Read/Write from systemd_networkd netlink route socket. </summary> @@ -124049,7 +107019,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_list_networkd_runtime" lineno="1968"> +<interface name="systemd_list_networkd_runtime" lineno="1963"> <summary> Allow domain to list dirs under /run/systemd/netif </summary> @@ -124059,7 +107029,7 @@ domain permitted the access </summary> </param> </interface> -<interface name="systemd_watch_networkd_runtime_dirs" lineno="1987"> +<interface name="systemd_watch_networkd_runtime_dirs" lineno="1982"> <summary> Watch directories under /run/systemd/netif </summary> @@ -124069,7 +107039,7 @@ Domain permitted the access </summary> </param> </interface> -<interface name="systemd_read_networkd_runtime" lineno="2006"> +<interface name="systemd_read_networkd_runtime" lineno="2001"> <summary> Allow domain to read files generated by systemd_networkd </summary> @@ -124079,7 +107049,7 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_read_logind_state" lineno="2025"> +<interface name="systemd_read_logind_state" lineno="2020"> <summary> Allow systemd_logind_t to read process state for cgroup file </summary> @@ -124089,7 +107059,7 @@ Domain systemd_logind_t may access. </summary> </param> </interface> -<interface name="systemd_create_logind_linger_dir" lineno="2046"> +<interface name="systemd_create_logind_linger_dir" lineno="2041"> <summary> Allow the specified domain to create the systemd-logind linger directory with @@ -124101,7 +107071,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_start_user_manager_units" lineno="2066"> +<interface name="systemd_start_user_manager_units" lineno="2061"> <summary> Allow the specified domain to start systemd user manager units (systemd --user). @@ -124112,7 +107082,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_stop_user_manager_units" lineno="2086"> +<interface name="systemd_stop_user_manager_units" lineno="2081"> <summary> Allow the specified domain to stop systemd user manager units (systemd --user). @@ -124123,7 +107093,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_reload_user_manager_units" lineno="2106"> +<interface name="systemd_reload_user_manager_units" lineno="2101"> <summary> Allow the specified domain to reload systemd user manager units (systemd --user). @@ -124134,7 +107104,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_get_user_manager_units_status" lineno="2126"> +<interface name="systemd_get_user_manager_units_status" lineno="2121"> <summary> Get the status of systemd user manager units (systemd --user). @@ -124145,7 +107115,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_start_power_units" lineno="2145"> +<interface name="systemd_start_power_units" lineno="2140"> <summary> Allow specified domain to start power units </summary> @@ -124155,7 +107125,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="systemd_status_power_units" lineno="2164"> +<interface name="systemd_status_power_units" lineno="2159"> <summary> Get the system status information about power units </summary> @@ -124165,7 +107135,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_stream_connect_socket_proxyd" lineno="2183"> +<interface name="systemd_stream_connect_socket_proxyd" lineno="2178"> <summary> Allows connections to the systemd-socket-proxyd's socket. </summary> @@ -124175,7 +107145,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_tmpfiles_conf_file" lineno="2202"> +<interface name="systemd_tmpfiles_conf_file" lineno="2197"> <summary> Make the specified type usable for systemd tmpfiles config files. @@ -124186,7 +107156,7 @@ Type to be used for systemd tmpfiles config files. </summary> </param> </interface> -<interface name="systemd_tmpfiles_creator" lineno="2223"> +<interface name="systemd_tmpfiles_creator" lineno="2218"> <summary> Allow the specified domain to create the tmpfiles config directory with @@ -124198,7 +107168,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_tmpfiles_conf_filetrans" lineno="2259"> +<interface name="systemd_tmpfiles_conf_filetrans" lineno="2254"> <summary> Create an object in the systemd tmpfiles config directory, with a private type @@ -124225,7 +107195,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="systemd_list_tmpfiles_conf" lineno="2278"> +<interface name="systemd_list_tmpfiles_conf" lineno="2273"> <summary> Allow domain to list systemd tmpfiles config directory </summary> @@ -124235,7 +107205,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2296"> +<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2291"> <summary> Allow domain to relabel to systemd tmpfiles config directory </summary> @@ -124245,7 +107215,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2314"> +<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2309"> <summary> Allow domain to relabel to systemd tmpfiles config files </summary> @@ -124255,7 +107225,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_tmpfilesd_managed" lineno="2332"> +<interface name="systemd_tmpfilesd_managed" lineno="2327"> <summary> Allow systemd_tmpfiles_t to manage filesystem objects </summary> @@ -124265,7 +107235,7 @@ Type of object to manage </summary> </param> </interface> -<interface name="systemd_stream_connect_resolved" lineno="2359"> +<interface name="systemd_stream_connect_resolved" lineno="2354"> <summary> Connect to systemd resolved over /run/systemd/resolve/io.systemd.Resolve . @@ -124276,7 +107246,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_dbus_chat_resolved" lineno="2380"> +<interface name="systemd_dbus_chat_resolved" lineno="2375"> <summary> Send and receive messages from systemd resolved over dbus. @@ -124287,7 +107257,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_read_resolved_runtime" lineno="2400"> +<interface name="systemd_read_resolved_runtime" lineno="2395"> <summary> Allow domain to read resolv.conf file generated by systemd_resolved </summary> @@ -124297,7 +107267,7 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_exec_systemctl" lineno="2422"> +<interface name="systemd_exec_systemctl" lineno="2417"> <summary> Execute the systemctl program. </summary> @@ -124307,7 +107277,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_getattr_updated_runtime" lineno="2453"> +<interface name="systemd_getattr_updated_runtime" lineno="2448"> <summary> Allow domain to getattr on .updated file (generated by systemd-update-done </summary> @@ -124317,7 +107287,7 @@ domain allowed access </summary> </param> </interface> -<interface name="systemd_search_all_user_keys" lineno="2471"> +<interface name="systemd_search_all_user_keys" lineno="2466"> <summary> Search keys for the all systemd --user domains. </summary> @@ -124327,7 +107297,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_create_all_user_keys" lineno="2489"> +<interface name="systemd_create_all_user_keys" lineno="2484"> <summary> Create keys for the all systemd --user domains. </summary> @@ -124337,7 +107307,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_write_all_user_keys" lineno="2507"> +<interface name="systemd_write_all_user_keys" lineno="2502"> <summary> Write keys for the all systemd --user domains. </summary> @@ -124347,7 +107317,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_domtrans_sysusers" lineno="2526"> +<interface name="systemd_domtrans_sysusers" lineno="2521"> <summary> Execute systemd-sysusers in the systemd sysusers domain. @@ -124358,7 +107328,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="systemd_run_sysusers" lineno="2551"> +<interface name="systemd_run_sysusers" lineno="2546"> <summary> Run systemd-sysusers with a domain transition. </summary> @@ -124374,7 +107344,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="systemd_use_inherited_machined_ptys" lineno="2571"> +<interface name="systemd_use_inherited_machined_ptys" lineno="2566"> <summary> receive and use a systemd_machined_devpts_t file handle </summary> @@ -124877,7 +107847,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="udev_dontaudit_rw_runtime_files" lineno="591"> +<interface name="udev_dontaudit_rw_runtime_files" lineno="592"> <summary> dontaudit attempts to read/write udev runtime files. </summary> @@ -124887,7 +107857,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="udev_manage_runtime_files" lineno="610"> +<interface name="udev_manage_runtime_files" lineno="611"> <summary> Create, read, write, and delete udev runtime files. @@ -124898,7 +107868,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="udev_domtrans_udevadm" lineno="629"> +<interface name="udev_domtrans_udevadm" lineno="630"> <summary> Execute udev admin in the udevadm domain. </summary> @@ -124908,7 +107878,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="udevadm_domtrans" lineno="647"> +<interface name="udevadm_domtrans" lineno="648"> <summary> Execute udev admin in the udevadm domain. (Deprecated) </summary> @@ -124918,7 +107888,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="udevadm_run" lineno="669"> +<interface name="udevadm_run" lineno="670"> <summary> Execute udevadm in the udevadm domain, and allow the specified role the udevadm domain. (Deprecated) @@ -124935,7 +107905,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="udev_run_udevadm" lineno="691"> +<interface name="udev_run_udevadm" lineno="692"> <summary> Execute udevadm in the udevadm domain, and allow the specified role the udevadm domain. @@ -124952,7 +107922,7 @@ Role allowed access. </param> <rolecap/> </interface> -<interface name="udevadm_exec" lineno="710"> +<interface name="udevadm_exec" lineno="711"> <summary> Execute udevadm in the caller domain. (Deprecated) </summary> @@ -124962,7 +107932,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="udev_exec_udevadm" lineno="725"> +<interface name="udev_exec_udevadm" lineno="726"> <summary> Execute udevadm in the caller domain. </summary> @@ -124972,7 +107942,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="udev_pid_filetrans_rules" lineno="755"> +<interface name="udev_pid_filetrans_rules" lineno="756"> <summary> Write in /var/run/udev with the udev_rules_t (udev rules) file type </summary> @@ -124992,7 +107962,7 @@ Name of the directory that the file transition will work on </summary> </param> </interface> -<interface name="udev_create_rules_dirs" lineno="774"> +<interface name="udev_create_rules_dirs" lineno="775"> <summary> Create udev rules directories </summary> @@ -125660,7 +108630,7 @@ is the prefix for sysadm_t). </summary> </param> </template> -<interface name="userdom_security_admin_template" lineno="1505"> +<interface name="userdom_security_admin_template" lineno="1506"> <summary> Allow user to run as a secadm </summary> @@ -125686,7 +108656,7 @@ The role of the object to create. </summary> </param> </interface> -<template name="userdom_xdg_user_template" lineno="1608"> +<template name="userdom_xdg_user_template" lineno="1609"> <summary> Allow user to interact with xdg content types </summary> @@ -125707,7 +108677,7 @@ Domain allowed access. </summary> </param> </template> -<interface name="userdom_user_application_type" lineno="1657"> +<interface name="userdom_user_application_type" lineno="1658"> <summary> Make the specified type usable as a user application domain type. @@ -125718,7 +108688,7 @@ Type to be used as a user application domain. </summary> </param> </interface> -<interface name="userdom_user_application_domain" lineno="1678"> +<interface name="userdom_user_application_domain" lineno="1679"> <summary> Make the specified type usable as a user application domain. @@ -125734,7 +108704,7 @@ Type to be used as the domain entry point. </summary> </param> </interface> -<interface name="userdom_user_home_content" lineno="1695"> +<interface name="userdom_user_home_content" lineno="1696"> <summary> Make the specified type usable in a user home directory. @@ -125746,7 +108716,7 @@ user home directory. </summary> </param> </interface> -<interface name="userdom_user_tmp_file" lineno="1721"> +<interface name="userdom_user_tmp_file" lineno="1722"> <summary> Make the specified type usable as a user temporary file. @@ -125758,7 +108728,7 @@ temporary directories. </summary> </param> </interface> -<interface name="userdom_user_tmpfs_file" lineno="1738"> +<interface name="userdom_user_tmpfs_file" lineno="1739"> <summary> Make the specified type usable as a user tmpfs file. @@ -125770,7 +108740,7 @@ tmpfs directories. </summary> </param> </interface> -<interface name="userdom_attach_admin_tun_iface" lineno="1753"> +<interface name="userdom_attach_admin_tun_iface" lineno="1754"> <summary> Allow domain to attach to TUN devices created by administrative users. </summary> @@ -125780,7 +108750,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_setattr_user_ptys" lineno="1772"> +<interface name="userdom_setattr_user_ptys" lineno="1773"> <summary> Set the attributes of a user pty. </summary> @@ -125790,7 +108760,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_create_user_pty" lineno="1790"> +<interface name="userdom_create_user_pty" lineno="1791"> <summary> Create a user pty. </summary> @@ -125800,7 +108770,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_getattr_user_home_dirs" lineno="1808"> +<interface name="userdom_getattr_user_home_dirs" lineno="1809"> <summary> Get the attributes of user home directories. </summary> @@ -125810,7 +108780,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1827"> +<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1828"> <summary> Do not audit attempts to get the attributes of user home directories. </summary> @@ -125820,7 +108790,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_search_user_home_dirs" lineno="1845"> +<interface name="userdom_search_user_home_dirs" lineno="1846"> <summary> Search user home directories. </summary> @@ -125830,7 +108800,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1872"> +<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1873"> <summary> Do not audit attempts to search user home directories. </summary> @@ -125848,7 +108818,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="userdom_list_user_home_dirs" lineno="1890"> +<interface name="userdom_list_user_home_dirs" lineno="1891"> <summary> List user home directories. </summary> @@ -125858,7 +108828,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1909"> +<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1910"> <summary> Do not audit attempts to list user home subdirectories. </summary> @@ -125868,7 +108838,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_create_user_home_dirs" lineno="1927"> +<interface name="userdom_create_user_home_dirs" lineno="1928"> <summary> Create user home directories. </summary> @@ -125878,7 +108848,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_home_dirs" lineno="1945"> +<interface name="userdom_manage_user_home_dirs" lineno="1946"> <summary> Manage user home directories. </summary> @@ -125888,7 +108858,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabelto_user_home_dirs" lineno="1963"> +<interface name="userdom_dontaudit_manage_user_home_dirs" lineno="1965"> +<summary> +Do not audit attempts to manage user +home directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_relabelto_user_home_dirs" lineno="1983"> <summary> Relabel to user home directories. </summary> @@ -125898,7 +108879,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_home_filetrans_user_home_dir" lineno="1987"> +<interface name="userdom_home_filetrans_user_home_dir" lineno="2007"> <summary> Create directories in the home dir root with the user home directory type. @@ -125914,7 +108895,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_home_domtrans" lineno="2024"> +<interface name="userdom_user_home_domtrans" lineno="2044"> <summary> Do a domain transition to the specified domain when executing a program in the @@ -125943,7 +108924,7 @@ Domain to transition to. </summary> </param> </interface> -<interface name="userdom_dontaudit_search_user_home_content" lineno="2044"> +<interface name="userdom_dontaudit_search_user_home_content" lineno="2064"> <summary> Do not audit attempts to search user home content directories. </summary> @@ -125953,7 +108934,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_list_all_user_home_content" lineno="2062"> +<interface name="userdom_list_all_user_home_content" lineno="2082"> <summary> List all users home content directories. </summary> @@ -125963,7 +108944,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_list_user_home_content" lineno="2081"> +<interface name="userdom_list_user_home_content" lineno="2101"> <summary> List contents of users home directory. </summary> @@ -125973,7 +108954,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_home_content_dirs" lineno="2100"> +<interface name="userdom_manage_user_home_content_dirs" lineno="2120"> <summary> Create, read, write, and delete directories in a user home subdirectory. @@ -125984,7 +108965,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_home_content_dirs" lineno="2119"> +<interface name="userdom_delete_all_user_home_content_dirs" lineno="2139"> <summary> Delete all user home content directories. </summary> @@ -125994,7 +108975,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_home_content_dirs" lineno="2139"> +<interface name="userdom_delete_user_home_content_dirs" lineno="2159"> <summary> Delete directories in a user home subdirectory. </summary> @@ -126004,7 +108985,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2157"> +<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2177"> <summary> Set attributes of all user home content directories. </summary> @@ -126014,7 +108995,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2177"> +<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2197"> <summary> Do not audit attempts to set the attributes of user home files. @@ -126025,7 +109006,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_map_user_home_content_files" lineno="2195"> +<interface name="userdom_map_user_home_content_files" lineno="2215"> <summary> Map user home files. </summary> @@ -126035,7 +109016,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_mmap_user_home_content_files" lineno="2213"> +<interface name="userdom_mmap_user_home_content_files" lineno="2233"> <summary> Mmap user home files. </summary> @@ -126045,7 +109026,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_read_user_home_content_files" lineno="2232"> +<interface name="userdom_read_user_home_content_files" lineno="2252"> <summary> Read user home files. </summary> @@ -126055,7 +109036,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2251"> +<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2271"> <summary> Do not audit attempts to read user home files. </summary> @@ -126065,7 +109046,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_read_all_user_home_content" lineno="2270"> +<interface name="userdom_read_all_user_home_content" lineno="2290"> <summary> Read all user home content, including application-specific resources. </summary> @@ -126075,7 +109056,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="userdom_manage_all_user_home_content" lineno="2292"> +<interface name="userdom_manage_all_user_home_content" lineno="2312"> <summary> Manage all user home content, including application-specific resources. </summary> @@ -126085,7 +109066,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="userdom_map_all_user_home_content_files" lineno="2314"> +<interface name="userdom_map_all_user_home_content_files" lineno="2334"> <summary> Map all user home content, including application-specific resources. </summary> @@ -126095,7 +109076,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2332"> +<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2352"> <summary> Do not audit attempts to append user home files. </summary> @@ -126105,7 +109086,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2350"> +<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2370"> <summary> Do not audit attempts to write user home files. </summary> @@ -126115,7 +109096,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_delete_all_user_home_content_files" lineno="2368"> +<interface name="userdom_delete_all_user_home_content_files" lineno="2388"> <summary> Delete all user home content files. </summary> @@ -126125,7 +109106,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_home_content_files" lineno="2388"> +<interface name="userdom_delete_user_home_content_files" lineno="2408"> <summary> Delete files in a user home subdirectory. </summary> @@ -126135,7 +109116,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_generic_user_home_dirs" lineno="2406"> +<interface name="userdom_relabel_generic_user_home_dirs" lineno="2426"> <summary> Relabel generic user home dirs. </summary> @@ -126145,7 +109126,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_generic_user_home_files" lineno="2424"> +<interface name="userdom_relabel_generic_user_home_files" lineno="2444"> <summary> Relabel generic user home files. </summary> @@ -126155,7 +109136,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2442"> +<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2462"> <summary> Do not audit attempts to relabel user home files. </summary> @@ -126165,7 +109146,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_read_user_home_content_symlinks" lineno="2460"> +<interface name="userdom_read_user_home_content_symlinks" lineno="2480"> <summary> Read user home subdirectory symbolic links. </summary> @@ -126175,7 +109156,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_exec_user_home_content_files" lineno="2480"> +<interface name="userdom_exec_user_home_content_files" lineno="2500"> <summary> Execute user home files. </summary> @@ -126186,7 +109167,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2507"> +<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2527"> <summary> Do not audit attempts to execute user home files. </summary> @@ -126196,7 +109177,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_manage_user_home_content_files" lineno="2526"> +<interface name="userdom_manage_user_home_content_files" lineno="2546"> <summary> Create, read, write, and delete files in a user home subdirectory. @@ -126207,7 +109188,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2547"> +<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2567"> <summary> Do not audit attempts to create, read, write, and delete directories in a user home subdirectory. @@ -126218,7 +109199,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_manage_user_home_content_symlinks" lineno="2566"> +<interface name="userdom_manage_user_home_content_symlinks" lineno="2586"> <summary> Create, read, write, and delete symbolic links in a user home subdirectory. @@ -126229,7 +109210,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2586"> +<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2606"> <summary> Delete all user home content symbolic links. </summary> @@ -126239,7 +109220,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_home_content_symlinks" lineno="2606"> +<interface name="userdom_delete_user_home_content_symlinks" lineno="2626"> <summary> Delete symbolic links in a user home directory. </summary> @@ -126249,7 +109230,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_home_content_pipes" lineno="2625"> +<interface name="userdom_manage_user_home_content_pipes" lineno="2645"> <summary> Create, read, write, and delete named pipes in a user home subdirectory. @@ -126260,7 +109241,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_home_content_sockets" lineno="2646"> +<interface name="userdom_manage_user_home_content_sockets" lineno="2666"> <summary> Create, read, write, and delete named sockets in a user home subdirectory. @@ -126271,7 +109252,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_user_home_dir_filetrans" lineno="2683"> +<interface name="userdom_user_home_dir_filetrans" lineno="2703"> <summary> Create objects in a user home directory with an automatic type transition to @@ -126298,7 +109279,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_home_content_filetrans" lineno="2720"> +<interface name="userdom_user_home_content_filetrans" lineno="2740"> <summary> Create objects in a directory located in a user home directory with an @@ -126326,7 +109307,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2751"> +<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2771"> <summary> Automatically use the user_cert_t label for selected resources created in a users home directory @@ -126347,7 +109328,7 @@ Name of the resource that is being created </summary> </param> </interface> -<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2781"> +<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2801"> <summary> Create objects in a user home directory with an automatic type transition to @@ -126369,7 +109350,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_exec_user_bin_files" lineno="2800"> +<interface name="userdom_exec_user_bin_files" lineno="2820"> <summary> Execute user executable files. </summary> @@ -126379,7 +109360,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_bin" lineno="2820"> +<interface name="userdom_manage_user_bin" lineno="2840"> <summary> Manage user executable files. </summary> @@ -126389,7 +109370,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_read_user_certs" lineno="2842"> +<interface name="userdom_read_user_certs" lineno="2862"> <summary> Read user SSL certificates. </summary> @@ -126400,7 +109381,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="userdom_dontaudit_manage_user_certs" lineno="2865"> +<interface name="userdom_dontaudit_manage_user_certs" lineno="2885"> <summary> Do not audit attempts to manage the user SSL certificates. @@ -126412,7 +109393,7 @@ Domain allowed access. </param> <rolecap/> </interface> -<interface name="userdom_manage_user_certs" lineno="2885"> +<interface name="userdom_manage_user_certs" lineno="2905"> <summary> Manage user SSL certificates. </summary> @@ -126422,7 +109403,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_write_user_tmp_sockets" lineno="2906"> +<interface name="userdom_write_user_tmp_sockets" lineno="2926"> <summary> Write to user temporary named sockets. </summary> @@ -126432,7 +109413,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_list_user_tmp" lineno="2926"> +<interface name="userdom_list_user_tmp" lineno="2946"> <summary> List user temporary directories. </summary> @@ -126442,7 +109423,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_list_user_tmp" lineno="2948"> +<interface name="userdom_dontaudit_list_user_tmp" lineno="2968"> <summary> Do not audit attempts to list user temporary directories. @@ -126453,7 +109434,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_delete_user_tmp_dirs" lineno="2966"> +<interface name="userdom_delete_user_tmp_dirs" lineno="2986"> <summary> Delete users temporary directories. </summary> @@ -126463,7 +109444,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2985"> +<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="3005"> <summary> Do not audit attempts to manage users temporary directories. @@ -126474,7 +109455,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_read_user_tmp_files" lineno="3003"> +<interface name="userdom_read_user_tmp_files" lineno="3023"> <summary> Read user temporary files. </summary> @@ -126484,7 +109465,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_map_user_tmp_files" lineno="3024"> +<interface name="userdom_map_user_tmp_files" lineno="3044"> <summary> Map user temporary files. </summary> @@ -126494,7 +109475,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3043"> +<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3063"> <summary> Do not audit attempts to read users temporary files. @@ -126505,7 +109486,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3062"> +<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3082"> <summary> Do not audit attempts to append users temporary files. @@ -126516,7 +109497,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_rw_user_tmp_files" lineno="3080"> +<interface name="userdom_rw_user_tmp_files" lineno="3100"> <summary> Read and write user temporary files. </summary> @@ -126526,7 +109507,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_tmp_files" lineno="3101"> +<interface name="userdom_delete_user_tmp_files" lineno="3121"> <summary> Delete users temporary files. </summary> @@ -126536,7 +109517,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3120"> +<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3140"> <summary> Do not audit attempts to manage users temporary files. @@ -126547,7 +109528,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_read_user_tmp_symlinks" lineno="3138"> +<interface name="userdom_read_user_tmp_symlinks" lineno="3158"> <summary> Read user temporary symbolic links. </summary> @@ -126557,7 +109538,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_tmp_symlinks" lineno="3159"> +<interface name="userdom_delete_user_tmp_symlinks" lineno="3179"> <summary> Delete users temporary symbolic links. </summary> @@ -126567,7 +109548,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_dirs" lineno="3178"> +<interface name="userdom_manage_user_tmp_dirs" lineno="3198"> <summary> Create, read, write, and delete user temporary directories. @@ -126578,7 +109559,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_tmp_named_pipes" lineno="3198"> +<interface name="userdom_delete_user_tmp_named_pipes" lineno="3218"> <summary> Delete users temporary named pipes. </summary> @@ -126588,7 +109569,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_files" lineno="3217"> +<interface name="userdom_manage_user_tmp_files" lineno="3237"> <summary> Create, read, write, and delete user temporary files. @@ -126599,7 +109580,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_tmp_named_sockets" lineno="3237"> +<interface name="userdom_delete_user_tmp_named_sockets" lineno="3257"> <summary> Delete users temporary named sockets. </summary> @@ -126609,7 +109590,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_symlinks" lineno="3256"> +<interface name="userdom_manage_user_tmp_symlinks" lineno="3276"> <summary> Create, read, write, and delete user temporary symbolic links. @@ -126620,7 +109601,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3277"> +<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3297"> <summary> Do not audit attempts to read and write temporary pipes. @@ -126631,7 +109612,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_pipes" lineno="3296"> +<interface name="userdom_manage_user_tmp_pipes" lineno="3316"> <summary> Create, read, write, and delete user temporary named pipes. @@ -126642,7 +109623,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_sockets" lineno="3317"> +<interface name="userdom_manage_user_tmp_sockets" lineno="3337"> <summary> Create, read, write, and delete user temporary named sockets. @@ -126653,7 +109634,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_user_tmp_filetrans" lineno="3354"> +<interface name="userdom_user_tmp_filetrans" lineno="3374"> <summary> Create objects in a user temporary directory with an automatic type transition to @@ -126680,7 +109661,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_tmp_filetrans_user_tmp" lineno="3386"> +<interface name="userdom_tmp_filetrans_user_tmp" lineno="3406"> <summary> Create objects in the temporary directory with an automatic type transition to @@ -126702,7 +109683,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_map_user_tmpfs_files" lineno="3404"> +<interface name="userdom_map_user_tmpfs_files" lineno="3424"> <summary> Map user tmpfs files. </summary> @@ -126712,7 +109693,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_read_user_tmpfs_files" lineno="3422"> +<interface name="userdom_read_user_tmpfs_files" lineno="3442"> <summary> Read user tmpfs files. </summary> @@ -126722,7 +109703,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3442"> +<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3462"> <summary> dontaudit Read attempts of user tmpfs files. </summary> @@ -126732,7 +109713,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3461"> +<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3481"> <summary> relabel to/from user tmpfs dirs </summary> @@ -126742,7 +109723,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_user_tmpfs_files" lineno="3480"> +<interface name="userdom_relabel_user_tmpfs_files" lineno="3500"> <summary> relabel to/from user tmpfs files </summary> @@ -126752,7 +109733,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_user_runtime_content" lineno="3502"> +<interface name="userdom_user_runtime_content" lineno="3522"> <summary> Make the specified type usable in the directory /run/user/%{USERID}/. @@ -126764,7 +109745,7 @@ user_runtime_content_dir_t. </summary> </param> </interface> -<interface name="userdom_search_user_runtime" lineno="3522"> +<interface name="userdom_search_user_runtime" lineno="3542"> <summary> Search users runtime directories. </summary> @@ -126774,7 +109755,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_search_user_runtime_root" lineno="3541"> +<interface name="userdom_search_user_runtime_root" lineno="3561"> <summary> Search user runtime root directories. </summary> @@ -126784,7 +109765,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3561"> +<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3581"> <summary> Do not audit attempts to search user runtime root directories. @@ -126795,7 +109776,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_manage_user_runtime_root_dirs" lineno="3580"> +<interface name="userdom_manage_user_runtime_root_dirs" lineno="3600"> <summary> Create, read, write, and delete user runtime root dirs. @@ -126806,7 +109787,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3599"> +<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3619"> <summary> Relabel to and from user runtime root dirs. </summary> @@ -126816,7 +109797,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_runtime_dirs" lineno="3618"> +<interface name="userdom_manage_user_runtime_dirs" lineno="3638"> <summary> Create, read, write, and delete user runtime dirs. @@ -126827,7 +109808,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_mounton_user_runtime_dirs" lineno="3638"> +<interface name="userdom_mounton_user_runtime_dirs" lineno="3658"> <summary> Mount a filesystem on user runtime dir directories. @@ -126838,7 +109819,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabelto_user_runtime_dirs" lineno="3656"> +<interface name="userdom_relabelto_user_runtime_dirs" lineno="3676"> <summary> Relabel to user runtime directories. </summary> @@ -126848,7 +109829,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3674"> +<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3694"> <summary> Relabel from user runtime directories. </summary> @@ -126858,7 +109839,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_runtime_files" lineno="3692"> +<interface name="userdom_delete_user_runtime_files" lineno="3712"> <summary> delete user runtime files </summary> @@ -126868,7 +109849,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_search_all_user_runtime" lineno="3711"> +<interface name="userdom_search_all_user_runtime" lineno="3731"> <summary> Search users runtime directories. </summary> @@ -126878,7 +109859,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_list_all_user_runtime" lineno="3730"> +<interface name="userdom_list_all_user_runtime" lineno="3750"> <summary> List user runtime directories. </summary> @@ -126888,7 +109869,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_dirs" lineno="3749"> +<interface name="userdom_delete_all_user_runtime_dirs" lineno="3769"> <summary> delete user runtime directories </summary> @@ -126898,7 +109879,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_files" lineno="3767"> +<interface name="userdom_delete_all_user_runtime_files" lineno="3787"> <summary> delete user runtime files </summary> @@ -126908,7 +109889,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3785"> +<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3805"> <summary> delete user runtime symlink files </summary> @@ -126918,7 +109899,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3803"> +<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3823"> <summary> delete user runtime fifo files </summary> @@ -126928,7 +109909,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3821"> +<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3841"> <summary> delete user runtime socket files </summary> @@ -126938,7 +109919,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3839"> +<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3859"> <summary> delete user runtime blk files </summary> @@ -126948,7 +109929,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3857"> +<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3877"> <summary> delete user runtime chr files </summary> @@ -126958,29 +109939,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3887"> -<summary> -Create objects in the pid directory -with an automatic type transition to -the user runtime root type. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<param name="object_class"> -<summary> -The class of the object to be created. -</summary> -</param> -<param name="name" optional="true"> -<summary> -The name of the object being created. -</summary> -</param> -</interface> -<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3914"> +<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3907"> <summary> Create objects in the runtime directory with an automatic type transition to @@ -127002,7 +109961,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_runtime_filetrans" lineno="3950"> +<interface name="userdom_user_runtime_filetrans" lineno="3943"> <summary> Create objects in a user runtime directory with an automatic type @@ -127030,7 +109989,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3981"> +<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3974"> <summary> Create objects in the user runtime directory with an automatic type transition to @@ -127052,7 +110011,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4011"> +<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4004"> <summary> Create objects in the user runtime root directory with an automatic type transition @@ -127074,7 +110033,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_user_run_filetrans_user_runtime" lineno="4042"> +<interface name="userdom_user_run_filetrans_user_runtime" lineno="4035"> <summary> Create objects in the user runtime root directory with an automatic type transition @@ -127096,7 +110055,7 @@ The name of the object being created. </summary> </param> </interface> -<interface name="userdom_rw_user_tmpfs_files" lineno="4060"> +<interface name="userdom_rw_user_tmpfs_files" lineno="4053"> <summary> Read and write user tmpfs files. </summary> @@ -127106,7 +110065,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_delete_user_tmpfs_files" lineno="4081"> +<interface name="userdom_delete_user_tmpfs_files" lineno="4074"> <summary> Delete user tmpfs files. </summary> @@ -127116,7 +110075,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmpfs_files" lineno="4100"> +<interface name="userdom_manage_user_tmpfs_files" lineno="4093"> <summary> Create, read, write, and delete user tmpfs files. </summary> @@ -127126,7 +110085,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_getattr_user_ttys" lineno="4120"> +<interface name="userdom_getattr_user_ttys" lineno="4113"> <summary> Get the attributes of a user domain tty. </summary> @@ -127136,7 +110095,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4138"> +<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4131"> <summary> Do not audit attempts to get the attributes of a user domain tty. </summary> @@ -127146,7 +110105,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_setattr_user_ttys" lineno="4156"> +<interface name="userdom_setattr_user_ttys" lineno="4149"> <summary> Set the attributes of a user domain tty. </summary> @@ -127156,7 +110115,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4174"> +<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4167"> <summary> Do not audit attempts to set the attributes of a user domain tty. </summary> @@ -127166,7 +110125,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_use_user_ttys" lineno="4192"> +<interface name="userdom_use_user_ttys" lineno="4185"> <summary> Read and write a user domain tty. </summary> @@ -127176,7 +110135,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_use_user_ptys" lineno="4210"> +<interface name="userdom_use_user_ptys" lineno="4203"> <summary> Read and write a user domain pty. </summary> @@ -127186,7 +110145,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_use_inherited_user_terminals" lineno="4245"> +<interface name="userdom_use_inherited_user_terminals" lineno="4238"> <summary> Read and write a user TTYs and PTYs. </summary> @@ -127212,7 +110171,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="userdom_use_user_terminals" lineno="4286"> +<interface name="userdom_use_user_terminals" lineno="4279"> <summary> Read, write and open a user TTYs and PTYs. </summary> @@ -127244,7 +110203,7 @@ Domain allowed access. </param> <infoflow type="both" weight="10"/> </interface> -<interface name="userdom_dontaudit_use_user_terminals" lineno="4302"> +<interface name="userdom_dontaudit_use_user_terminals" lineno="4295"> <summary> Do not audit attempts to read and write a user domain tty and pty. @@ -127255,7 +110214,17 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_spec_domtrans_all_users" lineno="4323"> +<interface name="userdom_lock_user_terminals" lineno="4314"> +<summary> +Lock user TTYs and PTYs. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_spec_domtrans_all_users" lineno="4335"> <summary> Execute a shell in all user domains. This is an explicit transition, requiring the @@ -127267,7 +110236,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4346"> +<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4358"> <summary> Execute an Xserver session in all user domains. This is an explicit transition, requiring the @@ -127279,7 +110248,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="userdom_spec_domtrans_unpriv_users" lineno="4369"> +<interface name="userdom_spec_domtrans_unpriv_users" lineno="4381"> <summary> Execute a shell in all unprivileged user domains. This is an explicit transition, requiring the @@ -127291,7 +110260,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4392"> +<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4404"> <summary> Execute an Xserver session in all unprivileged user domains. This is an explicit transition, requiring the @@ -127303,7 +110272,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="userdom_rw_unpriv_user_semaphores" lineno="4413"> +<interface name="userdom_rw_unpriv_user_semaphores" lineno="4425"> <summary> Read and write unpriviledged user SysV sempaphores. </summary> @@ -127313,7 +110282,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_unpriv_user_semaphores" lineno="4431"> +<interface name="userdom_manage_unpriv_user_semaphores" lineno="4443"> <summary> Manage unpriviledged user SysV sempaphores. </summary> @@ -127323,7 +110292,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4450"> +<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4462"> <summary> Read and write unpriviledged user SysV shared memory segments. @@ -127334,7 +110303,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4469"> +<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4481"> <summary> Manage unpriviledged user SysV shared memory segments. @@ -127345,7 +110314,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4489"> +<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4501"> <summary> Execute bin_t in the unprivileged user domains. This is an explicit transition, requiring the @@ -127357,7 +110326,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4512"> +<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4524"> <summary> Execute all entrypoint files in unprivileged user domains. This is an explicit transition, requiring the @@ -127369,7 +110338,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_search_user_home_content" lineno="4533"> +<interface name="userdom_search_user_home_content" lineno="4545"> <summary> Search users home directories. </summary> @@ -127379,7 +110348,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_signull_unpriv_users" lineno="4552"> +<interface name="userdom_signull_unpriv_users" lineno="4564"> <summary> Send signull to unprivileged user domains. </summary> @@ -127389,7 +110358,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_signal_unpriv_users" lineno="4570"> +<interface name="userdom_signal_unpriv_users" lineno="4582"> <summary> Send general signals to unprivileged user domains. </summary> @@ -127399,7 +110368,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_use_unpriv_users_fds" lineno="4588"> +<interface name="userdom_use_unpriv_users_fds" lineno="4600"> <summary> Inherit the file descriptors from unprivileged user domains. </summary> @@ -127409,7 +110378,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4616"> +<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4628"> <summary> Do not audit attempts to inherit the file descriptors from unprivileged user domains. @@ -127429,7 +110398,7 @@ Domain to not audit. </param> <infoflow type="none"/> </interface> -<interface name="userdom_dontaudit_use_user_ptys" lineno="4634"> +<interface name="userdom_dontaudit_use_user_ptys" lineno="4646"> <summary> Do not audit attempts to use user ptys. </summary> @@ -127439,7 +110408,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_relabelto_user_ptys" lineno="4652"> +<interface name="userdom_relabelto_user_ptys" lineno="4664"> <summary> Relabel files to unprivileged user pty types. </summary> @@ -127449,7 +110418,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4671"> +<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4683"> <summary> Do not audit attempts to relabel files from user pty types. @@ -127460,7 +110429,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_write_user_tmp_files" lineno="4689"> +<interface name="userdom_write_user_tmp_files" lineno="4701"> <summary> Write all users files in /tmp </summary> @@ -127470,7 +110439,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4708"> +<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4720"> <summary> Do not audit attempts to write users temporary files. @@ -127481,7 +110450,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_dontaudit_use_user_ttys" lineno="4726"> +<interface name="userdom_dontaudit_use_user_ttys" lineno="4738"> <summary> Do not audit attempts to use user ttys. </summary> @@ -127491,7 +110460,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_read_all_users_state" lineno="4744"> +<interface name="userdom_read_all_users_state" lineno="4756"> <summary> Read the process state of all user domains. </summary> @@ -127501,7 +110470,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_getattr_all_users" lineno="4764"> +<interface name="userdom_getattr_all_users" lineno="4776"> <summary> Get the attributes of all user domains. </summary> @@ -127511,7 +110480,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_use_all_users_fds" lineno="4782"> +<interface name="userdom_use_all_users_fds" lineno="4794"> <summary> Inherit the file descriptors from all user domains </summary> @@ -127521,7 +110490,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dontaudit_use_all_users_fds" lineno="4801"> +<interface name="userdom_dontaudit_use_all_users_fds" lineno="4813"> <summary> Do not audit attempts to inherit the file descriptors from any user domains. @@ -127532,7 +110501,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="userdom_signal_all_users" lineno="4819"> +<interface name="userdom_signal_all_users" lineno="4831"> <summary> Send general signals to all user domains. </summary> @@ -127542,7 +110511,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_sigchld_all_users" lineno="4837"> +<interface name="userdom_sigchld_all_users" lineno="4849"> <summary> Send a SIGCHLD signal to all user domains. </summary> @@ -127552,7 +110521,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_read_all_users_keys" lineno="4855"> +<interface name="userdom_read_all_users_keys" lineno="4867"> <summary> Read keys for all user domains. </summary> @@ -127562,7 +110531,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_write_all_users_keys" lineno="4873"> +<interface name="userdom_write_all_users_keys" lineno="4885"> <summary> Write keys for all user domains. </summary> @@ -127572,7 +110541,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_rw_all_users_keys" lineno="4891"> +<interface name="userdom_rw_all_users_keys" lineno="4903"> <summary> Read and write keys for all user domains. </summary> @@ -127582,7 +110551,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_create_all_users_keys" lineno="4909"> +<interface name="userdom_create_all_users_keys" lineno="4921"> <summary> Create keys for all user domains. </summary> @@ -127592,7 +110561,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_all_users_keys" lineno="4927"> +<interface name="userdom_manage_all_users_keys" lineno="4939"> <summary> Manage keys for all user domains. </summary> @@ -127602,7 +110571,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_dbus_send_all_users" lineno="4945"> +<interface name="userdom_dbus_send_all_users" lineno="4957"> <summary> Send a dbus message to all user domains. </summary> @@ -127612,7 +110581,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_manage_user_tmp_chr_files" lineno="4967"> +<interface name="userdom_manage_user_tmp_chr_files" lineno="4979"> <summary> Create, read, write, and delete user temporary character files. @@ -127623,7 +110592,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="userdom_relabel_user_certs" lineno="4988"> +<interface name="userdom_relabel_user_certs" lineno="5000"> <summary> Allow relabeling resources to user_cert_t </summary> @@ -127633,7 +110602,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5011"> +<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5023"> <summary> Do not audit attempts to read and write unserdomain stream. @@ -127897,7 +110866,18 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_watch_config_dirs" lineno="382"> +<interface name="xdg_dontaudit_search_config_dirs" lineno="383"> +<summary> +Do not audit attempts to search through the +xdg config home directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xdg_watch_config_dirs" lineno="401"> <summary> Watch the xdg config home directories </summary> @@ -127907,7 +110887,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_watch_all_config_dirs" lineno="400"> +<interface name="xdg_watch_all_config_dirs" lineno="419"> <summary> Watch all the xdg config home directories </summary> @@ -127917,7 +110897,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_read_config_files" lineno="418"> +<interface name="xdg_read_config_files" lineno="437"> <summary> Read the xdg config home files </summary> @@ -127927,7 +110907,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_read_all_config_files" lineno="441"> +<interface name="xdg_read_all_config_files" lineno="460"> <summary> Read all xdg_config_type files </summary> @@ -127937,7 +110917,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_config_filetrans" lineno="481"> +<interface name="xdg_config_filetrans" lineno="500"> <summary> Create objects in an xdg_config directory with an automatic type transition to @@ -127964,7 +110944,7 @@ Name of the file or directory created </summary> </param> </interface> -<interface name="xdg_generic_user_home_dir_filetrans_config" lineno="514"> +<interface name="xdg_generic_user_home_dir_filetrans_config" lineno="533"> <summary> Create objects in the user home dir with an automatic type transition to the xdg_config_t type. @@ -127985,7 +110965,7 @@ Name of the directory created </summary> </param> </interface> -<interface name="xdg_create_config_dirs" lineno="532"> +<interface name="xdg_create_config_dirs" lineno="551"> <summary> Create xdg config home directories </summary> @@ -127995,7 +110975,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_manage_config" lineno="550"> +<interface name="xdg_manage_config" lineno="569"> <summary> Manage the xdg config home files </summary> @@ -128005,7 +110985,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_manage_all_config" lineno="575"> +<interface name="xdg_manage_all_config" lineno="594"> <summary> Manage all the xdg config home files regardless of their specific type </summary> @@ -128015,7 +110995,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_relabel_config" lineno="600"> +<interface name="xdg_relabel_config" lineno="619"> <summary> Allow relabeling the xdg config home files </summary> @@ -128025,7 +111005,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_relabel_all_config" lineno="624"> +<interface name="xdg_relabel_all_config" lineno="643"> <summary> Allow relabeling the xdg config home files, regardless of their specific type </summary> @@ -128035,7 +111015,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_search_data_dirs" lineno="648"> +<interface name="xdg_search_data_dirs" lineno="667"> <summary> Search through the xdg data home directories </summary> @@ -128045,7 +111025,18 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_watch_data_dirs" lineno="666"> +<interface name="xdg_dontaudit_search_data_dirs" lineno="686"> +<summary> +Do not audit attempts to search through the +xdg data home directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="xdg_watch_data_dirs" lineno="704"> <summary> Watch the xdg data home directories </summary> @@ -128055,7 +111046,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_watch_all_data_dirs" lineno="684"> +<interface name="xdg_watch_all_data_dirs" lineno="722"> <summary> Watch all the xdg data home directories </summary> @@ -128065,7 +111056,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_read_data_files" lineno="702"> +<interface name="xdg_read_data_files" lineno="740"> <summary> Read the xdg data home files </summary> @@ -128075,7 +111066,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_read_all_data_files" lineno="725"> +<interface name="xdg_read_all_data_files" lineno="763"> <summary> Read all xdg_data_type files </summary> @@ -128085,7 +111076,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_data_filetrans" lineno="765"> +<interface name="xdg_data_filetrans" lineno="803"> <summary> Create objects in an xdg_data directory with an automatic type transition to @@ -128112,7 +111103,7 @@ Optional name of the file or directory created </summary> </param> </interface> -<interface name="xdg_generic_user_home_dir_filetrans_data" lineno="798"> +<interface name="xdg_generic_user_home_dir_filetrans_data" lineno="836"> <summary> Create objects in the user home dir with an automatic type transition to the xdg_data_t type. @@ -128133,7 +111124,7 @@ Name of the directory created </summary> </param> </interface> -<interface name="xdg_create_data_dirs" lineno="816"> +<interface name="xdg_create_data_dirs" lineno="854"> <summary> Create xdg data home directories </summary> @@ -128143,7 +111134,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_manage_data" lineno="834"> +<interface name="xdg_manage_data" lineno="872"> <summary> Manage the xdg data home files </summary> @@ -128153,7 +111144,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_manage_all_data" lineno="859"> +<interface name="xdg_manage_all_data" lineno="897"> <summary> Manage all the xdg data home files, regardless of their specific type </summary> @@ -128163,7 +111154,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_relabel_data" lineno="884"> +<interface name="xdg_relabel_data" lineno="922"> <summary> Allow relabeling the xdg data home files </summary> @@ -128173,7 +111164,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_relabel_all_data" lineno="908"> +<interface name="xdg_relabel_all_data" lineno="946"> <summary> Allow relabeling the xdg data home files, regardless of their type </summary> @@ -128183,7 +111174,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_watch_documents_dirs" lineno="932"> +<interface name="xdg_watch_documents_dirs" lineno="970"> <summary> Watch the xdg documents home directories </summary> @@ -128193,7 +111184,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_generic_user_home_dir_filetrans_documents" lineno="961"> +<interface name="xdg_generic_user_home_dir_filetrans_documents" lineno="999"> <summary> Create objects in the user home dir with an automatic type transition to the xdg_documents_t type. @@ -128214,7 +111205,7 @@ Name of the directory created </summary> </param> </interface> -<interface name="xdg_manage_documents" lineno="979"> +<interface name="xdg_manage_documents" lineno="1017"> <summary> Manage documents content </summary> @@ -128224,7 +111215,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_relabel_documents" lineno="1000"> +<interface name="xdg_relabel_documents" lineno="1038"> <summary> Allow relabeling the documents resources </summary> @@ -128234,7 +111225,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_watch_downloads_dirs" lineno="1022"> +<interface name="xdg_watch_downloads_dirs" lineno="1060"> <summary> Watch the xdg downloads home directories </summary> @@ -128244,7 +111235,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_read_downloads" lineno="1040"> +<interface name="xdg_read_downloads" lineno="1078"> <summary> Read downloaded content </summary> @@ -128254,7 +111245,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_create_downloads" lineno="1063"> +<interface name="xdg_create_downloads" lineno="1101"> <summary> Create downloaded content </summary> @@ -128264,7 +111255,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_write_downloads" lineno="1086"> +<interface name="xdg_write_downloads" lineno="1124"> <summary> Write downloaded content </summary> @@ -128274,7 +111265,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_generic_user_home_dir_filetrans_downloads" lineno="1120"> +<interface name="xdg_generic_user_home_dir_filetrans_downloads" lineno="1158"> <summary> Create objects in the user home dir with an automatic type transition to the xdg_downloads_t type. @@ -128295,7 +111286,7 @@ Name of the directory created </summary> </param> </interface> -<interface name="xdg_manage_downloads" lineno="1138"> +<interface name="xdg_manage_downloads" lineno="1176"> <summary> Manage downloaded content </summary> @@ -128305,7 +111296,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_relabel_downloads" lineno="1159"> +<interface name="xdg_relabel_downloads" lineno="1197"> <summary> Allow relabeling the downloads resources </summary> @@ -128315,7 +111306,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_watch_pictures_dirs" lineno="1181"> +<interface name="xdg_watch_pictures_dirs" lineno="1219"> <summary> Watch the xdg pictures home directories </summary> @@ -128325,7 +111316,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_read_pictures" lineno="1199"> +<interface name="xdg_read_pictures" lineno="1237"> <summary> Read user pictures content </summary> @@ -128335,7 +111326,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_generic_user_home_dir_filetrans_pictures" lineno="1233"> +<interface name="xdg_generic_user_home_dir_filetrans_pictures" lineno="1271"> <summary> Create objects in the user home dir with an automatic type transition to the xdg_pictures_t type. @@ -128356,7 +111347,7 @@ Name of the directory created </summary> </param> </interface> -<interface name="xdg_manage_pictures" lineno="1251"> +<interface name="xdg_manage_pictures" lineno="1289"> <summary> Manage pictures content </summary> @@ -128366,7 +111357,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_relabel_pictures" lineno="1272"> +<interface name="xdg_relabel_pictures" lineno="1310"> <summary> Allow relabeling the pictures resources </summary> @@ -128376,7 +111367,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_watch_music_dirs" lineno="1294"> +<interface name="xdg_watch_music_dirs" lineno="1332"> <summary> Watch the xdg music home directories </summary> @@ -128386,7 +111377,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_read_music" lineno="1312"> +<interface name="xdg_read_music" lineno="1350"> <summary> Read user music content </summary> @@ -128396,7 +111387,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_generic_user_home_dir_filetrans_music" lineno="1346"> +<interface name="xdg_generic_user_home_dir_filetrans_music" lineno="1384"> <summary> Create objects in the user home dir with an automatic type transition to the xdg_pictures_t type. @@ -128417,7 +111408,7 @@ Name of the directory created </summary> </param> </interface> -<interface name="xdg_manage_music" lineno="1364"> +<interface name="xdg_manage_music" lineno="1402"> <summary> Manage music content </summary> @@ -128427,7 +111418,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_relabel_music" lineno="1385"> +<interface name="xdg_relabel_music" lineno="1423"> <summary> Allow relabeling the music resources </summary> @@ -128437,7 +111428,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_watch_videos_dirs" lineno="1407"> +<interface name="xdg_watch_videos_dirs" lineno="1445"> <summary> Watch the xdg video content </summary> @@ -128447,7 +111438,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_read_videos" lineno="1425"> +<interface name="xdg_read_videos" lineno="1463"> <summary> Read user video content </summary> @@ -128457,7 +111448,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_generic_user_home_dir_filetrans_videos" lineno="1459"> +<interface name="xdg_generic_user_home_dir_filetrans_videos" lineno="1497"> <summary> Create objects in the user home dir with an automatic type transition to the xdg_videos_t type. @@ -128478,7 +111469,7 @@ Name of the directory created </summary> </param> </interface> -<interface name="xdg_manage_videos" lineno="1477"> +<interface name="xdg_manage_videos" lineno="1515"> <summary> Manage video content </summary> @@ -128488,7 +111479,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_relabel_videos" lineno="1498"> +<interface name="xdg_relabel_videos" lineno="1536"> <summary> Allow relabeling the videos resources </summary> @@ -128498,7 +111489,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_cache_home_content" lineno="1524"> +<interface name="xdg_cache_home_content" lineno="1562"> <summary> Mark the selected type as an xdg_cache_home_type </summary> @@ -128508,7 +111499,7 @@ Type to give the xdg_cache_home_type attribute to </summary> </param> </interface> -<interface name="xdg_config_home_content" lineno="1538"> +<interface name="xdg_config_home_content" lineno="1576"> <summary> Mark the selected type as an xdg_config_home_type </summary> @@ -128518,7 +111509,7 @@ Type to give the xdg_config_home_type attribute to </summary> </param> </interface> -<interface name="xdg_data_home_content" lineno="1552"> +<interface name="xdg_data_home_content" lineno="1590"> <summary> Mark the selected type as an xdg_data_home_type </summary> @@ -128528,7 +111519,7 @@ Type to give the xdg_data_home_type attribute to </summary> </param> </interface> -<interface name="xdg_read_cache_home_files" lineno="1566"> +<interface name="xdg_read_cache_home_files" lineno="1604"> <summary> Read the xdg cache home files </summary> @@ -128538,7 +111529,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_read_all_cache_home_files" lineno="1580"> +<interface name="xdg_read_all_cache_home_files" lineno="1618"> <summary> Read all xdg_cache_home_type files </summary> @@ -128548,7 +111539,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_cache_home_filetrans" lineno="1611"> +<interface name="xdg_cache_home_filetrans" lineno="1649"> <summary> Create objects in an xdg_cache_home directory with an automatic type transition to @@ -128575,7 +111566,7 @@ Name of the file or directory created </summary> </param> </interface> -<interface name="xdg_generic_user_home_dir_filetrans_cache_home" lineno="1636"> +<interface name="xdg_generic_user_home_dir_filetrans_cache_home" lineno="1674"> <summary> Create objects in the user home dir with an automatic type transition to the xdg_cache_home_t type. @@ -128596,7 +111587,7 @@ Name of the directory created </summary> </param> </interface> -<interface name="xdg_create_cache_home_dirs" lineno="1650"> +<interface name="xdg_create_cache_home_dirs" lineno="1688"> <summary> Create xdg cache home directories </summary> @@ -128606,7 +111597,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_manage_cache_home" lineno="1664"> +<interface name="xdg_manage_cache_home" lineno="1702"> <summary> Manage the xdg cache home files </summary> @@ -128616,7 +111607,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_manage_all_cache_home" lineno="1678"> +<interface name="xdg_manage_all_cache_home" lineno="1716"> <summary> Manage all the xdg cache home files regardless of their specific type </summary> @@ -128626,7 +111617,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_relabel_cache_home" lineno="1692"> +<interface name="xdg_relabel_cache_home" lineno="1730"> <summary> Allow relabeling the xdg cache home files </summary> @@ -128636,7 +111627,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_relabel_all_cache_home" lineno="1706"> +<interface name="xdg_relabel_all_cache_home" lineno="1744"> <summary> Allow relabeling the xdg cache home files, regardless of their specific type </summary> @@ -128646,7 +111637,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_search_config_home_dirs" lineno="1720"> +<interface name="xdg_search_config_home_dirs" lineno="1758"> <summary> Search through the xdg config home directories </summary> @@ -128656,7 +111647,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_read_config_home_files" lineno="1734"> +<interface name="xdg_read_config_home_files" lineno="1772"> <summary> Read the xdg config home files </summary> @@ -128666,7 +111657,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_read_all_config_home_files" lineno="1748"> +<interface name="xdg_read_all_config_home_files" lineno="1786"> <summary> Read all xdg_config_home_type files </summary> @@ -128676,7 +111667,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_config_home_filetrans" lineno="1779"> +<interface name="xdg_config_home_filetrans" lineno="1817"> <summary> Create objects in an xdg_config_home directory with an automatic type transition to @@ -128703,7 +111694,7 @@ Name of the file or directory created </summary> </param> </interface> -<interface name="xdg_generic_user_home_dir_filetrans_config_home" lineno="1804"> +<interface name="xdg_generic_user_home_dir_filetrans_config_home" lineno="1842"> <summary> Create objects in the user home dir with an automatic type transition to the xdg_config_home_t type. @@ -128724,7 +111715,7 @@ Name of the directory created </summary> </param> </interface> -<interface name="xdg_create_config_home_dirs" lineno="1818"> +<interface name="xdg_create_config_home_dirs" lineno="1856"> <summary> Create xdg config home directories </summary> @@ -128734,7 +111725,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_manage_config_home" lineno="1832"> +<interface name="xdg_manage_config_home" lineno="1870"> <summary> Manage the xdg config home files </summary> @@ -128744,7 +111735,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_manage_all_config_home" lineno="1846"> +<interface name="xdg_manage_all_config_home" lineno="1884"> <summary> Manage all the xdg config home files regardless of their specific type </summary> @@ -128754,7 +111745,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_relabel_config_home" lineno="1860"> +<interface name="xdg_relabel_config_home" lineno="1898"> <summary> Allow relabeling the xdg config home files </summary> @@ -128764,7 +111755,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_relabel_all_config_home" lineno="1874"> +<interface name="xdg_relabel_all_config_home" lineno="1912"> <summary> Allow relabeling the xdg config home files, regardless of their specific type </summary> @@ -128774,7 +111765,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_read_data_home_files" lineno="1888"> +<interface name="xdg_read_data_home_files" lineno="1926"> <summary> Read the xdg data home files </summary> @@ -128784,7 +111775,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_read_all_data_home_files" lineno="1902"> +<interface name="xdg_read_all_data_home_files" lineno="1940"> <summary> Read all xdg_data_home_type files </summary> @@ -128794,7 +111785,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_data_home_filetrans" lineno="1933"> +<interface name="xdg_data_home_filetrans" lineno="1971"> <summary> Create objects in an xdg_data_home directory with an automatic type transition to @@ -128821,7 +111812,7 @@ Optional name of the file or directory created </summary> </param> </interface> -<interface name="xdg_generic_user_home_dir_filetrans_data_home" lineno="1958"> +<interface name="xdg_generic_user_home_dir_filetrans_data_home" lineno="1996"> <summary> Create objects in the user home dir with an automatic type transition to the xdg_data_home_t type. @@ -128842,7 +111833,7 @@ Name of the directory created </summary> </param> </interface> -<interface name="xdg_create_data_home_dirs" lineno="1972"> +<interface name="xdg_create_data_home_dirs" lineno="2010"> <summary> Create xdg data home directories </summary> @@ -128852,7 +111843,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_manage_data_home" lineno="1986"> +<interface name="xdg_manage_data_home" lineno="2024"> <summary> Manage the xdg data home files </summary> @@ -128862,7 +111853,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_manage_all_data_home" lineno="2000"> +<interface name="xdg_manage_all_data_home" lineno="2038"> <summary> Manage all the xdg data home files, regardless of their specific type </summary> @@ -128872,7 +111863,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_relabel_data_home" lineno="2014"> +<interface name="xdg_relabel_data_home" lineno="2052"> <summary> Allow relabeling the xdg data home files </summary> @@ -128882,7 +111873,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_relabel_all_data_home" lineno="2028"> +<interface name="xdg_relabel_all_data_home" lineno="2066"> <summary> Allow relabeling the xdg data home files, regardless of their type </summary> @@ -128892,7 +111883,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xdg_read_downloads_home" lineno="2042"> +<interface name="xdg_read_downloads_home" lineno="2080"> <summary> Read downloaded content </summary> @@ -128902,7 +111893,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_read_videos_home" lineno="2056"> +<interface name="xdg_read_videos_home" lineno="2094"> <summary> Read user video content </summary> @@ -128912,7 +111903,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_read_pictures_home" lineno="2070"> +<interface name="xdg_read_pictures_home" lineno="2108"> <summary> Read user pictures content </summary> @@ -128922,7 +111913,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_read_music_home" lineno="2084"> +<interface name="xdg_read_music_home" lineno="2122"> <summary> Read user music content </summary> @@ -128932,7 +111923,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_create_downloads_home" lineno="2098"> +<interface name="xdg_create_downloads_home" lineno="2136"> <summary> Create downloaded content </summary> @@ -128942,7 +111933,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_write_downloads_home" lineno="2112"> +<interface name="xdg_write_downloads_home" lineno="2150"> <summary> Write downloaded content </summary> @@ -128952,7 +111943,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_manage_downloads_home" lineno="2126"> +<interface name="xdg_manage_downloads_home" lineno="2164"> <summary> Manage downloaded content </summary> @@ -128962,7 +111953,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_manage_documents_home" lineno="2140"> +<interface name="xdg_manage_documents_home" lineno="2178"> <summary> Manage documents content </summary> @@ -128972,7 +111963,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_manage_music_home" lineno="2154"> +<interface name="xdg_manage_music_home" lineno="2192"> <summary> Manage music content </summary> @@ -128982,7 +111973,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_manage_pictures_home" lineno="2168"> +<interface name="xdg_manage_pictures_home" lineno="2206"> <summary> Manage pictures content </summary> @@ -128992,7 +111983,7 @@ Domain allowed access </summary> </param> </interface> -<interface name="xdg_manage_videos_home" lineno="2182"> +<interface name="xdg_manage_videos_home" lineno="2220"> <summary> Manage video content </summary> @@ -129098,17 +112089,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xen_read_xenstored_pid_files" lineno="189"> -<summary> -Read xenstored pid files. (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -</interface> -<interface name="xen_read_xenstored_runtime_files" lineno="204"> +<interface name="xen_read_xenstored_runtime_files" lineno="189"> <summary> Read xenstored runtime files. </summary> @@ -129118,7 +112099,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xen_dontaudit_rw_unix_stream_sockets" lineno="224"> +<interface name="xen_dontaudit_rw_unix_stream_sockets" lineno="209"> <summary> Do not audit attempts to read and write Xen unix domain stream sockets. @@ -129129,7 +112110,7 @@ Domain to not audit. </summary> </param> </interface> -<interface name="xen_stream_connect_xenstore" lineno="243"> +<interface name="xen_stream_connect_xenstore" lineno="228"> <summary> Connect to xenstored with a unix domain stream socket. @@ -129140,7 +112121,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xen_stream_connect" lineno="263"> +<interface name="xen_stream_connect" lineno="248"> <summary> Connect to xend with a unix domain stream socket. @@ -129151,27 +112132,7 @@ Domain allowed access. </summary> </param> </interface> -<interface name="xen_pid_filetrans" lineno="295"> -<summary> -Create in a xend_runtime_t directory (Deprecated) -</summary> -<param name="domain"> -<summary> -Domain allowed access. -</summary> -</param> -<param name="private type"> -<summary> -The type of the object to be created. -</summary> -</param> -<param name="object"> -<summary> -The object class of the object being created. -</summary> -</param> -</interface> -<interface name="xen_runtime_filetrans" lineno="320"> +<interface name="xen_runtime_filetrans" lineno="280"> <summary> Create in a xend_runtime_t directory </summary> @@ -129191,7 +112152,7 @@ The object class of the object being created. </summary> </param> </interface> -<interface name="xen_domtrans_xm" lineno="338"> +<interface name="xen_domtrans_xm" lineno="298"> <summary> Execute a domain transition to run xm. </summary> @@ -129201,7 +112162,7 @@ Domain allowed to transition. </summary> </param> </interface> -<interface name="xen_stream_connect_xm" lineno="358"> +<interface name="xen_stream_connect_xm" lineno="318"> <summary> Connect to xm with a unix domain stream socket. |