aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorJason Zaman <perfinion@gentoo.org>2021-01-31 17:55:02 -0800
committerJason Zaman <perfinion@gentoo.org>2021-01-31 17:55:02 -0800
commit16e654bd62891f7f1f0466ef9d341e562a038dc0 (patch)
tree92ce24cafe90d68382024f0533344b72bee808bb /doc
parentMerge upstream (diff)
downloadhardened-refpolicy-16e654bd62891f7f1f0466ef9d341e562a038dc0.tar.gz
hardened-refpolicy-16e654bd62891f7f1f0466ef9d341e562a038dc0.tar.bz2
hardened-refpolicy-16e654bd62891f7f1f0466ef9d341e562a038dc0.zip
Update generated policy and doc files
Signed-off-by: Jason Zaman <perfinion@gentoo.org>
Diffstat (limited to 'doc')
-rw-r--r--doc/global_tunables.xml10
-rw-r--r--doc/policy.xml20618
2 files changed, 11031 insertions, 9597 deletions
diff --git a/doc/global_tunables.xml b/doc/global_tunables.xml
index 9049a3cd5..b05f98186 100644
--- a/doc/global_tunables.xml
+++ b/doc/global_tunables.xml
@@ -26,6 +26,16 @@ Allow unconfined executables to make their stack executable. This should never,
</p>
</desc>
</tunable>
+<tunable name="allow_raw_memory_access" dftval="false">
+<desc>
+<p>
+Allow raw memory device (/dev/mem, /dev/kmem, /dev/mergemem,
+dev/oldmem, /dev/port) access for confined executables. This is
+extremely dangerous as it can bypass the SELinux protections, and
+should only be used by trusted domains.
+</p>
+</desc>
+</tunable>
<tunable name="allow_polyinstantiation" dftval="false">
<desc>
<p>
diff --git a/doc/policy.xml b/doc/policy.xml
index cfdf32537..0537d4610 100644
--- a/doc/policy.xml
+++ b/doc/policy.xml
@@ -1169,17 +1169,7 @@ Role allowed access.
</module>
<module name="dphysswapfile" filename="policy/modules/admin/dphysswapfile.if">
<summary>Set up, mount/unmount, and delete an swap file.</summary>
-<interface name="dphysswapfile_dontaudit_read_swap" lineno="13">
-<summary>
-Dontaudit acces to the swap file.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="dphysswapfile_admin" lineno="40">
+<interface name="dphysswapfile_admin" lineno="20">
<summary>
All of the rules required to
administrate an dphys-swapfile environment.
@@ -1395,34 +1385,7 @@ Domain allowed access.
</module>
<module name="fakehwclock" filename="policy/modules/admin/fakehwclock.if">
<summary>fake-hwclock - Control fake hardware clock.</summary>
-<interface name="fakehwclock_domtrans" lineno="13">
-<summary>
-Execute a domain transition to run fake-hwclock.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="fakehwclock_run" lineno="41">
-<summary>
-Execute fake-hwclock in the fake-hwclock domain,
-and allow the specified role
-the fake-hwclock domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-</interface>
-<interface name="fakehwclock_admin" lineno="68">
+<interface name="fakehwclock_admin" lineno="19">
<summary>
All the rules required to
administrate an fake-hwclock environment.
@@ -1511,7 +1474,7 @@ Domain allowed access.
</interface>
<interface name="firstboot_dontaudit_rw_pipes" lineno="132">
<summary>
-Do not audit attemps to read and
+Do not audit attempts to read and
write firstboot unnamed pipes.
</summary>
<param name="domain">
@@ -1522,7 +1485,7 @@ Domain to not audit.
</interface>
<interface name="firstboot_dontaudit_rw_stream_sockets" lineno="152">
<summary>
-Do not audit attemps to read and
+Do not audit attempts to read and
write firstboot unix domain
stream sockets.
</summary>
@@ -1685,9 +1648,6 @@ Role allowed access.
<rolecap/>
</interface>
</module>
-<module name="kdumpgui" filename="policy/modules/admin/kdumpgui.if">
-<summary>System-config-kdump GUI.</summary>
-</module>
<module name="kismet" filename="policy/modules/admin/kismet.if">
<summary>IEEE 802.11 wireless LAN sniffer.</summary>
<template name="kismet_role" lineno="18">
@@ -1733,7 +1693,7 @@ Role allowed access.
</interface>
<interface name="kismet_read_pid_files" lineno="95">
<summary>
-Read kismet pid files.
+Read kismet pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -1741,20 +1701,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_manage_pid_files" lineno="115">
+<interface name="kismet_manage_pid_files" lineno="111">
<summary>
Create, read, write, and delete
-kismet pid files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="kismet_search_lib" lineno="134">
-<summary>
-Search kismet lib directories.
+kismet pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -1762,9 +1712,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_read_lib_files" lineno="153">
+<interface name="kismet_read_runtime_files" lineno="126">
<summary>
-Read kismet lib files.
+Read kismet runtime files.
</summary>
<param name="domain">
<summary>
@@ -1772,10 +1722,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_manage_lib_files" lineno="174">
+<interface name="kismet_manage_runtime_files" lineno="146">
<summary>
Create, read, write, and delete
-kismet lib files.
+kismet runtime files.
</summary>
<param name="domain">
<summary>
@@ -1783,10 +1733,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_manage_lib" lineno="194">
+<interface name="kismet_search_lib" lineno="165">
<summary>
-Create, read, write, and delete
-kismet lib content.
+Search kismet lib directories.
</summary>
<param name="domain">
<summary>
@@ -1794,20 +1743,20 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_read_log" lineno="216">
+<interface name="kismet_read_lib_files" lineno="184">
<summary>
-Read kismet log files.
+Read kismet lib files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<rolecap/>
</interface>
-<interface name="kismet_append_log" lineno="235">
+<interface name="kismet_manage_lib_files" lineno="205">
<summary>
-Append kismet log files.
+Create, read, write, and delete
+kismet lib files.
</summary>
<param name="domain">
<summary>
@@ -1815,10 +1764,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_manage_log" lineno="255">
+<interface name="kismet_manage_lib" lineno="225">
<summary>
Create, read, write, and delete
-kismet log content.
+kismet lib content.
</summary>
<param name="domain">
<summary>
@@ -1826,56 +1775,31 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kismet_admin" lineno="283">
+<interface name="kismet_read_log" lineno="247">
<summary>
-All of the rules required to
-administrate an kismet environment.
+Read kismet log files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
<rolecap/>
</interface>
-</module>
-<module name="kudzu" filename="policy/modules/admin/kudzu.if">
-<summary>Hardware detection and configuration tools.</summary>
-<interface name="kudzu_domtrans" lineno="13">
-<summary>
-Execute kudzu in the kudzu domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="kudzu_run" lineno="39">
+<interface name="kismet_append_log" lineno="266">
<summary>
-Execute kudzu in the kudzu domain, and
-allow the specified role the kudzu domain.
+Append kismet log files.
</summary>
<param name="domain">
<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
+Domain allowed access.
</summary>
</param>
-<rolecap/>
</interface>
-<interface name="kudzu_getattr_exec_files" lineno="58">
+<interface name="kismet_manage_log" lineno="286">
<summary>
-Get attributes of kudzu executable files.
+Create, read, write, and delete
+kismet log content.
</summary>
<param name="domain">
<summary>
@@ -1883,10 +1807,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kudzu_admin" lineno="83">
+<interface name="kismet_admin" lineno="314">
<summary>
All of the rules required to
-administrate an kudzu environment.
+administrate an kismet environment.
</summary>
<param name="domain">
<summary>
@@ -2406,7 +2330,7 @@ Domain Allowed Access
</summary>
</param>
</interface>
-<interface name="portage_domtrans_fetch" lineno="233">
+<interface name="portage_domtrans_fetch" lineno="224">
<summary>
Execute tree management functions
(fetching, layman, ...) in the
@@ -2418,7 +2342,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="portage_run_fetch" lineno="262">
+<interface name="portage_run_fetch" lineno="253">
<summary>
Execute tree management functions
(fetching, layman, ...) in the
@@ -2438,7 +2362,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="portage_domtrans_gcc_config" lineno="281">
+<interface name="portage_domtrans_gcc_config" lineno="272">
<summary>
Execute gcc-config in the gcc config domain.
</summary>
@@ -2448,7 +2372,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="portage_run_gcc_config" lineno="308">
+<interface name="portage_run_gcc_config" lineno="299">
<summary>
Execute gcc-config in the gcc config
domain, and allow the specified role
@@ -2466,7 +2390,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="portage_dontaudit_use_fds" lineno="328">
+<interface name="portage_dontaudit_use_fds" lineno="319">
<summary>
Do not audit attempts to use
portage file descriptors.
@@ -2477,7 +2401,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="portage_dontaudit_search_tmp" lineno="347">
+<interface name="portage_dontaudit_search_tmp" lineno="338">
<summary>
Do not audit attempts to search the
portage temporary directories.
@@ -2488,7 +2412,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="portage_dontaudit_rw_tmp_files" lineno="366">
+<interface name="portage_dontaudit_rw_tmp_files" lineno="357">
<summary>
Do not audit attempts to read and write
the portage temporary files.
@@ -2499,7 +2423,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="portage_eselect_module" lineno="391">
+<interface name="portage_eselect_module" lineno="382">
<summary>
Allow the domain to run within an eselect module script.
</summary>
@@ -2509,7 +2433,7 @@ Domain to allow within an eselect module
</summary>
</param>
</interface>
-<interface name="portage_ro_role" lineno="414">
+<interface name="portage_ro_role" lineno="405">
<summary>
Read all portage files
</summary>
@@ -2524,7 +2448,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="portage_read_db" lineno="434">
+<interface name="portage_read_db" lineno="425">
<summary>
Read portage db files
</summary>
@@ -2534,7 +2458,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="portage_read_cache" lineno="454">
+<interface name="portage_read_cache" lineno="445">
<summary>
Read portage cache files
</summary>
@@ -2544,7 +2468,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="portage_read_config" lineno="475">
+<interface name="portage_read_config" lineno="466">
<summary>
Read portage configuration files
</summary>
@@ -2554,7 +2478,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="portage_read_ebuild" lineno="497">
+<interface name="portage_read_ebuild" lineno="488">
<summary>
Read portage ebuild files
</summary>
@@ -2564,7 +2488,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="portage_read_log" lineno="519">
+<interface name="portage_read_log" lineno="510">
<summary>
Read portage log files
</summary>
@@ -2574,7 +2498,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="portage_read_srcrepo" lineno="538">
+<interface name="portage_read_srcrepo" lineno="529">
<summary>
Read portage src repository files
</summary>
@@ -2584,7 +2508,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="portage_dontaudit_write_cache" lineno="560">
+<interface name="portage_dontaudit_write_cache" lineno="551">
<summary>
Do not audit writing portage cache files
</summary>
@@ -2984,20 +2908,6 @@ Role allowed access.
<rolecap/>
</interface>
</module>
-<module name="readahead" filename="policy/modules/admin/readahead.if">
-<summary>Read files into page cache for improved performance.</summary>
-<interface name="readahead_domtrans" lineno="14">
-<summary>
-Execute a domain transition
-to run readahead.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-</module>
<module name="rkhunter" filename="policy/modules/admin/rkhunter.if">
<summary>rkhunter - rootkit checker.</summary>
<interface name="rkhunter_domtrans" lineno="13">
@@ -3319,7 +3229,7 @@ Domain to not audit.
</interface>
<interface name="rpm_read_pid_files" lineno="538">
<summary>
-Read rpm pid files.
+Read rpm pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -3327,10 +3237,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpm_manage_pid_files" lineno="558">
+<interface name="rpm_manage_pid_files" lineno="553">
<summary>
Create, read, write, and delete
-rpm pid files.
+rpm pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -3338,10 +3248,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpm_pid_filetrans_rpm_pid" lineno="588">
+<interface name="rpm_pid_filetrans_rpm_pid" lineno="579">
<summary>
Create specified objects in pid directories
-with the rpm pid file type.
+with the rpm pid file type. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -3359,7 +3269,18 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="rpm_admin" lineno="613">
+<interface name="rpm_manage_runtime_files" lineno="594">
+<summary>
+Create, read, write, and delete
+rpm runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="rpm_admin" lineno="620">
<summary>
All of the rules required to
administrate an rpm environment.
@@ -3481,7 +3402,7 @@ Domain allowed access.
<interface name="samhain_manage_pid_files" lineno="187">
<summary>
Create, read, write, and delete
-samhain pid files.
+samhain pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -3489,7 +3410,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="samhain_admin" lineno="213">
+<interface name="samhain_admin" lineno="208">
<summary>
All of the rules required to
administrate the samhain environment.
@@ -3521,7 +3442,7 @@ Domain allowed to transition.
</interface>
<interface name="sblim_read_pid_files" lineno="32">
<summary>
-Read gatherd pid files.
+Read gatherd pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -3529,7 +3450,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sblim_admin" lineno="58">
+<interface name="sblim_admin" lineno="53">
<summary>
All of the rules required to
administrate an sblim environment.
@@ -3547,24 +3468,6 @@ Role allowed access.
<rolecap/>
</interface>
</module>
-<module name="sectoolm" filename="policy/modules/admin/sectoolm.if">
-<summary>Sectool security audit tool.</summary>
-<interface name="sectoolm_role" lineno="18">
-<summary>
-Role access for sectoolm.
-</summary>
-<param name="role" unused="true">
-<summary>
-Role allowed access.
-</summary>
-</param>
-<param name="domain">
-<summary>
-User domain for the role.
-</summary>
-</param>
-</interface>
-</module>
<module name="shorewall" filename="policy/modules/admin/shorewall.if">
<summary>Shoreline Firewall high-level tool for configuring netfilter.</summary>
<interface name="shorewall_domtrans" lineno="13">
@@ -3598,27 +3501,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="shorewall_read_pid_files" lineno="71">
-<summary>
-Read shorewall pid files.
-</summary>
-<param name="domain" unused="true">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="shorewall_rw_pid_files" lineno="85">
-<summary>
-Read and write shorewall pid files.
-</summary>
-<param name="domain" unused="true">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="shorewall_read_lib_files" lineno="99">
+<interface name="shorewall_read_lib_files" lineno="71">
<summary>
Read shorewall lib files.
</summary>
@@ -3628,7 +3511,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="shorewall_rw_lib_files" lineno="118">
+<interface name="shorewall_rw_lib_files" lineno="90">
<summary>
Read and write shorewall lib files.
</summary>
@@ -3638,7 +3521,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="shorewall_read_tmp_files" lineno="137">
+<interface name="shorewall_read_tmp_files" lineno="109">
<summary>
Read shorewall temporary files.
</summary>
@@ -3648,7 +3531,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="shorewall_admin" lineno="163">
+<interface name="shorewall_admin" lineno="135">
<summary>
All of the rules required to
administrate an shorewall environment.
@@ -3741,9 +3624,6 @@ Domain allowed access.
</param>
</interface>
</module>
-<module name="smoltclient" filename="policy/modules/admin/smoltclient.if">
-<summary>The Fedora hardware profiler client.</summary>
-</module>
<module name="sosreport" filename="policy/modules/admin/sosreport.if">
<summary>Generate debugging information for system.</summary>
<interface name="sosreport_domtrans" lineno="13">
@@ -3911,7 +3791,7 @@ The user domain associated with the role.
</summary>
</param>
</template>
-<interface name="sudo_sigchld" lineno="189">
+<interface name="sudo_sigchld" lineno="190">
<summary>
Send a SIGCHLD signal to the sudo domain.
</summary>
@@ -3921,6 +3801,17 @@ Domain allowed access.
</summary>
</param>
</interface>
+<tunable name="sudo_all_tcp_connect_http_port" dftval="false">
+<desc>
+<p>
+Determine whether all sudo domains
+can connect to TCP HTTP ports. This
+is needed if an additional authentication
+mechanism via an HTTP server is
+required for users to use sudo.
+</p>
+</desc>
+</tunable>
</module>
<module name="sxid" filename="policy/modules/admin/sxid.if">
<summary>SUID/SGID program monitoring.</summary>
@@ -4137,6 +4028,31 @@ Domain allowed to transition.
</param>
</interface>
</module>
+<module name="usbguard" filename="policy/modules/admin/usbguard.if">
+<summary>
+Usbguard enforces the USB device authorization policy for all USB
+devices.
+</summary>
+<interface name="usbguard_stream_connect" lineno="16">
+<summary>
+Connect to usbguard with a unix domain stream socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<tunable name="usbguard_user_modify_rule_files" dftval="false">
+<desc>
+<p>
+Determine whether authorized users can control the daemon,
+which requires usbguard-daemon to be able modify its rules in
+/etc/usbguard.
+</p>
+</desc>
+</tunable>
+</module>
<module name="usbmodules" filename="policy/modules/admin/usbmodules.if">
<summary>List kernel modules of USB devices.</summary>
<interface name="usbmodules_domtrans" lineno="13">
@@ -4480,35 +4396,6 @@ Domain allowed access.
</layer>
<layer name="apps">
<summary>Policy modules for applications</summary>
-<module name="ada" filename="policy/modules/apps/ada.if">
-<summary>GNAT Ada95 compiler.</summary>
-<interface name="ada_domtrans" lineno="13">
-<summary>
-Execute the ada program in the ada domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="ada_run" lineno="38">
-<summary>
-Execute ada in the ada domain, and
-allow the specified role the ada domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-</interface>
-</module>
<module name="awstats" filename="policy/modules/apps/awstats.if">
<summary>Log file analyzer for advanced statistics.</summary>
<interface name="awstats_domtrans" lineno="14">
@@ -4654,7 +4541,7 @@ User domain for the role
</summary>
</param>
</interface>
-<interface name="chromium_rw_tmp_pipes" lineno="60">
+<interface name="chromium_rw_tmp_pipes" lineno="67">
<summary>
Read-write access to Chromiums' temporary fifo files
</summary>
@@ -4664,7 +4551,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="chromium_tmp_filetrans" lineno="89">
+<interface name="chromium_tmp_filetrans" lineno="96">
<summary>
Automatically use the specified type for resources created in chromium's
temporary locations
@@ -4685,7 +4572,7 @@ The name of the resource being created
</summary>
</param>
</interface>
-<interface name="chromium_domtrans" lineno="108">
+<interface name="chromium_domtrans" lineno="115">
<summary>
Execute a domain transition to the chromium domain (chromium_t)
</summary>
@@ -4695,7 +4582,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="chromium_run" lineno="133">
+<interface name="chromium_run" lineno="141">
<summary>
Execute chromium in the chromium domain and allow the specified role to access the chromium domain
</summary>
@@ -4710,6 +4597,16 @@ Role allowed access
</summary>
</param>
</interface>
+<tunable name="chromium_dri" dftval="true">
+<desc>
+<p>
+Allow chromium to access direct rendering interface
+</p>
+<p>
+Needed for good performance on complex sites
+</p>
+</desc>
+</tunable>
<tunable name="chromium_read_system_info" dftval="false">
<desc>
<p>
@@ -4979,31 +4876,6 @@ Grant the evolution domains manage rights on all user content
</desc>
</tunable>
</module>
-<module name="firewallgui" filename="policy/modules/apps/firewallgui.if">
-<summary>system-config-firewall dbus system service.</summary>
-<interface name="firewallgui_dbus_chat" lineno="14">
-<summary>
-Send and receive messages from
-firewallgui over dbus.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="firewallgui_dontaudit_rw_pipes" lineno="35">
-<summary>
-Do not audit attempts to read and
-write firewallgui unnamed pipes.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-</module>
<module name="games" filename="policy/modules/apps/games.if">
<summary>Various games.</summary>
<interface name="games_role" lineno="18">
@@ -5053,24 +4925,6 @@ Domain allowed access.
</param>
</interface>
</module>
-<module name="gift" filename="policy/modules/apps/gift.if">
-<summary>Peer to peer file sharing tool.</summary>
-<interface name="gift_role" lineno="18">
-<summary>
-Role access for gift.
-</summary>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-<param name="domain">
-<summary>
-User domain for the role.
-</summary>
-</param>
-</interface>
-</module>
<module name="gitosis" filename="policy/modules/apps/gitosis.if">
<summary>Tools for managing and hosting git repositories.</summary>
<interface name="gitosis_domtrans" lineno="13">
@@ -5884,7 +5738,7 @@ The type of the user domain.
</summary>
</param>
</template>
-<template name="java_domtrans" lineno="148">
+<interface name="java_domtrans" lineno="148">
<summary>
Execute the java program in the java domain.
</summary>
@@ -5893,7 +5747,7 @@ Execute the java program in the java domain.
Domain allowed to transition.
</summary>
</param>
-</template>
+</interface>
<interface name="java_run" lineno="178">
<summary>
Execute java in the java domain, and
@@ -7037,76 +6891,6 @@ Grant the openoffice domains manage rights on all user content
</desc>
</tunable>
</module>
-<module name="podsleuth" filename="policy/modules/apps/podsleuth.if">
-<summary>Podsleuth is a tool to get information about an Apple (TM) iPod (TM).</summary>
-<interface name="podsleuth_domtrans" lineno="13">
-<summary>
-Execute a domain transition to run podsleuth.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="podsleuth_run" lineno="39">
-<summary>
-Execute podsleuth in the podsleuth
-domain, and allow the specified role
-the podsleuth domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-</interface>
-</module>
-<module name="ptchown" filename="policy/modules/apps/ptchown.if">
-<summary>helper function for grantpt(3), changes ownship and permissions of pseudotty.</summary>
-<interface name="ptchown_domtrans" lineno="13">
-<summary>
-Execute a domain transition to run ptchown.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="ptchown_exec" lineno="32">
-<summary>
-Execute ptchown in the caller domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="ptchown_run" lineno="58">
-<summary>
-Execute ptchown in the ptchown
-domain, and allow the specified
-role the ptchown domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-</interface>
-</module>
<module name="pulseaudio" filename="policy/modules/apps/pulseaudio.if">
<summary>Pulseaudio network sound server.</summary>
<interface name="pulseaudio_role" lineno="18">
@@ -7359,7 +7143,7 @@ Domain prefix to be used.
</summary>
</param>
</template>
-<template name="qemu_role" lineno="113">
+<template name="qemu_role" lineno="112">
<summary>
Role access for qemu.
</summary>
@@ -7374,7 +7158,7 @@ User domain for the role.
</summary>
</param>
</template>
-<interface name="qemu_domtrans" lineno="134">
+<interface name="qemu_domtrans" lineno="133">
<summary>
Execute a domain transition to run qemu.
</summary>
@@ -7384,7 +7168,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="qemu_exec" lineno="153">
+<interface name="qemu_exec" lineno="152">
<summary>
Execute a qemu in the caller domain.
</summary>
@@ -7394,7 +7178,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_run" lineno="180">
+<interface name="qemu_run" lineno="179">
<summary>
Execute qemu in the qemu domain,
and allow the specified role the
@@ -7412,7 +7196,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="qemu_read_state" lineno="199">
+<interface name="qemu_read_state" lineno="198">
<summary>
Read qemu process state files.
</summary>
@@ -7422,7 +7206,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="qemu_setsched" lineno="220">
+<interface name="qemu_setsched" lineno="219">
<summary>
Set qemu scheduler.
</summary>
@@ -7432,7 +7216,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_signal" lineno="238">
+<interface name="qemu_signal" lineno="237">
<summary>
Send generic signals to qemu.
</summary>
@@ -7442,7 +7226,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_kill" lineno="256">
+<interface name="qemu_kill" lineno="255">
<summary>
Send kill signals to qemu.
</summary>
@@ -7452,7 +7236,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_stream_connect" lineno="275">
+<interface name="qemu_stream_connect" lineno="274">
<summary>
Connect to qemu with a unix
domain stream socket.
@@ -7463,9 +7247,19 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_delete_pid_sock_file" lineno="294">
+<interface name="qemu_delete_pid_sock_file" lineno="293">
+<summary>
+Unlink qemu socket (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="qemu_delete_runtime_sock_files" lineno="308">
<summary>
-Unlink qemu socket
+Unlink qemu runtime sockets.
</summary>
<param name="domain">
<summary>
@@ -7473,7 +7267,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_domtrans_unconfined" lineno="313">
+<interface name="qemu_domtrans_unconfined" lineno="327">
<summary>
Execute a domain transition to
run qemu unconfined.
@@ -7484,7 +7278,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="qemu_manage_tmp_dirs" lineno="333">
+<interface name="qemu_manage_tmp_dirs" lineno="347">
<summary>
Create, read, write, and delete
qemu temporary directories.
@@ -7495,7 +7289,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_manage_tmp_files" lineno="353">
+<interface name="qemu_manage_tmp_files" lineno="367">
<summary>
Create, read, write, and delete
qemu temporary files.
@@ -7506,7 +7300,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_spec_domtrans" lineno="387">
+<interface name="qemu_spec_domtrans" lineno="401">
<summary>
Execute qemu in a specified domain.
</summary>
@@ -7531,7 +7325,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="qemu_entry_type" lineno="407">
+<interface name="qemu_entry_type" lineno="421">
<summary>
Make qemu executable files an
entrypoint for the specified domain.
@@ -7542,7 +7336,7 @@ The domain for which qemu_exec_t is an entrypoint.
</summary>
</param>
</interface>
-<interface name="qemu_rw_pid_sock_files" lineno="427">
+<interface name="qemu_rw_pid_sock_files" lineno="441">
<summary>
Read/write to qemu socket files in /var/run
</summary>
@@ -7621,9 +7415,6 @@ Domain allowed access.
</param>
</interface>
</module>
-<module name="sambagui" filename="policy/modules/apps/sambagui.if">
-<summary>system-config-samba dbus service.</summary>
-</module>
<module name="screen" filename="policy/modules/apps/screen.if">
<summary>GNU terminal multiplexer.</summary>
<template name="screen_role_template" lineno="24">
@@ -8449,7 +8240,7 @@ The type of the user domain.
</summary>
</param>
</template>
-<interface name="wm_exec" lineno="112">
+<interface name="wm_exec" lineno="116">
<summary>
Execute wm in the caller domain.
</summary>
@@ -8459,7 +8250,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="wm_dbus_chat" lineno="138">
+<interface name="wm_dbus_chat" lineno="142">
<summary>
Send and receive messages from
specified wm over dbus.
@@ -8476,7 +8267,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="wm_dontaudit_exec_tmp_files" lineno="159">
+<interface name="wm_dontaudit_exec_tmp_files" lineno="163">
<summary>
Do not audit attempts to execute
files in temporary directories.
@@ -8487,7 +8278,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="wm_dontaudit_exec_tmpfs_files" lineno="178">
+<interface name="wm_dontaudit_exec_tmpfs_files" lineno="182">
<summary>
Do not audit attempts to execute
files in temporary filesystems.
@@ -8498,7 +8289,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="wm_application_domain" lineno="221">
+<interface name="wm_application_domain" lineno="225">
<summary>
Create a domain for applications
that are launched by the window
@@ -8533,7 +8324,7 @@ Type to be used as the source window manager domain.
</param>
<infoflow type="none"/>
</interface>
-<interface name="wm_write_pipes" lineno="246">
+<interface name="wm_write_pipes" lineno="250">
<summary>
Write wm unnamed pipes.
</summary>
@@ -8575,46 +8366,6 @@ Grant the xscreensaver domains read access to generic user content
</desc>
</tunable>
</module>
-<module name="yam" filename="policy/modules/apps/yam.if">
-<summary>Yum/Apt Mirroring.</summary>
-<interface name="yam_domtrans" lineno="13">
-<summary>
-Execute yam in the yam domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="yam_run" lineno="39">
-<summary>
-Execute yam in the yam domain, and
-allow the specified role the yam domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="yam_read_content" lineno="58">
-<summary>
-Read yam content.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-</module>
</layer>
<layer name="contrib">
<summary>Gentoo-specific policy modules</summary>
@@ -8910,7 +8661,7 @@ The user domain.
</summary>
</param>
</interface>
-<interface name="dropbox_dbus_chat" lineno="66">
+<interface name="dropbox_dbus_chat" lineno="67">
<summary>
Send and receive messages from the dropbox daemon
over dbus.
@@ -8921,7 +8672,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dropbox_read_content" lineno="86">
+<interface name="dropbox_read_content" lineno="87">
<summary>
Allow other domains to read dropbox's content files
</summary>
@@ -8931,7 +8682,7 @@ The domain that is allowed read access to the dropbox_content_t files
</summary>
</param>
</interface>
-<interface name="dropbox_manage_content" lineno="105">
+<interface name="dropbox_manage_content" lineno="106">
<summary>
Allow other domains to manage dropbox's content files
</summary>
@@ -9704,7 +9455,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="vde_connect" lineno="50">
+<interface name="vde_connect" lineno="49">
<summary>
</summary>
<param name="domain">
@@ -9731,7 +9482,7 @@ run init.
<interface name="corecmd_executable_file" lineno="23">
<summary>
Make the specified type usable for files
-that are exectuables, such as binary programs.
+that are executables, such as binary programs.
This does not include shared libraries.
</summary>
<param name="type">
@@ -9742,7 +9493,7 @@ Type to be used for files.
</interface>
<interface name="corecmd_bin_entry_type" lineno="44">
<summary>
-Make general progams in bin an entrypoint for
+Make general programs in bin an entrypoint for
the specified domain.
</summary>
<param name="domain">
@@ -9852,17 +9603,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corecmd_read_bin_symlinks" lineno="249">
-<summary>
-Read symbolic links in bin directories.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="corecmd_read_bin_pipes" lineno="265">
+<interface name="corecmd_read_bin_pipes" lineno="249">
<summary>
Read pipes in bin directories.
</summary>
@@ -9872,7 +9613,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_read_bin_sockets" lineno="284">
+<interface name="corecmd_read_bin_sockets" lineno="268">
<summary>
Read named sockets in bin directories.
</summary>
@@ -9882,7 +9623,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_exec_bin" lineno="324">
+<interface name="corecmd_exec_bin" lineno="308">
<summary>
Execute generic programs in bin directories,
in the caller domain.
@@ -9895,7 +9636,7 @@ in system bin directories (/bin, /sbin, /usr/bin,
</p>
<p>
Typically, this interface should be used when the domain
-executes general system progams within the privileges
+executes general system programs within the privileges
of the source domain. Some examples of these programs
are ls, cp, sed, python, and tar. This does not include
shells, such as bash.
@@ -9913,7 +9654,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_manage_bin_files" lineno="343">
+<interface name="corecmd_manage_bin_files" lineno="327">
<summary>
Create, read, write, and delete bin files.
</summary>
@@ -9923,7 +9664,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_relabel_bin_files" lineno="362">
+<interface name="corecmd_relabel_bin_files" lineno="346">
<summary>
Relabel to and from the bin type.
</summary>
@@ -9933,7 +9674,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_mmap_bin_files" lineno="381">
+<interface name="corecmd_mmap_bin_files" lineno="365">
<summary>
Mmap a bin file as executable.
</summary>
@@ -9943,7 +9684,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_bin_spec_domtrans" lineno="426">
+<interface name="corecmd_bin_spec_domtrans" lineno="410">
<summary>
Execute a file in a bin directory
in the specified domain but do not
@@ -9979,7 +9720,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="corecmd_bin_domtrans" lineno="469">
+<interface name="corecmd_bin_domtrans" lineno="453">
<summary>
Execute a file in a bin directory
in the specified domain.
@@ -10013,7 +9754,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="corecmd_check_exec_shell" lineno="488">
+<interface name="corecmd_check_exec_shell" lineno="472">
<summary>
Check if a shell is executable (DAC-wise).
</summary>
@@ -10023,7 +9764,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_exec_shell" lineno="525">
+<interface name="corecmd_exec_shell" lineno="509">
<summary>
Execute shells in the caller domain.
</summary>
@@ -10051,7 +9792,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_shell_spec_domtrans" lineno="563">
+<interface name="corecmd_shell_spec_domtrans" lineno="547">
<summary>
Execute a shell in the target domain. This
is an explicit transition, requiring the
@@ -10080,7 +9821,7 @@ The type of the shell process.
</summary>
</param>
</interface>
-<interface name="corecmd_shell_domtrans" lineno="597">
+<interface name="corecmd_shell_domtrans" lineno="581">
<summary>
Execute a shell in the specified domain.
</summary>
@@ -10105,7 +9846,7 @@ The type of the shell process.
</summary>
</param>
</interface>
-<interface name="corecmd_exec_chroot" lineno="616">
+<interface name="corecmd_exec_chroot" lineno="600">
<summary>
Execute chroot in the caller domain.
</summary>
@@ -10115,7 +9856,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_getattr_all_executables" lineno="637">
+<interface name="corecmd_getattr_all_executables" lineno="621">
<summary>
Get the attributes of all executable files.
</summary>
@@ -10126,7 +9867,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_read_all_executables" lineno="658">
+<interface name="corecmd_read_all_executables" lineno="642">
<summary>
Read all executable files.
</summary>
@@ -10137,7 +9878,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_exec_all_executables" lineno="678">
+<interface name="corecmd_exec_all_executables" lineno="662">
<summary>
Execute all executable files.
</summary>
@@ -10148,7 +9889,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_dontaudit_exec_all_executables" lineno="699">
+<interface name="corecmd_dontaudit_exec_all_executables" lineno="683">
<summary>
Do not audit attempts to execute all executables.
</summary>
@@ -10158,7 +9899,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corecmd_manage_all_executables" lineno="718">
+<interface name="corecmd_manage_all_executables" lineno="702">
<summary>
Create, read, write, and all executable files.
</summary>
@@ -10169,7 +9910,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_relabel_all_executables" lineno="740">
+<interface name="corecmd_relabel_all_executables" lineno="724">
<summary>
Relabel to and from the bin type.
</summary>
@@ -10180,7 +9921,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_mmap_all_executables" lineno="760">
+<interface name="corecmd_mmap_all_executables" lineno="744">
<summary>
Mmap all executables as executable.
</summary>
@@ -10190,7 +9931,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_relabel_bin_dirs" lineno="782">
+<interface name="corecmd_relabel_bin_dirs" lineno="766">
<summary>
Relabel to and from the bin type.
</summary>
@@ -10200,7 +9941,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_relabel_bin_lnk_files" lineno="800">
+<interface name="corecmd_relabel_bin_lnk_files" lineno="784">
<summary>
Relabel to and from the bin type.
</summary>
@@ -11928,7 +11669,7 @@ Receive packets from an unlabeled connection.
Allow the specified domain to receive packets from an
unlabeled connection. On machines that do not utilize
labeled networking, this will be required on all
-networking domains. On machines tha do utilize
+networking domains. On machines that do utilize
labeled networking, this will be required for any
networking domain that is allowed to receive
network traffic that does not have a label.
@@ -12279,7 +12020,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_all_packets" lineno="3362">
+<interface name="corenet_send_all_packets" lineno="3356">
<summary>
Send all packets.
</summary>
@@ -12289,7 +12030,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_receive_all_packets" lineno="3380">
+<interface name="corenet_receive_all_packets" lineno="3374">
<summary>
Receive all packets.
</summary>
@@ -12299,7 +12040,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sendrecv_all_packets" lineno="3398">
+<interface name="corenet_sendrecv_all_packets" lineno="3392">
<summary>
Send and receive all packets.
</summary>
@@ -12309,7 +12050,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_relabelto_all_packets" lineno="3413">
+<interface name="corenet_relabelto_all_packets" lineno="3407">
<summary>
Relabel packets to any packet type.
</summary>
@@ -12319,7 +12060,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3431">
+<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3425">
<summary>
Access unlabeled infiniband pkeys.
</summary>
@@ -12329,7 +12070,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_ib_access_all_pkeys" lineno="3445">
+<interface name="corenet_ib_access_all_pkeys" lineno="3439">
<summary>
Access all labeled infiniband pkeys.
</summary>
@@ -12339,7 +12080,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_ib_manage_subnet_all_endports" lineno="3463">
+<interface name="corenet_ib_manage_subnet_all_endports" lineno="3457">
<summary>
Manage subnets on all labeled Infiniband endports
</summary>
@@ -12349,7 +12090,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3481">
+<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3475">
<summary>
Manage subnet on all unlabeled Infiniband endports
</summary>
@@ -12359,7 +12100,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_recvfrom_labeled" lineno="3500">
+<interface name="corenet_sctp_recvfrom_labeled" lineno="3494">
<summary>
Rules for receiving labeled SCTP packets.
</summary>
@@ -12374,7 +12115,7 @@ Peer domain.
</summary>
</param>
</interface>
-<interface name="corenet_unconfined" lineno="3523">
+<interface name="corenet_unconfined" lineno="3517">
<summary>
Unconfined access to network objects.
</summary>
@@ -12384,7 +12125,83 @@ The domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_adb_port" lineno="3543">
+<interface name="corenet_send_icmp_packets" lineno="3537">
+<summary>
+Send icmp packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="write" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_send_icmp_packets" lineno="3556">
+<summary>
+Do not audit attempts to send icmp packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_receive_icmp_packets" lineno="3575">
+<summary>
+Receive icmp packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="read" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_receive_icmp_packets" lineno="3594">
+<summary>
+Do not audit attempts to receive icmp packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_sendrecv_icmp_packets" lineno="3613">
+<summary>
+Send and receive icmp packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="both" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_sendrecv_icmp_packets" lineno="3629">
+<summary>
+Do not audit attempts to send and receive icmp packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_relabelto_icmp_packets" lineno="3644">
+<summary>
+Relabel packets to icmp the packet type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corenet_tcp_sendrecv_adb_port" lineno="3666">
<summary>
Send and receive TCP traffic on the adb port.
</summary>
@@ -12395,7 +12212,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_adb_port" lineno="3558">
+<interface name="corenet_udp_send_adb_port" lineno="3681">
<summary>
Send UDP traffic on the adb port.
</summary>
@@ -12406,7 +12223,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3573">
+<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3696">
<summary>
Do not audit attempts to send UDP traffic on the adb port.
</summary>
@@ -12417,7 +12234,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_adb_port" lineno="3588">
+<interface name="corenet_udp_receive_adb_port" lineno="3711">
<summary>
Receive UDP traffic on the adb port.
</summary>
@@ -12428,7 +12245,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3603">
+<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3726">
<summary>
Do not audit attempts to receive UDP traffic on the adb port.
</summary>
@@ -12439,7 +12256,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_adb_port" lineno="3618">
+<interface name="corenet_udp_sendrecv_adb_port" lineno="3741">
<summary>
Send and receive UDP traffic on the adb port.
</summary>
@@ -12450,7 +12267,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3634">
+<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3757">
<summary>
Do not audit attempts to send and receive
UDP traffic on the adb port.
@@ -12462,7 +12279,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_adb_port" lineno="3649">
+<interface name="corenet_tcp_bind_adb_port" lineno="3772">
<summary>
Bind TCP sockets to the adb port.
</summary>
@@ -12473,7 +12290,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_adb_port" lineno="3669">
+<interface name="corenet_udp_bind_adb_port" lineno="3792">
<summary>
Bind UDP sockets to the adb port.
</summary>
@@ -12484,7 +12301,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_adb_port" lineno="3688">
+<interface name="corenet_tcp_connect_adb_port" lineno="3811">
<summary>
Make a TCP connection to the adb port.
</summary>
@@ -12494,7 +12311,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_adb_client_packets" lineno="3708">
+<interface name="corenet_send_adb_client_packets" lineno="3831">
<summary>
Send adb_client packets.
</summary>
@@ -12505,7 +12322,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3727">
+<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3850">
<summary>
Do not audit attempts to send adb_client packets.
</summary>
@@ -12516,7 +12333,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_adb_client_packets" lineno="3746">
+<interface name="corenet_receive_adb_client_packets" lineno="3869">
<summary>
Receive adb_client packets.
</summary>
@@ -12527,7 +12344,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3765">
+<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3888">
<summary>
Do not audit attempts to receive adb_client packets.
</summary>
@@ -12538,7 +12355,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_adb_client_packets" lineno="3784">
+<interface name="corenet_sendrecv_adb_client_packets" lineno="3907">
<summary>
Send and receive adb_client packets.
</summary>
@@ -12549,7 +12366,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3800">
+<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3923">
<summary>
Do not audit attempts to send and receive adb_client packets.
</summary>
@@ -12560,7 +12377,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_adb_client_packets" lineno="3815">
+<interface name="corenet_relabelto_adb_client_packets" lineno="3938">
<summary>
Relabel packets to adb_client the packet type.
</summary>
@@ -12570,7 +12387,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_adb_server_packets" lineno="3835">
+<interface name="corenet_send_adb_server_packets" lineno="3958">
<summary>
Send adb_server packets.
</summary>
@@ -12581,7 +12398,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3854">
+<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3977">
<summary>
Do not audit attempts to send adb_server packets.
</summary>
@@ -12592,7 +12409,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_adb_server_packets" lineno="3873">
+<interface name="corenet_receive_adb_server_packets" lineno="3996">
<summary>
Receive adb_server packets.
</summary>
@@ -12603,7 +12420,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="3892">
+<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="4015">
<summary>
Do not audit attempts to receive adb_server packets.
</summary>
@@ -12614,7 +12431,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_adb_server_packets" lineno="3911">
+<interface name="corenet_sendrecv_adb_server_packets" lineno="4034">
<summary>
Send and receive adb_server packets.
</summary>
@@ -12625,7 +12442,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="3927">
+<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4050">
<summary>
Do not audit attempts to send and receive adb_server packets.
</summary>
@@ -12636,7 +12453,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_adb_server_packets" lineno="3942">
+<interface name="corenet_relabelto_adb_server_packets" lineno="4065">
<summary>
Relabel packets to adb_server the packet type.
</summary>
@@ -12646,7 +12463,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="3964">
+<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4087">
<summary>
Send and receive TCP traffic on the afs_bos port.
</summary>
@@ -12657,7 +12474,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs_bos_port" lineno="3979">
+<interface name="corenet_udp_send_afs_bos_port" lineno="4102">
<summary>
Send UDP traffic on the afs_bos port.
</summary>
@@ -12668,7 +12485,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="3994">
+<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4117">
<summary>
Do not audit attempts to send UDP traffic on the afs_bos port.
</summary>
@@ -12679,7 +12496,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs_bos_port" lineno="4009">
+<interface name="corenet_udp_receive_afs_bos_port" lineno="4132">
<summary>
Receive UDP traffic on the afs_bos port.
</summary>
@@ -12690,7 +12507,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4024">
+<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4147">
<summary>
Do not audit attempts to receive UDP traffic on the afs_bos port.
</summary>
@@ -12701,7 +12518,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4039">
+<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4162">
<summary>
Send and receive UDP traffic on the afs_bos port.
</summary>
@@ -12712,7 +12529,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4055">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4178">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_bos port.
@@ -12724,7 +12541,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs_bos_port" lineno="4070">
+<interface name="corenet_tcp_bind_afs_bos_port" lineno="4193">
<summary>
Bind TCP sockets to the afs_bos port.
</summary>
@@ -12735,7 +12552,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_bos_port" lineno="4090">
+<interface name="corenet_udp_bind_afs_bos_port" lineno="4213">
<summary>
Bind UDP sockets to the afs_bos port.
</summary>
@@ -12746,7 +12563,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_bos_port" lineno="4109">
+<interface name="corenet_tcp_connect_afs_bos_port" lineno="4232">
<summary>
Make a TCP connection to the afs_bos port.
</summary>
@@ -12756,7 +12573,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_bos_client_packets" lineno="4129">
+<interface name="corenet_send_afs_bos_client_packets" lineno="4252">
<summary>
Send afs_bos_client packets.
</summary>
@@ -12767,7 +12584,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4148">
+<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4271">
<summary>
Do not audit attempts to send afs_bos_client packets.
</summary>
@@ -12778,7 +12595,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_bos_client_packets" lineno="4167">
+<interface name="corenet_receive_afs_bos_client_packets" lineno="4290">
<summary>
Receive afs_bos_client packets.
</summary>
@@ -12789,7 +12606,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4186">
+<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4309">
<summary>
Do not audit attempts to receive afs_bos_client packets.
</summary>
@@ -12800,7 +12617,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4205">
+<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4328">
<summary>
Send and receive afs_bos_client packets.
</summary>
@@ -12811,7 +12628,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4221">
+<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4344">
<summary>
Do not audit attempts to send and receive afs_bos_client packets.
</summary>
@@ -12822,7 +12639,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4236">
+<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4359">
<summary>
Relabel packets to afs_bos_client the packet type.
</summary>
@@ -12832,7 +12649,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_bos_server_packets" lineno="4256">
+<interface name="corenet_send_afs_bos_server_packets" lineno="4379">
<summary>
Send afs_bos_server packets.
</summary>
@@ -12843,7 +12660,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4275">
+<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4398">
<summary>
Do not audit attempts to send afs_bos_server packets.
</summary>
@@ -12854,7 +12671,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_bos_server_packets" lineno="4294">
+<interface name="corenet_receive_afs_bos_server_packets" lineno="4417">
<summary>
Receive afs_bos_server packets.
</summary>
@@ -12865,7 +12682,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4313">
+<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4436">
<summary>
Do not audit attempts to receive afs_bos_server packets.
</summary>
@@ -12876,7 +12693,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4332">
+<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4455">
<summary>
Send and receive afs_bos_server packets.
</summary>
@@ -12887,7 +12704,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4348">
+<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4471">
<summary>
Do not audit attempts to send and receive afs_bos_server packets.
</summary>
@@ -12898,7 +12715,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4363">
+<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4486">
<summary>
Relabel packets to afs_bos_server the packet type.
</summary>
@@ -12908,7 +12725,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4385">
+<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4508">
<summary>
Send and receive TCP traffic on the afs_fs port.
</summary>
@@ -12919,7 +12736,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs_fs_port" lineno="4400">
+<interface name="corenet_udp_send_afs_fs_port" lineno="4523">
<summary>
Send UDP traffic on the afs_fs port.
</summary>
@@ -12930,7 +12747,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4415">
+<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4538">
<summary>
Do not audit attempts to send UDP traffic on the afs_fs port.
</summary>
@@ -12941,7 +12758,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs_fs_port" lineno="4430">
+<interface name="corenet_udp_receive_afs_fs_port" lineno="4553">
<summary>
Receive UDP traffic on the afs_fs port.
</summary>
@@ -12952,7 +12769,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4445">
+<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4568">
<summary>
Do not audit attempts to receive UDP traffic on the afs_fs port.
</summary>
@@ -12963,7 +12780,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4460">
+<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4583">
<summary>
Send and receive UDP traffic on the afs_fs port.
</summary>
@@ -12974,7 +12791,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4476">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4599">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_fs port.
@@ -12986,7 +12803,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs_fs_port" lineno="4491">
+<interface name="corenet_tcp_bind_afs_fs_port" lineno="4614">
<summary>
Bind TCP sockets to the afs_fs port.
</summary>
@@ -12997,7 +12814,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_fs_port" lineno="4511">
+<interface name="corenet_udp_bind_afs_fs_port" lineno="4634">
<summary>
Bind UDP sockets to the afs_fs port.
</summary>
@@ -13008,7 +12825,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_fs_port" lineno="4530">
+<interface name="corenet_tcp_connect_afs_fs_port" lineno="4653">
<summary>
Make a TCP connection to the afs_fs port.
</summary>
@@ -13018,7 +12835,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_fs_client_packets" lineno="4550">
+<interface name="corenet_send_afs_fs_client_packets" lineno="4673">
<summary>
Send afs_fs_client packets.
</summary>
@@ -13029,7 +12846,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4569">
+<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4692">
<summary>
Do not audit attempts to send afs_fs_client packets.
</summary>
@@ -13040,7 +12857,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_fs_client_packets" lineno="4588">
+<interface name="corenet_receive_afs_fs_client_packets" lineno="4711">
<summary>
Receive afs_fs_client packets.
</summary>
@@ -13051,7 +12868,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4607">
+<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4730">
<summary>
Do not audit attempts to receive afs_fs_client packets.
</summary>
@@ -13062,7 +12879,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4626">
+<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4749">
<summary>
Send and receive afs_fs_client packets.
</summary>
@@ -13073,7 +12890,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4642">
+<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4765">
<summary>
Do not audit attempts to send and receive afs_fs_client packets.
</summary>
@@ -13084,7 +12901,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4657">
+<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4780">
<summary>
Relabel packets to afs_fs_client the packet type.
</summary>
@@ -13094,7 +12911,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_fs_server_packets" lineno="4677">
+<interface name="corenet_send_afs_fs_server_packets" lineno="4800">
<summary>
Send afs_fs_server packets.
</summary>
@@ -13105,7 +12922,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4696">
+<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4819">
<summary>
Do not audit attempts to send afs_fs_server packets.
</summary>
@@ -13116,7 +12933,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_fs_server_packets" lineno="4715">
+<interface name="corenet_receive_afs_fs_server_packets" lineno="4838">
<summary>
Receive afs_fs_server packets.
</summary>
@@ -13127,7 +12944,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4734">
+<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4857">
<summary>
Do not audit attempts to receive afs_fs_server packets.
</summary>
@@ -13138,7 +12955,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4753">
+<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4876">
<summary>
Send and receive afs_fs_server packets.
</summary>
@@ -13149,7 +12966,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4769">
+<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4892">
<summary>
Do not audit attempts to send and receive afs_fs_server packets.
</summary>
@@ -13160,7 +12977,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4784">
+<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4907">
<summary>
Relabel packets to afs_fs_server the packet type.
</summary>
@@ -13170,7 +12987,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4806">
+<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4929">
<summary>
Send and receive TCP traffic on the afs_ka port.
</summary>
@@ -13181,7 +12998,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs_ka_port" lineno="4821">
+<interface name="corenet_udp_send_afs_ka_port" lineno="4944">
<summary>
Send UDP traffic on the afs_ka port.
</summary>
@@ -13192,7 +13009,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4836">
+<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4959">
<summary>
Do not audit attempts to send UDP traffic on the afs_ka port.
</summary>
@@ -13203,7 +13020,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs_ka_port" lineno="4851">
+<interface name="corenet_udp_receive_afs_ka_port" lineno="4974">
<summary>
Receive UDP traffic on the afs_ka port.
</summary>
@@ -13214,7 +13031,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="4866">
+<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="4989">
<summary>
Do not audit attempts to receive UDP traffic on the afs_ka port.
</summary>
@@ -13225,7 +13042,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="4881">
+<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5004">
<summary>
Send and receive UDP traffic on the afs_ka port.
</summary>
@@ -13236,7 +13053,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="4897">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5020">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_ka port.
@@ -13248,7 +13065,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs_ka_port" lineno="4912">
+<interface name="corenet_tcp_bind_afs_ka_port" lineno="5035">
<summary>
Bind TCP sockets to the afs_ka port.
</summary>
@@ -13259,7 +13076,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_ka_port" lineno="4932">
+<interface name="corenet_udp_bind_afs_ka_port" lineno="5055">
<summary>
Bind UDP sockets to the afs_ka port.
</summary>
@@ -13270,7 +13087,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_ka_port" lineno="4951">
+<interface name="corenet_tcp_connect_afs_ka_port" lineno="5074">
<summary>
Make a TCP connection to the afs_ka port.
</summary>
@@ -13280,7 +13097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_ka_client_packets" lineno="4971">
+<interface name="corenet_send_afs_ka_client_packets" lineno="5094">
<summary>
Send afs_ka_client packets.
</summary>
@@ -13291,7 +13108,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="4990">
+<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5113">
<summary>
Do not audit attempts to send afs_ka_client packets.
</summary>
@@ -13302,7 +13119,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_ka_client_packets" lineno="5009">
+<interface name="corenet_receive_afs_ka_client_packets" lineno="5132">
<summary>
Receive afs_ka_client packets.
</summary>
@@ -13313,7 +13130,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5028">
+<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5151">
<summary>
Do not audit attempts to receive afs_ka_client packets.
</summary>
@@ -13324,7 +13141,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5047">
+<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5170">
<summary>
Send and receive afs_ka_client packets.
</summary>
@@ -13335,7 +13152,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5063">
+<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5186">
<summary>
Do not audit attempts to send and receive afs_ka_client packets.
</summary>
@@ -13346,7 +13163,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5078">
+<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5201">
<summary>
Relabel packets to afs_ka_client the packet type.
</summary>
@@ -13356,7 +13173,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_ka_server_packets" lineno="5098">
+<interface name="corenet_send_afs_ka_server_packets" lineno="5221">
<summary>
Send afs_ka_server packets.
</summary>
@@ -13367,7 +13184,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5117">
+<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5240">
<summary>
Do not audit attempts to send afs_ka_server packets.
</summary>
@@ -13378,7 +13195,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_ka_server_packets" lineno="5136">
+<interface name="corenet_receive_afs_ka_server_packets" lineno="5259">
<summary>
Receive afs_ka_server packets.
</summary>
@@ -13389,7 +13206,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5155">
+<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5278">
<summary>
Do not audit attempts to receive afs_ka_server packets.
</summary>
@@ -13400,7 +13217,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5174">
+<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5297">
<summary>
Send and receive afs_ka_server packets.
</summary>
@@ -13411,7 +13228,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5190">
+<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5313">
<summary>
Do not audit attempts to send and receive afs_ka_server packets.
</summary>
@@ -13422,7 +13239,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5205">
+<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5328">
<summary>
Relabel packets to afs_ka_server the packet type.
</summary>
@@ -13432,7 +13249,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5227">
+<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5350">
<summary>
Send and receive TCP traffic on the afs_pt port.
</summary>
@@ -13443,7 +13260,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs_pt_port" lineno="5242">
+<interface name="corenet_udp_send_afs_pt_port" lineno="5365">
<summary>
Send UDP traffic on the afs_pt port.
</summary>
@@ -13454,7 +13271,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5257">
+<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5380">
<summary>
Do not audit attempts to send UDP traffic on the afs_pt port.
</summary>
@@ -13465,7 +13282,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs_pt_port" lineno="5272">
+<interface name="corenet_udp_receive_afs_pt_port" lineno="5395">
<summary>
Receive UDP traffic on the afs_pt port.
</summary>
@@ -13476,7 +13293,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5287">
+<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5410">
<summary>
Do not audit attempts to receive UDP traffic on the afs_pt port.
</summary>
@@ -13487,7 +13304,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5302">
+<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5425">
<summary>
Send and receive UDP traffic on the afs_pt port.
</summary>
@@ -13498,7 +13315,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5318">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5441">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_pt port.
@@ -13510,7 +13327,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs_pt_port" lineno="5333">
+<interface name="corenet_tcp_bind_afs_pt_port" lineno="5456">
<summary>
Bind TCP sockets to the afs_pt port.
</summary>
@@ -13521,7 +13338,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_pt_port" lineno="5353">
+<interface name="corenet_udp_bind_afs_pt_port" lineno="5476">
<summary>
Bind UDP sockets to the afs_pt port.
</summary>
@@ -13532,7 +13349,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_pt_port" lineno="5372">
+<interface name="corenet_tcp_connect_afs_pt_port" lineno="5495">
<summary>
Make a TCP connection to the afs_pt port.
</summary>
@@ -13542,7 +13359,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_pt_client_packets" lineno="5392">
+<interface name="corenet_send_afs_pt_client_packets" lineno="5515">
<summary>
Send afs_pt_client packets.
</summary>
@@ -13553,7 +13370,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5411">
+<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5534">
<summary>
Do not audit attempts to send afs_pt_client packets.
</summary>
@@ -13564,7 +13381,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_pt_client_packets" lineno="5430">
+<interface name="corenet_receive_afs_pt_client_packets" lineno="5553">
<summary>
Receive afs_pt_client packets.
</summary>
@@ -13575,7 +13392,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5449">
+<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5572">
<summary>
Do not audit attempts to receive afs_pt_client packets.
</summary>
@@ -13586,7 +13403,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5468">
+<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5591">
<summary>
Send and receive afs_pt_client packets.
</summary>
@@ -13597,7 +13414,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5484">
+<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5607">
<summary>
Do not audit attempts to send and receive afs_pt_client packets.
</summary>
@@ -13608,7 +13425,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5499">
+<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5622">
<summary>
Relabel packets to afs_pt_client the packet type.
</summary>
@@ -13618,7 +13435,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_pt_server_packets" lineno="5519">
+<interface name="corenet_send_afs_pt_server_packets" lineno="5642">
<summary>
Send afs_pt_server packets.
</summary>
@@ -13629,7 +13446,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5538">
+<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5661">
<summary>
Do not audit attempts to send afs_pt_server packets.
</summary>
@@ -13640,7 +13457,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_pt_server_packets" lineno="5557">
+<interface name="corenet_receive_afs_pt_server_packets" lineno="5680">
<summary>
Receive afs_pt_server packets.
</summary>
@@ -13651,7 +13468,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5576">
+<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5699">
<summary>
Do not audit attempts to receive afs_pt_server packets.
</summary>
@@ -13662,7 +13479,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5595">
+<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5718">
<summary>
Send and receive afs_pt_server packets.
</summary>
@@ -13673,7 +13490,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5611">
+<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5734">
<summary>
Do not audit attempts to send and receive afs_pt_server packets.
</summary>
@@ -13684,7 +13501,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5626">
+<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5749">
<summary>
Relabel packets to afs_pt_server the packet type.
</summary>
@@ -13694,7 +13511,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5648">
+<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5771">
<summary>
Send and receive TCP traffic on the afs_vl port.
</summary>
@@ -13705,7 +13522,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs_vl_port" lineno="5663">
+<interface name="corenet_udp_send_afs_vl_port" lineno="5786">
<summary>
Send UDP traffic on the afs_vl port.
</summary>
@@ -13716,7 +13533,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5678">
+<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5801">
<summary>
Do not audit attempts to send UDP traffic on the afs_vl port.
</summary>
@@ -13727,7 +13544,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs_vl_port" lineno="5693">
+<interface name="corenet_udp_receive_afs_vl_port" lineno="5816">
<summary>
Receive UDP traffic on the afs_vl port.
</summary>
@@ -13738,7 +13555,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5708">
+<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5831">
<summary>
Do not audit attempts to receive UDP traffic on the afs_vl port.
</summary>
@@ -13749,7 +13566,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5723">
+<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5846">
<summary>
Send and receive UDP traffic on the afs_vl port.
</summary>
@@ -13760,7 +13577,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5739">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5862">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_vl port.
@@ -13772,7 +13589,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs_vl_port" lineno="5754">
+<interface name="corenet_tcp_bind_afs_vl_port" lineno="5877">
<summary>
Bind TCP sockets to the afs_vl port.
</summary>
@@ -13783,7 +13600,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_vl_port" lineno="5774">
+<interface name="corenet_udp_bind_afs_vl_port" lineno="5897">
<summary>
Bind UDP sockets to the afs_vl port.
</summary>
@@ -13794,7 +13611,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_vl_port" lineno="5793">
+<interface name="corenet_tcp_connect_afs_vl_port" lineno="5916">
<summary>
Make a TCP connection to the afs_vl port.
</summary>
@@ -13804,7 +13621,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_vl_client_packets" lineno="5813">
+<interface name="corenet_send_afs_vl_client_packets" lineno="5936">
<summary>
Send afs_vl_client packets.
</summary>
@@ -13815,7 +13632,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5832">
+<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5955">
<summary>
Do not audit attempts to send afs_vl_client packets.
</summary>
@@ -13826,7 +13643,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_vl_client_packets" lineno="5851">
+<interface name="corenet_receive_afs_vl_client_packets" lineno="5974">
<summary>
Receive afs_vl_client packets.
</summary>
@@ -13837,7 +13654,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5870">
+<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5993">
<summary>
Do not audit attempts to receive afs_vl_client packets.
</summary>
@@ -13848,7 +13665,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="5889">
+<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6012">
<summary>
Send and receive afs_vl_client packets.
</summary>
@@ -13859,7 +13676,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="5905">
+<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6028">
<summary>
Do not audit attempts to send and receive afs_vl_client packets.
</summary>
@@ -13870,7 +13687,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_vl_client_packets" lineno="5920">
+<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6043">
<summary>
Relabel packets to afs_vl_client the packet type.
</summary>
@@ -13880,7 +13697,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_vl_server_packets" lineno="5940">
+<interface name="corenet_send_afs_vl_server_packets" lineno="6063">
<summary>
Send afs_vl_server packets.
</summary>
@@ -13891,7 +13708,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="5959">
+<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6082">
<summary>
Do not audit attempts to send afs_vl_server packets.
</summary>
@@ -13902,7 +13719,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_vl_server_packets" lineno="5978">
+<interface name="corenet_receive_afs_vl_server_packets" lineno="6101">
<summary>
Receive afs_vl_server packets.
</summary>
@@ -13913,7 +13730,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="5997">
+<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6120">
<summary>
Do not audit attempts to receive afs_vl_server packets.
</summary>
@@ -13924,7 +13741,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6016">
+<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6139">
<summary>
Send and receive afs_vl_server packets.
</summary>
@@ -13935,7 +13752,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6032">
+<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6155">
<summary>
Do not audit attempts to send and receive afs_vl_server packets.
</summary>
@@ -13946,7 +13763,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6047">
+<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6170">
<summary>
Relabel packets to afs_vl_server the packet type.
</summary>
@@ -13956,7 +13773,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6069">
+<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6192">
<summary>
Send and receive TCP traffic on the afs3_callback port.
</summary>
@@ -13967,7 +13784,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs3_callback_port" lineno="6084">
+<interface name="corenet_udp_send_afs3_callback_port" lineno="6207">
<summary>
Send UDP traffic on the afs3_callback port.
</summary>
@@ -13978,7 +13795,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6099">
+<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6222">
<summary>
Do not audit attempts to send UDP traffic on the afs3_callback port.
</summary>
@@ -13989,7 +13806,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs3_callback_port" lineno="6114">
+<interface name="corenet_udp_receive_afs3_callback_port" lineno="6237">
<summary>
Receive UDP traffic on the afs3_callback port.
</summary>
@@ -14000,7 +13817,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6129">
+<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6252">
<summary>
Do not audit attempts to receive UDP traffic on the afs3_callback port.
</summary>
@@ -14011,7 +13828,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6144">
+<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6267">
<summary>
Send and receive UDP traffic on the afs3_callback port.
</summary>
@@ -14022,7 +13839,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6160">
+<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6283">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs3_callback port.
@@ -14034,7 +13851,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6175">
+<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6298">
<summary>
Bind TCP sockets to the afs3_callback port.
</summary>
@@ -14045,7 +13862,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs3_callback_port" lineno="6195">
+<interface name="corenet_udp_bind_afs3_callback_port" lineno="6318">
<summary>
Bind UDP sockets to the afs3_callback port.
</summary>
@@ -14056,7 +13873,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6214">
+<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6337">
<summary>
Make a TCP connection to the afs3_callback port.
</summary>
@@ -14066,7 +13883,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs3_callback_client_packets" lineno="6234">
+<interface name="corenet_send_afs3_callback_client_packets" lineno="6357">
<summary>
Send afs3_callback_client packets.
</summary>
@@ -14077,7 +13894,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6253">
+<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6376">
<summary>
Do not audit attempts to send afs3_callback_client packets.
</summary>
@@ -14088,7 +13905,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs3_callback_client_packets" lineno="6272">
+<interface name="corenet_receive_afs3_callback_client_packets" lineno="6395">
<summary>
Receive afs3_callback_client packets.
</summary>
@@ -14099,7 +13916,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6291">
+<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6414">
<summary>
Do not audit attempts to receive afs3_callback_client packets.
</summary>
@@ -14110,7 +13927,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6310">
+<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6433">
<summary>
Send and receive afs3_callback_client packets.
</summary>
@@ -14121,7 +13938,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6326">
+<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6449">
<summary>
Do not audit attempts to send and receive afs3_callback_client packets.
</summary>
@@ -14132,7 +13949,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6341">
+<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6464">
<summary>
Relabel packets to afs3_callback_client the packet type.
</summary>
@@ -14142,7 +13959,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs3_callback_server_packets" lineno="6361">
+<interface name="corenet_send_afs3_callback_server_packets" lineno="6484">
<summary>
Send afs3_callback_server packets.
</summary>
@@ -14153,7 +13970,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6380">
+<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6503">
<summary>
Do not audit attempts to send afs3_callback_server packets.
</summary>
@@ -14164,7 +13981,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs3_callback_server_packets" lineno="6399">
+<interface name="corenet_receive_afs3_callback_server_packets" lineno="6522">
<summary>
Receive afs3_callback_server packets.
</summary>
@@ -14175,7 +13992,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6418">
+<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6541">
<summary>
Do not audit attempts to receive afs3_callback_server packets.
</summary>
@@ -14186,7 +14003,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6437">
+<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6560">
<summary>
Send and receive afs3_callback_server packets.
</summary>
@@ -14197,7 +14014,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6453">
+<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6576">
<summary>
Do not audit attempts to send and receive afs3_callback_server packets.
</summary>
@@ -14208,7 +14025,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6468">
+<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6591">
<summary>
Relabel packets to afs3_callback_server the packet type.
</summary>
@@ -14218,7 +14035,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6490">
+<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6613">
<summary>
Send and receive TCP traffic on the agentx port.
</summary>
@@ -14229,7 +14046,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_agentx_port" lineno="6505">
+<interface name="corenet_udp_send_agentx_port" lineno="6628">
<summary>
Send UDP traffic on the agentx port.
</summary>
@@ -14240,7 +14057,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6520">
+<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6643">
<summary>
Do not audit attempts to send UDP traffic on the agentx port.
</summary>
@@ -14251,7 +14068,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_agentx_port" lineno="6535">
+<interface name="corenet_udp_receive_agentx_port" lineno="6658">
<summary>
Receive UDP traffic on the agentx port.
</summary>
@@ -14262,7 +14079,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6550">
+<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6673">
<summary>
Do not audit attempts to receive UDP traffic on the agentx port.
</summary>
@@ -14273,7 +14090,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_agentx_port" lineno="6565">
+<interface name="corenet_udp_sendrecv_agentx_port" lineno="6688">
<summary>
Send and receive UDP traffic on the agentx port.
</summary>
@@ -14284,7 +14101,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6581">
+<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6704">
<summary>
Do not audit attempts to send and receive
UDP traffic on the agentx port.
@@ -14296,7 +14113,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_agentx_port" lineno="6596">
+<interface name="corenet_tcp_bind_agentx_port" lineno="6719">
<summary>
Bind TCP sockets to the agentx port.
</summary>
@@ -14307,7 +14124,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_agentx_port" lineno="6616">
+<interface name="corenet_udp_bind_agentx_port" lineno="6739">
<summary>
Bind UDP sockets to the agentx port.
</summary>
@@ -14318,7 +14135,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_agentx_port" lineno="6635">
+<interface name="corenet_tcp_connect_agentx_port" lineno="6758">
<summary>
Make a TCP connection to the agentx port.
</summary>
@@ -14328,7 +14145,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_agentx_client_packets" lineno="6655">
+<interface name="corenet_send_agentx_client_packets" lineno="6778">
<summary>
Send agentx_client packets.
</summary>
@@ -14339,7 +14156,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6674">
+<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6797">
<summary>
Do not audit attempts to send agentx_client packets.
</summary>
@@ -14350,7 +14167,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_agentx_client_packets" lineno="6693">
+<interface name="corenet_receive_agentx_client_packets" lineno="6816">
<summary>
Receive agentx_client packets.
</summary>
@@ -14361,7 +14178,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6712">
+<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6835">
<summary>
Do not audit attempts to receive agentx_client packets.
</summary>
@@ -14372,7 +14189,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_agentx_client_packets" lineno="6731">
+<interface name="corenet_sendrecv_agentx_client_packets" lineno="6854">
<summary>
Send and receive agentx_client packets.
</summary>
@@ -14383,7 +14200,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6747">
+<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6870">
<summary>
Do not audit attempts to send and receive agentx_client packets.
</summary>
@@ -14394,7 +14211,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_agentx_client_packets" lineno="6762">
+<interface name="corenet_relabelto_agentx_client_packets" lineno="6885">
<summary>
Relabel packets to agentx_client the packet type.
</summary>
@@ -14404,7 +14221,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_agentx_server_packets" lineno="6782">
+<interface name="corenet_send_agentx_server_packets" lineno="6905">
<summary>
Send agentx_server packets.
</summary>
@@ -14415,7 +14232,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6801">
+<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6924">
<summary>
Do not audit attempts to send agentx_server packets.
</summary>
@@ -14426,7 +14243,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_agentx_server_packets" lineno="6820">
+<interface name="corenet_receive_agentx_server_packets" lineno="6943">
<summary>
Receive agentx_server packets.
</summary>
@@ -14437,7 +14254,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6839">
+<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6962">
<summary>
Do not audit attempts to receive agentx_server packets.
</summary>
@@ -14448,7 +14265,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_agentx_server_packets" lineno="6858">
+<interface name="corenet_sendrecv_agentx_server_packets" lineno="6981">
<summary>
Send and receive agentx_server packets.
</summary>
@@ -14459,7 +14276,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6874">
+<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6997">
<summary>
Do not audit attempts to send and receive agentx_server packets.
</summary>
@@ -14470,7 +14287,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_agentx_server_packets" lineno="6889">
+<interface name="corenet_relabelto_agentx_server_packets" lineno="7012">
<summary>
Relabel packets to agentx_server the packet type.
</summary>
@@ -14480,7 +14297,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amanda_port" lineno="6911">
+<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7034">
<summary>
Send and receive TCP traffic on the amanda port.
</summary>
@@ -14491,7 +14308,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_amanda_port" lineno="6926">
+<interface name="corenet_udp_send_amanda_port" lineno="7049">
<summary>
Send UDP traffic on the amanda port.
</summary>
@@ -14502,7 +14319,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="6941">
+<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7064">
<summary>
Do not audit attempts to send UDP traffic on the amanda port.
</summary>
@@ -14513,7 +14330,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_amanda_port" lineno="6956">
+<interface name="corenet_udp_receive_amanda_port" lineno="7079">
<summary>
Receive UDP traffic on the amanda port.
</summary>
@@ -14524,7 +14341,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="6971">
+<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7094">
<summary>
Do not audit attempts to receive UDP traffic on the amanda port.
</summary>
@@ -14535,7 +14352,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_amanda_port" lineno="6986">
+<interface name="corenet_udp_sendrecv_amanda_port" lineno="7109">
<summary>
Send and receive UDP traffic on the amanda port.
</summary>
@@ -14546,7 +14363,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7002">
+<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7125">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amanda port.
@@ -14558,7 +14375,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_amanda_port" lineno="7017">
+<interface name="corenet_tcp_bind_amanda_port" lineno="7140">
<summary>
Bind TCP sockets to the amanda port.
</summary>
@@ -14569,7 +14386,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amanda_port" lineno="7037">
+<interface name="corenet_udp_bind_amanda_port" lineno="7160">
<summary>
Bind UDP sockets to the amanda port.
</summary>
@@ -14580,7 +14397,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amanda_port" lineno="7056">
+<interface name="corenet_tcp_connect_amanda_port" lineno="7179">
<summary>
Make a TCP connection to the amanda port.
</summary>
@@ -14590,7 +14407,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amanda_client_packets" lineno="7076">
+<interface name="corenet_send_amanda_client_packets" lineno="7199">
<summary>
Send amanda_client packets.
</summary>
@@ -14601,7 +14418,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7095">
+<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7218">
<summary>
Do not audit attempts to send amanda_client packets.
</summary>
@@ -14612,7 +14429,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amanda_client_packets" lineno="7114">
+<interface name="corenet_receive_amanda_client_packets" lineno="7237">
<summary>
Receive amanda_client packets.
</summary>
@@ -14623,7 +14440,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7133">
+<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7256">
<summary>
Do not audit attempts to receive amanda_client packets.
</summary>
@@ -14634,7 +14451,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amanda_client_packets" lineno="7152">
+<interface name="corenet_sendrecv_amanda_client_packets" lineno="7275">
<summary>
Send and receive amanda_client packets.
</summary>
@@ -14645,7 +14462,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7168">
+<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7291">
<summary>
Do not audit attempts to send and receive amanda_client packets.
</summary>
@@ -14656,7 +14473,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amanda_client_packets" lineno="7183">
+<interface name="corenet_relabelto_amanda_client_packets" lineno="7306">
<summary>
Relabel packets to amanda_client the packet type.
</summary>
@@ -14666,7 +14483,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amanda_server_packets" lineno="7203">
+<interface name="corenet_send_amanda_server_packets" lineno="7326">
<summary>
Send amanda_server packets.
</summary>
@@ -14677,7 +14494,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7222">
+<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7345">
<summary>
Do not audit attempts to send amanda_server packets.
</summary>
@@ -14688,7 +14505,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amanda_server_packets" lineno="7241">
+<interface name="corenet_receive_amanda_server_packets" lineno="7364">
<summary>
Receive amanda_server packets.
</summary>
@@ -14699,7 +14516,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7260">
+<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7383">
<summary>
Do not audit attempts to receive amanda_server packets.
</summary>
@@ -14710,7 +14527,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amanda_server_packets" lineno="7279">
+<interface name="corenet_sendrecv_amanda_server_packets" lineno="7402">
<summary>
Send and receive amanda_server packets.
</summary>
@@ -14721,7 +14538,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7295">
+<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7418">
<summary>
Do not audit attempts to send and receive amanda_server packets.
</summary>
@@ -14732,7 +14549,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amanda_server_packets" lineno="7310">
+<interface name="corenet_relabelto_amanda_server_packets" lineno="7433">
<summary>
Relabel packets to amanda_server the packet type.
</summary>
@@ -14742,7 +14559,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7332">
+<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7455">
<summary>
Send and receive TCP traffic on the amavisd_recv port.
</summary>
@@ -14753,7 +14570,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_amavisd_recv_port" lineno="7347">
+<interface name="corenet_udp_send_amavisd_recv_port" lineno="7470">
<summary>
Send UDP traffic on the amavisd_recv port.
</summary>
@@ -14764,7 +14581,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7362">
+<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7485">
<summary>
Do not audit attempts to send UDP traffic on the amavisd_recv port.
</summary>
@@ -14775,7 +14592,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7377">
+<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7500">
<summary>
Receive UDP traffic on the amavisd_recv port.
</summary>
@@ -14786,7 +14603,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7392">
+<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7515">
<summary>
Do not audit attempts to receive UDP traffic on the amavisd_recv port.
</summary>
@@ -14797,7 +14614,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7407">
+<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7530">
<summary>
Send and receive UDP traffic on the amavisd_recv port.
</summary>
@@ -14808,7 +14625,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7423">
+<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7546">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amavisd_recv port.
@@ -14820,7 +14637,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7438">
+<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7561">
<summary>
Bind TCP sockets to the amavisd_recv port.
</summary>
@@ -14831,7 +14648,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7458">
+<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7581">
<summary>
Bind UDP sockets to the amavisd_recv port.
</summary>
@@ -14842,7 +14659,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7477">
+<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7600">
<summary>
Make a TCP connection to the amavisd_recv port.
</summary>
@@ -14852,7 +14669,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_recv_client_packets" lineno="7497">
+<interface name="corenet_send_amavisd_recv_client_packets" lineno="7620">
<summary>
Send amavisd_recv_client packets.
</summary>
@@ -14863,7 +14680,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7516">
+<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7639">
<summary>
Do not audit attempts to send amavisd_recv_client packets.
</summary>
@@ -14874,7 +14691,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7535">
+<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7658">
<summary>
Receive amavisd_recv_client packets.
</summary>
@@ -14885,7 +14702,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7554">
+<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7677">
<summary>
Do not audit attempts to receive amavisd_recv_client packets.
</summary>
@@ -14896,7 +14713,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7573">
+<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7696">
<summary>
Send and receive amavisd_recv_client packets.
</summary>
@@ -14907,7 +14724,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7589">
+<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7712">
<summary>
Do not audit attempts to send and receive amavisd_recv_client packets.
</summary>
@@ -14918,7 +14735,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7604">
+<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7727">
<summary>
Relabel packets to amavisd_recv_client the packet type.
</summary>
@@ -14928,7 +14745,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_recv_server_packets" lineno="7624">
+<interface name="corenet_send_amavisd_recv_server_packets" lineno="7747">
<summary>
Send amavisd_recv_server packets.
</summary>
@@ -14939,7 +14756,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7643">
+<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7766">
<summary>
Do not audit attempts to send amavisd_recv_server packets.
</summary>
@@ -14950,7 +14767,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7662">
+<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7785">
<summary>
Receive amavisd_recv_server packets.
</summary>
@@ -14961,7 +14778,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7681">
+<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7804">
<summary>
Do not audit attempts to receive amavisd_recv_server packets.
</summary>
@@ -14972,7 +14789,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7700">
+<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7823">
<summary>
Send and receive amavisd_recv_server packets.
</summary>
@@ -14983,7 +14800,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7716">
+<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7839">
<summary>
Do not audit attempts to send and receive amavisd_recv_server packets.
</summary>
@@ -14994,7 +14811,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7731">
+<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7854">
<summary>
Relabel packets to amavisd_recv_server the packet type.
</summary>
@@ -15004,7 +14821,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7753">
+<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7876">
<summary>
Send and receive TCP traffic on the amavisd_send port.
</summary>
@@ -15015,7 +14832,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_amavisd_send_port" lineno="7768">
+<interface name="corenet_udp_send_amavisd_send_port" lineno="7891">
<summary>
Send UDP traffic on the amavisd_send port.
</summary>
@@ -15026,7 +14843,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7783">
+<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7906">
<summary>
Do not audit attempts to send UDP traffic on the amavisd_send port.
</summary>
@@ -15037,7 +14854,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_amavisd_send_port" lineno="7798">
+<interface name="corenet_udp_receive_amavisd_send_port" lineno="7921">
<summary>
Receive UDP traffic on the amavisd_send port.
</summary>
@@ -15048,7 +14865,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7813">
+<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7936">
<summary>
Do not audit attempts to receive UDP traffic on the amavisd_send port.
</summary>
@@ -15059,7 +14876,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7828">
+<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7951">
<summary>
Send and receive UDP traffic on the amavisd_send port.
</summary>
@@ -15070,7 +14887,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7844">
+<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7967">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amavisd_send port.
@@ -15082,7 +14899,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_amavisd_send_port" lineno="7859">
+<interface name="corenet_tcp_bind_amavisd_send_port" lineno="7982">
<summary>
Bind TCP sockets to the amavisd_send port.
</summary>
@@ -15093,7 +14910,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amavisd_send_port" lineno="7879">
+<interface name="corenet_udp_bind_amavisd_send_port" lineno="8002">
<summary>
Bind UDP sockets to the amavisd_send port.
</summary>
@@ -15104,7 +14921,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amavisd_send_port" lineno="7898">
+<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8021">
<summary>
Make a TCP connection to the amavisd_send port.
</summary>
@@ -15114,7 +14931,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_send_client_packets" lineno="7918">
+<interface name="corenet_send_amavisd_send_client_packets" lineno="8041">
<summary>
Send amavisd_send_client packets.
</summary>
@@ -15125,7 +14942,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="7937">
+<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8060">
<summary>
Do not audit attempts to send amavisd_send_client packets.
</summary>
@@ -15136,7 +14953,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_send_client_packets" lineno="7956">
+<interface name="corenet_receive_amavisd_send_client_packets" lineno="8079">
<summary>
Receive amavisd_send_client packets.
</summary>
@@ -15147,7 +14964,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="7975">
+<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8098">
<summary>
Do not audit attempts to receive amavisd_send_client packets.
</summary>
@@ -15158,7 +14975,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="7994">
+<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8117">
<summary>
Send and receive amavisd_send_client packets.
</summary>
@@ -15169,7 +14986,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8010">
+<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8133">
<summary>
Do not audit attempts to send and receive amavisd_send_client packets.
</summary>
@@ -15180,7 +14997,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8025">
+<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8148">
<summary>
Relabel packets to amavisd_send_client the packet type.
</summary>
@@ -15190,7 +15007,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_send_server_packets" lineno="8045">
+<interface name="corenet_send_amavisd_send_server_packets" lineno="8168">
<summary>
Send amavisd_send_server packets.
</summary>
@@ -15201,7 +15018,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8064">
+<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8187">
<summary>
Do not audit attempts to send amavisd_send_server packets.
</summary>
@@ -15212,7 +15029,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_send_server_packets" lineno="8083">
+<interface name="corenet_receive_amavisd_send_server_packets" lineno="8206">
<summary>
Receive amavisd_send_server packets.
</summary>
@@ -15223,7 +15040,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8102">
+<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8225">
<summary>
Do not audit attempts to receive amavisd_send_server packets.
</summary>
@@ -15234,7 +15051,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8121">
+<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8244">
<summary>
Send and receive amavisd_send_server packets.
</summary>
@@ -15245,7 +15062,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8137">
+<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8260">
<summary>
Do not audit attempts to send and receive amavisd_send_server packets.
</summary>
@@ -15256,7 +15073,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8152">
+<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8275">
<summary>
Relabel packets to amavisd_send_server the packet type.
</summary>
@@ -15266,7 +15083,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8174">
+<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8297">
<summary>
Send and receive TCP traffic on the amqp port.
</summary>
@@ -15277,7 +15094,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_amqp_port" lineno="8189">
+<interface name="corenet_udp_send_amqp_port" lineno="8312">
<summary>
Send UDP traffic on the amqp port.
</summary>
@@ -15288,7 +15105,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8204">
+<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8327">
<summary>
Do not audit attempts to send UDP traffic on the amqp port.
</summary>
@@ -15299,7 +15116,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_amqp_port" lineno="8219">
+<interface name="corenet_udp_receive_amqp_port" lineno="8342">
<summary>
Receive UDP traffic on the amqp port.
</summary>
@@ -15310,7 +15127,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8234">
+<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8357">
<summary>
Do not audit attempts to receive UDP traffic on the amqp port.
</summary>
@@ -15321,7 +15138,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_amqp_port" lineno="8249">
+<interface name="corenet_udp_sendrecv_amqp_port" lineno="8372">
<summary>
Send and receive UDP traffic on the amqp port.
</summary>
@@ -15332,7 +15149,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8265">
+<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8388">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amqp port.
@@ -15344,7 +15161,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_amqp_port" lineno="8280">
+<interface name="corenet_tcp_bind_amqp_port" lineno="8403">
<summary>
Bind TCP sockets to the amqp port.
</summary>
@@ -15355,7 +15172,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amqp_port" lineno="8300">
+<interface name="corenet_udp_bind_amqp_port" lineno="8423">
<summary>
Bind UDP sockets to the amqp port.
</summary>
@@ -15366,7 +15183,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amqp_port" lineno="8319">
+<interface name="corenet_tcp_connect_amqp_port" lineno="8442">
<summary>
Make a TCP connection to the amqp port.
</summary>
@@ -15376,7 +15193,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amqp_client_packets" lineno="8339">
+<interface name="corenet_send_amqp_client_packets" lineno="8462">
<summary>
Send amqp_client packets.
</summary>
@@ -15387,7 +15204,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8358">
+<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8481">
<summary>
Do not audit attempts to send amqp_client packets.
</summary>
@@ -15398,7 +15215,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amqp_client_packets" lineno="8377">
+<interface name="corenet_receive_amqp_client_packets" lineno="8500">
<summary>
Receive amqp_client packets.
</summary>
@@ -15409,7 +15226,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8396">
+<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8519">
<summary>
Do not audit attempts to receive amqp_client packets.
</summary>
@@ -15420,7 +15237,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amqp_client_packets" lineno="8415">
+<interface name="corenet_sendrecv_amqp_client_packets" lineno="8538">
<summary>
Send and receive amqp_client packets.
</summary>
@@ -15431,7 +15248,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8431">
+<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8554">
<summary>
Do not audit attempts to send and receive amqp_client packets.
</summary>
@@ -15442,7 +15259,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amqp_client_packets" lineno="8446">
+<interface name="corenet_relabelto_amqp_client_packets" lineno="8569">
<summary>
Relabel packets to amqp_client the packet type.
</summary>
@@ -15452,7 +15269,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amqp_server_packets" lineno="8466">
+<interface name="corenet_send_amqp_server_packets" lineno="8589">
<summary>
Send amqp_server packets.
</summary>
@@ -15463,7 +15280,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8485">
+<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8608">
<summary>
Do not audit attempts to send amqp_server packets.
</summary>
@@ -15474,7 +15291,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amqp_server_packets" lineno="8504">
+<interface name="corenet_receive_amqp_server_packets" lineno="8627">
<summary>
Receive amqp_server packets.
</summary>
@@ -15485,7 +15302,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8523">
+<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8646">
<summary>
Do not audit attempts to receive amqp_server packets.
</summary>
@@ -15496,7 +15313,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amqp_server_packets" lineno="8542">
+<interface name="corenet_sendrecv_amqp_server_packets" lineno="8665">
<summary>
Send and receive amqp_server packets.
</summary>
@@ -15507,7 +15324,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8558">
+<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8681">
<summary>
Do not audit attempts to send and receive amqp_server packets.
</summary>
@@ -15518,7 +15335,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amqp_server_packets" lineno="8573">
+<interface name="corenet_relabelto_amqp_server_packets" lineno="8696">
<summary>
Relabel packets to amqp_server the packet type.
</summary>
@@ -15528,7 +15345,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_aol_port" lineno="8595">
+<interface name="corenet_tcp_sendrecv_aol_port" lineno="8718">
<summary>
Send and receive TCP traffic on the aol port.
</summary>
@@ -15539,7 +15356,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_aol_port" lineno="8610">
+<interface name="corenet_udp_send_aol_port" lineno="8733">
<summary>
Send UDP traffic on the aol port.
</summary>
@@ -15550,7 +15367,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8625">
+<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8748">
<summary>
Do not audit attempts to send UDP traffic on the aol port.
</summary>
@@ -15561,7 +15378,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_aol_port" lineno="8640">
+<interface name="corenet_udp_receive_aol_port" lineno="8763">
<summary>
Receive UDP traffic on the aol port.
</summary>
@@ -15572,7 +15389,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8655">
+<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8778">
<summary>
Do not audit attempts to receive UDP traffic on the aol port.
</summary>
@@ -15583,7 +15400,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_aol_port" lineno="8670">
+<interface name="corenet_udp_sendrecv_aol_port" lineno="8793">
<summary>
Send and receive UDP traffic on the aol port.
</summary>
@@ -15594,7 +15411,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8686">
+<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8809">
<summary>
Do not audit attempts to send and receive
UDP traffic on the aol port.
@@ -15606,7 +15423,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_aol_port" lineno="8701">
+<interface name="corenet_tcp_bind_aol_port" lineno="8824">
<summary>
Bind TCP sockets to the aol port.
</summary>
@@ -15617,7 +15434,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_aol_port" lineno="8721">
+<interface name="corenet_udp_bind_aol_port" lineno="8844">
<summary>
Bind UDP sockets to the aol port.
</summary>
@@ -15628,7 +15445,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_aol_port" lineno="8740">
+<interface name="corenet_tcp_connect_aol_port" lineno="8863">
<summary>
Make a TCP connection to the aol port.
</summary>
@@ -15638,7 +15455,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_aol_client_packets" lineno="8760">
+<interface name="corenet_send_aol_client_packets" lineno="8883">
<summary>
Send aol_client packets.
</summary>
@@ -15649,7 +15466,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8779">
+<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8902">
<summary>
Do not audit attempts to send aol_client packets.
</summary>
@@ -15660,7 +15477,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_aol_client_packets" lineno="8798">
+<interface name="corenet_receive_aol_client_packets" lineno="8921">
<summary>
Receive aol_client packets.
</summary>
@@ -15671,7 +15488,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8817">
+<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8940">
<summary>
Do not audit attempts to receive aol_client packets.
</summary>
@@ -15682,7 +15499,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_aol_client_packets" lineno="8836">
+<interface name="corenet_sendrecv_aol_client_packets" lineno="8959">
<summary>
Send and receive aol_client packets.
</summary>
@@ -15693,7 +15510,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8852">
+<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8975">
<summary>
Do not audit attempts to send and receive aol_client packets.
</summary>
@@ -15704,7 +15521,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_aol_client_packets" lineno="8867">
+<interface name="corenet_relabelto_aol_client_packets" lineno="8990">
<summary>
Relabel packets to aol_client the packet type.
</summary>
@@ -15714,7 +15531,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_aol_server_packets" lineno="8887">
+<interface name="corenet_send_aol_server_packets" lineno="9010">
<summary>
Send aol_server packets.
</summary>
@@ -15725,7 +15542,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_aol_server_packets" lineno="8906">
+<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9029">
<summary>
Do not audit attempts to send aol_server packets.
</summary>
@@ -15736,7 +15553,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_aol_server_packets" lineno="8925">
+<interface name="corenet_receive_aol_server_packets" lineno="9048">
<summary>
Receive aol_server packets.
</summary>
@@ -15747,7 +15564,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="8944">
+<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9067">
<summary>
Do not audit attempts to receive aol_server packets.
</summary>
@@ -15758,7 +15575,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_aol_server_packets" lineno="8963">
+<interface name="corenet_sendrecv_aol_server_packets" lineno="9086">
<summary>
Send and receive aol_server packets.
</summary>
@@ -15769,7 +15586,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="8979">
+<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9102">
<summary>
Do not audit attempts to send and receive aol_server packets.
</summary>
@@ -15780,7 +15597,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_aol_server_packets" lineno="8994">
+<interface name="corenet_relabelto_aol_server_packets" lineno="9117">
<summary>
Relabel packets to aol_server the packet type.
</summary>
@@ -15790,7 +15607,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9016">
+<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9139">
<summary>
Send and receive TCP traffic on the apcupsd port.
</summary>
@@ -15801,7 +15618,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_apcupsd_port" lineno="9031">
+<interface name="corenet_udp_send_apcupsd_port" lineno="9154">
<summary>
Send UDP traffic on the apcupsd port.
</summary>
@@ -15812,7 +15629,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9046">
+<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9169">
<summary>
Do not audit attempts to send UDP traffic on the apcupsd port.
</summary>
@@ -15823,7 +15640,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_apcupsd_port" lineno="9061">
+<interface name="corenet_udp_receive_apcupsd_port" lineno="9184">
<summary>
Receive UDP traffic on the apcupsd port.
</summary>
@@ -15834,7 +15651,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9076">
+<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9199">
<summary>
Do not audit attempts to receive UDP traffic on the apcupsd port.
</summary>
@@ -15845,7 +15662,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9091">
+<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9214">
<summary>
Send and receive UDP traffic on the apcupsd port.
</summary>
@@ -15856,7 +15673,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9107">
+<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9230">
<summary>
Do not audit attempts to send and receive
UDP traffic on the apcupsd port.
@@ -15868,7 +15685,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_apcupsd_port" lineno="9122">
+<interface name="corenet_tcp_bind_apcupsd_port" lineno="9245">
<summary>
Bind TCP sockets to the apcupsd port.
</summary>
@@ -15879,7 +15696,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_apcupsd_port" lineno="9142">
+<interface name="corenet_udp_bind_apcupsd_port" lineno="9265">
<summary>
Bind UDP sockets to the apcupsd port.
</summary>
@@ -15890,7 +15707,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_apcupsd_port" lineno="9161">
+<interface name="corenet_tcp_connect_apcupsd_port" lineno="9284">
<summary>
Make a TCP connection to the apcupsd port.
</summary>
@@ -15900,7 +15717,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apcupsd_client_packets" lineno="9181">
+<interface name="corenet_send_apcupsd_client_packets" lineno="9304">
<summary>
Send apcupsd_client packets.
</summary>
@@ -15911,7 +15728,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9200">
+<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9323">
<summary>
Do not audit attempts to send apcupsd_client packets.
</summary>
@@ -15922,7 +15739,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apcupsd_client_packets" lineno="9219">
+<interface name="corenet_receive_apcupsd_client_packets" lineno="9342">
<summary>
Receive apcupsd_client packets.
</summary>
@@ -15933,7 +15750,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9238">
+<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9361">
<summary>
Do not audit attempts to receive apcupsd_client packets.
</summary>
@@ -15944,7 +15761,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9257">
+<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9380">
<summary>
Send and receive apcupsd_client packets.
</summary>
@@ -15955,7 +15772,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9273">
+<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9396">
<summary>
Do not audit attempts to send and receive apcupsd_client packets.
</summary>
@@ -15966,7 +15783,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9288">
+<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9411">
<summary>
Relabel packets to apcupsd_client the packet type.
</summary>
@@ -15976,7 +15793,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apcupsd_server_packets" lineno="9308">
+<interface name="corenet_send_apcupsd_server_packets" lineno="9431">
<summary>
Send apcupsd_server packets.
</summary>
@@ -15987,7 +15804,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9327">
+<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9450">
<summary>
Do not audit attempts to send apcupsd_server packets.
</summary>
@@ -15998,7 +15815,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apcupsd_server_packets" lineno="9346">
+<interface name="corenet_receive_apcupsd_server_packets" lineno="9469">
<summary>
Receive apcupsd_server packets.
</summary>
@@ -16009,7 +15826,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9365">
+<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9488">
<summary>
Do not audit attempts to receive apcupsd_server packets.
</summary>
@@ -16020,7 +15837,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9384">
+<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9507">
<summary>
Send and receive apcupsd_server packets.
</summary>
@@ -16031,7 +15848,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9400">
+<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9523">
<summary>
Do not audit attempts to send and receive apcupsd_server packets.
</summary>
@@ -16042,7 +15859,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9415">
+<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9538">
<summary>
Relabel packets to apcupsd_server the packet type.
</summary>
@@ -16052,7 +15869,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9437">
+<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9560">
<summary>
Send and receive TCP traffic on the apertus_ldp port.
</summary>
@@ -16063,7 +15880,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_apertus_ldp_port" lineno="9452">
+<interface name="corenet_udp_send_apertus_ldp_port" lineno="9575">
<summary>
Send UDP traffic on the apertus_ldp port.
</summary>
@@ -16074,7 +15891,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9467">
+<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9590">
<summary>
Do not audit attempts to send UDP traffic on the apertus_ldp port.
</summary>
@@ -16085,7 +15902,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9482">
+<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9605">
<summary>
Receive UDP traffic on the apertus_ldp port.
</summary>
@@ -16096,7 +15913,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9497">
+<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9620">
<summary>
Do not audit attempts to receive UDP traffic on the apertus_ldp port.
</summary>
@@ -16107,7 +15924,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9512">
+<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9635">
<summary>
Send and receive UDP traffic on the apertus_ldp port.
</summary>
@@ -16118,7 +15935,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9528">
+<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9651">
<summary>
Do not audit attempts to send and receive
UDP traffic on the apertus_ldp port.
@@ -16130,7 +15947,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9543">
+<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9666">
<summary>
Bind TCP sockets to the apertus_ldp port.
</summary>
@@ -16141,7 +15958,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9563">
+<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9686">
<summary>
Bind UDP sockets to the apertus_ldp port.
</summary>
@@ -16152,7 +15969,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9582">
+<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9705">
<summary>
Make a TCP connection to the apertus_ldp port.
</summary>
@@ -16162,7 +15979,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apertus_ldp_client_packets" lineno="9602">
+<interface name="corenet_send_apertus_ldp_client_packets" lineno="9725">
<summary>
Send apertus_ldp_client packets.
</summary>
@@ -16173,7 +15990,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9621">
+<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9744">
<summary>
Do not audit attempts to send apertus_ldp_client packets.
</summary>
@@ -16184,7 +16001,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9640">
+<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9763">
<summary>
Receive apertus_ldp_client packets.
</summary>
@@ -16195,7 +16012,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9659">
+<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9782">
<summary>
Do not audit attempts to receive apertus_ldp_client packets.
</summary>
@@ -16206,7 +16023,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9678">
+<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9801">
<summary>
Send and receive apertus_ldp_client packets.
</summary>
@@ -16217,7 +16034,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9694">
+<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9817">
<summary>
Do not audit attempts to send and receive apertus_ldp_client packets.
</summary>
@@ -16228,7 +16045,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9709">
+<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9832">
<summary>
Relabel packets to apertus_ldp_client the packet type.
</summary>
@@ -16238,7 +16055,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apertus_ldp_server_packets" lineno="9729">
+<interface name="corenet_send_apertus_ldp_server_packets" lineno="9852">
<summary>
Send apertus_ldp_server packets.
</summary>
@@ -16249,7 +16066,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9748">
+<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9871">
<summary>
Do not audit attempts to send apertus_ldp_server packets.
</summary>
@@ -16260,7 +16077,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9767">
+<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9890">
<summary>
Receive apertus_ldp_server packets.
</summary>
@@ -16271,7 +16088,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9786">
+<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9909">
<summary>
Do not audit attempts to receive apertus_ldp_server packets.
</summary>
@@ -16282,7 +16099,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9805">
+<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9928">
<summary>
Send and receive apertus_ldp_server packets.
</summary>
@@ -16293,7 +16110,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9821">
+<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9944">
<summary>
Do not audit attempts to send and receive apertus_ldp_server packets.
</summary>
@@ -16304,7 +16121,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9836">
+<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9959">
<summary>
Relabel packets to apertus_ldp_server the packet type.
</summary>
@@ -16314,7 +16131,269 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="9858">
+<interface name="corenet_tcp_sendrecv_aptcacher_port" lineno="9981">
+<summary>
+Send and receive TCP traffic on the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="both" weight="10"/>
+</interface>
+<interface name="corenet_udp_send_aptcacher_port" lineno="9996">
+<summary>
+Send UDP traffic on the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="write" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_udp_send_aptcacher_port" lineno="10011">
+<summary>
+Do not audit attempts to send UDP traffic on the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_udp_receive_aptcacher_port" lineno="10026">
+<summary>
+Receive UDP traffic on the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="read" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_udp_receive_aptcacher_port" lineno="10041">
+<summary>
+Do not audit attempts to receive UDP traffic on the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_udp_sendrecv_aptcacher_port" lineno="10056">
+<summary>
+Send and receive UDP traffic on the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="both" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_udp_sendrecv_aptcacher_port" lineno="10072">
+<summary>
+Do not audit attempts to send and receive
+UDP traffic on the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_tcp_bind_aptcacher_port" lineno="10087">
+<summary>
+Bind TCP sockets to the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_udp_bind_aptcacher_port" lineno="10107">
+<summary>
+Bind UDP sockets to the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_tcp_connect_aptcacher_port" lineno="10126">
+<summary>
+Make a TCP connection to the aptcacher port.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corenet_send_aptcacher_client_packets" lineno="10146">
+<summary>
+Send aptcacher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="write" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="10165">
+<summary>
+Do not audit attempts to send aptcacher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_receive_aptcacher_client_packets" lineno="10184">
+<summary>
+Receive aptcacher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="read" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="10203">
+<summary>
+Do not audit attempts to receive aptcacher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="10222">
+<summary>
+Send and receive aptcacher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="both" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="10238">
+<summary>
+Do not audit attempts to send and receive aptcacher_client packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_relabelto_aptcacher_client_packets" lineno="10253">
+<summary>
+Relabel packets to aptcacher_client the packet type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corenet_send_aptcacher_server_packets" lineno="10273">
+<summary>
+Send aptcacher_server packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="write" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="10292">
+<summary>
+Do not audit attempts to send aptcacher_server packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_receive_aptcacher_server_packets" lineno="10311">
+<summary>
+Receive aptcacher_server packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="read" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="10330">
+<summary>
+Do not audit attempts to receive aptcacher_server packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="10349">
+<summary>
+Send and receive aptcacher_server packets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="both" weight="10"/>
+</interface>
+<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="10365">
+<summary>
+Do not audit attempts to send and receive aptcacher_server packets.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="corenet_relabelto_aptcacher_server_packets" lineno="10380">
+<summary>
+Relabel packets to aptcacher_server the packet type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10402">
<summary>
Send and receive TCP traffic on the armtechdaemon port.
</summary>
@@ -16325,7 +16404,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_armtechdaemon_port" lineno="9873">
+<interface name="corenet_udp_send_armtechdaemon_port" lineno="10417">
<summary>
Send UDP traffic on the armtechdaemon port.
</summary>
@@ -16336,7 +16415,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="9888">
+<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10432">
<summary>
Do not audit attempts to send UDP traffic on the armtechdaemon port.
</summary>
@@ -16347,7 +16426,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_armtechdaemon_port" lineno="9903">
+<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10447">
<summary>
Receive UDP traffic on the armtechdaemon port.
</summary>
@@ -16358,7 +16437,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="9918">
+<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10462">
<summary>
Do not audit attempts to receive UDP traffic on the armtechdaemon port.
</summary>
@@ -16369,7 +16448,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="9933">
+<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10477">
<summary>
Send and receive UDP traffic on the armtechdaemon port.
</summary>
@@ -16380,7 +16459,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="9949">
+<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10493">
<summary>
Do not audit attempts to send and receive
UDP traffic on the armtechdaemon port.
@@ -16392,7 +16471,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="9964">
+<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10508">
<summary>
Bind TCP sockets to the armtechdaemon port.
</summary>
@@ -16403,7 +16482,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_armtechdaemon_port" lineno="9984">
+<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10528">
<summary>
Bind UDP sockets to the armtechdaemon port.
</summary>
@@ -16414,7 +16493,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10003">
+<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10547">
<summary>
Make a TCP connection to the armtechdaemon port.
</summary>
@@ -16424,7 +16503,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_armtechdaemon_client_packets" lineno="10023">
+<interface name="corenet_send_armtechdaemon_client_packets" lineno="10567">
<summary>
Send armtechdaemon_client packets.
</summary>
@@ -16435,7 +16514,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10042">
+<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10586">
<summary>
Do not audit attempts to send armtechdaemon_client packets.
</summary>
@@ -16446,7 +16525,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10061">
+<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10605">
<summary>
Receive armtechdaemon_client packets.
</summary>
@@ -16457,7 +16536,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10080">
+<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10624">
<summary>
Do not audit attempts to receive armtechdaemon_client packets.
</summary>
@@ -16468,7 +16547,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10099">
+<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10643">
<summary>
Send and receive armtechdaemon_client packets.
</summary>
@@ -16479,7 +16558,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10115">
+<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10659">
<summary>
Do not audit attempts to send and receive armtechdaemon_client packets.
</summary>
@@ -16490,7 +16569,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10130">
+<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10674">
<summary>
Relabel packets to armtechdaemon_client the packet type.
</summary>
@@ -16500,7 +16579,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_armtechdaemon_server_packets" lineno="10150">
+<interface name="corenet_send_armtechdaemon_server_packets" lineno="10694">
<summary>
Send armtechdaemon_server packets.
</summary>
@@ -16511,7 +16590,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10169">
+<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10713">
<summary>
Do not audit attempts to send armtechdaemon_server packets.
</summary>
@@ -16522,7 +16601,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10188">
+<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10732">
<summary>
Receive armtechdaemon_server packets.
</summary>
@@ -16533,7 +16612,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10207">
+<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10751">
<summary>
Do not audit attempts to receive armtechdaemon_server packets.
</summary>
@@ -16544,7 +16623,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10226">
+<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10770">
<summary>
Send and receive armtechdaemon_server packets.
</summary>
@@ -16555,7 +16634,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10242">
+<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10786">
<summary>
Do not audit attempts to send and receive armtechdaemon_server packets.
</summary>
@@ -16566,7 +16645,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10257">
+<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10801">
<summary>
Relabel packets to armtechdaemon_server the packet type.
</summary>
@@ -16576,7 +16655,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10279">
+<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10823">
<summary>
Send and receive TCP traffic on the asterisk port.
</summary>
@@ -16587,7 +16666,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_asterisk_port" lineno="10294">
+<interface name="corenet_udp_send_asterisk_port" lineno="10838">
<summary>
Send UDP traffic on the asterisk port.
</summary>
@@ -16598,7 +16677,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10309">
+<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10853">
<summary>
Do not audit attempts to send UDP traffic on the asterisk port.
</summary>
@@ -16609,7 +16688,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_asterisk_port" lineno="10324">
+<interface name="corenet_udp_receive_asterisk_port" lineno="10868">
<summary>
Receive UDP traffic on the asterisk port.
</summary>
@@ -16620,7 +16699,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10339">
+<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10883">
<summary>
Do not audit attempts to receive UDP traffic on the asterisk port.
</summary>
@@ -16631,7 +16710,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10354">
+<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10898">
<summary>
Send and receive UDP traffic on the asterisk port.
</summary>
@@ -16642,7 +16721,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10370">
+<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10914">
<summary>
Do not audit attempts to send and receive
UDP traffic on the asterisk port.
@@ -16654,7 +16733,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_asterisk_port" lineno="10385">
+<interface name="corenet_tcp_bind_asterisk_port" lineno="10929">
<summary>
Bind TCP sockets to the asterisk port.
</summary>
@@ -16665,7 +16744,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_asterisk_port" lineno="10405">
+<interface name="corenet_udp_bind_asterisk_port" lineno="10949">
<summary>
Bind UDP sockets to the asterisk port.
</summary>
@@ -16676,7 +16755,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_asterisk_port" lineno="10424">
+<interface name="corenet_tcp_connect_asterisk_port" lineno="10968">
<summary>
Make a TCP connection to the asterisk port.
</summary>
@@ -16686,7 +16765,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_asterisk_client_packets" lineno="10444">
+<interface name="corenet_send_asterisk_client_packets" lineno="10988">
<summary>
Send asterisk_client packets.
</summary>
@@ -16697,7 +16776,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="10463">
+<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="11007">
<summary>
Do not audit attempts to send asterisk_client packets.
</summary>
@@ -16708,7 +16787,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_asterisk_client_packets" lineno="10482">
+<interface name="corenet_receive_asterisk_client_packets" lineno="11026">
<summary>
Receive asterisk_client packets.
</summary>
@@ -16719,7 +16798,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="10501">
+<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="11045">
<summary>
Do not audit attempts to receive asterisk_client packets.
</summary>
@@ -16730,7 +16809,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_asterisk_client_packets" lineno="10520">
+<interface name="corenet_sendrecv_asterisk_client_packets" lineno="11064">
<summary>
Send and receive asterisk_client packets.
</summary>
@@ -16741,7 +16820,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="10536">
+<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="11080">
<summary>
Do not audit attempts to send and receive asterisk_client packets.
</summary>
@@ -16752,7 +16831,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_asterisk_client_packets" lineno="10551">
+<interface name="corenet_relabelto_asterisk_client_packets" lineno="11095">
<summary>
Relabel packets to asterisk_client the packet type.
</summary>
@@ -16762,7 +16841,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_asterisk_server_packets" lineno="10571">
+<interface name="corenet_send_asterisk_server_packets" lineno="11115">
<summary>
Send asterisk_server packets.
</summary>
@@ -16773,7 +16852,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="10590">
+<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11134">
<summary>
Do not audit attempts to send asterisk_server packets.
</summary>
@@ -16784,7 +16863,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_asterisk_server_packets" lineno="10609">
+<interface name="corenet_receive_asterisk_server_packets" lineno="11153">
<summary>
Receive asterisk_server packets.
</summary>
@@ -16795,7 +16874,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="10628">
+<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11172">
<summary>
Do not audit attempts to receive asterisk_server packets.
</summary>
@@ -16806,7 +16885,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_asterisk_server_packets" lineno="10647">
+<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11191">
<summary>
Send and receive asterisk_server packets.
</summary>
@@ -16817,7 +16896,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="10663">
+<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11207">
<summary>
Do not audit attempts to send and receive asterisk_server packets.
</summary>
@@ -16828,7 +16907,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_asterisk_server_packets" lineno="10678">
+<interface name="corenet_relabelto_asterisk_server_packets" lineno="11222">
<summary>
Relabel packets to asterisk_server the packet type.
</summary>
@@ -16838,7 +16917,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_audit_port" lineno="10700">
+<interface name="corenet_tcp_sendrecv_audit_port" lineno="11244">
<summary>
Send and receive TCP traffic on the audit port.
</summary>
@@ -16849,7 +16928,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_audit_port" lineno="10715">
+<interface name="corenet_udp_send_audit_port" lineno="11259">
<summary>
Send UDP traffic on the audit port.
</summary>
@@ -16860,7 +16939,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_audit_port" lineno="10730">
+<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11274">
<summary>
Do not audit attempts to send UDP traffic on the audit port.
</summary>
@@ -16871,7 +16950,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_audit_port" lineno="10745">
+<interface name="corenet_udp_receive_audit_port" lineno="11289">
<summary>
Receive UDP traffic on the audit port.
</summary>
@@ -16882,7 +16961,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="10760">
+<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11304">
<summary>
Do not audit attempts to receive UDP traffic on the audit port.
</summary>
@@ -16893,7 +16972,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_audit_port" lineno="10775">
+<interface name="corenet_udp_sendrecv_audit_port" lineno="11319">
<summary>
Send and receive UDP traffic on the audit port.
</summary>
@@ -16904,7 +16983,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="10791">
+<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11335">
<summary>
Do not audit attempts to send and receive
UDP traffic on the audit port.
@@ -16916,7 +16995,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_audit_port" lineno="10806">
+<interface name="corenet_tcp_bind_audit_port" lineno="11350">
<summary>
Bind TCP sockets to the audit port.
</summary>
@@ -16927,7 +17006,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_audit_port" lineno="10826">
+<interface name="corenet_udp_bind_audit_port" lineno="11370">
<summary>
Bind UDP sockets to the audit port.
</summary>
@@ -16938,7 +17017,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_audit_port" lineno="10845">
+<interface name="corenet_tcp_connect_audit_port" lineno="11389">
<summary>
Make a TCP connection to the audit port.
</summary>
@@ -16948,7 +17027,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_audit_client_packets" lineno="10865">
+<interface name="corenet_send_audit_client_packets" lineno="11409">
<summary>
Send audit_client packets.
</summary>
@@ -16959,7 +17038,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_audit_client_packets" lineno="10884">
+<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11428">
<summary>
Do not audit attempts to send audit_client packets.
</summary>
@@ -16970,7 +17049,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_audit_client_packets" lineno="10903">
+<interface name="corenet_receive_audit_client_packets" lineno="11447">
<summary>
Receive audit_client packets.
</summary>
@@ -16981,7 +17060,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="10922">
+<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11466">
<summary>
Do not audit attempts to receive audit_client packets.
</summary>
@@ -16992,7 +17071,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_audit_client_packets" lineno="10941">
+<interface name="corenet_sendrecv_audit_client_packets" lineno="11485">
<summary>
Send and receive audit_client packets.
</summary>
@@ -17003,7 +17082,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="10957">
+<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11501">
<summary>
Do not audit attempts to send and receive audit_client packets.
</summary>
@@ -17014,7 +17093,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_audit_client_packets" lineno="10972">
+<interface name="corenet_relabelto_audit_client_packets" lineno="11516">
<summary>
Relabel packets to audit_client the packet type.
</summary>
@@ -17024,7 +17103,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_audit_server_packets" lineno="10992">
+<interface name="corenet_send_audit_server_packets" lineno="11536">
<summary>
Send audit_server packets.
</summary>
@@ -17035,7 +17114,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11011">
+<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11555">
<summary>
Do not audit attempts to send audit_server packets.
</summary>
@@ -17046,7 +17125,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_audit_server_packets" lineno="11030">
+<interface name="corenet_receive_audit_server_packets" lineno="11574">
<summary>
Receive audit_server packets.
</summary>
@@ -17057,7 +17136,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11049">
+<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11593">
<summary>
Do not audit attempts to receive audit_server packets.
</summary>
@@ -17068,7 +17147,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_audit_server_packets" lineno="11068">
+<interface name="corenet_sendrecv_audit_server_packets" lineno="11612">
<summary>
Send and receive audit_server packets.
</summary>
@@ -17079,7 +17158,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11084">
+<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11628">
<summary>
Do not audit attempts to send and receive audit_server packets.
</summary>
@@ -17090,7 +17169,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_audit_server_packets" lineno="11099">
+<interface name="corenet_relabelto_audit_server_packets" lineno="11643">
<summary>
Relabel packets to audit_server the packet type.
</summary>
@@ -17100,7 +17179,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_auth_port" lineno="11121">
+<interface name="corenet_tcp_sendrecv_auth_port" lineno="11665">
<summary>
Send and receive TCP traffic on the auth port.
</summary>
@@ -17111,7 +17190,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_auth_port" lineno="11136">
+<interface name="corenet_udp_send_auth_port" lineno="11680">
<summary>
Send UDP traffic on the auth port.
</summary>
@@ -17122,7 +17201,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11151">
+<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11695">
<summary>
Do not audit attempts to send UDP traffic on the auth port.
</summary>
@@ -17133,7 +17212,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_auth_port" lineno="11166">
+<interface name="corenet_udp_receive_auth_port" lineno="11710">
<summary>
Receive UDP traffic on the auth port.
</summary>
@@ -17144,7 +17223,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11181">
+<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11725">
<summary>
Do not audit attempts to receive UDP traffic on the auth port.
</summary>
@@ -17155,7 +17234,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_auth_port" lineno="11196">
+<interface name="corenet_udp_sendrecv_auth_port" lineno="11740">
<summary>
Send and receive UDP traffic on the auth port.
</summary>
@@ -17166,7 +17245,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11212">
+<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11756">
<summary>
Do not audit attempts to send and receive
UDP traffic on the auth port.
@@ -17178,7 +17257,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_auth_port" lineno="11227">
+<interface name="corenet_tcp_bind_auth_port" lineno="11771">
<summary>
Bind TCP sockets to the auth port.
</summary>
@@ -17189,7 +17268,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_auth_port" lineno="11247">
+<interface name="corenet_udp_bind_auth_port" lineno="11791">
<summary>
Bind UDP sockets to the auth port.
</summary>
@@ -17200,7 +17279,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_auth_port" lineno="11266">
+<interface name="corenet_tcp_connect_auth_port" lineno="11810">
<summary>
Make a TCP connection to the auth port.
</summary>
@@ -17210,7 +17289,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_auth_client_packets" lineno="11286">
+<interface name="corenet_send_auth_client_packets" lineno="11830">
<summary>
Send auth_client packets.
</summary>
@@ -17221,7 +17300,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11305">
+<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11849">
<summary>
Do not audit attempts to send auth_client packets.
</summary>
@@ -17232,7 +17311,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_auth_client_packets" lineno="11324">
+<interface name="corenet_receive_auth_client_packets" lineno="11868">
<summary>
Receive auth_client packets.
</summary>
@@ -17243,7 +17322,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11343">
+<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11887">
<summary>
Do not audit attempts to receive auth_client packets.
</summary>
@@ -17254,7 +17333,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_auth_client_packets" lineno="11362">
+<interface name="corenet_sendrecv_auth_client_packets" lineno="11906">
<summary>
Send and receive auth_client packets.
</summary>
@@ -17265,7 +17344,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11378">
+<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11922">
<summary>
Do not audit attempts to send and receive auth_client packets.
</summary>
@@ -17276,7 +17355,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_auth_client_packets" lineno="11393">
+<interface name="corenet_relabelto_auth_client_packets" lineno="11937">
<summary>
Relabel packets to auth_client the packet type.
</summary>
@@ -17286,7 +17365,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_auth_server_packets" lineno="11413">
+<interface name="corenet_send_auth_server_packets" lineno="11957">
<summary>
Send auth_server packets.
</summary>
@@ -17297,7 +17376,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11432">
+<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11976">
<summary>
Do not audit attempts to send auth_server packets.
</summary>
@@ -17308,7 +17387,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_auth_server_packets" lineno="11451">
+<interface name="corenet_receive_auth_server_packets" lineno="11995">
<summary>
Receive auth_server packets.
</summary>
@@ -17319,7 +17398,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="11470">
+<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="12014">
<summary>
Do not audit attempts to receive auth_server packets.
</summary>
@@ -17330,7 +17409,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_auth_server_packets" lineno="11489">
+<interface name="corenet_sendrecv_auth_server_packets" lineno="12033">
<summary>
Send and receive auth_server packets.
</summary>
@@ -17341,7 +17420,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="11505">
+<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="12049">
<summary>
Do not audit attempts to send and receive auth_server packets.
</summary>
@@ -17352,7 +17431,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_auth_server_packets" lineno="11520">
+<interface name="corenet_relabelto_auth_server_packets" lineno="12064">
<summary>
Relabel packets to auth_server the packet type.
</summary>
@@ -17362,7 +17441,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_bgp_port" lineno="11542">
+<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12086">
<summary>
Send and receive TCP traffic on the bgp port.
</summary>
@@ -17373,7 +17452,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_bgp_port" lineno="11557">
+<interface name="corenet_udp_send_bgp_port" lineno="12101">
<summary>
Send UDP traffic on the bgp port.
</summary>
@@ -17384,7 +17463,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="11572">
+<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12116">
<summary>
Do not audit attempts to send UDP traffic on the bgp port.
</summary>
@@ -17395,7 +17474,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_bgp_port" lineno="11587">
+<interface name="corenet_udp_receive_bgp_port" lineno="12131">
<summary>
Receive UDP traffic on the bgp port.
</summary>
@@ -17406,7 +17485,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="11602">
+<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12146">
<summary>
Do not audit attempts to receive UDP traffic on the bgp port.
</summary>
@@ -17417,7 +17496,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_bgp_port" lineno="11617">
+<interface name="corenet_udp_sendrecv_bgp_port" lineno="12161">
<summary>
Send and receive UDP traffic on the bgp port.
</summary>
@@ -17428,7 +17507,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="11633">
+<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12177">
<summary>
Do not audit attempts to send and receive
UDP traffic on the bgp port.
@@ -17440,7 +17519,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_bgp_port" lineno="11648">
+<interface name="corenet_tcp_bind_bgp_port" lineno="12192">
<summary>
Bind TCP sockets to the bgp port.
</summary>
@@ -17451,7 +17530,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_bgp_port" lineno="11668">
+<interface name="corenet_udp_bind_bgp_port" lineno="12212">
<summary>
Bind UDP sockets to the bgp port.
</summary>
@@ -17462,7 +17541,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_bgp_port" lineno="11687">
+<interface name="corenet_tcp_connect_bgp_port" lineno="12231">
<summary>
Make a TCP connection to the bgp port.
</summary>
@@ -17472,7 +17551,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bgp_client_packets" lineno="11707">
+<interface name="corenet_send_bgp_client_packets" lineno="12251">
<summary>
Send bgp_client packets.
</summary>
@@ -17483,7 +17562,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="11726">
+<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12270">
<summary>
Do not audit attempts to send bgp_client packets.
</summary>
@@ -17494,7 +17573,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bgp_client_packets" lineno="11745">
+<interface name="corenet_receive_bgp_client_packets" lineno="12289">
<summary>
Receive bgp_client packets.
</summary>
@@ -17505,7 +17584,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="11764">
+<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12308">
<summary>
Do not audit attempts to receive bgp_client packets.
</summary>
@@ -17516,7 +17595,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bgp_client_packets" lineno="11783">
+<interface name="corenet_sendrecv_bgp_client_packets" lineno="12327">
<summary>
Send and receive bgp_client packets.
</summary>
@@ -17527,7 +17606,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="11799">
+<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12343">
<summary>
Do not audit attempts to send and receive bgp_client packets.
</summary>
@@ -17538,7 +17617,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bgp_client_packets" lineno="11814">
+<interface name="corenet_relabelto_bgp_client_packets" lineno="12358">
<summary>
Relabel packets to bgp_client the packet type.
</summary>
@@ -17548,7 +17627,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bgp_server_packets" lineno="11834">
+<interface name="corenet_send_bgp_server_packets" lineno="12378">
<summary>
Send bgp_server packets.
</summary>
@@ -17559,7 +17638,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="11853">
+<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12397">
<summary>
Do not audit attempts to send bgp_server packets.
</summary>
@@ -17570,7 +17649,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bgp_server_packets" lineno="11872">
+<interface name="corenet_receive_bgp_server_packets" lineno="12416">
<summary>
Receive bgp_server packets.
</summary>
@@ -17581,7 +17660,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="11891">
+<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12435">
<summary>
Do not audit attempts to receive bgp_server packets.
</summary>
@@ -17592,7 +17671,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bgp_server_packets" lineno="11910">
+<interface name="corenet_sendrecv_bgp_server_packets" lineno="12454">
<summary>
Send and receive bgp_server packets.
</summary>
@@ -17603,7 +17682,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="11926">
+<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12470">
<summary>
Do not audit attempts to send and receive bgp_server packets.
</summary>
@@ -17614,7 +17693,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bgp_server_packets" lineno="11941">
+<interface name="corenet_relabelto_bgp_server_packets" lineno="12485">
<summary>
Relabel packets to bgp_server the packet type.
</summary>
@@ -17624,7 +17703,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="11963">
+<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12507">
<summary>
Send and receive TCP traffic on the bitcoin port.
</summary>
@@ -17635,7 +17714,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_bitcoin_port" lineno="11978">
+<interface name="corenet_udp_send_bitcoin_port" lineno="12522">
<summary>
Send UDP traffic on the bitcoin port.
</summary>
@@ -17646,7 +17725,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="11993">
+<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12537">
<summary>
Do not audit attempts to send UDP traffic on the bitcoin port.
</summary>
@@ -17657,7 +17736,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_bitcoin_port" lineno="12008">
+<interface name="corenet_udp_receive_bitcoin_port" lineno="12552">
<summary>
Receive UDP traffic on the bitcoin port.
</summary>
@@ -17668,7 +17747,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12023">
+<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12567">
<summary>
Do not audit attempts to receive UDP traffic on the bitcoin port.
</summary>
@@ -17679,7 +17758,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12038">
+<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12582">
<summary>
Send and receive UDP traffic on the bitcoin port.
</summary>
@@ -17690,7 +17769,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12054">
+<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12598">
<summary>
Do not audit attempts to send and receive
UDP traffic on the bitcoin port.
@@ -17702,7 +17781,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_bitcoin_port" lineno="12069">
+<interface name="corenet_tcp_bind_bitcoin_port" lineno="12613">
<summary>
Bind TCP sockets to the bitcoin port.
</summary>
@@ -17713,7 +17792,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_bitcoin_port" lineno="12089">
+<interface name="corenet_udp_bind_bitcoin_port" lineno="12633">
<summary>
Bind UDP sockets to the bitcoin port.
</summary>
@@ -17724,7 +17803,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_bitcoin_port" lineno="12108">
+<interface name="corenet_tcp_connect_bitcoin_port" lineno="12652">
<summary>
Make a TCP connection to the bitcoin port.
</summary>
@@ -17734,7 +17813,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bitcoin_client_packets" lineno="12128">
+<interface name="corenet_send_bitcoin_client_packets" lineno="12672">
<summary>
Send bitcoin_client packets.
</summary>
@@ -17745,7 +17824,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12147">
+<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12691">
<summary>
Do not audit attempts to send bitcoin_client packets.
</summary>
@@ -17756,7 +17835,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bitcoin_client_packets" lineno="12166">
+<interface name="corenet_receive_bitcoin_client_packets" lineno="12710">
<summary>
Receive bitcoin_client packets.
</summary>
@@ -17767,7 +17846,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12185">
+<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12729">
<summary>
Do not audit attempts to receive bitcoin_client packets.
</summary>
@@ -17778,7 +17857,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12204">
+<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12748">
<summary>
Send and receive bitcoin_client packets.
</summary>
@@ -17789,7 +17868,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12220">
+<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12764">
<summary>
Do not audit attempts to send and receive bitcoin_client packets.
</summary>
@@ -17800,7 +17879,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12235">
+<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12779">
<summary>
Relabel packets to bitcoin_client the packet type.
</summary>
@@ -17810,7 +17889,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bitcoin_server_packets" lineno="12255">
+<interface name="corenet_send_bitcoin_server_packets" lineno="12799">
<summary>
Send bitcoin_server packets.
</summary>
@@ -17821,7 +17900,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12274">
+<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12818">
<summary>
Do not audit attempts to send bitcoin_server packets.
</summary>
@@ -17832,7 +17911,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bitcoin_server_packets" lineno="12293">
+<interface name="corenet_receive_bitcoin_server_packets" lineno="12837">
<summary>
Receive bitcoin_server packets.
</summary>
@@ -17843,7 +17922,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12312">
+<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12856">
<summary>
Do not audit attempts to receive bitcoin_server packets.
</summary>
@@ -17854,7 +17933,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12331">
+<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12875">
<summary>
Send and receive bitcoin_server packets.
</summary>
@@ -17865,7 +17944,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12347">
+<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12891">
<summary>
Do not audit attempts to send and receive bitcoin_server packets.
</summary>
@@ -17876,7 +17955,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12362">
+<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12906">
<summary>
Relabel packets to bitcoin_server the packet type.
</summary>
@@ -17886,7 +17965,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12384">
+<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12928">
<summary>
Send and receive TCP traffic on the boinc port.
</summary>
@@ -17897,7 +17976,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_boinc_port" lineno="12399">
+<interface name="corenet_udp_send_boinc_port" lineno="12943">
<summary>
Send UDP traffic on the boinc port.
</summary>
@@ -17908,7 +17987,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12414">
+<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12958">
<summary>
Do not audit attempts to send UDP traffic on the boinc port.
</summary>
@@ -17919,7 +17998,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_boinc_port" lineno="12429">
+<interface name="corenet_udp_receive_boinc_port" lineno="12973">
<summary>
Receive UDP traffic on the boinc port.
</summary>
@@ -17930,7 +18009,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="12444">
+<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="12988">
<summary>
Do not audit attempts to receive UDP traffic on the boinc port.
</summary>
@@ -17941,7 +18020,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_boinc_port" lineno="12459">
+<interface name="corenet_udp_sendrecv_boinc_port" lineno="13003">
<summary>
Send and receive UDP traffic on the boinc port.
</summary>
@@ -17952,7 +18031,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="12475">
+<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13019">
<summary>
Do not audit attempts to send and receive
UDP traffic on the boinc port.
@@ -17964,7 +18043,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_boinc_port" lineno="12490">
+<interface name="corenet_tcp_bind_boinc_port" lineno="13034">
<summary>
Bind TCP sockets to the boinc port.
</summary>
@@ -17975,7 +18054,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_boinc_port" lineno="12510">
+<interface name="corenet_udp_bind_boinc_port" lineno="13054">
<summary>
Bind UDP sockets to the boinc port.
</summary>
@@ -17986,7 +18065,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_boinc_port" lineno="12529">
+<interface name="corenet_tcp_connect_boinc_port" lineno="13073">
<summary>
Make a TCP connection to the boinc port.
</summary>
@@ -17996,7 +18075,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_client_packets" lineno="12549">
+<interface name="corenet_send_boinc_client_packets" lineno="13093">
<summary>
Send boinc_client packets.
</summary>
@@ -18007,7 +18086,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="12568">
+<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13112">
<summary>
Do not audit attempts to send boinc_client packets.
</summary>
@@ -18018,7 +18097,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_client_packets" lineno="12587">
+<interface name="corenet_receive_boinc_client_packets" lineno="13131">
<summary>
Receive boinc_client packets.
</summary>
@@ -18029,7 +18108,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="12606">
+<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13150">
<summary>
Do not audit attempts to receive boinc_client packets.
</summary>
@@ -18040,7 +18119,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_client_packets" lineno="12625">
+<interface name="corenet_sendrecv_boinc_client_packets" lineno="13169">
<summary>
Send and receive boinc_client packets.
</summary>
@@ -18051,7 +18130,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="12641">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13185">
<summary>
Do not audit attempts to send and receive boinc_client packets.
</summary>
@@ -18062,7 +18141,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_client_packets" lineno="12656">
+<interface name="corenet_relabelto_boinc_client_packets" lineno="13200">
<summary>
Relabel packets to boinc_client the packet type.
</summary>
@@ -18072,7 +18151,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_server_packets" lineno="12676">
+<interface name="corenet_send_boinc_server_packets" lineno="13220">
<summary>
Send boinc_server packets.
</summary>
@@ -18083,7 +18162,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="12695">
+<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13239">
<summary>
Do not audit attempts to send boinc_server packets.
</summary>
@@ -18094,7 +18173,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_server_packets" lineno="12714">
+<interface name="corenet_receive_boinc_server_packets" lineno="13258">
<summary>
Receive boinc_server packets.
</summary>
@@ -18105,7 +18184,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="12733">
+<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13277">
<summary>
Do not audit attempts to receive boinc_server packets.
</summary>
@@ -18116,7 +18195,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_server_packets" lineno="12752">
+<interface name="corenet_sendrecv_boinc_server_packets" lineno="13296">
<summary>
Send and receive boinc_server packets.
</summary>
@@ -18127,7 +18206,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="12768">
+<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13312">
<summary>
Do not audit attempts to send and receive boinc_server packets.
</summary>
@@ -18138,7 +18217,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_server_packets" lineno="12783">
+<interface name="corenet_relabelto_boinc_server_packets" lineno="13327">
<summary>
Relabel packets to boinc_server the packet type.
</summary>
@@ -18148,7 +18227,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="12805">
+<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13349">
<summary>
Send and receive TCP traffic on the boinc_client port.
</summary>
@@ -18159,7 +18238,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_boinc_client_port" lineno="12820">
+<interface name="corenet_udp_send_boinc_client_port" lineno="13364">
<summary>
Send UDP traffic on the boinc_client port.
</summary>
@@ -18170,7 +18249,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="12835">
+<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13379">
<summary>
Do not audit attempts to send UDP traffic on the boinc_client port.
</summary>
@@ -18181,7 +18260,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_boinc_client_port" lineno="12850">
+<interface name="corenet_udp_receive_boinc_client_port" lineno="13394">
<summary>
Receive UDP traffic on the boinc_client port.
</summary>
@@ -18192,7 +18271,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="12865">
+<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13409">
<summary>
Do not audit attempts to receive UDP traffic on the boinc_client port.
</summary>
@@ -18203,7 +18282,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="12880">
+<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13424">
<summary>
Send and receive UDP traffic on the boinc_client port.
</summary>
@@ -18214,7 +18293,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="12896">
+<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13440">
<summary>
Do not audit attempts to send and receive
UDP traffic on the boinc_client port.
@@ -18226,7 +18305,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_boinc_client_port" lineno="12911">
+<interface name="corenet_tcp_bind_boinc_client_port" lineno="13455">
<summary>
Bind TCP sockets to the boinc_client port.
</summary>
@@ -18237,7 +18316,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_boinc_client_port" lineno="12931">
+<interface name="corenet_udp_bind_boinc_client_port" lineno="13475">
<summary>
Bind UDP sockets to the boinc_client port.
</summary>
@@ -18248,7 +18327,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_boinc_client_port" lineno="12950">
+<interface name="corenet_tcp_connect_boinc_client_port" lineno="13494">
<summary>
Make a TCP connection to the boinc_client port.
</summary>
@@ -18258,7 +18337,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_client_client_packets" lineno="12970">
+<interface name="corenet_send_boinc_client_client_packets" lineno="13514">
<summary>
Send boinc_client_client packets.
</summary>
@@ -18269,7 +18348,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="12989">
+<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13533">
<summary>
Do not audit attempts to send boinc_client_client packets.
</summary>
@@ -18280,7 +18359,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_client_client_packets" lineno="13008">
+<interface name="corenet_receive_boinc_client_client_packets" lineno="13552">
<summary>
Receive boinc_client_client packets.
</summary>
@@ -18291,7 +18370,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13027">
+<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13571">
<summary>
Do not audit attempts to receive boinc_client_client packets.
</summary>
@@ -18302,7 +18381,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13046">
+<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13590">
<summary>
Send and receive boinc_client_client packets.
</summary>
@@ -18313,7 +18392,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13062">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13606">
<summary>
Do not audit attempts to send and receive boinc_client_client packets.
</summary>
@@ -18324,7 +18403,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13077">
+<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13621">
<summary>
Relabel packets to boinc_client_client the packet type.
</summary>
@@ -18334,7 +18413,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_client_server_packets" lineno="13097">
+<interface name="corenet_send_boinc_client_server_packets" lineno="13641">
<summary>
Send boinc_client_server packets.
</summary>
@@ -18345,7 +18424,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13116">
+<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13660">
<summary>
Do not audit attempts to send boinc_client_server packets.
</summary>
@@ -18356,7 +18435,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_client_server_packets" lineno="13135">
+<interface name="corenet_receive_boinc_client_server_packets" lineno="13679">
<summary>
Receive boinc_client_server packets.
</summary>
@@ -18367,7 +18446,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13154">
+<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13698">
<summary>
Do not audit attempts to receive boinc_client_server packets.
</summary>
@@ -18378,7 +18457,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13173">
+<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13717">
<summary>
Send and receive boinc_client_server packets.
</summary>
@@ -18389,7 +18468,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13189">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13733">
<summary>
Do not audit attempts to send and receive boinc_client_server packets.
</summary>
@@ -18400,7 +18479,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13204">
+<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13748">
<summary>
Relabel packets to boinc_client_server the packet type.
</summary>
@@ -18410,7 +18489,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_biff_port" lineno="13226">
+<interface name="corenet_tcp_sendrecv_biff_port" lineno="13770">
<summary>
Send and receive TCP traffic on the biff port.
</summary>
@@ -18421,7 +18500,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_biff_port" lineno="13241">
+<interface name="corenet_udp_send_biff_port" lineno="13785">
<summary>
Send UDP traffic on the biff port.
</summary>
@@ -18432,7 +18511,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13256">
+<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13800">
<summary>
Do not audit attempts to send UDP traffic on the biff port.
</summary>
@@ -18443,7 +18522,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_biff_port" lineno="13271">
+<interface name="corenet_udp_receive_biff_port" lineno="13815">
<summary>
Receive UDP traffic on the biff port.
</summary>
@@ -18454,7 +18533,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13286">
+<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13830">
<summary>
Do not audit attempts to receive UDP traffic on the biff port.
</summary>
@@ -18465,7 +18544,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_biff_port" lineno="13301">
+<interface name="corenet_udp_sendrecv_biff_port" lineno="13845">
<summary>
Send and receive UDP traffic on the biff port.
</summary>
@@ -18476,7 +18555,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13317">
+<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13861">
<summary>
Do not audit attempts to send and receive
UDP traffic on the biff port.
@@ -18488,7 +18567,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_biff_port" lineno="13332">
+<interface name="corenet_tcp_bind_biff_port" lineno="13876">
<summary>
Bind TCP sockets to the biff port.
</summary>
@@ -18499,7 +18578,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_biff_port" lineno="13352">
+<interface name="corenet_udp_bind_biff_port" lineno="13896">
<summary>
Bind UDP sockets to the biff port.
</summary>
@@ -18510,7 +18589,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_biff_port" lineno="13371">
+<interface name="corenet_tcp_connect_biff_port" lineno="13915">
<summary>
Make a TCP connection to the biff port.
</summary>
@@ -18520,7 +18599,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_biff_client_packets" lineno="13391">
+<interface name="corenet_send_biff_client_packets" lineno="13935">
<summary>
Send biff_client packets.
</summary>
@@ -18531,7 +18610,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13410">
+<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13954">
<summary>
Do not audit attempts to send biff_client packets.
</summary>
@@ -18542,7 +18621,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_biff_client_packets" lineno="13429">
+<interface name="corenet_receive_biff_client_packets" lineno="13973">
<summary>
Receive biff_client packets.
</summary>
@@ -18553,7 +18632,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="13448">
+<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="13992">
<summary>
Do not audit attempts to receive biff_client packets.
</summary>
@@ -18564,7 +18643,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_biff_client_packets" lineno="13467">
+<interface name="corenet_sendrecv_biff_client_packets" lineno="14011">
<summary>
Send and receive biff_client packets.
</summary>
@@ -18575,7 +18654,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="13483">
+<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14027">
<summary>
Do not audit attempts to send and receive biff_client packets.
</summary>
@@ -18586,7 +18665,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_biff_client_packets" lineno="13498">
+<interface name="corenet_relabelto_biff_client_packets" lineno="14042">
<summary>
Relabel packets to biff_client the packet type.
</summary>
@@ -18596,7 +18675,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_biff_server_packets" lineno="13518">
+<interface name="corenet_send_biff_server_packets" lineno="14062">
<summary>
Send biff_server packets.
</summary>
@@ -18607,7 +18686,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_biff_server_packets" lineno="13537">
+<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14081">
<summary>
Do not audit attempts to send biff_server packets.
</summary>
@@ -18618,7 +18697,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_biff_server_packets" lineno="13556">
+<interface name="corenet_receive_biff_server_packets" lineno="14100">
<summary>
Receive biff_server packets.
</summary>
@@ -18629,7 +18708,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="13575">
+<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14119">
<summary>
Do not audit attempts to receive biff_server packets.
</summary>
@@ -18640,7 +18719,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_biff_server_packets" lineno="13594">
+<interface name="corenet_sendrecv_biff_server_packets" lineno="14138">
<summary>
Send and receive biff_server packets.
</summary>
@@ -18651,7 +18730,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="13610">
+<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14154">
<summary>
Do not audit attempts to send and receive biff_server packets.
</summary>
@@ -18662,7 +18741,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_biff_server_packets" lineno="13625">
+<interface name="corenet_relabelto_biff_server_packets" lineno="14169">
<summary>
Relabel packets to biff_server the packet type.
</summary>
@@ -18672,7 +18751,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="13647">
+<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14191">
<summary>
Send and receive TCP traffic on the certmaster port.
</summary>
@@ -18683,7 +18762,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_certmaster_port" lineno="13662">
+<interface name="corenet_udp_send_certmaster_port" lineno="14206">
<summary>
Send UDP traffic on the certmaster port.
</summary>
@@ -18694,7 +18773,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="13677">
+<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14221">
<summary>
Do not audit attempts to send UDP traffic on the certmaster port.
</summary>
@@ -18705,7 +18784,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_certmaster_port" lineno="13692">
+<interface name="corenet_udp_receive_certmaster_port" lineno="14236">
<summary>
Receive UDP traffic on the certmaster port.
</summary>
@@ -18716,7 +18795,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="13707">
+<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14251">
<summary>
Do not audit attempts to receive UDP traffic on the certmaster port.
</summary>
@@ -18727,7 +18806,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_certmaster_port" lineno="13722">
+<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14266">
<summary>
Send and receive UDP traffic on the certmaster port.
</summary>
@@ -18738,7 +18817,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="13738">
+<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14282">
<summary>
Do not audit attempts to send and receive
UDP traffic on the certmaster port.
@@ -18750,7 +18829,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_certmaster_port" lineno="13753">
+<interface name="corenet_tcp_bind_certmaster_port" lineno="14297">
<summary>
Bind TCP sockets to the certmaster port.
</summary>
@@ -18761,7 +18840,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_certmaster_port" lineno="13773">
+<interface name="corenet_udp_bind_certmaster_port" lineno="14317">
<summary>
Bind UDP sockets to the certmaster port.
</summary>
@@ -18772,7 +18851,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_certmaster_port" lineno="13792">
+<interface name="corenet_tcp_connect_certmaster_port" lineno="14336">
<summary>
Make a TCP connection to the certmaster port.
</summary>
@@ -18782,7 +18861,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_certmaster_client_packets" lineno="13812">
+<interface name="corenet_send_certmaster_client_packets" lineno="14356">
<summary>
Send certmaster_client packets.
</summary>
@@ -18793,7 +18872,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="13831">
+<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14375">
<summary>
Do not audit attempts to send certmaster_client packets.
</summary>
@@ -18804,7 +18883,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_certmaster_client_packets" lineno="13850">
+<interface name="corenet_receive_certmaster_client_packets" lineno="14394">
<summary>
Receive certmaster_client packets.
</summary>
@@ -18815,7 +18894,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="13869">
+<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14413">
<summary>
Do not audit attempts to receive certmaster_client packets.
</summary>
@@ -18826,7 +18905,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_certmaster_client_packets" lineno="13888">
+<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14432">
<summary>
Send and receive certmaster_client packets.
</summary>
@@ -18837,7 +18916,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="13904">
+<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14448">
<summary>
Do not audit attempts to send and receive certmaster_client packets.
</summary>
@@ -18848,7 +18927,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_certmaster_client_packets" lineno="13919">
+<interface name="corenet_relabelto_certmaster_client_packets" lineno="14463">
<summary>
Relabel packets to certmaster_client the packet type.
</summary>
@@ -18858,7 +18937,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_certmaster_server_packets" lineno="13939">
+<interface name="corenet_send_certmaster_server_packets" lineno="14483">
<summary>
Send certmaster_server packets.
</summary>
@@ -18869,7 +18948,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="13958">
+<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14502">
<summary>
Do not audit attempts to send certmaster_server packets.
</summary>
@@ -18880,7 +18959,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_certmaster_server_packets" lineno="13977">
+<interface name="corenet_receive_certmaster_server_packets" lineno="14521">
<summary>
Receive certmaster_server packets.
</summary>
@@ -18891,7 +18970,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="13996">
+<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14540">
<summary>
Do not audit attempts to receive certmaster_server packets.
</summary>
@@ -18902,7 +18981,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14015">
+<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14559">
<summary>
Send and receive certmaster_server packets.
</summary>
@@ -18913,7 +18992,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14031">
+<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14575">
<summary>
Do not audit attempts to send and receive certmaster_server packets.
</summary>
@@ -18924,7 +19003,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_certmaster_server_packets" lineno="14046">
+<interface name="corenet_relabelto_certmaster_server_packets" lineno="14590">
<summary>
Relabel packets to certmaster_server the packet type.
</summary>
@@ -18934,7 +19013,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14068">
+<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14612">
<summary>
Send and receive TCP traffic on the chronyd port.
</summary>
@@ -18945,7 +19024,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_chronyd_port" lineno="14083">
+<interface name="corenet_udp_send_chronyd_port" lineno="14627">
<summary>
Send UDP traffic on the chronyd port.
</summary>
@@ -18956,7 +19035,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14098">
+<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14642">
<summary>
Do not audit attempts to send UDP traffic on the chronyd port.
</summary>
@@ -18967,7 +19046,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_chronyd_port" lineno="14113">
+<interface name="corenet_udp_receive_chronyd_port" lineno="14657">
<summary>
Receive UDP traffic on the chronyd port.
</summary>
@@ -18978,7 +19057,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14128">
+<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14672">
<summary>
Do not audit attempts to receive UDP traffic on the chronyd port.
</summary>
@@ -18989,7 +19068,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14143">
+<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14687">
<summary>
Send and receive UDP traffic on the chronyd port.
</summary>
@@ -19000,7 +19079,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14159">
+<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14703">
<summary>
Do not audit attempts to send and receive
UDP traffic on the chronyd port.
@@ -19012,7 +19091,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_chronyd_port" lineno="14174">
+<interface name="corenet_tcp_bind_chronyd_port" lineno="14718">
<summary>
Bind TCP sockets to the chronyd port.
</summary>
@@ -19023,7 +19102,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_chronyd_port" lineno="14194">
+<interface name="corenet_udp_bind_chronyd_port" lineno="14738">
<summary>
Bind UDP sockets to the chronyd port.
</summary>
@@ -19034,7 +19113,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_chronyd_port" lineno="14213">
+<interface name="corenet_tcp_connect_chronyd_port" lineno="14757">
<summary>
Make a TCP connection to the chronyd port.
</summary>
@@ -19044,7 +19123,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_chronyd_client_packets" lineno="14233">
+<interface name="corenet_send_chronyd_client_packets" lineno="14777">
<summary>
Send chronyd_client packets.
</summary>
@@ -19055,7 +19134,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14252">
+<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14796">
<summary>
Do not audit attempts to send chronyd_client packets.
</summary>
@@ -19066,7 +19145,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_chronyd_client_packets" lineno="14271">
+<interface name="corenet_receive_chronyd_client_packets" lineno="14815">
<summary>
Receive chronyd_client packets.
</summary>
@@ -19077,7 +19156,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14290">
+<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14834">
<summary>
Do not audit attempts to receive chronyd_client packets.
</summary>
@@ -19088,7 +19167,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14309">
+<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14853">
<summary>
Send and receive chronyd_client packets.
</summary>
@@ -19099,7 +19178,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14325">
+<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14869">
<summary>
Do not audit attempts to send and receive chronyd_client packets.
</summary>
@@ -19110,7 +19189,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_chronyd_client_packets" lineno="14340">
+<interface name="corenet_relabelto_chronyd_client_packets" lineno="14884">
<summary>
Relabel packets to chronyd_client the packet type.
</summary>
@@ -19120,7 +19199,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_chronyd_server_packets" lineno="14360">
+<interface name="corenet_send_chronyd_server_packets" lineno="14904">
<summary>
Send chronyd_server packets.
</summary>
@@ -19131,7 +19210,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14379">
+<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14923">
<summary>
Do not audit attempts to send chronyd_server packets.
</summary>
@@ -19142,7 +19221,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_chronyd_server_packets" lineno="14398">
+<interface name="corenet_receive_chronyd_server_packets" lineno="14942">
<summary>
Receive chronyd_server packets.
</summary>
@@ -19153,7 +19232,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14417">
+<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14961">
<summary>
Do not audit attempts to receive chronyd_server packets.
</summary>
@@ -19164,7 +19243,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14436">
+<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14980">
<summary>
Send and receive chronyd_server packets.
</summary>
@@ -19175,7 +19254,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="14452">
+<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="14996">
<summary>
Do not audit attempts to send and receive chronyd_server packets.
</summary>
@@ -19186,7 +19265,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_chronyd_server_packets" lineno="14467">
+<interface name="corenet_relabelto_chronyd_server_packets" lineno="15011">
<summary>
Relabel packets to chronyd_server the packet type.
</summary>
@@ -19196,7 +19275,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_clamd_port" lineno="14489">
+<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15033">
<summary>
Send and receive TCP traffic on the clamd port.
</summary>
@@ -19207,7 +19286,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_clamd_port" lineno="14504">
+<interface name="corenet_udp_send_clamd_port" lineno="15048">
<summary>
Send UDP traffic on the clamd port.
</summary>
@@ -19218,7 +19297,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="14519">
+<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15063">
<summary>
Do not audit attempts to send UDP traffic on the clamd port.
</summary>
@@ -19229,7 +19308,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_clamd_port" lineno="14534">
+<interface name="corenet_udp_receive_clamd_port" lineno="15078">
<summary>
Receive UDP traffic on the clamd port.
</summary>
@@ -19240,7 +19319,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="14549">
+<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15093">
<summary>
Do not audit attempts to receive UDP traffic on the clamd port.
</summary>
@@ -19251,7 +19330,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_clamd_port" lineno="14564">
+<interface name="corenet_udp_sendrecv_clamd_port" lineno="15108">
<summary>
Send and receive UDP traffic on the clamd port.
</summary>
@@ -19262,7 +19341,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="14580">
+<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15124">
<summary>
Do not audit attempts to send and receive
UDP traffic on the clamd port.
@@ -19274,7 +19353,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_clamd_port" lineno="14595">
+<interface name="corenet_tcp_bind_clamd_port" lineno="15139">
<summary>
Bind TCP sockets to the clamd port.
</summary>
@@ -19285,7 +19364,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_clamd_port" lineno="14615">
+<interface name="corenet_udp_bind_clamd_port" lineno="15159">
<summary>
Bind UDP sockets to the clamd port.
</summary>
@@ -19296,7 +19375,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_clamd_port" lineno="14634">
+<interface name="corenet_tcp_connect_clamd_port" lineno="15178">
<summary>
Make a TCP connection to the clamd port.
</summary>
@@ -19306,7 +19385,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clamd_client_packets" lineno="14654">
+<interface name="corenet_send_clamd_client_packets" lineno="15198">
<summary>
Send clamd_client packets.
</summary>
@@ -19317,7 +19396,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="14673">
+<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15217">
<summary>
Do not audit attempts to send clamd_client packets.
</summary>
@@ -19328,7 +19407,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clamd_client_packets" lineno="14692">
+<interface name="corenet_receive_clamd_client_packets" lineno="15236">
<summary>
Receive clamd_client packets.
</summary>
@@ -19339,7 +19418,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="14711">
+<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15255">
<summary>
Do not audit attempts to receive clamd_client packets.
</summary>
@@ -19350,7 +19429,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clamd_client_packets" lineno="14730">
+<interface name="corenet_sendrecv_clamd_client_packets" lineno="15274">
<summary>
Send and receive clamd_client packets.
</summary>
@@ -19361,7 +19440,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="14746">
+<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15290">
<summary>
Do not audit attempts to send and receive clamd_client packets.
</summary>
@@ -19372,7 +19451,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clamd_client_packets" lineno="14761">
+<interface name="corenet_relabelto_clamd_client_packets" lineno="15305">
<summary>
Relabel packets to clamd_client the packet type.
</summary>
@@ -19382,7 +19461,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clamd_server_packets" lineno="14781">
+<interface name="corenet_send_clamd_server_packets" lineno="15325">
<summary>
Send clamd_server packets.
</summary>
@@ -19393,7 +19472,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="14800">
+<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15344">
<summary>
Do not audit attempts to send clamd_server packets.
</summary>
@@ -19404,7 +19483,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clamd_server_packets" lineno="14819">
+<interface name="corenet_receive_clamd_server_packets" lineno="15363">
<summary>
Receive clamd_server packets.
</summary>
@@ -19415,7 +19494,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="14838">
+<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15382">
<summary>
Do not audit attempts to receive clamd_server packets.
</summary>
@@ -19426,7 +19505,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clamd_server_packets" lineno="14857">
+<interface name="corenet_sendrecv_clamd_server_packets" lineno="15401">
<summary>
Send and receive clamd_server packets.
</summary>
@@ -19437,7 +19516,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="14873">
+<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15417">
<summary>
Do not audit attempts to send and receive clamd_server packets.
</summary>
@@ -19448,7 +19527,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clamd_server_packets" lineno="14888">
+<interface name="corenet_relabelto_clamd_server_packets" lineno="15432">
<summary>
Relabel packets to clamd_server the packet type.
</summary>
@@ -19458,7 +19537,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="14910">
+<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15454">
<summary>
Send and receive TCP traffic on the clockspeed port.
</summary>
@@ -19469,7 +19548,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_clockspeed_port" lineno="14925">
+<interface name="corenet_udp_send_clockspeed_port" lineno="15469">
<summary>
Send UDP traffic on the clockspeed port.
</summary>
@@ -19480,7 +19559,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="14940">
+<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15484">
<summary>
Do not audit attempts to send UDP traffic on the clockspeed port.
</summary>
@@ -19491,7 +19570,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_clockspeed_port" lineno="14955">
+<interface name="corenet_udp_receive_clockspeed_port" lineno="15499">
<summary>
Receive UDP traffic on the clockspeed port.
</summary>
@@ -19502,7 +19581,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="14970">
+<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15514">
<summary>
Do not audit attempts to receive UDP traffic on the clockspeed port.
</summary>
@@ -19513,7 +19592,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="14985">
+<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15529">
<summary>
Send and receive UDP traffic on the clockspeed port.
</summary>
@@ -19524,7 +19603,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15001">
+<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15545">
<summary>
Do not audit attempts to send and receive
UDP traffic on the clockspeed port.
@@ -19536,7 +19615,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_clockspeed_port" lineno="15016">
+<interface name="corenet_tcp_bind_clockspeed_port" lineno="15560">
<summary>
Bind TCP sockets to the clockspeed port.
</summary>
@@ -19547,7 +19626,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_clockspeed_port" lineno="15036">
+<interface name="corenet_udp_bind_clockspeed_port" lineno="15580">
<summary>
Bind UDP sockets to the clockspeed port.
</summary>
@@ -19558,7 +19637,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_clockspeed_port" lineno="15055">
+<interface name="corenet_tcp_connect_clockspeed_port" lineno="15599">
<summary>
Make a TCP connection to the clockspeed port.
</summary>
@@ -19568,7 +19647,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clockspeed_client_packets" lineno="15075">
+<interface name="corenet_send_clockspeed_client_packets" lineno="15619">
<summary>
Send clockspeed_client packets.
</summary>
@@ -19579,7 +19658,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15094">
+<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15638">
<summary>
Do not audit attempts to send clockspeed_client packets.
</summary>
@@ -19590,7 +19669,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clockspeed_client_packets" lineno="15113">
+<interface name="corenet_receive_clockspeed_client_packets" lineno="15657">
<summary>
Receive clockspeed_client packets.
</summary>
@@ -19601,7 +19680,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15132">
+<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15676">
<summary>
Do not audit attempts to receive clockspeed_client packets.
</summary>
@@ -19612,7 +19691,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15151">
+<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15695">
<summary>
Send and receive clockspeed_client packets.
</summary>
@@ -19623,7 +19702,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15167">
+<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15711">
<summary>
Do not audit attempts to send and receive clockspeed_client packets.
</summary>
@@ -19634,7 +19713,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15182">
+<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15726">
<summary>
Relabel packets to clockspeed_client the packet type.
</summary>
@@ -19644,7 +19723,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clockspeed_server_packets" lineno="15202">
+<interface name="corenet_send_clockspeed_server_packets" lineno="15746">
<summary>
Send clockspeed_server packets.
</summary>
@@ -19655,7 +19734,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15221">
+<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15765">
<summary>
Do not audit attempts to send clockspeed_server packets.
</summary>
@@ -19666,7 +19745,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clockspeed_server_packets" lineno="15240">
+<interface name="corenet_receive_clockspeed_server_packets" lineno="15784">
<summary>
Receive clockspeed_server packets.
</summary>
@@ -19677,7 +19756,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15259">
+<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15803">
<summary>
Do not audit attempts to receive clockspeed_server packets.
</summary>
@@ -19688,7 +19767,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15278">
+<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15822">
<summary>
Send and receive clockspeed_server packets.
</summary>
@@ -19699,7 +19778,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15294">
+<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15838">
<summary>
Do not audit attempts to send and receive clockspeed_server packets.
</summary>
@@ -19710,7 +19789,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15309">
+<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15853">
<summary>
Relabel packets to clockspeed_server the packet type.
</summary>
@@ -19720,7 +19799,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15331">
+<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15875">
<summary>
Send and receive TCP traffic on the cluster port.
</summary>
@@ -19731,7 +19810,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cluster_port" lineno="15346">
+<interface name="corenet_udp_send_cluster_port" lineno="15890">
<summary>
Send UDP traffic on the cluster port.
</summary>
@@ -19742,7 +19821,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15361">
+<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15905">
<summary>
Do not audit attempts to send UDP traffic on the cluster port.
</summary>
@@ -19753,7 +19832,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cluster_port" lineno="15376">
+<interface name="corenet_udp_receive_cluster_port" lineno="15920">
<summary>
Receive UDP traffic on the cluster port.
</summary>
@@ -19764,7 +19843,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15391">
+<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15935">
<summary>
Do not audit attempts to receive UDP traffic on the cluster port.
</summary>
@@ -19775,7 +19854,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cluster_port" lineno="15406">
+<interface name="corenet_udp_sendrecv_cluster_port" lineno="15950">
<summary>
Send and receive UDP traffic on the cluster port.
</summary>
@@ -19786,7 +19865,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15422">
+<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15966">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cluster port.
@@ -19798,7 +19877,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cluster_port" lineno="15437">
+<interface name="corenet_tcp_bind_cluster_port" lineno="15981">
<summary>
Bind TCP sockets to the cluster port.
</summary>
@@ -19809,7 +19888,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cluster_port" lineno="15457">
+<interface name="corenet_udp_bind_cluster_port" lineno="16001">
<summary>
Bind UDP sockets to the cluster port.
</summary>
@@ -19820,7 +19899,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cluster_port" lineno="15476">
+<interface name="corenet_tcp_connect_cluster_port" lineno="16020">
<summary>
Make a TCP connection to the cluster port.
</summary>
@@ -19830,7 +19909,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cluster_client_packets" lineno="15496">
+<interface name="corenet_send_cluster_client_packets" lineno="16040">
<summary>
Send cluster_client packets.
</summary>
@@ -19841,7 +19920,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="15515">
+<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16059">
<summary>
Do not audit attempts to send cluster_client packets.
</summary>
@@ -19852,7 +19931,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cluster_client_packets" lineno="15534">
+<interface name="corenet_receive_cluster_client_packets" lineno="16078">
<summary>
Receive cluster_client packets.
</summary>
@@ -19863,7 +19942,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="15553">
+<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16097">
<summary>
Do not audit attempts to receive cluster_client packets.
</summary>
@@ -19874,7 +19953,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cluster_client_packets" lineno="15572">
+<interface name="corenet_sendrecv_cluster_client_packets" lineno="16116">
<summary>
Send and receive cluster_client packets.
</summary>
@@ -19885,7 +19964,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="15588">
+<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16132">
<summary>
Do not audit attempts to send and receive cluster_client packets.
</summary>
@@ -19896,7 +19975,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cluster_client_packets" lineno="15603">
+<interface name="corenet_relabelto_cluster_client_packets" lineno="16147">
<summary>
Relabel packets to cluster_client the packet type.
</summary>
@@ -19906,7 +19985,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cluster_server_packets" lineno="15623">
+<interface name="corenet_send_cluster_server_packets" lineno="16167">
<summary>
Send cluster_server packets.
</summary>
@@ -19917,7 +19996,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="15642">
+<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16186">
<summary>
Do not audit attempts to send cluster_server packets.
</summary>
@@ -19928,7 +20007,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cluster_server_packets" lineno="15661">
+<interface name="corenet_receive_cluster_server_packets" lineno="16205">
<summary>
Receive cluster_server packets.
</summary>
@@ -19939,7 +20018,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="15680">
+<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16224">
<summary>
Do not audit attempts to receive cluster_server packets.
</summary>
@@ -19950,7 +20029,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cluster_server_packets" lineno="15699">
+<interface name="corenet_sendrecv_cluster_server_packets" lineno="16243">
<summary>
Send and receive cluster_server packets.
</summary>
@@ -19961,7 +20040,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="15715">
+<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16259">
<summary>
Do not audit attempts to send and receive cluster_server packets.
</summary>
@@ -19972,7 +20051,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cluster_server_packets" lineno="15730">
+<interface name="corenet_relabelto_cluster_server_packets" lineno="16274">
<summary>
Relabel packets to cluster_server the packet type.
</summary>
@@ -19982,7 +20061,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cma_port" lineno="15752">
+<interface name="corenet_tcp_sendrecv_cma_port" lineno="16296">
<summary>
Send and receive TCP traffic on the cma port.
</summary>
@@ -19993,7 +20072,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cma_port" lineno="15767">
+<interface name="corenet_udp_send_cma_port" lineno="16311">
<summary>
Send UDP traffic on the cma port.
</summary>
@@ -20004,7 +20083,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cma_port" lineno="15782">
+<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16326">
<summary>
Do not audit attempts to send UDP traffic on the cma port.
</summary>
@@ -20015,7 +20094,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cma_port" lineno="15797">
+<interface name="corenet_udp_receive_cma_port" lineno="16341">
<summary>
Receive UDP traffic on the cma port.
</summary>
@@ -20026,7 +20105,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="15812">
+<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16356">
<summary>
Do not audit attempts to receive UDP traffic on the cma port.
</summary>
@@ -20037,7 +20116,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cma_port" lineno="15827">
+<interface name="corenet_udp_sendrecv_cma_port" lineno="16371">
<summary>
Send and receive UDP traffic on the cma port.
</summary>
@@ -20048,7 +20127,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="15843">
+<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16387">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cma port.
@@ -20060,7 +20139,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cma_port" lineno="15858">
+<interface name="corenet_tcp_bind_cma_port" lineno="16402">
<summary>
Bind TCP sockets to the cma port.
</summary>
@@ -20071,7 +20150,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cma_port" lineno="15878">
+<interface name="corenet_udp_bind_cma_port" lineno="16422">
<summary>
Bind UDP sockets to the cma port.
</summary>
@@ -20082,7 +20161,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cma_port" lineno="15897">
+<interface name="corenet_tcp_connect_cma_port" lineno="16441">
<summary>
Make a TCP connection to the cma port.
</summary>
@@ -20092,7 +20171,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cma_client_packets" lineno="15917">
+<interface name="corenet_send_cma_client_packets" lineno="16461">
<summary>
Send cma_client packets.
</summary>
@@ -20103,7 +20182,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cma_client_packets" lineno="15936">
+<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16480">
<summary>
Do not audit attempts to send cma_client packets.
</summary>
@@ -20114,7 +20193,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cma_client_packets" lineno="15955">
+<interface name="corenet_receive_cma_client_packets" lineno="16499">
<summary>
Receive cma_client packets.
</summary>
@@ -20125,7 +20204,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="15974">
+<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16518">
<summary>
Do not audit attempts to receive cma_client packets.
</summary>
@@ -20136,7 +20215,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cma_client_packets" lineno="15993">
+<interface name="corenet_sendrecv_cma_client_packets" lineno="16537">
<summary>
Send and receive cma_client packets.
</summary>
@@ -20147,7 +20226,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16009">
+<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16553">
<summary>
Do not audit attempts to send and receive cma_client packets.
</summary>
@@ -20158,7 +20237,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cma_client_packets" lineno="16024">
+<interface name="corenet_relabelto_cma_client_packets" lineno="16568">
<summary>
Relabel packets to cma_client the packet type.
</summary>
@@ -20168,7 +20247,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cma_server_packets" lineno="16044">
+<interface name="corenet_send_cma_server_packets" lineno="16588">
<summary>
Send cma_server packets.
</summary>
@@ -20179,7 +20258,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16063">
+<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16607">
<summary>
Do not audit attempts to send cma_server packets.
</summary>
@@ -20190,7 +20269,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cma_server_packets" lineno="16082">
+<interface name="corenet_receive_cma_server_packets" lineno="16626">
<summary>
Receive cma_server packets.
</summary>
@@ -20201,7 +20280,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16101">
+<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16645">
<summary>
Do not audit attempts to receive cma_server packets.
</summary>
@@ -20212,7 +20291,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cma_server_packets" lineno="16120">
+<interface name="corenet_sendrecv_cma_server_packets" lineno="16664">
<summary>
Send and receive cma_server packets.
</summary>
@@ -20223,7 +20302,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16136">
+<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16680">
<summary>
Do not audit attempts to send and receive cma_server packets.
</summary>
@@ -20234,7 +20313,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cma_server_packets" lineno="16151">
+<interface name="corenet_relabelto_cma_server_packets" lineno="16695">
<summary>
Relabel packets to cma_server the packet type.
</summary>
@@ -20244,7 +20323,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16173">
+<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16717">
<summary>
Send and receive TCP traffic on the cobbler port.
</summary>
@@ -20255,7 +20334,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cobbler_port" lineno="16188">
+<interface name="corenet_udp_send_cobbler_port" lineno="16732">
<summary>
Send UDP traffic on the cobbler port.
</summary>
@@ -20266,7 +20345,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16203">
+<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16747">
<summary>
Do not audit attempts to send UDP traffic on the cobbler port.
</summary>
@@ -20277,7 +20356,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cobbler_port" lineno="16218">
+<interface name="corenet_udp_receive_cobbler_port" lineno="16762">
<summary>
Receive UDP traffic on the cobbler port.
</summary>
@@ -20288,7 +20367,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16233">
+<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16777">
<summary>
Do not audit attempts to receive UDP traffic on the cobbler port.
</summary>
@@ -20299,7 +20378,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16248">
+<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16792">
<summary>
Send and receive UDP traffic on the cobbler port.
</summary>
@@ -20310,7 +20389,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16264">
+<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16808">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cobbler port.
@@ -20322,7 +20401,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cobbler_port" lineno="16279">
+<interface name="corenet_tcp_bind_cobbler_port" lineno="16823">
<summary>
Bind TCP sockets to the cobbler port.
</summary>
@@ -20333,7 +20412,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cobbler_port" lineno="16299">
+<interface name="corenet_udp_bind_cobbler_port" lineno="16843">
<summary>
Bind UDP sockets to the cobbler port.
</summary>
@@ -20344,7 +20423,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cobbler_port" lineno="16318">
+<interface name="corenet_tcp_connect_cobbler_port" lineno="16862">
<summary>
Make a TCP connection to the cobbler port.
</summary>
@@ -20354,7 +20433,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cobbler_client_packets" lineno="16338">
+<interface name="corenet_send_cobbler_client_packets" lineno="16882">
<summary>
Send cobbler_client packets.
</summary>
@@ -20365,7 +20444,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16357">
+<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16901">
<summary>
Do not audit attempts to send cobbler_client packets.
</summary>
@@ -20376,7 +20455,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cobbler_client_packets" lineno="16376">
+<interface name="corenet_receive_cobbler_client_packets" lineno="16920">
<summary>
Receive cobbler_client packets.
</summary>
@@ -20387,7 +20466,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16395">
+<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16939">
<summary>
Do not audit attempts to receive cobbler_client packets.
</summary>
@@ -20398,7 +20477,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16414">
+<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16958">
<summary>
Send and receive cobbler_client packets.
</summary>
@@ -20409,7 +20488,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16430">
+<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16974">
<summary>
Do not audit attempts to send and receive cobbler_client packets.
</summary>
@@ -20420,7 +20499,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cobbler_client_packets" lineno="16445">
+<interface name="corenet_relabelto_cobbler_client_packets" lineno="16989">
<summary>
Relabel packets to cobbler_client the packet type.
</summary>
@@ -20430,7 +20509,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cobbler_server_packets" lineno="16465">
+<interface name="corenet_send_cobbler_server_packets" lineno="17009">
<summary>
Send cobbler_server packets.
</summary>
@@ -20441,7 +20520,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="16484">
+<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17028">
<summary>
Do not audit attempts to send cobbler_server packets.
</summary>
@@ -20452,7 +20531,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cobbler_server_packets" lineno="16503">
+<interface name="corenet_receive_cobbler_server_packets" lineno="17047">
<summary>
Receive cobbler_server packets.
</summary>
@@ -20463,7 +20542,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="16522">
+<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17066">
<summary>
Do not audit attempts to receive cobbler_server packets.
</summary>
@@ -20474,7 +20553,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cobbler_server_packets" lineno="16541">
+<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17085">
<summary>
Send and receive cobbler_server packets.
</summary>
@@ -20485,7 +20564,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="16557">
+<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17101">
<summary>
Do not audit attempts to send and receive cobbler_server packets.
</summary>
@@ -20496,7 +20575,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cobbler_server_packets" lineno="16572">
+<interface name="corenet_relabelto_cobbler_server_packets" lineno="17116">
<summary>
Relabel packets to cobbler_server the packet type.
</summary>
@@ -20506,7 +20585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="16594">
+<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17138">
<summary>
Send and receive TCP traffic on the commplex_link port.
</summary>
@@ -20517,7 +20596,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_commplex_link_port" lineno="16609">
+<interface name="corenet_udp_send_commplex_link_port" lineno="17153">
<summary>
Send UDP traffic on the commplex_link port.
</summary>
@@ -20528,7 +20607,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="16624">
+<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17168">
<summary>
Do not audit attempts to send UDP traffic on the commplex_link port.
</summary>
@@ -20539,7 +20618,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_commplex_link_port" lineno="16639">
+<interface name="corenet_udp_receive_commplex_link_port" lineno="17183">
<summary>
Receive UDP traffic on the commplex_link port.
</summary>
@@ -20550,7 +20629,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="16654">
+<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17198">
<summary>
Do not audit attempts to receive UDP traffic on the commplex_link port.
</summary>
@@ -20561,7 +20640,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="16669">
+<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17213">
<summary>
Send and receive UDP traffic on the commplex_link port.
</summary>
@@ -20572,7 +20651,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="16685">
+<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17229">
<summary>
Do not audit attempts to send and receive
UDP traffic on the commplex_link port.
@@ -20584,7 +20663,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_commplex_link_port" lineno="16700">
+<interface name="corenet_tcp_bind_commplex_link_port" lineno="17244">
<summary>
Bind TCP sockets to the commplex_link port.
</summary>
@@ -20595,7 +20674,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_commplex_link_port" lineno="16720">
+<interface name="corenet_udp_bind_commplex_link_port" lineno="17264">
<summary>
Bind UDP sockets to the commplex_link port.
</summary>
@@ -20606,7 +20685,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_commplex_link_port" lineno="16739">
+<interface name="corenet_tcp_connect_commplex_link_port" lineno="17283">
<summary>
Make a TCP connection to the commplex_link port.
</summary>
@@ -20616,7 +20695,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_link_client_packets" lineno="16759">
+<interface name="corenet_send_commplex_link_client_packets" lineno="17303">
<summary>
Send commplex_link_client packets.
</summary>
@@ -20627,7 +20706,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="16778">
+<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17322">
<summary>
Do not audit attempts to send commplex_link_client packets.
</summary>
@@ -20638,7 +20717,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_link_client_packets" lineno="16797">
+<interface name="corenet_receive_commplex_link_client_packets" lineno="17341">
<summary>
Receive commplex_link_client packets.
</summary>
@@ -20649,7 +20728,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="16816">
+<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17360">
<summary>
Do not audit attempts to receive commplex_link_client packets.
</summary>
@@ -20660,7 +20739,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="16835">
+<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17379">
<summary>
Send and receive commplex_link_client packets.
</summary>
@@ -20671,7 +20750,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="16851">
+<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17395">
<summary>
Do not audit attempts to send and receive commplex_link_client packets.
</summary>
@@ -20682,7 +20761,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_link_client_packets" lineno="16866">
+<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17410">
<summary>
Relabel packets to commplex_link_client the packet type.
</summary>
@@ -20692,7 +20771,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_link_server_packets" lineno="16886">
+<interface name="corenet_send_commplex_link_server_packets" lineno="17430">
<summary>
Send commplex_link_server packets.
</summary>
@@ -20703,7 +20782,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="16905">
+<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17449">
<summary>
Do not audit attempts to send commplex_link_server packets.
</summary>
@@ -20714,7 +20793,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_link_server_packets" lineno="16924">
+<interface name="corenet_receive_commplex_link_server_packets" lineno="17468">
<summary>
Receive commplex_link_server packets.
</summary>
@@ -20725,7 +20804,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="16943">
+<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17487">
<summary>
Do not audit attempts to receive commplex_link_server packets.
</summary>
@@ -20736,7 +20815,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="16962">
+<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17506">
<summary>
Send and receive commplex_link_server packets.
</summary>
@@ -20747,7 +20826,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="16978">
+<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17522">
<summary>
Do not audit attempts to send and receive commplex_link_server packets.
</summary>
@@ -20758,7 +20837,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_link_server_packets" lineno="16993">
+<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17537">
<summary>
Relabel packets to commplex_link_server the packet type.
</summary>
@@ -20768,7 +20847,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17015">
+<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17559">
<summary>
Send and receive TCP traffic on the commplex_main port.
</summary>
@@ -20779,7 +20858,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_commplex_main_port" lineno="17030">
+<interface name="corenet_udp_send_commplex_main_port" lineno="17574">
<summary>
Send UDP traffic on the commplex_main port.
</summary>
@@ -20790,7 +20869,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17045">
+<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17589">
<summary>
Do not audit attempts to send UDP traffic on the commplex_main port.
</summary>
@@ -20801,7 +20880,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_commplex_main_port" lineno="17060">
+<interface name="corenet_udp_receive_commplex_main_port" lineno="17604">
<summary>
Receive UDP traffic on the commplex_main port.
</summary>
@@ -20812,7 +20891,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17075">
+<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17619">
<summary>
Do not audit attempts to receive UDP traffic on the commplex_main port.
</summary>
@@ -20823,7 +20902,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17090">
+<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17634">
<summary>
Send and receive UDP traffic on the commplex_main port.
</summary>
@@ -20834,7 +20913,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17106">
+<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17650">
<summary>
Do not audit attempts to send and receive
UDP traffic on the commplex_main port.
@@ -20846,7 +20925,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_commplex_main_port" lineno="17121">
+<interface name="corenet_tcp_bind_commplex_main_port" lineno="17665">
<summary>
Bind TCP sockets to the commplex_main port.
</summary>
@@ -20857,7 +20936,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_commplex_main_port" lineno="17141">
+<interface name="corenet_udp_bind_commplex_main_port" lineno="17685">
<summary>
Bind UDP sockets to the commplex_main port.
</summary>
@@ -20868,7 +20947,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_commplex_main_port" lineno="17160">
+<interface name="corenet_tcp_connect_commplex_main_port" lineno="17704">
<summary>
Make a TCP connection to the commplex_main port.
</summary>
@@ -20878,7 +20957,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_main_client_packets" lineno="17180">
+<interface name="corenet_send_commplex_main_client_packets" lineno="17724">
<summary>
Send commplex_main_client packets.
</summary>
@@ -20889,7 +20968,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17199">
+<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17743">
<summary>
Do not audit attempts to send commplex_main_client packets.
</summary>
@@ -20900,7 +20979,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_main_client_packets" lineno="17218">
+<interface name="corenet_receive_commplex_main_client_packets" lineno="17762">
<summary>
Receive commplex_main_client packets.
</summary>
@@ -20911,7 +20990,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17237">
+<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17781">
<summary>
Do not audit attempts to receive commplex_main_client packets.
</summary>
@@ -20922,7 +21001,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17256">
+<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17800">
<summary>
Send and receive commplex_main_client packets.
</summary>
@@ -20933,7 +21012,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17272">
+<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17816">
<summary>
Do not audit attempts to send and receive commplex_main_client packets.
</summary>
@@ -20944,7 +21023,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17287">
+<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17831">
<summary>
Relabel packets to commplex_main_client the packet type.
</summary>
@@ -20954,7 +21033,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_main_server_packets" lineno="17307">
+<interface name="corenet_send_commplex_main_server_packets" lineno="17851">
<summary>
Send commplex_main_server packets.
</summary>
@@ -20965,7 +21044,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17326">
+<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17870">
<summary>
Do not audit attempts to send commplex_main_server packets.
</summary>
@@ -20976,7 +21055,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_main_server_packets" lineno="17345">
+<interface name="corenet_receive_commplex_main_server_packets" lineno="17889">
<summary>
Receive commplex_main_server packets.
</summary>
@@ -20987,7 +21066,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17364">
+<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17908">
<summary>
Do not audit attempts to receive commplex_main_server packets.
</summary>
@@ -20998,7 +21077,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17383">
+<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17927">
<summary>
Send and receive commplex_main_server packets.
</summary>
@@ -21009,7 +21088,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17399">
+<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17943">
<summary>
Do not audit attempts to send and receive commplex_main_server packets.
</summary>
@@ -21020,7 +21099,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17414">
+<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17958">
<summary>
Relabel packets to commplex_main_server the packet type.
</summary>
@@ -21030,7 +21109,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17436">
+<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17980">
<summary>
Send and receive TCP traffic on the comsat port.
</summary>
@@ -21041,7 +21120,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_comsat_port" lineno="17451">
+<interface name="corenet_udp_send_comsat_port" lineno="17995">
<summary>
Send UDP traffic on the comsat port.
</summary>
@@ -21052,7 +21131,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="17466">
+<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18010">
<summary>
Do not audit attempts to send UDP traffic on the comsat port.
</summary>
@@ -21063,7 +21142,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_comsat_port" lineno="17481">
+<interface name="corenet_udp_receive_comsat_port" lineno="18025">
<summary>
Receive UDP traffic on the comsat port.
</summary>
@@ -21074,7 +21153,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="17496">
+<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18040">
<summary>
Do not audit attempts to receive UDP traffic on the comsat port.
</summary>
@@ -21085,7 +21164,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_comsat_port" lineno="17511">
+<interface name="corenet_udp_sendrecv_comsat_port" lineno="18055">
<summary>
Send and receive UDP traffic on the comsat port.
</summary>
@@ -21096,7 +21175,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="17527">
+<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18071">
<summary>
Do not audit attempts to send and receive
UDP traffic on the comsat port.
@@ -21108,7 +21187,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_comsat_port" lineno="17542">
+<interface name="corenet_tcp_bind_comsat_port" lineno="18086">
<summary>
Bind TCP sockets to the comsat port.
</summary>
@@ -21119,7 +21198,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_comsat_port" lineno="17562">
+<interface name="corenet_udp_bind_comsat_port" lineno="18106">
<summary>
Bind UDP sockets to the comsat port.
</summary>
@@ -21130,7 +21209,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_comsat_port" lineno="17581">
+<interface name="corenet_tcp_connect_comsat_port" lineno="18125">
<summary>
Make a TCP connection to the comsat port.
</summary>
@@ -21140,7 +21219,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_comsat_client_packets" lineno="17601">
+<interface name="corenet_send_comsat_client_packets" lineno="18145">
<summary>
Send comsat_client packets.
</summary>
@@ -21151,7 +21230,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="17620">
+<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18164">
<summary>
Do not audit attempts to send comsat_client packets.
</summary>
@@ -21162,7 +21241,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_comsat_client_packets" lineno="17639">
+<interface name="corenet_receive_comsat_client_packets" lineno="18183">
<summary>
Receive comsat_client packets.
</summary>
@@ -21173,7 +21252,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="17658">
+<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18202">
<summary>
Do not audit attempts to receive comsat_client packets.
</summary>
@@ -21184,7 +21263,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_comsat_client_packets" lineno="17677">
+<interface name="corenet_sendrecv_comsat_client_packets" lineno="18221">
<summary>
Send and receive comsat_client packets.
</summary>
@@ -21195,7 +21274,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="17693">
+<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18237">
<summary>
Do not audit attempts to send and receive comsat_client packets.
</summary>
@@ -21206,7 +21285,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_comsat_client_packets" lineno="17708">
+<interface name="corenet_relabelto_comsat_client_packets" lineno="18252">
<summary>
Relabel packets to comsat_client the packet type.
</summary>
@@ -21216,7 +21295,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_comsat_server_packets" lineno="17728">
+<interface name="corenet_send_comsat_server_packets" lineno="18272">
<summary>
Send comsat_server packets.
</summary>
@@ -21227,7 +21306,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="17747">
+<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18291">
<summary>
Do not audit attempts to send comsat_server packets.
</summary>
@@ -21238,7 +21317,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_comsat_server_packets" lineno="17766">
+<interface name="corenet_receive_comsat_server_packets" lineno="18310">
<summary>
Receive comsat_server packets.
</summary>
@@ -21249,7 +21328,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="17785">
+<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18329">
<summary>
Do not audit attempts to receive comsat_server packets.
</summary>
@@ -21260,7 +21339,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_comsat_server_packets" lineno="17804">
+<interface name="corenet_sendrecv_comsat_server_packets" lineno="18348">
<summary>
Send and receive comsat_server packets.
</summary>
@@ -21271,7 +21350,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="17820">
+<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18364">
<summary>
Do not audit attempts to send and receive comsat_server packets.
</summary>
@@ -21282,7 +21361,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_comsat_server_packets" lineno="17835">
+<interface name="corenet_relabelto_comsat_server_packets" lineno="18379">
<summary>
Relabel packets to comsat_server the packet type.
</summary>
@@ -21292,7 +21371,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_condor_port" lineno="17857">
+<interface name="corenet_tcp_sendrecv_condor_port" lineno="18401">
<summary>
Send and receive TCP traffic on the condor port.
</summary>
@@ -21303,7 +21382,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_condor_port" lineno="17872">
+<interface name="corenet_udp_send_condor_port" lineno="18416">
<summary>
Send UDP traffic on the condor port.
</summary>
@@ -21314,7 +21393,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_condor_port" lineno="17887">
+<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18431">
<summary>
Do not audit attempts to send UDP traffic on the condor port.
</summary>
@@ -21325,7 +21404,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_condor_port" lineno="17902">
+<interface name="corenet_udp_receive_condor_port" lineno="18446">
<summary>
Receive UDP traffic on the condor port.
</summary>
@@ -21336,7 +21415,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="17917">
+<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18461">
<summary>
Do not audit attempts to receive UDP traffic on the condor port.
</summary>
@@ -21347,7 +21426,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_condor_port" lineno="17932">
+<interface name="corenet_udp_sendrecv_condor_port" lineno="18476">
<summary>
Send and receive UDP traffic on the condor port.
</summary>
@@ -21358,7 +21437,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="17948">
+<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18492">
<summary>
Do not audit attempts to send and receive
UDP traffic on the condor port.
@@ -21370,7 +21449,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_condor_port" lineno="17963">
+<interface name="corenet_tcp_bind_condor_port" lineno="18507">
<summary>
Bind TCP sockets to the condor port.
</summary>
@@ -21381,7 +21460,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_condor_port" lineno="17983">
+<interface name="corenet_udp_bind_condor_port" lineno="18527">
<summary>
Bind UDP sockets to the condor port.
</summary>
@@ -21392,7 +21471,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_condor_port" lineno="18002">
+<interface name="corenet_tcp_connect_condor_port" lineno="18546">
<summary>
Make a TCP connection to the condor port.
</summary>
@@ -21402,7 +21481,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_condor_client_packets" lineno="18022">
+<interface name="corenet_send_condor_client_packets" lineno="18566">
<summary>
Send condor_client packets.
</summary>
@@ -21413,7 +21492,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18041">
+<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18585">
<summary>
Do not audit attempts to send condor_client packets.
</summary>
@@ -21424,7 +21503,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_condor_client_packets" lineno="18060">
+<interface name="corenet_receive_condor_client_packets" lineno="18604">
<summary>
Receive condor_client packets.
</summary>
@@ -21435,7 +21514,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18079">
+<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18623">
<summary>
Do not audit attempts to receive condor_client packets.
</summary>
@@ -21446,7 +21525,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_condor_client_packets" lineno="18098">
+<interface name="corenet_sendrecv_condor_client_packets" lineno="18642">
<summary>
Send and receive condor_client packets.
</summary>
@@ -21457,7 +21536,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18114">
+<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18658">
<summary>
Do not audit attempts to send and receive condor_client packets.
</summary>
@@ -21468,7 +21547,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_condor_client_packets" lineno="18129">
+<interface name="corenet_relabelto_condor_client_packets" lineno="18673">
<summary>
Relabel packets to condor_client the packet type.
</summary>
@@ -21478,7 +21557,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_condor_server_packets" lineno="18149">
+<interface name="corenet_send_condor_server_packets" lineno="18693">
<summary>
Send condor_server packets.
</summary>
@@ -21489,7 +21568,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18168">
+<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18712">
<summary>
Do not audit attempts to send condor_server packets.
</summary>
@@ -21500,7 +21579,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_condor_server_packets" lineno="18187">
+<interface name="corenet_receive_condor_server_packets" lineno="18731">
<summary>
Receive condor_server packets.
</summary>
@@ -21511,7 +21590,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18206">
+<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18750">
<summary>
Do not audit attempts to receive condor_server packets.
</summary>
@@ -21522,7 +21601,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_condor_server_packets" lineno="18225">
+<interface name="corenet_sendrecv_condor_server_packets" lineno="18769">
<summary>
Send and receive condor_server packets.
</summary>
@@ -21533,7 +21612,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18241">
+<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18785">
<summary>
Do not audit attempts to send and receive condor_server packets.
</summary>
@@ -21544,7 +21623,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_condor_server_packets" lineno="18256">
+<interface name="corenet_relabelto_condor_server_packets" lineno="18800">
<summary>
Relabel packets to condor_server the packet type.
</summary>
@@ -21554,7 +21633,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18278">
+<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18822">
<summary>
Send and receive TCP traffic on the couchdb port.
</summary>
@@ -21565,7 +21644,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_couchdb_port" lineno="18293">
+<interface name="corenet_udp_send_couchdb_port" lineno="18837">
<summary>
Send UDP traffic on the couchdb port.
</summary>
@@ -21576,7 +21655,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18308">
+<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18852">
<summary>
Do not audit attempts to send UDP traffic on the couchdb port.
</summary>
@@ -21587,7 +21666,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_couchdb_port" lineno="18323">
+<interface name="corenet_udp_receive_couchdb_port" lineno="18867">
<summary>
Receive UDP traffic on the couchdb port.
</summary>
@@ -21598,7 +21677,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18338">
+<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18882">
<summary>
Do not audit attempts to receive UDP traffic on the couchdb port.
</summary>
@@ -21609,7 +21688,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18353">
+<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18897">
<summary>
Send and receive UDP traffic on the couchdb port.
</summary>
@@ -21620,7 +21699,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18369">
+<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18913">
<summary>
Do not audit attempts to send and receive
UDP traffic on the couchdb port.
@@ -21632,7 +21711,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_couchdb_port" lineno="18384">
+<interface name="corenet_tcp_bind_couchdb_port" lineno="18928">
<summary>
Bind TCP sockets to the couchdb port.
</summary>
@@ -21643,7 +21722,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_couchdb_port" lineno="18404">
+<interface name="corenet_udp_bind_couchdb_port" lineno="18948">
<summary>
Bind UDP sockets to the couchdb port.
</summary>
@@ -21654,7 +21733,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_couchdb_port" lineno="18423">
+<interface name="corenet_tcp_connect_couchdb_port" lineno="18967">
<summary>
Make a TCP connection to the couchdb port.
</summary>
@@ -21664,7 +21743,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_couchdb_client_packets" lineno="18443">
+<interface name="corenet_send_couchdb_client_packets" lineno="18987">
<summary>
Send couchdb_client packets.
</summary>
@@ -21675,7 +21754,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="18462">
+<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19006">
<summary>
Do not audit attempts to send couchdb_client packets.
</summary>
@@ -21686,7 +21765,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_couchdb_client_packets" lineno="18481">
+<interface name="corenet_receive_couchdb_client_packets" lineno="19025">
<summary>
Receive couchdb_client packets.
</summary>
@@ -21697,7 +21776,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="18500">
+<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19044">
<summary>
Do not audit attempts to receive couchdb_client packets.
</summary>
@@ -21708,7 +21787,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_couchdb_client_packets" lineno="18519">
+<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19063">
<summary>
Send and receive couchdb_client packets.
</summary>
@@ -21719,7 +21798,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="18535">
+<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19079">
<summary>
Do not audit attempts to send and receive couchdb_client packets.
</summary>
@@ -21730,7 +21809,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_couchdb_client_packets" lineno="18550">
+<interface name="corenet_relabelto_couchdb_client_packets" lineno="19094">
<summary>
Relabel packets to couchdb_client the packet type.
</summary>
@@ -21740,7 +21819,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_couchdb_server_packets" lineno="18570">
+<interface name="corenet_send_couchdb_server_packets" lineno="19114">
<summary>
Send couchdb_server packets.
</summary>
@@ -21751,7 +21830,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="18589">
+<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19133">
<summary>
Do not audit attempts to send couchdb_server packets.
</summary>
@@ -21762,7 +21841,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_couchdb_server_packets" lineno="18608">
+<interface name="corenet_receive_couchdb_server_packets" lineno="19152">
<summary>
Receive couchdb_server packets.
</summary>
@@ -21773,7 +21852,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="18627">
+<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19171">
<summary>
Do not audit attempts to receive couchdb_server packets.
</summary>
@@ -21784,7 +21863,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_couchdb_server_packets" lineno="18646">
+<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19190">
<summary>
Send and receive couchdb_server packets.
</summary>
@@ -21795,7 +21874,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="18662">
+<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19206">
<summary>
Do not audit attempts to send and receive couchdb_server packets.
</summary>
@@ -21806,7 +21885,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_couchdb_server_packets" lineno="18677">
+<interface name="corenet_relabelto_couchdb_server_packets" lineno="19221">
<summary>
Relabel packets to couchdb_server the packet type.
</summary>
@@ -21816,7 +21895,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="18699">
+<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19243">
<summary>
Send and receive TCP traffic on the cslistener port.
</summary>
@@ -21827,7 +21906,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cslistener_port" lineno="18714">
+<interface name="corenet_udp_send_cslistener_port" lineno="19258">
<summary>
Send UDP traffic on the cslistener port.
</summary>
@@ -21838,7 +21917,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="18729">
+<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19273">
<summary>
Do not audit attempts to send UDP traffic on the cslistener port.
</summary>
@@ -21849,7 +21928,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cslistener_port" lineno="18744">
+<interface name="corenet_udp_receive_cslistener_port" lineno="19288">
<summary>
Receive UDP traffic on the cslistener port.
</summary>
@@ -21860,7 +21939,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="18759">
+<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19303">
<summary>
Do not audit attempts to receive UDP traffic on the cslistener port.
</summary>
@@ -21871,7 +21950,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cslistener_port" lineno="18774">
+<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19318">
<summary>
Send and receive UDP traffic on the cslistener port.
</summary>
@@ -21882,7 +21961,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="18790">
+<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19334">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cslistener port.
@@ -21894,7 +21973,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cslistener_port" lineno="18805">
+<interface name="corenet_tcp_bind_cslistener_port" lineno="19349">
<summary>
Bind TCP sockets to the cslistener port.
</summary>
@@ -21905,7 +21984,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cslistener_port" lineno="18825">
+<interface name="corenet_udp_bind_cslistener_port" lineno="19369">
<summary>
Bind UDP sockets to the cslistener port.
</summary>
@@ -21916,7 +21995,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cslistener_port" lineno="18844">
+<interface name="corenet_tcp_connect_cslistener_port" lineno="19388">
<summary>
Make a TCP connection to the cslistener port.
</summary>
@@ -21926,7 +22005,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cslistener_client_packets" lineno="18864">
+<interface name="corenet_send_cslistener_client_packets" lineno="19408">
<summary>
Send cslistener_client packets.
</summary>
@@ -21937,7 +22016,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="18883">
+<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19427">
<summary>
Do not audit attempts to send cslistener_client packets.
</summary>
@@ -21948,7 +22027,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cslistener_client_packets" lineno="18902">
+<interface name="corenet_receive_cslistener_client_packets" lineno="19446">
<summary>
Receive cslistener_client packets.
</summary>
@@ -21959,7 +22038,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="18921">
+<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19465">
<summary>
Do not audit attempts to receive cslistener_client packets.
</summary>
@@ -21970,7 +22049,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cslistener_client_packets" lineno="18940">
+<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19484">
<summary>
Send and receive cslistener_client packets.
</summary>
@@ -21981,7 +22060,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="18956">
+<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19500">
<summary>
Do not audit attempts to send and receive cslistener_client packets.
</summary>
@@ -21992,7 +22071,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cslistener_client_packets" lineno="18971">
+<interface name="corenet_relabelto_cslistener_client_packets" lineno="19515">
<summary>
Relabel packets to cslistener_client the packet type.
</summary>
@@ -22002,7 +22081,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cslistener_server_packets" lineno="18991">
+<interface name="corenet_send_cslistener_server_packets" lineno="19535">
<summary>
Send cslistener_server packets.
</summary>
@@ -22013,7 +22092,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19010">
+<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19554">
<summary>
Do not audit attempts to send cslistener_server packets.
</summary>
@@ -22024,7 +22103,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cslistener_server_packets" lineno="19029">
+<interface name="corenet_receive_cslistener_server_packets" lineno="19573">
<summary>
Receive cslistener_server packets.
</summary>
@@ -22035,7 +22114,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19048">
+<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19592">
<summary>
Do not audit attempts to receive cslistener_server packets.
</summary>
@@ -22046,7 +22125,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19067">
+<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19611">
<summary>
Send and receive cslistener_server packets.
</summary>
@@ -22057,7 +22136,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19083">
+<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19627">
<summary>
Do not audit attempts to send and receive cslistener_server packets.
</summary>
@@ -22068,7 +22147,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cslistener_server_packets" lineno="19098">
+<interface name="corenet_relabelto_cslistener_server_packets" lineno="19642">
<summary>
Relabel packets to cslistener_server the packet type.
</summary>
@@ -22078,7 +22157,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19120">
+<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19664">
<summary>
Send and receive TCP traffic on the ctdb port.
</summary>
@@ -22089,7 +22168,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ctdb_port" lineno="19135">
+<interface name="corenet_udp_send_ctdb_port" lineno="19679">
<summary>
Send UDP traffic on the ctdb port.
</summary>
@@ -22100,7 +22179,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19150">
+<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19694">
<summary>
Do not audit attempts to send UDP traffic on the ctdb port.
</summary>
@@ -22111,7 +22190,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ctdb_port" lineno="19165">
+<interface name="corenet_udp_receive_ctdb_port" lineno="19709">
<summary>
Receive UDP traffic on the ctdb port.
</summary>
@@ -22122,7 +22201,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19180">
+<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19724">
<summary>
Do not audit attempts to receive UDP traffic on the ctdb port.
</summary>
@@ -22133,7 +22212,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19195">
+<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19739">
<summary>
Send and receive UDP traffic on the ctdb port.
</summary>
@@ -22144,7 +22223,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19211">
+<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19755">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ctdb port.
@@ -22156,7 +22235,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ctdb_port" lineno="19226">
+<interface name="corenet_tcp_bind_ctdb_port" lineno="19770">
<summary>
Bind TCP sockets to the ctdb port.
</summary>
@@ -22167,7 +22246,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ctdb_port" lineno="19246">
+<interface name="corenet_udp_bind_ctdb_port" lineno="19790">
<summary>
Bind UDP sockets to the ctdb port.
</summary>
@@ -22178,7 +22257,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ctdb_port" lineno="19265">
+<interface name="corenet_tcp_connect_ctdb_port" lineno="19809">
<summary>
Make a TCP connection to the ctdb port.
</summary>
@@ -22188,7 +22267,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ctdb_client_packets" lineno="19285">
+<interface name="corenet_send_ctdb_client_packets" lineno="19829">
<summary>
Send ctdb_client packets.
</summary>
@@ -22199,7 +22278,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19304">
+<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19848">
<summary>
Do not audit attempts to send ctdb_client packets.
</summary>
@@ -22210,7 +22289,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ctdb_client_packets" lineno="19323">
+<interface name="corenet_receive_ctdb_client_packets" lineno="19867">
<summary>
Receive ctdb_client packets.
</summary>
@@ -22221,7 +22300,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19342">
+<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19886">
<summary>
Do not audit attempts to receive ctdb_client packets.
</summary>
@@ -22232,7 +22311,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19361">
+<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19905">
<summary>
Send and receive ctdb_client packets.
</summary>
@@ -22243,7 +22322,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19377">
+<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19921">
<summary>
Do not audit attempts to send and receive ctdb_client packets.
</summary>
@@ -22254,7 +22333,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ctdb_client_packets" lineno="19392">
+<interface name="corenet_relabelto_ctdb_client_packets" lineno="19936">
<summary>
Relabel packets to ctdb_client the packet type.
</summary>
@@ -22264,7 +22343,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ctdb_server_packets" lineno="19412">
+<interface name="corenet_send_ctdb_server_packets" lineno="19956">
<summary>
Send ctdb_server packets.
</summary>
@@ -22275,7 +22354,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19431">
+<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19975">
<summary>
Do not audit attempts to send ctdb_server packets.
</summary>
@@ -22286,7 +22365,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ctdb_server_packets" lineno="19450">
+<interface name="corenet_receive_ctdb_server_packets" lineno="19994">
<summary>
Receive ctdb_server packets.
</summary>
@@ -22297,7 +22376,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="19469">
+<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20013">
<summary>
Do not audit attempts to receive ctdb_server packets.
</summary>
@@ -22308,7 +22387,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ctdb_server_packets" lineno="19488">
+<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20032">
<summary>
Send and receive ctdb_server packets.
</summary>
@@ -22319,7 +22398,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="19504">
+<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20048">
<summary>
Do not audit attempts to send and receive ctdb_server packets.
</summary>
@@ -22330,7 +22409,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ctdb_server_packets" lineno="19519">
+<interface name="corenet_relabelto_ctdb_server_packets" lineno="20063">
<summary>
Relabel packets to ctdb_server the packet type.
</summary>
@@ -22340,7 +22419,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cvs_port" lineno="19541">
+<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20085">
<summary>
Send and receive TCP traffic on the cvs port.
</summary>
@@ -22351,7 +22430,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cvs_port" lineno="19556">
+<interface name="corenet_udp_send_cvs_port" lineno="20100">
<summary>
Send UDP traffic on the cvs port.
</summary>
@@ -22362,7 +22441,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="19571">
+<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20115">
<summary>
Do not audit attempts to send UDP traffic on the cvs port.
</summary>
@@ -22373,7 +22452,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cvs_port" lineno="19586">
+<interface name="corenet_udp_receive_cvs_port" lineno="20130">
<summary>
Receive UDP traffic on the cvs port.
</summary>
@@ -22384,7 +22463,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="19601">
+<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20145">
<summary>
Do not audit attempts to receive UDP traffic on the cvs port.
</summary>
@@ -22395,7 +22474,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cvs_port" lineno="19616">
+<interface name="corenet_udp_sendrecv_cvs_port" lineno="20160">
<summary>
Send and receive UDP traffic on the cvs port.
</summary>
@@ -22406,7 +22485,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="19632">
+<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20176">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cvs port.
@@ -22418,7 +22497,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cvs_port" lineno="19647">
+<interface name="corenet_tcp_bind_cvs_port" lineno="20191">
<summary>
Bind TCP sockets to the cvs port.
</summary>
@@ -22429,7 +22508,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cvs_port" lineno="19667">
+<interface name="corenet_udp_bind_cvs_port" lineno="20211">
<summary>
Bind UDP sockets to the cvs port.
</summary>
@@ -22440,7 +22519,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cvs_port" lineno="19686">
+<interface name="corenet_tcp_connect_cvs_port" lineno="20230">
<summary>
Make a TCP connection to the cvs port.
</summary>
@@ -22450,7 +22529,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cvs_client_packets" lineno="19706">
+<interface name="corenet_send_cvs_client_packets" lineno="20250">
<summary>
Send cvs_client packets.
</summary>
@@ -22461,7 +22540,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="19725">
+<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20269">
<summary>
Do not audit attempts to send cvs_client packets.
</summary>
@@ -22472,7 +22551,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cvs_client_packets" lineno="19744">
+<interface name="corenet_receive_cvs_client_packets" lineno="20288">
<summary>
Receive cvs_client packets.
</summary>
@@ -22483,7 +22562,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="19763">
+<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20307">
<summary>
Do not audit attempts to receive cvs_client packets.
</summary>
@@ -22494,7 +22573,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cvs_client_packets" lineno="19782">
+<interface name="corenet_sendrecv_cvs_client_packets" lineno="20326">
<summary>
Send and receive cvs_client packets.
</summary>
@@ -22505,7 +22584,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="19798">
+<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20342">
<summary>
Do not audit attempts to send and receive cvs_client packets.
</summary>
@@ -22516,7 +22595,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cvs_client_packets" lineno="19813">
+<interface name="corenet_relabelto_cvs_client_packets" lineno="20357">
<summary>
Relabel packets to cvs_client the packet type.
</summary>
@@ -22526,7 +22605,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cvs_server_packets" lineno="19833">
+<interface name="corenet_send_cvs_server_packets" lineno="20377">
<summary>
Send cvs_server packets.
</summary>
@@ -22537,7 +22616,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="19852">
+<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20396">
<summary>
Do not audit attempts to send cvs_server packets.
</summary>
@@ -22548,7 +22627,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cvs_server_packets" lineno="19871">
+<interface name="corenet_receive_cvs_server_packets" lineno="20415">
<summary>
Receive cvs_server packets.
</summary>
@@ -22559,7 +22638,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="19890">
+<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20434">
<summary>
Do not audit attempts to receive cvs_server packets.
</summary>
@@ -22570,7 +22649,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cvs_server_packets" lineno="19909">
+<interface name="corenet_sendrecv_cvs_server_packets" lineno="20453">
<summary>
Send and receive cvs_server packets.
</summary>
@@ -22581,7 +22660,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="19925">
+<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20469">
<summary>
Do not audit attempts to send and receive cvs_server packets.
</summary>
@@ -22592,7 +22671,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cvs_server_packets" lineno="19940">
+<interface name="corenet_relabelto_cvs_server_packets" lineno="20484">
<summary>
Relabel packets to cvs_server the packet type.
</summary>
@@ -22602,7 +22681,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="19962">
+<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20506">
<summary>
Send and receive TCP traffic on the cyphesis port.
</summary>
@@ -22613,7 +22692,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cyphesis_port" lineno="19977">
+<interface name="corenet_udp_send_cyphesis_port" lineno="20521">
<summary>
Send UDP traffic on the cyphesis port.
</summary>
@@ -22624,7 +22703,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="19992">
+<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20536">
<summary>
Do not audit attempts to send UDP traffic on the cyphesis port.
</summary>
@@ -22635,7 +22714,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cyphesis_port" lineno="20007">
+<interface name="corenet_udp_receive_cyphesis_port" lineno="20551">
<summary>
Receive UDP traffic on the cyphesis port.
</summary>
@@ -22646,7 +22725,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20022">
+<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20566">
<summary>
Do not audit attempts to receive UDP traffic on the cyphesis port.
</summary>
@@ -22657,7 +22736,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20037">
+<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20581">
<summary>
Send and receive UDP traffic on the cyphesis port.
</summary>
@@ -22668,7 +22747,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20053">
+<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20597">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cyphesis port.
@@ -22680,7 +22759,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cyphesis_port" lineno="20068">
+<interface name="corenet_tcp_bind_cyphesis_port" lineno="20612">
<summary>
Bind TCP sockets to the cyphesis port.
</summary>
@@ -22691,7 +22770,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cyphesis_port" lineno="20088">
+<interface name="corenet_udp_bind_cyphesis_port" lineno="20632">
<summary>
Bind UDP sockets to the cyphesis port.
</summary>
@@ -22702,7 +22781,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cyphesis_port" lineno="20107">
+<interface name="corenet_tcp_connect_cyphesis_port" lineno="20651">
<summary>
Make a TCP connection to the cyphesis port.
</summary>
@@ -22712,7 +22791,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cyphesis_client_packets" lineno="20127">
+<interface name="corenet_send_cyphesis_client_packets" lineno="20671">
<summary>
Send cyphesis_client packets.
</summary>
@@ -22723,7 +22802,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20146">
+<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20690">
<summary>
Do not audit attempts to send cyphesis_client packets.
</summary>
@@ -22734,7 +22813,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cyphesis_client_packets" lineno="20165">
+<interface name="corenet_receive_cyphesis_client_packets" lineno="20709">
<summary>
Receive cyphesis_client packets.
</summary>
@@ -22745,7 +22824,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20184">
+<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20728">
<summary>
Do not audit attempts to receive cyphesis_client packets.
</summary>
@@ -22756,7 +22835,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20203">
+<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20747">
<summary>
Send and receive cyphesis_client packets.
</summary>
@@ -22767,7 +22846,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20219">
+<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20763">
<summary>
Do not audit attempts to send and receive cyphesis_client packets.
</summary>
@@ -22778,7 +22857,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20234">
+<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20778">
<summary>
Relabel packets to cyphesis_client the packet type.
</summary>
@@ -22788,7 +22867,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cyphesis_server_packets" lineno="20254">
+<interface name="corenet_send_cyphesis_server_packets" lineno="20798">
<summary>
Send cyphesis_server packets.
</summary>
@@ -22799,7 +22878,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20273">
+<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20817">
<summary>
Do not audit attempts to send cyphesis_server packets.
</summary>
@@ -22810,7 +22889,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cyphesis_server_packets" lineno="20292">
+<interface name="corenet_receive_cyphesis_server_packets" lineno="20836">
<summary>
Receive cyphesis_server packets.
</summary>
@@ -22821,7 +22900,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20311">
+<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20855">
<summary>
Do not audit attempts to receive cyphesis_server packets.
</summary>
@@ -22832,7 +22911,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20330">
+<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20874">
<summary>
Send and receive cyphesis_server packets.
</summary>
@@ -22843,7 +22922,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20346">
+<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20890">
<summary>
Do not audit attempts to send and receive cyphesis_server packets.
</summary>
@@ -22854,7 +22933,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20361">
+<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20905">
<summary>
Relabel packets to cyphesis_server the packet type.
</summary>
@@ -22864,7 +22943,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_daap_port" lineno="20383">
+<interface name="corenet_tcp_sendrecv_daap_port" lineno="20927">
<summary>
Send and receive TCP traffic on the daap port.
</summary>
@@ -22875,7 +22954,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_daap_port" lineno="20398">
+<interface name="corenet_udp_send_daap_port" lineno="20942">
<summary>
Send UDP traffic on the daap port.
</summary>
@@ -22886,7 +22965,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20413">
+<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20957">
<summary>
Do not audit attempts to send UDP traffic on the daap port.
</summary>
@@ -22897,7 +22976,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_daap_port" lineno="20428">
+<interface name="corenet_udp_receive_daap_port" lineno="20972">
<summary>
Receive UDP traffic on the daap port.
</summary>
@@ -22908,7 +22987,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="20443">
+<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="20987">
<summary>
Do not audit attempts to receive UDP traffic on the daap port.
</summary>
@@ -22919,7 +22998,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_daap_port" lineno="20458">
+<interface name="corenet_udp_sendrecv_daap_port" lineno="21002">
<summary>
Send and receive UDP traffic on the daap port.
</summary>
@@ -22930,7 +23009,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="20474">
+<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21018">
<summary>
Do not audit attempts to send and receive
UDP traffic on the daap port.
@@ -22942,7 +23021,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_daap_port" lineno="20489">
+<interface name="corenet_tcp_bind_daap_port" lineno="21033">
<summary>
Bind TCP sockets to the daap port.
</summary>
@@ -22953,7 +23032,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_daap_port" lineno="20509">
+<interface name="corenet_udp_bind_daap_port" lineno="21053">
<summary>
Bind UDP sockets to the daap port.
</summary>
@@ -22964,7 +23043,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_daap_port" lineno="20528">
+<interface name="corenet_tcp_connect_daap_port" lineno="21072">
<summary>
Make a TCP connection to the daap port.
</summary>
@@ -22974,7 +23053,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_daap_client_packets" lineno="20548">
+<interface name="corenet_send_daap_client_packets" lineno="21092">
<summary>
Send daap_client packets.
</summary>
@@ -22985,7 +23064,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_daap_client_packets" lineno="20567">
+<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21111">
<summary>
Do not audit attempts to send daap_client packets.
</summary>
@@ -22996,7 +23075,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_daap_client_packets" lineno="20586">
+<interface name="corenet_receive_daap_client_packets" lineno="21130">
<summary>
Receive daap_client packets.
</summary>
@@ -23007,7 +23086,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="20605">
+<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21149">
<summary>
Do not audit attempts to receive daap_client packets.
</summary>
@@ -23018,7 +23097,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_daap_client_packets" lineno="20624">
+<interface name="corenet_sendrecv_daap_client_packets" lineno="21168">
<summary>
Send and receive daap_client packets.
</summary>
@@ -23029,7 +23108,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="20640">
+<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21184">
<summary>
Do not audit attempts to send and receive daap_client packets.
</summary>
@@ -23040,7 +23119,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_daap_client_packets" lineno="20655">
+<interface name="corenet_relabelto_daap_client_packets" lineno="21199">
<summary>
Relabel packets to daap_client the packet type.
</summary>
@@ -23050,7 +23129,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_daap_server_packets" lineno="20675">
+<interface name="corenet_send_daap_server_packets" lineno="21219">
<summary>
Send daap_server packets.
</summary>
@@ -23061,7 +23140,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_daap_server_packets" lineno="20694">
+<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21238">
<summary>
Do not audit attempts to send daap_server packets.
</summary>
@@ -23072,7 +23151,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_daap_server_packets" lineno="20713">
+<interface name="corenet_receive_daap_server_packets" lineno="21257">
<summary>
Receive daap_server packets.
</summary>
@@ -23083,7 +23162,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="20732">
+<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21276">
<summary>
Do not audit attempts to receive daap_server packets.
</summary>
@@ -23094,7 +23173,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_daap_server_packets" lineno="20751">
+<interface name="corenet_sendrecv_daap_server_packets" lineno="21295">
<summary>
Send and receive daap_server packets.
</summary>
@@ -23105,7 +23184,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="20767">
+<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21311">
<summary>
Do not audit attempts to send and receive daap_server packets.
</summary>
@@ -23116,7 +23195,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_daap_server_packets" lineno="20782">
+<interface name="corenet_relabelto_daap_server_packets" lineno="21326">
<summary>
Relabel packets to daap_server the packet type.
</summary>
@@ -23126,7 +23205,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="20804">
+<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21348">
<summary>
Send and receive TCP traffic on the dbskkd port.
</summary>
@@ -23137,7 +23216,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dbskkd_port" lineno="20819">
+<interface name="corenet_udp_send_dbskkd_port" lineno="21363">
<summary>
Send UDP traffic on the dbskkd port.
</summary>
@@ -23148,7 +23227,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="20834">
+<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21378">
<summary>
Do not audit attempts to send UDP traffic on the dbskkd port.
</summary>
@@ -23159,7 +23238,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dbskkd_port" lineno="20849">
+<interface name="corenet_udp_receive_dbskkd_port" lineno="21393">
<summary>
Receive UDP traffic on the dbskkd port.
</summary>
@@ -23170,7 +23249,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="20864">
+<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21408">
<summary>
Do not audit attempts to receive UDP traffic on the dbskkd port.
</summary>
@@ -23181,7 +23260,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="20879">
+<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21423">
<summary>
Send and receive UDP traffic on the dbskkd port.
</summary>
@@ -23192,7 +23271,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="20895">
+<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21439">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dbskkd port.
@@ -23204,7 +23283,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dbskkd_port" lineno="20910">
+<interface name="corenet_tcp_bind_dbskkd_port" lineno="21454">
<summary>
Bind TCP sockets to the dbskkd port.
</summary>
@@ -23215,7 +23294,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dbskkd_port" lineno="20930">
+<interface name="corenet_udp_bind_dbskkd_port" lineno="21474">
<summary>
Bind UDP sockets to the dbskkd port.
</summary>
@@ -23226,7 +23305,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dbskkd_port" lineno="20949">
+<interface name="corenet_tcp_connect_dbskkd_port" lineno="21493">
<summary>
Make a TCP connection to the dbskkd port.
</summary>
@@ -23236,7 +23315,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dbskkd_client_packets" lineno="20969">
+<interface name="corenet_send_dbskkd_client_packets" lineno="21513">
<summary>
Send dbskkd_client packets.
</summary>
@@ -23247,7 +23326,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="20988">
+<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21532">
<summary>
Do not audit attempts to send dbskkd_client packets.
</summary>
@@ -23258,7 +23337,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dbskkd_client_packets" lineno="21007">
+<interface name="corenet_receive_dbskkd_client_packets" lineno="21551">
<summary>
Receive dbskkd_client packets.
</summary>
@@ -23269,7 +23348,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21026">
+<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21570">
<summary>
Do not audit attempts to receive dbskkd_client packets.
</summary>
@@ -23280,7 +23359,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21045">
+<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21589">
<summary>
Send and receive dbskkd_client packets.
</summary>
@@ -23291,7 +23370,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21061">
+<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21605">
<summary>
Do not audit attempts to send and receive dbskkd_client packets.
</summary>
@@ -23302,7 +23381,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21076">
+<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21620">
<summary>
Relabel packets to dbskkd_client the packet type.
</summary>
@@ -23312,7 +23391,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dbskkd_server_packets" lineno="21096">
+<interface name="corenet_send_dbskkd_server_packets" lineno="21640">
<summary>
Send dbskkd_server packets.
</summary>
@@ -23323,7 +23402,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21115">
+<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21659">
<summary>
Do not audit attempts to send dbskkd_server packets.
</summary>
@@ -23334,7 +23413,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dbskkd_server_packets" lineno="21134">
+<interface name="corenet_receive_dbskkd_server_packets" lineno="21678">
<summary>
Receive dbskkd_server packets.
</summary>
@@ -23345,7 +23424,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21153">
+<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21697">
<summary>
Do not audit attempts to receive dbskkd_server packets.
</summary>
@@ -23356,7 +23435,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21172">
+<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21716">
<summary>
Send and receive dbskkd_server packets.
</summary>
@@ -23367,7 +23446,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21188">
+<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21732">
<summary>
Do not audit attempts to send and receive dbskkd_server packets.
</summary>
@@ -23378,7 +23457,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21203">
+<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21747">
<summary>
Relabel packets to dbskkd_server the packet type.
</summary>
@@ -23388,7 +23467,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21225">
+<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21769">
<summary>
Send and receive TCP traffic on the dcc port.
</summary>
@@ -23399,7 +23478,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dcc_port" lineno="21240">
+<interface name="corenet_udp_send_dcc_port" lineno="21784">
<summary>
Send UDP traffic on the dcc port.
</summary>
@@ -23410,7 +23489,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21255">
+<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21799">
<summary>
Do not audit attempts to send UDP traffic on the dcc port.
</summary>
@@ -23421,7 +23500,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dcc_port" lineno="21270">
+<interface name="corenet_udp_receive_dcc_port" lineno="21814">
<summary>
Receive UDP traffic on the dcc port.
</summary>
@@ -23432,7 +23511,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21285">
+<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21829">
<summary>
Do not audit attempts to receive UDP traffic on the dcc port.
</summary>
@@ -23443,7 +23522,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dcc_port" lineno="21300">
+<interface name="corenet_udp_sendrecv_dcc_port" lineno="21844">
<summary>
Send and receive UDP traffic on the dcc port.
</summary>
@@ -23454,7 +23533,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21316">
+<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21860">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dcc port.
@@ -23466,7 +23545,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dcc_port" lineno="21331">
+<interface name="corenet_tcp_bind_dcc_port" lineno="21875">
<summary>
Bind TCP sockets to the dcc port.
</summary>
@@ -23477,7 +23556,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dcc_port" lineno="21351">
+<interface name="corenet_udp_bind_dcc_port" lineno="21895">
<summary>
Bind UDP sockets to the dcc port.
</summary>
@@ -23488,7 +23567,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dcc_port" lineno="21370">
+<interface name="corenet_tcp_connect_dcc_port" lineno="21914">
<summary>
Make a TCP connection to the dcc port.
</summary>
@@ -23498,7 +23577,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dcc_client_packets" lineno="21390">
+<interface name="corenet_send_dcc_client_packets" lineno="21934">
<summary>
Send dcc_client packets.
</summary>
@@ -23509,7 +23588,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21409">
+<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21953">
<summary>
Do not audit attempts to send dcc_client packets.
</summary>
@@ -23520,7 +23599,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dcc_client_packets" lineno="21428">
+<interface name="corenet_receive_dcc_client_packets" lineno="21972">
<summary>
Receive dcc_client packets.
</summary>
@@ -23531,7 +23610,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="21447">
+<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="21991">
<summary>
Do not audit attempts to receive dcc_client packets.
</summary>
@@ -23542,7 +23621,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dcc_client_packets" lineno="21466">
+<interface name="corenet_sendrecv_dcc_client_packets" lineno="22010">
<summary>
Send and receive dcc_client packets.
</summary>
@@ -23553,7 +23632,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="21482">
+<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22026">
<summary>
Do not audit attempts to send and receive dcc_client packets.
</summary>
@@ -23564,7 +23643,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dcc_client_packets" lineno="21497">
+<interface name="corenet_relabelto_dcc_client_packets" lineno="22041">
<summary>
Relabel packets to dcc_client the packet type.
</summary>
@@ -23574,7 +23653,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dcc_server_packets" lineno="21517">
+<interface name="corenet_send_dcc_server_packets" lineno="22061">
<summary>
Send dcc_server packets.
</summary>
@@ -23585,7 +23664,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="21536">
+<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22080">
<summary>
Do not audit attempts to send dcc_server packets.
</summary>
@@ -23596,7 +23675,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dcc_server_packets" lineno="21555">
+<interface name="corenet_receive_dcc_server_packets" lineno="22099">
<summary>
Receive dcc_server packets.
</summary>
@@ -23607,7 +23686,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="21574">
+<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22118">
<summary>
Do not audit attempts to receive dcc_server packets.
</summary>
@@ -23618,7 +23697,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dcc_server_packets" lineno="21593">
+<interface name="corenet_sendrecv_dcc_server_packets" lineno="22137">
<summary>
Send and receive dcc_server packets.
</summary>
@@ -23629,7 +23708,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="21609">
+<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22153">
<summary>
Do not audit attempts to send and receive dcc_server packets.
</summary>
@@ -23640,7 +23719,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dcc_server_packets" lineno="21624">
+<interface name="corenet_relabelto_dcc_server_packets" lineno="22168">
<summary>
Relabel packets to dcc_server the packet type.
</summary>
@@ -23650,7 +23729,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dccm_port" lineno="21646">
+<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22190">
<summary>
Send and receive TCP traffic on the dccm port.
</summary>
@@ -23661,7 +23740,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dccm_port" lineno="21661">
+<interface name="corenet_udp_send_dccm_port" lineno="22205">
<summary>
Send UDP traffic on the dccm port.
</summary>
@@ -23672,7 +23751,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="21676">
+<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22220">
<summary>
Do not audit attempts to send UDP traffic on the dccm port.
</summary>
@@ -23683,7 +23762,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dccm_port" lineno="21691">
+<interface name="corenet_udp_receive_dccm_port" lineno="22235">
<summary>
Receive UDP traffic on the dccm port.
</summary>
@@ -23694,7 +23773,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="21706">
+<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22250">
<summary>
Do not audit attempts to receive UDP traffic on the dccm port.
</summary>
@@ -23705,7 +23784,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dccm_port" lineno="21721">
+<interface name="corenet_udp_sendrecv_dccm_port" lineno="22265">
<summary>
Send and receive UDP traffic on the dccm port.
</summary>
@@ -23716,7 +23795,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="21737">
+<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22281">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dccm port.
@@ -23728,7 +23807,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dccm_port" lineno="21752">
+<interface name="corenet_tcp_bind_dccm_port" lineno="22296">
<summary>
Bind TCP sockets to the dccm port.
</summary>
@@ -23739,7 +23818,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dccm_port" lineno="21772">
+<interface name="corenet_udp_bind_dccm_port" lineno="22316">
<summary>
Bind UDP sockets to the dccm port.
</summary>
@@ -23750,7 +23829,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dccm_port" lineno="21791">
+<interface name="corenet_tcp_connect_dccm_port" lineno="22335">
<summary>
Make a TCP connection to the dccm port.
</summary>
@@ -23760,7 +23839,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dccm_client_packets" lineno="21811">
+<interface name="corenet_send_dccm_client_packets" lineno="22355">
<summary>
Send dccm_client packets.
</summary>
@@ -23771,7 +23850,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="21830">
+<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22374">
<summary>
Do not audit attempts to send dccm_client packets.
</summary>
@@ -23782,7 +23861,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dccm_client_packets" lineno="21849">
+<interface name="corenet_receive_dccm_client_packets" lineno="22393">
<summary>
Receive dccm_client packets.
</summary>
@@ -23793,7 +23872,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="21868">
+<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22412">
<summary>
Do not audit attempts to receive dccm_client packets.
</summary>
@@ -23804,7 +23883,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dccm_client_packets" lineno="21887">
+<interface name="corenet_sendrecv_dccm_client_packets" lineno="22431">
<summary>
Send and receive dccm_client packets.
</summary>
@@ -23815,7 +23894,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="21903">
+<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22447">
<summary>
Do not audit attempts to send and receive dccm_client packets.
</summary>
@@ -23826,7 +23905,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dccm_client_packets" lineno="21918">
+<interface name="corenet_relabelto_dccm_client_packets" lineno="22462">
<summary>
Relabel packets to dccm_client the packet type.
</summary>
@@ -23836,7 +23915,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dccm_server_packets" lineno="21938">
+<interface name="corenet_send_dccm_server_packets" lineno="22482">
<summary>
Send dccm_server packets.
</summary>
@@ -23847,7 +23926,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="21957">
+<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22501">
<summary>
Do not audit attempts to send dccm_server packets.
</summary>
@@ -23858,7 +23937,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dccm_server_packets" lineno="21976">
+<interface name="corenet_receive_dccm_server_packets" lineno="22520">
<summary>
Receive dccm_server packets.
</summary>
@@ -23869,7 +23948,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="21995">
+<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="22539">
<summary>
Do not audit attempts to receive dccm_server packets.
</summary>
@@ -23880,7 +23959,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dccm_server_packets" lineno="22014">
+<interface name="corenet_sendrecv_dccm_server_packets" lineno="22558">
<summary>
Send and receive dccm_server packets.
</summary>
@@ -23891,7 +23970,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22030">
+<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22574">
<summary>
Do not audit attempts to send and receive dccm_server packets.
</summary>
@@ -23902,7 +23981,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dccm_server_packets" lineno="22045">
+<interface name="corenet_relabelto_dccm_server_packets" lineno="22589">
<summary>
Relabel packets to dccm_server the packet type.
</summary>
@@ -23912,7 +23991,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22067">
+<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22611">
<summary>
Send and receive TCP traffic on the dhcpc port.
</summary>
@@ -23923,7 +24002,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dhcpc_port" lineno="22082">
+<interface name="corenet_udp_send_dhcpc_port" lineno="22626">
<summary>
Send UDP traffic on the dhcpc port.
</summary>
@@ -23934,7 +24013,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22097">
+<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22641">
<summary>
Do not audit attempts to send UDP traffic on the dhcpc port.
</summary>
@@ -23945,7 +24024,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dhcpc_port" lineno="22112">
+<interface name="corenet_udp_receive_dhcpc_port" lineno="22656">
<summary>
Receive UDP traffic on the dhcpc port.
</summary>
@@ -23956,7 +24035,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22127">
+<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22671">
<summary>
Do not audit attempts to receive UDP traffic on the dhcpc port.
</summary>
@@ -23967,7 +24046,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22142">
+<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22686">
<summary>
Send and receive UDP traffic on the dhcpc port.
</summary>
@@ -23978,7 +24057,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22158">
+<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22702">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dhcpc port.
@@ -23990,7 +24069,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dhcpc_port" lineno="22173">
+<interface name="corenet_tcp_bind_dhcpc_port" lineno="22717">
<summary>
Bind TCP sockets to the dhcpc port.
</summary>
@@ -24001,7 +24080,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dhcpc_port" lineno="22193">
+<interface name="corenet_udp_bind_dhcpc_port" lineno="22737">
<summary>
Bind UDP sockets to the dhcpc port.
</summary>
@@ -24012,7 +24091,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dhcpc_port" lineno="22212">
+<interface name="corenet_tcp_connect_dhcpc_port" lineno="22756">
<summary>
Make a TCP connection to the dhcpc port.
</summary>
@@ -24022,7 +24101,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpc_client_packets" lineno="22232">
+<interface name="corenet_send_dhcpc_client_packets" lineno="22776">
<summary>
Send dhcpc_client packets.
</summary>
@@ -24033,7 +24112,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22251">
+<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22795">
<summary>
Do not audit attempts to send dhcpc_client packets.
</summary>
@@ -24044,7 +24123,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpc_client_packets" lineno="22270">
+<interface name="corenet_receive_dhcpc_client_packets" lineno="22814">
<summary>
Receive dhcpc_client packets.
</summary>
@@ -24055,7 +24134,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22289">
+<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22833">
<summary>
Do not audit attempts to receive dhcpc_client packets.
</summary>
@@ -24066,7 +24145,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22308">
+<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22852">
<summary>
Send and receive dhcpc_client packets.
</summary>
@@ -24077,7 +24156,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22324">
+<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22868">
<summary>
Do not audit attempts to send and receive dhcpc_client packets.
</summary>
@@ -24088,7 +24167,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22339">
+<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22883">
<summary>
Relabel packets to dhcpc_client the packet type.
</summary>
@@ -24098,7 +24177,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpc_server_packets" lineno="22359">
+<interface name="corenet_send_dhcpc_server_packets" lineno="22903">
<summary>
Send dhcpc_server packets.
</summary>
@@ -24109,7 +24188,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22378">
+<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22922">
<summary>
Do not audit attempts to send dhcpc_server packets.
</summary>
@@ -24120,7 +24199,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpc_server_packets" lineno="22397">
+<interface name="corenet_receive_dhcpc_server_packets" lineno="22941">
<summary>
Receive dhcpc_server packets.
</summary>
@@ -24131,7 +24210,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22416">
+<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22960">
<summary>
Do not audit attempts to receive dhcpc_server packets.
</summary>
@@ -24142,7 +24221,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22435">
+<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22979">
<summary>
Send and receive dhcpc_server packets.
</summary>
@@ -24153,7 +24232,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="22451">
+<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="22995">
<summary>
Do not audit attempts to send and receive dhcpc_server packets.
</summary>
@@ -24164,7 +24243,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpc_server_packets" lineno="22466">
+<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23010">
<summary>
Relabel packets to dhcpc_server the packet type.
</summary>
@@ -24174,7 +24253,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="22488">
+<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23032">
<summary>
Send and receive TCP traffic on the dhcpd port.
</summary>
@@ -24185,7 +24264,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dhcpd_port" lineno="22503">
+<interface name="corenet_udp_send_dhcpd_port" lineno="23047">
<summary>
Send UDP traffic on the dhcpd port.
</summary>
@@ -24196,7 +24275,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="22518">
+<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23062">
<summary>
Do not audit attempts to send UDP traffic on the dhcpd port.
</summary>
@@ -24207,7 +24286,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dhcpd_port" lineno="22533">
+<interface name="corenet_udp_receive_dhcpd_port" lineno="23077">
<summary>
Receive UDP traffic on the dhcpd port.
</summary>
@@ -24218,7 +24297,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="22548">
+<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23092">
<summary>
Do not audit attempts to receive UDP traffic on the dhcpd port.
</summary>
@@ -24229,7 +24308,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="22563">
+<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23107">
<summary>
Send and receive UDP traffic on the dhcpd port.
</summary>
@@ -24240,7 +24319,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="22579">
+<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23123">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dhcpd port.
@@ -24252,7 +24331,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dhcpd_port" lineno="22594">
+<interface name="corenet_tcp_bind_dhcpd_port" lineno="23138">
<summary>
Bind TCP sockets to the dhcpd port.
</summary>
@@ -24263,7 +24342,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dhcpd_port" lineno="22614">
+<interface name="corenet_udp_bind_dhcpd_port" lineno="23158">
<summary>
Bind UDP sockets to the dhcpd port.
</summary>
@@ -24274,7 +24353,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dhcpd_port" lineno="22633">
+<interface name="corenet_tcp_connect_dhcpd_port" lineno="23177">
<summary>
Make a TCP connection to the dhcpd port.
</summary>
@@ -24284,7 +24363,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpd_client_packets" lineno="22653">
+<interface name="corenet_send_dhcpd_client_packets" lineno="23197">
<summary>
Send dhcpd_client packets.
</summary>
@@ -24295,7 +24374,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="22672">
+<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23216">
<summary>
Do not audit attempts to send dhcpd_client packets.
</summary>
@@ -24306,7 +24385,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpd_client_packets" lineno="22691">
+<interface name="corenet_receive_dhcpd_client_packets" lineno="23235">
<summary>
Receive dhcpd_client packets.
</summary>
@@ -24317,7 +24396,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="22710">
+<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23254">
<summary>
Do not audit attempts to receive dhcpd_client packets.
</summary>
@@ -24328,7 +24407,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="22729">
+<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23273">
<summary>
Send and receive dhcpd_client packets.
</summary>
@@ -24339,7 +24418,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="22745">
+<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23289">
<summary>
Do not audit attempts to send and receive dhcpd_client packets.
</summary>
@@ -24350,7 +24429,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpd_client_packets" lineno="22760">
+<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23304">
<summary>
Relabel packets to dhcpd_client the packet type.
</summary>
@@ -24360,7 +24439,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpd_server_packets" lineno="22780">
+<interface name="corenet_send_dhcpd_server_packets" lineno="23324">
<summary>
Send dhcpd_server packets.
</summary>
@@ -24371,7 +24450,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="22799">
+<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23343">
<summary>
Do not audit attempts to send dhcpd_server packets.
</summary>
@@ -24382,7 +24461,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpd_server_packets" lineno="22818">
+<interface name="corenet_receive_dhcpd_server_packets" lineno="23362">
<summary>
Receive dhcpd_server packets.
</summary>
@@ -24393,7 +24472,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="22837">
+<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23381">
<summary>
Do not audit attempts to receive dhcpd_server packets.
</summary>
@@ -24404,7 +24483,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="22856">
+<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23400">
<summary>
Send and receive dhcpd_server packets.
</summary>
@@ -24415,7 +24494,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="22872">
+<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23416">
<summary>
Do not audit attempts to send and receive dhcpd_server packets.
</summary>
@@ -24426,7 +24505,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpd_server_packets" lineno="22887">
+<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23431">
<summary>
Relabel packets to dhcpd_server the packet type.
</summary>
@@ -24436,7 +24515,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dict_port" lineno="22909">
+<interface name="corenet_tcp_sendrecv_dict_port" lineno="23453">
<summary>
Send and receive TCP traffic on the dict port.
</summary>
@@ -24447,7 +24526,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dict_port" lineno="22924">
+<interface name="corenet_udp_send_dict_port" lineno="23468">
<summary>
Send UDP traffic on the dict port.
</summary>
@@ -24458,7 +24537,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dict_port" lineno="22939">
+<interface name="corenet_dontaudit_udp_send_dict_port" lineno="23483">
<summary>
Do not audit attempts to send UDP traffic on the dict port.
</summary>
@@ -24469,7 +24548,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dict_port" lineno="22954">
+<interface name="corenet_udp_receive_dict_port" lineno="23498">
<summary>
Receive UDP traffic on the dict port.
</summary>
@@ -24480,7 +24559,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="22969">
+<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="23513">
<summary>
Do not audit attempts to receive UDP traffic on the dict port.
</summary>
@@ -24491,7 +24570,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dict_port" lineno="22984">
+<interface name="corenet_udp_sendrecv_dict_port" lineno="23528">
<summary>
Send and receive UDP traffic on the dict port.
</summary>
@@ -24502,7 +24581,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23000">
+<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23544">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dict port.
@@ -24514,7 +24593,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dict_port" lineno="23015">
+<interface name="corenet_tcp_bind_dict_port" lineno="23559">
<summary>
Bind TCP sockets to the dict port.
</summary>
@@ -24525,7 +24604,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dict_port" lineno="23035">
+<interface name="corenet_udp_bind_dict_port" lineno="23579">
<summary>
Bind UDP sockets to the dict port.
</summary>
@@ -24536,7 +24615,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dict_port" lineno="23054">
+<interface name="corenet_tcp_connect_dict_port" lineno="23598">
<summary>
Make a TCP connection to the dict port.
</summary>
@@ -24546,7 +24625,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dict_client_packets" lineno="23074">
+<interface name="corenet_send_dict_client_packets" lineno="23618">
<summary>
Send dict_client packets.
</summary>
@@ -24557,7 +24636,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23093">
+<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23637">
<summary>
Do not audit attempts to send dict_client packets.
</summary>
@@ -24568,7 +24647,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dict_client_packets" lineno="23112">
+<interface name="corenet_receive_dict_client_packets" lineno="23656">
<summary>
Receive dict_client packets.
</summary>
@@ -24579,7 +24658,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23131">
+<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23675">
<summary>
Do not audit attempts to receive dict_client packets.
</summary>
@@ -24590,7 +24669,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dict_client_packets" lineno="23150">
+<interface name="corenet_sendrecv_dict_client_packets" lineno="23694">
<summary>
Send and receive dict_client packets.
</summary>
@@ -24601,7 +24680,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23166">
+<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23710">
<summary>
Do not audit attempts to send and receive dict_client packets.
</summary>
@@ -24612,7 +24691,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dict_client_packets" lineno="23181">
+<interface name="corenet_relabelto_dict_client_packets" lineno="23725">
<summary>
Relabel packets to dict_client the packet type.
</summary>
@@ -24622,7 +24701,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dict_server_packets" lineno="23201">
+<interface name="corenet_send_dict_server_packets" lineno="23745">
<summary>
Send dict_server packets.
</summary>
@@ -24633,7 +24712,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23220">
+<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23764">
<summary>
Do not audit attempts to send dict_server packets.
</summary>
@@ -24644,7 +24723,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dict_server_packets" lineno="23239">
+<interface name="corenet_receive_dict_server_packets" lineno="23783">
<summary>
Receive dict_server packets.
</summary>
@@ -24655,7 +24734,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23258">
+<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23802">
<summary>
Do not audit attempts to receive dict_server packets.
</summary>
@@ -24666,7 +24745,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dict_server_packets" lineno="23277">
+<interface name="corenet_sendrecv_dict_server_packets" lineno="23821">
<summary>
Send and receive dict_server packets.
</summary>
@@ -24677,7 +24756,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23293">
+<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23837">
<summary>
Do not audit attempts to send and receive dict_server packets.
</summary>
@@ -24688,7 +24767,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dict_server_packets" lineno="23308">
+<interface name="corenet_relabelto_dict_server_packets" lineno="23852">
<summary>
Relabel packets to dict_server the packet type.
</summary>
@@ -24698,7 +24777,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23330">
+<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23874">
<summary>
Send and receive TCP traffic on the distccd port.
</summary>
@@ -24709,7 +24788,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_distccd_port" lineno="23345">
+<interface name="corenet_udp_send_distccd_port" lineno="23889">
<summary>
Send UDP traffic on the distccd port.
</summary>
@@ -24720,7 +24799,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23360">
+<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23904">
<summary>
Do not audit attempts to send UDP traffic on the distccd port.
</summary>
@@ -24731,7 +24810,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_distccd_port" lineno="23375">
+<interface name="corenet_udp_receive_distccd_port" lineno="23919">
<summary>
Receive UDP traffic on the distccd port.
</summary>
@@ -24742,7 +24821,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23390">
+<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23934">
<summary>
Do not audit attempts to receive UDP traffic on the distccd port.
</summary>
@@ -24753,7 +24832,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_distccd_port" lineno="23405">
+<interface name="corenet_udp_sendrecv_distccd_port" lineno="23949">
<summary>
Send and receive UDP traffic on the distccd port.
</summary>
@@ -24764,7 +24843,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23421">
+<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23965">
<summary>
Do not audit attempts to send and receive
UDP traffic on the distccd port.
@@ -24776,7 +24855,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_distccd_port" lineno="23436">
+<interface name="corenet_tcp_bind_distccd_port" lineno="23980">
<summary>
Bind TCP sockets to the distccd port.
</summary>
@@ -24787,7 +24866,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_distccd_port" lineno="23456">
+<interface name="corenet_udp_bind_distccd_port" lineno="24000">
<summary>
Bind UDP sockets to the distccd port.
</summary>
@@ -24798,7 +24877,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_distccd_port" lineno="23475">
+<interface name="corenet_tcp_connect_distccd_port" lineno="24019">
<summary>
Make a TCP connection to the distccd port.
</summary>
@@ -24808,7 +24887,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_distccd_client_packets" lineno="23495">
+<interface name="corenet_send_distccd_client_packets" lineno="24039">
<summary>
Send distccd_client packets.
</summary>
@@ -24819,7 +24898,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="23514">
+<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24058">
<summary>
Do not audit attempts to send distccd_client packets.
</summary>
@@ -24830,7 +24909,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_distccd_client_packets" lineno="23533">
+<interface name="corenet_receive_distccd_client_packets" lineno="24077">
<summary>
Receive distccd_client packets.
</summary>
@@ -24841,7 +24920,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="23552">
+<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24096">
<summary>
Do not audit attempts to receive distccd_client packets.
</summary>
@@ -24852,7 +24931,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_distccd_client_packets" lineno="23571">
+<interface name="corenet_sendrecv_distccd_client_packets" lineno="24115">
<summary>
Send and receive distccd_client packets.
</summary>
@@ -24863,7 +24942,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="23587">
+<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24131">
<summary>
Do not audit attempts to send and receive distccd_client packets.
</summary>
@@ -24874,7 +24953,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_distccd_client_packets" lineno="23602">
+<interface name="corenet_relabelto_distccd_client_packets" lineno="24146">
<summary>
Relabel packets to distccd_client the packet type.
</summary>
@@ -24884,7 +24963,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_distccd_server_packets" lineno="23622">
+<interface name="corenet_send_distccd_server_packets" lineno="24166">
<summary>
Send distccd_server packets.
</summary>
@@ -24895,7 +24974,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="23641">
+<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24185">
<summary>
Do not audit attempts to send distccd_server packets.
</summary>
@@ -24906,7 +24985,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_distccd_server_packets" lineno="23660">
+<interface name="corenet_receive_distccd_server_packets" lineno="24204">
<summary>
Receive distccd_server packets.
</summary>
@@ -24917,7 +24996,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="23679">
+<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24223">
<summary>
Do not audit attempts to receive distccd_server packets.
</summary>
@@ -24928,7 +25007,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_distccd_server_packets" lineno="23698">
+<interface name="corenet_sendrecv_distccd_server_packets" lineno="24242">
<summary>
Send and receive distccd_server packets.
</summary>
@@ -24939,7 +25018,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="23714">
+<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24258">
<summary>
Do not audit attempts to send and receive distccd_server packets.
</summary>
@@ -24950,7 +25029,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_distccd_server_packets" lineno="23729">
+<interface name="corenet_relabelto_distccd_server_packets" lineno="24273">
<summary>
Relabel packets to distccd_server the packet type.
</summary>
@@ -24960,7 +25039,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dns_port" lineno="23751">
+<interface name="corenet_tcp_sendrecv_dns_port" lineno="24295">
<summary>
Send and receive TCP traffic on the dns port.
</summary>
@@ -24971,7 +25050,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dns_port" lineno="23766">
+<interface name="corenet_udp_send_dns_port" lineno="24310">
<summary>
Send UDP traffic on the dns port.
</summary>
@@ -24982,7 +25061,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dns_port" lineno="23781">
+<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24325">
<summary>
Do not audit attempts to send UDP traffic on the dns port.
</summary>
@@ -24993,7 +25072,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dns_port" lineno="23796">
+<interface name="corenet_udp_receive_dns_port" lineno="24340">
<summary>
Receive UDP traffic on the dns port.
</summary>
@@ -25004,7 +25083,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="23811">
+<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24355">
<summary>
Do not audit attempts to receive UDP traffic on the dns port.
</summary>
@@ -25015,7 +25094,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dns_port" lineno="23826">
+<interface name="corenet_udp_sendrecv_dns_port" lineno="24370">
<summary>
Send and receive UDP traffic on the dns port.
</summary>
@@ -25026,7 +25105,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="23842">
+<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24386">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dns port.
@@ -25038,7 +25117,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dns_port" lineno="23857">
+<interface name="corenet_tcp_bind_dns_port" lineno="24401">
<summary>
Bind TCP sockets to the dns port.
</summary>
@@ -25049,7 +25128,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dns_port" lineno="23877">
+<interface name="corenet_udp_bind_dns_port" lineno="24421">
<summary>
Bind UDP sockets to the dns port.
</summary>
@@ -25060,7 +25139,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dns_port" lineno="23896">
+<interface name="corenet_tcp_connect_dns_port" lineno="24440">
<summary>
Make a TCP connection to the dns port.
</summary>
@@ -25070,7 +25149,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dns_client_packets" lineno="23916">
+<interface name="corenet_send_dns_client_packets" lineno="24460">
<summary>
Send dns_client packets.
</summary>
@@ -25081,7 +25160,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dns_client_packets" lineno="23935">
+<interface name="corenet_dontaudit_send_dns_client_packets" lineno="24479">
<summary>
Do not audit attempts to send dns_client packets.
</summary>
@@ -25092,7 +25171,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dns_client_packets" lineno="23954">
+<interface name="corenet_receive_dns_client_packets" lineno="24498">
<summary>
Receive dns_client packets.
</summary>
@@ -25103,7 +25182,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="23973">
+<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="24517">
<summary>
Do not audit attempts to receive dns_client packets.
</summary>
@@ -25114,7 +25193,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dns_client_packets" lineno="23992">
+<interface name="corenet_sendrecv_dns_client_packets" lineno="24536">
<summary>
Send and receive dns_client packets.
</summary>
@@ -25125,7 +25204,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24008">
+<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24552">
<summary>
Do not audit attempts to send and receive dns_client packets.
</summary>
@@ -25136,7 +25215,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dns_client_packets" lineno="24023">
+<interface name="corenet_relabelto_dns_client_packets" lineno="24567">
<summary>
Relabel packets to dns_client the packet type.
</summary>
@@ -25146,7 +25225,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dns_server_packets" lineno="24043">
+<interface name="corenet_send_dns_server_packets" lineno="24587">
<summary>
Send dns_server packets.
</summary>
@@ -25157,7 +25236,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24062">
+<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24606">
<summary>
Do not audit attempts to send dns_server packets.
</summary>
@@ -25168,7 +25247,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dns_server_packets" lineno="24081">
+<interface name="corenet_receive_dns_server_packets" lineno="24625">
<summary>
Receive dns_server packets.
</summary>
@@ -25179,7 +25258,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24100">
+<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24644">
<summary>
Do not audit attempts to receive dns_server packets.
</summary>
@@ -25190,7 +25269,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dns_server_packets" lineno="24119">
+<interface name="corenet_sendrecv_dns_server_packets" lineno="24663">
<summary>
Send and receive dns_server packets.
</summary>
@@ -25201,7 +25280,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24135">
+<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24679">
<summary>
Do not audit attempts to send and receive dns_server packets.
</summary>
@@ -25212,7 +25291,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dns_server_packets" lineno="24150">
+<interface name="corenet_relabelto_dns_server_packets" lineno="24694">
<summary>
Relabel packets to dns_server the packet type.
</summary>
@@ -25222,7 +25301,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24172">
+<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24716">
<summary>
Send and receive TCP traffic on the dropbox port.
</summary>
@@ -25233,7 +25312,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dropbox_port" lineno="24187">
+<interface name="corenet_udp_send_dropbox_port" lineno="24731">
<summary>
Send UDP traffic on the dropbox port.
</summary>
@@ -25244,7 +25323,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24202">
+<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24746">
<summary>
Do not audit attempts to send UDP traffic on the dropbox port.
</summary>
@@ -25255,7 +25334,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dropbox_port" lineno="24217">
+<interface name="corenet_udp_receive_dropbox_port" lineno="24761">
<summary>
Receive UDP traffic on the dropbox port.
</summary>
@@ -25266,7 +25345,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24232">
+<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24776">
<summary>
Do not audit attempts to receive UDP traffic on the dropbox port.
</summary>
@@ -25277,7 +25356,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24247">
+<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24791">
<summary>
Send and receive UDP traffic on the dropbox port.
</summary>
@@ -25288,7 +25367,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24263">
+<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24807">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dropbox port.
@@ -25300,7 +25379,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dropbox_port" lineno="24278">
+<interface name="corenet_tcp_bind_dropbox_port" lineno="24822">
<summary>
Bind TCP sockets to the dropbox port.
</summary>
@@ -25311,7 +25390,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dropbox_port" lineno="24298">
+<interface name="corenet_udp_bind_dropbox_port" lineno="24842">
<summary>
Bind UDP sockets to the dropbox port.
</summary>
@@ -25322,7 +25401,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dropbox_port" lineno="24317">
+<interface name="corenet_tcp_connect_dropbox_port" lineno="24861">
<summary>
Make a TCP connection to the dropbox port.
</summary>
@@ -25332,7 +25411,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dropbox_client_packets" lineno="24337">
+<interface name="corenet_send_dropbox_client_packets" lineno="24881">
<summary>
Send dropbox_client packets.
</summary>
@@ -25343,7 +25422,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24356">
+<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24900">
<summary>
Do not audit attempts to send dropbox_client packets.
</summary>
@@ -25354,7 +25433,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dropbox_client_packets" lineno="24375">
+<interface name="corenet_receive_dropbox_client_packets" lineno="24919">
<summary>
Receive dropbox_client packets.
</summary>
@@ -25365,7 +25444,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24394">
+<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24938">
<summary>
Do not audit attempts to receive dropbox_client packets.
</summary>
@@ -25376,7 +25455,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24413">
+<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24957">
<summary>
Send and receive dropbox_client packets.
</summary>
@@ -25387,7 +25466,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24429">
+<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24973">
<summary>
Do not audit attempts to send and receive dropbox_client packets.
</summary>
@@ -25398,7 +25477,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dropbox_client_packets" lineno="24444">
+<interface name="corenet_relabelto_dropbox_client_packets" lineno="24988">
<summary>
Relabel packets to dropbox_client the packet type.
</summary>
@@ -25408,7 +25487,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dropbox_server_packets" lineno="24464">
+<interface name="corenet_send_dropbox_server_packets" lineno="25008">
<summary>
Send dropbox_server packets.
</summary>
@@ -25419,7 +25498,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="24483">
+<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25027">
<summary>
Do not audit attempts to send dropbox_server packets.
</summary>
@@ -25430,7 +25509,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dropbox_server_packets" lineno="24502">
+<interface name="corenet_receive_dropbox_server_packets" lineno="25046">
<summary>
Receive dropbox_server packets.
</summary>
@@ -25441,7 +25520,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="24521">
+<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25065">
<summary>
Do not audit attempts to receive dropbox_server packets.
</summary>
@@ -25452,7 +25531,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dropbox_server_packets" lineno="24540">
+<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25084">
<summary>
Send and receive dropbox_server packets.
</summary>
@@ -25463,7 +25542,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="24556">
+<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25100">
<summary>
Do not audit attempts to send and receive dropbox_server packets.
</summary>
@@ -25474,7 +25553,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dropbox_server_packets" lineno="24571">
+<interface name="corenet_relabelto_dropbox_server_packets" lineno="25115">
<summary>
Relabel packets to dropbox_server the packet type.
</summary>
@@ -25484,7 +25563,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_efs_port" lineno="24593">
+<interface name="corenet_tcp_sendrecv_efs_port" lineno="25137">
<summary>
Send and receive TCP traffic on the efs port.
</summary>
@@ -25495,7 +25574,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_efs_port" lineno="24608">
+<interface name="corenet_udp_send_efs_port" lineno="25152">
<summary>
Send UDP traffic on the efs port.
</summary>
@@ -25506,7 +25585,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_efs_port" lineno="24623">
+<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25167">
<summary>
Do not audit attempts to send UDP traffic on the efs port.
</summary>
@@ -25517,7 +25596,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_efs_port" lineno="24638">
+<interface name="corenet_udp_receive_efs_port" lineno="25182">
<summary>
Receive UDP traffic on the efs port.
</summary>
@@ -25528,7 +25607,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="24653">
+<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25197">
<summary>
Do not audit attempts to receive UDP traffic on the efs port.
</summary>
@@ -25539,7 +25618,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_efs_port" lineno="24668">
+<interface name="corenet_udp_sendrecv_efs_port" lineno="25212">
<summary>
Send and receive UDP traffic on the efs port.
</summary>
@@ -25550,7 +25629,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="24684">
+<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25228">
<summary>
Do not audit attempts to send and receive
UDP traffic on the efs port.
@@ -25562,7 +25641,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_efs_port" lineno="24699">
+<interface name="corenet_tcp_bind_efs_port" lineno="25243">
<summary>
Bind TCP sockets to the efs port.
</summary>
@@ -25573,7 +25652,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_efs_port" lineno="24719">
+<interface name="corenet_udp_bind_efs_port" lineno="25263">
<summary>
Bind UDP sockets to the efs port.
</summary>
@@ -25584,7 +25663,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_efs_port" lineno="24738">
+<interface name="corenet_tcp_connect_efs_port" lineno="25282">
<summary>
Make a TCP connection to the efs port.
</summary>
@@ -25594,7 +25673,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_efs_client_packets" lineno="24758">
+<interface name="corenet_send_efs_client_packets" lineno="25302">
<summary>
Send efs_client packets.
</summary>
@@ -25605,7 +25684,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_efs_client_packets" lineno="24777">
+<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25321">
<summary>
Do not audit attempts to send efs_client packets.
</summary>
@@ -25616,7 +25695,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_efs_client_packets" lineno="24796">
+<interface name="corenet_receive_efs_client_packets" lineno="25340">
<summary>
Receive efs_client packets.
</summary>
@@ -25627,7 +25706,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="24815">
+<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25359">
<summary>
Do not audit attempts to receive efs_client packets.
</summary>
@@ -25638,7 +25717,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_efs_client_packets" lineno="24834">
+<interface name="corenet_sendrecv_efs_client_packets" lineno="25378">
<summary>
Send and receive efs_client packets.
</summary>
@@ -25649,7 +25728,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="24850">
+<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="25394">
<summary>
Do not audit attempts to send and receive efs_client packets.
</summary>
@@ -25660,7 +25739,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_efs_client_packets" lineno="24865">
+<interface name="corenet_relabelto_efs_client_packets" lineno="25409">
<summary>
Relabel packets to efs_client the packet type.
</summary>
@@ -25670,7 +25749,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_efs_server_packets" lineno="24885">
+<interface name="corenet_send_efs_server_packets" lineno="25429">
<summary>
Send efs_server packets.
</summary>
@@ -25681,7 +25760,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_efs_server_packets" lineno="24904">
+<interface name="corenet_dontaudit_send_efs_server_packets" lineno="25448">
<summary>
Do not audit attempts to send efs_server packets.
</summary>
@@ -25692,7 +25771,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_efs_server_packets" lineno="24923">
+<interface name="corenet_receive_efs_server_packets" lineno="25467">
<summary>
Receive efs_server packets.
</summary>
@@ -25703,7 +25782,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="24942">
+<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="25486">
<summary>
Do not audit attempts to receive efs_server packets.
</summary>
@@ -25714,7 +25793,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_efs_server_packets" lineno="24961">
+<interface name="corenet_sendrecv_efs_server_packets" lineno="25505">
<summary>
Send and receive efs_server packets.
</summary>
@@ -25725,7 +25804,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="24977">
+<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="25521">
<summary>
Do not audit attempts to send and receive efs_server packets.
</summary>
@@ -25736,7 +25815,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_efs_server_packets" lineno="24992">
+<interface name="corenet_relabelto_efs_server_packets" lineno="25536">
<summary>
Relabel packets to efs_server the packet type.
</summary>
@@ -25746,7 +25825,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25014">
+<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25558">
<summary>
Send and receive TCP traffic on the embrace_dp_c port.
</summary>
@@ -25757,7 +25836,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25029">
+<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25573">
<summary>
Send UDP traffic on the embrace_dp_c port.
</summary>
@@ -25768,7 +25847,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25044">
+<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25588">
<summary>
Do not audit attempts to send UDP traffic on the embrace_dp_c port.
</summary>
@@ -25779,7 +25858,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25059">
+<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25603">
<summary>
Receive UDP traffic on the embrace_dp_c port.
</summary>
@@ -25790,7 +25869,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25074">
+<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25618">
<summary>
Do not audit attempts to receive UDP traffic on the embrace_dp_c port.
</summary>
@@ -25801,7 +25880,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25089">
+<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25633">
<summary>
Send and receive UDP traffic on the embrace_dp_c port.
</summary>
@@ -25812,7 +25891,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25105">
+<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25649">
<summary>
Do not audit attempts to send and receive
UDP traffic on the embrace_dp_c port.
@@ -25824,7 +25903,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25120">
+<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25664">
<summary>
Bind TCP sockets to the embrace_dp_c port.
</summary>
@@ -25835,7 +25914,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25140">
+<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25684">
<summary>
Bind UDP sockets to the embrace_dp_c port.
</summary>
@@ -25846,7 +25925,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25159">
+<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25703">
<summary>
Make a TCP connection to the embrace_dp_c port.
</summary>
@@ -25856,7 +25935,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25179">
+<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25723">
<summary>
Send embrace_dp_c_client packets.
</summary>
@@ -25867,7 +25946,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25198">
+<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25742">
<summary>
Do not audit attempts to send embrace_dp_c_client packets.
</summary>
@@ -25878,7 +25957,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25217">
+<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25761">
<summary>
Receive embrace_dp_c_client packets.
</summary>
@@ -25889,7 +25968,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25236">
+<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25780">
<summary>
Do not audit attempts to receive embrace_dp_c_client packets.
</summary>
@@ -25900,7 +25979,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25255">
+<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25799">
<summary>
Send and receive embrace_dp_c_client packets.
</summary>
@@ -25911,7 +25990,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25271">
+<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25815">
<summary>
Do not audit attempts to send and receive embrace_dp_c_client packets.
</summary>
@@ -25922,7 +26001,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25286">
+<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25830">
<summary>
Relabel packets to embrace_dp_c_client the packet type.
</summary>
@@ -25932,7 +26011,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25306">
+<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25850">
<summary>
Send embrace_dp_c_server packets.
</summary>
@@ -25943,7 +26022,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25325">
+<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25869">
<summary>
Do not audit attempts to send embrace_dp_c_server packets.
</summary>
@@ -25954,7 +26033,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25344">
+<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25888">
<summary>
Receive embrace_dp_c_server packets.
</summary>
@@ -25965,7 +26044,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25363">
+<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25907">
<summary>
Do not audit attempts to receive embrace_dp_c_server packets.
</summary>
@@ -25976,7 +26055,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25382">
+<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25926">
<summary>
Send and receive embrace_dp_c_server packets.
</summary>
@@ -25987,7 +26066,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25398">
+<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25942">
<summary>
Do not audit attempts to send and receive embrace_dp_c_server packets.
</summary>
@@ -25998,7 +26077,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25413">
+<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25957">
<summary>
Relabel packets to embrace_dp_c_server the packet type.
</summary>
@@ -26008,7 +26087,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25435">
+<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25979">
<summary>
Send and receive TCP traffic on the epmap port.
</summary>
@@ -26019,7 +26098,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_epmap_port" lineno="25450">
+<interface name="corenet_udp_send_epmap_port" lineno="25994">
<summary>
Send UDP traffic on the epmap port.
</summary>
@@ -26030,7 +26109,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="25465">
+<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26009">
<summary>
Do not audit attempts to send UDP traffic on the epmap port.
</summary>
@@ -26041,7 +26120,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_epmap_port" lineno="25480">
+<interface name="corenet_udp_receive_epmap_port" lineno="26024">
<summary>
Receive UDP traffic on the epmap port.
</summary>
@@ -26052,7 +26131,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="25495">
+<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26039">
<summary>
Do not audit attempts to receive UDP traffic on the epmap port.
</summary>
@@ -26063,7 +26142,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_epmap_port" lineno="25510">
+<interface name="corenet_udp_sendrecv_epmap_port" lineno="26054">
<summary>
Send and receive UDP traffic on the epmap port.
</summary>
@@ -26074,7 +26153,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="25526">
+<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26070">
<summary>
Do not audit attempts to send and receive
UDP traffic on the epmap port.
@@ -26086,7 +26165,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_epmap_port" lineno="25541">
+<interface name="corenet_tcp_bind_epmap_port" lineno="26085">
<summary>
Bind TCP sockets to the epmap port.
</summary>
@@ -26097,7 +26176,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_epmap_port" lineno="25561">
+<interface name="corenet_udp_bind_epmap_port" lineno="26105">
<summary>
Bind UDP sockets to the epmap port.
</summary>
@@ -26108,7 +26187,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_epmap_port" lineno="25580">
+<interface name="corenet_tcp_connect_epmap_port" lineno="26124">
<summary>
Make a TCP connection to the epmap port.
</summary>
@@ -26118,7 +26197,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmap_client_packets" lineno="25600">
+<interface name="corenet_send_epmap_client_packets" lineno="26144">
<summary>
Send epmap_client packets.
</summary>
@@ -26129,7 +26208,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="25619">
+<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26163">
<summary>
Do not audit attempts to send epmap_client packets.
</summary>
@@ -26140,7 +26219,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmap_client_packets" lineno="25638">
+<interface name="corenet_receive_epmap_client_packets" lineno="26182">
<summary>
Receive epmap_client packets.
</summary>
@@ -26151,7 +26230,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="25657">
+<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26201">
<summary>
Do not audit attempts to receive epmap_client packets.
</summary>
@@ -26162,7 +26241,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmap_client_packets" lineno="25676">
+<interface name="corenet_sendrecv_epmap_client_packets" lineno="26220">
<summary>
Send and receive epmap_client packets.
</summary>
@@ -26173,7 +26252,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="25692">
+<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26236">
<summary>
Do not audit attempts to send and receive epmap_client packets.
</summary>
@@ -26184,7 +26263,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmap_client_packets" lineno="25707">
+<interface name="corenet_relabelto_epmap_client_packets" lineno="26251">
<summary>
Relabel packets to epmap_client the packet type.
</summary>
@@ -26194,7 +26273,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmap_server_packets" lineno="25727">
+<interface name="corenet_send_epmap_server_packets" lineno="26271">
<summary>
Send epmap_server packets.
</summary>
@@ -26205,7 +26284,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="25746">
+<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26290">
<summary>
Do not audit attempts to send epmap_server packets.
</summary>
@@ -26216,7 +26295,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmap_server_packets" lineno="25765">
+<interface name="corenet_receive_epmap_server_packets" lineno="26309">
<summary>
Receive epmap_server packets.
</summary>
@@ -26227,7 +26306,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="25784">
+<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="26328">
<summary>
Do not audit attempts to receive epmap_server packets.
</summary>
@@ -26238,7 +26317,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmap_server_packets" lineno="25803">
+<interface name="corenet_sendrecv_epmap_server_packets" lineno="26347">
<summary>
Send and receive epmap_server packets.
</summary>
@@ -26249,7 +26328,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="25819">
+<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="26363">
<summary>
Do not audit attempts to send and receive epmap_server packets.
</summary>
@@ -26260,7 +26339,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmap_server_packets" lineno="25834">
+<interface name="corenet_relabelto_epmap_server_packets" lineno="26378">
<summary>
Relabel packets to epmap_server the packet type.
</summary>
@@ -26270,7 +26349,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_epmd_port" lineno="25856">
+<interface name="corenet_tcp_sendrecv_epmd_port" lineno="26400">
<summary>
Send and receive TCP traffic on the epmd port.
</summary>
@@ -26281,7 +26360,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_epmd_port" lineno="25871">
+<interface name="corenet_udp_send_epmd_port" lineno="26415">
<summary>
Send UDP traffic on the epmd port.
</summary>
@@ -26292,7 +26371,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="25886">
+<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="26430">
<summary>
Do not audit attempts to send UDP traffic on the epmd port.
</summary>
@@ -26303,7 +26382,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_epmd_port" lineno="25901">
+<interface name="corenet_udp_receive_epmd_port" lineno="26445">
<summary>
Receive UDP traffic on the epmd port.
</summary>
@@ -26314,7 +26393,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="25916">
+<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="26460">
<summary>
Do not audit attempts to receive UDP traffic on the epmd port.
</summary>
@@ -26325,7 +26404,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_epmd_port" lineno="25931">
+<interface name="corenet_udp_sendrecv_epmd_port" lineno="26475">
<summary>
Send and receive UDP traffic on the epmd port.
</summary>
@@ -26336,7 +26415,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="25947">
+<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="26491">
<summary>
Do not audit attempts to send and receive
UDP traffic on the epmd port.
@@ -26348,7 +26427,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_epmd_port" lineno="25962">
+<interface name="corenet_tcp_bind_epmd_port" lineno="26506">
<summary>
Bind TCP sockets to the epmd port.
</summary>
@@ -26359,7 +26438,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_epmd_port" lineno="25982">
+<interface name="corenet_udp_bind_epmd_port" lineno="26526">
<summary>
Bind UDP sockets to the epmd port.
</summary>
@@ -26370,7 +26449,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_epmd_port" lineno="26001">
+<interface name="corenet_tcp_connect_epmd_port" lineno="26545">
<summary>
Make a TCP connection to the epmd port.
</summary>
@@ -26380,7 +26459,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmd_client_packets" lineno="26021">
+<interface name="corenet_send_epmd_client_packets" lineno="26565">
<summary>
Send epmd_client packets.
</summary>
@@ -26391,7 +26470,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26040">
+<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26584">
<summary>
Do not audit attempts to send epmd_client packets.
</summary>
@@ -26402,7 +26481,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmd_client_packets" lineno="26059">
+<interface name="corenet_receive_epmd_client_packets" lineno="26603">
<summary>
Receive epmd_client packets.
</summary>
@@ -26413,7 +26492,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26078">
+<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26622">
<summary>
Do not audit attempts to receive epmd_client packets.
</summary>
@@ -26424,7 +26503,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmd_client_packets" lineno="26097">
+<interface name="corenet_sendrecv_epmd_client_packets" lineno="26641">
<summary>
Send and receive epmd_client packets.
</summary>
@@ -26435,7 +26514,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26113">
+<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26657">
<summary>
Do not audit attempts to send and receive epmd_client packets.
</summary>
@@ -26446,7 +26525,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmd_client_packets" lineno="26128">
+<interface name="corenet_relabelto_epmd_client_packets" lineno="26672">
<summary>
Relabel packets to epmd_client the packet type.
</summary>
@@ -26456,7 +26535,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmd_server_packets" lineno="26148">
+<interface name="corenet_send_epmd_server_packets" lineno="26692">
<summary>
Send epmd_server packets.
</summary>
@@ -26467,7 +26546,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26167">
+<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26711">
<summary>
Do not audit attempts to send epmd_server packets.
</summary>
@@ -26478,7 +26557,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmd_server_packets" lineno="26186">
+<interface name="corenet_receive_epmd_server_packets" lineno="26730">
<summary>
Receive epmd_server packets.
</summary>
@@ -26489,7 +26568,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26205">
+<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26749">
<summary>
Do not audit attempts to receive epmd_server packets.
</summary>
@@ -26500,7 +26579,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmd_server_packets" lineno="26224">
+<interface name="corenet_sendrecv_epmd_server_packets" lineno="26768">
<summary>
Send and receive epmd_server packets.
</summary>
@@ -26511,7 +26590,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26240">
+<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26784">
<summary>
Do not audit attempts to send and receive epmd_server packets.
</summary>
@@ -26522,7 +26601,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmd_server_packets" lineno="26255">
+<interface name="corenet_relabelto_epmd_server_packets" lineno="26799">
<summary>
Relabel packets to epmd_server the packet type.
</summary>
@@ -26532,7 +26611,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26277">
+<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26821">
<summary>
Send and receive TCP traffic on the fingerd port.
</summary>
@@ -26543,7 +26622,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_fingerd_port" lineno="26292">
+<interface name="corenet_udp_send_fingerd_port" lineno="26836">
<summary>
Send UDP traffic on the fingerd port.
</summary>
@@ -26554,7 +26633,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26307">
+<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26851">
<summary>
Do not audit attempts to send UDP traffic on the fingerd port.
</summary>
@@ -26565,7 +26644,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_fingerd_port" lineno="26322">
+<interface name="corenet_udp_receive_fingerd_port" lineno="26866">
<summary>
Receive UDP traffic on the fingerd port.
</summary>
@@ -26576,7 +26655,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26337">
+<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26881">
<summary>
Do not audit attempts to receive UDP traffic on the fingerd port.
</summary>
@@ -26587,7 +26666,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26352">
+<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26896">
<summary>
Send and receive UDP traffic on the fingerd port.
</summary>
@@ -26598,7 +26677,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26368">
+<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26912">
<summary>
Do not audit attempts to send and receive
UDP traffic on the fingerd port.
@@ -26610,7 +26689,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_fingerd_port" lineno="26383">
+<interface name="corenet_tcp_bind_fingerd_port" lineno="26927">
<summary>
Bind TCP sockets to the fingerd port.
</summary>
@@ -26621,7 +26700,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_fingerd_port" lineno="26403">
+<interface name="corenet_udp_bind_fingerd_port" lineno="26947">
<summary>
Bind UDP sockets to the fingerd port.
</summary>
@@ -26632,7 +26711,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_fingerd_port" lineno="26422">
+<interface name="corenet_tcp_connect_fingerd_port" lineno="26966">
<summary>
Make a TCP connection to the fingerd port.
</summary>
@@ -26642,7 +26721,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_fingerd_client_packets" lineno="26442">
+<interface name="corenet_send_fingerd_client_packets" lineno="26986">
<summary>
Send fingerd_client packets.
</summary>
@@ -26653,7 +26732,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="26461">
+<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27005">
<summary>
Do not audit attempts to send fingerd_client packets.
</summary>
@@ -26664,7 +26743,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_fingerd_client_packets" lineno="26480">
+<interface name="corenet_receive_fingerd_client_packets" lineno="27024">
<summary>
Receive fingerd_client packets.
</summary>
@@ -26675,7 +26754,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="26499">
+<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27043">
<summary>
Do not audit attempts to receive fingerd_client packets.
</summary>
@@ -26686,7 +26765,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_fingerd_client_packets" lineno="26518">
+<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27062">
<summary>
Send and receive fingerd_client packets.
</summary>
@@ -26697,7 +26776,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="26534">
+<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27078">
<summary>
Do not audit attempts to send and receive fingerd_client packets.
</summary>
@@ -26708,7 +26787,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_fingerd_client_packets" lineno="26549">
+<interface name="corenet_relabelto_fingerd_client_packets" lineno="27093">
<summary>
Relabel packets to fingerd_client the packet type.
</summary>
@@ -26718,7 +26797,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_fingerd_server_packets" lineno="26569">
+<interface name="corenet_send_fingerd_server_packets" lineno="27113">
<summary>
Send fingerd_server packets.
</summary>
@@ -26729,7 +26808,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="26588">
+<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27132">
<summary>
Do not audit attempts to send fingerd_server packets.
</summary>
@@ -26740,7 +26819,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_fingerd_server_packets" lineno="26607">
+<interface name="corenet_receive_fingerd_server_packets" lineno="27151">
<summary>
Receive fingerd_server packets.
</summary>
@@ -26751,7 +26830,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="26626">
+<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27170">
<summary>
Do not audit attempts to receive fingerd_server packets.
</summary>
@@ -26762,7 +26841,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_fingerd_server_packets" lineno="26645">
+<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27189">
<summary>
Send and receive fingerd_server packets.
</summary>
@@ -26773,7 +26852,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="26661">
+<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27205">
<summary>
Do not audit attempts to send and receive fingerd_server packets.
</summary>
@@ -26784,7 +26863,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_fingerd_server_packets" lineno="26676">
+<interface name="corenet_relabelto_fingerd_server_packets" lineno="27220">
<summary>
Relabel packets to fingerd_server the packet type.
</summary>
@@ -26794,7 +26873,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ftp_port" lineno="26698">
+<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27242">
<summary>
Send and receive TCP traffic on the ftp port.
</summary>
@@ -26805,7 +26884,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ftp_port" lineno="26713">
+<interface name="corenet_udp_send_ftp_port" lineno="27257">
<summary>
Send UDP traffic on the ftp port.
</summary>
@@ -26816,7 +26895,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="26728">
+<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="27272">
<summary>
Do not audit attempts to send UDP traffic on the ftp port.
</summary>
@@ -26827,7 +26906,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ftp_port" lineno="26743">
+<interface name="corenet_udp_receive_ftp_port" lineno="27287">
<summary>
Receive UDP traffic on the ftp port.
</summary>
@@ -26838,7 +26917,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="26758">
+<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="27302">
<summary>
Do not audit attempts to receive UDP traffic on the ftp port.
</summary>
@@ -26849,7 +26928,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ftp_port" lineno="26773">
+<interface name="corenet_udp_sendrecv_ftp_port" lineno="27317">
<summary>
Send and receive UDP traffic on the ftp port.
</summary>
@@ -26860,7 +26939,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="26789">
+<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="27333">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ftp port.
@@ -26872,7 +26951,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ftp_port" lineno="26804">
+<interface name="corenet_tcp_bind_ftp_port" lineno="27348">
<summary>
Bind TCP sockets to the ftp port.
</summary>
@@ -26883,7 +26962,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ftp_port" lineno="26824">
+<interface name="corenet_udp_bind_ftp_port" lineno="27368">
<summary>
Bind UDP sockets to the ftp port.
</summary>
@@ -26894,7 +26973,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ftp_port" lineno="26843">
+<interface name="corenet_tcp_connect_ftp_port" lineno="27387">
<summary>
Make a TCP connection to the ftp port.
</summary>
@@ -26904,7 +26983,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_client_packets" lineno="26863">
+<interface name="corenet_send_ftp_client_packets" lineno="27407">
<summary>
Send ftp_client packets.
</summary>
@@ -26915,7 +26994,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="26882">
+<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="27426">
<summary>
Do not audit attempts to send ftp_client packets.
</summary>
@@ -26926,7 +27005,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_client_packets" lineno="26901">
+<interface name="corenet_receive_ftp_client_packets" lineno="27445">
<summary>
Receive ftp_client packets.
</summary>
@@ -26937,7 +27016,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="26920">
+<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="27464">
<summary>
Do not audit attempts to receive ftp_client packets.
</summary>
@@ -26948,7 +27027,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_client_packets" lineno="26939">
+<interface name="corenet_sendrecv_ftp_client_packets" lineno="27483">
<summary>
Send and receive ftp_client packets.
</summary>
@@ -26959,7 +27038,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="26955">
+<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="27499">
<summary>
Do not audit attempts to send and receive ftp_client packets.
</summary>
@@ -26970,7 +27049,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_client_packets" lineno="26970">
+<interface name="corenet_relabelto_ftp_client_packets" lineno="27514">
<summary>
Relabel packets to ftp_client the packet type.
</summary>
@@ -26980,7 +27059,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_server_packets" lineno="26990">
+<interface name="corenet_send_ftp_server_packets" lineno="27534">
<summary>
Send ftp_server packets.
</summary>
@@ -26991,7 +27070,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27009">
+<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27553">
<summary>
Do not audit attempts to send ftp_server packets.
</summary>
@@ -27002,7 +27081,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_server_packets" lineno="27028">
+<interface name="corenet_receive_ftp_server_packets" lineno="27572">
<summary>
Receive ftp_server packets.
</summary>
@@ -27013,7 +27092,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27047">
+<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27591">
<summary>
Do not audit attempts to receive ftp_server packets.
</summary>
@@ -27024,7 +27103,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_server_packets" lineno="27066">
+<interface name="corenet_sendrecv_ftp_server_packets" lineno="27610">
<summary>
Send and receive ftp_server packets.
</summary>
@@ -27035,7 +27114,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27082">
+<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27626">
<summary>
Do not audit attempts to send and receive ftp_server packets.
</summary>
@@ -27046,7 +27125,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_server_packets" lineno="27097">
+<interface name="corenet_relabelto_ftp_server_packets" lineno="27641">
<summary>
Relabel packets to ftp_server the packet type.
</summary>
@@ -27056,7 +27135,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27119">
+<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27663">
<summary>
Send and receive TCP traffic on the ftp_data port.
</summary>
@@ -27067,7 +27146,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ftp_data_port" lineno="27134">
+<interface name="corenet_udp_send_ftp_data_port" lineno="27678">
<summary>
Send UDP traffic on the ftp_data port.
</summary>
@@ -27078,7 +27157,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27149">
+<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27693">
<summary>
Do not audit attempts to send UDP traffic on the ftp_data port.
</summary>
@@ -27089,7 +27168,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ftp_data_port" lineno="27164">
+<interface name="corenet_udp_receive_ftp_data_port" lineno="27708">
<summary>
Receive UDP traffic on the ftp_data port.
</summary>
@@ -27100,7 +27179,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27179">
+<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27723">
<summary>
Do not audit attempts to receive UDP traffic on the ftp_data port.
</summary>
@@ -27111,7 +27190,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27194">
+<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27738">
<summary>
Send and receive UDP traffic on the ftp_data port.
</summary>
@@ -27122,7 +27201,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27210">
+<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27754">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ftp_data port.
@@ -27134,7 +27213,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ftp_data_port" lineno="27225">
+<interface name="corenet_tcp_bind_ftp_data_port" lineno="27769">
<summary>
Bind TCP sockets to the ftp_data port.
</summary>
@@ -27145,7 +27224,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ftp_data_port" lineno="27245">
+<interface name="corenet_udp_bind_ftp_data_port" lineno="27789">
<summary>
Bind UDP sockets to the ftp_data port.
</summary>
@@ -27156,7 +27235,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ftp_data_port" lineno="27264">
+<interface name="corenet_tcp_connect_ftp_data_port" lineno="27808">
<summary>
Make a TCP connection to the ftp_data port.
</summary>
@@ -27166,7 +27245,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_data_client_packets" lineno="27284">
+<interface name="corenet_send_ftp_data_client_packets" lineno="27828">
<summary>
Send ftp_data_client packets.
</summary>
@@ -27177,7 +27256,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27303">
+<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27847">
<summary>
Do not audit attempts to send ftp_data_client packets.
</summary>
@@ -27188,7 +27267,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_data_client_packets" lineno="27322">
+<interface name="corenet_receive_ftp_data_client_packets" lineno="27866">
<summary>
Receive ftp_data_client packets.
</summary>
@@ -27199,7 +27278,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27341">
+<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27885">
<summary>
Do not audit attempts to receive ftp_data_client packets.
</summary>
@@ -27210,7 +27289,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27360">
+<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27904">
<summary>
Send and receive ftp_data_client packets.
</summary>
@@ -27221,7 +27300,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27376">
+<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27920">
<summary>
Do not audit attempts to send and receive ftp_data_client packets.
</summary>
@@ -27232,7 +27311,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27391">
+<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27935">
<summary>
Relabel packets to ftp_data_client the packet type.
</summary>
@@ -27242,7 +27321,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_data_server_packets" lineno="27411">
+<interface name="corenet_send_ftp_data_server_packets" lineno="27955">
<summary>
Send ftp_data_server packets.
</summary>
@@ -27253,7 +27332,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27430">
+<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27974">
<summary>
Do not audit attempts to send ftp_data_server packets.
</summary>
@@ -27264,7 +27343,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_data_server_packets" lineno="27449">
+<interface name="corenet_receive_ftp_data_server_packets" lineno="27993">
<summary>
Receive ftp_data_server packets.
</summary>
@@ -27275,7 +27354,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="27468">
+<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28012">
<summary>
Do not audit attempts to receive ftp_data_server packets.
</summary>
@@ -27286,7 +27365,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="27487">
+<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28031">
<summary>
Send and receive ftp_data_server packets.
</summary>
@@ -27297,7 +27376,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="27503">
+<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28047">
<summary>
Do not audit attempts to send and receive ftp_data_server packets.
</summary>
@@ -27308,7 +27387,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_data_server_packets" lineno="27518">
+<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28062">
<summary>
Relabel packets to ftp_data_server the packet type.
</summary>
@@ -27318,7 +27397,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="27540">
+<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28084">
<summary>
Send and receive TCP traffic on the gatekeeper port.
</summary>
@@ -27329,7 +27408,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gatekeeper_port" lineno="27555">
+<interface name="corenet_udp_send_gatekeeper_port" lineno="28099">
<summary>
Send UDP traffic on the gatekeeper port.
</summary>
@@ -27340,7 +27419,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="27570">
+<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28114">
<summary>
Do not audit attempts to send UDP traffic on the gatekeeper port.
</summary>
@@ -27351,7 +27430,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gatekeeper_port" lineno="27585">
+<interface name="corenet_udp_receive_gatekeeper_port" lineno="28129">
<summary>
Receive UDP traffic on the gatekeeper port.
</summary>
@@ -27362,7 +27441,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="27600">
+<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28144">
<summary>
Do not audit attempts to receive UDP traffic on the gatekeeper port.
</summary>
@@ -27373,7 +27452,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="27615">
+<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28159">
<summary>
Send and receive UDP traffic on the gatekeeper port.
</summary>
@@ -27384,7 +27463,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="27631">
+<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28175">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gatekeeper port.
@@ -27396,7 +27475,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gatekeeper_port" lineno="27646">
+<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28190">
<summary>
Bind TCP sockets to the gatekeeper port.
</summary>
@@ -27407,7 +27486,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gatekeeper_port" lineno="27666">
+<interface name="corenet_udp_bind_gatekeeper_port" lineno="28210">
<summary>
Bind UDP sockets to the gatekeeper port.
</summary>
@@ -27418,7 +27497,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gatekeeper_port" lineno="27685">
+<interface name="corenet_tcp_connect_gatekeeper_port" lineno="28229">
<summary>
Make a TCP connection to the gatekeeper port.
</summary>
@@ -27428,7 +27507,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gatekeeper_client_packets" lineno="27705">
+<interface name="corenet_send_gatekeeper_client_packets" lineno="28249">
<summary>
Send gatekeeper_client packets.
</summary>
@@ -27439,7 +27518,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="27724">
+<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="28268">
<summary>
Do not audit attempts to send gatekeeper_client packets.
</summary>
@@ -27450,7 +27529,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gatekeeper_client_packets" lineno="27743">
+<interface name="corenet_receive_gatekeeper_client_packets" lineno="28287">
<summary>
Receive gatekeeper_client packets.
</summary>
@@ -27461,7 +27540,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="27762">
+<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="28306">
<summary>
Do not audit attempts to receive gatekeeper_client packets.
</summary>
@@ -27472,7 +27551,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="27781">
+<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="28325">
<summary>
Send and receive gatekeeper_client packets.
</summary>
@@ -27483,7 +27562,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="27797">
+<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="28341">
<summary>
Do not audit attempts to send and receive gatekeeper_client packets.
</summary>
@@ -27494,7 +27573,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="27812">
+<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="28356">
<summary>
Relabel packets to gatekeeper_client the packet type.
</summary>
@@ -27504,7 +27583,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gatekeeper_server_packets" lineno="27832">
+<interface name="corenet_send_gatekeeper_server_packets" lineno="28376">
<summary>
Send gatekeeper_server packets.
</summary>
@@ -27515,7 +27594,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="27851">
+<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="28395">
<summary>
Do not audit attempts to send gatekeeper_server packets.
</summary>
@@ -27526,7 +27605,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gatekeeper_server_packets" lineno="27870">
+<interface name="corenet_receive_gatekeeper_server_packets" lineno="28414">
<summary>
Receive gatekeeper_server packets.
</summary>
@@ -27537,7 +27616,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="27889">
+<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="28433">
<summary>
Do not audit attempts to receive gatekeeper_server packets.
</summary>
@@ -27548,7 +27627,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="27908">
+<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="28452">
<summary>
Send and receive gatekeeper_server packets.
</summary>
@@ -27559,7 +27638,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="27924">
+<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="28468">
<summary>
Do not audit attempts to send and receive gatekeeper_server packets.
</summary>
@@ -27570,7 +27649,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="27939">
+<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="28483">
<summary>
Relabel packets to gatekeeper_server the packet type.
</summary>
@@ -27580,7 +27659,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="27961">
+<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="28505">
<summary>
Send and receive TCP traffic on the gdomap port.
</summary>
@@ -27591,7 +27670,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gdomap_port" lineno="27976">
+<interface name="corenet_udp_send_gdomap_port" lineno="28520">
<summary>
Send UDP traffic on the gdomap port.
</summary>
@@ -27602,7 +27681,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="27991">
+<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="28535">
<summary>
Do not audit attempts to send UDP traffic on the gdomap port.
</summary>
@@ -27613,7 +27692,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gdomap_port" lineno="28006">
+<interface name="corenet_udp_receive_gdomap_port" lineno="28550">
<summary>
Receive UDP traffic on the gdomap port.
</summary>
@@ -27624,7 +27703,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28021">
+<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28565">
<summary>
Do not audit attempts to receive UDP traffic on the gdomap port.
</summary>
@@ -27635,7 +27714,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28036">
+<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28580">
<summary>
Send and receive UDP traffic on the gdomap port.
</summary>
@@ -27646,7 +27725,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28052">
+<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28596">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gdomap port.
@@ -27658,7 +27737,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gdomap_port" lineno="28067">
+<interface name="corenet_tcp_bind_gdomap_port" lineno="28611">
<summary>
Bind TCP sockets to the gdomap port.
</summary>
@@ -27669,7 +27748,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gdomap_port" lineno="28087">
+<interface name="corenet_udp_bind_gdomap_port" lineno="28631">
<summary>
Bind UDP sockets to the gdomap port.
</summary>
@@ -27680,7 +27759,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gdomap_port" lineno="28106">
+<interface name="corenet_tcp_connect_gdomap_port" lineno="28650">
<summary>
Make a TCP connection to the gdomap port.
</summary>
@@ -27690,7 +27769,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gdomap_client_packets" lineno="28126">
+<interface name="corenet_send_gdomap_client_packets" lineno="28670">
<summary>
Send gdomap_client packets.
</summary>
@@ -27701,7 +27780,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28145">
+<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28689">
<summary>
Do not audit attempts to send gdomap_client packets.
</summary>
@@ -27712,7 +27791,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gdomap_client_packets" lineno="28164">
+<interface name="corenet_receive_gdomap_client_packets" lineno="28708">
<summary>
Receive gdomap_client packets.
</summary>
@@ -27723,7 +27802,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28183">
+<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28727">
<summary>
Do not audit attempts to receive gdomap_client packets.
</summary>
@@ -27734,7 +27813,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28202">
+<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28746">
<summary>
Send and receive gdomap_client packets.
</summary>
@@ -27745,7 +27824,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28218">
+<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28762">
<summary>
Do not audit attempts to send and receive gdomap_client packets.
</summary>
@@ -27756,7 +27835,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gdomap_client_packets" lineno="28233">
+<interface name="corenet_relabelto_gdomap_client_packets" lineno="28777">
<summary>
Relabel packets to gdomap_client the packet type.
</summary>
@@ -27766,7 +27845,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gdomap_server_packets" lineno="28253">
+<interface name="corenet_send_gdomap_server_packets" lineno="28797">
<summary>
Send gdomap_server packets.
</summary>
@@ -27777,7 +27856,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28272">
+<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28816">
<summary>
Do not audit attempts to send gdomap_server packets.
</summary>
@@ -27788,7 +27867,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gdomap_server_packets" lineno="28291">
+<interface name="corenet_receive_gdomap_server_packets" lineno="28835">
<summary>
Receive gdomap_server packets.
</summary>
@@ -27799,7 +27878,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28310">
+<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28854">
<summary>
Do not audit attempts to receive gdomap_server packets.
</summary>
@@ -27810,7 +27889,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28329">
+<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28873">
<summary>
Send and receive gdomap_server packets.
</summary>
@@ -27821,7 +27900,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28345">
+<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28889">
<summary>
Do not audit attempts to send and receive gdomap_server packets.
</summary>
@@ -27832,7 +27911,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gdomap_server_packets" lineno="28360">
+<interface name="corenet_relabelto_gdomap_server_packets" lineno="28904">
<summary>
Relabel packets to gdomap_server the packet type.
</summary>
@@ -27842,7 +27921,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28382">
+<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28926">
<summary>
Send and receive TCP traffic on the gds_db port.
</summary>
@@ -27853,7 +27932,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gds_db_port" lineno="28397">
+<interface name="corenet_udp_send_gds_db_port" lineno="28941">
<summary>
Send UDP traffic on the gds_db port.
</summary>
@@ -27864,7 +27943,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28412">
+<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28956">
<summary>
Do not audit attempts to send UDP traffic on the gds_db port.
</summary>
@@ -27875,7 +27954,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gds_db_port" lineno="28427">
+<interface name="corenet_udp_receive_gds_db_port" lineno="28971">
<summary>
Receive UDP traffic on the gds_db port.
</summary>
@@ -27886,7 +27965,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="28442">
+<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="28986">
<summary>
Do not audit attempts to receive UDP traffic on the gds_db port.
</summary>
@@ -27897,7 +27976,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gds_db_port" lineno="28457">
+<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29001">
<summary>
Send and receive UDP traffic on the gds_db port.
</summary>
@@ -27908,7 +27987,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="28473">
+<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29017">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gds_db port.
@@ -27920,7 +27999,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gds_db_port" lineno="28488">
+<interface name="corenet_tcp_bind_gds_db_port" lineno="29032">
<summary>
Bind TCP sockets to the gds_db port.
</summary>
@@ -27931,7 +28010,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gds_db_port" lineno="28508">
+<interface name="corenet_udp_bind_gds_db_port" lineno="29052">
<summary>
Bind UDP sockets to the gds_db port.
</summary>
@@ -27942,7 +28021,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gds_db_port" lineno="28527">
+<interface name="corenet_tcp_connect_gds_db_port" lineno="29071">
<summary>
Make a TCP connection to the gds_db port.
</summary>
@@ -27952,7 +28031,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gds_db_client_packets" lineno="28547">
+<interface name="corenet_send_gds_db_client_packets" lineno="29091">
<summary>
Send gds_db_client packets.
</summary>
@@ -27963,7 +28042,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="28566">
+<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29110">
<summary>
Do not audit attempts to send gds_db_client packets.
</summary>
@@ -27974,7 +28053,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gds_db_client_packets" lineno="28585">
+<interface name="corenet_receive_gds_db_client_packets" lineno="29129">
<summary>
Receive gds_db_client packets.
</summary>
@@ -27985,7 +28064,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="28604">
+<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29148">
<summary>
Do not audit attempts to receive gds_db_client packets.
</summary>
@@ -27996,7 +28075,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gds_db_client_packets" lineno="28623">
+<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29167">
<summary>
Send and receive gds_db_client packets.
</summary>
@@ -28007,7 +28086,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="28639">
+<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="29183">
<summary>
Do not audit attempts to send and receive gds_db_client packets.
</summary>
@@ -28018,7 +28097,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gds_db_client_packets" lineno="28654">
+<interface name="corenet_relabelto_gds_db_client_packets" lineno="29198">
<summary>
Relabel packets to gds_db_client the packet type.
</summary>
@@ -28028,7 +28107,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gds_db_server_packets" lineno="28674">
+<interface name="corenet_send_gds_db_server_packets" lineno="29218">
<summary>
Send gds_db_server packets.
</summary>
@@ -28039,7 +28118,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="28693">
+<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="29237">
<summary>
Do not audit attempts to send gds_db_server packets.
</summary>
@@ -28050,7 +28129,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gds_db_server_packets" lineno="28712">
+<interface name="corenet_receive_gds_db_server_packets" lineno="29256">
<summary>
Receive gds_db_server packets.
</summary>
@@ -28061,7 +28140,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="28731">
+<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="29275">
<summary>
Do not audit attempts to receive gds_db_server packets.
</summary>
@@ -28072,7 +28151,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gds_db_server_packets" lineno="28750">
+<interface name="corenet_sendrecv_gds_db_server_packets" lineno="29294">
<summary>
Send and receive gds_db_server packets.
</summary>
@@ -28083,7 +28162,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="28766">
+<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="29310">
<summary>
Do not audit attempts to send and receive gds_db_server packets.
</summary>
@@ -28094,7 +28173,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gds_db_server_packets" lineno="28781">
+<interface name="corenet_relabelto_gds_db_server_packets" lineno="29325">
<summary>
Relabel packets to gds_db_server the packet type.
</summary>
@@ -28104,269 +28183,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_giftd_port" lineno="28803">
-<summary>
-Send and receive TCP traffic on the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_udp_send_giftd_port" lineno="28818">
-<summary>
-Send UDP traffic on the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_send_giftd_port" lineno="28833">
-<summary>
-Do not audit attempts to send UDP traffic on the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_receive_giftd_port" lineno="28848">
-<summary>
-Receive UDP traffic on the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_receive_giftd_port" lineno="28863">
-<summary>
-Do not audit attempts to receive UDP traffic on the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_sendrecv_giftd_port" lineno="28878">
-<summary>
-Send and receive UDP traffic on the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_giftd_port" lineno="28894">
-<summary>
-Do not audit attempts to send and receive
-UDP traffic on the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_bind_giftd_port" lineno="28909">
-<summary>
-Bind TCP sockets to the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_udp_bind_giftd_port" lineno="28929">
-<summary>
-Bind UDP sockets to the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_tcp_connect_giftd_port" lineno="28948">
-<summary>
-Make a TCP connection to the giftd port.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="corenet_send_giftd_client_packets" lineno="28968">
-<summary>
-Send giftd_client packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_send_giftd_client_packets" lineno="28987">
-<summary>
-Do not audit attempts to send giftd_client packets.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_receive_giftd_client_packets" lineno="29006">
-<summary>
-Receive giftd_client packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_receive_giftd_client_packets" lineno="29025">
-<summary>
-Do not audit attempts to receive giftd_client packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_sendrecv_giftd_client_packets" lineno="29044">
-<summary>
-Send and receive giftd_client packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_sendrecv_giftd_client_packets" lineno="29060">
-<summary>
-Do not audit attempts to send and receive giftd_client packets.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_relabelto_giftd_client_packets" lineno="29075">
-<summary>
-Relabel packets to giftd_client the packet type.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="corenet_send_giftd_server_packets" lineno="29095">
-<summary>
-Send giftd_server packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="write" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_send_giftd_server_packets" lineno="29114">
-<summary>
-Do not audit attempts to send giftd_server packets.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_receive_giftd_server_packets" lineno="29133">
-<summary>
-Receive giftd_server packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="read" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_receive_giftd_server_packets" lineno="29152">
-<summary>
-Do not audit attempts to receive giftd_server packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_sendrecv_giftd_server_packets" lineno="29171">
-<summary>
-Send and receive giftd_server packets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<infoflow type="both" weight="10"/>
-</interface>
-<interface name="corenet_dontaudit_sendrecv_giftd_server_packets" lineno="29187">
-<summary>
-Do not audit attempts to send and receive giftd_server packets.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-<infoflow type="none"/>
-</interface>
-<interface name="corenet_relabelto_giftd_server_packets" lineno="29202">
-<summary>
-Relabel packets to giftd_server the packet type.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="corenet_tcp_sendrecv_git_port" lineno="29224">
+<interface name="corenet_tcp_sendrecv_git_port" lineno="29347">
<summary>
Send and receive TCP traffic on the git port.
</summary>
@@ -28377,7 +28194,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_git_port" lineno="29239">
+<interface name="corenet_udp_send_git_port" lineno="29362">
<summary>
Send UDP traffic on the git port.
</summary>
@@ -28388,7 +28205,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_git_port" lineno="29254">
+<interface name="corenet_dontaudit_udp_send_git_port" lineno="29377">
<summary>
Do not audit attempts to send UDP traffic on the git port.
</summary>
@@ -28399,7 +28216,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_git_port" lineno="29269">
+<interface name="corenet_udp_receive_git_port" lineno="29392">
<summary>
Receive UDP traffic on the git port.
</summary>
@@ -28410,7 +28227,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29284">
+<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29407">
<summary>
Do not audit attempts to receive UDP traffic on the git port.
</summary>
@@ -28421,7 +28238,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_git_port" lineno="29299">
+<interface name="corenet_udp_sendrecv_git_port" lineno="29422">
<summary>
Send and receive UDP traffic on the git port.
</summary>
@@ -28432,7 +28249,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29315">
+<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29438">
<summary>
Do not audit attempts to send and receive
UDP traffic on the git port.
@@ -28444,7 +28261,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_git_port" lineno="29330">
+<interface name="corenet_tcp_bind_git_port" lineno="29453">
<summary>
Bind TCP sockets to the git port.
</summary>
@@ -28455,7 +28272,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_git_port" lineno="29350">
+<interface name="corenet_udp_bind_git_port" lineno="29473">
<summary>
Bind UDP sockets to the git port.
</summary>
@@ -28466,7 +28283,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_git_port" lineno="29369">
+<interface name="corenet_tcp_connect_git_port" lineno="29492">
<summary>
Make a TCP connection to the git port.
</summary>
@@ -28476,7 +28293,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_git_client_packets" lineno="29389">
+<interface name="corenet_send_git_client_packets" lineno="29512">
<summary>
Send git_client packets.
</summary>
@@ -28487,7 +28304,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_git_client_packets" lineno="29408">
+<interface name="corenet_dontaudit_send_git_client_packets" lineno="29531">
<summary>
Do not audit attempts to send git_client packets.
</summary>
@@ -28498,7 +28315,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_git_client_packets" lineno="29427">
+<interface name="corenet_receive_git_client_packets" lineno="29550">
<summary>
Receive git_client packets.
</summary>
@@ -28509,7 +28326,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29446">
+<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29569">
<summary>
Do not audit attempts to receive git_client packets.
</summary>
@@ -28520,7 +28337,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_git_client_packets" lineno="29465">
+<interface name="corenet_sendrecv_git_client_packets" lineno="29588">
<summary>
Send and receive git_client packets.
</summary>
@@ -28531,7 +28348,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29481">
+<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29604">
<summary>
Do not audit attempts to send and receive git_client packets.
</summary>
@@ -28542,7 +28359,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_git_client_packets" lineno="29496">
+<interface name="corenet_relabelto_git_client_packets" lineno="29619">
<summary>
Relabel packets to git_client the packet type.
</summary>
@@ -28552,7 +28369,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_git_server_packets" lineno="29516">
+<interface name="corenet_send_git_server_packets" lineno="29639">
<summary>
Send git_server packets.
</summary>
@@ -28563,7 +28380,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_git_server_packets" lineno="29535">
+<interface name="corenet_dontaudit_send_git_server_packets" lineno="29658">
<summary>
Do not audit attempts to send git_server packets.
</summary>
@@ -28574,7 +28391,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_git_server_packets" lineno="29554">
+<interface name="corenet_receive_git_server_packets" lineno="29677">
<summary>
Receive git_server packets.
</summary>
@@ -28585,7 +28402,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29573">
+<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29696">
<summary>
Do not audit attempts to receive git_server packets.
</summary>
@@ -28596,7 +28413,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_git_server_packets" lineno="29592">
+<interface name="corenet_sendrecv_git_server_packets" lineno="29715">
<summary>
Send and receive git_server packets.
</summary>
@@ -28607,7 +28424,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29608">
+<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29731">
<summary>
Do not audit attempts to send and receive git_server packets.
</summary>
@@ -28618,7 +28435,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_git_server_packets" lineno="29623">
+<interface name="corenet_relabelto_git_server_packets" lineno="29746">
<summary>
Relabel packets to git_server the packet type.
</summary>
@@ -28628,7 +28445,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29645">
+<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29768">
<summary>
Send and receive TCP traffic on the glance_registry port.
</summary>
@@ -28639,7 +28456,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_glance_registry_port" lineno="29660">
+<interface name="corenet_udp_send_glance_registry_port" lineno="29783">
<summary>
Send UDP traffic on the glance_registry port.
</summary>
@@ -28650,7 +28467,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29675">
+<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29798">
<summary>
Do not audit attempts to send UDP traffic on the glance_registry port.
</summary>
@@ -28661,7 +28478,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_glance_registry_port" lineno="29690">
+<interface name="corenet_udp_receive_glance_registry_port" lineno="29813">
<summary>
Receive UDP traffic on the glance_registry port.
</summary>
@@ -28672,7 +28489,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29705">
+<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29828">
<summary>
Do not audit attempts to receive UDP traffic on the glance_registry port.
</summary>
@@ -28683,7 +28500,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29720">
+<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29843">
<summary>
Send and receive UDP traffic on the glance_registry port.
</summary>
@@ -28694,7 +28511,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29736">
+<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29859">
<summary>
Do not audit attempts to send and receive
UDP traffic on the glance_registry port.
@@ -28706,7 +28523,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_glance_registry_port" lineno="29751">
+<interface name="corenet_tcp_bind_glance_registry_port" lineno="29874">
<summary>
Bind TCP sockets to the glance_registry port.
</summary>
@@ -28717,7 +28534,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_glance_registry_port" lineno="29771">
+<interface name="corenet_udp_bind_glance_registry_port" lineno="29894">
<summary>
Bind UDP sockets to the glance_registry port.
</summary>
@@ -28728,7 +28545,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_glance_registry_port" lineno="29790">
+<interface name="corenet_tcp_connect_glance_registry_port" lineno="29913">
<summary>
Make a TCP connection to the glance_registry port.
</summary>
@@ -28738,7 +28555,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_glance_registry_client_packets" lineno="29810">
+<interface name="corenet_send_glance_registry_client_packets" lineno="29933">
<summary>
Send glance_registry_client packets.
</summary>
@@ -28749,7 +28566,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29829">
+<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29952">
<summary>
Do not audit attempts to send glance_registry_client packets.
</summary>
@@ -28760,7 +28577,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_glance_registry_client_packets" lineno="29848">
+<interface name="corenet_receive_glance_registry_client_packets" lineno="29971">
<summary>
Receive glance_registry_client packets.
</summary>
@@ -28771,7 +28588,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="29867">
+<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="29990">
<summary>
Do not audit attempts to receive glance_registry_client packets.
</summary>
@@ -28782,7 +28599,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="29886">
+<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="30009">
<summary>
Send and receive glance_registry_client packets.
</summary>
@@ -28793,7 +28610,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="29902">
+<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="30025">
<summary>
Do not audit attempts to send and receive glance_registry_client packets.
</summary>
@@ -28804,7 +28621,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_glance_registry_client_packets" lineno="29917">
+<interface name="corenet_relabelto_glance_registry_client_packets" lineno="30040">
<summary>
Relabel packets to glance_registry_client the packet type.
</summary>
@@ -28814,7 +28631,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_glance_registry_server_packets" lineno="29937">
+<interface name="corenet_send_glance_registry_server_packets" lineno="30060">
<summary>
Send glance_registry_server packets.
</summary>
@@ -28825,7 +28642,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="29956">
+<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="30079">
<summary>
Do not audit attempts to send glance_registry_server packets.
</summary>
@@ -28836,7 +28653,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_glance_registry_server_packets" lineno="29975">
+<interface name="corenet_receive_glance_registry_server_packets" lineno="30098">
<summary>
Receive glance_registry_server packets.
</summary>
@@ -28847,7 +28664,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="29994">
+<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="30117">
<summary>
Do not audit attempts to receive glance_registry_server packets.
</summary>
@@ -28858,7 +28675,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30013">
+<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30136">
<summary>
Send and receive glance_registry_server packets.
</summary>
@@ -28869,7 +28686,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30029">
+<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30152">
<summary>
Do not audit attempts to send and receive glance_registry_server packets.
</summary>
@@ -28880,7 +28697,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30044">
+<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30167">
<summary>
Relabel packets to glance_registry_server the packet type.
</summary>
@@ -28890,7 +28707,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30066">
+<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30189">
<summary>
Send and receive TCP traffic on the gopher port.
</summary>
@@ -28901,7 +28718,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gopher_port" lineno="30081">
+<interface name="corenet_udp_send_gopher_port" lineno="30204">
<summary>
Send UDP traffic on the gopher port.
</summary>
@@ -28912,7 +28729,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30096">
+<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30219">
<summary>
Do not audit attempts to send UDP traffic on the gopher port.
</summary>
@@ -28923,7 +28740,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gopher_port" lineno="30111">
+<interface name="corenet_udp_receive_gopher_port" lineno="30234">
<summary>
Receive UDP traffic on the gopher port.
</summary>
@@ -28934,7 +28751,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30126">
+<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30249">
<summary>
Do not audit attempts to receive UDP traffic on the gopher port.
</summary>
@@ -28945,7 +28762,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gopher_port" lineno="30141">
+<interface name="corenet_udp_sendrecv_gopher_port" lineno="30264">
<summary>
Send and receive UDP traffic on the gopher port.
</summary>
@@ -28956,7 +28773,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30157">
+<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30280">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gopher port.
@@ -28968,7 +28785,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gopher_port" lineno="30172">
+<interface name="corenet_tcp_bind_gopher_port" lineno="30295">
<summary>
Bind TCP sockets to the gopher port.
</summary>
@@ -28979,7 +28796,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gopher_port" lineno="30192">
+<interface name="corenet_udp_bind_gopher_port" lineno="30315">
<summary>
Bind UDP sockets to the gopher port.
</summary>
@@ -28990,7 +28807,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gopher_port" lineno="30211">
+<interface name="corenet_tcp_connect_gopher_port" lineno="30334">
<summary>
Make a TCP connection to the gopher port.
</summary>
@@ -29000,7 +28817,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gopher_client_packets" lineno="30231">
+<interface name="corenet_send_gopher_client_packets" lineno="30354">
<summary>
Send gopher_client packets.
</summary>
@@ -29011,7 +28828,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30250">
+<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30373">
<summary>
Do not audit attempts to send gopher_client packets.
</summary>
@@ -29022,7 +28839,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gopher_client_packets" lineno="30269">
+<interface name="corenet_receive_gopher_client_packets" lineno="30392">
<summary>
Receive gopher_client packets.
</summary>
@@ -29033,7 +28850,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30288">
+<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30411">
<summary>
Do not audit attempts to receive gopher_client packets.
</summary>
@@ -29044,7 +28861,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gopher_client_packets" lineno="30307">
+<interface name="corenet_sendrecv_gopher_client_packets" lineno="30430">
<summary>
Send and receive gopher_client packets.
</summary>
@@ -29055,7 +28872,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30323">
+<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30446">
<summary>
Do not audit attempts to send and receive gopher_client packets.
</summary>
@@ -29066,7 +28883,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gopher_client_packets" lineno="30338">
+<interface name="corenet_relabelto_gopher_client_packets" lineno="30461">
<summary>
Relabel packets to gopher_client the packet type.
</summary>
@@ -29076,7 +28893,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gopher_server_packets" lineno="30358">
+<interface name="corenet_send_gopher_server_packets" lineno="30481">
<summary>
Send gopher_server packets.
</summary>
@@ -29087,7 +28904,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30377">
+<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30500">
<summary>
Do not audit attempts to send gopher_server packets.
</summary>
@@ -29098,7 +28915,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gopher_server_packets" lineno="30396">
+<interface name="corenet_receive_gopher_server_packets" lineno="30519">
<summary>
Receive gopher_server packets.
</summary>
@@ -29109,7 +28926,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30415">
+<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30538">
<summary>
Do not audit attempts to receive gopher_server packets.
</summary>
@@ -29120,7 +28937,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gopher_server_packets" lineno="30434">
+<interface name="corenet_sendrecv_gopher_server_packets" lineno="30557">
<summary>
Send and receive gopher_server packets.
</summary>
@@ -29131,7 +28948,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30450">
+<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30573">
<summary>
Do not audit attempts to send and receive gopher_server packets.
</summary>
@@ -29142,7 +28959,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gopher_server_packets" lineno="30465">
+<interface name="corenet_relabelto_gopher_server_packets" lineno="30588">
<summary>
Relabel packets to gopher_server the packet type.
</summary>
@@ -29152,7 +28969,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30487">
+<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30610">
<summary>
Send and receive TCP traffic on the gpsd port.
</summary>
@@ -29163,7 +28980,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gpsd_port" lineno="30502">
+<interface name="corenet_udp_send_gpsd_port" lineno="30625">
<summary>
Send UDP traffic on the gpsd port.
</summary>
@@ -29174,7 +28991,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30517">
+<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30640">
<summary>
Do not audit attempts to send UDP traffic on the gpsd port.
</summary>
@@ -29185,7 +29002,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gpsd_port" lineno="30532">
+<interface name="corenet_udp_receive_gpsd_port" lineno="30655">
<summary>
Receive UDP traffic on the gpsd port.
</summary>
@@ -29196,7 +29013,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30547">
+<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30670">
<summary>
Do not audit attempts to receive UDP traffic on the gpsd port.
</summary>
@@ -29207,7 +29024,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30562">
+<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30685">
<summary>
Send and receive UDP traffic on the gpsd port.
</summary>
@@ -29218,7 +29035,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30578">
+<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30701">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gpsd port.
@@ -29230,7 +29047,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gpsd_port" lineno="30593">
+<interface name="corenet_tcp_bind_gpsd_port" lineno="30716">
<summary>
Bind TCP sockets to the gpsd port.
</summary>
@@ -29241,7 +29058,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gpsd_port" lineno="30613">
+<interface name="corenet_udp_bind_gpsd_port" lineno="30736">
<summary>
Bind UDP sockets to the gpsd port.
</summary>
@@ -29252,7 +29069,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gpsd_port" lineno="30632">
+<interface name="corenet_tcp_connect_gpsd_port" lineno="30755">
<summary>
Make a TCP connection to the gpsd port.
</summary>
@@ -29262,7 +29079,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gpsd_client_packets" lineno="30652">
+<interface name="corenet_send_gpsd_client_packets" lineno="30775">
<summary>
Send gpsd_client packets.
</summary>
@@ -29273,7 +29090,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30671">
+<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30794">
<summary>
Do not audit attempts to send gpsd_client packets.
</summary>
@@ -29284,7 +29101,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gpsd_client_packets" lineno="30690">
+<interface name="corenet_receive_gpsd_client_packets" lineno="30813">
<summary>
Receive gpsd_client packets.
</summary>
@@ -29295,7 +29112,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30709">
+<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30832">
<summary>
Do not audit attempts to receive gpsd_client packets.
</summary>
@@ -29306,7 +29123,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30728">
+<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30851">
<summary>
Send and receive gpsd_client packets.
</summary>
@@ -29317,7 +29134,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30744">
+<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30867">
<summary>
Do not audit attempts to send and receive gpsd_client packets.
</summary>
@@ -29328,7 +29145,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gpsd_client_packets" lineno="30759">
+<interface name="corenet_relabelto_gpsd_client_packets" lineno="30882">
<summary>
Relabel packets to gpsd_client the packet type.
</summary>
@@ -29338,7 +29155,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gpsd_server_packets" lineno="30779">
+<interface name="corenet_send_gpsd_server_packets" lineno="30902">
<summary>
Send gpsd_server packets.
</summary>
@@ -29349,7 +29166,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30798">
+<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30921">
<summary>
Do not audit attempts to send gpsd_server packets.
</summary>
@@ -29360,7 +29177,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gpsd_server_packets" lineno="30817">
+<interface name="corenet_receive_gpsd_server_packets" lineno="30940">
<summary>
Receive gpsd_server packets.
</summary>
@@ -29371,7 +29188,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30836">
+<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30959">
<summary>
Do not audit attempts to receive gpsd_server packets.
</summary>
@@ -29382,7 +29199,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30855">
+<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30978">
<summary>
Send and receive gpsd_server packets.
</summary>
@@ -29393,7 +29210,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="30871">
+<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="30994">
<summary>
Do not audit attempts to send and receive gpsd_server packets.
</summary>
@@ -29404,7 +29221,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gpsd_server_packets" lineno="30886">
+<interface name="corenet_relabelto_gpsd_server_packets" lineno="31009">
<summary>
Relabel packets to gpsd_server the packet type.
</summary>
@@ -29414,7 +29231,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="30908">
+<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="31031">
<summary>
Send and receive TCP traffic on the hadoop_datanode port.
</summary>
@@ -29425,7 +29242,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_hadoop_datanode_port" lineno="30923">
+<interface name="corenet_udp_send_hadoop_datanode_port" lineno="31046">
<summary>
Send UDP traffic on the hadoop_datanode port.
</summary>
@@ -29436,7 +29253,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="30938">
+<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="31061">
<summary>
Do not audit attempts to send UDP traffic on the hadoop_datanode port.
</summary>
@@ -29447,7 +29264,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="30953">
+<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="31076">
<summary>
Receive UDP traffic on the hadoop_datanode port.
</summary>
@@ -29458,7 +29275,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="30968">
+<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="31091">
<summary>
Do not audit attempts to receive UDP traffic on the hadoop_datanode port.
</summary>
@@ -29469,7 +29286,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="30983">
+<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="31106">
<summary>
Send and receive UDP traffic on the hadoop_datanode port.
</summary>
@@ -29480,7 +29297,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="30999">
+<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="31122">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hadoop_datanode port.
@@ -29492,7 +29309,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31014">
+<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31137">
<summary>
Bind TCP sockets to the hadoop_datanode port.
</summary>
@@ -29503,7 +29320,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31034">
+<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31157">
<summary>
Bind UDP sockets to the hadoop_datanode port.
</summary>
@@ -29514,7 +29331,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31053">
+<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31176">
<summary>
Make a TCP connection to the hadoop_datanode port.
</summary>
@@ -29524,7 +29341,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31073">
+<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31196">
<summary>
Send hadoop_datanode_client packets.
</summary>
@@ -29535,7 +29352,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31092">
+<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31215">
<summary>
Do not audit attempts to send hadoop_datanode_client packets.
</summary>
@@ -29546,7 +29363,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31111">
+<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31234">
<summary>
Receive hadoop_datanode_client packets.
</summary>
@@ -29557,7 +29374,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31130">
+<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31253">
<summary>
Do not audit attempts to receive hadoop_datanode_client packets.
</summary>
@@ -29568,7 +29385,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31149">
+<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31272">
<summary>
Send and receive hadoop_datanode_client packets.
</summary>
@@ -29579,7 +29396,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31165">
+<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31288">
<summary>
Do not audit attempts to send and receive hadoop_datanode_client packets.
</summary>
@@ -29590,7 +29407,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31180">
+<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31303">
<summary>
Relabel packets to hadoop_datanode_client the packet type.
</summary>
@@ -29600,7 +29417,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31200">
+<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31323">
<summary>
Send hadoop_datanode_server packets.
</summary>
@@ -29611,7 +29428,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31219">
+<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31342">
<summary>
Do not audit attempts to send hadoop_datanode_server packets.
</summary>
@@ -29622,7 +29439,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31238">
+<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31361">
<summary>
Receive hadoop_datanode_server packets.
</summary>
@@ -29633,7 +29450,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31257">
+<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31380">
<summary>
Do not audit attempts to receive hadoop_datanode_server packets.
</summary>
@@ -29644,7 +29461,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31276">
+<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31399">
<summary>
Send and receive hadoop_datanode_server packets.
</summary>
@@ -29655,7 +29472,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31292">
+<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31415">
<summary>
Do not audit attempts to send and receive hadoop_datanode_server packets.
</summary>
@@ -29666,7 +29483,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31307">
+<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31430">
<summary>
Relabel packets to hadoop_datanode_server the packet type.
</summary>
@@ -29676,7 +29493,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31329">
+<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31452">
<summary>
Send and receive TCP traffic on the hadoop_namenode port.
</summary>
@@ -29687,7 +29504,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31344">
+<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31467">
<summary>
Send UDP traffic on the hadoop_namenode port.
</summary>
@@ -29698,7 +29515,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31359">
+<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31482">
<summary>
Do not audit attempts to send UDP traffic on the hadoop_namenode port.
</summary>
@@ -29709,7 +29526,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31374">
+<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31497">
<summary>
Receive UDP traffic on the hadoop_namenode port.
</summary>
@@ -29720,7 +29537,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31389">
+<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31512">
<summary>
Do not audit attempts to receive UDP traffic on the hadoop_namenode port.
</summary>
@@ -29731,7 +29548,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31404">
+<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31527">
<summary>
Send and receive UDP traffic on the hadoop_namenode port.
</summary>
@@ -29742,7 +29559,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31420">
+<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31543">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hadoop_namenode port.
@@ -29754,7 +29571,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31435">
+<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31558">
<summary>
Bind TCP sockets to the hadoop_namenode port.
</summary>
@@ -29765,7 +29582,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31455">
+<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31578">
<summary>
Bind UDP sockets to the hadoop_namenode port.
</summary>
@@ -29776,7 +29593,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31474">
+<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31597">
<summary>
Make a TCP connection to the hadoop_namenode port.
</summary>
@@ -29786,7 +29603,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31494">
+<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31617">
<summary>
Send hadoop_namenode_client packets.
</summary>
@@ -29797,7 +29614,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31513">
+<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31636">
<summary>
Do not audit attempts to send hadoop_namenode_client packets.
</summary>
@@ -29808,7 +29625,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31532">
+<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31655">
<summary>
Receive hadoop_namenode_client packets.
</summary>
@@ -29819,7 +29636,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31551">
+<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31674">
<summary>
Do not audit attempts to receive hadoop_namenode_client packets.
</summary>
@@ -29830,7 +29647,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31570">
+<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31693">
<summary>
Send and receive hadoop_namenode_client packets.
</summary>
@@ -29841,7 +29658,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31586">
+<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31709">
<summary>
Do not audit attempts to send and receive hadoop_namenode_client packets.
</summary>
@@ -29852,7 +29669,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31601">
+<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31724">
<summary>
Relabel packets to hadoop_namenode_client the packet type.
</summary>
@@ -29862,7 +29679,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31621">
+<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31744">
<summary>
Send hadoop_namenode_server packets.
</summary>
@@ -29873,7 +29690,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31640">
+<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31763">
<summary>
Do not audit attempts to send hadoop_namenode_server packets.
</summary>
@@ -29884,7 +29701,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31659">
+<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31782">
<summary>
Receive hadoop_namenode_server packets.
</summary>
@@ -29895,7 +29712,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31678">
+<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31801">
<summary>
Do not audit attempts to receive hadoop_namenode_server packets.
</summary>
@@ -29906,7 +29723,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31697">
+<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31820">
<summary>
Send and receive hadoop_namenode_server packets.
</summary>
@@ -29917,7 +29734,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31713">
+<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31836">
<summary>
Do not audit attempts to send and receive hadoop_namenode_server packets.
</summary>
@@ -29928,7 +29745,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31728">
+<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31851">
<summary>
Relabel packets to hadoop_namenode_server the packet type.
</summary>
@@ -29938,7 +29755,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31750">
+<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31873">
<summary>
Send and receive TCP traffic on the hddtemp port.
</summary>
@@ -29949,7 +29766,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_hddtemp_port" lineno="31765">
+<interface name="corenet_udp_send_hddtemp_port" lineno="31888">
<summary>
Send UDP traffic on the hddtemp port.
</summary>
@@ -29960,7 +29777,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31780">
+<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31903">
<summary>
Do not audit attempts to send UDP traffic on the hddtemp port.
</summary>
@@ -29971,7 +29788,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_hddtemp_port" lineno="31795">
+<interface name="corenet_udp_receive_hddtemp_port" lineno="31918">
<summary>
Receive UDP traffic on the hddtemp port.
</summary>
@@ -29982,7 +29799,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31810">
+<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31933">
<summary>
Do not audit attempts to receive UDP traffic on the hddtemp port.
</summary>
@@ -29993,7 +29810,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31825">
+<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31948">
<summary>
Send and receive UDP traffic on the hddtemp port.
</summary>
@@ -30004,7 +29821,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31841">
+<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31964">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hddtemp port.
@@ -30016,7 +29833,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_hddtemp_port" lineno="31856">
+<interface name="corenet_tcp_bind_hddtemp_port" lineno="31979">
<summary>
Bind TCP sockets to the hddtemp port.
</summary>
@@ -30027,7 +29844,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hddtemp_port" lineno="31876">
+<interface name="corenet_udp_bind_hddtemp_port" lineno="31999">
<summary>
Bind UDP sockets to the hddtemp port.
</summary>
@@ -30038,7 +29855,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hddtemp_port" lineno="31895">
+<interface name="corenet_tcp_connect_hddtemp_port" lineno="32018">
<summary>
Make a TCP connection to the hddtemp port.
</summary>
@@ -30048,7 +29865,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hddtemp_client_packets" lineno="31915">
+<interface name="corenet_send_hddtemp_client_packets" lineno="32038">
<summary>
Send hddtemp_client packets.
</summary>
@@ -30059,7 +29876,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="31934">
+<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="32057">
<summary>
Do not audit attempts to send hddtemp_client packets.
</summary>
@@ -30070,7 +29887,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hddtemp_client_packets" lineno="31953">
+<interface name="corenet_receive_hddtemp_client_packets" lineno="32076">
<summary>
Receive hddtemp_client packets.
</summary>
@@ -30081,7 +29898,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="31972">
+<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="32095">
<summary>
Do not audit attempts to receive hddtemp_client packets.
</summary>
@@ -30092,7 +29909,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="31991">
+<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="32114">
<summary>
Send and receive hddtemp_client packets.
</summary>
@@ -30103,7 +29920,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32007">
+<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32130">
<summary>
Do not audit attempts to send and receive hddtemp_client packets.
</summary>
@@ -30114,7 +29931,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32022">
+<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32145">
<summary>
Relabel packets to hddtemp_client the packet type.
</summary>
@@ -30124,7 +29941,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hddtemp_server_packets" lineno="32042">
+<interface name="corenet_send_hddtemp_server_packets" lineno="32165">
<summary>
Send hddtemp_server packets.
</summary>
@@ -30135,7 +29952,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32061">
+<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32184">
<summary>
Do not audit attempts to send hddtemp_server packets.
</summary>
@@ -30146,7 +29963,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hddtemp_server_packets" lineno="32080">
+<interface name="corenet_receive_hddtemp_server_packets" lineno="32203">
<summary>
Receive hddtemp_server packets.
</summary>
@@ -30157,7 +29974,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32099">
+<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32222">
<summary>
Do not audit attempts to receive hddtemp_server packets.
</summary>
@@ -30168,7 +29985,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32118">
+<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32241">
<summary>
Send and receive hddtemp_server packets.
</summary>
@@ -30179,7 +29996,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32134">
+<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32257">
<summary>
Do not audit attempts to send and receive hddtemp_server packets.
</summary>
@@ -30190,7 +30007,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32149">
+<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32272">
<summary>
Relabel packets to hddtemp_server the packet type.
</summary>
@@ -30200,7 +30017,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_howl_port" lineno="32171">
+<interface name="corenet_tcp_sendrecv_howl_port" lineno="32294">
<summary>
Send and receive TCP traffic on the howl port.
</summary>
@@ -30211,7 +30028,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_howl_port" lineno="32186">
+<interface name="corenet_udp_send_howl_port" lineno="32309">
<summary>
Send UDP traffic on the howl port.
</summary>
@@ -30222,7 +30039,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32201">
+<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32324">
<summary>
Do not audit attempts to send UDP traffic on the howl port.
</summary>
@@ -30233,7 +30050,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_howl_port" lineno="32216">
+<interface name="corenet_udp_receive_howl_port" lineno="32339">
<summary>
Receive UDP traffic on the howl port.
</summary>
@@ -30244,7 +30061,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32231">
+<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32354">
<summary>
Do not audit attempts to receive UDP traffic on the howl port.
</summary>
@@ -30255,7 +30072,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_howl_port" lineno="32246">
+<interface name="corenet_udp_sendrecv_howl_port" lineno="32369">
<summary>
Send and receive UDP traffic on the howl port.
</summary>
@@ -30266,7 +30083,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32262">
+<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32385">
<summary>
Do not audit attempts to send and receive
UDP traffic on the howl port.
@@ -30278,7 +30095,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_howl_port" lineno="32277">
+<interface name="corenet_tcp_bind_howl_port" lineno="32400">
<summary>
Bind TCP sockets to the howl port.
</summary>
@@ -30289,7 +30106,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_howl_port" lineno="32297">
+<interface name="corenet_udp_bind_howl_port" lineno="32420">
<summary>
Bind UDP sockets to the howl port.
</summary>
@@ -30300,7 +30117,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_howl_port" lineno="32316">
+<interface name="corenet_tcp_connect_howl_port" lineno="32439">
<summary>
Make a TCP connection to the howl port.
</summary>
@@ -30310,7 +30127,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_howl_client_packets" lineno="32336">
+<interface name="corenet_send_howl_client_packets" lineno="32459">
<summary>
Send howl_client packets.
</summary>
@@ -30321,7 +30138,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32355">
+<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32478">
<summary>
Do not audit attempts to send howl_client packets.
</summary>
@@ -30332,7 +30149,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_howl_client_packets" lineno="32374">
+<interface name="corenet_receive_howl_client_packets" lineno="32497">
<summary>
Receive howl_client packets.
</summary>
@@ -30343,7 +30160,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32393">
+<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32516">
<summary>
Do not audit attempts to receive howl_client packets.
</summary>
@@ -30354,7 +30171,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_howl_client_packets" lineno="32412">
+<interface name="corenet_sendrecv_howl_client_packets" lineno="32535">
<summary>
Send and receive howl_client packets.
</summary>
@@ -30365,7 +30182,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32428">
+<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32551">
<summary>
Do not audit attempts to send and receive howl_client packets.
</summary>
@@ -30376,7 +30193,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_howl_client_packets" lineno="32443">
+<interface name="corenet_relabelto_howl_client_packets" lineno="32566">
<summary>
Relabel packets to howl_client the packet type.
</summary>
@@ -30386,7 +30203,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_howl_server_packets" lineno="32463">
+<interface name="corenet_send_howl_server_packets" lineno="32586">
<summary>
Send howl_server packets.
</summary>
@@ -30397,7 +30214,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32482">
+<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32605">
<summary>
Do not audit attempts to send howl_server packets.
</summary>
@@ -30408,7 +30225,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_howl_server_packets" lineno="32501">
+<interface name="corenet_receive_howl_server_packets" lineno="32624">
<summary>
Receive howl_server packets.
</summary>
@@ -30419,7 +30236,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32520">
+<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32643">
<summary>
Do not audit attempts to receive howl_server packets.
</summary>
@@ -30430,7 +30247,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_howl_server_packets" lineno="32539">
+<interface name="corenet_sendrecv_howl_server_packets" lineno="32662">
<summary>
Send and receive howl_server packets.
</summary>
@@ -30441,7 +30258,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32555">
+<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32678">
<summary>
Do not audit attempts to send and receive howl_server packets.
</summary>
@@ -30452,7 +30269,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_howl_server_packets" lineno="32570">
+<interface name="corenet_relabelto_howl_server_packets" lineno="32693">
<summary>
Relabel packets to howl_server the packet type.
</summary>
@@ -30462,7 +30279,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32592">
+<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32715">
<summary>
Send and receive TCP traffic on the hplip port.
</summary>
@@ -30473,7 +30290,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_hplip_port" lineno="32607">
+<interface name="corenet_udp_send_hplip_port" lineno="32730">
<summary>
Send UDP traffic on the hplip port.
</summary>
@@ -30484,7 +30301,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32622">
+<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32745">
<summary>
Do not audit attempts to send UDP traffic on the hplip port.
</summary>
@@ -30495,7 +30312,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_hplip_port" lineno="32637">
+<interface name="corenet_udp_receive_hplip_port" lineno="32760">
<summary>
Receive UDP traffic on the hplip port.
</summary>
@@ -30506,7 +30323,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32652">
+<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32775">
<summary>
Do not audit attempts to receive UDP traffic on the hplip port.
</summary>
@@ -30517,7 +30334,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_hplip_port" lineno="32667">
+<interface name="corenet_udp_sendrecv_hplip_port" lineno="32790">
<summary>
Send and receive UDP traffic on the hplip port.
</summary>
@@ -30528,7 +30345,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32683">
+<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32806">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hplip port.
@@ -30540,7 +30357,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_hplip_port" lineno="32698">
+<interface name="corenet_tcp_bind_hplip_port" lineno="32821">
<summary>
Bind TCP sockets to the hplip port.
</summary>
@@ -30551,7 +30368,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hplip_port" lineno="32718">
+<interface name="corenet_udp_bind_hplip_port" lineno="32841">
<summary>
Bind UDP sockets to the hplip port.
</summary>
@@ -30562,7 +30379,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hplip_port" lineno="32737">
+<interface name="corenet_tcp_connect_hplip_port" lineno="32860">
<summary>
Make a TCP connection to the hplip port.
</summary>
@@ -30572,7 +30389,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hplip_client_packets" lineno="32757">
+<interface name="corenet_send_hplip_client_packets" lineno="32880">
<summary>
Send hplip_client packets.
</summary>
@@ -30583,7 +30400,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32776">
+<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32899">
<summary>
Do not audit attempts to send hplip_client packets.
</summary>
@@ -30594,7 +30411,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hplip_client_packets" lineno="32795">
+<interface name="corenet_receive_hplip_client_packets" lineno="32918">
<summary>
Receive hplip_client packets.
</summary>
@@ -30605,7 +30422,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32814">
+<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32937">
<summary>
Do not audit attempts to receive hplip_client packets.
</summary>
@@ -30616,7 +30433,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hplip_client_packets" lineno="32833">
+<interface name="corenet_sendrecv_hplip_client_packets" lineno="32956">
<summary>
Send and receive hplip_client packets.
</summary>
@@ -30627,7 +30444,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32849">
+<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32972">
<summary>
Do not audit attempts to send and receive hplip_client packets.
</summary>
@@ -30638,7 +30455,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hplip_client_packets" lineno="32864">
+<interface name="corenet_relabelto_hplip_client_packets" lineno="32987">
<summary>
Relabel packets to hplip_client the packet type.
</summary>
@@ -30648,7 +30465,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hplip_server_packets" lineno="32884">
+<interface name="corenet_send_hplip_server_packets" lineno="33007">
<summary>
Send hplip_server packets.
</summary>
@@ -30659,7 +30476,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="32903">
+<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="33026">
<summary>
Do not audit attempts to send hplip_server packets.
</summary>
@@ -30670,7 +30487,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hplip_server_packets" lineno="32922">
+<interface name="corenet_receive_hplip_server_packets" lineno="33045">
<summary>
Receive hplip_server packets.
</summary>
@@ -30681,7 +30498,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="32941">
+<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="33064">
<summary>
Do not audit attempts to receive hplip_server packets.
</summary>
@@ -30692,7 +30509,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hplip_server_packets" lineno="32960">
+<interface name="corenet_sendrecv_hplip_server_packets" lineno="33083">
<summary>
Send and receive hplip_server packets.
</summary>
@@ -30703,7 +30520,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="32976">
+<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="33099">
<summary>
Do not audit attempts to send and receive hplip_server packets.
</summary>
@@ -30714,7 +30531,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hplip_server_packets" lineno="32991">
+<interface name="corenet_relabelto_hplip_server_packets" lineno="33114">
<summary>
Relabel packets to hplip_server the packet type.
</summary>
@@ -30724,7 +30541,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_http_port" lineno="33013">
+<interface name="corenet_tcp_sendrecv_http_port" lineno="33136">
<summary>
Send and receive TCP traffic on the http port.
</summary>
@@ -30735,7 +30552,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_http_port" lineno="33028">
+<interface name="corenet_udp_send_http_port" lineno="33151">
<summary>
Send UDP traffic on the http port.
</summary>
@@ -30746,7 +30563,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_http_port" lineno="33043">
+<interface name="corenet_dontaudit_udp_send_http_port" lineno="33166">
<summary>
Do not audit attempts to send UDP traffic on the http port.
</summary>
@@ -30757,7 +30574,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_http_port" lineno="33058">
+<interface name="corenet_udp_receive_http_port" lineno="33181">
<summary>
Receive UDP traffic on the http port.
</summary>
@@ -30768,7 +30585,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33073">
+<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33196">
<summary>
Do not audit attempts to receive UDP traffic on the http port.
</summary>
@@ -30779,7 +30596,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_http_port" lineno="33088">
+<interface name="corenet_udp_sendrecv_http_port" lineno="33211">
<summary>
Send and receive UDP traffic on the http port.
</summary>
@@ -30790,7 +30607,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33104">
+<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33227">
<summary>
Do not audit attempts to send and receive
UDP traffic on the http port.
@@ -30802,7 +30619,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_http_port" lineno="33119">
+<interface name="corenet_tcp_bind_http_port" lineno="33242">
<summary>
Bind TCP sockets to the http port.
</summary>
@@ -30813,7 +30630,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_http_port" lineno="33139">
+<interface name="corenet_udp_bind_http_port" lineno="33262">
<summary>
Bind UDP sockets to the http port.
</summary>
@@ -30824,7 +30641,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_http_port" lineno="33158">
+<interface name="corenet_tcp_connect_http_port" lineno="33281">
<summary>
Make a TCP connection to the http port.
</summary>
@@ -30834,7 +30651,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_client_packets" lineno="33178">
+<interface name="corenet_send_http_client_packets" lineno="33301">
<summary>
Send http_client packets.
</summary>
@@ -30845,7 +30662,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_client_packets" lineno="33197">
+<interface name="corenet_dontaudit_send_http_client_packets" lineno="33320">
<summary>
Do not audit attempts to send http_client packets.
</summary>
@@ -30856,7 +30673,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_client_packets" lineno="33216">
+<interface name="corenet_receive_http_client_packets" lineno="33339">
<summary>
Receive http_client packets.
</summary>
@@ -30867,7 +30684,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33235">
+<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33358">
<summary>
Do not audit attempts to receive http_client packets.
</summary>
@@ -30878,7 +30695,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_client_packets" lineno="33254">
+<interface name="corenet_sendrecv_http_client_packets" lineno="33377">
<summary>
Send and receive http_client packets.
</summary>
@@ -30889,7 +30706,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33270">
+<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33393">
<summary>
Do not audit attempts to send and receive http_client packets.
</summary>
@@ -30900,7 +30717,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_client_packets" lineno="33285">
+<interface name="corenet_relabelto_http_client_packets" lineno="33408">
<summary>
Relabel packets to http_client the packet type.
</summary>
@@ -30910,7 +30727,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_server_packets" lineno="33305">
+<interface name="corenet_send_http_server_packets" lineno="33428">
<summary>
Send http_server packets.
</summary>
@@ -30921,7 +30738,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_server_packets" lineno="33324">
+<interface name="corenet_dontaudit_send_http_server_packets" lineno="33447">
<summary>
Do not audit attempts to send http_server packets.
</summary>
@@ -30932,7 +30749,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_server_packets" lineno="33343">
+<interface name="corenet_receive_http_server_packets" lineno="33466">
<summary>
Receive http_server packets.
</summary>
@@ -30943,7 +30760,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33362">
+<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33485">
<summary>
Do not audit attempts to receive http_server packets.
</summary>
@@ -30954,7 +30771,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_server_packets" lineno="33381">
+<interface name="corenet_sendrecv_http_server_packets" lineno="33504">
<summary>
Send and receive http_server packets.
</summary>
@@ -30965,7 +30782,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33397">
+<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33520">
<summary>
Do not audit attempts to send and receive http_server packets.
</summary>
@@ -30976,7 +30793,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_server_packets" lineno="33412">
+<interface name="corenet_relabelto_http_server_packets" lineno="33535">
<summary>
Relabel packets to http_server the packet type.
</summary>
@@ -30986,7 +30803,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33434">
+<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33557">
<summary>
Send and receive TCP traffic on the http_cache port.
</summary>
@@ -30997,7 +30814,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_http_cache_port" lineno="33449">
+<interface name="corenet_udp_send_http_cache_port" lineno="33572">
<summary>
Send UDP traffic on the http_cache port.
</summary>
@@ -31008,7 +30825,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33464">
+<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33587">
<summary>
Do not audit attempts to send UDP traffic on the http_cache port.
</summary>
@@ -31019,7 +30836,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_http_cache_port" lineno="33479">
+<interface name="corenet_udp_receive_http_cache_port" lineno="33602">
<summary>
Receive UDP traffic on the http_cache port.
</summary>
@@ -31030,7 +30847,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33494">
+<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33617">
<summary>
Do not audit attempts to receive UDP traffic on the http_cache port.
</summary>
@@ -31041,7 +30858,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33509">
+<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33632">
<summary>
Send and receive UDP traffic on the http_cache port.
</summary>
@@ -31052,7 +30869,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33525">
+<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33648">
<summary>
Do not audit attempts to send and receive
UDP traffic on the http_cache port.
@@ -31064,7 +30881,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_http_cache_port" lineno="33540">
+<interface name="corenet_tcp_bind_http_cache_port" lineno="33663">
<summary>
Bind TCP sockets to the http_cache port.
</summary>
@@ -31075,7 +30892,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_http_cache_port" lineno="33560">
+<interface name="corenet_udp_bind_http_cache_port" lineno="33683">
<summary>
Bind UDP sockets to the http_cache port.
</summary>
@@ -31086,7 +30903,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_http_cache_port" lineno="33579">
+<interface name="corenet_tcp_connect_http_cache_port" lineno="33702">
<summary>
Make a TCP connection to the http_cache port.
</summary>
@@ -31096,7 +30913,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_cache_client_packets" lineno="33599">
+<interface name="corenet_send_http_cache_client_packets" lineno="33722">
<summary>
Send http_cache_client packets.
</summary>
@@ -31107,7 +30924,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33618">
+<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33741">
<summary>
Do not audit attempts to send http_cache_client packets.
</summary>
@@ -31118,7 +30935,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_cache_client_packets" lineno="33637">
+<interface name="corenet_receive_http_cache_client_packets" lineno="33760">
<summary>
Receive http_cache_client packets.
</summary>
@@ -31129,7 +30946,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33656">
+<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33779">
<summary>
Do not audit attempts to receive http_cache_client packets.
</summary>
@@ -31140,7 +30957,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33675">
+<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33798">
<summary>
Send and receive http_cache_client packets.
</summary>
@@ -31151,7 +30968,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33691">
+<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33814">
<summary>
Do not audit attempts to send and receive http_cache_client packets.
</summary>
@@ -31162,7 +30979,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_cache_client_packets" lineno="33706">
+<interface name="corenet_relabelto_http_cache_client_packets" lineno="33829">
<summary>
Relabel packets to http_cache_client the packet type.
</summary>
@@ -31172,7 +30989,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_cache_server_packets" lineno="33726">
+<interface name="corenet_send_http_cache_server_packets" lineno="33849">
<summary>
Send http_cache_server packets.
</summary>
@@ -31183,7 +31000,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33745">
+<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33868">
<summary>
Do not audit attempts to send http_cache_server packets.
</summary>
@@ -31194,7 +31011,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_cache_server_packets" lineno="33764">
+<interface name="corenet_receive_http_cache_server_packets" lineno="33887">
<summary>
Receive http_cache_server packets.
</summary>
@@ -31205,7 +31022,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33783">
+<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33906">
<summary>
Do not audit attempts to receive http_cache_server packets.
</summary>
@@ -31216,7 +31033,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33802">
+<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33925">
<summary>
Send and receive http_cache_server packets.
</summary>
@@ -31227,7 +31044,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33818">
+<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33941">
<summary>
Do not audit attempts to send and receive http_cache_server packets.
</summary>
@@ -31238,7 +31055,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_cache_server_packets" lineno="33833">
+<interface name="corenet_relabelto_http_cache_server_packets" lineno="33956">
<summary>
Relabel packets to http_cache_server the packet type.
</summary>
@@ -31248,7 +31065,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33855">
+<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33978">
<summary>
Send and receive TCP traffic on the i18n_input port.
</summary>
@@ -31259,7 +31076,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_i18n_input_port" lineno="33870">
+<interface name="corenet_udp_send_i18n_input_port" lineno="33993">
<summary>
Send UDP traffic on the i18n_input port.
</summary>
@@ -31270,7 +31087,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="33885">
+<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="34008">
<summary>
Do not audit attempts to send UDP traffic on the i18n_input port.
</summary>
@@ -31281,7 +31098,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_i18n_input_port" lineno="33900">
+<interface name="corenet_udp_receive_i18n_input_port" lineno="34023">
<summary>
Receive UDP traffic on the i18n_input port.
</summary>
@@ -31292,7 +31109,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="33915">
+<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="34038">
<summary>
Do not audit attempts to receive UDP traffic on the i18n_input port.
</summary>
@@ -31303,7 +31120,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="33930">
+<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="34053">
<summary>
Send and receive UDP traffic on the i18n_input port.
</summary>
@@ -31314,7 +31131,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="33946">
+<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="34069">
<summary>
Do not audit attempts to send and receive
UDP traffic on the i18n_input port.
@@ -31326,7 +31143,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_i18n_input_port" lineno="33961">
+<interface name="corenet_tcp_bind_i18n_input_port" lineno="34084">
<summary>
Bind TCP sockets to the i18n_input port.
</summary>
@@ -31337,7 +31154,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_i18n_input_port" lineno="33981">
+<interface name="corenet_udp_bind_i18n_input_port" lineno="34104">
<summary>
Bind UDP sockets to the i18n_input port.
</summary>
@@ -31348,7 +31165,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_i18n_input_port" lineno="34000">
+<interface name="corenet_tcp_connect_i18n_input_port" lineno="34123">
<summary>
Make a TCP connection to the i18n_input port.
</summary>
@@ -31358,7 +31175,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_i18n_input_client_packets" lineno="34020">
+<interface name="corenet_send_i18n_input_client_packets" lineno="34143">
<summary>
Send i18n_input_client packets.
</summary>
@@ -31369,7 +31186,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34039">
+<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34162">
<summary>
Do not audit attempts to send i18n_input_client packets.
</summary>
@@ -31380,7 +31197,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_i18n_input_client_packets" lineno="34058">
+<interface name="corenet_receive_i18n_input_client_packets" lineno="34181">
<summary>
Receive i18n_input_client packets.
</summary>
@@ -31391,7 +31208,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34077">
+<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34200">
<summary>
Do not audit attempts to receive i18n_input_client packets.
</summary>
@@ -31402,7 +31219,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34096">
+<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34219">
<summary>
Send and receive i18n_input_client packets.
</summary>
@@ -31413,7 +31230,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34112">
+<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34235">
<summary>
Do not audit attempts to send and receive i18n_input_client packets.
</summary>
@@ -31424,7 +31241,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34127">
+<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34250">
<summary>
Relabel packets to i18n_input_client the packet type.
</summary>
@@ -31434,7 +31251,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_i18n_input_server_packets" lineno="34147">
+<interface name="corenet_send_i18n_input_server_packets" lineno="34270">
<summary>
Send i18n_input_server packets.
</summary>
@@ -31445,7 +31262,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34166">
+<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34289">
<summary>
Do not audit attempts to send i18n_input_server packets.
</summary>
@@ -31456,7 +31273,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_i18n_input_server_packets" lineno="34185">
+<interface name="corenet_receive_i18n_input_server_packets" lineno="34308">
<summary>
Receive i18n_input_server packets.
</summary>
@@ -31467,7 +31284,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34204">
+<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34327">
<summary>
Do not audit attempts to receive i18n_input_server packets.
</summary>
@@ -31478,7 +31295,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34223">
+<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34346">
<summary>
Send and receive i18n_input_server packets.
</summary>
@@ -31489,7 +31306,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34239">
+<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34362">
<summary>
Do not audit attempts to send and receive i18n_input_server packets.
</summary>
@@ -31500,7 +31317,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34254">
+<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34377">
<summary>
Relabel packets to i18n_input_server the packet type.
</summary>
@@ -31510,7 +31327,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34276">
+<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34399">
<summary>
Send and receive TCP traffic on the imaze port.
</summary>
@@ -31521,7 +31338,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_imaze_port" lineno="34291">
+<interface name="corenet_udp_send_imaze_port" lineno="34414">
<summary>
Send UDP traffic on the imaze port.
</summary>
@@ -31532,7 +31349,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34306">
+<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34429">
<summary>
Do not audit attempts to send UDP traffic on the imaze port.
</summary>
@@ -31543,7 +31360,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_imaze_port" lineno="34321">
+<interface name="corenet_udp_receive_imaze_port" lineno="34444">
<summary>
Receive UDP traffic on the imaze port.
</summary>
@@ -31554,7 +31371,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34336">
+<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34459">
<summary>
Do not audit attempts to receive UDP traffic on the imaze port.
</summary>
@@ -31565,7 +31382,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_imaze_port" lineno="34351">
+<interface name="corenet_udp_sendrecv_imaze_port" lineno="34474">
<summary>
Send and receive UDP traffic on the imaze port.
</summary>
@@ -31576,7 +31393,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34367">
+<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34490">
<summary>
Do not audit attempts to send and receive
UDP traffic on the imaze port.
@@ -31588,7 +31405,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_imaze_port" lineno="34382">
+<interface name="corenet_tcp_bind_imaze_port" lineno="34505">
<summary>
Bind TCP sockets to the imaze port.
</summary>
@@ -31599,7 +31416,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_imaze_port" lineno="34402">
+<interface name="corenet_udp_bind_imaze_port" lineno="34525">
<summary>
Bind UDP sockets to the imaze port.
</summary>
@@ -31610,7 +31427,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_imaze_port" lineno="34421">
+<interface name="corenet_tcp_connect_imaze_port" lineno="34544">
<summary>
Make a TCP connection to the imaze port.
</summary>
@@ -31620,7 +31437,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_imaze_client_packets" lineno="34441">
+<interface name="corenet_send_imaze_client_packets" lineno="34564">
<summary>
Send imaze_client packets.
</summary>
@@ -31631,7 +31448,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34460">
+<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34583">
<summary>
Do not audit attempts to send imaze_client packets.
</summary>
@@ -31642,7 +31459,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_imaze_client_packets" lineno="34479">
+<interface name="corenet_receive_imaze_client_packets" lineno="34602">
<summary>
Receive imaze_client packets.
</summary>
@@ -31653,7 +31470,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34498">
+<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34621">
<summary>
Do not audit attempts to receive imaze_client packets.
</summary>
@@ -31664,7 +31481,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_imaze_client_packets" lineno="34517">
+<interface name="corenet_sendrecv_imaze_client_packets" lineno="34640">
<summary>
Send and receive imaze_client packets.
</summary>
@@ -31675,7 +31492,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34533">
+<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34656">
<summary>
Do not audit attempts to send and receive imaze_client packets.
</summary>
@@ -31686,7 +31503,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_imaze_client_packets" lineno="34548">
+<interface name="corenet_relabelto_imaze_client_packets" lineno="34671">
<summary>
Relabel packets to imaze_client the packet type.
</summary>
@@ -31696,7 +31513,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_imaze_server_packets" lineno="34568">
+<interface name="corenet_send_imaze_server_packets" lineno="34691">
<summary>
Send imaze_server packets.
</summary>
@@ -31707,7 +31524,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34587">
+<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34710">
<summary>
Do not audit attempts to send imaze_server packets.
</summary>
@@ -31718,7 +31535,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_imaze_server_packets" lineno="34606">
+<interface name="corenet_receive_imaze_server_packets" lineno="34729">
<summary>
Receive imaze_server packets.
</summary>
@@ -31729,7 +31546,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34625">
+<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34748">
<summary>
Do not audit attempts to receive imaze_server packets.
</summary>
@@ -31740,7 +31557,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_imaze_server_packets" lineno="34644">
+<interface name="corenet_sendrecv_imaze_server_packets" lineno="34767">
<summary>
Send and receive imaze_server packets.
</summary>
@@ -31751,7 +31568,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34660">
+<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34783">
<summary>
Do not audit attempts to send and receive imaze_server packets.
</summary>
@@ -31762,7 +31579,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_imaze_server_packets" lineno="34675">
+<interface name="corenet_relabelto_imaze_server_packets" lineno="34798">
<summary>
Relabel packets to imaze_server the packet type.
</summary>
@@ -31772,7 +31589,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34697">
+<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34820">
<summary>
Send and receive TCP traffic on the inetd_child port.
</summary>
@@ -31783,7 +31600,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_inetd_child_port" lineno="34712">
+<interface name="corenet_udp_send_inetd_child_port" lineno="34835">
<summary>
Send UDP traffic on the inetd_child port.
</summary>
@@ -31794,7 +31611,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34727">
+<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34850">
<summary>
Do not audit attempts to send UDP traffic on the inetd_child port.
</summary>
@@ -31805,7 +31622,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_inetd_child_port" lineno="34742">
+<interface name="corenet_udp_receive_inetd_child_port" lineno="34865">
<summary>
Receive UDP traffic on the inetd_child port.
</summary>
@@ -31816,7 +31633,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34757">
+<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34880">
<summary>
Do not audit attempts to receive UDP traffic on the inetd_child port.
</summary>
@@ -31827,7 +31644,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34772">
+<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34895">
<summary>
Send and receive UDP traffic on the inetd_child port.
</summary>
@@ -31838,7 +31655,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34788">
+<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34911">
<summary>
Do not audit attempts to send and receive
UDP traffic on the inetd_child port.
@@ -31850,7 +31667,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_inetd_child_port" lineno="34803">
+<interface name="corenet_tcp_bind_inetd_child_port" lineno="34926">
<summary>
Bind TCP sockets to the inetd_child port.
</summary>
@@ -31861,7 +31678,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_inetd_child_port" lineno="34823">
+<interface name="corenet_udp_bind_inetd_child_port" lineno="34946">
<summary>
Bind UDP sockets to the inetd_child port.
</summary>
@@ -31872,7 +31689,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_inetd_child_port" lineno="34842">
+<interface name="corenet_tcp_connect_inetd_child_port" lineno="34965">
<summary>
Make a TCP connection to the inetd_child port.
</summary>
@@ -31882,7 +31699,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_inetd_child_client_packets" lineno="34862">
+<interface name="corenet_send_inetd_child_client_packets" lineno="34985">
<summary>
Send inetd_child_client packets.
</summary>
@@ -31893,7 +31710,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="34881">
+<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="35004">
<summary>
Do not audit attempts to send inetd_child_client packets.
</summary>
@@ -31904,7 +31721,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_inetd_child_client_packets" lineno="34900">
+<interface name="corenet_receive_inetd_child_client_packets" lineno="35023">
<summary>
Receive inetd_child_client packets.
</summary>
@@ -31915,7 +31732,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="34919">
+<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="35042">
<summary>
Do not audit attempts to receive inetd_child_client packets.
</summary>
@@ -31926,7 +31743,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="34938">
+<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="35061">
<summary>
Send and receive inetd_child_client packets.
</summary>
@@ -31937,7 +31754,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="34954">
+<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="35077">
<summary>
Do not audit attempts to send and receive inetd_child_client packets.
</summary>
@@ -31948,7 +31765,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_inetd_child_client_packets" lineno="34969">
+<interface name="corenet_relabelto_inetd_child_client_packets" lineno="35092">
<summary>
Relabel packets to inetd_child_client the packet type.
</summary>
@@ -31958,7 +31775,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_inetd_child_server_packets" lineno="34989">
+<interface name="corenet_send_inetd_child_server_packets" lineno="35112">
<summary>
Send inetd_child_server packets.
</summary>
@@ -31969,7 +31786,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35008">
+<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35131">
<summary>
Do not audit attempts to send inetd_child_server packets.
</summary>
@@ -31980,7 +31797,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_inetd_child_server_packets" lineno="35027">
+<interface name="corenet_receive_inetd_child_server_packets" lineno="35150">
<summary>
Receive inetd_child_server packets.
</summary>
@@ -31991,7 +31808,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35046">
+<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35169">
<summary>
Do not audit attempts to receive inetd_child_server packets.
</summary>
@@ -32002,7 +31819,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35065">
+<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35188">
<summary>
Send and receive inetd_child_server packets.
</summary>
@@ -32013,7 +31830,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35081">
+<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35204">
<summary>
Do not audit attempts to send and receive inetd_child_server packets.
</summary>
@@ -32024,7 +31841,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35096">
+<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35219">
<summary>
Relabel packets to inetd_child_server the packet type.
</summary>
@@ -32034,7 +31851,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_innd_port" lineno="35118">
+<interface name="corenet_tcp_sendrecv_innd_port" lineno="35241">
<summary>
Send and receive TCP traffic on the innd port.
</summary>
@@ -32045,7 +31862,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_innd_port" lineno="35133">
+<interface name="corenet_udp_send_innd_port" lineno="35256">
<summary>
Send UDP traffic on the innd port.
</summary>
@@ -32056,7 +31873,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35148">
+<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35271">
<summary>
Do not audit attempts to send UDP traffic on the innd port.
</summary>
@@ -32067,7 +31884,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_innd_port" lineno="35163">
+<interface name="corenet_udp_receive_innd_port" lineno="35286">
<summary>
Receive UDP traffic on the innd port.
</summary>
@@ -32078,7 +31895,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35178">
+<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35301">
<summary>
Do not audit attempts to receive UDP traffic on the innd port.
</summary>
@@ -32089,7 +31906,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_innd_port" lineno="35193">
+<interface name="corenet_udp_sendrecv_innd_port" lineno="35316">
<summary>
Send and receive UDP traffic on the innd port.
</summary>
@@ -32100,7 +31917,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35209">
+<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35332">
<summary>
Do not audit attempts to send and receive
UDP traffic on the innd port.
@@ -32112,7 +31929,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_innd_port" lineno="35224">
+<interface name="corenet_tcp_bind_innd_port" lineno="35347">
<summary>
Bind TCP sockets to the innd port.
</summary>
@@ -32123,7 +31940,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_innd_port" lineno="35244">
+<interface name="corenet_udp_bind_innd_port" lineno="35367">
<summary>
Bind UDP sockets to the innd port.
</summary>
@@ -32134,7 +31951,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_innd_port" lineno="35263">
+<interface name="corenet_tcp_connect_innd_port" lineno="35386">
<summary>
Make a TCP connection to the innd port.
</summary>
@@ -32144,7 +31961,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_innd_client_packets" lineno="35283">
+<interface name="corenet_send_innd_client_packets" lineno="35406">
<summary>
Send innd_client packets.
</summary>
@@ -32155,7 +31972,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35302">
+<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35425">
<summary>
Do not audit attempts to send innd_client packets.
</summary>
@@ -32166,7 +31983,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_innd_client_packets" lineno="35321">
+<interface name="corenet_receive_innd_client_packets" lineno="35444">
<summary>
Receive innd_client packets.
</summary>
@@ -32177,7 +31994,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35340">
+<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35463">
<summary>
Do not audit attempts to receive innd_client packets.
</summary>
@@ -32188,7 +32005,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_innd_client_packets" lineno="35359">
+<interface name="corenet_sendrecv_innd_client_packets" lineno="35482">
<summary>
Send and receive innd_client packets.
</summary>
@@ -32199,7 +32016,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35375">
+<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35498">
<summary>
Do not audit attempts to send and receive innd_client packets.
</summary>
@@ -32210,7 +32027,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_innd_client_packets" lineno="35390">
+<interface name="corenet_relabelto_innd_client_packets" lineno="35513">
<summary>
Relabel packets to innd_client the packet type.
</summary>
@@ -32220,7 +32037,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_innd_server_packets" lineno="35410">
+<interface name="corenet_send_innd_server_packets" lineno="35533">
<summary>
Send innd_server packets.
</summary>
@@ -32231,7 +32048,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35429">
+<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35552">
<summary>
Do not audit attempts to send innd_server packets.
</summary>
@@ -32242,7 +32059,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_innd_server_packets" lineno="35448">
+<interface name="corenet_receive_innd_server_packets" lineno="35571">
<summary>
Receive innd_server packets.
</summary>
@@ -32253,7 +32070,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35467">
+<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35590">
<summary>
Do not audit attempts to receive innd_server packets.
</summary>
@@ -32264,7 +32081,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_innd_server_packets" lineno="35486">
+<interface name="corenet_sendrecv_innd_server_packets" lineno="35609">
<summary>
Send and receive innd_server packets.
</summary>
@@ -32275,7 +32092,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35502">
+<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35625">
<summary>
Do not audit attempts to send and receive innd_server packets.
</summary>
@@ -32286,7 +32103,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_innd_server_packets" lineno="35517">
+<interface name="corenet_relabelto_innd_server_packets" lineno="35640">
<summary>
Relabel packets to innd_server the packet type.
</summary>
@@ -32296,7 +32113,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35539">
+<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35662">
<summary>
Send and receive TCP traffic on the interwise port.
</summary>
@@ -32307,7 +32124,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_interwise_port" lineno="35554">
+<interface name="corenet_udp_send_interwise_port" lineno="35677">
<summary>
Send UDP traffic on the interwise port.
</summary>
@@ -32318,7 +32135,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35569">
+<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35692">
<summary>
Do not audit attempts to send UDP traffic on the interwise port.
</summary>
@@ -32329,7 +32146,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_interwise_port" lineno="35584">
+<interface name="corenet_udp_receive_interwise_port" lineno="35707">
<summary>
Receive UDP traffic on the interwise port.
</summary>
@@ -32340,7 +32157,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35599">
+<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35722">
<summary>
Do not audit attempts to receive UDP traffic on the interwise port.
</summary>
@@ -32351,7 +32168,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_interwise_port" lineno="35614">
+<interface name="corenet_udp_sendrecv_interwise_port" lineno="35737">
<summary>
Send and receive UDP traffic on the interwise port.
</summary>
@@ -32362,7 +32179,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35630">
+<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35753">
<summary>
Do not audit attempts to send and receive
UDP traffic on the interwise port.
@@ -32374,7 +32191,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_interwise_port" lineno="35645">
+<interface name="corenet_tcp_bind_interwise_port" lineno="35768">
<summary>
Bind TCP sockets to the interwise port.
</summary>
@@ -32385,7 +32202,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_interwise_port" lineno="35665">
+<interface name="corenet_udp_bind_interwise_port" lineno="35788">
<summary>
Bind UDP sockets to the interwise port.
</summary>
@@ -32396,7 +32213,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_interwise_port" lineno="35684">
+<interface name="corenet_tcp_connect_interwise_port" lineno="35807">
<summary>
Make a TCP connection to the interwise port.
</summary>
@@ -32406,7 +32223,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_interwise_client_packets" lineno="35704">
+<interface name="corenet_send_interwise_client_packets" lineno="35827">
<summary>
Send interwise_client packets.
</summary>
@@ -32417,7 +32234,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35723">
+<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35846">
<summary>
Do not audit attempts to send interwise_client packets.
</summary>
@@ -32428,7 +32245,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_interwise_client_packets" lineno="35742">
+<interface name="corenet_receive_interwise_client_packets" lineno="35865">
<summary>
Receive interwise_client packets.
</summary>
@@ -32439,7 +32256,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35761">
+<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35884">
<summary>
Do not audit attempts to receive interwise_client packets.
</summary>
@@ -32450,7 +32267,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_interwise_client_packets" lineno="35780">
+<interface name="corenet_sendrecv_interwise_client_packets" lineno="35903">
<summary>
Send and receive interwise_client packets.
</summary>
@@ -32461,7 +32278,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35796">
+<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35919">
<summary>
Do not audit attempts to send and receive interwise_client packets.
</summary>
@@ -32472,7 +32289,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_interwise_client_packets" lineno="35811">
+<interface name="corenet_relabelto_interwise_client_packets" lineno="35934">
<summary>
Relabel packets to interwise_client the packet type.
</summary>
@@ -32482,7 +32299,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_interwise_server_packets" lineno="35831">
+<interface name="corenet_send_interwise_server_packets" lineno="35954">
<summary>
Send interwise_server packets.
</summary>
@@ -32493,7 +32310,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35850">
+<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35973">
<summary>
Do not audit attempts to send interwise_server packets.
</summary>
@@ -32504,7 +32321,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_interwise_server_packets" lineno="35869">
+<interface name="corenet_receive_interwise_server_packets" lineno="35992">
<summary>
Receive interwise_server packets.
</summary>
@@ -32515,7 +32332,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="35888">
+<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="36011">
<summary>
Do not audit attempts to receive interwise_server packets.
</summary>
@@ -32526,7 +32343,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_interwise_server_packets" lineno="35907">
+<interface name="corenet_sendrecv_interwise_server_packets" lineno="36030">
<summary>
Send and receive interwise_server packets.
</summary>
@@ -32537,7 +32354,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="35923">
+<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="36046">
<summary>
Do not audit attempts to send and receive interwise_server packets.
</summary>
@@ -32548,7 +32365,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_interwise_server_packets" lineno="35938">
+<interface name="corenet_relabelto_interwise_server_packets" lineno="36061">
<summary>
Relabel packets to interwise_server the packet type.
</summary>
@@ -32558,7 +32375,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="35960">
+<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="36083">
<summary>
Send and receive TCP traffic on the ionixnetmon port.
</summary>
@@ -32569,7 +32386,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ionixnetmon_port" lineno="35975">
+<interface name="corenet_udp_send_ionixnetmon_port" lineno="36098">
<summary>
Send UDP traffic on the ionixnetmon port.
</summary>
@@ -32580,7 +32397,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="35990">
+<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="36113">
<summary>
Do not audit attempts to send UDP traffic on the ionixnetmon port.
</summary>
@@ -32591,7 +32408,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36005">
+<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36128">
<summary>
Receive UDP traffic on the ionixnetmon port.
</summary>
@@ -32602,7 +32419,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36020">
+<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36143">
<summary>
Do not audit attempts to receive UDP traffic on the ionixnetmon port.
</summary>
@@ -32613,7 +32430,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36035">
+<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36158">
<summary>
Send and receive UDP traffic on the ionixnetmon port.
</summary>
@@ -32624,7 +32441,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36051">
+<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36174">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ionixnetmon port.
@@ -32636,7 +32453,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36066">
+<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36189">
<summary>
Bind TCP sockets to the ionixnetmon port.
</summary>
@@ -32647,7 +32464,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36086">
+<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36209">
<summary>
Bind UDP sockets to the ionixnetmon port.
</summary>
@@ -32658,7 +32475,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36105">
+<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36228">
<summary>
Make a TCP connection to the ionixnetmon port.
</summary>
@@ -32668,7 +32485,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ionixnetmon_client_packets" lineno="36125">
+<interface name="corenet_send_ionixnetmon_client_packets" lineno="36248">
<summary>
Send ionixnetmon_client packets.
</summary>
@@ -32679,7 +32496,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36144">
+<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36267">
<summary>
Do not audit attempts to send ionixnetmon_client packets.
</summary>
@@ -32690,7 +32507,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36163">
+<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36286">
<summary>
Receive ionixnetmon_client packets.
</summary>
@@ -32701,7 +32518,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36182">
+<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36305">
<summary>
Do not audit attempts to receive ionixnetmon_client packets.
</summary>
@@ -32712,7 +32529,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36201">
+<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36324">
<summary>
Send and receive ionixnetmon_client packets.
</summary>
@@ -32723,7 +32540,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36217">
+<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36340">
<summary>
Do not audit attempts to send and receive ionixnetmon_client packets.
</summary>
@@ -32734,7 +32551,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36232">
+<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36355">
<summary>
Relabel packets to ionixnetmon_client the packet type.
</summary>
@@ -32744,7 +32561,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ionixnetmon_server_packets" lineno="36252">
+<interface name="corenet_send_ionixnetmon_server_packets" lineno="36375">
<summary>
Send ionixnetmon_server packets.
</summary>
@@ -32755,7 +32572,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36271">
+<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36394">
<summary>
Do not audit attempts to send ionixnetmon_server packets.
</summary>
@@ -32766,7 +32583,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36290">
+<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36413">
<summary>
Receive ionixnetmon_server packets.
</summary>
@@ -32777,7 +32594,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36309">
+<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36432">
<summary>
Do not audit attempts to receive ionixnetmon_server packets.
</summary>
@@ -32788,7 +32605,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36328">
+<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36451">
<summary>
Send and receive ionixnetmon_server packets.
</summary>
@@ -32799,7 +32616,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36344">
+<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36467">
<summary>
Do not audit attempts to send and receive ionixnetmon_server packets.
</summary>
@@ -32810,7 +32627,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36359">
+<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36482">
<summary>
Relabel packets to ionixnetmon_server the packet type.
</summary>
@@ -32820,7 +32637,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36381">
+<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36504">
<summary>
Send and receive TCP traffic on the ipmi port.
</summary>
@@ -32831,7 +32648,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ipmi_port" lineno="36396">
+<interface name="corenet_udp_send_ipmi_port" lineno="36519">
<summary>
Send UDP traffic on the ipmi port.
</summary>
@@ -32842,7 +32659,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36411">
+<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36534">
<summary>
Do not audit attempts to send UDP traffic on the ipmi port.
</summary>
@@ -32853,7 +32670,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ipmi_port" lineno="36426">
+<interface name="corenet_udp_receive_ipmi_port" lineno="36549">
<summary>
Receive UDP traffic on the ipmi port.
</summary>
@@ -32864,7 +32681,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36441">
+<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36564">
<summary>
Do not audit attempts to receive UDP traffic on the ipmi port.
</summary>
@@ -32875,7 +32692,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36456">
+<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36579">
<summary>
Send and receive UDP traffic on the ipmi port.
</summary>
@@ -32886,7 +32703,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36472">
+<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36595">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ipmi port.
@@ -32898,7 +32715,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ipmi_port" lineno="36487">
+<interface name="corenet_tcp_bind_ipmi_port" lineno="36610">
<summary>
Bind TCP sockets to the ipmi port.
</summary>
@@ -32909,7 +32726,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ipmi_port" lineno="36507">
+<interface name="corenet_udp_bind_ipmi_port" lineno="36630">
<summary>
Bind UDP sockets to the ipmi port.
</summary>
@@ -32920,7 +32737,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ipmi_port" lineno="36526">
+<interface name="corenet_tcp_connect_ipmi_port" lineno="36649">
<summary>
Make a TCP connection to the ipmi port.
</summary>
@@ -32930,7 +32747,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipmi_client_packets" lineno="36546">
+<interface name="corenet_send_ipmi_client_packets" lineno="36669">
<summary>
Send ipmi_client packets.
</summary>
@@ -32941,7 +32758,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36565">
+<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36688">
<summary>
Do not audit attempts to send ipmi_client packets.
</summary>
@@ -32952,7 +32769,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipmi_client_packets" lineno="36584">
+<interface name="corenet_receive_ipmi_client_packets" lineno="36707">
<summary>
Receive ipmi_client packets.
</summary>
@@ -32963,7 +32780,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36603">
+<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36726">
<summary>
Do not audit attempts to receive ipmi_client packets.
</summary>
@@ -32974,7 +32791,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36622">
+<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36745">
<summary>
Send and receive ipmi_client packets.
</summary>
@@ -32985,7 +32802,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36638">
+<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36761">
<summary>
Do not audit attempts to send and receive ipmi_client packets.
</summary>
@@ -32996,7 +32813,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipmi_client_packets" lineno="36653">
+<interface name="corenet_relabelto_ipmi_client_packets" lineno="36776">
<summary>
Relabel packets to ipmi_client the packet type.
</summary>
@@ -33006,7 +32823,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipmi_server_packets" lineno="36673">
+<interface name="corenet_send_ipmi_server_packets" lineno="36796">
<summary>
Send ipmi_server packets.
</summary>
@@ -33017,7 +32834,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36692">
+<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36815">
<summary>
Do not audit attempts to send ipmi_server packets.
</summary>
@@ -33028,7 +32845,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipmi_server_packets" lineno="36711">
+<interface name="corenet_receive_ipmi_server_packets" lineno="36834">
<summary>
Receive ipmi_server packets.
</summary>
@@ -33039,7 +32856,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36730">
+<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36853">
<summary>
Do not audit attempts to receive ipmi_server packets.
</summary>
@@ -33050,7 +32867,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36749">
+<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36872">
<summary>
Send and receive ipmi_server packets.
</summary>
@@ -33061,7 +32878,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36765">
+<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36888">
<summary>
Do not audit attempts to send and receive ipmi_server packets.
</summary>
@@ -33072,7 +32889,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipmi_server_packets" lineno="36780">
+<interface name="corenet_relabelto_ipmi_server_packets" lineno="36903">
<summary>
Relabel packets to ipmi_server the packet type.
</summary>
@@ -33082,7 +32899,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36802">
+<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36925">
<summary>
Send and receive TCP traffic on the ipp port.
</summary>
@@ -33093,7 +32910,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ipp_port" lineno="36817">
+<interface name="corenet_udp_send_ipp_port" lineno="36940">
<summary>
Send UDP traffic on the ipp port.
</summary>
@@ -33104,7 +32921,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36832">
+<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36955">
<summary>
Do not audit attempts to send UDP traffic on the ipp port.
</summary>
@@ -33115,7 +32932,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ipp_port" lineno="36847">
+<interface name="corenet_udp_receive_ipp_port" lineno="36970">
<summary>
Receive UDP traffic on the ipp port.
</summary>
@@ -33126,7 +32943,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="36862">
+<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="36985">
<summary>
Do not audit attempts to receive UDP traffic on the ipp port.
</summary>
@@ -33137,7 +32954,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ipp_port" lineno="36877">
+<interface name="corenet_udp_sendrecv_ipp_port" lineno="37000">
<summary>
Send and receive UDP traffic on the ipp port.
</summary>
@@ -33148,7 +32965,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="36893">
+<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="37016">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ipp port.
@@ -33160,7 +32977,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ipp_port" lineno="36908">
+<interface name="corenet_tcp_bind_ipp_port" lineno="37031">
<summary>
Bind TCP sockets to the ipp port.
</summary>
@@ -33171,7 +32988,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ipp_port" lineno="36928">
+<interface name="corenet_udp_bind_ipp_port" lineno="37051">
<summary>
Bind UDP sockets to the ipp port.
</summary>
@@ -33182,7 +32999,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ipp_port" lineno="36947">
+<interface name="corenet_tcp_connect_ipp_port" lineno="37070">
<summary>
Make a TCP connection to the ipp port.
</summary>
@@ -33192,7 +33009,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipp_client_packets" lineno="36967">
+<interface name="corenet_send_ipp_client_packets" lineno="37090">
<summary>
Send ipp_client packets.
</summary>
@@ -33203,7 +33020,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="36986">
+<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="37109">
<summary>
Do not audit attempts to send ipp_client packets.
</summary>
@@ -33214,7 +33031,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipp_client_packets" lineno="37005">
+<interface name="corenet_receive_ipp_client_packets" lineno="37128">
<summary>
Receive ipp_client packets.
</summary>
@@ -33225,7 +33042,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37024">
+<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37147">
<summary>
Do not audit attempts to receive ipp_client packets.
</summary>
@@ -33236,7 +33053,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipp_client_packets" lineno="37043">
+<interface name="corenet_sendrecv_ipp_client_packets" lineno="37166">
<summary>
Send and receive ipp_client packets.
</summary>
@@ -33247,7 +33064,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37059">
+<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37182">
<summary>
Do not audit attempts to send and receive ipp_client packets.
</summary>
@@ -33258,7 +33075,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipp_client_packets" lineno="37074">
+<interface name="corenet_relabelto_ipp_client_packets" lineno="37197">
<summary>
Relabel packets to ipp_client the packet type.
</summary>
@@ -33268,7 +33085,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipp_server_packets" lineno="37094">
+<interface name="corenet_send_ipp_server_packets" lineno="37217">
<summary>
Send ipp_server packets.
</summary>
@@ -33279,7 +33096,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37113">
+<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37236">
<summary>
Do not audit attempts to send ipp_server packets.
</summary>
@@ -33290,7 +33107,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipp_server_packets" lineno="37132">
+<interface name="corenet_receive_ipp_server_packets" lineno="37255">
<summary>
Receive ipp_server packets.
</summary>
@@ -33301,7 +33118,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37151">
+<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37274">
<summary>
Do not audit attempts to receive ipp_server packets.
</summary>
@@ -33312,7 +33129,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipp_server_packets" lineno="37170">
+<interface name="corenet_sendrecv_ipp_server_packets" lineno="37293">
<summary>
Send and receive ipp_server packets.
</summary>
@@ -33323,7 +33140,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37186">
+<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37309">
<summary>
Do not audit attempts to send and receive ipp_server packets.
</summary>
@@ -33334,7 +33151,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipp_server_packets" lineno="37201">
+<interface name="corenet_relabelto_ipp_server_packets" lineno="37324">
<summary>
Relabel packets to ipp_server the packet type.
</summary>
@@ -33344,7 +33161,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37223">
+<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37346">
<summary>
Send and receive TCP traffic on the ipsecnat port.
</summary>
@@ -33355,7 +33172,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ipsecnat_port" lineno="37238">
+<interface name="corenet_udp_send_ipsecnat_port" lineno="37361">
<summary>
Send UDP traffic on the ipsecnat port.
</summary>
@@ -33366,7 +33183,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37253">
+<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37376">
<summary>
Do not audit attempts to send UDP traffic on the ipsecnat port.
</summary>
@@ -33377,7 +33194,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ipsecnat_port" lineno="37268">
+<interface name="corenet_udp_receive_ipsecnat_port" lineno="37391">
<summary>
Receive UDP traffic on the ipsecnat port.
</summary>
@@ -33388,7 +33205,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37283">
+<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37406">
<summary>
Do not audit attempts to receive UDP traffic on the ipsecnat port.
</summary>
@@ -33399,7 +33216,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37298">
+<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37421">
<summary>
Send and receive UDP traffic on the ipsecnat port.
</summary>
@@ -33410,7 +33227,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37314">
+<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37437">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ipsecnat port.
@@ -33422,7 +33239,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37329">
+<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37452">
<summary>
Bind TCP sockets to the ipsecnat port.
</summary>
@@ -33433,7 +33250,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ipsecnat_port" lineno="37349">
+<interface name="corenet_udp_bind_ipsecnat_port" lineno="37472">
<summary>
Bind UDP sockets to the ipsecnat port.
</summary>
@@ -33444,7 +33261,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37368">
+<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37491">
<summary>
Make a TCP connection to the ipsecnat port.
</summary>
@@ -33454,7 +33271,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipsecnat_client_packets" lineno="37388">
+<interface name="corenet_send_ipsecnat_client_packets" lineno="37511">
<summary>
Send ipsecnat_client packets.
</summary>
@@ -33465,7 +33282,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37407">
+<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37530">
<summary>
Do not audit attempts to send ipsecnat_client packets.
</summary>
@@ -33476,7 +33293,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipsecnat_client_packets" lineno="37426">
+<interface name="corenet_receive_ipsecnat_client_packets" lineno="37549">
<summary>
Receive ipsecnat_client packets.
</summary>
@@ -33487,7 +33304,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37445">
+<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37568">
<summary>
Do not audit attempts to receive ipsecnat_client packets.
</summary>
@@ -33498,7 +33315,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37464">
+<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37587">
<summary>
Send and receive ipsecnat_client packets.
</summary>
@@ -33509,7 +33326,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37480">
+<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37603">
<summary>
Do not audit attempts to send and receive ipsecnat_client packets.
</summary>
@@ -33520,7 +33337,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37495">
+<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37618">
<summary>
Relabel packets to ipsecnat_client the packet type.
</summary>
@@ -33530,7 +33347,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipsecnat_server_packets" lineno="37515">
+<interface name="corenet_send_ipsecnat_server_packets" lineno="37638">
<summary>
Send ipsecnat_server packets.
</summary>
@@ -33541,7 +33358,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37534">
+<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37657">
<summary>
Do not audit attempts to send ipsecnat_server packets.
</summary>
@@ -33552,7 +33369,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipsecnat_server_packets" lineno="37553">
+<interface name="corenet_receive_ipsecnat_server_packets" lineno="37676">
<summary>
Receive ipsecnat_server packets.
</summary>
@@ -33563,7 +33380,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37572">
+<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37695">
<summary>
Do not audit attempts to receive ipsecnat_server packets.
</summary>
@@ -33574,7 +33391,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37591">
+<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37714">
<summary>
Send and receive ipsecnat_server packets.
</summary>
@@ -33585,7 +33402,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37607">
+<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37730">
<summary>
Do not audit attempts to send and receive ipsecnat_server packets.
</summary>
@@ -33596,7 +33413,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37622">
+<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37745">
<summary>
Relabel packets to ipsecnat_server the packet type.
</summary>
@@ -33606,7 +33423,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37644">
+<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37767">
<summary>
Send and receive TCP traffic on the ircd port.
</summary>
@@ -33617,7 +33434,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ircd_port" lineno="37659">
+<interface name="corenet_udp_send_ircd_port" lineno="37782">
<summary>
Send UDP traffic on the ircd port.
</summary>
@@ -33628,7 +33445,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37674">
+<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37797">
<summary>
Do not audit attempts to send UDP traffic on the ircd port.
</summary>
@@ -33639,7 +33456,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ircd_port" lineno="37689">
+<interface name="corenet_udp_receive_ircd_port" lineno="37812">
<summary>
Receive UDP traffic on the ircd port.
</summary>
@@ -33650,7 +33467,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37704">
+<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37827">
<summary>
Do not audit attempts to receive UDP traffic on the ircd port.
</summary>
@@ -33661,7 +33478,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ircd_port" lineno="37719">
+<interface name="corenet_udp_sendrecv_ircd_port" lineno="37842">
<summary>
Send and receive UDP traffic on the ircd port.
</summary>
@@ -33672,7 +33489,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37735">
+<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37858">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ircd port.
@@ -33684,7 +33501,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ircd_port" lineno="37750">
+<interface name="corenet_tcp_bind_ircd_port" lineno="37873">
<summary>
Bind TCP sockets to the ircd port.
</summary>
@@ -33695,7 +33512,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ircd_port" lineno="37770">
+<interface name="corenet_udp_bind_ircd_port" lineno="37893">
<summary>
Bind UDP sockets to the ircd port.
</summary>
@@ -33706,7 +33523,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ircd_port" lineno="37789">
+<interface name="corenet_tcp_connect_ircd_port" lineno="37912">
<summary>
Make a TCP connection to the ircd port.
</summary>
@@ -33716,7 +33533,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ircd_client_packets" lineno="37809">
+<interface name="corenet_send_ircd_client_packets" lineno="37932">
<summary>
Send ircd_client packets.
</summary>
@@ -33727,7 +33544,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37828">
+<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37951">
<summary>
Do not audit attempts to send ircd_client packets.
</summary>
@@ -33738,7 +33555,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ircd_client_packets" lineno="37847">
+<interface name="corenet_receive_ircd_client_packets" lineno="37970">
<summary>
Receive ircd_client packets.
</summary>
@@ -33749,7 +33566,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="37866">
+<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="37989">
<summary>
Do not audit attempts to receive ircd_client packets.
</summary>
@@ -33760,7 +33577,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ircd_client_packets" lineno="37885">
+<interface name="corenet_sendrecv_ircd_client_packets" lineno="38008">
<summary>
Send and receive ircd_client packets.
</summary>
@@ -33771,7 +33588,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="37901">
+<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="38024">
<summary>
Do not audit attempts to send and receive ircd_client packets.
</summary>
@@ -33782,7 +33599,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ircd_client_packets" lineno="37916">
+<interface name="corenet_relabelto_ircd_client_packets" lineno="38039">
<summary>
Relabel packets to ircd_client the packet type.
</summary>
@@ -33792,7 +33609,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ircd_server_packets" lineno="37936">
+<interface name="corenet_send_ircd_server_packets" lineno="38059">
<summary>
Send ircd_server packets.
</summary>
@@ -33803,7 +33620,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="37955">
+<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="38078">
<summary>
Do not audit attempts to send ircd_server packets.
</summary>
@@ -33814,7 +33631,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ircd_server_packets" lineno="37974">
+<interface name="corenet_receive_ircd_server_packets" lineno="38097">
<summary>
Receive ircd_server packets.
</summary>
@@ -33825,7 +33642,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="37993">
+<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="38116">
<summary>
Do not audit attempts to receive ircd_server packets.
</summary>
@@ -33836,7 +33653,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ircd_server_packets" lineno="38012">
+<interface name="corenet_sendrecv_ircd_server_packets" lineno="38135">
<summary>
Send and receive ircd_server packets.
</summary>
@@ -33847,7 +33664,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38028">
+<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38151">
<summary>
Do not audit attempts to send and receive ircd_server packets.
</summary>
@@ -33858,7 +33675,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ircd_server_packets" lineno="38043">
+<interface name="corenet_relabelto_ircd_server_packets" lineno="38166">
<summary>
Relabel packets to ircd_server the packet type.
</summary>
@@ -33868,7 +33685,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38065">
+<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38188">
<summary>
Send and receive TCP traffic on the isakmp port.
</summary>
@@ -33879,7 +33696,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_isakmp_port" lineno="38080">
+<interface name="corenet_udp_send_isakmp_port" lineno="38203">
<summary>
Send UDP traffic on the isakmp port.
</summary>
@@ -33890,7 +33707,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38095">
+<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38218">
<summary>
Do not audit attempts to send UDP traffic on the isakmp port.
</summary>
@@ -33901,7 +33718,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_isakmp_port" lineno="38110">
+<interface name="corenet_udp_receive_isakmp_port" lineno="38233">
<summary>
Receive UDP traffic on the isakmp port.
</summary>
@@ -33912,7 +33729,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38125">
+<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38248">
<summary>
Do not audit attempts to receive UDP traffic on the isakmp port.
</summary>
@@ -33923,7 +33740,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38140">
+<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38263">
<summary>
Send and receive UDP traffic on the isakmp port.
</summary>
@@ -33934,7 +33751,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38156">
+<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38279">
<summary>
Do not audit attempts to send and receive
UDP traffic on the isakmp port.
@@ -33946,7 +33763,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_isakmp_port" lineno="38171">
+<interface name="corenet_tcp_bind_isakmp_port" lineno="38294">
<summary>
Bind TCP sockets to the isakmp port.
</summary>
@@ -33957,7 +33774,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_isakmp_port" lineno="38191">
+<interface name="corenet_udp_bind_isakmp_port" lineno="38314">
<summary>
Bind UDP sockets to the isakmp port.
</summary>
@@ -33968,7 +33785,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_isakmp_port" lineno="38210">
+<interface name="corenet_tcp_connect_isakmp_port" lineno="38333">
<summary>
Make a TCP connection to the isakmp port.
</summary>
@@ -33978,7 +33795,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isakmp_client_packets" lineno="38230">
+<interface name="corenet_send_isakmp_client_packets" lineno="38353">
<summary>
Send isakmp_client packets.
</summary>
@@ -33989,7 +33806,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38249">
+<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38372">
<summary>
Do not audit attempts to send isakmp_client packets.
</summary>
@@ -34000,7 +33817,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isakmp_client_packets" lineno="38268">
+<interface name="corenet_receive_isakmp_client_packets" lineno="38391">
<summary>
Receive isakmp_client packets.
</summary>
@@ -34011,7 +33828,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38287">
+<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38410">
<summary>
Do not audit attempts to receive isakmp_client packets.
</summary>
@@ -34022,7 +33839,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38306">
+<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38429">
<summary>
Send and receive isakmp_client packets.
</summary>
@@ -34033,7 +33850,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38322">
+<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38445">
<summary>
Do not audit attempts to send and receive isakmp_client packets.
</summary>
@@ -34044,7 +33861,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isakmp_client_packets" lineno="38337">
+<interface name="corenet_relabelto_isakmp_client_packets" lineno="38460">
<summary>
Relabel packets to isakmp_client the packet type.
</summary>
@@ -34054,7 +33871,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isakmp_server_packets" lineno="38357">
+<interface name="corenet_send_isakmp_server_packets" lineno="38480">
<summary>
Send isakmp_server packets.
</summary>
@@ -34065,7 +33882,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38376">
+<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38499">
<summary>
Do not audit attempts to send isakmp_server packets.
</summary>
@@ -34076,7 +33893,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isakmp_server_packets" lineno="38395">
+<interface name="corenet_receive_isakmp_server_packets" lineno="38518">
<summary>
Receive isakmp_server packets.
</summary>
@@ -34087,7 +33904,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38414">
+<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38537">
<summary>
Do not audit attempts to receive isakmp_server packets.
</summary>
@@ -34098,7 +33915,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38433">
+<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38556">
<summary>
Send and receive isakmp_server packets.
</summary>
@@ -34109,7 +33926,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38449">
+<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38572">
<summary>
Do not audit attempts to send and receive isakmp_server packets.
</summary>
@@ -34120,7 +33937,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isakmp_server_packets" lineno="38464">
+<interface name="corenet_relabelto_isakmp_server_packets" lineno="38587">
<summary>
Relabel packets to isakmp_server the packet type.
</summary>
@@ -34130,7 +33947,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38486">
+<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38609">
<summary>
Send and receive TCP traffic on the iscsi port.
</summary>
@@ -34141,7 +33958,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_iscsi_port" lineno="38501">
+<interface name="corenet_udp_send_iscsi_port" lineno="38624">
<summary>
Send UDP traffic on the iscsi port.
</summary>
@@ -34152,7 +33969,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38516">
+<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38639">
<summary>
Do not audit attempts to send UDP traffic on the iscsi port.
</summary>
@@ -34163,7 +33980,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_iscsi_port" lineno="38531">
+<interface name="corenet_udp_receive_iscsi_port" lineno="38654">
<summary>
Receive UDP traffic on the iscsi port.
</summary>
@@ -34174,7 +33991,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38546">
+<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38669">
<summary>
Do not audit attempts to receive UDP traffic on the iscsi port.
</summary>
@@ -34185,7 +34002,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38561">
+<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38684">
<summary>
Send and receive UDP traffic on the iscsi port.
</summary>
@@ -34196,7 +34013,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38577">
+<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38700">
<summary>
Do not audit attempts to send and receive
UDP traffic on the iscsi port.
@@ -34208,7 +34025,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_iscsi_port" lineno="38592">
+<interface name="corenet_tcp_bind_iscsi_port" lineno="38715">
<summary>
Bind TCP sockets to the iscsi port.
</summary>
@@ -34219,7 +34036,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_iscsi_port" lineno="38612">
+<interface name="corenet_udp_bind_iscsi_port" lineno="38735">
<summary>
Bind UDP sockets to the iscsi port.
</summary>
@@ -34230,7 +34047,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_iscsi_port" lineno="38631">
+<interface name="corenet_tcp_connect_iscsi_port" lineno="38754">
<summary>
Make a TCP connection to the iscsi port.
</summary>
@@ -34240,7 +34057,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_iscsi_client_packets" lineno="38651">
+<interface name="corenet_send_iscsi_client_packets" lineno="38774">
<summary>
Send iscsi_client packets.
</summary>
@@ -34251,7 +34068,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38670">
+<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38793">
<summary>
Do not audit attempts to send iscsi_client packets.
</summary>
@@ -34262,7 +34079,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_iscsi_client_packets" lineno="38689">
+<interface name="corenet_receive_iscsi_client_packets" lineno="38812">
<summary>
Receive iscsi_client packets.
</summary>
@@ -34273,7 +34090,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38708">
+<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38831">
<summary>
Do not audit attempts to receive iscsi_client packets.
</summary>
@@ -34284,7 +34101,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38727">
+<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38850">
<summary>
Send and receive iscsi_client packets.
</summary>
@@ -34295,7 +34112,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38743">
+<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38866">
<summary>
Do not audit attempts to send and receive iscsi_client packets.
</summary>
@@ -34306,7 +34123,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_iscsi_client_packets" lineno="38758">
+<interface name="corenet_relabelto_iscsi_client_packets" lineno="38881">
<summary>
Relabel packets to iscsi_client the packet type.
</summary>
@@ -34316,7 +34133,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_iscsi_server_packets" lineno="38778">
+<interface name="corenet_send_iscsi_server_packets" lineno="38901">
<summary>
Send iscsi_server packets.
</summary>
@@ -34327,7 +34144,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38797">
+<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38920">
<summary>
Do not audit attempts to send iscsi_server packets.
</summary>
@@ -34338,7 +34155,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_iscsi_server_packets" lineno="38816">
+<interface name="corenet_receive_iscsi_server_packets" lineno="38939">
<summary>
Receive iscsi_server packets.
</summary>
@@ -34349,7 +34166,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38835">
+<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38958">
<summary>
Do not audit attempts to receive iscsi_server packets.
</summary>
@@ -34360,7 +34177,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38854">
+<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38977">
<summary>
Send and receive iscsi_server packets.
</summary>
@@ -34371,7 +34188,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="38870">
+<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="38993">
<summary>
Do not audit attempts to send and receive iscsi_server packets.
</summary>
@@ -34382,7 +34199,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_iscsi_server_packets" lineno="38885">
+<interface name="corenet_relabelto_iscsi_server_packets" lineno="39008">
<summary>
Relabel packets to iscsi_server the packet type.
</summary>
@@ -34392,7 +34209,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_isns_port" lineno="38907">
+<interface name="corenet_tcp_sendrecv_isns_port" lineno="39030">
<summary>
Send and receive TCP traffic on the isns port.
</summary>
@@ -34403,7 +34220,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_isns_port" lineno="38922">
+<interface name="corenet_udp_send_isns_port" lineno="39045">
<summary>
Send UDP traffic on the isns port.
</summary>
@@ -34414,7 +34231,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_isns_port" lineno="38937">
+<interface name="corenet_dontaudit_udp_send_isns_port" lineno="39060">
<summary>
Do not audit attempts to send UDP traffic on the isns port.
</summary>
@@ -34425,7 +34242,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_isns_port" lineno="38952">
+<interface name="corenet_udp_receive_isns_port" lineno="39075">
<summary>
Receive UDP traffic on the isns port.
</summary>
@@ -34436,7 +34253,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="38967">
+<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="39090">
<summary>
Do not audit attempts to receive UDP traffic on the isns port.
</summary>
@@ -34447,7 +34264,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_isns_port" lineno="38982">
+<interface name="corenet_udp_sendrecv_isns_port" lineno="39105">
<summary>
Send and receive UDP traffic on the isns port.
</summary>
@@ -34458,7 +34275,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="38998">
+<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="39121">
<summary>
Do not audit attempts to send and receive
UDP traffic on the isns port.
@@ -34470,7 +34287,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_isns_port" lineno="39013">
+<interface name="corenet_tcp_bind_isns_port" lineno="39136">
<summary>
Bind TCP sockets to the isns port.
</summary>
@@ -34481,7 +34298,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_isns_port" lineno="39033">
+<interface name="corenet_udp_bind_isns_port" lineno="39156">
<summary>
Bind UDP sockets to the isns port.
</summary>
@@ -34492,7 +34309,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_isns_port" lineno="39052">
+<interface name="corenet_tcp_connect_isns_port" lineno="39175">
<summary>
Make a TCP connection to the isns port.
</summary>
@@ -34502,7 +34319,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isns_client_packets" lineno="39072">
+<interface name="corenet_send_isns_client_packets" lineno="39195">
<summary>
Send isns_client packets.
</summary>
@@ -34513,7 +34330,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39091">
+<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39214">
<summary>
Do not audit attempts to send isns_client packets.
</summary>
@@ -34524,7 +34341,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isns_client_packets" lineno="39110">
+<interface name="corenet_receive_isns_client_packets" lineno="39233">
<summary>
Receive isns_client packets.
</summary>
@@ -34535,7 +34352,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39129">
+<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39252">
<summary>
Do not audit attempts to receive isns_client packets.
</summary>
@@ -34546,7 +34363,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isns_client_packets" lineno="39148">
+<interface name="corenet_sendrecv_isns_client_packets" lineno="39271">
<summary>
Send and receive isns_client packets.
</summary>
@@ -34557,7 +34374,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39164">
+<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39287">
<summary>
Do not audit attempts to send and receive isns_client packets.
</summary>
@@ -34568,7 +34385,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isns_client_packets" lineno="39179">
+<interface name="corenet_relabelto_isns_client_packets" lineno="39302">
<summary>
Relabel packets to isns_client the packet type.
</summary>
@@ -34578,7 +34395,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isns_server_packets" lineno="39199">
+<interface name="corenet_send_isns_server_packets" lineno="39322">
<summary>
Send isns_server packets.
</summary>
@@ -34589,7 +34406,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39218">
+<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39341">
<summary>
Do not audit attempts to send isns_server packets.
</summary>
@@ -34600,7 +34417,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isns_server_packets" lineno="39237">
+<interface name="corenet_receive_isns_server_packets" lineno="39360">
<summary>
Receive isns_server packets.
</summary>
@@ -34611,7 +34428,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39256">
+<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39379">
<summary>
Do not audit attempts to receive isns_server packets.
</summary>
@@ -34622,7 +34439,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isns_server_packets" lineno="39275">
+<interface name="corenet_sendrecv_isns_server_packets" lineno="39398">
<summary>
Send and receive isns_server packets.
</summary>
@@ -34633,7 +34450,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39291">
+<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39414">
<summary>
Do not audit attempts to send and receive isns_server packets.
</summary>
@@ -34644,7 +34461,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isns_server_packets" lineno="39306">
+<interface name="corenet_relabelto_isns_server_packets" lineno="39429">
<summary>
Relabel packets to isns_server the packet type.
</summary>
@@ -34654,7 +34471,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39328">
+<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39451">
<summary>
Send and receive TCP traffic on the jabber_client port.
</summary>
@@ -34665,7 +34482,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_jabber_client_port" lineno="39343">
+<interface name="corenet_udp_send_jabber_client_port" lineno="39466">
<summary>
Send UDP traffic on the jabber_client port.
</summary>
@@ -34676,7 +34493,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39358">
+<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39481">
<summary>
Do not audit attempts to send UDP traffic on the jabber_client port.
</summary>
@@ -34687,7 +34504,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_jabber_client_port" lineno="39373">
+<interface name="corenet_udp_receive_jabber_client_port" lineno="39496">
<summary>
Receive UDP traffic on the jabber_client port.
</summary>
@@ -34698,7 +34515,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39388">
+<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39511">
<summary>
Do not audit attempts to receive UDP traffic on the jabber_client port.
</summary>
@@ -34709,7 +34526,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39403">
+<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39526">
<summary>
Send and receive UDP traffic on the jabber_client port.
</summary>
@@ -34720,7 +34537,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39419">
+<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39542">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jabber_client port.
@@ -34732,7 +34549,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_jabber_client_port" lineno="39434">
+<interface name="corenet_tcp_bind_jabber_client_port" lineno="39557">
<summary>
Bind TCP sockets to the jabber_client port.
</summary>
@@ -34743,7 +34560,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_jabber_client_port" lineno="39454">
+<interface name="corenet_udp_bind_jabber_client_port" lineno="39577">
<summary>
Bind UDP sockets to the jabber_client port.
</summary>
@@ -34754,7 +34571,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_jabber_client_port" lineno="39473">
+<interface name="corenet_tcp_connect_jabber_client_port" lineno="39596">
<summary>
Make a TCP connection to the jabber_client port.
</summary>
@@ -34764,7 +34581,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_client_client_packets" lineno="39493">
+<interface name="corenet_send_jabber_client_client_packets" lineno="39616">
<summary>
Send jabber_client_client packets.
</summary>
@@ -34775,7 +34592,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39512">
+<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39635">
<summary>
Do not audit attempts to send jabber_client_client packets.
</summary>
@@ -34786,7 +34603,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_client_client_packets" lineno="39531">
+<interface name="corenet_receive_jabber_client_client_packets" lineno="39654">
<summary>
Receive jabber_client_client packets.
</summary>
@@ -34797,7 +34614,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39550">
+<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39673">
<summary>
Do not audit attempts to receive jabber_client_client packets.
</summary>
@@ -34808,7 +34625,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39569">
+<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39692">
<summary>
Send and receive jabber_client_client packets.
</summary>
@@ -34819,7 +34636,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39585">
+<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39708">
<summary>
Do not audit attempts to send and receive jabber_client_client packets.
</summary>
@@ -34830,7 +34647,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39600">
+<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39723">
<summary>
Relabel packets to jabber_client_client the packet type.
</summary>
@@ -34840,7 +34657,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_client_server_packets" lineno="39620">
+<interface name="corenet_send_jabber_client_server_packets" lineno="39743">
<summary>
Send jabber_client_server packets.
</summary>
@@ -34851,7 +34668,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39639">
+<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39762">
<summary>
Do not audit attempts to send jabber_client_server packets.
</summary>
@@ -34862,7 +34679,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_client_server_packets" lineno="39658">
+<interface name="corenet_receive_jabber_client_server_packets" lineno="39781">
<summary>
Receive jabber_client_server packets.
</summary>
@@ -34873,7 +34690,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39677">
+<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39800">
<summary>
Do not audit attempts to receive jabber_client_server packets.
</summary>
@@ -34884,7 +34701,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39696">
+<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39819">
<summary>
Send and receive jabber_client_server packets.
</summary>
@@ -34895,7 +34712,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39712">
+<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39835">
<summary>
Do not audit attempts to send and receive jabber_client_server packets.
</summary>
@@ -34906,7 +34723,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39727">
+<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39850">
<summary>
Relabel packets to jabber_client_server the packet type.
</summary>
@@ -34916,7 +34733,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39749">
+<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39872">
<summary>
Send and receive TCP traffic on the jabber_interserver port.
</summary>
@@ -34927,7 +34744,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_jabber_interserver_port" lineno="39764">
+<interface name="corenet_udp_send_jabber_interserver_port" lineno="39887">
<summary>
Send UDP traffic on the jabber_interserver port.
</summary>
@@ -34938,7 +34755,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39779">
+<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39902">
<summary>
Do not audit attempts to send UDP traffic on the jabber_interserver port.
</summary>
@@ -34949,7 +34766,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39794">
+<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39917">
<summary>
Receive UDP traffic on the jabber_interserver port.
</summary>
@@ -34960,7 +34777,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39809">
+<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39932">
<summary>
Do not audit attempts to receive UDP traffic on the jabber_interserver port.
</summary>
@@ -34971,7 +34788,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39824">
+<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39947">
<summary>
Send and receive UDP traffic on the jabber_interserver port.
</summary>
@@ -34982,7 +34799,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39840">
+<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39963">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jabber_interserver port.
@@ -34994,7 +34811,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39855">
+<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39978">
<summary>
Bind TCP sockets to the jabber_interserver port.
</summary>
@@ -35005,7 +34822,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_jabber_interserver_port" lineno="39875">
+<interface name="corenet_udp_bind_jabber_interserver_port" lineno="39998">
<summary>
Bind UDP sockets to the jabber_interserver port.
</summary>
@@ -35016,7 +34833,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="39894">
+<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="40017">
<summary>
Make a TCP connection to the jabber_interserver port.
</summary>
@@ -35026,7 +34843,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_interserver_client_packets" lineno="39914">
+<interface name="corenet_send_jabber_interserver_client_packets" lineno="40037">
<summary>
Send jabber_interserver_client packets.
</summary>
@@ -35037,7 +34854,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="39933">
+<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="40056">
<summary>
Do not audit attempts to send jabber_interserver_client packets.
</summary>
@@ -35048,7 +34865,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_interserver_client_packets" lineno="39952">
+<interface name="corenet_receive_jabber_interserver_client_packets" lineno="40075">
<summary>
Receive jabber_interserver_client packets.
</summary>
@@ -35059,7 +34876,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="39971">
+<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="40094">
<summary>
Do not audit attempts to receive jabber_interserver_client packets.
</summary>
@@ -35070,7 +34887,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="39990">
+<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="40113">
<summary>
Send and receive jabber_interserver_client packets.
</summary>
@@ -35081,7 +34898,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40006">
+<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40129">
<summary>
Do not audit attempts to send and receive jabber_interserver_client packets.
</summary>
@@ -35092,7 +34909,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40021">
+<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40144">
<summary>
Relabel packets to jabber_interserver_client the packet type.
</summary>
@@ -35102,7 +34919,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_interserver_server_packets" lineno="40041">
+<interface name="corenet_send_jabber_interserver_server_packets" lineno="40164">
<summary>
Send jabber_interserver_server packets.
</summary>
@@ -35113,7 +34930,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40060">
+<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40183">
<summary>
Do not audit attempts to send jabber_interserver_server packets.
</summary>
@@ -35124,7 +34941,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40079">
+<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40202">
<summary>
Receive jabber_interserver_server packets.
</summary>
@@ -35135,7 +34952,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40098">
+<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40221">
<summary>
Do not audit attempts to receive jabber_interserver_server packets.
</summary>
@@ -35146,7 +34963,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40117">
+<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40240">
<summary>
Send and receive jabber_interserver_server packets.
</summary>
@@ -35157,7 +34974,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40133">
+<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40256">
<summary>
Do not audit attempts to send and receive jabber_interserver_server packets.
</summary>
@@ -35168,7 +34985,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40148">
+<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40271">
<summary>
Relabel packets to jabber_interserver_server the packet type.
</summary>
@@ -35178,7 +34995,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40170">
+<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40293">
<summary>
Send and receive TCP traffic on the jboss_iiop port.
</summary>
@@ -35189,7 +35006,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_jboss_iiop_port" lineno="40185">
+<interface name="corenet_udp_send_jboss_iiop_port" lineno="40308">
<summary>
Send UDP traffic on the jboss_iiop port.
</summary>
@@ -35200,7 +35017,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40200">
+<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40323">
<summary>
Do not audit attempts to send UDP traffic on the jboss_iiop port.
</summary>
@@ -35211,7 +35028,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40215">
+<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40338">
<summary>
Receive UDP traffic on the jboss_iiop port.
</summary>
@@ -35222,7 +35039,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40230">
+<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40353">
<summary>
Do not audit attempts to receive UDP traffic on the jboss_iiop port.
</summary>
@@ -35233,7 +35050,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40245">
+<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40368">
<summary>
Send and receive UDP traffic on the jboss_iiop port.
</summary>
@@ -35244,7 +35061,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40261">
+<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40384">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jboss_iiop port.
@@ -35256,7 +35073,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40276">
+<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40399">
<summary>
Bind TCP sockets to the jboss_iiop port.
</summary>
@@ -35267,7 +35084,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40296">
+<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40419">
<summary>
Bind UDP sockets to the jboss_iiop port.
</summary>
@@ -35278,7 +35095,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40315">
+<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40438">
<summary>
Make a TCP connection to the jboss_iiop port.
</summary>
@@ -35288,7 +35105,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jboss_iiop_client_packets" lineno="40335">
+<interface name="corenet_send_jboss_iiop_client_packets" lineno="40458">
<summary>
Send jboss_iiop_client packets.
</summary>
@@ -35299,7 +35116,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40354">
+<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40477">
<summary>
Do not audit attempts to send jboss_iiop_client packets.
</summary>
@@ -35310,7 +35127,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40373">
+<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40496">
<summary>
Receive jboss_iiop_client packets.
</summary>
@@ -35321,7 +35138,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40392">
+<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40515">
<summary>
Do not audit attempts to receive jboss_iiop_client packets.
</summary>
@@ -35332,7 +35149,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40411">
+<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40534">
<summary>
Send and receive jboss_iiop_client packets.
</summary>
@@ -35343,7 +35160,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40427">
+<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40550">
<summary>
Do not audit attempts to send and receive jboss_iiop_client packets.
</summary>
@@ -35354,7 +35171,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40442">
+<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40565">
<summary>
Relabel packets to jboss_iiop_client the packet type.
</summary>
@@ -35364,7 +35181,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jboss_iiop_server_packets" lineno="40462">
+<interface name="corenet_send_jboss_iiop_server_packets" lineno="40585">
<summary>
Send jboss_iiop_server packets.
</summary>
@@ -35375,7 +35192,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40481">
+<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40604">
<summary>
Do not audit attempts to send jboss_iiop_server packets.
</summary>
@@ -35386,7 +35203,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40500">
+<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40623">
<summary>
Receive jboss_iiop_server packets.
</summary>
@@ -35397,7 +35214,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40519">
+<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40642">
<summary>
Do not audit attempts to receive jboss_iiop_server packets.
</summary>
@@ -35408,7 +35225,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40538">
+<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40661">
<summary>
Send and receive jboss_iiop_server packets.
</summary>
@@ -35419,7 +35236,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40554">
+<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40677">
<summary>
Do not audit attempts to send and receive jboss_iiop_server packets.
</summary>
@@ -35430,7 +35247,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40569">
+<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40692">
<summary>
Relabel packets to jboss_iiop_server the packet type.
</summary>
@@ -35440,7 +35257,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40591">
+<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40714">
<summary>
Send and receive TCP traffic on the kerberos port.
</summary>
@@ -35451,7 +35268,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kerberos_port" lineno="40606">
+<interface name="corenet_udp_send_kerberos_port" lineno="40729">
<summary>
Send UDP traffic on the kerberos port.
</summary>
@@ -35462,7 +35279,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40621">
+<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40744">
<summary>
Do not audit attempts to send UDP traffic on the kerberos port.
</summary>
@@ -35473,7 +35290,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kerberos_port" lineno="40636">
+<interface name="corenet_udp_receive_kerberos_port" lineno="40759">
<summary>
Receive UDP traffic on the kerberos port.
</summary>
@@ -35484,7 +35301,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40651">
+<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40774">
<summary>
Do not audit attempts to receive UDP traffic on the kerberos port.
</summary>
@@ -35495,7 +35312,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40666">
+<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40789">
<summary>
Send and receive UDP traffic on the kerberos port.
</summary>
@@ -35506,7 +35323,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40682">
+<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40805">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kerberos port.
@@ -35518,7 +35335,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kerberos_port" lineno="40697">
+<interface name="corenet_tcp_bind_kerberos_port" lineno="40820">
<summary>
Bind TCP sockets to the kerberos port.
</summary>
@@ -35529,7 +35346,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kerberos_port" lineno="40717">
+<interface name="corenet_udp_bind_kerberos_port" lineno="40840">
<summary>
Bind UDP sockets to the kerberos port.
</summary>
@@ -35540,7 +35357,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kerberos_port" lineno="40736">
+<interface name="corenet_tcp_connect_kerberos_port" lineno="40859">
<summary>
Make a TCP connection to the kerberos port.
</summary>
@@ -35550,7 +35367,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_client_packets" lineno="40756">
+<interface name="corenet_send_kerberos_client_packets" lineno="40879">
<summary>
Send kerberos_client packets.
</summary>
@@ -35561,7 +35378,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40775">
+<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40898">
<summary>
Do not audit attempts to send kerberos_client packets.
</summary>
@@ -35572,7 +35389,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_client_packets" lineno="40794">
+<interface name="corenet_receive_kerberos_client_packets" lineno="40917">
<summary>
Receive kerberos_client packets.
</summary>
@@ -35583,7 +35400,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40813">
+<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40936">
<summary>
Do not audit attempts to receive kerberos_client packets.
</summary>
@@ -35594,7 +35411,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40832">
+<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40955">
<summary>
Send and receive kerberos_client packets.
</summary>
@@ -35605,7 +35422,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40848">
+<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40971">
<summary>
Do not audit attempts to send and receive kerberos_client packets.
</summary>
@@ -35616,7 +35433,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_client_packets" lineno="40863">
+<interface name="corenet_relabelto_kerberos_client_packets" lineno="40986">
<summary>
Relabel packets to kerberos_client the packet type.
</summary>
@@ -35626,7 +35443,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_server_packets" lineno="40883">
+<interface name="corenet_send_kerberos_server_packets" lineno="41006">
<summary>
Send kerberos_server packets.
</summary>
@@ -35637,7 +35454,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="40902">
+<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="41025">
<summary>
Do not audit attempts to send kerberos_server packets.
</summary>
@@ -35648,7 +35465,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_server_packets" lineno="40921">
+<interface name="corenet_receive_kerberos_server_packets" lineno="41044">
<summary>
Receive kerberos_server packets.
</summary>
@@ -35659,7 +35476,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="40940">
+<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="41063">
<summary>
Do not audit attempts to receive kerberos_server packets.
</summary>
@@ -35670,7 +35487,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_server_packets" lineno="40959">
+<interface name="corenet_sendrecv_kerberos_server_packets" lineno="41082">
<summary>
Send and receive kerberos_server packets.
</summary>
@@ -35681,7 +35498,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="40975">
+<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="41098">
<summary>
Do not audit attempts to send and receive kerberos_server packets.
</summary>
@@ -35692,7 +35509,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_server_packets" lineno="40990">
+<interface name="corenet_relabelto_kerberos_server_packets" lineno="41113">
<summary>
Relabel packets to kerberos_server the packet type.
</summary>
@@ -35702,7 +35519,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41012">
+<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41135">
<summary>
Send and receive TCP traffic on the kerberos_admin port.
</summary>
@@ -35713,7 +35530,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kerberos_admin_port" lineno="41027">
+<interface name="corenet_udp_send_kerberos_admin_port" lineno="41150">
<summary>
Send UDP traffic on the kerberos_admin port.
</summary>
@@ -35724,7 +35541,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41042">
+<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41165">
<summary>
Do not audit attempts to send UDP traffic on the kerberos_admin port.
</summary>
@@ -35735,7 +35552,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41057">
+<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41180">
<summary>
Receive UDP traffic on the kerberos_admin port.
</summary>
@@ -35746,7 +35563,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41072">
+<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41195">
<summary>
Do not audit attempts to receive UDP traffic on the kerberos_admin port.
</summary>
@@ -35757,7 +35574,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41087">
+<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41210">
<summary>
Send and receive UDP traffic on the kerberos_admin port.
</summary>
@@ -35768,7 +35585,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41103">
+<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41226">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kerberos_admin port.
@@ -35780,7 +35597,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41118">
+<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41241">
<summary>
Bind TCP sockets to the kerberos_admin port.
</summary>
@@ -35791,7 +35608,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41138">
+<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41261">
<summary>
Bind UDP sockets to the kerberos_admin port.
</summary>
@@ -35802,7 +35619,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41157">
+<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41280">
<summary>
Make a TCP connection to the kerberos_admin port.
</summary>
@@ -35812,7 +35629,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_admin_client_packets" lineno="41177">
+<interface name="corenet_send_kerberos_admin_client_packets" lineno="41300">
<summary>
Send kerberos_admin_client packets.
</summary>
@@ -35823,7 +35640,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41196">
+<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41319">
<summary>
Do not audit attempts to send kerberos_admin_client packets.
</summary>
@@ -35834,7 +35651,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41215">
+<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41338">
<summary>
Receive kerberos_admin_client packets.
</summary>
@@ -35845,7 +35662,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41234">
+<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41357">
<summary>
Do not audit attempts to receive kerberos_admin_client packets.
</summary>
@@ -35856,7 +35673,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41253">
+<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41376">
<summary>
Send and receive kerberos_admin_client packets.
</summary>
@@ -35867,7 +35684,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41269">
+<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41392">
<summary>
Do not audit attempts to send and receive kerberos_admin_client packets.
</summary>
@@ -35878,7 +35695,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41284">
+<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41407">
<summary>
Relabel packets to kerberos_admin_client the packet type.
</summary>
@@ -35888,7 +35705,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_admin_server_packets" lineno="41304">
+<interface name="corenet_send_kerberos_admin_server_packets" lineno="41427">
<summary>
Send kerberos_admin_server packets.
</summary>
@@ -35899,7 +35716,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41323">
+<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41446">
<summary>
Do not audit attempts to send kerberos_admin_server packets.
</summary>
@@ -35910,7 +35727,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41342">
+<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41465">
<summary>
Receive kerberos_admin_server packets.
</summary>
@@ -35921,7 +35738,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41361">
+<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41484">
<summary>
Do not audit attempts to receive kerberos_admin_server packets.
</summary>
@@ -35932,7 +35749,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41380">
+<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41503">
<summary>
Send and receive kerberos_admin_server packets.
</summary>
@@ -35943,7 +35760,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41396">
+<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41519">
<summary>
Do not audit attempts to send and receive kerberos_admin_server packets.
</summary>
@@ -35954,7 +35771,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41411">
+<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41534">
<summary>
Relabel packets to kerberos_admin_server the packet type.
</summary>
@@ -35964,7 +35781,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41433">
+<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41556">
<summary>
Send and receive TCP traffic on the kerberos_master port.
</summary>
@@ -35975,7 +35792,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kerberos_master_port" lineno="41448">
+<interface name="corenet_udp_send_kerberos_master_port" lineno="41571">
<summary>
Send UDP traffic on the kerberos_master port.
</summary>
@@ -35986,7 +35803,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41463">
+<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41586">
<summary>
Do not audit attempts to send UDP traffic on the kerberos_master port.
</summary>
@@ -35997,7 +35814,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kerberos_master_port" lineno="41478">
+<interface name="corenet_udp_receive_kerberos_master_port" lineno="41601">
<summary>
Receive UDP traffic on the kerberos_master port.
</summary>
@@ -36008,7 +35825,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41493">
+<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41616">
<summary>
Do not audit attempts to receive UDP traffic on the kerberos_master port.
</summary>
@@ -36019,7 +35836,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41508">
+<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41631">
<summary>
Send and receive UDP traffic on the kerberos_master port.
</summary>
@@ -36030,7 +35847,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41524">
+<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41647">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kerberos_master port.
@@ -36042,7 +35859,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41539">
+<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41662">
<summary>
Bind TCP sockets to the kerberos_master port.
</summary>
@@ -36053,7 +35870,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kerberos_master_port" lineno="41559">
+<interface name="corenet_udp_bind_kerberos_master_port" lineno="41682">
<summary>
Bind UDP sockets to the kerberos_master port.
</summary>
@@ -36064,7 +35881,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41578">
+<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41701">
<summary>
Make a TCP connection to the kerberos_master port.
</summary>
@@ -36074,7 +35891,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_master_client_packets" lineno="41598">
+<interface name="corenet_send_kerberos_master_client_packets" lineno="41721">
<summary>
Send kerberos_master_client packets.
</summary>
@@ -36085,7 +35902,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41617">
+<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41740">
<summary>
Do not audit attempts to send kerberos_master_client packets.
</summary>
@@ -36096,7 +35913,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_master_client_packets" lineno="41636">
+<interface name="corenet_receive_kerberos_master_client_packets" lineno="41759">
<summary>
Receive kerberos_master_client packets.
</summary>
@@ -36107,7 +35924,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41655">
+<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41778">
<summary>
Do not audit attempts to receive kerberos_master_client packets.
</summary>
@@ -36118,7 +35935,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41674">
+<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41797">
<summary>
Send and receive kerberos_master_client packets.
</summary>
@@ -36129,7 +35946,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41690">
+<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41813">
<summary>
Do not audit attempts to send and receive kerberos_master_client packets.
</summary>
@@ -36140,7 +35957,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41705">
+<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41828">
<summary>
Relabel packets to kerberos_master_client the packet type.
</summary>
@@ -36150,7 +35967,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_master_server_packets" lineno="41725">
+<interface name="corenet_send_kerberos_master_server_packets" lineno="41848">
<summary>
Send kerberos_master_server packets.
</summary>
@@ -36161,7 +35978,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41744">
+<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41867">
<summary>
Do not audit attempts to send kerberos_master_server packets.
</summary>
@@ -36172,7 +35989,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_master_server_packets" lineno="41763">
+<interface name="corenet_receive_kerberos_master_server_packets" lineno="41886">
<summary>
Receive kerberos_master_server packets.
</summary>
@@ -36183,7 +36000,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41782">
+<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41905">
<summary>
Do not audit attempts to receive kerberos_master_server packets.
</summary>
@@ -36194,7 +36011,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41801">
+<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41924">
<summary>
Send and receive kerberos_master_server packets.
</summary>
@@ -36205,7 +36022,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41817">
+<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41940">
<summary>
Do not audit attempts to send and receive kerberos_master_server packets.
</summary>
@@ -36216,7 +36033,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41832">
+<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41955">
<summary>
Relabel packets to kerberos_master_server the packet type.
</summary>
@@ -36226,7 +36043,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41854">
+<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41977">
<summary>
Send and receive TCP traffic on the kismet port.
</summary>
@@ -36237,7 +36054,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kismet_port" lineno="41869">
+<interface name="corenet_udp_send_kismet_port" lineno="41992">
<summary>
Send UDP traffic on the kismet port.
</summary>
@@ -36248,7 +36065,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="41884">
+<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="42007">
<summary>
Do not audit attempts to send UDP traffic on the kismet port.
</summary>
@@ -36259,7 +36076,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kismet_port" lineno="41899">
+<interface name="corenet_udp_receive_kismet_port" lineno="42022">
<summary>
Receive UDP traffic on the kismet port.
</summary>
@@ -36270,7 +36087,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="41914">
+<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="42037">
<summary>
Do not audit attempts to receive UDP traffic on the kismet port.
</summary>
@@ -36281,7 +36098,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kismet_port" lineno="41929">
+<interface name="corenet_udp_sendrecv_kismet_port" lineno="42052">
<summary>
Send and receive UDP traffic on the kismet port.
</summary>
@@ -36292,7 +36109,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="41945">
+<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="42068">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kismet port.
@@ -36304,7 +36121,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kismet_port" lineno="41960">
+<interface name="corenet_tcp_bind_kismet_port" lineno="42083">
<summary>
Bind TCP sockets to the kismet port.
</summary>
@@ -36315,7 +36132,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kismet_port" lineno="41980">
+<interface name="corenet_udp_bind_kismet_port" lineno="42103">
<summary>
Bind UDP sockets to the kismet port.
</summary>
@@ -36326,7 +36143,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kismet_port" lineno="41999">
+<interface name="corenet_tcp_connect_kismet_port" lineno="42122">
<summary>
Make a TCP connection to the kismet port.
</summary>
@@ -36336,7 +36153,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kismet_client_packets" lineno="42019">
+<interface name="corenet_send_kismet_client_packets" lineno="42142">
<summary>
Send kismet_client packets.
</summary>
@@ -36347,7 +36164,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42038">
+<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42161">
<summary>
Do not audit attempts to send kismet_client packets.
</summary>
@@ -36358,7 +36175,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kismet_client_packets" lineno="42057">
+<interface name="corenet_receive_kismet_client_packets" lineno="42180">
<summary>
Receive kismet_client packets.
</summary>
@@ -36369,7 +36186,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42076">
+<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42199">
<summary>
Do not audit attempts to receive kismet_client packets.
</summary>
@@ -36380,7 +36197,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kismet_client_packets" lineno="42095">
+<interface name="corenet_sendrecv_kismet_client_packets" lineno="42218">
<summary>
Send and receive kismet_client packets.
</summary>
@@ -36391,7 +36208,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42111">
+<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42234">
<summary>
Do not audit attempts to send and receive kismet_client packets.
</summary>
@@ -36402,7 +36219,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kismet_client_packets" lineno="42126">
+<interface name="corenet_relabelto_kismet_client_packets" lineno="42249">
<summary>
Relabel packets to kismet_client the packet type.
</summary>
@@ -36412,7 +36229,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kismet_server_packets" lineno="42146">
+<interface name="corenet_send_kismet_server_packets" lineno="42269">
<summary>
Send kismet_server packets.
</summary>
@@ -36423,7 +36240,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42165">
+<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42288">
<summary>
Do not audit attempts to send kismet_server packets.
</summary>
@@ -36434,7 +36251,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kismet_server_packets" lineno="42184">
+<interface name="corenet_receive_kismet_server_packets" lineno="42307">
<summary>
Receive kismet_server packets.
</summary>
@@ -36445,7 +36262,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42203">
+<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42326">
<summary>
Do not audit attempts to receive kismet_server packets.
</summary>
@@ -36456,7 +36273,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kismet_server_packets" lineno="42222">
+<interface name="corenet_sendrecv_kismet_server_packets" lineno="42345">
<summary>
Send and receive kismet_server packets.
</summary>
@@ -36467,7 +36284,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42238">
+<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42361">
<summary>
Do not audit attempts to send and receive kismet_server packets.
</summary>
@@ -36478,7 +36295,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kismet_server_packets" lineno="42253">
+<interface name="corenet_relabelto_kismet_server_packets" lineno="42376">
<summary>
Relabel packets to kismet_server the packet type.
</summary>
@@ -36488,7 +36305,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42275">
+<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42398">
<summary>
Send and receive TCP traffic on the kdeconnect port.
</summary>
@@ -36499,7 +36316,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kdeconnect_port" lineno="42290">
+<interface name="corenet_udp_send_kdeconnect_port" lineno="42413">
<summary>
Send UDP traffic on the kdeconnect port.
</summary>
@@ -36510,7 +36327,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42305">
+<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42428">
<summary>
Do not audit attempts to send UDP traffic on the kdeconnect port.
</summary>
@@ -36521,7 +36338,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kdeconnect_port" lineno="42320">
+<interface name="corenet_udp_receive_kdeconnect_port" lineno="42443">
<summary>
Receive UDP traffic on the kdeconnect port.
</summary>
@@ -36532,7 +36349,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42335">
+<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42458">
<summary>
Do not audit attempts to receive UDP traffic on the kdeconnect port.
</summary>
@@ -36543,7 +36360,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42350">
+<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42473">
<summary>
Send and receive UDP traffic on the kdeconnect port.
</summary>
@@ -36554,7 +36371,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42366">
+<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42489">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kdeconnect port.
@@ -36566,7 +36383,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42381">
+<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42504">
<summary>
Bind TCP sockets to the kdeconnect port.
</summary>
@@ -36577,7 +36394,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kdeconnect_port" lineno="42401">
+<interface name="corenet_udp_bind_kdeconnect_port" lineno="42524">
<summary>
Bind UDP sockets to the kdeconnect port.
</summary>
@@ -36588,7 +36405,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42420">
+<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42543">
<summary>
Make a TCP connection to the kdeconnect port.
</summary>
@@ -36598,7 +36415,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kdeconnect_client_packets" lineno="42440">
+<interface name="corenet_send_kdeconnect_client_packets" lineno="42563">
<summary>
Send kdeconnect_client packets.
</summary>
@@ -36609,7 +36426,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42459">
+<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42582">
<summary>
Do not audit attempts to send kdeconnect_client packets.
</summary>
@@ -36620,7 +36437,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kdeconnect_client_packets" lineno="42478">
+<interface name="corenet_receive_kdeconnect_client_packets" lineno="42601">
<summary>
Receive kdeconnect_client packets.
</summary>
@@ -36631,7 +36448,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42497">
+<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42620">
<summary>
Do not audit attempts to receive kdeconnect_client packets.
</summary>
@@ -36642,7 +36459,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42516">
+<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42639">
<summary>
Send and receive kdeconnect_client packets.
</summary>
@@ -36653,7 +36470,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42532">
+<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42655">
<summary>
Do not audit attempts to send and receive kdeconnect_client packets.
</summary>
@@ -36664,7 +36481,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42547">
+<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42670">
<summary>
Relabel packets to kdeconnect_client the packet type.
</summary>
@@ -36674,7 +36491,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kdeconnect_server_packets" lineno="42567">
+<interface name="corenet_send_kdeconnect_server_packets" lineno="42690">
<summary>
Send kdeconnect_server packets.
</summary>
@@ -36685,7 +36502,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42586">
+<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42709">
<summary>
Do not audit attempts to send kdeconnect_server packets.
</summary>
@@ -36696,7 +36513,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kdeconnect_server_packets" lineno="42605">
+<interface name="corenet_receive_kdeconnect_server_packets" lineno="42728">
<summary>
Receive kdeconnect_server packets.
</summary>
@@ -36707,7 +36524,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42624">
+<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42747">
<summary>
Do not audit attempts to receive kdeconnect_server packets.
</summary>
@@ -36718,7 +36535,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42643">
+<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42766">
<summary>
Send and receive kdeconnect_server packets.
</summary>
@@ -36729,7 +36546,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42659">
+<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42782">
<summary>
Do not audit attempts to send and receive kdeconnect_server packets.
</summary>
@@ -36740,7 +36557,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42674">
+<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42797">
<summary>
Relabel packets to kdeconnect_server the packet type.
</summary>
@@ -36750,7 +36567,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42696">
+<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42819">
<summary>
Send and receive TCP traffic on the kprop port.
</summary>
@@ -36761,7 +36578,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kprop_port" lineno="42711">
+<interface name="corenet_udp_send_kprop_port" lineno="42834">
<summary>
Send UDP traffic on the kprop port.
</summary>
@@ -36772,7 +36589,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42726">
+<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42849">
<summary>
Do not audit attempts to send UDP traffic on the kprop port.
</summary>
@@ -36783,7 +36600,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kprop_port" lineno="42741">
+<interface name="corenet_udp_receive_kprop_port" lineno="42864">
<summary>
Receive UDP traffic on the kprop port.
</summary>
@@ -36794,7 +36611,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42756">
+<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42879">
<summary>
Do not audit attempts to receive UDP traffic on the kprop port.
</summary>
@@ -36805,7 +36622,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kprop_port" lineno="42771">
+<interface name="corenet_udp_sendrecv_kprop_port" lineno="42894">
<summary>
Send and receive UDP traffic on the kprop port.
</summary>
@@ -36816,7 +36633,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42787">
+<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42910">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kprop port.
@@ -36828,7 +36645,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kprop_port" lineno="42802">
+<interface name="corenet_tcp_bind_kprop_port" lineno="42925">
<summary>
Bind TCP sockets to the kprop port.
</summary>
@@ -36839,7 +36656,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kprop_port" lineno="42822">
+<interface name="corenet_udp_bind_kprop_port" lineno="42945">
<summary>
Bind UDP sockets to the kprop port.
</summary>
@@ -36850,7 +36667,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kprop_port" lineno="42841">
+<interface name="corenet_tcp_connect_kprop_port" lineno="42964">
<summary>
Make a TCP connection to the kprop port.
</summary>
@@ -36860,7 +36677,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kprop_client_packets" lineno="42861">
+<interface name="corenet_send_kprop_client_packets" lineno="42984">
<summary>
Send kprop_client packets.
</summary>
@@ -36871,7 +36688,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="42880">
+<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="43003">
<summary>
Do not audit attempts to send kprop_client packets.
</summary>
@@ -36882,7 +36699,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kprop_client_packets" lineno="42899">
+<interface name="corenet_receive_kprop_client_packets" lineno="43022">
<summary>
Receive kprop_client packets.
</summary>
@@ -36893,7 +36710,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="42918">
+<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="43041">
<summary>
Do not audit attempts to receive kprop_client packets.
</summary>
@@ -36904,7 +36721,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kprop_client_packets" lineno="42937">
+<interface name="corenet_sendrecv_kprop_client_packets" lineno="43060">
<summary>
Send and receive kprop_client packets.
</summary>
@@ -36915,7 +36732,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="42953">
+<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="43076">
<summary>
Do not audit attempts to send and receive kprop_client packets.
</summary>
@@ -36926,7 +36743,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kprop_client_packets" lineno="42968">
+<interface name="corenet_relabelto_kprop_client_packets" lineno="43091">
<summary>
Relabel packets to kprop_client the packet type.
</summary>
@@ -36936,7 +36753,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kprop_server_packets" lineno="42988">
+<interface name="corenet_send_kprop_server_packets" lineno="43111">
<summary>
Send kprop_server packets.
</summary>
@@ -36947,7 +36764,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43007">
+<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43130">
<summary>
Do not audit attempts to send kprop_server packets.
</summary>
@@ -36958,7 +36775,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kprop_server_packets" lineno="43026">
+<interface name="corenet_receive_kprop_server_packets" lineno="43149">
<summary>
Receive kprop_server packets.
</summary>
@@ -36969,7 +36786,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43045">
+<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43168">
<summary>
Do not audit attempts to receive kprop_server packets.
</summary>
@@ -36980,7 +36797,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kprop_server_packets" lineno="43064">
+<interface name="corenet_sendrecv_kprop_server_packets" lineno="43187">
<summary>
Send and receive kprop_server packets.
</summary>
@@ -36991,7 +36808,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43080">
+<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43203">
<summary>
Do not audit attempts to send and receive kprop_server packets.
</summary>
@@ -37002,7 +36819,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kprop_server_packets" lineno="43095">
+<interface name="corenet_relabelto_kprop_server_packets" lineno="43218">
<summary>
Relabel packets to kprop_server the packet type.
</summary>
@@ -37012,7 +36829,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43117">
+<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43240">
<summary>
Send and receive TCP traffic on the ktalkd port.
</summary>
@@ -37023,7 +36840,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ktalkd_port" lineno="43132">
+<interface name="corenet_udp_send_ktalkd_port" lineno="43255">
<summary>
Send UDP traffic on the ktalkd port.
</summary>
@@ -37034,7 +36851,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43147">
+<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43270">
<summary>
Do not audit attempts to send UDP traffic on the ktalkd port.
</summary>
@@ -37045,7 +36862,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ktalkd_port" lineno="43162">
+<interface name="corenet_udp_receive_ktalkd_port" lineno="43285">
<summary>
Receive UDP traffic on the ktalkd port.
</summary>
@@ -37056,7 +36873,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43177">
+<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43300">
<summary>
Do not audit attempts to receive UDP traffic on the ktalkd port.
</summary>
@@ -37067,7 +36884,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43192">
+<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43315">
<summary>
Send and receive UDP traffic on the ktalkd port.
</summary>
@@ -37078,7 +36895,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43208">
+<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43331">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ktalkd port.
@@ -37090,7 +36907,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ktalkd_port" lineno="43223">
+<interface name="corenet_tcp_bind_ktalkd_port" lineno="43346">
<summary>
Bind TCP sockets to the ktalkd port.
</summary>
@@ -37101,7 +36918,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ktalkd_port" lineno="43243">
+<interface name="corenet_udp_bind_ktalkd_port" lineno="43366">
<summary>
Bind UDP sockets to the ktalkd port.
</summary>
@@ -37112,7 +36929,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ktalkd_port" lineno="43262">
+<interface name="corenet_tcp_connect_ktalkd_port" lineno="43385">
<summary>
Make a TCP connection to the ktalkd port.
</summary>
@@ -37122,7 +36939,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ktalkd_client_packets" lineno="43282">
+<interface name="corenet_send_ktalkd_client_packets" lineno="43405">
<summary>
Send ktalkd_client packets.
</summary>
@@ -37133,7 +36950,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43301">
+<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43424">
<summary>
Do not audit attempts to send ktalkd_client packets.
</summary>
@@ -37144,7 +36961,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ktalkd_client_packets" lineno="43320">
+<interface name="corenet_receive_ktalkd_client_packets" lineno="43443">
<summary>
Receive ktalkd_client packets.
</summary>
@@ -37155,7 +36972,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43339">
+<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43462">
<summary>
Do not audit attempts to receive ktalkd_client packets.
</summary>
@@ -37166,7 +36983,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43358">
+<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43481">
<summary>
Send and receive ktalkd_client packets.
</summary>
@@ -37177,7 +36994,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43374">
+<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43497">
<summary>
Do not audit attempts to send and receive ktalkd_client packets.
</summary>
@@ -37188,7 +37005,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43389">
+<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43512">
<summary>
Relabel packets to ktalkd_client the packet type.
</summary>
@@ -37198,7 +37015,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ktalkd_server_packets" lineno="43409">
+<interface name="corenet_send_ktalkd_server_packets" lineno="43532">
<summary>
Send ktalkd_server packets.
</summary>
@@ -37209,7 +37026,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43428">
+<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43551">
<summary>
Do not audit attempts to send ktalkd_server packets.
</summary>
@@ -37220,7 +37037,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ktalkd_server_packets" lineno="43447">
+<interface name="corenet_receive_ktalkd_server_packets" lineno="43570">
<summary>
Receive ktalkd_server packets.
</summary>
@@ -37231,7 +37048,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43466">
+<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43589">
<summary>
Do not audit attempts to receive ktalkd_server packets.
</summary>
@@ -37242,7 +37059,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43485">
+<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43608">
<summary>
Send and receive ktalkd_server packets.
</summary>
@@ -37253,7 +37070,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43501">
+<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43624">
<summary>
Do not audit attempts to send and receive ktalkd_server packets.
</summary>
@@ -37264,7 +37081,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43516">
+<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43639">
<summary>
Relabel packets to ktalkd_server the packet type.
</summary>
@@ -37274,7 +37091,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43538">
+<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43661">
<summary>
Send and receive TCP traffic on the l2tp port.
</summary>
@@ -37285,7 +37102,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_l2tp_port" lineno="43553">
+<interface name="corenet_udp_send_l2tp_port" lineno="43676">
<summary>
Send UDP traffic on the l2tp port.
</summary>
@@ -37296,7 +37113,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43568">
+<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43691">
<summary>
Do not audit attempts to send UDP traffic on the l2tp port.
</summary>
@@ -37307,7 +37124,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_l2tp_port" lineno="43583">
+<interface name="corenet_udp_receive_l2tp_port" lineno="43706">
<summary>
Receive UDP traffic on the l2tp port.
</summary>
@@ -37318,7 +37135,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43598">
+<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43721">
<summary>
Do not audit attempts to receive UDP traffic on the l2tp port.
</summary>
@@ -37329,7 +37146,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43613">
+<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43736">
<summary>
Send and receive UDP traffic on the l2tp port.
</summary>
@@ -37340,7 +37157,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43629">
+<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43752">
<summary>
Do not audit attempts to send and receive
UDP traffic on the l2tp port.
@@ -37352,7 +37169,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_l2tp_port" lineno="43644">
+<interface name="corenet_tcp_bind_l2tp_port" lineno="43767">
<summary>
Bind TCP sockets to the l2tp port.
</summary>
@@ -37363,7 +37180,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_l2tp_port" lineno="43664">
+<interface name="corenet_udp_bind_l2tp_port" lineno="43787">
<summary>
Bind UDP sockets to the l2tp port.
</summary>
@@ -37374,7 +37191,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_l2tp_port" lineno="43683">
+<interface name="corenet_tcp_connect_l2tp_port" lineno="43806">
<summary>
Make a TCP connection to the l2tp port.
</summary>
@@ -37384,7 +37201,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_l2tp_client_packets" lineno="43703">
+<interface name="corenet_send_l2tp_client_packets" lineno="43826">
<summary>
Send l2tp_client packets.
</summary>
@@ -37395,7 +37212,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43722">
+<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43845">
<summary>
Do not audit attempts to send l2tp_client packets.
</summary>
@@ -37406,7 +37223,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_l2tp_client_packets" lineno="43741">
+<interface name="corenet_receive_l2tp_client_packets" lineno="43864">
<summary>
Receive l2tp_client packets.
</summary>
@@ -37417,7 +37234,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43760">
+<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43883">
<summary>
Do not audit attempts to receive l2tp_client packets.
</summary>
@@ -37428,7 +37245,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43779">
+<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43902">
<summary>
Send and receive l2tp_client packets.
</summary>
@@ -37439,7 +37256,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43795">
+<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43918">
<summary>
Do not audit attempts to send and receive l2tp_client packets.
</summary>
@@ -37450,7 +37267,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_l2tp_client_packets" lineno="43810">
+<interface name="corenet_relabelto_l2tp_client_packets" lineno="43933">
<summary>
Relabel packets to l2tp_client the packet type.
</summary>
@@ -37460,7 +37277,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_l2tp_server_packets" lineno="43830">
+<interface name="corenet_send_l2tp_server_packets" lineno="43953">
<summary>
Send l2tp_server packets.
</summary>
@@ -37471,7 +37288,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43849">
+<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43972">
<summary>
Do not audit attempts to send l2tp_server packets.
</summary>
@@ -37482,7 +37299,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_l2tp_server_packets" lineno="43868">
+<interface name="corenet_receive_l2tp_server_packets" lineno="43991">
<summary>
Receive l2tp_server packets.
</summary>
@@ -37493,7 +37310,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="43887">
+<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="44010">
<summary>
Do not audit attempts to receive l2tp_server packets.
</summary>
@@ -37504,7 +37321,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_l2tp_server_packets" lineno="43906">
+<interface name="corenet_sendrecv_l2tp_server_packets" lineno="44029">
<summary>
Send and receive l2tp_server packets.
</summary>
@@ -37515,7 +37332,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="43922">
+<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="44045">
<summary>
Do not audit attempts to send and receive l2tp_server packets.
</summary>
@@ -37526,7 +37343,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_l2tp_server_packets" lineno="43937">
+<interface name="corenet_relabelto_l2tp_server_packets" lineno="44060">
<summary>
Relabel packets to l2tp_server the packet type.
</summary>
@@ -37536,7 +37353,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ldap_port" lineno="43959">
+<interface name="corenet_tcp_sendrecv_ldap_port" lineno="44082">
<summary>
Send and receive TCP traffic on the ldap port.
</summary>
@@ -37547,7 +37364,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ldap_port" lineno="43974">
+<interface name="corenet_udp_send_ldap_port" lineno="44097">
<summary>
Send UDP traffic on the ldap port.
</summary>
@@ -37558,7 +37375,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="43989">
+<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="44112">
<summary>
Do not audit attempts to send UDP traffic on the ldap port.
</summary>
@@ -37569,7 +37386,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ldap_port" lineno="44004">
+<interface name="corenet_udp_receive_ldap_port" lineno="44127">
<summary>
Receive UDP traffic on the ldap port.
</summary>
@@ -37580,7 +37397,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44019">
+<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44142">
<summary>
Do not audit attempts to receive UDP traffic on the ldap port.
</summary>
@@ -37591,7 +37408,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ldap_port" lineno="44034">
+<interface name="corenet_udp_sendrecv_ldap_port" lineno="44157">
<summary>
Send and receive UDP traffic on the ldap port.
</summary>
@@ -37602,7 +37419,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44050">
+<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44173">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ldap port.
@@ -37614,7 +37431,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ldap_port" lineno="44065">
+<interface name="corenet_tcp_bind_ldap_port" lineno="44188">
<summary>
Bind TCP sockets to the ldap port.
</summary>
@@ -37625,7 +37442,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ldap_port" lineno="44085">
+<interface name="corenet_udp_bind_ldap_port" lineno="44208">
<summary>
Bind UDP sockets to the ldap port.
</summary>
@@ -37636,7 +37453,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ldap_port" lineno="44104">
+<interface name="corenet_tcp_connect_ldap_port" lineno="44227">
<summary>
Make a TCP connection to the ldap port.
</summary>
@@ -37646,7 +37463,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ldap_client_packets" lineno="44124">
+<interface name="corenet_send_ldap_client_packets" lineno="44247">
<summary>
Send ldap_client packets.
</summary>
@@ -37657,7 +37474,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44143">
+<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44266">
<summary>
Do not audit attempts to send ldap_client packets.
</summary>
@@ -37668,7 +37485,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ldap_client_packets" lineno="44162">
+<interface name="corenet_receive_ldap_client_packets" lineno="44285">
<summary>
Receive ldap_client packets.
</summary>
@@ -37679,7 +37496,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44181">
+<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44304">
<summary>
Do not audit attempts to receive ldap_client packets.
</summary>
@@ -37690,7 +37507,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ldap_client_packets" lineno="44200">
+<interface name="corenet_sendrecv_ldap_client_packets" lineno="44323">
<summary>
Send and receive ldap_client packets.
</summary>
@@ -37701,7 +37518,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44216">
+<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44339">
<summary>
Do not audit attempts to send and receive ldap_client packets.
</summary>
@@ -37712,7 +37529,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ldap_client_packets" lineno="44231">
+<interface name="corenet_relabelto_ldap_client_packets" lineno="44354">
<summary>
Relabel packets to ldap_client the packet type.
</summary>
@@ -37722,7 +37539,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ldap_server_packets" lineno="44251">
+<interface name="corenet_send_ldap_server_packets" lineno="44374">
<summary>
Send ldap_server packets.
</summary>
@@ -37733,7 +37550,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44270">
+<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44393">
<summary>
Do not audit attempts to send ldap_server packets.
</summary>
@@ -37744,7 +37561,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ldap_server_packets" lineno="44289">
+<interface name="corenet_receive_ldap_server_packets" lineno="44412">
<summary>
Receive ldap_server packets.
</summary>
@@ -37755,7 +37572,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44308">
+<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44431">
<summary>
Do not audit attempts to receive ldap_server packets.
</summary>
@@ -37766,7 +37583,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ldap_server_packets" lineno="44327">
+<interface name="corenet_sendrecv_ldap_server_packets" lineno="44450">
<summary>
Send and receive ldap_server packets.
</summary>
@@ -37777,7 +37594,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44343">
+<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44466">
<summary>
Do not audit attempts to send and receive ldap_server packets.
</summary>
@@ -37788,7 +37605,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ldap_server_packets" lineno="44358">
+<interface name="corenet_relabelto_ldap_server_packets" lineno="44481">
<summary>
Relabel packets to ldap_server the packet type.
</summary>
@@ -37798,7 +37615,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44380">
+<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44503">
<summary>
Send and receive TCP traffic on the lirc port.
</summary>
@@ -37809,7 +37626,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_lirc_port" lineno="44395">
+<interface name="corenet_udp_send_lirc_port" lineno="44518">
<summary>
Send UDP traffic on the lirc port.
</summary>
@@ -37820,7 +37637,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44410">
+<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44533">
<summary>
Do not audit attempts to send UDP traffic on the lirc port.
</summary>
@@ -37831,7 +37648,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_lirc_port" lineno="44425">
+<interface name="corenet_udp_receive_lirc_port" lineno="44548">
<summary>
Receive UDP traffic on the lirc port.
</summary>
@@ -37842,7 +37659,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44440">
+<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44563">
<summary>
Do not audit attempts to receive UDP traffic on the lirc port.
</summary>
@@ -37853,7 +37670,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_lirc_port" lineno="44455">
+<interface name="corenet_udp_sendrecv_lirc_port" lineno="44578">
<summary>
Send and receive UDP traffic on the lirc port.
</summary>
@@ -37864,7 +37681,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44471">
+<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44594">
<summary>
Do not audit attempts to send and receive
UDP traffic on the lirc port.
@@ -37876,7 +37693,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_lirc_port" lineno="44486">
+<interface name="corenet_tcp_bind_lirc_port" lineno="44609">
<summary>
Bind TCP sockets to the lirc port.
</summary>
@@ -37887,7 +37704,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_lirc_port" lineno="44506">
+<interface name="corenet_udp_bind_lirc_port" lineno="44629">
<summary>
Bind UDP sockets to the lirc port.
</summary>
@@ -37898,7 +37715,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_lirc_port" lineno="44525">
+<interface name="corenet_tcp_connect_lirc_port" lineno="44648">
<summary>
Make a TCP connection to the lirc port.
</summary>
@@ -37908,7 +37725,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lirc_client_packets" lineno="44545">
+<interface name="corenet_send_lirc_client_packets" lineno="44668">
<summary>
Send lirc_client packets.
</summary>
@@ -37919,7 +37736,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44564">
+<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44687">
<summary>
Do not audit attempts to send lirc_client packets.
</summary>
@@ -37930,7 +37747,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lirc_client_packets" lineno="44583">
+<interface name="corenet_receive_lirc_client_packets" lineno="44706">
<summary>
Receive lirc_client packets.
</summary>
@@ -37941,7 +37758,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44602">
+<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44725">
<summary>
Do not audit attempts to receive lirc_client packets.
</summary>
@@ -37952,7 +37769,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lirc_client_packets" lineno="44621">
+<interface name="corenet_sendrecv_lirc_client_packets" lineno="44744">
<summary>
Send and receive lirc_client packets.
</summary>
@@ -37963,7 +37780,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44637">
+<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44760">
<summary>
Do not audit attempts to send and receive lirc_client packets.
</summary>
@@ -37974,7 +37791,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lirc_client_packets" lineno="44652">
+<interface name="corenet_relabelto_lirc_client_packets" lineno="44775">
<summary>
Relabel packets to lirc_client the packet type.
</summary>
@@ -37984,7 +37801,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lirc_server_packets" lineno="44672">
+<interface name="corenet_send_lirc_server_packets" lineno="44795">
<summary>
Send lirc_server packets.
</summary>
@@ -37995,7 +37812,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44691">
+<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44814">
<summary>
Do not audit attempts to send lirc_server packets.
</summary>
@@ -38006,7 +37823,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lirc_server_packets" lineno="44710">
+<interface name="corenet_receive_lirc_server_packets" lineno="44833">
<summary>
Receive lirc_server packets.
</summary>
@@ -38017,7 +37834,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44729">
+<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44852">
<summary>
Do not audit attempts to receive lirc_server packets.
</summary>
@@ -38028,7 +37845,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lirc_server_packets" lineno="44748">
+<interface name="corenet_sendrecv_lirc_server_packets" lineno="44871">
<summary>
Send and receive lirc_server packets.
</summary>
@@ -38039,7 +37856,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44764">
+<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44887">
<summary>
Do not audit attempts to send and receive lirc_server packets.
</summary>
@@ -38050,7 +37867,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lirc_server_packets" lineno="44779">
+<interface name="corenet_relabelto_lirc_server_packets" lineno="44902">
<summary>
Relabel packets to lirc_server the packet type.
</summary>
@@ -38060,7 +37877,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44801">
+<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44924">
<summary>
Send and receive TCP traffic on the llmnr port.
</summary>
@@ -38071,7 +37888,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_llmnr_port" lineno="44816">
+<interface name="corenet_udp_send_llmnr_port" lineno="44939">
<summary>
Send UDP traffic on the llmnr port.
</summary>
@@ -38082,7 +37899,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44831">
+<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44954">
<summary>
Do not audit attempts to send UDP traffic on the llmnr port.
</summary>
@@ -38093,7 +37910,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_llmnr_port" lineno="44846">
+<interface name="corenet_udp_receive_llmnr_port" lineno="44969">
<summary>
Receive UDP traffic on the llmnr port.
</summary>
@@ -38104,7 +37921,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="44861">
+<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="44984">
<summary>
Do not audit attempts to receive UDP traffic on the llmnr port.
</summary>
@@ -38115,7 +37932,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_llmnr_port" lineno="44876">
+<interface name="corenet_udp_sendrecv_llmnr_port" lineno="44999">
<summary>
Send and receive UDP traffic on the llmnr port.
</summary>
@@ -38126,7 +37943,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="44892">
+<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="45015">
<summary>
Do not audit attempts to send and receive
UDP traffic on the llmnr port.
@@ -38138,7 +37955,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_llmnr_port" lineno="44907">
+<interface name="corenet_tcp_bind_llmnr_port" lineno="45030">
<summary>
Bind TCP sockets to the llmnr port.
</summary>
@@ -38149,7 +37966,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_llmnr_port" lineno="44927">
+<interface name="corenet_udp_bind_llmnr_port" lineno="45050">
<summary>
Bind UDP sockets to the llmnr port.
</summary>
@@ -38160,7 +37977,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_llmnr_port" lineno="44946">
+<interface name="corenet_tcp_connect_llmnr_port" lineno="45069">
<summary>
Make a TCP connection to the llmnr port.
</summary>
@@ -38170,7 +37987,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_llmnr_client_packets" lineno="44966">
+<interface name="corenet_send_llmnr_client_packets" lineno="45089">
<summary>
Send llmnr_client packets.
</summary>
@@ -38181,7 +37998,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="44985">
+<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="45108">
<summary>
Do not audit attempts to send llmnr_client packets.
</summary>
@@ -38192,7 +38009,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_llmnr_client_packets" lineno="45004">
+<interface name="corenet_receive_llmnr_client_packets" lineno="45127">
<summary>
Receive llmnr_client packets.
</summary>
@@ -38203,7 +38020,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45023">
+<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45146">
<summary>
Do not audit attempts to receive llmnr_client packets.
</summary>
@@ -38214,7 +38031,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45042">
+<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45165">
<summary>
Send and receive llmnr_client packets.
</summary>
@@ -38225,7 +38042,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45058">
+<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45181">
<summary>
Do not audit attempts to send and receive llmnr_client packets.
</summary>
@@ -38236,7 +38053,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_llmnr_client_packets" lineno="45073">
+<interface name="corenet_relabelto_llmnr_client_packets" lineno="45196">
<summary>
Relabel packets to llmnr_client the packet type.
</summary>
@@ -38246,7 +38063,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_llmnr_server_packets" lineno="45093">
+<interface name="corenet_send_llmnr_server_packets" lineno="45216">
<summary>
Send llmnr_server packets.
</summary>
@@ -38257,7 +38074,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45112">
+<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45235">
<summary>
Do not audit attempts to send llmnr_server packets.
</summary>
@@ -38268,7 +38085,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_llmnr_server_packets" lineno="45131">
+<interface name="corenet_receive_llmnr_server_packets" lineno="45254">
<summary>
Receive llmnr_server packets.
</summary>
@@ -38279,7 +38096,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45150">
+<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45273">
<summary>
Do not audit attempts to receive llmnr_server packets.
</summary>
@@ -38290,7 +38107,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45169">
+<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45292">
<summary>
Send and receive llmnr_server packets.
</summary>
@@ -38301,7 +38118,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45185">
+<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45308">
<summary>
Do not audit attempts to send and receive llmnr_server packets.
</summary>
@@ -38312,7 +38129,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_llmnr_server_packets" lineno="45200">
+<interface name="corenet_relabelto_llmnr_server_packets" lineno="45323">
<summary>
Relabel packets to llmnr_server the packet type.
</summary>
@@ -38322,7 +38139,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45222">
+<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45345">
<summary>
Send and receive TCP traffic on the lmtp port.
</summary>
@@ -38333,7 +38150,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_lmtp_port" lineno="45237">
+<interface name="corenet_udp_send_lmtp_port" lineno="45360">
<summary>
Send UDP traffic on the lmtp port.
</summary>
@@ -38344,7 +38161,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45252">
+<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45375">
<summary>
Do not audit attempts to send UDP traffic on the lmtp port.
</summary>
@@ -38355,7 +38172,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_lmtp_port" lineno="45267">
+<interface name="corenet_udp_receive_lmtp_port" lineno="45390">
<summary>
Receive UDP traffic on the lmtp port.
</summary>
@@ -38366,7 +38183,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45282">
+<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45405">
<summary>
Do not audit attempts to receive UDP traffic on the lmtp port.
</summary>
@@ -38377,7 +38194,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45297">
+<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45420">
<summary>
Send and receive UDP traffic on the lmtp port.
</summary>
@@ -38388,7 +38205,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45313">
+<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45436">
<summary>
Do not audit attempts to send and receive
UDP traffic on the lmtp port.
@@ -38400,7 +38217,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_lmtp_port" lineno="45328">
+<interface name="corenet_tcp_bind_lmtp_port" lineno="45451">
<summary>
Bind TCP sockets to the lmtp port.
</summary>
@@ -38411,7 +38228,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_lmtp_port" lineno="45348">
+<interface name="corenet_udp_bind_lmtp_port" lineno="45471">
<summary>
Bind UDP sockets to the lmtp port.
</summary>
@@ -38422,7 +38239,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_lmtp_port" lineno="45367">
+<interface name="corenet_tcp_connect_lmtp_port" lineno="45490">
<summary>
Make a TCP connection to the lmtp port.
</summary>
@@ -38432,7 +38249,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lmtp_client_packets" lineno="45387">
+<interface name="corenet_send_lmtp_client_packets" lineno="45510">
<summary>
Send lmtp_client packets.
</summary>
@@ -38443,7 +38260,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45406">
+<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45529">
<summary>
Do not audit attempts to send lmtp_client packets.
</summary>
@@ -38454,7 +38271,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lmtp_client_packets" lineno="45425">
+<interface name="corenet_receive_lmtp_client_packets" lineno="45548">
<summary>
Receive lmtp_client packets.
</summary>
@@ -38465,7 +38282,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45444">
+<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45567">
<summary>
Do not audit attempts to receive lmtp_client packets.
</summary>
@@ -38476,7 +38293,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45463">
+<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45586">
<summary>
Send and receive lmtp_client packets.
</summary>
@@ -38487,7 +38304,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45479">
+<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45602">
<summary>
Do not audit attempts to send and receive lmtp_client packets.
</summary>
@@ -38498,7 +38315,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lmtp_client_packets" lineno="45494">
+<interface name="corenet_relabelto_lmtp_client_packets" lineno="45617">
<summary>
Relabel packets to lmtp_client the packet type.
</summary>
@@ -38508,7 +38325,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lmtp_server_packets" lineno="45514">
+<interface name="corenet_send_lmtp_server_packets" lineno="45637">
<summary>
Send lmtp_server packets.
</summary>
@@ -38519,7 +38336,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45533">
+<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45656">
<summary>
Do not audit attempts to send lmtp_server packets.
</summary>
@@ -38530,7 +38347,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lmtp_server_packets" lineno="45552">
+<interface name="corenet_receive_lmtp_server_packets" lineno="45675">
<summary>
Receive lmtp_server packets.
</summary>
@@ -38541,7 +38358,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45571">
+<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45694">
<summary>
Do not audit attempts to receive lmtp_server packets.
</summary>
@@ -38552,7 +38369,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45590">
+<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45713">
<summary>
Send and receive lmtp_server packets.
</summary>
@@ -38563,7 +38380,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45606">
+<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45729">
<summary>
Do not audit attempts to send and receive lmtp_server packets.
</summary>
@@ -38574,7 +38391,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lmtp_server_packets" lineno="45621">
+<interface name="corenet_relabelto_lmtp_server_packets" lineno="45744">
<summary>
Relabel packets to lmtp_server the packet type.
</summary>
@@ -38584,7 +38401,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45643">
+<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45766">
<summary>
Send and receive TCP traffic on the lrrd port.
</summary>
@@ -38595,7 +38412,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_lrrd_port" lineno="45658">
+<interface name="corenet_udp_send_lrrd_port" lineno="45781">
<summary>
Send UDP traffic on the lrrd port.
</summary>
@@ -38606,7 +38423,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45673">
+<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45796">
<summary>
Do not audit attempts to send UDP traffic on the lrrd port.
</summary>
@@ -38617,7 +38434,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_lrrd_port" lineno="45688">
+<interface name="corenet_udp_receive_lrrd_port" lineno="45811">
<summary>
Receive UDP traffic on the lrrd port.
</summary>
@@ -38628,7 +38445,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45703">
+<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45826">
<summary>
Do not audit attempts to receive UDP traffic on the lrrd port.
</summary>
@@ -38639,7 +38456,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45718">
+<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45841">
<summary>
Send and receive UDP traffic on the lrrd port.
</summary>
@@ -38650,7 +38467,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45734">
+<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45857">
<summary>
Do not audit attempts to send and receive
UDP traffic on the lrrd port.
@@ -38662,7 +38479,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_lrrd_port" lineno="45749">
+<interface name="corenet_tcp_bind_lrrd_port" lineno="45872">
<summary>
Bind TCP sockets to the lrrd port.
</summary>
@@ -38673,7 +38490,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_lrrd_port" lineno="45769">
+<interface name="corenet_udp_bind_lrrd_port" lineno="45892">
<summary>
Bind UDP sockets to the lrrd port.
</summary>
@@ -38684,7 +38501,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_lrrd_port" lineno="45788">
+<interface name="corenet_tcp_connect_lrrd_port" lineno="45911">
<summary>
Make a TCP connection to the lrrd port.
</summary>
@@ -38694,7 +38511,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lrrd_client_packets" lineno="45808">
+<interface name="corenet_send_lrrd_client_packets" lineno="45931">
<summary>
Send lrrd_client packets.
</summary>
@@ -38705,7 +38522,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45827">
+<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45950">
<summary>
Do not audit attempts to send lrrd_client packets.
</summary>
@@ -38716,7 +38533,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lrrd_client_packets" lineno="45846">
+<interface name="corenet_receive_lrrd_client_packets" lineno="45969">
<summary>
Receive lrrd_client packets.
</summary>
@@ -38727,7 +38544,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="45865">
+<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="45988">
<summary>
Do not audit attempts to receive lrrd_client packets.
</summary>
@@ -38738,7 +38555,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lrrd_client_packets" lineno="45884">
+<interface name="corenet_sendrecv_lrrd_client_packets" lineno="46007">
<summary>
Send and receive lrrd_client packets.
</summary>
@@ -38749,7 +38566,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="45900">
+<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="46023">
<summary>
Do not audit attempts to send and receive lrrd_client packets.
</summary>
@@ -38760,7 +38577,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lrrd_client_packets" lineno="45915">
+<interface name="corenet_relabelto_lrrd_client_packets" lineno="46038">
<summary>
Relabel packets to lrrd_client the packet type.
</summary>
@@ -38770,7 +38587,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lrrd_server_packets" lineno="45935">
+<interface name="corenet_send_lrrd_server_packets" lineno="46058">
<summary>
Send lrrd_server packets.
</summary>
@@ -38781,7 +38598,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="45954">
+<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="46077">
<summary>
Do not audit attempts to send lrrd_server packets.
</summary>
@@ -38792,7 +38609,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lrrd_server_packets" lineno="45973">
+<interface name="corenet_receive_lrrd_server_packets" lineno="46096">
<summary>
Receive lrrd_server packets.
</summary>
@@ -38803,7 +38620,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="45992">
+<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="46115">
<summary>
Do not audit attempts to receive lrrd_server packets.
</summary>
@@ -38814,7 +38631,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46011">
+<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46134">
<summary>
Send and receive lrrd_server packets.
</summary>
@@ -38825,7 +38642,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46027">
+<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46150">
<summary>
Do not audit attempts to send and receive lrrd_server packets.
</summary>
@@ -38836,7 +38653,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lrrd_server_packets" lineno="46042">
+<interface name="corenet_relabelto_lrrd_server_packets" lineno="46165">
<summary>
Relabel packets to lrrd_server the packet type.
</summary>
@@ -38846,7 +38663,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mail_port" lineno="46064">
+<interface name="corenet_tcp_sendrecv_mail_port" lineno="46187">
<summary>
Send and receive TCP traffic on the mail port.
</summary>
@@ -38857,7 +38674,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mail_port" lineno="46079">
+<interface name="corenet_udp_send_mail_port" lineno="46202">
<summary>
Send UDP traffic on the mail port.
</summary>
@@ -38868,7 +38685,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46094">
+<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46217">
<summary>
Do not audit attempts to send UDP traffic on the mail port.
</summary>
@@ -38879,7 +38696,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mail_port" lineno="46109">
+<interface name="corenet_udp_receive_mail_port" lineno="46232">
<summary>
Receive UDP traffic on the mail port.
</summary>
@@ -38890,7 +38707,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46124">
+<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46247">
<summary>
Do not audit attempts to receive UDP traffic on the mail port.
</summary>
@@ -38901,7 +38718,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mail_port" lineno="46139">
+<interface name="corenet_udp_sendrecv_mail_port" lineno="46262">
<summary>
Send and receive UDP traffic on the mail port.
</summary>
@@ -38912,7 +38729,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46155">
+<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46278">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mail port.
@@ -38924,7 +38741,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mail_port" lineno="46170">
+<interface name="corenet_tcp_bind_mail_port" lineno="46293">
<summary>
Bind TCP sockets to the mail port.
</summary>
@@ -38935,7 +38752,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mail_port" lineno="46190">
+<interface name="corenet_udp_bind_mail_port" lineno="46313">
<summary>
Bind UDP sockets to the mail port.
</summary>
@@ -38946,7 +38763,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mail_port" lineno="46209">
+<interface name="corenet_tcp_connect_mail_port" lineno="46332">
<summary>
Make a TCP connection to the mail port.
</summary>
@@ -38956,7 +38773,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mail_client_packets" lineno="46229">
+<interface name="corenet_send_mail_client_packets" lineno="46352">
<summary>
Send mail_client packets.
</summary>
@@ -38967,7 +38784,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46248">
+<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46371">
<summary>
Do not audit attempts to send mail_client packets.
</summary>
@@ -38978,7 +38795,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mail_client_packets" lineno="46267">
+<interface name="corenet_receive_mail_client_packets" lineno="46390">
<summary>
Receive mail_client packets.
</summary>
@@ -38989,7 +38806,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46286">
+<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46409">
<summary>
Do not audit attempts to receive mail_client packets.
</summary>
@@ -39000,7 +38817,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mail_client_packets" lineno="46305">
+<interface name="corenet_sendrecv_mail_client_packets" lineno="46428">
<summary>
Send and receive mail_client packets.
</summary>
@@ -39011,7 +38828,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46321">
+<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46444">
<summary>
Do not audit attempts to send and receive mail_client packets.
</summary>
@@ -39022,7 +38839,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mail_client_packets" lineno="46336">
+<interface name="corenet_relabelto_mail_client_packets" lineno="46459">
<summary>
Relabel packets to mail_client the packet type.
</summary>
@@ -39032,7 +38849,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mail_server_packets" lineno="46356">
+<interface name="corenet_send_mail_server_packets" lineno="46479">
<summary>
Send mail_server packets.
</summary>
@@ -39043,7 +38860,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46375">
+<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46498">
<summary>
Do not audit attempts to send mail_server packets.
</summary>
@@ -39054,7 +38871,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mail_server_packets" lineno="46394">
+<interface name="corenet_receive_mail_server_packets" lineno="46517">
<summary>
Receive mail_server packets.
</summary>
@@ -39065,7 +38882,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46413">
+<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46536">
<summary>
Do not audit attempts to receive mail_server packets.
</summary>
@@ -39076,7 +38893,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mail_server_packets" lineno="46432">
+<interface name="corenet_sendrecv_mail_server_packets" lineno="46555">
<summary>
Send and receive mail_server packets.
</summary>
@@ -39087,7 +38904,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46448">
+<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46571">
<summary>
Do not audit attempts to send and receive mail_server packets.
</summary>
@@ -39098,7 +38915,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mail_server_packets" lineno="46463">
+<interface name="corenet_relabelto_mail_server_packets" lineno="46586">
<summary>
Relabel packets to mail_server the packet type.
</summary>
@@ -39108,7 +38925,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46485">
+<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46608">
<summary>
Send and receive TCP traffic on the matahari port.
</summary>
@@ -39119,7 +38936,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_matahari_port" lineno="46500">
+<interface name="corenet_udp_send_matahari_port" lineno="46623">
<summary>
Send UDP traffic on the matahari port.
</summary>
@@ -39130,7 +38947,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46515">
+<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46638">
<summary>
Do not audit attempts to send UDP traffic on the matahari port.
</summary>
@@ -39141,7 +38958,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_matahari_port" lineno="46530">
+<interface name="corenet_udp_receive_matahari_port" lineno="46653">
<summary>
Receive UDP traffic on the matahari port.
</summary>
@@ -39152,7 +38969,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46545">
+<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46668">
<summary>
Do not audit attempts to receive UDP traffic on the matahari port.
</summary>
@@ -39163,7 +38980,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_matahari_port" lineno="46560">
+<interface name="corenet_udp_sendrecv_matahari_port" lineno="46683">
<summary>
Send and receive UDP traffic on the matahari port.
</summary>
@@ -39174,7 +38991,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46576">
+<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46699">
<summary>
Do not audit attempts to send and receive
UDP traffic on the matahari port.
@@ -39186,7 +39003,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_matahari_port" lineno="46591">
+<interface name="corenet_tcp_bind_matahari_port" lineno="46714">
<summary>
Bind TCP sockets to the matahari port.
</summary>
@@ -39197,7 +39014,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_matahari_port" lineno="46611">
+<interface name="corenet_udp_bind_matahari_port" lineno="46734">
<summary>
Bind UDP sockets to the matahari port.
</summary>
@@ -39208,7 +39025,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_matahari_port" lineno="46630">
+<interface name="corenet_tcp_connect_matahari_port" lineno="46753">
<summary>
Make a TCP connection to the matahari port.
</summary>
@@ -39218,7 +39035,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_matahari_client_packets" lineno="46650">
+<interface name="corenet_send_matahari_client_packets" lineno="46773">
<summary>
Send matahari_client packets.
</summary>
@@ -39229,7 +39046,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46669">
+<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46792">
<summary>
Do not audit attempts to send matahari_client packets.
</summary>
@@ -39240,7 +39057,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_matahari_client_packets" lineno="46688">
+<interface name="corenet_receive_matahari_client_packets" lineno="46811">
<summary>
Receive matahari_client packets.
</summary>
@@ -39251,7 +39068,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46707">
+<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46830">
<summary>
Do not audit attempts to receive matahari_client packets.
</summary>
@@ -39262,7 +39079,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_matahari_client_packets" lineno="46726">
+<interface name="corenet_sendrecv_matahari_client_packets" lineno="46849">
<summary>
Send and receive matahari_client packets.
</summary>
@@ -39273,7 +39090,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46742">
+<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46865">
<summary>
Do not audit attempts to send and receive matahari_client packets.
</summary>
@@ -39284,7 +39101,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_matahari_client_packets" lineno="46757">
+<interface name="corenet_relabelto_matahari_client_packets" lineno="46880">
<summary>
Relabel packets to matahari_client the packet type.
</summary>
@@ -39294,7 +39111,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_matahari_server_packets" lineno="46777">
+<interface name="corenet_send_matahari_server_packets" lineno="46900">
<summary>
Send matahari_server packets.
</summary>
@@ -39305,7 +39122,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46796">
+<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46919">
<summary>
Do not audit attempts to send matahari_server packets.
</summary>
@@ -39316,7 +39133,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_matahari_server_packets" lineno="46815">
+<interface name="corenet_receive_matahari_server_packets" lineno="46938">
<summary>
Receive matahari_server packets.
</summary>
@@ -39327,7 +39144,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46834">
+<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46957">
<summary>
Do not audit attempts to receive matahari_server packets.
</summary>
@@ -39338,7 +39155,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_matahari_server_packets" lineno="46853">
+<interface name="corenet_sendrecv_matahari_server_packets" lineno="46976">
<summary>
Send and receive matahari_server packets.
</summary>
@@ -39349,7 +39166,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="46869">
+<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="46992">
<summary>
Do not audit attempts to send and receive matahari_server packets.
</summary>
@@ -39360,7 +39177,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_matahari_server_packets" lineno="46884">
+<interface name="corenet_relabelto_matahari_server_packets" lineno="47007">
<summary>
Relabel packets to matahari_server the packet type.
</summary>
@@ -39370,7 +39187,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_memcache_port" lineno="46906">
+<interface name="corenet_tcp_sendrecv_memcache_port" lineno="47029">
<summary>
Send and receive TCP traffic on the memcache port.
</summary>
@@ -39381,7 +39198,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_memcache_port" lineno="46921">
+<interface name="corenet_udp_send_memcache_port" lineno="47044">
<summary>
Send UDP traffic on the memcache port.
</summary>
@@ -39392,7 +39209,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="46936">
+<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="47059">
<summary>
Do not audit attempts to send UDP traffic on the memcache port.
</summary>
@@ -39403,7 +39220,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_memcache_port" lineno="46951">
+<interface name="corenet_udp_receive_memcache_port" lineno="47074">
<summary>
Receive UDP traffic on the memcache port.
</summary>
@@ -39414,7 +39231,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="46966">
+<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="47089">
<summary>
Do not audit attempts to receive UDP traffic on the memcache port.
</summary>
@@ -39425,7 +39242,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_memcache_port" lineno="46981">
+<interface name="corenet_udp_sendrecv_memcache_port" lineno="47104">
<summary>
Send and receive UDP traffic on the memcache port.
</summary>
@@ -39436,7 +39253,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="46997">
+<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="47120">
<summary>
Do not audit attempts to send and receive
UDP traffic on the memcache port.
@@ -39448,7 +39265,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_memcache_port" lineno="47012">
+<interface name="corenet_tcp_bind_memcache_port" lineno="47135">
<summary>
Bind TCP sockets to the memcache port.
</summary>
@@ -39459,7 +39276,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_memcache_port" lineno="47032">
+<interface name="corenet_udp_bind_memcache_port" lineno="47155">
<summary>
Bind UDP sockets to the memcache port.
</summary>
@@ -39470,7 +39287,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_memcache_port" lineno="47051">
+<interface name="corenet_tcp_connect_memcache_port" lineno="47174">
<summary>
Make a TCP connection to the memcache port.
</summary>
@@ -39480,7 +39297,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_memcache_client_packets" lineno="47071">
+<interface name="corenet_send_memcache_client_packets" lineno="47194">
<summary>
Send memcache_client packets.
</summary>
@@ -39491,7 +39308,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47090">
+<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47213">
<summary>
Do not audit attempts to send memcache_client packets.
</summary>
@@ -39502,7 +39319,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_memcache_client_packets" lineno="47109">
+<interface name="corenet_receive_memcache_client_packets" lineno="47232">
<summary>
Receive memcache_client packets.
</summary>
@@ -39513,7 +39330,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47128">
+<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47251">
<summary>
Do not audit attempts to receive memcache_client packets.
</summary>
@@ -39524,7 +39341,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_memcache_client_packets" lineno="47147">
+<interface name="corenet_sendrecv_memcache_client_packets" lineno="47270">
<summary>
Send and receive memcache_client packets.
</summary>
@@ -39535,7 +39352,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47163">
+<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47286">
<summary>
Do not audit attempts to send and receive memcache_client packets.
</summary>
@@ -39546,7 +39363,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_memcache_client_packets" lineno="47178">
+<interface name="corenet_relabelto_memcache_client_packets" lineno="47301">
<summary>
Relabel packets to memcache_client the packet type.
</summary>
@@ -39556,7 +39373,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_memcache_server_packets" lineno="47198">
+<interface name="corenet_send_memcache_server_packets" lineno="47321">
<summary>
Send memcache_server packets.
</summary>
@@ -39567,7 +39384,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47217">
+<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47340">
<summary>
Do not audit attempts to send memcache_server packets.
</summary>
@@ -39578,7 +39395,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_memcache_server_packets" lineno="47236">
+<interface name="corenet_receive_memcache_server_packets" lineno="47359">
<summary>
Receive memcache_server packets.
</summary>
@@ -39589,7 +39406,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47255">
+<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47378">
<summary>
Do not audit attempts to receive memcache_server packets.
</summary>
@@ -39600,7 +39417,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_memcache_server_packets" lineno="47274">
+<interface name="corenet_sendrecv_memcache_server_packets" lineno="47397">
<summary>
Send and receive memcache_server packets.
</summary>
@@ -39611,7 +39428,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47290">
+<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47413">
<summary>
Do not audit attempts to send and receive memcache_server packets.
</summary>
@@ -39622,7 +39439,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_memcache_server_packets" lineno="47305">
+<interface name="corenet_relabelto_memcache_server_packets" lineno="47428">
<summary>
Relabel packets to memcache_server the packet type.
</summary>
@@ -39632,7 +39449,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_milter_port" lineno="47327">
+<interface name="corenet_tcp_sendrecv_milter_port" lineno="47450">
<summary>
Send and receive TCP traffic on the milter port.
</summary>
@@ -39643,7 +39460,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_milter_port" lineno="47342">
+<interface name="corenet_udp_send_milter_port" lineno="47465">
<summary>
Send UDP traffic on the milter port.
</summary>
@@ -39654,7 +39471,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47357">
+<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47480">
<summary>
Do not audit attempts to send UDP traffic on the milter port.
</summary>
@@ -39665,7 +39482,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_milter_port" lineno="47372">
+<interface name="corenet_udp_receive_milter_port" lineno="47495">
<summary>
Receive UDP traffic on the milter port.
</summary>
@@ -39676,7 +39493,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47387">
+<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47510">
<summary>
Do not audit attempts to receive UDP traffic on the milter port.
</summary>
@@ -39687,7 +39504,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_milter_port" lineno="47402">
+<interface name="corenet_udp_sendrecv_milter_port" lineno="47525">
<summary>
Send and receive UDP traffic on the milter port.
</summary>
@@ -39698,7 +39515,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47418">
+<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47541">
<summary>
Do not audit attempts to send and receive
UDP traffic on the milter port.
@@ -39710,7 +39527,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_milter_port" lineno="47433">
+<interface name="corenet_tcp_bind_milter_port" lineno="47556">
<summary>
Bind TCP sockets to the milter port.
</summary>
@@ -39721,7 +39538,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_milter_port" lineno="47453">
+<interface name="corenet_udp_bind_milter_port" lineno="47576">
<summary>
Bind UDP sockets to the milter port.
</summary>
@@ -39732,7 +39549,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_milter_port" lineno="47472">
+<interface name="corenet_tcp_connect_milter_port" lineno="47595">
<summary>
Make a TCP connection to the milter port.
</summary>
@@ -39742,7 +39559,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_milter_client_packets" lineno="47492">
+<interface name="corenet_send_milter_client_packets" lineno="47615">
<summary>
Send milter_client packets.
</summary>
@@ -39753,7 +39570,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47511">
+<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47634">
<summary>
Do not audit attempts to send milter_client packets.
</summary>
@@ -39764,7 +39581,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_milter_client_packets" lineno="47530">
+<interface name="corenet_receive_milter_client_packets" lineno="47653">
<summary>
Receive milter_client packets.
</summary>
@@ -39775,7 +39592,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47549">
+<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47672">
<summary>
Do not audit attempts to receive milter_client packets.
</summary>
@@ -39786,7 +39603,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_milter_client_packets" lineno="47568">
+<interface name="corenet_sendrecv_milter_client_packets" lineno="47691">
<summary>
Send and receive milter_client packets.
</summary>
@@ -39797,7 +39614,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47584">
+<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47707">
<summary>
Do not audit attempts to send and receive milter_client packets.
</summary>
@@ -39808,7 +39625,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_milter_client_packets" lineno="47599">
+<interface name="corenet_relabelto_milter_client_packets" lineno="47722">
<summary>
Relabel packets to milter_client the packet type.
</summary>
@@ -39818,7 +39635,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_milter_server_packets" lineno="47619">
+<interface name="corenet_send_milter_server_packets" lineno="47742">
<summary>
Send milter_server packets.
</summary>
@@ -39829,7 +39646,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47638">
+<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47761">
<summary>
Do not audit attempts to send milter_server packets.
</summary>
@@ -39840,7 +39657,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_milter_server_packets" lineno="47657">
+<interface name="corenet_receive_milter_server_packets" lineno="47780">
<summary>
Receive milter_server packets.
</summary>
@@ -39851,7 +39668,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47676">
+<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47799">
<summary>
Do not audit attempts to receive milter_server packets.
</summary>
@@ -39862,7 +39679,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_milter_server_packets" lineno="47695">
+<interface name="corenet_sendrecv_milter_server_packets" lineno="47818">
<summary>
Send and receive milter_server packets.
</summary>
@@ -39873,7 +39690,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47711">
+<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47834">
<summary>
Do not audit attempts to send and receive milter_server packets.
</summary>
@@ -39884,7 +39701,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_milter_server_packets" lineno="47726">
+<interface name="corenet_relabelto_milter_server_packets" lineno="47849">
<summary>
Relabel packets to milter_server the packet type.
</summary>
@@ -39894,7 +39711,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47748">
+<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47871">
<summary>
Send and receive TCP traffic on the mmcc port.
</summary>
@@ -39905,7 +39722,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mmcc_port" lineno="47763">
+<interface name="corenet_udp_send_mmcc_port" lineno="47886">
<summary>
Send UDP traffic on the mmcc port.
</summary>
@@ -39916,7 +39733,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47778">
+<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47901">
<summary>
Do not audit attempts to send UDP traffic on the mmcc port.
</summary>
@@ -39927,7 +39744,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mmcc_port" lineno="47793">
+<interface name="corenet_udp_receive_mmcc_port" lineno="47916">
<summary>
Receive UDP traffic on the mmcc port.
</summary>
@@ -39938,7 +39755,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47808">
+<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47931">
<summary>
Do not audit attempts to receive UDP traffic on the mmcc port.
</summary>
@@ -39949,7 +39766,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47823">
+<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47946">
<summary>
Send and receive UDP traffic on the mmcc port.
</summary>
@@ -39960,7 +39777,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47839">
+<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47962">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mmcc port.
@@ -39972,7 +39789,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mmcc_port" lineno="47854">
+<interface name="corenet_tcp_bind_mmcc_port" lineno="47977">
<summary>
Bind TCP sockets to the mmcc port.
</summary>
@@ -39983,7 +39800,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mmcc_port" lineno="47874">
+<interface name="corenet_udp_bind_mmcc_port" lineno="47997">
<summary>
Bind UDP sockets to the mmcc port.
</summary>
@@ -39994,7 +39811,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mmcc_port" lineno="47893">
+<interface name="corenet_tcp_connect_mmcc_port" lineno="48016">
<summary>
Make a TCP connection to the mmcc port.
</summary>
@@ -40004,7 +39821,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mmcc_client_packets" lineno="47913">
+<interface name="corenet_send_mmcc_client_packets" lineno="48036">
<summary>
Send mmcc_client packets.
</summary>
@@ -40015,7 +39832,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="47932">
+<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="48055">
<summary>
Do not audit attempts to send mmcc_client packets.
</summary>
@@ -40026,7 +39843,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mmcc_client_packets" lineno="47951">
+<interface name="corenet_receive_mmcc_client_packets" lineno="48074">
<summary>
Receive mmcc_client packets.
</summary>
@@ -40037,7 +39854,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="47970">
+<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="48093">
<summary>
Do not audit attempts to receive mmcc_client packets.
</summary>
@@ -40048,7 +39865,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mmcc_client_packets" lineno="47989">
+<interface name="corenet_sendrecv_mmcc_client_packets" lineno="48112">
<summary>
Send and receive mmcc_client packets.
</summary>
@@ -40059,7 +39876,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48005">
+<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48128">
<summary>
Do not audit attempts to send and receive mmcc_client packets.
</summary>
@@ -40070,7 +39887,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mmcc_client_packets" lineno="48020">
+<interface name="corenet_relabelto_mmcc_client_packets" lineno="48143">
<summary>
Relabel packets to mmcc_client the packet type.
</summary>
@@ -40080,7 +39897,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mmcc_server_packets" lineno="48040">
+<interface name="corenet_send_mmcc_server_packets" lineno="48163">
<summary>
Send mmcc_server packets.
</summary>
@@ -40091,7 +39908,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48059">
+<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48182">
<summary>
Do not audit attempts to send mmcc_server packets.
</summary>
@@ -40102,7 +39919,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mmcc_server_packets" lineno="48078">
+<interface name="corenet_receive_mmcc_server_packets" lineno="48201">
<summary>
Receive mmcc_server packets.
</summary>
@@ -40113,7 +39930,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48097">
+<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48220">
<summary>
Do not audit attempts to receive mmcc_server packets.
</summary>
@@ -40124,7 +39941,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48116">
+<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48239">
<summary>
Send and receive mmcc_server packets.
</summary>
@@ -40135,7 +39952,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48132">
+<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48255">
<summary>
Do not audit attempts to send and receive mmcc_server packets.
</summary>
@@ -40146,7 +39963,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mmcc_server_packets" lineno="48147">
+<interface name="corenet_relabelto_mmcc_server_packets" lineno="48270">
<summary>
Relabel packets to mmcc_server the packet type.
</summary>
@@ -40156,7 +39973,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mon_port" lineno="48169">
+<interface name="corenet_tcp_sendrecv_mon_port" lineno="48292">
<summary>
Send and receive TCP traffic on the mon port.
</summary>
@@ -40167,7 +39984,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mon_port" lineno="48184">
+<interface name="corenet_udp_send_mon_port" lineno="48307">
<summary>
Send UDP traffic on the mon port.
</summary>
@@ -40178,7 +39995,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48199">
+<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48322">
<summary>
Do not audit attempts to send UDP traffic on the mon port.
</summary>
@@ -40189,7 +40006,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mon_port" lineno="48214">
+<interface name="corenet_udp_receive_mon_port" lineno="48337">
<summary>
Receive UDP traffic on the mon port.
</summary>
@@ -40200,7 +40017,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48229">
+<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48352">
<summary>
Do not audit attempts to receive UDP traffic on the mon port.
</summary>
@@ -40211,7 +40028,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mon_port" lineno="48244">
+<interface name="corenet_udp_sendrecv_mon_port" lineno="48367">
<summary>
Send and receive UDP traffic on the mon port.
</summary>
@@ -40222,7 +40039,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48260">
+<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48383">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mon port.
@@ -40234,7 +40051,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mon_port" lineno="48275">
+<interface name="corenet_tcp_bind_mon_port" lineno="48398">
<summary>
Bind TCP sockets to the mon port.
</summary>
@@ -40245,7 +40062,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mon_port" lineno="48295">
+<interface name="corenet_udp_bind_mon_port" lineno="48418">
<summary>
Bind UDP sockets to the mon port.
</summary>
@@ -40256,7 +40073,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mon_port" lineno="48314">
+<interface name="corenet_tcp_connect_mon_port" lineno="48437">
<summary>
Make a TCP connection to the mon port.
</summary>
@@ -40266,7 +40083,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mon_client_packets" lineno="48334">
+<interface name="corenet_send_mon_client_packets" lineno="48457">
<summary>
Send mon_client packets.
</summary>
@@ -40277,7 +40094,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48353">
+<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48476">
<summary>
Do not audit attempts to send mon_client packets.
</summary>
@@ -40288,7 +40105,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mon_client_packets" lineno="48372">
+<interface name="corenet_receive_mon_client_packets" lineno="48495">
<summary>
Receive mon_client packets.
</summary>
@@ -40299,7 +40116,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48391">
+<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48514">
<summary>
Do not audit attempts to receive mon_client packets.
</summary>
@@ -40310,7 +40127,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mon_client_packets" lineno="48410">
+<interface name="corenet_sendrecv_mon_client_packets" lineno="48533">
<summary>
Send and receive mon_client packets.
</summary>
@@ -40321,7 +40138,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48426">
+<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48549">
<summary>
Do not audit attempts to send and receive mon_client packets.
</summary>
@@ -40332,7 +40149,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mon_client_packets" lineno="48441">
+<interface name="corenet_relabelto_mon_client_packets" lineno="48564">
<summary>
Relabel packets to mon_client the packet type.
</summary>
@@ -40342,7 +40159,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mon_server_packets" lineno="48461">
+<interface name="corenet_send_mon_server_packets" lineno="48584">
<summary>
Send mon_server packets.
</summary>
@@ -40353,7 +40170,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48480">
+<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48603">
<summary>
Do not audit attempts to send mon_server packets.
</summary>
@@ -40364,7 +40181,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mon_server_packets" lineno="48499">
+<interface name="corenet_receive_mon_server_packets" lineno="48622">
<summary>
Receive mon_server packets.
</summary>
@@ -40375,7 +40192,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48518">
+<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48641">
<summary>
Do not audit attempts to receive mon_server packets.
</summary>
@@ -40386,7 +40203,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mon_server_packets" lineno="48537">
+<interface name="corenet_sendrecv_mon_server_packets" lineno="48660">
<summary>
Send and receive mon_server packets.
</summary>
@@ -40397,7 +40214,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48553">
+<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48676">
<summary>
Do not audit attempts to send and receive mon_server packets.
</summary>
@@ -40408,7 +40225,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mon_server_packets" lineno="48568">
+<interface name="corenet_relabelto_mon_server_packets" lineno="48691">
<summary>
Relabel packets to mon_server the packet type.
</summary>
@@ -40418,7 +40235,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_monit_port" lineno="48590">
+<interface name="corenet_tcp_sendrecv_monit_port" lineno="48713">
<summary>
Send and receive TCP traffic on the monit port.
</summary>
@@ -40429,7 +40246,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_monit_port" lineno="48605">
+<interface name="corenet_udp_send_monit_port" lineno="48728">
<summary>
Send UDP traffic on the monit port.
</summary>
@@ -40440,7 +40257,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48620">
+<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48743">
<summary>
Do not audit attempts to send UDP traffic on the monit port.
</summary>
@@ -40451,7 +40268,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_monit_port" lineno="48635">
+<interface name="corenet_udp_receive_monit_port" lineno="48758">
<summary>
Receive UDP traffic on the monit port.
</summary>
@@ -40462,7 +40279,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48650">
+<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48773">
<summary>
Do not audit attempts to receive UDP traffic on the monit port.
</summary>
@@ -40473,7 +40290,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_monit_port" lineno="48665">
+<interface name="corenet_udp_sendrecv_monit_port" lineno="48788">
<summary>
Send and receive UDP traffic on the monit port.
</summary>
@@ -40484,7 +40301,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48681">
+<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48804">
<summary>
Do not audit attempts to send and receive
UDP traffic on the monit port.
@@ -40496,7 +40313,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_monit_port" lineno="48696">
+<interface name="corenet_tcp_bind_monit_port" lineno="48819">
<summary>
Bind TCP sockets to the monit port.
</summary>
@@ -40507,7 +40324,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_monit_port" lineno="48716">
+<interface name="corenet_udp_bind_monit_port" lineno="48839">
<summary>
Bind UDP sockets to the monit port.
</summary>
@@ -40518,7 +40335,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_monit_port" lineno="48735">
+<interface name="corenet_tcp_connect_monit_port" lineno="48858">
<summary>
Make a TCP connection to the monit port.
</summary>
@@ -40528,7 +40345,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monit_client_packets" lineno="48755">
+<interface name="corenet_send_monit_client_packets" lineno="48878">
<summary>
Send monit_client packets.
</summary>
@@ -40539,7 +40356,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48774">
+<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48897">
<summary>
Do not audit attempts to send monit_client packets.
</summary>
@@ -40550,7 +40367,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monit_client_packets" lineno="48793">
+<interface name="corenet_receive_monit_client_packets" lineno="48916">
<summary>
Receive monit_client packets.
</summary>
@@ -40561,7 +40378,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48812">
+<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48935">
<summary>
Do not audit attempts to receive monit_client packets.
</summary>
@@ -40572,7 +40389,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monit_client_packets" lineno="48831">
+<interface name="corenet_sendrecv_monit_client_packets" lineno="48954">
<summary>
Send and receive monit_client packets.
</summary>
@@ -40583,7 +40400,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48847">
+<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48970">
<summary>
Do not audit attempts to send and receive monit_client packets.
</summary>
@@ -40594,7 +40411,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monit_client_packets" lineno="48862">
+<interface name="corenet_relabelto_monit_client_packets" lineno="48985">
<summary>
Relabel packets to monit_client the packet type.
</summary>
@@ -40604,7 +40421,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monit_server_packets" lineno="48882">
+<interface name="corenet_send_monit_server_packets" lineno="49005">
<summary>
Send monit_server packets.
</summary>
@@ -40615,7 +40432,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monit_server_packets" lineno="48901">
+<interface name="corenet_dontaudit_send_monit_server_packets" lineno="49024">
<summary>
Do not audit attempts to send monit_server packets.
</summary>
@@ -40626,7 +40443,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monit_server_packets" lineno="48920">
+<interface name="corenet_receive_monit_server_packets" lineno="49043">
<summary>
Receive monit_server packets.
</summary>
@@ -40637,7 +40454,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="48939">
+<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="49062">
<summary>
Do not audit attempts to receive monit_server packets.
</summary>
@@ -40648,7 +40465,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monit_server_packets" lineno="48958">
+<interface name="corenet_sendrecv_monit_server_packets" lineno="49081">
<summary>
Send and receive monit_server packets.
</summary>
@@ -40659,7 +40476,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="48974">
+<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="49097">
<summary>
Do not audit attempts to send and receive monit_server packets.
</summary>
@@ -40670,7 +40487,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monit_server_packets" lineno="48989">
+<interface name="corenet_relabelto_monit_server_packets" lineno="49112">
<summary>
Relabel packets to monit_server the packet type.
</summary>
@@ -40680,7 +40497,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49011">
+<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49134">
<summary>
Send and receive TCP traffic on the monopd port.
</summary>
@@ -40691,7 +40508,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_monopd_port" lineno="49026">
+<interface name="corenet_udp_send_monopd_port" lineno="49149">
<summary>
Send UDP traffic on the monopd port.
</summary>
@@ -40702,7 +40519,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49041">
+<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49164">
<summary>
Do not audit attempts to send UDP traffic on the monopd port.
</summary>
@@ -40713,7 +40530,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_monopd_port" lineno="49056">
+<interface name="corenet_udp_receive_monopd_port" lineno="49179">
<summary>
Receive UDP traffic on the monopd port.
</summary>
@@ -40724,7 +40541,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49071">
+<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49194">
<summary>
Do not audit attempts to receive UDP traffic on the monopd port.
</summary>
@@ -40735,7 +40552,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_monopd_port" lineno="49086">
+<interface name="corenet_udp_sendrecv_monopd_port" lineno="49209">
<summary>
Send and receive UDP traffic on the monopd port.
</summary>
@@ -40746,7 +40563,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49102">
+<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49225">
<summary>
Do not audit attempts to send and receive
UDP traffic on the monopd port.
@@ -40758,7 +40575,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_monopd_port" lineno="49117">
+<interface name="corenet_tcp_bind_monopd_port" lineno="49240">
<summary>
Bind TCP sockets to the monopd port.
</summary>
@@ -40769,7 +40586,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_monopd_port" lineno="49137">
+<interface name="corenet_udp_bind_monopd_port" lineno="49260">
<summary>
Bind UDP sockets to the monopd port.
</summary>
@@ -40780,7 +40597,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_monopd_port" lineno="49156">
+<interface name="corenet_tcp_connect_monopd_port" lineno="49279">
<summary>
Make a TCP connection to the monopd port.
</summary>
@@ -40790,7 +40607,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monopd_client_packets" lineno="49176">
+<interface name="corenet_send_monopd_client_packets" lineno="49299">
<summary>
Send monopd_client packets.
</summary>
@@ -40801,7 +40618,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49195">
+<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49318">
<summary>
Do not audit attempts to send monopd_client packets.
</summary>
@@ -40812,7 +40629,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monopd_client_packets" lineno="49214">
+<interface name="corenet_receive_monopd_client_packets" lineno="49337">
<summary>
Receive monopd_client packets.
</summary>
@@ -40823,7 +40640,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49233">
+<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49356">
<summary>
Do not audit attempts to receive monopd_client packets.
</summary>
@@ -40834,7 +40651,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monopd_client_packets" lineno="49252">
+<interface name="corenet_sendrecv_monopd_client_packets" lineno="49375">
<summary>
Send and receive monopd_client packets.
</summary>
@@ -40845,7 +40662,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49268">
+<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49391">
<summary>
Do not audit attempts to send and receive monopd_client packets.
</summary>
@@ -40856,7 +40673,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monopd_client_packets" lineno="49283">
+<interface name="corenet_relabelto_monopd_client_packets" lineno="49406">
<summary>
Relabel packets to monopd_client the packet type.
</summary>
@@ -40866,7 +40683,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monopd_server_packets" lineno="49303">
+<interface name="corenet_send_monopd_server_packets" lineno="49426">
<summary>
Send monopd_server packets.
</summary>
@@ -40877,7 +40694,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49322">
+<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49445">
<summary>
Do not audit attempts to send monopd_server packets.
</summary>
@@ -40888,7 +40705,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monopd_server_packets" lineno="49341">
+<interface name="corenet_receive_monopd_server_packets" lineno="49464">
<summary>
Receive monopd_server packets.
</summary>
@@ -40899,7 +40716,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49360">
+<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49483">
<summary>
Do not audit attempts to receive monopd_server packets.
</summary>
@@ -40910,7 +40727,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monopd_server_packets" lineno="49379">
+<interface name="corenet_sendrecv_monopd_server_packets" lineno="49502">
<summary>
Send and receive monopd_server packets.
</summary>
@@ -40921,7 +40738,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49395">
+<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49518">
<summary>
Do not audit attempts to send and receive monopd_server packets.
</summary>
@@ -40932,7 +40749,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monopd_server_packets" lineno="49410">
+<interface name="corenet_relabelto_monopd_server_packets" lineno="49533">
<summary>
Relabel packets to monopd_server the packet type.
</summary>
@@ -40942,7 +40759,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49432">
+<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49555">
<summary>
Send and receive TCP traffic on the mountd port.
</summary>
@@ -40953,7 +40770,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mountd_port" lineno="49447">
+<interface name="corenet_udp_send_mountd_port" lineno="49570">
<summary>
Send UDP traffic on the mountd port.
</summary>
@@ -40964,7 +40781,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49462">
+<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49585">
<summary>
Do not audit attempts to send UDP traffic on the mountd port.
</summary>
@@ -40975,7 +40792,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mountd_port" lineno="49477">
+<interface name="corenet_udp_receive_mountd_port" lineno="49600">
<summary>
Receive UDP traffic on the mountd port.
</summary>
@@ -40986,7 +40803,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49492">
+<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49615">
<summary>
Do not audit attempts to receive UDP traffic on the mountd port.
</summary>
@@ -40997,7 +40814,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mountd_port" lineno="49507">
+<interface name="corenet_udp_sendrecv_mountd_port" lineno="49630">
<summary>
Send and receive UDP traffic on the mountd port.
</summary>
@@ -41008,7 +40825,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49523">
+<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49646">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mountd port.
@@ -41020,7 +40837,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mountd_port" lineno="49538">
+<interface name="corenet_tcp_bind_mountd_port" lineno="49661">
<summary>
Bind TCP sockets to the mountd port.
</summary>
@@ -41031,7 +40848,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mountd_port" lineno="49558">
+<interface name="corenet_udp_bind_mountd_port" lineno="49681">
<summary>
Bind UDP sockets to the mountd port.
</summary>
@@ -41042,7 +40859,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mountd_port" lineno="49577">
+<interface name="corenet_tcp_connect_mountd_port" lineno="49700">
<summary>
Make a TCP connection to the mountd port.
</summary>
@@ -41052,7 +40869,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mountd_client_packets" lineno="49597">
+<interface name="corenet_send_mountd_client_packets" lineno="49720">
<summary>
Send mountd_client packets.
</summary>
@@ -41063,7 +40880,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49616">
+<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49739">
<summary>
Do not audit attempts to send mountd_client packets.
</summary>
@@ -41074,7 +40891,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mountd_client_packets" lineno="49635">
+<interface name="corenet_receive_mountd_client_packets" lineno="49758">
<summary>
Receive mountd_client packets.
</summary>
@@ -41085,7 +40902,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49654">
+<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49777">
<summary>
Do not audit attempts to receive mountd_client packets.
</summary>
@@ -41096,7 +40913,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mountd_client_packets" lineno="49673">
+<interface name="corenet_sendrecv_mountd_client_packets" lineno="49796">
<summary>
Send and receive mountd_client packets.
</summary>
@@ -41107,7 +40924,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49689">
+<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49812">
<summary>
Do not audit attempts to send and receive mountd_client packets.
</summary>
@@ -41118,7 +40935,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mountd_client_packets" lineno="49704">
+<interface name="corenet_relabelto_mountd_client_packets" lineno="49827">
<summary>
Relabel packets to mountd_client the packet type.
</summary>
@@ -41128,7 +40945,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mountd_server_packets" lineno="49724">
+<interface name="corenet_send_mountd_server_packets" lineno="49847">
<summary>
Send mountd_server packets.
</summary>
@@ -41139,7 +40956,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49743">
+<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49866">
<summary>
Do not audit attempts to send mountd_server packets.
</summary>
@@ -41150,7 +40967,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mountd_server_packets" lineno="49762">
+<interface name="corenet_receive_mountd_server_packets" lineno="49885">
<summary>
Receive mountd_server packets.
</summary>
@@ -41161,7 +40978,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49781">
+<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49904">
<summary>
Do not audit attempts to receive mountd_server packets.
</summary>
@@ -41172,7 +40989,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mountd_server_packets" lineno="49800">
+<interface name="corenet_sendrecv_mountd_server_packets" lineno="49923">
<summary>
Send and receive mountd_server packets.
</summary>
@@ -41183,7 +41000,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49816">
+<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49939">
<summary>
Do not audit attempts to send and receive mountd_server packets.
</summary>
@@ -41194,7 +41011,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mountd_server_packets" lineno="49831">
+<interface name="corenet_relabelto_mountd_server_packets" lineno="49954">
<summary>
Relabel packets to mountd_server the packet type.
</summary>
@@ -41204,7 +41021,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49853">
+<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49976">
<summary>
Send and receive TCP traffic on the movaz_ssc port.
</summary>
@@ -41215,7 +41032,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_movaz_ssc_port" lineno="49868">
+<interface name="corenet_udp_send_movaz_ssc_port" lineno="49991">
<summary>
Send UDP traffic on the movaz_ssc port.
</summary>
@@ -41226,7 +41043,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="49883">
+<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="50006">
<summary>
Do not audit attempts to send UDP traffic on the movaz_ssc port.
</summary>
@@ -41237,7 +41054,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_movaz_ssc_port" lineno="49898">
+<interface name="corenet_udp_receive_movaz_ssc_port" lineno="50021">
<summary>
Receive UDP traffic on the movaz_ssc port.
</summary>
@@ -41248,7 +41065,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="49913">
+<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="50036">
<summary>
Do not audit attempts to receive UDP traffic on the movaz_ssc port.
</summary>
@@ -41259,7 +41076,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="49928">
+<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="50051">
<summary>
Send and receive UDP traffic on the movaz_ssc port.
</summary>
@@ -41270,7 +41087,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="49944">
+<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="50067">
<summary>
Do not audit attempts to send and receive
UDP traffic on the movaz_ssc port.
@@ -41282,7 +41099,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="49959">
+<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="50082">
<summary>
Bind TCP sockets to the movaz_ssc port.
</summary>
@@ -41293,7 +41110,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_movaz_ssc_port" lineno="49979">
+<interface name="corenet_udp_bind_movaz_ssc_port" lineno="50102">
<summary>
Bind UDP sockets to the movaz_ssc port.
</summary>
@@ -41304,7 +41121,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="49998">
+<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="50121">
<summary>
Make a TCP connection to the movaz_ssc port.
</summary>
@@ -41314,7 +41131,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_movaz_ssc_client_packets" lineno="50018">
+<interface name="corenet_send_movaz_ssc_client_packets" lineno="50141">
<summary>
Send movaz_ssc_client packets.
</summary>
@@ -41325,7 +41142,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50037">
+<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50160">
<summary>
Do not audit attempts to send movaz_ssc_client packets.
</summary>
@@ -41336,7 +41153,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50056">
+<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50179">
<summary>
Receive movaz_ssc_client packets.
</summary>
@@ -41347,7 +41164,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50075">
+<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50198">
<summary>
Do not audit attempts to receive movaz_ssc_client packets.
</summary>
@@ -41358,7 +41175,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50094">
+<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50217">
<summary>
Send and receive movaz_ssc_client packets.
</summary>
@@ -41369,7 +41186,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50110">
+<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50233">
<summary>
Do not audit attempts to send and receive movaz_ssc_client packets.
</summary>
@@ -41380,7 +41197,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50125">
+<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50248">
<summary>
Relabel packets to movaz_ssc_client the packet type.
</summary>
@@ -41390,7 +41207,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_movaz_ssc_server_packets" lineno="50145">
+<interface name="corenet_send_movaz_ssc_server_packets" lineno="50268">
<summary>
Send movaz_ssc_server packets.
</summary>
@@ -41401,7 +41218,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50164">
+<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50287">
<summary>
Do not audit attempts to send movaz_ssc_server packets.
</summary>
@@ -41412,7 +41229,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50183">
+<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50306">
<summary>
Receive movaz_ssc_server packets.
</summary>
@@ -41423,7 +41240,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50202">
+<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50325">
<summary>
Do not audit attempts to receive movaz_ssc_server packets.
</summary>
@@ -41434,7 +41251,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50221">
+<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50344">
<summary>
Send and receive movaz_ssc_server packets.
</summary>
@@ -41445,7 +41262,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50237">
+<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50360">
<summary>
Do not audit attempts to send and receive movaz_ssc_server packets.
</summary>
@@ -41456,7 +41273,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50252">
+<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50375">
<summary>
Relabel packets to movaz_ssc_server the packet type.
</summary>
@@ -41466,7 +41283,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50274">
+<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50397">
<summary>
Send and receive TCP traffic on the mpd port.
</summary>
@@ -41477,7 +41294,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mpd_port" lineno="50289">
+<interface name="corenet_udp_send_mpd_port" lineno="50412">
<summary>
Send UDP traffic on the mpd port.
</summary>
@@ -41488,7 +41305,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50304">
+<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50427">
<summary>
Do not audit attempts to send UDP traffic on the mpd port.
</summary>
@@ -41499,7 +41316,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mpd_port" lineno="50319">
+<interface name="corenet_udp_receive_mpd_port" lineno="50442">
<summary>
Receive UDP traffic on the mpd port.
</summary>
@@ -41510,7 +41327,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50334">
+<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50457">
<summary>
Do not audit attempts to receive UDP traffic on the mpd port.
</summary>
@@ -41521,7 +41338,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mpd_port" lineno="50349">
+<interface name="corenet_udp_sendrecv_mpd_port" lineno="50472">
<summary>
Send and receive UDP traffic on the mpd port.
</summary>
@@ -41532,7 +41349,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50365">
+<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50488">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mpd port.
@@ -41544,7 +41361,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mpd_port" lineno="50380">
+<interface name="corenet_tcp_bind_mpd_port" lineno="50503">
<summary>
Bind TCP sockets to the mpd port.
</summary>
@@ -41555,7 +41372,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mpd_port" lineno="50400">
+<interface name="corenet_udp_bind_mpd_port" lineno="50523">
<summary>
Bind UDP sockets to the mpd port.
</summary>
@@ -41566,7 +41383,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mpd_port" lineno="50419">
+<interface name="corenet_tcp_connect_mpd_port" lineno="50542">
<summary>
Make a TCP connection to the mpd port.
</summary>
@@ -41576,7 +41393,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mpd_client_packets" lineno="50439">
+<interface name="corenet_send_mpd_client_packets" lineno="50562">
<summary>
Send mpd_client packets.
</summary>
@@ -41587,7 +41404,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50458">
+<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50581">
<summary>
Do not audit attempts to send mpd_client packets.
</summary>
@@ -41598,7 +41415,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mpd_client_packets" lineno="50477">
+<interface name="corenet_receive_mpd_client_packets" lineno="50600">
<summary>
Receive mpd_client packets.
</summary>
@@ -41609,7 +41426,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50496">
+<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50619">
<summary>
Do not audit attempts to receive mpd_client packets.
</summary>
@@ -41620,7 +41437,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mpd_client_packets" lineno="50515">
+<interface name="corenet_sendrecv_mpd_client_packets" lineno="50638">
<summary>
Send and receive mpd_client packets.
</summary>
@@ -41631,7 +41448,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50531">
+<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50654">
<summary>
Do not audit attempts to send and receive mpd_client packets.
</summary>
@@ -41642,7 +41459,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mpd_client_packets" lineno="50546">
+<interface name="corenet_relabelto_mpd_client_packets" lineno="50669">
<summary>
Relabel packets to mpd_client the packet type.
</summary>
@@ -41652,7 +41469,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mpd_server_packets" lineno="50566">
+<interface name="corenet_send_mpd_server_packets" lineno="50689">
<summary>
Send mpd_server packets.
</summary>
@@ -41663,7 +41480,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50585">
+<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50708">
<summary>
Do not audit attempts to send mpd_server packets.
</summary>
@@ -41674,7 +41491,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mpd_server_packets" lineno="50604">
+<interface name="corenet_receive_mpd_server_packets" lineno="50727">
<summary>
Receive mpd_server packets.
</summary>
@@ -41685,7 +41502,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50623">
+<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50746">
<summary>
Do not audit attempts to receive mpd_server packets.
</summary>
@@ -41696,7 +41513,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mpd_server_packets" lineno="50642">
+<interface name="corenet_sendrecv_mpd_server_packets" lineno="50765">
<summary>
Send and receive mpd_server packets.
</summary>
@@ -41707,7 +41524,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50658">
+<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50781">
<summary>
Do not audit attempts to send and receive mpd_server packets.
</summary>
@@ -41718,7 +41535,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mpd_server_packets" lineno="50673">
+<interface name="corenet_relabelto_mpd_server_packets" lineno="50796">
<summary>
Relabel packets to mpd_server the packet type.
</summary>
@@ -41728,7 +41545,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50695">
+<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50818">
<summary>
Send and receive TCP traffic on the msgsrvr port.
</summary>
@@ -41739,7 +41556,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_msgsrvr_port" lineno="50710">
+<interface name="corenet_udp_send_msgsrvr_port" lineno="50833">
<summary>
Send UDP traffic on the msgsrvr port.
</summary>
@@ -41750,7 +41567,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50725">
+<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50848">
<summary>
Do not audit attempts to send UDP traffic on the msgsrvr port.
</summary>
@@ -41761,7 +41578,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_msgsrvr_port" lineno="50740">
+<interface name="corenet_udp_receive_msgsrvr_port" lineno="50863">
<summary>
Receive UDP traffic on the msgsrvr port.
</summary>
@@ -41772,7 +41589,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50755">
+<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50878">
<summary>
Do not audit attempts to receive UDP traffic on the msgsrvr port.
</summary>
@@ -41783,7 +41600,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50770">
+<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50893">
<summary>
Send and receive UDP traffic on the msgsrvr port.
</summary>
@@ -41794,7 +41611,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50786">
+<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50909">
<summary>
Do not audit attempts to send and receive
UDP traffic on the msgsrvr port.
@@ -41806,7 +41623,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50801">
+<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50924">
<summary>
Bind TCP sockets to the msgsrvr port.
</summary>
@@ -41817,7 +41634,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_msgsrvr_port" lineno="50821">
+<interface name="corenet_udp_bind_msgsrvr_port" lineno="50944">
<summary>
Bind UDP sockets to the msgsrvr port.
</summary>
@@ -41828,7 +41645,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50840">
+<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50963">
<summary>
Make a TCP connection to the msgsrvr port.
</summary>
@@ -41838,7 +41655,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msgsrvr_client_packets" lineno="50860">
+<interface name="corenet_send_msgsrvr_client_packets" lineno="50983">
<summary>
Send msgsrvr_client packets.
</summary>
@@ -41849,7 +41666,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="50879">
+<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="51002">
<summary>
Do not audit attempts to send msgsrvr_client packets.
</summary>
@@ -41860,7 +41677,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msgsrvr_client_packets" lineno="50898">
+<interface name="corenet_receive_msgsrvr_client_packets" lineno="51021">
<summary>
Receive msgsrvr_client packets.
</summary>
@@ -41871,7 +41688,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="50917">
+<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="51040">
<summary>
Do not audit attempts to receive msgsrvr_client packets.
</summary>
@@ -41882,7 +41699,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="50936">
+<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="51059">
<summary>
Send and receive msgsrvr_client packets.
</summary>
@@ -41893,7 +41710,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="50952">
+<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="51075">
<summary>
Do not audit attempts to send and receive msgsrvr_client packets.
</summary>
@@ -41904,7 +41721,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="50967">
+<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="51090">
<summary>
Relabel packets to msgsrvr_client the packet type.
</summary>
@@ -41914,7 +41731,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msgsrvr_server_packets" lineno="50987">
+<interface name="corenet_send_msgsrvr_server_packets" lineno="51110">
<summary>
Send msgsrvr_server packets.
</summary>
@@ -41925,7 +41742,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51006">
+<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51129">
<summary>
Do not audit attempts to send msgsrvr_server packets.
</summary>
@@ -41936,7 +41753,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msgsrvr_server_packets" lineno="51025">
+<interface name="corenet_receive_msgsrvr_server_packets" lineno="51148">
<summary>
Receive msgsrvr_server packets.
</summary>
@@ -41947,7 +41764,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51044">
+<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51167">
<summary>
Do not audit attempts to receive msgsrvr_server packets.
</summary>
@@ -41958,7 +41775,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51063">
+<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51186">
<summary>
Send and receive msgsrvr_server packets.
</summary>
@@ -41969,7 +41786,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51079">
+<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51202">
<summary>
Do not audit attempts to send and receive msgsrvr_server packets.
</summary>
@@ -41980,7 +41797,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51094">
+<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51217">
<summary>
Relabel packets to msgsrvr_server the packet type.
</summary>
@@ -41990,7 +41807,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51116">
+<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51239">
<summary>
Send and receive TCP traffic on the msnp port.
</summary>
@@ -42001,7 +41818,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_msnp_port" lineno="51131">
+<interface name="corenet_udp_send_msnp_port" lineno="51254">
<summary>
Send UDP traffic on the msnp port.
</summary>
@@ -42012,7 +41829,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51146">
+<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51269">
<summary>
Do not audit attempts to send UDP traffic on the msnp port.
</summary>
@@ -42023,7 +41840,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_msnp_port" lineno="51161">
+<interface name="corenet_udp_receive_msnp_port" lineno="51284">
<summary>
Receive UDP traffic on the msnp port.
</summary>
@@ -42034,7 +41851,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51176">
+<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51299">
<summary>
Do not audit attempts to receive UDP traffic on the msnp port.
</summary>
@@ -42045,7 +41862,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_msnp_port" lineno="51191">
+<interface name="corenet_udp_sendrecv_msnp_port" lineno="51314">
<summary>
Send and receive UDP traffic on the msnp port.
</summary>
@@ -42056,7 +41873,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51207">
+<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51330">
<summary>
Do not audit attempts to send and receive
UDP traffic on the msnp port.
@@ -42068,7 +41885,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_msnp_port" lineno="51222">
+<interface name="corenet_tcp_bind_msnp_port" lineno="51345">
<summary>
Bind TCP sockets to the msnp port.
</summary>
@@ -42079,7 +41896,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_msnp_port" lineno="51242">
+<interface name="corenet_udp_bind_msnp_port" lineno="51365">
<summary>
Bind UDP sockets to the msnp port.
</summary>
@@ -42090,7 +41907,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_msnp_port" lineno="51261">
+<interface name="corenet_tcp_connect_msnp_port" lineno="51384">
<summary>
Make a TCP connection to the msnp port.
</summary>
@@ -42100,7 +41917,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msnp_client_packets" lineno="51281">
+<interface name="corenet_send_msnp_client_packets" lineno="51404">
<summary>
Send msnp_client packets.
</summary>
@@ -42111,7 +41928,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51300">
+<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51423">
<summary>
Do not audit attempts to send msnp_client packets.
</summary>
@@ -42122,7 +41939,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msnp_client_packets" lineno="51319">
+<interface name="corenet_receive_msnp_client_packets" lineno="51442">
<summary>
Receive msnp_client packets.
</summary>
@@ -42133,7 +41950,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51338">
+<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51461">
<summary>
Do not audit attempts to receive msnp_client packets.
</summary>
@@ -42144,7 +41961,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msnp_client_packets" lineno="51357">
+<interface name="corenet_sendrecv_msnp_client_packets" lineno="51480">
<summary>
Send and receive msnp_client packets.
</summary>
@@ -42155,7 +41972,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51373">
+<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51496">
<summary>
Do not audit attempts to send and receive msnp_client packets.
</summary>
@@ -42166,7 +41983,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msnp_client_packets" lineno="51388">
+<interface name="corenet_relabelto_msnp_client_packets" lineno="51511">
<summary>
Relabel packets to msnp_client the packet type.
</summary>
@@ -42176,7 +41993,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msnp_server_packets" lineno="51408">
+<interface name="corenet_send_msnp_server_packets" lineno="51531">
<summary>
Send msnp_server packets.
</summary>
@@ -42187,7 +42004,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51427">
+<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51550">
<summary>
Do not audit attempts to send msnp_server packets.
</summary>
@@ -42198,7 +42015,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msnp_server_packets" lineno="51446">
+<interface name="corenet_receive_msnp_server_packets" lineno="51569">
<summary>
Receive msnp_server packets.
</summary>
@@ -42209,7 +42026,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51465">
+<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51588">
<summary>
Do not audit attempts to receive msnp_server packets.
</summary>
@@ -42220,7 +42037,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msnp_server_packets" lineno="51484">
+<interface name="corenet_sendrecv_msnp_server_packets" lineno="51607">
<summary>
Send and receive msnp_server packets.
</summary>
@@ -42231,7 +42048,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51500">
+<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51623">
<summary>
Do not audit attempts to send and receive msnp_server packets.
</summary>
@@ -42242,7 +42059,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msnp_server_packets" lineno="51515">
+<interface name="corenet_relabelto_msnp_server_packets" lineno="51638">
<summary>
Relabel packets to msnp_server the packet type.
</summary>
@@ -42252,7 +42069,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51537">
+<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51660">
<summary>
Send and receive TCP traffic on the mssql port.
</summary>
@@ -42263,7 +42080,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mssql_port" lineno="51552">
+<interface name="corenet_udp_send_mssql_port" lineno="51675">
<summary>
Send UDP traffic on the mssql port.
</summary>
@@ -42274,7 +42091,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51567">
+<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51690">
<summary>
Do not audit attempts to send UDP traffic on the mssql port.
</summary>
@@ -42285,7 +42102,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mssql_port" lineno="51582">
+<interface name="corenet_udp_receive_mssql_port" lineno="51705">
<summary>
Receive UDP traffic on the mssql port.
</summary>
@@ -42296,7 +42113,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51597">
+<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51720">
<summary>
Do not audit attempts to receive UDP traffic on the mssql port.
</summary>
@@ -42307,7 +42124,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mssql_port" lineno="51612">
+<interface name="corenet_udp_sendrecv_mssql_port" lineno="51735">
<summary>
Send and receive UDP traffic on the mssql port.
</summary>
@@ -42318,7 +42135,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51628">
+<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51751">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mssql port.
@@ -42330,7 +42147,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mssql_port" lineno="51643">
+<interface name="corenet_tcp_bind_mssql_port" lineno="51766">
<summary>
Bind TCP sockets to the mssql port.
</summary>
@@ -42341,7 +42158,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mssql_port" lineno="51663">
+<interface name="corenet_udp_bind_mssql_port" lineno="51786">
<summary>
Bind UDP sockets to the mssql port.
</summary>
@@ -42352,7 +42169,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mssql_port" lineno="51682">
+<interface name="corenet_tcp_connect_mssql_port" lineno="51805">
<summary>
Make a TCP connection to the mssql port.
</summary>
@@ -42362,7 +42179,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mssql_client_packets" lineno="51702">
+<interface name="corenet_send_mssql_client_packets" lineno="51825">
<summary>
Send mssql_client packets.
</summary>
@@ -42373,7 +42190,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51721">
+<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51844">
<summary>
Do not audit attempts to send mssql_client packets.
</summary>
@@ -42384,7 +42201,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mssql_client_packets" lineno="51740">
+<interface name="corenet_receive_mssql_client_packets" lineno="51863">
<summary>
Receive mssql_client packets.
</summary>
@@ -42395,7 +42212,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51759">
+<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51882">
<summary>
Do not audit attempts to receive mssql_client packets.
</summary>
@@ -42406,7 +42223,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mssql_client_packets" lineno="51778">
+<interface name="corenet_sendrecv_mssql_client_packets" lineno="51901">
<summary>
Send and receive mssql_client packets.
</summary>
@@ -42417,7 +42234,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51794">
+<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51917">
<summary>
Do not audit attempts to send and receive mssql_client packets.
</summary>
@@ -42428,7 +42245,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mssql_client_packets" lineno="51809">
+<interface name="corenet_relabelto_mssql_client_packets" lineno="51932">
<summary>
Relabel packets to mssql_client the packet type.
</summary>
@@ -42438,7 +42255,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mssql_server_packets" lineno="51829">
+<interface name="corenet_send_mssql_server_packets" lineno="51952">
<summary>
Send mssql_server packets.
</summary>
@@ -42449,7 +42266,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51848">
+<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51971">
<summary>
Do not audit attempts to send mssql_server packets.
</summary>
@@ -42460,7 +42277,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mssql_server_packets" lineno="51867">
+<interface name="corenet_receive_mssql_server_packets" lineno="51990">
<summary>
Receive mssql_server packets.
</summary>
@@ -42471,7 +42288,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="51886">
+<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="52009">
<summary>
Do not audit attempts to receive mssql_server packets.
</summary>
@@ -42482,7 +42299,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mssql_server_packets" lineno="51905">
+<interface name="corenet_sendrecv_mssql_server_packets" lineno="52028">
<summary>
Send and receive mssql_server packets.
</summary>
@@ -42493,7 +42310,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="51921">
+<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="52044">
<summary>
Do not audit attempts to send and receive mssql_server packets.
</summary>
@@ -42504,7 +42321,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mssql_server_packets" lineno="51936">
+<interface name="corenet_relabelto_mssql_server_packets" lineno="52059">
<summary>
Relabel packets to mssql_server the packet type.
</summary>
@@ -42514,7 +42331,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="51958">
+<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="52081">
<summary>
Send and receive TCP traffic on the ms_streaming port.
</summary>
@@ -42525,7 +42342,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ms_streaming_port" lineno="51973">
+<interface name="corenet_udp_send_ms_streaming_port" lineno="52096">
<summary>
Send UDP traffic on the ms_streaming port.
</summary>
@@ -42536,7 +42353,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="51988">
+<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="52111">
<summary>
Do not audit attempts to send UDP traffic on the ms_streaming port.
</summary>
@@ -42547,7 +42364,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ms_streaming_port" lineno="52003">
+<interface name="corenet_udp_receive_ms_streaming_port" lineno="52126">
<summary>
Receive UDP traffic on the ms_streaming port.
</summary>
@@ -42558,7 +42375,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52018">
+<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52141">
<summary>
Do not audit attempts to receive UDP traffic on the ms_streaming port.
</summary>
@@ -42569,7 +42386,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52033">
+<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52156">
<summary>
Send and receive UDP traffic on the ms_streaming port.
</summary>
@@ -42580,7 +42397,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52049">
+<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52172">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ms_streaming port.
@@ -42592,7 +42409,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52064">
+<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52187">
<summary>
Bind TCP sockets to the ms_streaming port.
</summary>
@@ -42603,7 +42420,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ms_streaming_port" lineno="52084">
+<interface name="corenet_udp_bind_ms_streaming_port" lineno="52207">
<summary>
Bind UDP sockets to the ms_streaming port.
</summary>
@@ -42614,7 +42431,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52103">
+<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52226">
<summary>
Make a TCP connection to the ms_streaming port.
</summary>
@@ -42624,7 +42441,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ms_streaming_client_packets" lineno="52123">
+<interface name="corenet_send_ms_streaming_client_packets" lineno="52246">
<summary>
Send ms_streaming_client packets.
</summary>
@@ -42635,7 +42452,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52142">
+<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52265">
<summary>
Do not audit attempts to send ms_streaming_client packets.
</summary>
@@ -42646,7 +42463,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ms_streaming_client_packets" lineno="52161">
+<interface name="corenet_receive_ms_streaming_client_packets" lineno="52284">
<summary>
Receive ms_streaming_client packets.
</summary>
@@ -42657,7 +42474,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52180">
+<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52303">
<summary>
Do not audit attempts to receive ms_streaming_client packets.
</summary>
@@ -42668,7 +42485,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52199">
+<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52322">
<summary>
Send and receive ms_streaming_client packets.
</summary>
@@ -42679,7 +42496,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52215">
+<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52338">
<summary>
Do not audit attempts to send and receive ms_streaming_client packets.
</summary>
@@ -42690,7 +42507,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52230">
+<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52353">
<summary>
Relabel packets to ms_streaming_client the packet type.
</summary>
@@ -42700,7 +42517,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ms_streaming_server_packets" lineno="52250">
+<interface name="corenet_send_ms_streaming_server_packets" lineno="52373">
<summary>
Send ms_streaming_server packets.
</summary>
@@ -42711,7 +42528,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52269">
+<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52392">
<summary>
Do not audit attempts to send ms_streaming_server packets.
</summary>
@@ -42722,7 +42539,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ms_streaming_server_packets" lineno="52288">
+<interface name="corenet_receive_ms_streaming_server_packets" lineno="52411">
<summary>
Receive ms_streaming_server packets.
</summary>
@@ -42733,7 +42550,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52307">
+<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52430">
<summary>
Do not audit attempts to receive ms_streaming_server packets.
</summary>
@@ -42744,7 +42561,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52326">
+<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52449">
<summary>
Send and receive ms_streaming_server packets.
</summary>
@@ -42755,7 +42572,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52342">
+<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52465">
<summary>
Do not audit attempts to send and receive ms_streaming_server packets.
</summary>
@@ -42766,7 +42583,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52357">
+<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52480">
<summary>
Relabel packets to ms_streaming_server the packet type.
</summary>
@@ -42776,7 +42593,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_munin_port" lineno="52379">
+<interface name="corenet_tcp_sendrecv_munin_port" lineno="52502">
<summary>
Send and receive TCP traffic on the munin port.
</summary>
@@ -42787,7 +42604,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_munin_port" lineno="52394">
+<interface name="corenet_udp_send_munin_port" lineno="52517">
<summary>
Send UDP traffic on the munin port.
</summary>
@@ -42798,7 +42615,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52409">
+<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52532">
<summary>
Do not audit attempts to send UDP traffic on the munin port.
</summary>
@@ -42809,7 +42626,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_munin_port" lineno="52424">
+<interface name="corenet_udp_receive_munin_port" lineno="52547">
<summary>
Receive UDP traffic on the munin port.
</summary>
@@ -42820,7 +42637,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52439">
+<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52562">
<summary>
Do not audit attempts to receive UDP traffic on the munin port.
</summary>
@@ -42831,7 +42648,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_munin_port" lineno="52454">
+<interface name="corenet_udp_sendrecv_munin_port" lineno="52577">
<summary>
Send and receive UDP traffic on the munin port.
</summary>
@@ -42842,7 +42659,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52470">
+<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52593">
<summary>
Do not audit attempts to send and receive
UDP traffic on the munin port.
@@ -42854,7 +42671,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_munin_port" lineno="52485">
+<interface name="corenet_tcp_bind_munin_port" lineno="52608">
<summary>
Bind TCP sockets to the munin port.
</summary>
@@ -42865,7 +42682,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_munin_port" lineno="52505">
+<interface name="corenet_udp_bind_munin_port" lineno="52628">
<summary>
Bind UDP sockets to the munin port.
</summary>
@@ -42876,7 +42693,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_munin_port" lineno="52524">
+<interface name="corenet_tcp_connect_munin_port" lineno="52647">
<summary>
Make a TCP connection to the munin port.
</summary>
@@ -42886,7 +42703,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_munin_client_packets" lineno="52544">
+<interface name="corenet_send_munin_client_packets" lineno="52667">
<summary>
Send munin_client packets.
</summary>
@@ -42897,7 +42714,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52563">
+<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52686">
<summary>
Do not audit attempts to send munin_client packets.
</summary>
@@ -42908,7 +42725,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_munin_client_packets" lineno="52582">
+<interface name="corenet_receive_munin_client_packets" lineno="52705">
<summary>
Receive munin_client packets.
</summary>
@@ -42919,7 +42736,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52601">
+<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52724">
<summary>
Do not audit attempts to receive munin_client packets.
</summary>
@@ -42930,7 +42747,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_munin_client_packets" lineno="52620">
+<interface name="corenet_sendrecv_munin_client_packets" lineno="52743">
<summary>
Send and receive munin_client packets.
</summary>
@@ -42941,7 +42758,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52636">
+<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52759">
<summary>
Do not audit attempts to send and receive munin_client packets.
</summary>
@@ -42952,7 +42769,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_munin_client_packets" lineno="52651">
+<interface name="corenet_relabelto_munin_client_packets" lineno="52774">
<summary>
Relabel packets to munin_client the packet type.
</summary>
@@ -42962,7 +42779,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_munin_server_packets" lineno="52671">
+<interface name="corenet_send_munin_server_packets" lineno="52794">
<summary>
Send munin_server packets.
</summary>
@@ -42973,7 +42790,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52690">
+<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52813">
<summary>
Do not audit attempts to send munin_server packets.
</summary>
@@ -42984,7 +42801,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_munin_server_packets" lineno="52709">
+<interface name="corenet_receive_munin_server_packets" lineno="52832">
<summary>
Receive munin_server packets.
</summary>
@@ -42995,7 +42812,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52728">
+<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52851">
<summary>
Do not audit attempts to receive munin_server packets.
</summary>
@@ -43006,7 +42823,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_munin_server_packets" lineno="52747">
+<interface name="corenet_sendrecv_munin_server_packets" lineno="52870">
<summary>
Send and receive munin_server packets.
</summary>
@@ -43017,7 +42834,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52763">
+<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52886">
<summary>
Do not audit attempts to send and receive munin_server packets.
</summary>
@@ -43028,7 +42845,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_munin_server_packets" lineno="52778">
+<interface name="corenet_relabelto_munin_server_packets" lineno="52901">
<summary>
Relabel packets to munin_server the packet type.
</summary>
@@ -43038,7 +42855,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52800">
+<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52923">
<summary>
Send and receive TCP traffic on the mxi port.
</summary>
@@ -43049,7 +42866,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mxi_port" lineno="52815">
+<interface name="corenet_udp_send_mxi_port" lineno="52938">
<summary>
Send UDP traffic on the mxi port.
</summary>
@@ -43060,7 +42877,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52830">
+<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52953">
<summary>
Do not audit attempts to send UDP traffic on the mxi port.
</summary>
@@ -43071,7 +42888,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mxi_port" lineno="52845">
+<interface name="corenet_udp_receive_mxi_port" lineno="52968">
<summary>
Receive UDP traffic on the mxi port.
</summary>
@@ -43082,7 +42899,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="52860">
+<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="52983">
<summary>
Do not audit attempts to receive UDP traffic on the mxi port.
</summary>
@@ -43093,7 +42910,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mxi_port" lineno="52875">
+<interface name="corenet_udp_sendrecv_mxi_port" lineno="52998">
<summary>
Send and receive UDP traffic on the mxi port.
</summary>
@@ -43104,7 +42921,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="52891">
+<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="53014">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mxi port.
@@ -43116,7 +42933,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mxi_port" lineno="52906">
+<interface name="corenet_tcp_bind_mxi_port" lineno="53029">
<summary>
Bind TCP sockets to the mxi port.
</summary>
@@ -43127,7 +42944,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mxi_port" lineno="52926">
+<interface name="corenet_udp_bind_mxi_port" lineno="53049">
<summary>
Bind UDP sockets to the mxi port.
</summary>
@@ -43138,7 +42955,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mxi_port" lineno="52945">
+<interface name="corenet_tcp_connect_mxi_port" lineno="53068">
<summary>
Make a TCP connection to the mxi port.
</summary>
@@ -43148,7 +42965,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mxi_client_packets" lineno="52965">
+<interface name="corenet_send_mxi_client_packets" lineno="53088">
<summary>
Send mxi_client packets.
</summary>
@@ -43159,7 +42976,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="52984">
+<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="53107">
<summary>
Do not audit attempts to send mxi_client packets.
</summary>
@@ -43170,7 +42987,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mxi_client_packets" lineno="53003">
+<interface name="corenet_receive_mxi_client_packets" lineno="53126">
<summary>
Receive mxi_client packets.
</summary>
@@ -43181,7 +42998,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53022">
+<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53145">
<summary>
Do not audit attempts to receive mxi_client packets.
</summary>
@@ -43192,7 +43009,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mxi_client_packets" lineno="53041">
+<interface name="corenet_sendrecv_mxi_client_packets" lineno="53164">
<summary>
Send and receive mxi_client packets.
</summary>
@@ -43203,7 +43020,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53057">
+<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53180">
<summary>
Do not audit attempts to send and receive mxi_client packets.
</summary>
@@ -43214,7 +43031,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mxi_client_packets" lineno="53072">
+<interface name="corenet_relabelto_mxi_client_packets" lineno="53195">
<summary>
Relabel packets to mxi_client the packet type.
</summary>
@@ -43224,7 +43041,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mxi_server_packets" lineno="53092">
+<interface name="corenet_send_mxi_server_packets" lineno="53215">
<summary>
Send mxi_server packets.
</summary>
@@ -43235,7 +43052,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53111">
+<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53234">
<summary>
Do not audit attempts to send mxi_server packets.
</summary>
@@ -43246,7 +43063,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mxi_server_packets" lineno="53130">
+<interface name="corenet_receive_mxi_server_packets" lineno="53253">
<summary>
Receive mxi_server packets.
</summary>
@@ -43257,7 +43074,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53149">
+<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53272">
<summary>
Do not audit attempts to receive mxi_server packets.
</summary>
@@ -43268,7 +43085,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mxi_server_packets" lineno="53168">
+<interface name="corenet_sendrecv_mxi_server_packets" lineno="53291">
<summary>
Send and receive mxi_server packets.
</summary>
@@ -43279,7 +43096,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53184">
+<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53307">
<summary>
Do not audit attempts to send and receive mxi_server packets.
</summary>
@@ -43290,7 +43107,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mxi_server_packets" lineno="53199">
+<interface name="corenet_relabelto_mxi_server_packets" lineno="53322">
<summary>
Relabel packets to mxi_server the packet type.
</summary>
@@ -43300,7 +43117,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53221">
+<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53344">
<summary>
Send and receive TCP traffic on the mysqld port.
</summary>
@@ -43311,7 +43128,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mysqld_port" lineno="53236">
+<interface name="corenet_udp_send_mysqld_port" lineno="53359">
<summary>
Send UDP traffic on the mysqld port.
</summary>
@@ -43322,7 +43139,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53251">
+<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53374">
<summary>
Do not audit attempts to send UDP traffic on the mysqld port.
</summary>
@@ -43333,7 +43150,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mysqld_port" lineno="53266">
+<interface name="corenet_udp_receive_mysqld_port" lineno="53389">
<summary>
Receive UDP traffic on the mysqld port.
</summary>
@@ -43344,7 +43161,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53281">
+<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53404">
<summary>
Do not audit attempts to receive UDP traffic on the mysqld port.
</summary>
@@ -43355,7 +43172,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53296">
+<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53419">
<summary>
Send and receive UDP traffic on the mysqld port.
</summary>
@@ -43366,7 +43183,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53312">
+<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53435">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mysqld port.
@@ -43378,7 +43195,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mysqld_port" lineno="53327">
+<interface name="corenet_tcp_bind_mysqld_port" lineno="53450">
<summary>
Bind TCP sockets to the mysqld port.
</summary>
@@ -43389,7 +43206,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mysqld_port" lineno="53347">
+<interface name="corenet_udp_bind_mysqld_port" lineno="53470">
<summary>
Bind UDP sockets to the mysqld port.
</summary>
@@ -43400,7 +43217,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mysqld_port" lineno="53366">
+<interface name="corenet_tcp_connect_mysqld_port" lineno="53489">
<summary>
Make a TCP connection to the mysqld port.
</summary>
@@ -43410,7 +43227,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqld_client_packets" lineno="53386">
+<interface name="corenet_send_mysqld_client_packets" lineno="53509">
<summary>
Send mysqld_client packets.
</summary>
@@ -43421,7 +43238,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53405">
+<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53528">
<summary>
Do not audit attempts to send mysqld_client packets.
</summary>
@@ -43432,7 +43249,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqld_client_packets" lineno="53424">
+<interface name="corenet_receive_mysqld_client_packets" lineno="53547">
<summary>
Receive mysqld_client packets.
</summary>
@@ -43443,7 +43260,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53443">
+<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53566">
<summary>
Do not audit attempts to receive mysqld_client packets.
</summary>
@@ -43454,7 +43271,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53462">
+<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53585">
<summary>
Send and receive mysqld_client packets.
</summary>
@@ -43465,7 +43282,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53478">
+<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53601">
<summary>
Do not audit attempts to send and receive mysqld_client packets.
</summary>
@@ -43476,7 +43293,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqld_client_packets" lineno="53493">
+<interface name="corenet_relabelto_mysqld_client_packets" lineno="53616">
<summary>
Relabel packets to mysqld_client the packet type.
</summary>
@@ -43486,7 +43303,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqld_server_packets" lineno="53513">
+<interface name="corenet_send_mysqld_server_packets" lineno="53636">
<summary>
Send mysqld_server packets.
</summary>
@@ -43497,7 +43314,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53532">
+<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53655">
<summary>
Do not audit attempts to send mysqld_server packets.
</summary>
@@ -43508,7 +43325,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqld_server_packets" lineno="53551">
+<interface name="corenet_receive_mysqld_server_packets" lineno="53674">
<summary>
Receive mysqld_server packets.
</summary>
@@ -43519,7 +43336,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53570">
+<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53693">
<summary>
Do not audit attempts to receive mysqld_server packets.
</summary>
@@ -43530,7 +43347,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53589">
+<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53712">
<summary>
Send and receive mysqld_server packets.
</summary>
@@ -43541,7 +43358,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53605">
+<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53728">
<summary>
Do not audit attempts to send and receive mysqld_server packets.
</summary>
@@ -43552,7 +43369,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqld_server_packets" lineno="53620">
+<interface name="corenet_relabelto_mysqld_server_packets" lineno="53743">
<summary>
Relabel packets to mysqld_server the packet type.
</summary>
@@ -43562,7 +43379,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53642">
+<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53765">
<summary>
Send and receive TCP traffic on the mysqlmanagerd port.
</summary>
@@ -43573,7 +43390,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53657">
+<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53780">
<summary>
Send UDP traffic on the mysqlmanagerd port.
</summary>
@@ -43584,7 +43401,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53672">
+<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53795">
<summary>
Do not audit attempts to send UDP traffic on the mysqlmanagerd port.
</summary>
@@ -43595,7 +43412,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53687">
+<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53810">
<summary>
Receive UDP traffic on the mysqlmanagerd port.
</summary>
@@ -43606,7 +43423,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53702">
+<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53825">
<summary>
Do not audit attempts to receive UDP traffic on the mysqlmanagerd port.
</summary>
@@ -43617,7 +43434,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53717">
+<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53840">
<summary>
Send and receive UDP traffic on the mysqlmanagerd port.
</summary>
@@ -43628,7 +43445,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53733">
+<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53856">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mysqlmanagerd port.
@@ -43640,7 +43457,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53748">
+<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53871">
<summary>
Bind TCP sockets to the mysqlmanagerd port.
</summary>
@@ -43651,7 +43468,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53768">
+<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53891">
<summary>
Bind UDP sockets to the mysqlmanagerd port.
</summary>
@@ -43662,7 +43479,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53787">
+<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53910">
<summary>
Make a TCP connection to the mysqlmanagerd port.
</summary>
@@ -43672,7 +43489,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53807">
+<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53930">
<summary>
Send mysqlmanagerd_client packets.
</summary>
@@ -43683,7 +43500,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53826">
+<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53949">
<summary>
Do not audit attempts to send mysqlmanagerd_client packets.
</summary>
@@ -43694,7 +43511,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53845">
+<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53968">
<summary>
Receive mysqlmanagerd_client packets.
</summary>
@@ -43705,7 +43522,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="53864">
+<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="53987">
<summary>
Do not audit attempts to receive mysqlmanagerd_client packets.
</summary>
@@ -43716,7 +43533,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="53883">
+<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="54006">
<summary>
Send and receive mysqlmanagerd_client packets.
</summary>
@@ -43727,7 +43544,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="53899">
+<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="54022">
<summary>
Do not audit attempts to send and receive mysqlmanagerd_client packets.
</summary>
@@ -43738,7 +43555,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="53914">
+<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="54037">
<summary>
Relabel packets to mysqlmanagerd_client the packet type.
</summary>
@@ -43748,7 +43565,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="53934">
+<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="54057">
<summary>
Send mysqlmanagerd_server packets.
</summary>
@@ -43759,7 +43576,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="53953">
+<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="54076">
<summary>
Do not audit attempts to send mysqlmanagerd_server packets.
</summary>
@@ -43770,7 +43587,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="53972">
+<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="54095">
<summary>
Receive mysqlmanagerd_server packets.
</summary>
@@ -43781,7 +43598,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="53991">
+<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="54114">
<summary>
Do not audit attempts to receive mysqlmanagerd_server packets.
</summary>
@@ -43792,7 +43609,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54010">
+<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54133">
<summary>
Send and receive mysqlmanagerd_server packets.
</summary>
@@ -43803,7 +43620,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54026">
+<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54149">
<summary>
Do not audit attempts to send and receive mysqlmanagerd_server packets.
</summary>
@@ -43814,7 +43631,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54041">
+<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54164">
<summary>
Relabel packets to mysqlmanagerd_server the packet type.
</summary>
@@ -43824,7 +43641,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54063">
+<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54186">
<summary>
Send and receive TCP traffic on the nessus port.
</summary>
@@ -43835,7 +43652,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_nessus_port" lineno="54078">
+<interface name="corenet_udp_send_nessus_port" lineno="54201">
<summary>
Send UDP traffic on the nessus port.
</summary>
@@ -43846,7 +43663,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54093">
+<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54216">
<summary>
Do not audit attempts to send UDP traffic on the nessus port.
</summary>
@@ -43857,7 +43674,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_nessus_port" lineno="54108">
+<interface name="corenet_udp_receive_nessus_port" lineno="54231">
<summary>
Receive UDP traffic on the nessus port.
</summary>
@@ -43868,7 +43685,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54123">
+<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54246">
<summary>
Do not audit attempts to receive UDP traffic on the nessus port.
</summary>
@@ -43879,7 +43696,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_nessus_port" lineno="54138">
+<interface name="corenet_udp_sendrecv_nessus_port" lineno="54261">
<summary>
Send and receive UDP traffic on the nessus port.
</summary>
@@ -43890,7 +43707,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54154">
+<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54277">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nessus port.
@@ -43902,7 +43719,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_nessus_port" lineno="54169">
+<interface name="corenet_tcp_bind_nessus_port" lineno="54292">
<summary>
Bind TCP sockets to the nessus port.
</summary>
@@ -43913,7 +43730,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nessus_port" lineno="54189">
+<interface name="corenet_udp_bind_nessus_port" lineno="54312">
<summary>
Bind UDP sockets to the nessus port.
</summary>
@@ -43924,7 +43741,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nessus_port" lineno="54208">
+<interface name="corenet_tcp_connect_nessus_port" lineno="54331">
<summary>
Make a TCP connection to the nessus port.
</summary>
@@ -43934,7 +43751,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nessus_client_packets" lineno="54228">
+<interface name="corenet_send_nessus_client_packets" lineno="54351">
<summary>
Send nessus_client packets.
</summary>
@@ -43945,7 +43762,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54247">
+<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54370">
<summary>
Do not audit attempts to send nessus_client packets.
</summary>
@@ -43956,7 +43773,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nessus_client_packets" lineno="54266">
+<interface name="corenet_receive_nessus_client_packets" lineno="54389">
<summary>
Receive nessus_client packets.
</summary>
@@ -43967,7 +43784,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54285">
+<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54408">
<summary>
Do not audit attempts to receive nessus_client packets.
</summary>
@@ -43978,7 +43795,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nessus_client_packets" lineno="54304">
+<interface name="corenet_sendrecv_nessus_client_packets" lineno="54427">
<summary>
Send and receive nessus_client packets.
</summary>
@@ -43989,7 +43806,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54320">
+<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54443">
<summary>
Do not audit attempts to send and receive nessus_client packets.
</summary>
@@ -44000,7 +43817,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nessus_client_packets" lineno="54335">
+<interface name="corenet_relabelto_nessus_client_packets" lineno="54458">
<summary>
Relabel packets to nessus_client the packet type.
</summary>
@@ -44010,7 +43827,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nessus_server_packets" lineno="54355">
+<interface name="corenet_send_nessus_server_packets" lineno="54478">
<summary>
Send nessus_server packets.
</summary>
@@ -44021,7 +43838,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54374">
+<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54497">
<summary>
Do not audit attempts to send nessus_server packets.
</summary>
@@ -44032,7 +43849,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nessus_server_packets" lineno="54393">
+<interface name="corenet_receive_nessus_server_packets" lineno="54516">
<summary>
Receive nessus_server packets.
</summary>
@@ -44043,7 +43860,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54412">
+<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54535">
<summary>
Do not audit attempts to receive nessus_server packets.
</summary>
@@ -44054,7 +43871,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nessus_server_packets" lineno="54431">
+<interface name="corenet_sendrecv_nessus_server_packets" lineno="54554">
<summary>
Send and receive nessus_server packets.
</summary>
@@ -44065,7 +43882,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54447">
+<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54570">
<summary>
Do not audit attempts to send and receive nessus_server packets.
</summary>
@@ -44076,7 +43893,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nessus_server_packets" lineno="54462">
+<interface name="corenet_relabelto_nessus_server_packets" lineno="54585">
<summary>
Relabel packets to nessus_server the packet type.
</summary>
@@ -44086,7 +43903,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_netport_port" lineno="54484">
+<interface name="corenet_tcp_sendrecv_netport_port" lineno="54607">
<summary>
Send and receive TCP traffic on the netport port.
</summary>
@@ -44097,7 +43914,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_netport_port" lineno="54499">
+<interface name="corenet_udp_send_netport_port" lineno="54622">
<summary>
Send UDP traffic on the netport port.
</summary>
@@ -44108,7 +43925,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54514">
+<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54637">
<summary>
Do not audit attempts to send UDP traffic on the netport port.
</summary>
@@ -44119,7 +43936,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_netport_port" lineno="54529">
+<interface name="corenet_udp_receive_netport_port" lineno="54652">
<summary>
Receive UDP traffic on the netport port.
</summary>
@@ -44130,7 +43947,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54544">
+<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54667">
<summary>
Do not audit attempts to receive UDP traffic on the netport port.
</summary>
@@ -44141,7 +43958,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_netport_port" lineno="54559">
+<interface name="corenet_udp_sendrecv_netport_port" lineno="54682">
<summary>
Send and receive UDP traffic on the netport port.
</summary>
@@ -44152,7 +43969,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54575">
+<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54698">
<summary>
Do not audit attempts to send and receive
UDP traffic on the netport port.
@@ -44164,7 +43981,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_netport_port" lineno="54590">
+<interface name="corenet_tcp_bind_netport_port" lineno="54713">
<summary>
Bind TCP sockets to the netport port.
</summary>
@@ -44175,7 +43992,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_netport_port" lineno="54610">
+<interface name="corenet_udp_bind_netport_port" lineno="54733">
<summary>
Bind UDP sockets to the netport port.
</summary>
@@ -44186,7 +44003,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_netport_port" lineno="54629">
+<interface name="corenet_tcp_connect_netport_port" lineno="54752">
<summary>
Make a TCP connection to the netport port.
</summary>
@@ -44196,7 +44013,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netport_client_packets" lineno="54649">
+<interface name="corenet_send_netport_client_packets" lineno="54772">
<summary>
Send netport_client packets.
</summary>
@@ -44207,7 +44024,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54668">
+<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54791">
<summary>
Do not audit attempts to send netport_client packets.
</summary>
@@ -44218,7 +44035,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netport_client_packets" lineno="54687">
+<interface name="corenet_receive_netport_client_packets" lineno="54810">
<summary>
Receive netport_client packets.
</summary>
@@ -44229,7 +44046,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54706">
+<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54829">
<summary>
Do not audit attempts to receive netport_client packets.
</summary>
@@ -44240,7 +44057,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netport_client_packets" lineno="54725">
+<interface name="corenet_sendrecv_netport_client_packets" lineno="54848">
<summary>
Send and receive netport_client packets.
</summary>
@@ -44251,7 +44068,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54741">
+<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54864">
<summary>
Do not audit attempts to send and receive netport_client packets.
</summary>
@@ -44262,7 +44079,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netport_client_packets" lineno="54756">
+<interface name="corenet_relabelto_netport_client_packets" lineno="54879">
<summary>
Relabel packets to netport_client the packet type.
</summary>
@@ -44272,7 +44089,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netport_server_packets" lineno="54776">
+<interface name="corenet_send_netport_server_packets" lineno="54899">
<summary>
Send netport_server packets.
</summary>
@@ -44283,7 +44100,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54795">
+<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54918">
<summary>
Do not audit attempts to send netport_server packets.
</summary>
@@ -44294,7 +44111,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netport_server_packets" lineno="54814">
+<interface name="corenet_receive_netport_server_packets" lineno="54937">
<summary>
Receive netport_server packets.
</summary>
@@ -44305,7 +44122,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54833">
+<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54956">
<summary>
Do not audit attempts to receive netport_server packets.
</summary>
@@ -44316,7 +44133,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netport_server_packets" lineno="54852">
+<interface name="corenet_sendrecv_netport_server_packets" lineno="54975">
<summary>
Send and receive netport_server packets.
</summary>
@@ -44327,7 +44144,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="54868">
+<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="54991">
<summary>
Do not audit attempts to send and receive netport_server packets.
</summary>
@@ -44338,7 +44155,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netport_server_packets" lineno="54883">
+<interface name="corenet_relabelto_netport_server_packets" lineno="55006">
<summary>
Relabel packets to netport_server the packet type.
</summary>
@@ -44348,7 +44165,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="54905">
+<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="55028">
<summary>
Send and receive TCP traffic on the netsupport port.
</summary>
@@ -44359,7 +44176,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_netsupport_port" lineno="54920">
+<interface name="corenet_udp_send_netsupport_port" lineno="55043">
<summary>
Send UDP traffic on the netsupport port.
</summary>
@@ -44370,7 +44187,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="54935">
+<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="55058">
<summary>
Do not audit attempts to send UDP traffic on the netsupport port.
</summary>
@@ -44381,7 +44198,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_netsupport_port" lineno="54950">
+<interface name="corenet_udp_receive_netsupport_port" lineno="55073">
<summary>
Receive UDP traffic on the netsupport port.
</summary>
@@ -44392,7 +44209,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="54965">
+<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="55088">
<summary>
Do not audit attempts to receive UDP traffic on the netsupport port.
</summary>
@@ -44403,7 +44220,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_netsupport_port" lineno="54980">
+<interface name="corenet_udp_sendrecv_netsupport_port" lineno="55103">
<summary>
Send and receive UDP traffic on the netsupport port.
</summary>
@@ -44414,7 +44231,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="54996">
+<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="55119">
<summary>
Do not audit attempts to send and receive
UDP traffic on the netsupport port.
@@ -44426,7 +44243,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_netsupport_port" lineno="55011">
+<interface name="corenet_tcp_bind_netsupport_port" lineno="55134">
<summary>
Bind TCP sockets to the netsupport port.
</summary>
@@ -44437,7 +44254,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_netsupport_port" lineno="55031">
+<interface name="corenet_udp_bind_netsupport_port" lineno="55154">
<summary>
Bind UDP sockets to the netsupport port.
</summary>
@@ -44448,7 +44265,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_netsupport_port" lineno="55050">
+<interface name="corenet_tcp_connect_netsupport_port" lineno="55173">
<summary>
Make a TCP connection to the netsupport port.
</summary>
@@ -44458,7 +44275,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netsupport_client_packets" lineno="55070">
+<interface name="corenet_send_netsupport_client_packets" lineno="55193">
<summary>
Send netsupport_client packets.
</summary>
@@ -44469,7 +44286,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55089">
+<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55212">
<summary>
Do not audit attempts to send netsupport_client packets.
</summary>
@@ -44480,7 +44297,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netsupport_client_packets" lineno="55108">
+<interface name="corenet_receive_netsupport_client_packets" lineno="55231">
<summary>
Receive netsupport_client packets.
</summary>
@@ -44491,7 +44308,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55127">
+<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55250">
<summary>
Do not audit attempts to receive netsupport_client packets.
</summary>
@@ -44502,7 +44319,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55146">
+<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55269">
<summary>
Send and receive netsupport_client packets.
</summary>
@@ -44513,7 +44330,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55162">
+<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55285">
<summary>
Do not audit attempts to send and receive netsupport_client packets.
</summary>
@@ -44524,7 +44341,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netsupport_client_packets" lineno="55177">
+<interface name="corenet_relabelto_netsupport_client_packets" lineno="55300">
<summary>
Relabel packets to netsupport_client the packet type.
</summary>
@@ -44534,7 +44351,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netsupport_server_packets" lineno="55197">
+<interface name="corenet_send_netsupport_server_packets" lineno="55320">
<summary>
Send netsupport_server packets.
</summary>
@@ -44545,7 +44362,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55216">
+<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55339">
<summary>
Do not audit attempts to send netsupport_server packets.
</summary>
@@ -44556,7 +44373,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netsupport_server_packets" lineno="55235">
+<interface name="corenet_receive_netsupport_server_packets" lineno="55358">
<summary>
Receive netsupport_server packets.
</summary>
@@ -44567,7 +44384,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55254">
+<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55377">
<summary>
Do not audit attempts to receive netsupport_server packets.
</summary>
@@ -44578,7 +44395,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55273">
+<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55396">
<summary>
Send and receive netsupport_server packets.
</summary>
@@ -44589,7 +44406,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55289">
+<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55412">
<summary>
Do not audit attempts to send and receive netsupport_server packets.
</summary>
@@ -44600,7 +44417,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netsupport_server_packets" lineno="55304">
+<interface name="corenet_relabelto_netsupport_server_packets" lineno="55427">
<summary>
Relabel packets to netsupport_server the packet type.
</summary>
@@ -44610,7 +44427,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55326">
+<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55449">
<summary>
Send and receive TCP traffic on the nfs port.
</summary>
@@ -44621,7 +44438,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_nfs_port" lineno="55341">
+<interface name="corenet_udp_send_nfs_port" lineno="55464">
<summary>
Send UDP traffic on the nfs port.
</summary>
@@ -44632,7 +44449,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55356">
+<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55479">
<summary>
Do not audit attempts to send UDP traffic on the nfs port.
</summary>
@@ -44643,7 +44460,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_nfs_port" lineno="55371">
+<interface name="corenet_udp_receive_nfs_port" lineno="55494">
<summary>
Receive UDP traffic on the nfs port.
</summary>
@@ -44654,7 +44471,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55386">
+<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55509">
<summary>
Do not audit attempts to receive UDP traffic on the nfs port.
</summary>
@@ -44665,7 +44482,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_nfs_port" lineno="55401">
+<interface name="corenet_udp_sendrecv_nfs_port" lineno="55524">
<summary>
Send and receive UDP traffic on the nfs port.
</summary>
@@ -44676,7 +44493,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55417">
+<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55540">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nfs port.
@@ -44688,7 +44505,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_nfs_port" lineno="55432">
+<interface name="corenet_tcp_bind_nfs_port" lineno="55555">
<summary>
Bind TCP sockets to the nfs port.
</summary>
@@ -44699,7 +44516,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nfs_port" lineno="55452">
+<interface name="corenet_udp_bind_nfs_port" lineno="55575">
<summary>
Bind UDP sockets to the nfs port.
</summary>
@@ -44710,7 +44527,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nfs_port" lineno="55471">
+<interface name="corenet_tcp_connect_nfs_port" lineno="55594">
<summary>
Make a TCP connection to the nfs port.
</summary>
@@ -44720,7 +44537,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfs_client_packets" lineno="55491">
+<interface name="corenet_send_nfs_client_packets" lineno="55614">
<summary>
Send nfs_client packets.
</summary>
@@ -44731,7 +44548,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55510">
+<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55633">
<summary>
Do not audit attempts to send nfs_client packets.
</summary>
@@ -44742,7 +44559,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfs_client_packets" lineno="55529">
+<interface name="corenet_receive_nfs_client_packets" lineno="55652">
<summary>
Receive nfs_client packets.
</summary>
@@ -44753,7 +44570,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55548">
+<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55671">
<summary>
Do not audit attempts to receive nfs_client packets.
</summary>
@@ -44764,7 +44581,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfs_client_packets" lineno="55567">
+<interface name="corenet_sendrecv_nfs_client_packets" lineno="55690">
<summary>
Send and receive nfs_client packets.
</summary>
@@ -44775,7 +44592,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55583">
+<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55706">
<summary>
Do not audit attempts to send and receive nfs_client packets.
</summary>
@@ -44786,7 +44603,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfs_client_packets" lineno="55598">
+<interface name="corenet_relabelto_nfs_client_packets" lineno="55721">
<summary>
Relabel packets to nfs_client the packet type.
</summary>
@@ -44796,7 +44613,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfs_server_packets" lineno="55618">
+<interface name="corenet_send_nfs_server_packets" lineno="55741">
<summary>
Send nfs_server packets.
</summary>
@@ -44807,7 +44624,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55637">
+<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55760">
<summary>
Do not audit attempts to send nfs_server packets.
</summary>
@@ -44818,7 +44635,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfs_server_packets" lineno="55656">
+<interface name="corenet_receive_nfs_server_packets" lineno="55779">
<summary>
Receive nfs_server packets.
</summary>
@@ -44829,7 +44646,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55675">
+<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55798">
<summary>
Do not audit attempts to receive nfs_server packets.
</summary>
@@ -44840,7 +44657,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfs_server_packets" lineno="55694">
+<interface name="corenet_sendrecv_nfs_server_packets" lineno="55817">
<summary>
Send and receive nfs_server packets.
</summary>
@@ -44851,7 +44668,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55710">
+<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55833">
<summary>
Do not audit attempts to send and receive nfs_server packets.
</summary>
@@ -44862,7 +44679,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfs_server_packets" lineno="55725">
+<interface name="corenet_relabelto_nfs_server_packets" lineno="55848">
<summary>
Relabel packets to nfs_server the packet type.
</summary>
@@ -44872,7 +44689,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55747">
+<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55870">
<summary>
Send and receive TCP traffic on the nfsrdma port.
</summary>
@@ -44883,7 +44700,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_nfsrdma_port" lineno="55762">
+<interface name="corenet_udp_send_nfsrdma_port" lineno="55885">
<summary>
Send UDP traffic on the nfsrdma port.
</summary>
@@ -44894,7 +44711,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55777">
+<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55900">
<summary>
Do not audit attempts to send UDP traffic on the nfsrdma port.
</summary>
@@ -44905,7 +44722,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_nfsrdma_port" lineno="55792">
+<interface name="corenet_udp_receive_nfsrdma_port" lineno="55915">
<summary>
Receive UDP traffic on the nfsrdma port.
</summary>
@@ -44916,7 +44733,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55807">
+<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55930">
<summary>
Do not audit attempts to receive UDP traffic on the nfsrdma port.
</summary>
@@ -44927,7 +44744,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55822">
+<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55945">
<summary>
Send and receive UDP traffic on the nfsrdma port.
</summary>
@@ -44938,7 +44755,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55838">
+<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55961">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nfsrdma port.
@@ -44950,7 +44767,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55853">
+<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55976">
<summary>
Bind TCP sockets to the nfsrdma port.
</summary>
@@ -44961,7 +44778,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nfsrdma_port" lineno="55873">
+<interface name="corenet_udp_bind_nfsrdma_port" lineno="55996">
<summary>
Bind UDP sockets to the nfsrdma port.
</summary>
@@ -44972,7 +44789,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nfsrdma_port" lineno="55892">
+<interface name="corenet_tcp_connect_nfsrdma_port" lineno="56015">
<summary>
Make a TCP connection to the nfsrdma port.
</summary>
@@ -44982,7 +44799,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfsrdma_client_packets" lineno="55912">
+<interface name="corenet_send_nfsrdma_client_packets" lineno="56035">
<summary>
Send nfsrdma_client packets.
</summary>
@@ -44993,7 +44810,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="55931">
+<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="56054">
<summary>
Do not audit attempts to send nfsrdma_client packets.
</summary>
@@ -45004,7 +44821,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfsrdma_client_packets" lineno="55950">
+<interface name="corenet_receive_nfsrdma_client_packets" lineno="56073">
<summary>
Receive nfsrdma_client packets.
</summary>
@@ -45015,7 +44832,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="55969">
+<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="56092">
<summary>
Do not audit attempts to receive nfsrdma_client packets.
</summary>
@@ -45026,7 +44843,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="55988">
+<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="56111">
<summary>
Send and receive nfsrdma_client packets.
</summary>
@@ -45037,7 +44854,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56004">
+<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56127">
<summary>
Do not audit attempts to send and receive nfsrdma_client packets.
</summary>
@@ -45048,7 +44865,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56019">
+<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56142">
<summary>
Relabel packets to nfsrdma_client the packet type.
</summary>
@@ -45058,7 +44875,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfsrdma_server_packets" lineno="56039">
+<interface name="corenet_send_nfsrdma_server_packets" lineno="56162">
<summary>
Send nfsrdma_server packets.
</summary>
@@ -45069,7 +44886,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56058">
+<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56181">
<summary>
Do not audit attempts to send nfsrdma_server packets.
</summary>
@@ -45080,7 +44897,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfsrdma_server_packets" lineno="56077">
+<interface name="corenet_receive_nfsrdma_server_packets" lineno="56200">
<summary>
Receive nfsrdma_server packets.
</summary>
@@ -45091,7 +44908,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56096">
+<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56219">
<summary>
Do not audit attempts to receive nfsrdma_server packets.
</summary>
@@ -45102,7 +44919,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56115">
+<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56238">
<summary>
Send and receive nfsrdma_server packets.
</summary>
@@ -45113,7 +44930,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56131">
+<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56254">
<summary>
Do not audit attempts to send and receive nfsrdma_server packets.
</summary>
@@ -45124,7 +44941,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56146">
+<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56269">
<summary>
Relabel packets to nfsrdma_server the packet type.
</summary>
@@ -45134,7 +44951,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56168">
+<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56291">
<summary>
Send and receive TCP traffic on the nmbd port.
</summary>
@@ -45145,7 +44962,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_nmbd_port" lineno="56183">
+<interface name="corenet_udp_send_nmbd_port" lineno="56306">
<summary>
Send UDP traffic on the nmbd port.
</summary>
@@ -45156,7 +44973,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56198">
+<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56321">
<summary>
Do not audit attempts to send UDP traffic on the nmbd port.
</summary>
@@ -45167,7 +44984,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_nmbd_port" lineno="56213">
+<interface name="corenet_udp_receive_nmbd_port" lineno="56336">
<summary>
Receive UDP traffic on the nmbd port.
</summary>
@@ -45178,7 +44995,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56228">
+<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56351">
<summary>
Do not audit attempts to receive UDP traffic on the nmbd port.
</summary>
@@ -45189,7 +45006,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56243">
+<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56366">
<summary>
Send and receive UDP traffic on the nmbd port.
</summary>
@@ -45200,7 +45017,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56259">
+<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56382">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nmbd port.
@@ -45212,7 +45029,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_nmbd_port" lineno="56274">
+<interface name="corenet_tcp_bind_nmbd_port" lineno="56397">
<summary>
Bind TCP sockets to the nmbd port.
</summary>
@@ -45223,7 +45040,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nmbd_port" lineno="56294">
+<interface name="corenet_udp_bind_nmbd_port" lineno="56417">
<summary>
Bind UDP sockets to the nmbd port.
</summary>
@@ -45234,7 +45051,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nmbd_port" lineno="56313">
+<interface name="corenet_tcp_connect_nmbd_port" lineno="56436">
<summary>
Make a TCP connection to the nmbd port.
</summary>
@@ -45244,7 +45061,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nmbd_client_packets" lineno="56333">
+<interface name="corenet_send_nmbd_client_packets" lineno="56456">
<summary>
Send nmbd_client packets.
</summary>
@@ -45255,7 +45072,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56352">
+<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56475">
<summary>
Do not audit attempts to send nmbd_client packets.
</summary>
@@ -45266,7 +45083,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nmbd_client_packets" lineno="56371">
+<interface name="corenet_receive_nmbd_client_packets" lineno="56494">
<summary>
Receive nmbd_client packets.
</summary>
@@ -45277,7 +45094,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56390">
+<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56513">
<summary>
Do not audit attempts to receive nmbd_client packets.
</summary>
@@ -45288,7 +45105,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56409">
+<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56532">
<summary>
Send and receive nmbd_client packets.
</summary>
@@ -45299,7 +45116,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56425">
+<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56548">
<summary>
Do not audit attempts to send and receive nmbd_client packets.
</summary>
@@ -45310,7 +45127,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nmbd_client_packets" lineno="56440">
+<interface name="corenet_relabelto_nmbd_client_packets" lineno="56563">
<summary>
Relabel packets to nmbd_client the packet type.
</summary>
@@ -45320,7 +45137,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nmbd_server_packets" lineno="56460">
+<interface name="corenet_send_nmbd_server_packets" lineno="56583">
<summary>
Send nmbd_server packets.
</summary>
@@ -45331,7 +45148,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56479">
+<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56602">
<summary>
Do not audit attempts to send nmbd_server packets.
</summary>
@@ -45342,7 +45159,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nmbd_server_packets" lineno="56498">
+<interface name="corenet_receive_nmbd_server_packets" lineno="56621">
<summary>
Receive nmbd_server packets.
</summary>
@@ -45353,7 +45170,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56517">
+<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56640">
<summary>
Do not audit attempts to receive nmbd_server packets.
</summary>
@@ -45364,7 +45181,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56536">
+<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56659">
<summary>
Send and receive nmbd_server packets.
</summary>
@@ -45375,7 +45192,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56552">
+<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56675">
<summary>
Do not audit attempts to send and receive nmbd_server packets.
</summary>
@@ -45386,7 +45203,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nmbd_server_packets" lineno="56567">
+<interface name="corenet_relabelto_nmbd_server_packets" lineno="56690">
<summary>
Relabel packets to nmbd_server the packet type.
</summary>
@@ -45396,7 +45213,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56589">
+<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56712">
<summary>
Send and receive TCP traffic on the ntop port.
</summary>
@@ -45407,7 +45224,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ntop_port" lineno="56604">
+<interface name="corenet_udp_send_ntop_port" lineno="56727">
<summary>
Send UDP traffic on the ntop port.
</summary>
@@ -45418,7 +45235,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56619">
+<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56742">
<summary>
Do not audit attempts to send UDP traffic on the ntop port.
</summary>
@@ -45429,7 +45246,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ntop_port" lineno="56634">
+<interface name="corenet_udp_receive_ntop_port" lineno="56757">
<summary>
Receive UDP traffic on the ntop port.
</summary>
@@ -45440,7 +45257,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56649">
+<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56772">
<summary>
Do not audit attempts to receive UDP traffic on the ntop port.
</summary>
@@ -45451,7 +45268,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ntop_port" lineno="56664">
+<interface name="corenet_udp_sendrecv_ntop_port" lineno="56787">
<summary>
Send and receive UDP traffic on the ntop port.
</summary>
@@ -45462,7 +45279,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56680">
+<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56803">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ntop port.
@@ -45474,7 +45291,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ntop_port" lineno="56695">
+<interface name="corenet_tcp_bind_ntop_port" lineno="56818">
<summary>
Bind TCP sockets to the ntop port.
</summary>
@@ -45485,7 +45302,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ntop_port" lineno="56715">
+<interface name="corenet_udp_bind_ntop_port" lineno="56838">
<summary>
Bind UDP sockets to the ntop port.
</summary>
@@ -45496,7 +45313,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ntop_port" lineno="56734">
+<interface name="corenet_tcp_connect_ntop_port" lineno="56857">
<summary>
Make a TCP connection to the ntop port.
</summary>
@@ -45506,7 +45323,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntop_client_packets" lineno="56754">
+<interface name="corenet_send_ntop_client_packets" lineno="56877">
<summary>
Send ntop_client packets.
</summary>
@@ -45517,7 +45334,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56773">
+<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56896">
<summary>
Do not audit attempts to send ntop_client packets.
</summary>
@@ -45528,7 +45345,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntop_client_packets" lineno="56792">
+<interface name="corenet_receive_ntop_client_packets" lineno="56915">
<summary>
Receive ntop_client packets.
</summary>
@@ -45539,7 +45356,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56811">
+<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56934">
<summary>
Do not audit attempts to receive ntop_client packets.
</summary>
@@ -45550,7 +45367,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntop_client_packets" lineno="56830">
+<interface name="corenet_sendrecv_ntop_client_packets" lineno="56953">
<summary>
Send and receive ntop_client packets.
</summary>
@@ -45561,7 +45378,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56846">
+<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56969">
<summary>
Do not audit attempts to send and receive ntop_client packets.
</summary>
@@ -45572,7 +45389,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntop_client_packets" lineno="56861">
+<interface name="corenet_relabelto_ntop_client_packets" lineno="56984">
<summary>
Relabel packets to ntop_client the packet type.
</summary>
@@ -45582,7 +45399,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntop_server_packets" lineno="56881">
+<interface name="corenet_send_ntop_server_packets" lineno="57004">
<summary>
Send ntop_server packets.
</summary>
@@ -45593,7 +45410,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="56900">
+<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="57023">
<summary>
Do not audit attempts to send ntop_server packets.
</summary>
@@ -45604,7 +45421,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntop_server_packets" lineno="56919">
+<interface name="corenet_receive_ntop_server_packets" lineno="57042">
<summary>
Receive ntop_server packets.
</summary>
@@ -45615,7 +45432,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="56938">
+<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="57061">
<summary>
Do not audit attempts to receive ntop_server packets.
</summary>
@@ -45626,7 +45443,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntop_server_packets" lineno="56957">
+<interface name="corenet_sendrecv_ntop_server_packets" lineno="57080">
<summary>
Send and receive ntop_server packets.
</summary>
@@ -45637,7 +45454,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="56973">
+<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="57096">
<summary>
Do not audit attempts to send and receive ntop_server packets.
</summary>
@@ -45648,7 +45465,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntop_server_packets" lineno="56988">
+<interface name="corenet_relabelto_ntop_server_packets" lineno="57111">
<summary>
Relabel packets to ntop_server the packet type.
</summary>
@@ -45658,7 +45475,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57010">
+<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57133">
<summary>
Send and receive TCP traffic on the ntp port.
</summary>
@@ -45669,7 +45486,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ntp_port" lineno="57025">
+<interface name="corenet_udp_send_ntp_port" lineno="57148">
<summary>
Send UDP traffic on the ntp port.
</summary>
@@ -45680,7 +45497,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57040">
+<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57163">
<summary>
Do not audit attempts to send UDP traffic on the ntp port.
</summary>
@@ -45691,7 +45508,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ntp_port" lineno="57055">
+<interface name="corenet_udp_receive_ntp_port" lineno="57178">
<summary>
Receive UDP traffic on the ntp port.
</summary>
@@ -45702,7 +45519,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57070">
+<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57193">
<summary>
Do not audit attempts to receive UDP traffic on the ntp port.
</summary>
@@ -45713,7 +45530,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ntp_port" lineno="57085">
+<interface name="corenet_udp_sendrecv_ntp_port" lineno="57208">
<summary>
Send and receive UDP traffic on the ntp port.
</summary>
@@ -45724,7 +45541,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57101">
+<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57224">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ntp port.
@@ -45736,7 +45553,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ntp_port" lineno="57116">
+<interface name="corenet_tcp_bind_ntp_port" lineno="57239">
<summary>
Bind TCP sockets to the ntp port.
</summary>
@@ -45747,7 +45564,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ntp_port" lineno="57136">
+<interface name="corenet_udp_bind_ntp_port" lineno="57259">
<summary>
Bind UDP sockets to the ntp port.
</summary>
@@ -45758,7 +45575,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ntp_port" lineno="57155">
+<interface name="corenet_tcp_connect_ntp_port" lineno="57278">
<summary>
Make a TCP connection to the ntp port.
</summary>
@@ -45768,7 +45585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntp_client_packets" lineno="57175">
+<interface name="corenet_send_ntp_client_packets" lineno="57298">
<summary>
Send ntp_client packets.
</summary>
@@ -45779,7 +45596,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57194">
+<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57317">
<summary>
Do not audit attempts to send ntp_client packets.
</summary>
@@ -45790,7 +45607,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntp_client_packets" lineno="57213">
+<interface name="corenet_receive_ntp_client_packets" lineno="57336">
<summary>
Receive ntp_client packets.
</summary>
@@ -45801,7 +45618,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57232">
+<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57355">
<summary>
Do not audit attempts to receive ntp_client packets.
</summary>
@@ -45812,7 +45629,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntp_client_packets" lineno="57251">
+<interface name="corenet_sendrecv_ntp_client_packets" lineno="57374">
<summary>
Send and receive ntp_client packets.
</summary>
@@ -45823,7 +45640,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57267">
+<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57390">
<summary>
Do not audit attempts to send and receive ntp_client packets.
</summary>
@@ -45834,7 +45651,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntp_client_packets" lineno="57282">
+<interface name="corenet_relabelto_ntp_client_packets" lineno="57405">
<summary>
Relabel packets to ntp_client the packet type.
</summary>
@@ -45844,7 +45661,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntp_server_packets" lineno="57302">
+<interface name="corenet_send_ntp_server_packets" lineno="57425">
<summary>
Send ntp_server packets.
</summary>
@@ -45855,7 +45672,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57321">
+<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57444">
<summary>
Do not audit attempts to send ntp_server packets.
</summary>
@@ -45866,7 +45683,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntp_server_packets" lineno="57340">
+<interface name="corenet_receive_ntp_server_packets" lineno="57463">
<summary>
Receive ntp_server packets.
</summary>
@@ -45877,7 +45694,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57359">
+<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57482">
<summary>
Do not audit attempts to receive ntp_server packets.
</summary>
@@ -45888,7 +45705,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntp_server_packets" lineno="57378">
+<interface name="corenet_sendrecv_ntp_server_packets" lineno="57501">
<summary>
Send and receive ntp_server packets.
</summary>
@@ -45899,7 +45716,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57394">
+<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57517">
<summary>
Do not audit attempts to send and receive ntp_server packets.
</summary>
@@ -45910,7 +45727,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntp_server_packets" lineno="57409">
+<interface name="corenet_relabelto_ntp_server_packets" lineno="57532">
<summary>
Relabel packets to ntp_server the packet type.
</summary>
@@ -45920,7 +45737,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57431">
+<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57554">
<summary>
Send and receive TCP traffic on the oa_system port.
</summary>
@@ -45931,7 +45748,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_oa_system_port" lineno="57446">
+<interface name="corenet_udp_send_oa_system_port" lineno="57569">
<summary>
Send UDP traffic on the oa_system port.
</summary>
@@ -45942,7 +45759,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="57461">
+<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="57584">
<summary>
Do not audit attempts to send UDP traffic on the oa_system port.
</summary>
@@ -45953,7 +45770,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_oa_system_port" lineno="57476">
+<interface name="corenet_udp_receive_oa_system_port" lineno="57599">
<summary>
Receive UDP traffic on the oa_system port.
</summary>
@@ -45964,7 +45781,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="57491">
+<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="57614">
<summary>
Do not audit attempts to receive UDP traffic on the oa_system port.
</summary>
@@ -45975,7 +45792,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_oa_system_port" lineno="57506">
+<interface name="corenet_udp_sendrecv_oa_system_port" lineno="57629">
<summary>
Send and receive UDP traffic on the oa_system port.
</summary>
@@ -45986,7 +45803,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="57522">
+<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="57645">
<summary>
Do not audit attempts to send and receive
UDP traffic on the oa_system port.
@@ -45998,7 +45815,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_oa_system_port" lineno="57537">
+<interface name="corenet_tcp_bind_oa_system_port" lineno="57660">
<summary>
Bind TCP sockets to the oa_system port.
</summary>
@@ -46009,7 +45826,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_oa_system_port" lineno="57557">
+<interface name="corenet_udp_bind_oa_system_port" lineno="57680">
<summary>
Bind UDP sockets to the oa_system port.
</summary>
@@ -46020,7 +45837,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_oa_system_port" lineno="57576">
+<interface name="corenet_tcp_connect_oa_system_port" lineno="57699">
<summary>
Make a TCP connection to the oa_system port.
</summary>
@@ -46030,7 +45847,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oa_system_client_packets" lineno="57596">
+<interface name="corenet_send_oa_system_client_packets" lineno="57719">
<summary>
Send oa_system_client packets.
</summary>
@@ -46041,7 +45858,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="57615">
+<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="57738">
<summary>
Do not audit attempts to send oa_system_client packets.
</summary>
@@ -46052,7 +45869,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oa_system_client_packets" lineno="57634">
+<interface name="corenet_receive_oa_system_client_packets" lineno="57757">
<summary>
Receive oa_system_client packets.
</summary>
@@ -46063,7 +45880,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="57653">
+<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="57776">
<summary>
Do not audit attempts to receive oa_system_client packets.
</summary>
@@ -46074,7 +45891,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oa_system_client_packets" lineno="57672">
+<interface name="corenet_sendrecv_oa_system_client_packets" lineno="57795">
<summary>
Send and receive oa_system_client packets.
</summary>
@@ -46085,7 +45902,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="57688">
+<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="57811">
<summary>
Do not audit attempts to send and receive oa_system_client packets.
</summary>
@@ -46096,7 +45913,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oa_system_client_packets" lineno="57703">
+<interface name="corenet_relabelto_oa_system_client_packets" lineno="57826">
<summary>
Relabel packets to oa_system_client the packet type.
</summary>
@@ -46106,7 +45923,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oa_system_server_packets" lineno="57723">
+<interface name="corenet_send_oa_system_server_packets" lineno="57846">
<summary>
Send oa_system_server packets.
</summary>
@@ -46117,7 +45934,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="57742">
+<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="57865">
<summary>
Do not audit attempts to send oa_system_server packets.
</summary>
@@ -46128,7 +45945,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oa_system_server_packets" lineno="57761">
+<interface name="corenet_receive_oa_system_server_packets" lineno="57884">
<summary>
Receive oa_system_server packets.
</summary>
@@ -46139,7 +45956,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="57780">
+<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="57903">
<summary>
Do not audit attempts to receive oa_system_server packets.
</summary>
@@ -46150,7 +45967,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oa_system_server_packets" lineno="57799">
+<interface name="corenet_sendrecv_oa_system_server_packets" lineno="57922">
<summary>
Send and receive oa_system_server packets.
</summary>
@@ -46161,7 +45978,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="57815">
+<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="57938">
<summary>
Do not audit attempts to send and receive oa_system_server packets.
</summary>
@@ -46172,7 +45989,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oa_system_server_packets" lineno="57830">
+<interface name="corenet_relabelto_oa_system_server_packets" lineno="57953">
<summary>
Relabel packets to oa_system_server the packet type.
</summary>
@@ -46182,7 +45999,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="57852">
+<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="57975">
<summary>
Send and receive TCP traffic on the oracledb port.
</summary>
@@ -46193,7 +46010,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_oracledb_port" lineno="57867">
+<interface name="corenet_udp_send_oracledb_port" lineno="57990">
<summary>
Send UDP traffic on the oracledb port.
</summary>
@@ -46204,7 +46021,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="57882">
+<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58005">
<summary>
Do not audit attempts to send UDP traffic on the oracledb port.
</summary>
@@ -46215,7 +46032,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_oracledb_port" lineno="57897">
+<interface name="corenet_udp_receive_oracledb_port" lineno="58020">
<summary>
Receive UDP traffic on the oracledb port.
</summary>
@@ -46226,7 +46043,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="57912">
+<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58035">
<summary>
Do not audit attempts to receive UDP traffic on the oracledb port.
</summary>
@@ -46237,7 +46054,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_oracledb_port" lineno="57927">
+<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58050">
<summary>
Send and receive UDP traffic on the oracledb port.
</summary>
@@ -46248,7 +46065,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="57943">
+<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58066">
<summary>
Do not audit attempts to send and receive
UDP traffic on the oracledb port.
@@ -46260,7 +46077,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_oracledb_port" lineno="57958">
+<interface name="corenet_tcp_bind_oracledb_port" lineno="58081">
<summary>
Bind TCP sockets to the oracledb port.
</summary>
@@ -46271,7 +46088,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_oracledb_port" lineno="57978">
+<interface name="corenet_udp_bind_oracledb_port" lineno="58101">
<summary>
Bind UDP sockets to the oracledb port.
</summary>
@@ -46282,7 +46099,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_oracledb_port" lineno="57997">
+<interface name="corenet_tcp_connect_oracledb_port" lineno="58120">
<summary>
Make a TCP connection to the oracledb port.
</summary>
@@ -46292,7 +46109,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oracledb_client_packets" lineno="58017">
+<interface name="corenet_send_oracledb_client_packets" lineno="58140">
<summary>
Send oracledb_client packets.
</summary>
@@ -46303,7 +46120,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58036">
+<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58159">
<summary>
Do not audit attempts to send oracledb_client packets.
</summary>
@@ -46314,7 +46131,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oracledb_client_packets" lineno="58055">
+<interface name="corenet_receive_oracledb_client_packets" lineno="58178">
<summary>
Receive oracledb_client packets.
</summary>
@@ -46325,7 +46142,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58074">
+<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58197">
<summary>
Do not audit attempts to receive oracledb_client packets.
</summary>
@@ -46336,7 +46153,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58093">
+<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58216">
<summary>
Send and receive oracledb_client packets.
</summary>
@@ -46347,7 +46164,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58109">
+<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58232">
<summary>
Do not audit attempts to send and receive oracledb_client packets.
</summary>
@@ -46358,7 +46175,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oracledb_client_packets" lineno="58124">
+<interface name="corenet_relabelto_oracledb_client_packets" lineno="58247">
<summary>
Relabel packets to oracledb_client the packet type.
</summary>
@@ -46368,7 +46185,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oracledb_server_packets" lineno="58144">
+<interface name="corenet_send_oracledb_server_packets" lineno="58267">
<summary>
Send oracledb_server packets.
</summary>
@@ -46379,7 +46196,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58163">
+<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58286">
<summary>
Do not audit attempts to send oracledb_server packets.
</summary>
@@ -46390,7 +46207,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oracledb_server_packets" lineno="58182">
+<interface name="corenet_receive_oracledb_server_packets" lineno="58305">
<summary>
Receive oracledb_server packets.
</summary>
@@ -46401,7 +46218,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58201">
+<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58324">
<summary>
Do not audit attempts to receive oracledb_server packets.
</summary>
@@ -46412,7 +46229,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58220">
+<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58343">
<summary>
Send and receive oracledb_server packets.
</summary>
@@ -46423,7 +46240,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58236">
+<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58359">
<summary>
Do not audit attempts to send and receive oracledb_server packets.
</summary>
@@ -46434,7 +46251,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oracledb_server_packets" lineno="58251">
+<interface name="corenet_relabelto_oracledb_server_packets" lineno="58374">
<summary>
Relabel packets to oracledb_server the packet type.
</summary>
@@ -46444,7 +46261,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58273">
+<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58396">
<summary>
Send and receive TCP traffic on the ocsp port.
</summary>
@@ -46455,7 +46272,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ocsp_port" lineno="58288">
+<interface name="corenet_udp_send_ocsp_port" lineno="58411">
<summary>
Send UDP traffic on the ocsp port.
</summary>
@@ -46466,7 +46283,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58303">
+<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58426">
<summary>
Do not audit attempts to send UDP traffic on the ocsp port.
</summary>
@@ -46477,7 +46294,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ocsp_port" lineno="58318">
+<interface name="corenet_udp_receive_ocsp_port" lineno="58441">
<summary>
Receive UDP traffic on the ocsp port.
</summary>
@@ -46488,7 +46305,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58333">
+<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58456">
<summary>
Do not audit attempts to receive UDP traffic on the ocsp port.
</summary>
@@ -46499,7 +46316,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58348">
+<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58471">
<summary>
Send and receive UDP traffic on the ocsp port.
</summary>
@@ -46510,7 +46327,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58364">
+<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58487">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ocsp port.
@@ -46522,7 +46339,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ocsp_port" lineno="58379">
+<interface name="corenet_tcp_bind_ocsp_port" lineno="58502">
<summary>
Bind TCP sockets to the ocsp port.
</summary>
@@ -46533,7 +46350,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ocsp_port" lineno="58399">
+<interface name="corenet_udp_bind_ocsp_port" lineno="58522">
<summary>
Bind UDP sockets to the ocsp port.
</summary>
@@ -46544,7 +46361,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ocsp_port" lineno="58418">
+<interface name="corenet_tcp_connect_ocsp_port" lineno="58541">
<summary>
Make a TCP connection to the ocsp port.
</summary>
@@ -46554,7 +46371,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ocsp_client_packets" lineno="58438">
+<interface name="corenet_send_ocsp_client_packets" lineno="58561">
<summary>
Send ocsp_client packets.
</summary>
@@ -46565,7 +46382,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="58457">
+<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="58580">
<summary>
Do not audit attempts to send ocsp_client packets.
</summary>
@@ -46576,7 +46393,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ocsp_client_packets" lineno="58476">
+<interface name="corenet_receive_ocsp_client_packets" lineno="58599">
<summary>
Receive ocsp_client packets.
</summary>
@@ -46587,7 +46404,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="58495">
+<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="58618">
<summary>
Do not audit attempts to receive ocsp_client packets.
</summary>
@@ -46598,7 +46415,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ocsp_client_packets" lineno="58514">
+<interface name="corenet_sendrecv_ocsp_client_packets" lineno="58637">
<summary>
Send and receive ocsp_client packets.
</summary>
@@ -46609,7 +46426,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="58530">
+<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="58653">
<summary>
Do not audit attempts to send and receive ocsp_client packets.
</summary>
@@ -46620,7 +46437,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ocsp_client_packets" lineno="58545">
+<interface name="corenet_relabelto_ocsp_client_packets" lineno="58668">
<summary>
Relabel packets to ocsp_client the packet type.
</summary>
@@ -46630,7 +46447,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ocsp_server_packets" lineno="58565">
+<interface name="corenet_send_ocsp_server_packets" lineno="58688">
<summary>
Send ocsp_server packets.
</summary>
@@ -46641,7 +46458,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="58584">
+<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="58707">
<summary>
Do not audit attempts to send ocsp_server packets.
</summary>
@@ -46652,7 +46469,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ocsp_server_packets" lineno="58603">
+<interface name="corenet_receive_ocsp_server_packets" lineno="58726">
<summary>
Receive ocsp_server packets.
</summary>
@@ -46663,7 +46480,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="58622">
+<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="58745">
<summary>
Do not audit attempts to receive ocsp_server packets.
</summary>
@@ -46674,7 +46491,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ocsp_server_packets" lineno="58641">
+<interface name="corenet_sendrecv_ocsp_server_packets" lineno="58764">
<summary>
Send and receive ocsp_server packets.
</summary>
@@ -46685,7 +46502,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="58657">
+<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="58780">
<summary>
Do not audit attempts to send and receive ocsp_server packets.
</summary>
@@ -46696,7 +46513,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ocsp_server_packets" lineno="58672">
+<interface name="corenet_relabelto_ocsp_server_packets" lineno="58795">
<summary>
Relabel packets to ocsp_server the packet type.
</summary>
@@ -46706,7 +46523,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="58694">
+<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="58817">
<summary>
Send and receive TCP traffic on the openhpid port.
</summary>
@@ -46717,7 +46534,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_openhpid_port" lineno="58709">
+<interface name="corenet_udp_send_openhpid_port" lineno="58832">
<summary>
Send UDP traffic on the openhpid port.
</summary>
@@ -46728,7 +46545,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="58724">
+<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="58847">
<summary>
Do not audit attempts to send UDP traffic on the openhpid port.
</summary>
@@ -46739,7 +46556,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_openhpid_port" lineno="58739">
+<interface name="corenet_udp_receive_openhpid_port" lineno="58862">
<summary>
Receive UDP traffic on the openhpid port.
</summary>
@@ -46750,7 +46567,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="58754">
+<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="58877">
<summary>
Do not audit attempts to receive UDP traffic on the openhpid port.
</summary>
@@ -46761,7 +46578,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_openhpid_port" lineno="58769">
+<interface name="corenet_udp_sendrecv_openhpid_port" lineno="58892">
<summary>
Send and receive UDP traffic on the openhpid port.
</summary>
@@ -46772,7 +46589,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="58785">
+<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="58908">
<summary>
Do not audit attempts to send and receive
UDP traffic on the openhpid port.
@@ -46784,7 +46601,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_openhpid_port" lineno="58800">
+<interface name="corenet_tcp_bind_openhpid_port" lineno="58923">
<summary>
Bind TCP sockets to the openhpid port.
</summary>
@@ -46795,7 +46612,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_openhpid_port" lineno="58820">
+<interface name="corenet_udp_bind_openhpid_port" lineno="58943">
<summary>
Bind UDP sockets to the openhpid port.
</summary>
@@ -46806,7 +46623,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_openhpid_port" lineno="58839">
+<interface name="corenet_tcp_connect_openhpid_port" lineno="58962">
<summary>
Make a TCP connection to the openhpid port.
</summary>
@@ -46816,7 +46633,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openhpid_client_packets" lineno="58859">
+<interface name="corenet_send_openhpid_client_packets" lineno="58982">
<summary>
Send openhpid_client packets.
</summary>
@@ -46827,7 +46644,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="58878">
+<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59001">
<summary>
Do not audit attempts to send openhpid_client packets.
</summary>
@@ -46838,7 +46655,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openhpid_client_packets" lineno="58897">
+<interface name="corenet_receive_openhpid_client_packets" lineno="59020">
<summary>
Receive openhpid_client packets.
</summary>
@@ -46849,7 +46666,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="58916">
+<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59039">
<summary>
Do not audit attempts to receive openhpid_client packets.
</summary>
@@ -46860,7 +46677,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openhpid_client_packets" lineno="58935">
+<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59058">
<summary>
Send and receive openhpid_client packets.
</summary>
@@ -46871,7 +46688,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="58951">
+<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59074">
<summary>
Do not audit attempts to send and receive openhpid_client packets.
</summary>
@@ -46882,7 +46699,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openhpid_client_packets" lineno="58966">
+<interface name="corenet_relabelto_openhpid_client_packets" lineno="59089">
<summary>
Relabel packets to openhpid_client the packet type.
</summary>
@@ -46892,7 +46709,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openhpid_server_packets" lineno="58986">
+<interface name="corenet_send_openhpid_server_packets" lineno="59109">
<summary>
Send openhpid_server packets.
</summary>
@@ -46903,7 +46720,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59005">
+<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59128">
<summary>
Do not audit attempts to send openhpid_server packets.
</summary>
@@ -46914,7 +46731,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openhpid_server_packets" lineno="59024">
+<interface name="corenet_receive_openhpid_server_packets" lineno="59147">
<summary>
Receive openhpid_server packets.
</summary>
@@ -46925,7 +46742,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59043">
+<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59166">
<summary>
Do not audit attempts to receive openhpid_server packets.
</summary>
@@ -46936,7 +46753,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59062">
+<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59185">
<summary>
Send and receive openhpid_server packets.
</summary>
@@ -46947,7 +46764,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59078">
+<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59201">
<summary>
Do not audit attempts to send and receive openhpid_server packets.
</summary>
@@ -46958,7 +46775,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openhpid_server_packets" lineno="59093">
+<interface name="corenet_relabelto_openhpid_server_packets" lineno="59216">
<summary>
Relabel packets to openhpid_server the packet type.
</summary>
@@ -46968,7 +46785,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59115">
+<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59238">
<summary>
Send and receive TCP traffic on the openvpn port.
</summary>
@@ -46979,7 +46796,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_openvpn_port" lineno="59130">
+<interface name="corenet_udp_send_openvpn_port" lineno="59253">
<summary>
Send UDP traffic on the openvpn port.
</summary>
@@ -46990,7 +46807,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59145">
+<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59268">
<summary>
Do not audit attempts to send UDP traffic on the openvpn port.
</summary>
@@ -47001,7 +46818,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_openvpn_port" lineno="59160">
+<interface name="corenet_udp_receive_openvpn_port" lineno="59283">
<summary>
Receive UDP traffic on the openvpn port.
</summary>
@@ -47012,7 +46829,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59175">
+<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59298">
<summary>
Do not audit attempts to receive UDP traffic on the openvpn port.
</summary>
@@ -47023,7 +46840,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59190">
+<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59313">
<summary>
Send and receive UDP traffic on the openvpn port.
</summary>
@@ -47034,7 +46851,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59206">
+<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59329">
<summary>
Do not audit attempts to send and receive
UDP traffic on the openvpn port.
@@ -47046,7 +46863,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_openvpn_port" lineno="59221">
+<interface name="corenet_tcp_bind_openvpn_port" lineno="59344">
<summary>
Bind TCP sockets to the openvpn port.
</summary>
@@ -47057,7 +46874,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_openvpn_port" lineno="59241">
+<interface name="corenet_udp_bind_openvpn_port" lineno="59364">
<summary>
Bind UDP sockets to the openvpn port.
</summary>
@@ -47068,7 +46885,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_openvpn_port" lineno="59260">
+<interface name="corenet_tcp_connect_openvpn_port" lineno="59383">
<summary>
Make a TCP connection to the openvpn port.
</summary>
@@ -47078,7 +46895,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openvpn_client_packets" lineno="59280">
+<interface name="corenet_send_openvpn_client_packets" lineno="59403">
<summary>
Send openvpn_client packets.
</summary>
@@ -47089,7 +46906,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59299">
+<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59422">
<summary>
Do not audit attempts to send openvpn_client packets.
</summary>
@@ -47100,7 +46917,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openvpn_client_packets" lineno="59318">
+<interface name="corenet_receive_openvpn_client_packets" lineno="59441">
<summary>
Receive openvpn_client packets.
</summary>
@@ -47111,7 +46928,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59337">
+<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59460">
<summary>
Do not audit attempts to receive openvpn_client packets.
</summary>
@@ -47122,7 +46939,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59356">
+<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59479">
<summary>
Send and receive openvpn_client packets.
</summary>
@@ -47133,7 +46950,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59372">
+<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59495">
<summary>
Do not audit attempts to send and receive openvpn_client packets.
</summary>
@@ -47144,7 +46961,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openvpn_client_packets" lineno="59387">
+<interface name="corenet_relabelto_openvpn_client_packets" lineno="59510">
<summary>
Relabel packets to openvpn_client the packet type.
</summary>
@@ -47154,7 +46971,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openvpn_server_packets" lineno="59407">
+<interface name="corenet_send_openvpn_server_packets" lineno="59530">
<summary>
Send openvpn_server packets.
</summary>
@@ -47165,7 +46982,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59426">
+<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59549">
<summary>
Do not audit attempts to send openvpn_server packets.
</summary>
@@ -47176,7 +46993,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openvpn_server_packets" lineno="59445">
+<interface name="corenet_receive_openvpn_server_packets" lineno="59568">
<summary>
Receive openvpn_server packets.
</summary>
@@ -47187,7 +47004,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="59464">
+<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="59587">
<summary>
Do not audit attempts to receive openvpn_server packets.
</summary>
@@ -47198,7 +47015,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openvpn_server_packets" lineno="59483">
+<interface name="corenet_sendrecv_openvpn_server_packets" lineno="59606">
<summary>
Send and receive openvpn_server packets.
</summary>
@@ -47209,7 +47026,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="59499">
+<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="59622">
<summary>
Do not audit attempts to send and receive openvpn_server packets.
</summary>
@@ -47220,7 +47037,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openvpn_server_packets" lineno="59514">
+<interface name="corenet_relabelto_openvpn_server_packets" lineno="59637">
<summary>
Relabel packets to openvpn_server the packet type.
</summary>
@@ -47230,7 +47047,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pdps_port" lineno="59536">
+<interface name="corenet_tcp_sendrecv_pdps_port" lineno="59659">
<summary>
Send and receive TCP traffic on the pdps port.
</summary>
@@ -47241,7 +47058,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pdps_port" lineno="59551">
+<interface name="corenet_udp_send_pdps_port" lineno="59674">
<summary>
Send UDP traffic on the pdps port.
</summary>
@@ -47252,7 +47069,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="59566">
+<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="59689">
<summary>
Do not audit attempts to send UDP traffic on the pdps port.
</summary>
@@ -47263,7 +47080,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pdps_port" lineno="59581">
+<interface name="corenet_udp_receive_pdps_port" lineno="59704">
<summary>
Receive UDP traffic on the pdps port.
</summary>
@@ -47274,7 +47091,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="59596">
+<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="59719">
<summary>
Do not audit attempts to receive UDP traffic on the pdps port.
</summary>
@@ -47285,7 +47102,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pdps_port" lineno="59611">
+<interface name="corenet_udp_sendrecv_pdps_port" lineno="59734">
<summary>
Send and receive UDP traffic on the pdps port.
</summary>
@@ -47296,7 +47113,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="59627">
+<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="59750">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pdps port.
@@ -47308,7 +47125,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pdps_port" lineno="59642">
+<interface name="corenet_tcp_bind_pdps_port" lineno="59765">
<summary>
Bind TCP sockets to the pdps port.
</summary>
@@ -47319,7 +47136,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pdps_port" lineno="59662">
+<interface name="corenet_udp_bind_pdps_port" lineno="59785">
<summary>
Bind UDP sockets to the pdps port.
</summary>
@@ -47330,7 +47147,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pdps_port" lineno="59681">
+<interface name="corenet_tcp_connect_pdps_port" lineno="59804">
<summary>
Make a TCP connection to the pdps port.
</summary>
@@ -47340,7 +47157,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pdps_client_packets" lineno="59701">
+<interface name="corenet_send_pdps_client_packets" lineno="59824">
<summary>
Send pdps_client packets.
</summary>
@@ -47351,7 +47168,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="59720">
+<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="59843">
<summary>
Do not audit attempts to send pdps_client packets.
</summary>
@@ -47362,7 +47179,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pdps_client_packets" lineno="59739">
+<interface name="corenet_receive_pdps_client_packets" lineno="59862">
<summary>
Receive pdps_client packets.
</summary>
@@ -47373,7 +47190,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="59758">
+<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="59881">
<summary>
Do not audit attempts to receive pdps_client packets.
</summary>
@@ -47384,7 +47201,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pdps_client_packets" lineno="59777">
+<interface name="corenet_sendrecv_pdps_client_packets" lineno="59900">
<summary>
Send and receive pdps_client packets.
</summary>
@@ -47395,7 +47212,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="59793">
+<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="59916">
<summary>
Do not audit attempts to send and receive pdps_client packets.
</summary>
@@ -47406,7 +47223,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pdps_client_packets" lineno="59808">
+<interface name="corenet_relabelto_pdps_client_packets" lineno="59931">
<summary>
Relabel packets to pdps_client the packet type.
</summary>
@@ -47416,7 +47233,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pdps_server_packets" lineno="59828">
+<interface name="corenet_send_pdps_server_packets" lineno="59951">
<summary>
Send pdps_server packets.
</summary>
@@ -47427,7 +47244,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="59847">
+<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="59970">
<summary>
Do not audit attempts to send pdps_server packets.
</summary>
@@ -47438,7 +47255,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pdps_server_packets" lineno="59866">
+<interface name="corenet_receive_pdps_server_packets" lineno="59989">
<summary>
Receive pdps_server packets.
</summary>
@@ -47449,7 +47266,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="59885">
+<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60008">
<summary>
Do not audit attempts to receive pdps_server packets.
</summary>
@@ -47460,7 +47277,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pdps_server_packets" lineno="59904">
+<interface name="corenet_sendrecv_pdps_server_packets" lineno="60027">
<summary>
Send and receive pdps_server packets.
</summary>
@@ -47471,7 +47288,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="59920">
+<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60043">
<summary>
Do not audit attempts to send and receive pdps_server packets.
</summary>
@@ -47482,7 +47299,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pdps_server_packets" lineno="59935">
+<interface name="corenet_relabelto_pdps_server_packets" lineno="60058">
<summary>
Relabel packets to pdps_server the packet type.
</summary>
@@ -47492,7 +47309,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="59957">
+<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60080">
<summary>
Send and receive TCP traffic on the pegasus_http port.
</summary>
@@ -47503,7 +47320,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pegasus_http_port" lineno="59972">
+<interface name="corenet_udp_send_pegasus_http_port" lineno="60095">
<summary>
Send UDP traffic on the pegasus_http port.
</summary>
@@ -47514,7 +47331,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="59987">
+<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60110">
<summary>
Do not audit attempts to send UDP traffic on the pegasus_http port.
</summary>
@@ -47525,7 +47342,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pegasus_http_port" lineno="60002">
+<interface name="corenet_udp_receive_pegasus_http_port" lineno="60125">
<summary>
Receive UDP traffic on the pegasus_http port.
</summary>
@@ -47536,7 +47353,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60017">
+<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60140">
<summary>
Do not audit attempts to receive UDP traffic on the pegasus_http port.
</summary>
@@ -47547,7 +47364,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60032">
+<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60155">
<summary>
Send and receive UDP traffic on the pegasus_http port.
</summary>
@@ -47558,7 +47375,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60048">
+<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60171">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pegasus_http port.
@@ -47570,7 +47387,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60063">
+<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60186">
<summary>
Bind TCP sockets to the pegasus_http port.
</summary>
@@ -47581,7 +47398,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pegasus_http_port" lineno="60083">
+<interface name="corenet_udp_bind_pegasus_http_port" lineno="60206">
<summary>
Bind UDP sockets to the pegasus_http port.
</summary>
@@ -47592,7 +47409,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60102">
+<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60225">
<summary>
Make a TCP connection to the pegasus_http port.
</summary>
@@ -47602,7 +47419,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_http_client_packets" lineno="60122">
+<interface name="corenet_send_pegasus_http_client_packets" lineno="60245">
<summary>
Send pegasus_http_client packets.
</summary>
@@ -47613,7 +47430,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60141">
+<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60264">
<summary>
Do not audit attempts to send pegasus_http_client packets.
</summary>
@@ -47624,7 +47441,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_http_client_packets" lineno="60160">
+<interface name="corenet_receive_pegasus_http_client_packets" lineno="60283">
<summary>
Receive pegasus_http_client packets.
</summary>
@@ -47635,7 +47452,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60179">
+<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60302">
<summary>
Do not audit attempts to receive pegasus_http_client packets.
</summary>
@@ -47646,7 +47463,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60198">
+<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60321">
<summary>
Send and receive pegasus_http_client packets.
</summary>
@@ -47657,7 +47474,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60214">
+<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60337">
<summary>
Do not audit attempts to send and receive pegasus_http_client packets.
</summary>
@@ -47668,7 +47485,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60229">
+<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60352">
<summary>
Relabel packets to pegasus_http_client the packet type.
</summary>
@@ -47678,7 +47495,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_http_server_packets" lineno="60249">
+<interface name="corenet_send_pegasus_http_server_packets" lineno="60372">
<summary>
Send pegasus_http_server packets.
</summary>
@@ -47689,7 +47506,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60268">
+<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60391">
<summary>
Do not audit attempts to send pegasus_http_server packets.
</summary>
@@ -47700,7 +47517,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_http_server_packets" lineno="60287">
+<interface name="corenet_receive_pegasus_http_server_packets" lineno="60410">
<summary>
Receive pegasus_http_server packets.
</summary>
@@ -47711,7 +47528,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60306">
+<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60429">
<summary>
Do not audit attempts to receive pegasus_http_server packets.
</summary>
@@ -47722,7 +47539,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60325">
+<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60448">
<summary>
Send and receive pegasus_http_server packets.
</summary>
@@ -47733,7 +47550,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60341">
+<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60464">
<summary>
Do not audit attempts to send and receive pegasus_http_server packets.
</summary>
@@ -47744,7 +47561,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60356">
+<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60479">
<summary>
Relabel packets to pegasus_http_server the packet type.
</summary>
@@ -47754,7 +47571,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60378">
+<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60501">
<summary>
Send and receive TCP traffic on the pegasus_https port.
</summary>
@@ -47765,7 +47582,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pegasus_https_port" lineno="60393">
+<interface name="corenet_udp_send_pegasus_https_port" lineno="60516">
<summary>
Send UDP traffic on the pegasus_https port.
</summary>
@@ -47776,7 +47593,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60408">
+<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60531">
<summary>
Do not audit attempts to send UDP traffic on the pegasus_https port.
</summary>
@@ -47787,7 +47604,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pegasus_https_port" lineno="60423">
+<interface name="corenet_udp_receive_pegasus_https_port" lineno="60546">
<summary>
Receive UDP traffic on the pegasus_https port.
</summary>
@@ -47798,7 +47615,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="60438">
+<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="60561">
<summary>
Do not audit attempts to receive UDP traffic on the pegasus_https port.
</summary>
@@ -47809,7 +47626,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="60453">
+<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="60576">
<summary>
Send and receive UDP traffic on the pegasus_https port.
</summary>
@@ -47820,7 +47637,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="60469">
+<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="60592">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pegasus_https port.
@@ -47832,7 +47649,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pegasus_https_port" lineno="60484">
+<interface name="corenet_tcp_bind_pegasus_https_port" lineno="60607">
<summary>
Bind TCP sockets to the pegasus_https port.
</summary>
@@ -47843,7 +47660,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pegasus_https_port" lineno="60504">
+<interface name="corenet_udp_bind_pegasus_https_port" lineno="60627">
<summary>
Bind UDP sockets to the pegasus_https port.
</summary>
@@ -47854,7 +47671,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pegasus_https_port" lineno="60523">
+<interface name="corenet_tcp_connect_pegasus_https_port" lineno="60646">
<summary>
Make a TCP connection to the pegasus_https port.
</summary>
@@ -47864,7 +47681,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_https_client_packets" lineno="60543">
+<interface name="corenet_send_pegasus_https_client_packets" lineno="60666">
<summary>
Send pegasus_https_client packets.
</summary>
@@ -47875,7 +47692,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="60562">
+<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="60685">
<summary>
Do not audit attempts to send pegasus_https_client packets.
</summary>
@@ -47886,7 +47703,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_https_client_packets" lineno="60581">
+<interface name="corenet_receive_pegasus_https_client_packets" lineno="60704">
<summary>
Receive pegasus_https_client packets.
</summary>
@@ -47897,7 +47714,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="60600">
+<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="60723">
<summary>
Do not audit attempts to receive pegasus_https_client packets.
</summary>
@@ -47908,7 +47725,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="60619">
+<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="60742">
<summary>
Send and receive pegasus_https_client packets.
</summary>
@@ -47919,7 +47736,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="60635">
+<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="60758">
<summary>
Do not audit attempts to send and receive pegasus_https_client packets.
</summary>
@@ -47930,7 +47747,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="60650">
+<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="60773">
<summary>
Relabel packets to pegasus_https_client the packet type.
</summary>
@@ -47940,7 +47757,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_https_server_packets" lineno="60670">
+<interface name="corenet_send_pegasus_https_server_packets" lineno="60793">
<summary>
Send pegasus_https_server packets.
</summary>
@@ -47951,7 +47768,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="60689">
+<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="60812">
<summary>
Do not audit attempts to send pegasus_https_server packets.
</summary>
@@ -47962,7 +47779,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_https_server_packets" lineno="60708">
+<interface name="corenet_receive_pegasus_https_server_packets" lineno="60831">
<summary>
Receive pegasus_https_server packets.
</summary>
@@ -47973,7 +47790,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="60727">
+<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="60850">
<summary>
Do not audit attempts to receive pegasus_https_server packets.
</summary>
@@ -47984,7 +47801,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="60746">
+<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="60869">
<summary>
Send and receive pegasus_https_server packets.
</summary>
@@ -47995,7 +47812,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="60762">
+<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="60885">
<summary>
Do not audit attempts to send and receive pegasus_https_server packets.
</summary>
@@ -48006,7 +47823,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="60777">
+<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="60900">
<summary>
Relabel packets to pegasus_https_server the packet type.
</summary>
@@ -48016,7 +47833,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="60799">
+<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="60922">
<summary>
Send and receive TCP traffic on the pgpkeyserver port.
</summary>
@@ -48027,7 +47844,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pgpkeyserver_port" lineno="60814">
+<interface name="corenet_udp_send_pgpkeyserver_port" lineno="60937">
<summary>
Send UDP traffic on the pgpkeyserver port.
</summary>
@@ -48038,7 +47855,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="60829">
+<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="60952">
<summary>
Do not audit attempts to send UDP traffic on the pgpkeyserver port.
</summary>
@@ -48049,7 +47866,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="60844">
+<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="60967">
<summary>
Receive UDP traffic on the pgpkeyserver port.
</summary>
@@ -48060,7 +47877,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="60859">
+<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="60982">
<summary>
Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
</summary>
@@ -48071,7 +47888,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="60874">
+<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="60997">
<summary>
Send and receive UDP traffic on the pgpkeyserver port.
</summary>
@@ -48082,7 +47899,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="60890">
+<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61013">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pgpkeyserver port.
@@ -48094,7 +47911,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="60905">
+<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61028">
<summary>
Bind TCP sockets to the pgpkeyserver port.
</summary>
@@ -48105,7 +47922,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="60925">
+<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61048">
<summary>
Bind UDP sockets to the pgpkeyserver port.
</summary>
@@ -48116,7 +47933,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="60944">
+<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61067">
<summary>
Make a TCP connection to the pgpkeyserver port.
</summary>
@@ -48126,7 +47943,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pgpkeyserver_client_packets" lineno="60964">
+<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61087">
<summary>
Send pgpkeyserver_client packets.
</summary>
@@ -48137,7 +47954,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="60983">
+<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61106">
<summary>
Do not audit attempts to send pgpkeyserver_client packets.
</summary>
@@ -48148,7 +47965,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61002">
+<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61125">
<summary>
Receive pgpkeyserver_client packets.
</summary>
@@ -48159,7 +47976,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61021">
+<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61144">
<summary>
Do not audit attempts to receive pgpkeyserver_client packets.
</summary>
@@ -48170,7 +47987,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61040">
+<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61163">
<summary>
Send and receive pgpkeyserver_client packets.
</summary>
@@ -48181,7 +47998,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61056">
+<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61179">
<summary>
Do not audit attempts to send and receive pgpkeyserver_client packets.
</summary>
@@ -48192,7 +48009,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61071">
+<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61194">
<summary>
Relabel packets to pgpkeyserver_client the packet type.
</summary>
@@ -48202,7 +48019,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61091">
+<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61214">
<summary>
Send pgpkeyserver_server packets.
</summary>
@@ -48213,7 +48030,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61110">
+<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61233">
<summary>
Do not audit attempts to send pgpkeyserver_server packets.
</summary>
@@ -48224,7 +48041,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61129">
+<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61252">
<summary>
Receive pgpkeyserver_server packets.
</summary>
@@ -48235,7 +48052,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61148">
+<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61271">
<summary>
Do not audit attempts to receive pgpkeyserver_server packets.
</summary>
@@ -48246,7 +48063,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61167">
+<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61290">
<summary>
Send and receive pgpkeyserver_server packets.
</summary>
@@ -48257,7 +48074,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61183">
+<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61306">
<summary>
Do not audit attempts to send and receive pgpkeyserver_server packets.
</summary>
@@ -48268,7 +48085,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61198">
+<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61321">
<summary>
Relabel packets to pgpkeyserver_server the packet type.
</summary>
@@ -48278,7 +48095,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61220">
+<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61343">
<summary>
Send and receive TCP traffic on the pingd port.
</summary>
@@ -48289,7 +48106,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pingd_port" lineno="61235">
+<interface name="corenet_udp_send_pingd_port" lineno="61358">
<summary>
Send UDP traffic on the pingd port.
</summary>
@@ -48300,7 +48117,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61250">
+<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61373">
<summary>
Do not audit attempts to send UDP traffic on the pingd port.
</summary>
@@ -48311,7 +48128,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pingd_port" lineno="61265">
+<interface name="corenet_udp_receive_pingd_port" lineno="61388">
<summary>
Receive UDP traffic on the pingd port.
</summary>
@@ -48322,7 +48139,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61280">
+<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61403">
<summary>
Do not audit attempts to receive UDP traffic on the pingd port.
</summary>
@@ -48333,7 +48150,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pingd_port" lineno="61295">
+<interface name="corenet_udp_sendrecv_pingd_port" lineno="61418">
<summary>
Send and receive UDP traffic on the pingd port.
</summary>
@@ -48344,7 +48161,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61311">
+<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61434">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pingd port.
@@ -48356,7 +48173,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pingd_port" lineno="61326">
+<interface name="corenet_tcp_bind_pingd_port" lineno="61449">
<summary>
Bind TCP sockets to the pingd port.
</summary>
@@ -48367,7 +48184,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pingd_port" lineno="61346">
+<interface name="corenet_udp_bind_pingd_port" lineno="61469">
<summary>
Bind UDP sockets to the pingd port.
</summary>
@@ -48378,7 +48195,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pingd_port" lineno="61365">
+<interface name="corenet_tcp_connect_pingd_port" lineno="61488">
<summary>
Make a TCP connection to the pingd port.
</summary>
@@ -48388,7 +48205,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pingd_client_packets" lineno="61385">
+<interface name="corenet_send_pingd_client_packets" lineno="61508">
<summary>
Send pingd_client packets.
</summary>
@@ -48399,7 +48216,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61404">
+<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61527">
<summary>
Do not audit attempts to send pingd_client packets.
</summary>
@@ -48410,7 +48227,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pingd_client_packets" lineno="61423">
+<interface name="corenet_receive_pingd_client_packets" lineno="61546">
<summary>
Receive pingd_client packets.
</summary>
@@ -48421,7 +48238,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="61442">
+<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="61565">
<summary>
Do not audit attempts to receive pingd_client packets.
</summary>
@@ -48432,7 +48249,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pingd_client_packets" lineno="61461">
+<interface name="corenet_sendrecv_pingd_client_packets" lineno="61584">
<summary>
Send and receive pingd_client packets.
</summary>
@@ -48443,7 +48260,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="61477">
+<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="61600">
<summary>
Do not audit attempts to send and receive pingd_client packets.
</summary>
@@ -48454,7 +48271,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pingd_client_packets" lineno="61492">
+<interface name="corenet_relabelto_pingd_client_packets" lineno="61615">
<summary>
Relabel packets to pingd_client the packet type.
</summary>
@@ -48464,7 +48281,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pingd_server_packets" lineno="61512">
+<interface name="corenet_send_pingd_server_packets" lineno="61635">
<summary>
Send pingd_server packets.
</summary>
@@ -48475,7 +48292,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="61531">
+<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="61654">
<summary>
Do not audit attempts to send pingd_server packets.
</summary>
@@ -48486,7 +48303,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pingd_server_packets" lineno="61550">
+<interface name="corenet_receive_pingd_server_packets" lineno="61673">
<summary>
Receive pingd_server packets.
</summary>
@@ -48497,7 +48314,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="61569">
+<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="61692">
<summary>
Do not audit attempts to receive pingd_server packets.
</summary>
@@ -48508,7 +48325,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pingd_server_packets" lineno="61588">
+<interface name="corenet_sendrecv_pingd_server_packets" lineno="61711">
<summary>
Send and receive pingd_server packets.
</summary>
@@ -48519,7 +48336,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="61604">
+<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="61727">
<summary>
Do not audit attempts to send and receive pingd_server packets.
</summary>
@@ -48530,7 +48347,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pingd_server_packets" lineno="61619">
+<interface name="corenet_relabelto_pingd_server_packets" lineno="61742">
<summary>
Relabel packets to pingd_server the packet type.
</summary>
@@ -48540,7 +48357,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="61641">
+<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="61764">
<summary>
Send and receive TCP traffic on the pktcable_cops port.
</summary>
@@ -48551,7 +48368,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pktcable_cops_port" lineno="61656">
+<interface name="corenet_udp_send_pktcable_cops_port" lineno="61779">
<summary>
Send UDP traffic on the pktcable_cops port.
</summary>
@@ -48562,7 +48379,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="61671">
+<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="61794">
<summary>
Do not audit attempts to send UDP traffic on the pktcable_cops port.
</summary>
@@ -48573,7 +48390,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pktcable_cops_port" lineno="61686">
+<interface name="corenet_udp_receive_pktcable_cops_port" lineno="61809">
<summary>
Receive UDP traffic on the pktcable_cops port.
</summary>
@@ -48584,7 +48401,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="61701">
+<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="61824">
<summary>
Do not audit attempts to receive UDP traffic on the pktcable_cops port.
</summary>
@@ -48595,7 +48412,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="61716">
+<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="61839">
<summary>
Send and receive UDP traffic on the pktcable_cops port.
</summary>
@@ -48606,7 +48423,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="61732">
+<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="61855">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pktcable_cops port.
@@ -48618,7 +48435,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="61747">
+<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="61870">
<summary>
Bind TCP sockets to the pktcable_cops port.
</summary>
@@ -48629,7 +48446,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pktcable_cops_port" lineno="61767">
+<interface name="corenet_udp_bind_pktcable_cops_port" lineno="61890">
<summary>
Bind UDP sockets to the pktcable_cops port.
</summary>
@@ -48640,7 +48457,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="61786">
+<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="61909">
<summary>
Make a TCP connection to the pktcable_cops port.
</summary>
@@ -48650,7 +48467,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pktcable_cops_client_packets" lineno="61806">
+<interface name="corenet_send_pktcable_cops_client_packets" lineno="61929">
<summary>
Send pktcable_cops_client packets.
</summary>
@@ -48661,7 +48478,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="61825">
+<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="61948">
<summary>
Do not audit attempts to send pktcable_cops_client packets.
</summary>
@@ -48672,7 +48489,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pktcable_cops_client_packets" lineno="61844">
+<interface name="corenet_receive_pktcable_cops_client_packets" lineno="61967">
<summary>
Receive pktcable_cops_client packets.
</summary>
@@ -48683,7 +48500,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="61863">
+<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="61986">
<summary>
Do not audit attempts to receive pktcable_cops_client packets.
</summary>
@@ -48694,7 +48511,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="61882">
+<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62005">
<summary>
Send and receive pktcable_cops_client packets.
</summary>
@@ -48705,7 +48522,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="61898">
+<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62021">
<summary>
Do not audit attempts to send and receive pktcable_cops_client packets.
</summary>
@@ -48716,7 +48533,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="61913">
+<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62036">
<summary>
Relabel packets to pktcable_cops_client the packet type.
</summary>
@@ -48726,7 +48543,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pktcable_cops_server_packets" lineno="61933">
+<interface name="corenet_send_pktcable_cops_server_packets" lineno="62056">
<summary>
Send pktcable_cops_server packets.
</summary>
@@ -48737,7 +48554,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="61952">
+<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62075">
<summary>
Do not audit attempts to send pktcable_cops_server packets.
</summary>
@@ -48748,7 +48565,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pktcable_cops_server_packets" lineno="61971">
+<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62094">
<summary>
Receive pktcable_cops_server packets.
</summary>
@@ -48759,7 +48576,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="61990">
+<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62113">
<summary>
Do not audit attempts to receive pktcable_cops_server packets.
</summary>
@@ -48770,7 +48587,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62009">
+<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62132">
<summary>
Send and receive pktcable_cops_server packets.
</summary>
@@ -48781,7 +48598,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62025">
+<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62148">
<summary>
Do not audit attempts to send and receive pktcable_cops_server packets.
</summary>
@@ -48792,7 +48609,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62040">
+<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62163">
<summary>
Relabel packets to pktcable_cops_server the packet type.
</summary>
@@ -48802,7 +48619,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pop_port" lineno="62062">
+<interface name="corenet_tcp_sendrecv_pop_port" lineno="62185">
<summary>
Send and receive TCP traffic on the pop port.
</summary>
@@ -48813,7 +48630,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pop_port" lineno="62077">
+<interface name="corenet_udp_send_pop_port" lineno="62200">
<summary>
Send UDP traffic on the pop port.
</summary>
@@ -48824,7 +48641,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62092">
+<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62215">
<summary>
Do not audit attempts to send UDP traffic on the pop port.
</summary>
@@ -48835,7 +48652,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pop_port" lineno="62107">
+<interface name="corenet_udp_receive_pop_port" lineno="62230">
<summary>
Receive UDP traffic on the pop port.
</summary>
@@ -48846,7 +48663,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62122">
+<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62245">
<summary>
Do not audit attempts to receive UDP traffic on the pop port.
</summary>
@@ -48857,7 +48674,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pop_port" lineno="62137">
+<interface name="corenet_udp_sendrecv_pop_port" lineno="62260">
<summary>
Send and receive UDP traffic on the pop port.
</summary>
@@ -48868,7 +48685,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62153">
+<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62276">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pop port.
@@ -48880,7 +48697,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pop_port" lineno="62168">
+<interface name="corenet_tcp_bind_pop_port" lineno="62291">
<summary>
Bind TCP sockets to the pop port.
</summary>
@@ -48891,7 +48708,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pop_port" lineno="62188">
+<interface name="corenet_udp_bind_pop_port" lineno="62311">
<summary>
Bind UDP sockets to the pop port.
</summary>
@@ -48902,7 +48719,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pop_port" lineno="62207">
+<interface name="corenet_tcp_connect_pop_port" lineno="62330">
<summary>
Make a TCP connection to the pop port.
</summary>
@@ -48912,7 +48729,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pop_client_packets" lineno="62227">
+<interface name="corenet_send_pop_client_packets" lineno="62350">
<summary>
Send pop_client packets.
</summary>
@@ -48923,7 +48740,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62246">
+<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62369">
<summary>
Do not audit attempts to send pop_client packets.
</summary>
@@ -48934,7 +48751,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pop_client_packets" lineno="62265">
+<interface name="corenet_receive_pop_client_packets" lineno="62388">
<summary>
Receive pop_client packets.
</summary>
@@ -48945,7 +48762,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62284">
+<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62407">
<summary>
Do not audit attempts to receive pop_client packets.
</summary>
@@ -48956,7 +48773,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pop_client_packets" lineno="62303">
+<interface name="corenet_sendrecv_pop_client_packets" lineno="62426">
<summary>
Send and receive pop_client packets.
</summary>
@@ -48967,7 +48784,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62319">
+<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62442">
<summary>
Do not audit attempts to send and receive pop_client packets.
</summary>
@@ -48978,7 +48795,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pop_client_packets" lineno="62334">
+<interface name="corenet_relabelto_pop_client_packets" lineno="62457">
<summary>
Relabel packets to pop_client the packet type.
</summary>
@@ -48988,7 +48805,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pop_server_packets" lineno="62354">
+<interface name="corenet_send_pop_server_packets" lineno="62477">
<summary>
Send pop_server packets.
</summary>
@@ -48999,7 +48816,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62373">
+<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62496">
<summary>
Do not audit attempts to send pop_server packets.
</summary>
@@ -49010,7 +48827,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pop_server_packets" lineno="62392">
+<interface name="corenet_receive_pop_server_packets" lineno="62515">
<summary>
Receive pop_server packets.
</summary>
@@ -49021,7 +48838,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62411">
+<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62534">
<summary>
Do not audit attempts to receive pop_server packets.
</summary>
@@ -49032,7 +48849,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pop_server_packets" lineno="62430">
+<interface name="corenet_sendrecv_pop_server_packets" lineno="62553">
<summary>
Send and receive pop_server packets.
</summary>
@@ -49043,7 +48860,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="62446">
+<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="62569">
<summary>
Do not audit attempts to send and receive pop_server packets.
</summary>
@@ -49054,7 +48871,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pop_server_packets" lineno="62461">
+<interface name="corenet_relabelto_pop_server_packets" lineno="62584">
<summary>
Relabel packets to pop_server the packet type.
</summary>
@@ -49064,7 +48881,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_portmap_port" lineno="62483">
+<interface name="corenet_tcp_sendrecv_portmap_port" lineno="62606">
<summary>
Send and receive TCP traffic on the portmap port.
</summary>
@@ -49075,7 +48892,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_portmap_port" lineno="62498">
+<interface name="corenet_udp_send_portmap_port" lineno="62621">
<summary>
Send UDP traffic on the portmap port.
</summary>
@@ -49086,7 +48903,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="62513">
+<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="62636">
<summary>
Do not audit attempts to send UDP traffic on the portmap port.
</summary>
@@ -49097,7 +48914,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_portmap_port" lineno="62528">
+<interface name="corenet_udp_receive_portmap_port" lineno="62651">
<summary>
Receive UDP traffic on the portmap port.
</summary>
@@ -49108,7 +48925,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="62543">
+<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="62666">
<summary>
Do not audit attempts to receive UDP traffic on the portmap port.
</summary>
@@ -49119,7 +48936,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_portmap_port" lineno="62558">
+<interface name="corenet_udp_sendrecv_portmap_port" lineno="62681">
<summary>
Send and receive UDP traffic on the portmap port.
</summary>
@@ -49130,7 +48947,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="62574">
+<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="62697">
<summary>
Do not audit attempts to send and receive
UDP traffic on the portmap port.
@@ -49142,7 +48959,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_portmap_port" lineno="62589">
+<interface name="corenet_tcp_bind_portmap_port" lineno="62712">
<summary>
Bind TCP sockets to the portmap port.
</summary>
@@ -49153,7 +48970,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_portmap_port" lineno="62609">
+<interface name="corenet_udp_bind_portmap_port" lineno="62732">
<summary>
Bind UDP sockets to the portmap port.
</summary>
@@ -49164,7 +48981,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_portmap_port" lineno="62628">
+<interface name="corenet_tcp_connect_portmap_port" lineno="62751">
<summary>
Make a TCP connection to the portmap port.
</summary>
@@ -49174,7 +48991,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_portmap_client_packets" lineno="62648">
+<interface name="corenet_send_portmap_client_packets" lineno="62771">
<summary>
Send portmap_client packets.
</summary>
@@ -49185,7 +49002,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="62667">
+<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="62790">
<summary>
Do not audit attempts to send portmap_client packets.
</summary>
@@ -49196,7 +49013,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_portmap_client_packets" lineno="62686">
+<interface name="corenet_receive_portmap_client_packets" lineno="62809">
<summary>
Receive portmap_client packets.
</summary>
@@ -49207,7 +49024,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="62705">
+<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="62828">
<summary>
Do not audit attempts to receive portmap_client packets.
</summary>
@@ -49218,7 +49035,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_portmap_client_packets" lineno="62724">
+<interface name="corenet_sendrecv_portmap_client_packets" lineno="62847">
<summary>
Send and receive portmap_client packets.
</summary>
@@ -49229,7 +49046,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="62740">
+<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="62863">
<summary>
Do not audit attempts to send and receive portmap_client packets.
</summary>
@@ -49240,7 +49057,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_portmap_client_packets" lineno="62755">
+<interface name="corenet_relabelto_portmap_client_packets" lineno="62878">
<summary>
Relabel packets to portmap_client the packet type.
</summary>
@@ -49250,7 +49067,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_portmap_server_packets" lineno="62775">
+<interface name="corenet_send_portmap_server_packets" lineno="62898">
<summary>
Send portmap_server packets.
</summary>
@@ -49261,7 +49078,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="62794">
+<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="62917">
<summary>
Do not audit attempts to send portmap_server packets.
</summary>
@@ -49272,7 +49089,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_portmap_server_packets" lineno="62813">
+<interface name="corenet_receive_portmap_server_packets" lineno="62936">
<summary>
Receive portmap_server packets.
</summary>
@@ -49283,7 +49100,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="62832">
+<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="62955">
<summary>
Do not audit attempts to receive portmap_server packets.
</summary>
@@ -49294,7 +49111,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_portmap_server_packets" lineno="62851">
+<interface name="corenet_sendrecv_portmap_server_packets" lineno="62974">
<summary>
Send and receive portmap_server packets.
</summary>
@@ -49305,7 +49122,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="62867">
+<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="62990">
<summary>
Do not audit attempts to send and receive portmap_server packets.
</summary>
@@ -49316,7 +49133,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_portmap_server_packets" lineno="62882">
+<interface name="corenet_relabelto_portmap_server_packets" lineno="63005">
<summary>
Relabel packets to portmap_server the packet type.
</summary>
@@ -49326,7 +49143,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="62904">
+<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63027">
<summary>
Send and receive TCP traffic on the postfix_policyd port.
</summary>
@@ -49337,7 +49154,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_postfix_policyd_port" lineno="62919">
+<interface name="corenet_udp_send_postfix_policyd_port" lineno="63042">
<summary>
Send UDP traffic on the postfix_policyd port.
</summary>
@@ -49348,7 +49165,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="62934">
+<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63057">
<summary>
Do not audit attempts to send UDP traffic on the postfix_policyd port.
</summary>
@@ -49359,7 +49176,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_postfix_policyd_port" lineno="62949">
+<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63072">
<summary>
Receive UDP traffic on the postfix_policyd port.
</summary>
@@ -49370,7 +49187,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="62964">
+<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63087">
<summary>
Do not audit attempts to receive UDP traffic on the postfix_policyd port.
</summary>
@@ -49381,7 +49198,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="62979">
+<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63102">
<summary>
Send and receive UDP traffic on the postfix_policyd port.
</summary>
@@ -49392,7 +49209,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="62995">
+<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63118">
<summary>
Do not audit attempts to send and receive
UDP traffic on the postfix_policyd port.
@@ -49404,7 +49221,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63010">
+<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63133">
<summary>
Bind TCP sockets to the postfix_policyd port.
</summary>
@@ -49415,7 +49232,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63030">
+<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63153">
<summary>
Bind UDP sockets to the postfix_policyd port.
</summary>
@@ -49426,7 +49243,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63049">
+<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63172">
<summary>
Make a TCP connection to the postfix_policyd port.
</summary>
@@ -49436,7 +49253,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postfix_policyd_client_packets" lineno="63069">
+<interface name="corenet_send_postfix_policyd_client_packets" lineno="63192">
<summary>
Send postfix_policyd_client packets.
</summary>
@@ -49447,7 +49264,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63088">
+<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63211">
<summary>
Do not audit attempts to send postfix_policyd_client packets.
</summary>
@@ -49458,7 +49275,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63107">
+<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63230">
<summary>
Receive postfix_policyd_client packets.
</summary>
@@ -49469,7 +49286,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63126">
+<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63249">
<summary>
Do not audit attempts to receive postfix_policyd_client packets.
</summary>
@@ -49480,7 +49297,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63145">
+<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63268">
<summary>
Send and receive postfix_policyd_client packets.
</summary>
@@ -49491,7 +49308,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63161">
+<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63284">
<summary>
Do not audit attempts to send and receive postfix_policyd_client packets.
</summary>
@@ -49502,7 +49319,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63176">
+<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63299">
<summary>
Relabel packets to postfix_policyd_client the packet type.
</summary>
@@ -49512,7 +49329,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postfix_policyd_server_packets" lineno="63196">
+<interface name="corenet_send_postfix_policyd_server_packets" lineno="63319">
<summary>
Send postfix_policyd_server packets.
</summary>
@@ -49523,7 +49340,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63215">
+<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63338">
<summary>
Do not audit attempts to send postfix_policyd_server packets.
</summary>
@@ -49534,7 +49351,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63234">
+<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63357">
<summary>
Receive postfix_policyd_server packets.
</summary>
@@ -49545,7 +49362,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63253">
+<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63376">
<summary>
Do not audit attempts to receive postfix_policyd_server packets.
</summary>
@@ -49556,7 +49373,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63272">
+<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63395">
<summary>
Send and receive postfix_policyd_server packets.
</summary>
@@ -49567,7 +49384,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63288">
+<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63411">
<summary>
Do not audit attempts to send and receive postfix_policyd_server packets.
</summary>
@@ -49578,7 +49395,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63303">
+<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63426">
<summary>
Relabel packets to postfix_policyd_server the packet type.
</summary>
@@ -49588,7 +49405,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63325">
+<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63448">
<summary>
Send and receive TCP traffic on the postgresql port.
</summary>
@@ -49599,7 +49416,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_postgresql_port" lineno="63340">
+<interface name="corenet_udp_send_postgresql_port" lineno="63463">
<summary>
Send UDP traffic on the postgresql port.
</summary>
@@ -49610,7 +49427,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63355">
+<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63478">
<summary>
Do not audit attempts to send UDP traffic on the postgresql port.
</summary>
@@ -49621,7 +49438,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_postgresql_port" lineno="63370">
+<interface name="corenet_udp_receive_postgresql_port" lineno="63493">
<summary>
Receive UDP traffic on the postgresql port.
</summary>
@@ -49632,7 +49449,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63385">
+<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63508">
<summary>
Do not audit attempts to receive UDP traffic on the postgresql port.
</summary>
@@ -49643,7 +49460,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63400">
+<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63523">
<summary>
Send and receive UDP traffic on the postgresql port.
</summary>
@@ -49654,7 +49471,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63416">
+<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63539">
<summary>
Do not audit attempts to send and receive
UDP traffic on the postgresql port.
@@ -49666,7 +49483,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_postgresql_port" lineno="63431">
+<interface name="corenet_tcp_bind_postgresql_port" lineno="63554">
<summary>
Bind TCP sockets to the postgresql port.
</summary>
@@ -49677,7 +49494,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_postgresql_port" lineno="63451">
+<interface name="corenet_udp_bind_postgresql_port" lineno="63574">
<summary>
Bind UDP sockets to the postgresql port.
</summary>
@@ -49688,7 +49505,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_postgresql_port" lineno="63470">
+<interface name="corenet_tcp_connect_postgresql_port" lineno="63593">
<summary>
Make a TCP connection to the postgresql port.
</summary>
@@ -49698,7 +49515,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgresql_client_packets" lineno="63490">
+<interface name="corenet_send_postgresql_client_packets" lineno="63613">
<summary>
Send postgresql_client packets.
</summary>
@@ -49709,7 +49526,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="63509">
+<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="63632">
<summary>
Do not audit attempts to send postgresql_client packets.
</summary>
@@ -49720,7 +49537,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgresql_client_packets" lineno="63528">
+<interface name="corenet_receive_postgresql_client_packets" lineno="63651">
<summary>
Receive postgresql_client packets.
</summary>
@@ -49731,7 +49548,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="63547">
+<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="63670">
<summary>
Do not audit attempts to receive postgresql_client packets.
</summary>
@@ -49742,7 +49559,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgresql_client_packets" lineno="63566">
+<interface name="corenet_sendrecv_postgresql_client_packets" lineno="63689">
<summary>
Send and receive postgresql_client packets.
</summary>
@@ -49753,7 +49570,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="63582">
+<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="63705">
<summary>
Do not audit attempts to send and receive postgresql_client packets.
</summary>
@@ -49764,7 +49581,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgresql_client_packets" lineno="63597">
+<interface name="corenet_relabelto_postgresql_client_packets" lineno="63720">
<summary>
Relabel packets to postgresql_client the packet type.
</summary>
@@ -49774,7 +49591,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgresql_server_packets" lineno="63617">
+<interface name="corenet_send_postgresql_server_packets" lineno="63740">
<summary>
Send postgresql_server packets.
</summary>
@@ -49785,7 +49602,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="63636">
+<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="63759">
<summary>
Do not audit attempts to send postgresql_server packets.
</summary>
@@ -49796,7 +49613,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgresql_server_packets" lineno="63655">
+<interface name="corenet_receive_postgresql_server_packets" lineno="63778">
<summary>
Receive postgresql_server packets.
</summary>
@@ -49807,7 +49624,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="63674">
+<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="63797">
<summary>
Do not audit attempts to receive postgresql_server packets.
</summary>
@@ -49818,7 +49635,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgresql_server_packets" lineno="63693">
+<interface name="corenet_sendrecv_postgresql_server_packets" lineno="63816">
<summary>
Send and receive postgresql_server packets.
</summary>
@@ -49829,7 +49646,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="63709">
+<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="63832">
<summary>
Do not audit attempts to send and receive postgresql_server packets.
</summary>
@@ -49840,7 +49657,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgresql_server_packets" lineno="63724">
+<interface name="corenet_relabelto_postgresql_server_packets" lineno="63847">
<summary>
Relabel packets to postgresql_server the packet type.
</summary>
@@ -49850,7 +49667,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="63746">
+<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="63869">
<summary>
Send and receive TCP traffic on the postgrey port.
</summary>
@@ -49861,7 +49678,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_postgrey_port" lineno="63761">
+<interface name="corenet_udp_send_postgrey_port" lineno="63884">
<summary>
Send UDP traffic on the postgrey port.
</summary>
@@ -49872,7 +49689,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="63776">
+<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="63899">
<summary>
Do not audit attempts to send UDP traffic on the postgrey port.
</summary>
@@ -49883,7 +49700,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_postgrey_port" lineno="63791">
+<interface name="corenet_udp_receive_postgrey_port" lineno="63914">
<summary>
Receive UDP traffic on the postgrey port.
</summary>
@@ -49894,7 +49711,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="63806">
+<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="63929">
<summary>
Do not audit attempts to receive UDP traffic on the postgrey port.
</summary>
@@ -49905,7 +49722,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_postgrey_port" lineno="63821">
+<interface name="corenet_udp_sendrecv_postgrey_port" lineno="63944">
<summary>
Send and receive UDP traffic on the postgrey port.
</summary>
@@ -49916,7 +49733,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="63837">
+<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="63960">
<summary>
Do not audit attempts to send and receive
UDP traffic on the postgrey port.
@@ -49928,7 +49745,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_postgrey_port" lineno="63852">
+<interface name="corenet_tcp_bind_postgrey_port" lineno="63975">
<summary>
Bind TCP sockets to the postgrey port.
</summary>
@@ -49939,7 +49756,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_postgrey_port" lineno="63872">
+<interface name="corenet_udp_bind_postgrey_port" lineno="63995">
<summary>
Bind UDP sockets to the postgrey port.
</summary>
@@ -49950,7 +49767,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_postgrey_port" lineno="63891">
+<interface name="corenet_tcp_connect_postgrey_port" lineno="64014">
<summary>
Make a TCP connection to the postgrey port.
</summary>
@@ -49960,7 +49777,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgrey_client_packets" lineno="63911">
+<interface name="corenet_send_postgrey_client_packets" lineno="64034">
<summary>
Send postgrey_client packets.
</summary>
@@ -49971,7 +49788,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="63930">
+<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64053">
<summary>
Do not audit attempts to send postgrey_client packets.
</summary>
@@ -49982,7 +49799,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgrey_client_packets" lineno="63949">
+<interface name="corenet_receive_postgrey_client_packets" lineno="64072">
<summary>
Receive postgrey_client packets.
</summary>
@@ -49993,7 +49810,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="63968">
+<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64091">
<summary>
Do not audit attempts to receive postgrey_client packets.
</summary>
@@ -50004,7 +49821,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgrey_client_packets" lineno="63987">
+<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64110">
<summary>
Send and receive postgrey_client packets.
</summary>
@@ -50015,7 +49832,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64003">
+<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64126">
<summary>
Do not audit attempts to send and receive postgrey_client packets.
</summary>
@@ -50026,7 +49843,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgrey_client_packets" lineno="64018">
+<interface name="corenet_relabelto_postgrey_client_packets" lineno="64141">
<summary>
Relabel packets to postgrey_client the packet type.
</summary>
@@ -50036,7 +49853,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgrey_server_packets" lineno="64038">
+<interface name="corenet_send_postgrey_server_packets" lineno="64161">
<summary>
Send postgrey_server packets.
</summary>
@@ -50047,7 +49864,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64057">
+<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64180">
<summary>
Do not audit attempts to send postgrey_server packets.
</summary>
@@ -50058,7 +49875,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgrey_server_packets" lineno="64076">
+<interface name="corenet_receive_postgrey_server_packets" lineno="64199">
<summary>
Receive postgrey_server packets.
</summary>
@@ -50069,7 +49886,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64095">
+<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64218">
<summary>
Do not audit attempts to receive postgrey_server packets.
</summary>
@@ -50080,7 +49897,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64114">
+<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64237">
<summary>
Send and receive postgrey_server packets.
</summary>
@@ -50091,7 +49908,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64130">
+<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64253">
<summary>
Do not audit attempts to send and receive postgrey_server packets.
</summary>
@@ -50102,7 +49919,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgrey_server_packets" lineno="64145">
+<interface name="corenet_relabelto_postgrey_server_packets" lineno="64268">
<summary>
Relabel packets to postgrey_server the packet type.
</summary>
@@ -50112,7 +49929,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64167">
+<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64290">
<summary>
Send and receive TCP traffic on the pptp port.
</summary>
@@ -50123,7 +49940,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pptp_port" lineno="64182">
+<interface name="corenet_udp_send_pptp_port" lineno="64305">
<summary>
Send UDP traffic on the pptp port.
</summary>
@@ -50134,7 +49951,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64197">
+<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64320">
<summary>
Do not audit attempts to send UDP traffic on the pptp port.
</summary>
@@ -50145,7 +49962,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pptp_port" lineno="64212">
+<interface name="corenet_udp_receive_pptp_port" lineno="64335">
<summary>
Receive UDP traffic on the pptp port.
</summary>
@@ -50156,7 +49973,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64227">
+<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64350">
<summary>
Do not audit attempts to receive UDP traffic on the pptp port.
</summary>
@@ -50167,7 +49984,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pptp_port" lineno="64242">
+<interface name="corenet_udp_sendrecv_pptp_port" lineno="64365">
<summary>
Send and receive UDP traffic on the pptp port.
</summary>
@@ -50178,7 +49995,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64258">
+<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64381">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pptp port.
@@ -50190,7 +50007,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pptp_port" lineno="64273">
+<interface name="corenet_tcp_bind_pptp_port" lineno="64396">
<summary>
Bind TCP sockets to the pptp port.
</summary>
@@ -50201,7 +50018,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pptp_port" lineno="64293">
+<interface name="corenet_udp_bind_pptp_port" lineno="64416">
<summary>
Bind UDP sockets to the pptp port.
</summary>
@@ -50212,7 +50029,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pptp_port" lineno="64312">
+<interface name="corenet_tcp_connect_pptp_port" lineno="64435">
<summary>
Make a TCP connection to the pptp port.
</summary>
@@ -50222,7 +50039,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pptp_client_packets" lineno="64332">
+<interface name="corenet_send_pptp_client_packets" lineno="64455">
<summary>
Send pptp_client packets.
</summary>
@@ -50233,7 +50050,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64351">
+<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64474">
<summary>
Do not audit attempts to send pptp_client packets.
</summary>
@@ -50244,7 +50061,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pptp_client_packets" lineno="64370">
+<interface name="corenet_receive_pptp_client_packets" lineno="64493">
<summary>
Receive pptp_client packets.
</summary>
@@ -50255,7 +50072,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64389">
+<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64512">
<summary>
Do not audit attempts to receive pptp_client packets.
</summary>
@@ -50266,7 +50083,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pptp_client_packets" lineno="64408">
+<interface name="corenet_sendrecv_pptp_client_packets" lineno="64531">
<summary>
Send and receive pptp_client packets.
</summary>
@@ -50277,7 +50094,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64424">
+<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64547">
<summary>
Do not audit attempts to send and receive pptp_client packets.
</summary>
@@ -50288,7 +50105,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pptp_client_packets" lineno="64439">
+<interface name="corenet_relabelto_pptp_client_packets" lineno="64562">
<summary>
Relabel packets to pptp_client the packet type.
</summary>
@@ -50298,7 +50115,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pptp_server_packets" lineno="64459">
+<interface name="corenet_send_pptp_server_packets" lineno="64582">
<summary>
Send pptp_server packets.
</summary>
@@ -50309,7 +50126,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="64478">
+<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="64601">
<summary>
Do not audit attempts to send pptp_server packets.
</summary>
@@ -50320,7 +50137,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pptp_server_packets" lineno="64497">
+<interface name="corenet_receive_pptp_server_packets" lineno="64620">
<summary>
Receive pptp_server packets.
</summary>
@@ -50331,7 +50148,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="64516">
+<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="64639">
<summary>
Do not audit attempts to receive pptp_server packets.
</summary>
@@ -50342,7 +50159,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pptp_server_packets" lineno="64535">
+<interface name="corenet_sendrecv_pptp_server_packets" lineno="64658">
<summary>
Send and receive pptp_server packets.
</summary>
@@ -50353,7 +50170,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="64551">
+<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="64674">
<summary>
Do not audit attempts to send and receive pptp_server packets.
</summary>
@@ -50364,7 +50181,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pptp_server_packets" lineno="64566">
+<interface name="corenet_relabelto_pptp_server_packets" lineno="64689">
<summary>
Relabel packets to pptp_server the packet type.
</summary>
@@ -50374,7 +50191,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_prelude_port" lineno="64588">
+<interface name="corenet_tcp_sendrecv_prelude_port" lineno="64711">
<summary>
Send and receive TCP traffic on the prelude port.
</summary>
@@ -50385,7 +50202,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_prelude_port" lineno="64603">
+<interface name="corenet_udp_send_prelude_port" lineno="64726">
<summary>
Send UDP traffic on the prelude port.
</summary>
@@ -50396,7 +50213,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="64618">
+<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="64741">
<summary>
Do not audit attempts to send UDP traffic on the prelude port.
</summary>
@@ -50407,7 +50224,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_prelude_port" lineno="64633">
+<interface name="corenet_udp_receive_prelude_port" lineno="64756">
<summary>
Receive UDP traffic on the prelude port.
</summary>
@@ -50418,7 +50235,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="64648">
+<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="64771">
<summary>
Do not audit attempts to receive UDP traffic on the prelude port.
</summary>
@@ -50429,7 +50246,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_prelude_port" lineno="64663">
+<interface name="corenet_udp_sendrecv_prelude_port" lineno="64786">
<summary>
Send and receive UDP traffic on the prelude port.
</summary>
@@ -50440,7 +50257,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="64679">
+<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="64802">
<summary>
Do not audit attempts to send and receive
UDP traffic on the prelude port.
@@ -50452,7 +50269,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_prelude_port" lineno="64694">
+<interface name="corenet_tcp_bind_prelude_port" lineno="64817">
<summary>
Bind TCP sockets to the prelude port.
</summary>
@@ -50463,7 +50280,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_prelude_port" lineno="64714">
+<interface name="corenet_udp_bind_prelude_port" lineno="64837">
<summary>
Bind UDP sockets to the prelude port.
</summary>
@@ -50474,7 +50291,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_prelude_port" lineno="64733">
+<interface name="corenet_tcp_connect_prelude_port" lineno="64856">
<summary>
Make a TCP connection to the prelude port.
</summary>
@@ -50484,7 +50301,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_prelude_client_packets" lineno="64753">
+<interface name="corenet_send_prelude_client_packets" lineno="64876">
<summary>
Send prelude_client packets.
</summary>
@@ -50495,7 +50312,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="64772">
+<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="64895">
<summary>
Do not audit attempts to send prelude_client packets.
</summary>
@@ -50506,7 +50323,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_prelude_client_packets" lineno="64791">
+<interface name="corenet_receive_prelude_client_packets" lineno="64914">
<summary>
Receive prelude_client packets.
</summary>
@@ -50517,7 +50334,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="64810">
+<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="64933">
<summary>
Do not audit attempts to receive prelude_client packets.
</summary>
@@ -50528,7 +50345,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_prelude_client_packets" lineno="64829">
+<interface name="corenet_sendrecv_prelude_client_packets" lineno="64952">
<summary>
Send and receive prelude_client packets.
</summary>
@@ -50539,7 +50356,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="64845">
+<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="64968">
<summary>
Do not audit attempts to send and receive prelude_client packets.
</summary>
@@ -50550,7 +50367,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_prelude_client_packets" lineno="64860">
+<interface name="corenet_relabelto_prelude_client_packets" lineno="64983">
<summary>
Relabel packets to prelude_client the packet type.
</summary>
@@ -50560,7 +50377,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_prelude_server_packets" lineno="64880">
+<interface name="corenet_send_prelude_server_packets" lineno="65003">
<summary>
Send prelude_server packets.
</summary>
@@ -50571,7 +50388,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="64899">
+<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65022">
<summary>
Do not audit attempts to send prelude_server packets.
</summary>
@@ -50582,7 +50399,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_prelude_server_packets" lineno="64918">
+<interface name="corenet_receive_prelude_server_packets" lineno="65041">
<summary>
Receive prelude_server packets.
</summary>
@@ -50593,7 +50410,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="64937">
+<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65060">
<summary>
Do not audit attempts to receive prelude_server packets.
</summary>
@@ -50604,7 +50421,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_prelude_server_packets" lineno="64956">
+<interface name="corenet_sendrecv_prelude_server_packets" lineno="65079">
<summary>
Send and receive prelude_server packets.
</summary>
@@ -50615,7 +50432,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="64972">
+<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65095">
<summary>
Do not audit attempts to send and receive prelude_server packets.
</summary>
@@ -50626,7 +50443,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_prelude_server_packets" lineno="64987">
+<interface name="corenet_relabelto_prelude_server_packets" lineno="65110">
<summary>
Relabel packets to prelude_server the packet type.
</summary>
@@ -50636,7 +50453,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_presence_port" lineno="65009">
+<interface name="corenet_tcp_sendrecv_presence_port" lineno="65132">
<summary>
Send and receive TCP traffic on the presence port.
</summary>
@@ -50647,7 +50464,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_presence_port" lineno="65024">
+<interface name="corenet_udp_send_presence_port" lineno="65147">
<summary>
Send UDP traffic on the presence port.
</summary>
@@ -50658,7 +50475,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65039">
+<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65162">
<summary>
Do not audit attempts to send UDP traffic on the presence port.
</summary>
@@ -50669,7 +50486,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_presence_port" lineno="65054">
+<interface name="corenet_udp_receive_presence_port" lineno="65177">
<summary>
Receive UDP traffic on the presence port.
</summary>
@@ -50680,7 +50497,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65069">
+<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65192">
<summary>
Do not audit attempts to receive UDP traffic on the presence port.
</summary>
@@ -50691,7 +50508,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_presence_port" lineno="65084">
+<interface name="corenet_udp_sendrecv_presence_port" lineno="65207">
<summary>
Send and receive UDP traffic on the presence port.
</summary>
@@ -50702,7 +50519,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65100">
+<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65223">
<summary>
Do not audit attempts to send and receive
UDP traffic on the presence port.
@@ -50714,7 +50531,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_presence_port" lineno="65115">
+<interface name="corenet_tcp_bind_presence_port" lineno="65238">
<summary>
Bind TCP sockets to the presence port.
</summary>
@@ -50725,7 +50542,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_presence_port" lineno="65135">
+<interface name="corenet_udp_bind_presence_port" lineno="65258">
<summary>
Bind UDP sockets to the presence port.
</summary>
@@ -50736,7 +50553,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_presence_port" lineno="65154">
+<interface name="corenet_tcp_connect_presence_port" lineno="65277">
<summary>
Make a TCP connection to the presence port.
</summary>
@@ -50746,7 +50563,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_presence_client_packets" lineno="65174">
+<interface name="corenet_send_presence_client_packets" lineno="65297">
<summary>
Send presence_client packets.
</summary>
@@ -50757,7 +50574,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65193">
+<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65316">
<summary>
Do not audit attempts to send presence_client packets.
</summary>
@@ -50768,7 +50585,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_presence_client_packets" lineno="65212">
+<interface name="corenet_receive_presence_client_packets" lineno="65335">
<summary>
Receive presence_client packets.
</summary>
@@ -50779,7 +50596,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65231">
+<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65354">
<summary>
Do not audit attempts to receive presence_client packets.
</summary>
@@ -50790,7 +50607,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_presence_client_packets" lineno="65250">
+<interface name="corenet_sendrecv_presence_client_packets" lineno="65373">
<summary>
Send and receive presence_client packets.
</summary>
@@ -50801,7 +50618,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65266">
+<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65389">
<summary>
Do not audit attempts to send and receive presence_client packets.
</summary>
@@ -50812,7 +50629,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_presence_client_packets" lineno="65281">
+<interface name="corenet_relabelto_presence_client_packets" lineno="65404">
<summary>
Relabel packets to presence_client the packet type.
</summary>
@@ -50822,7 +50639,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_presence_server_packets" lineno="65301">
+<interface name="corenet_send_presence_server_packets" lineno="65424">
<summary>
Send presence_server packets.
</summary>
@@ -50833,7 +50650,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65320">
+<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65443">
<summary>
Do not audit attempts to send presence_server packets.
</summary>
@@ -50844,7 +50661,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_presence_server_packets" lineno="65339">
+<interface name="corenet_receive_presence_server_packets" lineno="65462">
<summary>
Receive presence_server packets.
</summary>
@@ -50855,7 +50672,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65358">
+<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65481">
<summary>
Do not audit attempts to receive presence_server packets.
</summary>
@@ -50866,7 +50683,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_presence_server_packets" lineno="65377">
+<interface name="corenet_sendrecv_presence_server_packets" lineno="65500">
<summary>
Send and receive presence_server packets.
</summary>
@@ -50877,7 +50694,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65393">
+<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65516">
<summary>
Do not audit attempts to send and receive presence_server packets.
</summary>
@@ -50888,7 +50705,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_presence_server_packets" lineno="65408">
+<interface name="corenet_relabelto_presence_server_packets" lineno="65531">
<summary>
Relabel packets to presence_server the packet type.
</summary>
@@ -50898,7 +50715,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_printer_port" lineno="65430">
+<interface name="corenet_tcp_sendrecv_printer_port" lineno="65553">
<summary>
Send and receive TCP traffic on the printer port.
</summary>
@@ -50909,7 +50726,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_printer_port" lineno="65445">
+<interface name="corenet_udp_send_printer_port" lineno="65568">
<summary>
Send UDP traffic on the printer port.
</summary>
@@ -50920,7 +50737,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_printer_port" lineno="65460">
+<interface name="corenet_dontaudit_udp_send_printer_port" lineno="65583">
<summary>
Do not audit attempts to send UDP traffic on the printer port.
</summary>
@@ -50931,7 +50748,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_printer_port" lineno="65475">
+<interface name="corenet_udp_receive_printer_port" lineno="65598">
<summary>
Receive UDP traffic on the printer port.
</summary>
@@ -50942,7 +50759,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="65490">
+<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="65613">
<summary>
Do not audit attempts to receive UDP traffic on the printer port.
</summary>
@@ -50953,7 +50770,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_printer_port" lineno="65505">
+<interface name="corenet_udp_sendrecv_printer_port" lineno="65628">
<summary>
Send and receive UDP traffic on the printer port.
</summary>
@@ -50964,7 +50781,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="65521">
+<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="65644">
<summary>
Do not audit attempts to send and receive
UDP traffic on the printer port.
@@ -50976,7 +50793,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_printer_port" lineno="65536">
+<interface name="corenet_tcp_bind_printer_port" lineno="65659">
<summary>
Bind TCP sockets to the printer port.
</summary>
@@ -50987,7 +50804,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_printer_port" lineno="65556">
+<interface name="corenet_udp_bind_printer_port" lineno="65679">
<summary>
Bind UDP sockets to the printer port.
</summary>
@@ -50998,7 +50815,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_printer_port" lineno="65575">
+<interface name="corenet_tcp_connect_printer_port" lineno="65698">
<summary>
Make a TCP connection to the printer port.
</summary>
@@ -51008,7 +50825,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_printer_client_packets" lineno="65595">
+<interface name="corenet_send_printer_client_packets" lineno="65718">
<summary>
Send printer_client packets.
</summary>
@@ -51019,7 +50836,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_printer_client_packets" lineno="65614">
+<interface name="corenet_dontaudit_send_printer_client_packets" lineno="65737">
<summary>
Do not audit attempts to send printer_client packets.
</summary>
@@ -51030,7 +50847,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_printer_client_packets" lineno="65633">
+<interface name="corenet_receive_printer_client_packets" lineno="65756">
<summary>
Receive printer_client packets.
</summary>
@@ -51041,7 +50858,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="65652">
+<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="65775">
<summary>
Do not audit attempts to receive printer_client packets.
</summary>
@@ -51052,7 +50869,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_printer_client_packets" lineno="65671">
+<interface name="corenet_sendrecv_printer_client_packets" lineno="65794">
<summary>
Send and receive printer_client packets.
</summary>
@@ -51063,7 +50880,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="65687">
+<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="65810">
<summary>
Do not audit attempts to send and receive printer_client packets.
</summary>
@@ -51074,7 +50891,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_printer_client_packets" lineno="65702">
+<interface name="corenet_relabelto_printer_client_packets" lineno="65825">
<summary>
Relabel packets to printer_client the packet type.
</summary>
@@ -51084,7 +50901,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_printer_server_packets" lineno="65722">
+<interface name="corenet_send_printer_server_packets" lineno="65845">
<summary>
Send printer_server packets.
</summary>
@@ -51095,7 +50912,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_printer_server_packets" lineno="65741">
+<interface name="corenet_dontaudit_send_printer_server_packets" lineno="65864">
<summary>
Do not audit attempts to send printer_server packets.
</summary>
@@ -51106,7 +50923,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_printer_server_packets" lineno="65760">
+<interface name="corenet_receive_printer_server_packets" lineno="65883">
<summary>
Receive printer_server packets.
</summary>
@@ -51117,7 +50934,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="65779">
+<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="65902">
<summary>
Do not audit attempts to receive printer_server packets.
</summary>
@@ -51128,7 +50945,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_printer_server_packets" lineno="65798">
+<interface name="corenet_sendrecv_printer_server_packets" lineno="65921">
<summary>
Send and receive printer_server packets.
</summary>
@@ -51139,7 +50956,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="65814">
+<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="65937">
<summary>
Do not audit attempts to send and receive printer_server packets.
</summary>
@@ -51150,7 +50967,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_printer_server_packets" lineno="65829">
+<interface name="corenet_relabelto_printer_server_packets" lineno="65952">
<summary>
Relabel packets to printer_server the packet type.
</summary>
@@ -51160,7 +50977,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ptal_port" lineno="65851">
+<interface name="corenet_tcp_sendrecv_ptal_port" lineno="65974">
<summary>
Send and receive TCP traffic on the ptal port.
</summary>
@@ -51171,7 +50988,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ptal_port" lineno="65866">
+<interface name="corenet_udp_send_ptal_port" lineno="65989">
<summary>
Send UDP traffic on the ptal port.
</summary>
@@ -51182,7 +50999,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="65881">
+<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66004">
<summary>
Do not audit attempts to send UDP traffic on the ptal port.
</summary>
@@ -51193,7 +51010,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ptal_port" lineno="65896">
+<interface name="corenet_udp_receive_ptal_port" lineno="66019">
<summary>
Receive UDP traffic on the ptal port.
</summary>
@@ -51204,7 +51021,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="65911">
+<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66034">
<summary>
Do not audit attempts to receive UDP traffic on the ptal port.
</summary>
@@ -51215,7 +51032,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ptal_port" lineno="65926">
+<interface name="corenet_udp_sendrecv_ptal_port" lineno="66049">
<summary>
Send and receive UDP traffic on the ptal port.
</summary>
@@ -51226,7 +51043,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="65942">
+<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66065">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ptal port.
@@ -51238,7 +51055,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ptal_port" lineno="65957">
+<interface name="corenet_tcp_bind_ptal_port" lineno="66080">
<summary>
Bind TCP sockets to the ptal port.
</summary>
@@ -51249,7 +51066,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ptal_port" lineno="65977">
+<interface name="corenet_udp_bind_ptal_port" lineno="66100">
<summary>
Bind UDP sockets to the ptal port.
</summary>
@@ -51260,7 +51077,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ptal_port" lineno="65996">
+<interface name="corenet_tcp_connect_ptal_port" lineno="66119">
<summary>
Make a TCP connection to the ptal port.
</summary>
@@ -51270,7 +51087,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ptal_client_packets" lineno="66016">
+<interface name="corenet_send_ptal_client_packets" lineno="66139">
<summary>
Send ptal_client packets.
</summary>
@@ -51281,7 +51098,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66035">
+<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66158">
<summary>
Do not audit attempts to send ptal_client packets.
</summary>
@@ -51292,7 +51109,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ptal_client_packets" lineno="66054">
+<interface name="corenet_receive_ptal_client_packets" lineno="66177">
<summary>
Receive ptal_client packets.
</summary>
@@ -51303,7 +51120,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66073">
+<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66196">
<summary>
Do not audit attempts to receive ptal_client packets.
</summary>
@@ -51314,7 +51131,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ptal_client_packets" lineno="66092">
+<interface name="corenet_sendrecv_ptal_client_packets" lineno="66215">
<summary>
Send and receive ptal_client packets.
</summary>
@@ -51325,7 +51142,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66108">
+<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66231">
<summary>
Do not audit attempts to send and receive ptal_client packets.
</summary>
@@ -51336,7 +51153,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ptal_client_packets" lineno="66123">
+<interface name="corenet_relabelto_ptal_client_packets" lineno="66246">
<summary>
Relabel packets to ptal_client the packet type.
</summary>
@@ -51346,7 +51163,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ptal_server_packets" lineno="66143">
+<interface name="corenet_send_ptal_server_packets" lineno="66266">
<summary>
Send ptal_server packets.
</summary>
@@ -51357,7 +51174,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66162">
+<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66285">
<summary>
Do not audit attempts to send ptal_server packets.
</summary>
@@ -51368,7 +51185,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ptal_server_packets" lineno="66181">
+<interface name="corenet_receive_ptal_server_packets" lineno="66304">
<summary>
Receive ptal_server packets.
</summary>
@@ -51379,7 +51196,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66200">
+<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66323">
<summary>
Do not audit attempts to receive ptal_server packets.
</summary>
@@ -51390,7 +51207,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ptal_server_packets" lineno="66219">
+<interface name="corenet_sendrecv_ptal_server_packets" lineno="66342">
<summary>
Send and receive ptal_server packets.
</summary>
@@ -51401,7 +51218,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66235">
+<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66358">
<summary>
Do not audit attempts to send and receive ptal_server packets.
</summary>
@@ -51412,7 +51229,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ptal_server_packets" lineno="66250">
+<interface name="corenet_relabelto_ptal_server_packets" lineno="66373">
<summary>
Relabel packets to ptal_server the packet type.
</summary>
@@ -51422,7 +51239,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66272">
+<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66395">
<summary>
Send and receive TCP traffic on the pulseaudio port.
</summary>
@@ -51433,7 +51250,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pulseaudio_port" lineno="66287">
+<interface name="corenet_udp_send_pulseaudio_port" lineno="66410">
<summary>
Send UDP traffic on the pulseaudio port.
</summary>
@@ -51444,7 +51261,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66302">
+<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66425">
<summary>
Do not audit attempts to send UDP traffic on the pulseaudio port.
</summary>
@@ -51455,7 +51272,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pulseaudio_port" lineno="66317">
+<interface name="corenet_udp_receive_pulseaudio_port" lineno="66440">
<summary>
Receive UDP traffic on the pulseaudio port.
</summary>
@@ -51466,7 +51283,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66332">
+<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66455">
<summary>
Do not audit attempts to receive UDP traffic on the pulseaudio port.
</summary>
@@ -51477,7 +51294,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66347">
+<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66470">
<summary>
Send and receive UDP traffic on the pulseaudio port.
</summary>
@@ -51488,7 +51305,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66363">
+<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66486">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pulseaudio port.
@@ -51500,7 +51317,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66378">
+<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66501">
<summary>
Bind TCP sockets to the pulseaudio port.
</summary>
@@ -51511,7 +51328,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pulseaudio_port" lineno="66398">
+<interface name="corenet_udp_bind_pulseaudio_port" lineno="66521">
<summary>
Bind UDP sockets to the pulseaudio port.
</summary>
@@ -51522,7 +51339,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66417">
+<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66540">
<summary>
Make a TCP connection to the pulseaudio port.
</summary>
@@ -51532,7 +51349,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pulseaudio_client_packets" lineno="66437">
+<interface name="corenet_send_pulseaudio_client_packets" lineno="66560">
<summary>
Send pulseaudio_client packets.
</summary>
@@ -51543,7 +51360,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="66456">
+<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="66579">
<summary>
Do not audit attempts to send pulseaudio_client packets.
</summary>
@@ -51554,7 +51371,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pulseaudio_client_packets" lineno="66475">
+<interface name="corenet_receive_pulseaudio_client_packets" lineno="66598">
<summary>
Receive pulseaudio_client packets.
</summary>
@@ -51565,7 +51382,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="66494">
+<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="66617">
<summary>
Do not audit attempts to receive pulseaudio_client packets.
</summary>
@@ -51576,7 +51393,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="66513">
+<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="66636">
<summary>
Send and receive pulseaudio_client packets.
</summary>
@@ -51587,7 +51404,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="66529">
+<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="66652">
<summary>
Do not audit attempts to send and receive pulseaudio_client packets.
</summary>
@@ -51598,7 +51415,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="66544">
+<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="66667">
<summary>
Relabel packets to pulseaudio_client the packet type.
</summary>
@@ -51608,7 +51425,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pulseaudio_server_packets" lineno="66564">
+<interface name="corenet_send_pulseaudio_server_packets" lineno="66687">
<summary>
Send pulseaudio_server packets.
</summary>
@@ -51619,7 +51436,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="66583">
+<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="66706">
<summary>
Do not audit attempts to send pulseaudio_server packets.
</summary>
@@ -51630,7 +51447,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pulseaudio_server_packets" lineno="66602">
+<interface name="corenet_receive_pulseaudio_server_packets" lineno="66725">
<summary>
Receive pulseaudio_server packets.
</summary>
@@ -51641,7 +51458,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="66621">
+<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="66744">
<summary>
Do not audit attempts to receive pulseaudio_server packets.
</summary>
@@ -51652,7 +51469,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="66640">
+<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="66763">
<summary>
Send and receive pulseaudio_server packets.
</summary>
@@ -51663,7 +51480,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="66656">
+<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="66779">
<summary>
Do not audit attempts to send and receive pulseaudio_server packets.
</summary>
@@ -51674,7 +51491,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="66671">
+<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="66794">
<summary>
Relabel packets to pulseaudio_server the packet type.
</summary>
@@ -51684,7 +51501,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_puppet_port" lineno="66693">
+<interface name="corenet_tcp_sendrecv_puppet_port" lineno="66816">
<summary>
Send and receive TCP traffic on the puppet port.
</summary>
@@ -51695,7 +51512,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_puppet_port" lineno="66708">
+<interface name="corenet_udp_send_puppet_port" lineno="66831">
<summary>
Send UDP traffic on the puppet port.
</summary>
@@ -51706,7 +51523,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="66723">
+<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="66846">
<summary>
Do not audit attempts to send UDP traffic on the puppet port.
</summary>
@@ -51717,7 +51534,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_puppet_port" lineno="66738">
+<interface name="corenet_udp_receive_puppet_port" lineno="66861">
<summary>
Receive UDP traffic on the puppet port.
</summary>
@@ -51728,7 +51545,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="66753">
+<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="66876">
<summary>
Do not audit attempts to receive UDP traffic on the puppet port.
</summary>
@@ -51739,7 +51556,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_puppet_port" lineno="66768">
+<interface name="corenet_udp_sendrecv_puppet_port" lineno="66891">
<summary>
Send and receive UDP traffic on the puppet port.
</summary>
@@ -51750,7 +51567,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="66784">
+<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="66907">
<summary>
Do not audit attempts to send and receive
UDP traffic on the puppet port.
@@ -51762,7 +51579,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_puppet_port" lineno="66799">
+<interface name="corenet_tcp_bind_puppet_port" lineno="66922">
<summary>
Bind TCP sockets to the puppet port.
</summary>
@@ -51773,7 +51590,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_puppet_port" lineno="66819">
+<interface name="corenet_udp_bind_puppet_port" lineno="66942">
<summary>
Bind UDP sockets to the puppet port.
</summary>
@@ -51784,7 +51601,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_puppet_port" lineno="66838">
+<interface name="corenet_tcp_connect_puppet_port" lineno="66961">
<summary>
Make a TCP connection to the puppet port.
</summary>
@@ -51794,7 +51611,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppet_client_packets" lineno="66858">
+<interface name="corenet_send_puppet_client_packets" lineno="66981">
<summary>
Send puppet_client packets.
</summary>
@@ -51805,7 +51622,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="66877">
+<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67000">
<summary>
Do not audit attempts to send puppet_client packets.
</summary>
@@ -51816,7 +51633,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppet_client_packets" lineno="66896">
+<interface name="corenet_receive_puppet_client_packets" lineno="67019">
<summary>
Receive puppet_client packets.
</summary>
@@ -51827,7 +51644,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="66915">
+<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67038">
<summary>
Do not audit attempts to receive puppet_client packets.
</summary>
@@ -51838,7 +51655,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppet_client_packets" lineno="66934">
+<interface name="corenet_sendrecv_puppet_client_packets" lineno="67057">
<summary>
Send and receive puppet_client packets.
</summary>
@@ -51849,7 +51666,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="66950">
+<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67073">
<summary>
Do not audit attempts to send and receive puppet_client packets.
</summary>
@@ -51860,7 +51677,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppet_client_packets" lineno="66965">
+<interface name="corenet_relabelto_puppet_client_packets" lineno="67088">
<summary>
Relabel packets to puppet_client the packet type.
</summary>
@@ -51870,7 +51687,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppet_server_packets" lineno="66985">
+<interface name="corenet_send_puppet_server_packets" lineno="67108">
<summary>
Send puppet_server packets.
</summary>
@@ -51881,7 +51698,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67004">
+<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67127">
<summary>
Do not audit attempts to send puppet_server packets.
</summary>
@@ -51892,7 +51709,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppet_server_packets" lineno="67023">
+<interface name="corenet_receive_puppet_server_packets" lineno="67146">
<summary>
Receive puppet_server packets.
</summary>
@@ -51903,7 +51720,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67042">
+<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67165">
<summary>
Do not audit attempts to receive puppet_server packets.
</summary>
@@ -51914,7 +51731,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppet_server_packets" lineno="67061">
+<interface name="corenet_sendrecv_puppet_server_packets" lineno="67184">
<summary>
Send and receive puppet_server packets.
</summary>
@@ -51925,7 +51742,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67077">
+<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67200">
<summary>
Do not audit attempts to send and receive puppet_server packets.
</summary>
@@ -51936,7 +51753,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppet_server_packets" lineno="67092">
+<interface name="corenet_relabelto_puppet_server_packets" lineno="67215">
<summary>
Relabel packets to puppet_server the packet type.
</summary>
@@ -51946,7 +51763,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67114">
+<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67237">
<summary>
Send and receive TCP traffic on the puppetclient port.
</summary>
@@ -51957,7 +51774,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_puppetclient_port" lineno="67129">
+<interface name="corenet_udp_send_puppetclient_port" lineno="67252">
<summary>
Send UDP traffic on the puppetclient port.
</summary>
@@ -51968,7 +51785,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67144">
+<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67267">
<summary>
Do not audit attempts to send UDP traffic on the puppetclient port.
</summary>
@@ -51979,7 +51796,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_puppetclient_port" lineno="67159">
+<interface name="corenet_udp_receive_puppetclient_port" lineno="67282">
<summary>
Receive UDP traffic on the puppetclient port.
</summary>
@@ -51990,7 +51807,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67174">
+<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67297">
<summary>
Do not audit attempts to receive UDP traffic on the puppetclient port.
</summary>
@@ -52001,7 +51818,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67189">
+<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67312">
<summary>
Send and receive UDP traffic on the puppetclient port.
</summary>
@@ -52012,7 +51829,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67205">
+<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67328">
<summary>
Do not audit attempts to send and receive
UDP traffic on the puppetclient port.
@@ -52024,7 +51841,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_puppetclient_port" lineno="67220">
+<interface name="corenet_tcp_bind_puppetclient_port" lineno="67343">
<summary>
Bind TCP sockets to the puppetclient port.
</summary>
@@ -52035,7 +51852,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_puppetclient_port" lineno="67240">
+<interface name="corenet_udp_bind_puppetclient_port" lineno="67363">
<summary>
Bind UDP sockets to the puppetclient port.
</summary>
@@ -52046,7 +51863,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_puppetclient_port" lineno="67259">
+<interface name="corenet_tcp_connect_puppetclient_port" lineno="67382">
<summary>
Make a TCP connection to the puppetclient port.
</summary>
@@ -52056,7 +51873,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppetclient_client_packets" lineno="67279">
+<interface name="corenet_send_puppetclient_client_packets" lineno="67402">
<summary>
Send puppetclient_client packets.
</summary>
@@ -52067,7 +51884,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67298">
+<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67421">
<summary>
Do not audit attempts to send puppetclient_client packets.
</summary>
@@ -52078,7 +51895,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppetclient_client_packets" lineno="67317">
+<interface name="corenet_receive_puppetclient_client_packets" lineno="67440">
<summary>
Receive puppetclient_client packets.
</summary>
@@ -52089,7 +51906,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67336">
+<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67459">
<summary>
Do not audit attempts to receive puppetclient_client packets.
</summary>
@@ -52100,7 +51917,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67355">
+<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67478">
<summary>
Send and receive puppetclient_client packets.
</summary>
@@ -52111,7 +51928,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67371">
+<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67494">
<summary>
Do not audit attempts to send and receive puppetclient_client packets.
</summary>
@@ -52122,7 +51939,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67386">
+<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67509">
<summary>
Relabel packets to puppetclient_client the packet type.
</summary>
@@ -52132,7 +51949,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppetclient_server_packets" lineno="67406">
+<interface name="corenet_send_puppetclient_server_packets" lineno="67529">
<summary>
Send puppetclient_server packets.
</summary>
@@ -52143,7 +51960,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67425">
+<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67548">
<summary>
Do not audit attempts to send puppetclient_server packets.
</summary>
@@ -52154,7 +51971,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppetclient_server_packets" lineno="67444">
+<interface name="corenet_receive_puppetclient_server_packets" lineno="67567">
<summary>
Receive puppetclient_server packets.
</summary>
@@ -52165,7 +51982,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="67463">
+<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="67586">
<summary>
Do not audit attempts to receive puppetclient_server packets.
</summary>
@@ -52176,7 +51993,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="67482">
+<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="67605">
<summary>
Send and receive puppetclient_server packets.
</summary>
@@ -52187,7 +52004,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="67498">
+<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="67621">
<summary>
Do not audit attempts to send and receive puppetclient_server packets.
</summary>
@@ -52198,7 +52015,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppetclient_server_packets" lineno="67513">
+<interface name="corenet_relabelto_puppetclient_server_packets" lineno="67636">
<summary>
Relabel packets to puppetclient_server the packet type.
</summary>
@@ -52208,7 +52025,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pxe_port" lineno="67535">
+<interface name="corenet_tcp_sendrecv_pxe_port" lineno="67658">
<summary>
Send and receive TCP traffic on the pxe port.
</summary>
@@ -52219,7 +52036,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pxe_port" lineno="67550">
+<interface name="corenet_udp_send_pxe_port" lineno="67673">
<summary>
Send UDP traffic on the pxe port.
</summary>
@@ -52230,7 +52047,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="67565">
+<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="67688">
<summary>
Do not audit attempts to send UDP traffic on the pxe port.
</summary>
@@ -52241,7 +52058,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pxe_port" lineno="67580">
+<interface name="corenet_udp_receive_pxe_port" lineno="67703">
<summary>
Receive UDP traffic on the pxe port.
</summary>
@@ -52252,7 +52069,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="67595">
+<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="67718">
<summary>
Do not audit attempts to receive UDP traffic on the pxe port.
</summary>
@@ -52263,7 +52080,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pxe_port" lineno="67610">
+<interface name="corenet_udp_sendrecv_pxe_port" lineno="67733">
<summary>
Send and receive UDP traffic on the pxe port.
</summary>
@@ -52274,7 +52091,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="67626">
+<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="67749">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pxe port.
@@ -52286,7 +52103,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pxe_port" lineno="67641">
+<interface name="corenet_tcp_bind_pxe_port" lineno="67764">
<summary>
Bind TCP sockets to the pxe port.
</summary>
@@ -52297,7 +52114,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pxe_port" lineno="67661">
+<interface name="corenet_udp_bind_pxe_port" lineno="67784">
<summary>
Bind UDP sockets to the pxe port.
</summary>
@@ -52308,7 +52125,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pxe_port" lineno="67680">
+<interface name="corenet_tcp_connect_pxe_port" lineno="67803">
<summary>
Make a TCP connection to the pxe port.
</summary>
@@ -52318,7 +52135,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pxe_client_packets" lineno="67700">
+<interface name="corenet_send_pxe_client_packets" lineno="67823">
<summary>
Send pxe_client packets.
</summary>
@@ -52329,7 +52146,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="67719">
+<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="67842">
<summary>
Do not audit attempts to send pxe_client packets.
</summary>
@@ -52340,7 +52157,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pxe_client_packets" lineno="67738">
+<interface name="corenet_receive_pxe_client_packets" lineno="67861">
<summary>
Receive pxe_client packets.
</summary>
@@ -52351,7 +52168,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="67757">
+<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="67880">
<summary>
Do not audit attempts to receive pxe_client packets.
</summary>
@@ -52362,7 +52179,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pxe_client_packets" lineno="67776">
+<interface name="corenet_sendrecv_pxe_client_packets" lineno="67899">
<summary>
Send and receive pxe_client packets.
</summary>
@@ -52373,7 +52190,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="67792">
+<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="67915">
<summary>
Do not audit attempts to send and receive pxe_client packets.
</summary>
@@ -52384,7 +52201,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pxe_client_packets" lineno="67807">
+<interface name="corenet_relabelto_pxe_client_packets" lineno="67930">
<summary>
Relabel packets to pxe_client the packet type.
</summary>
@@ -52394,7 +52211,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pxe_server_packets" lineno="67827">
+<interface name="corenet_send_pxe_server_packets" lineno="67950">
<summary>
Send pxe_server packets.
</summary>
@@ -52405,7 +52222,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="67846">
+<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="67969">
<summary>
Do not audit attempts to send pxe_server packets.
</summary>
@@ -52416,7 +52233,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pxe_server_packets" lineno="67865">
+<interface name="corenet_receive_pxe_server_packets" lineno="67988">
<summary>
Receive pxe_server packets.
</summary>
@@ -52427,7 +52244,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="67884">
+<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68007">
<summary>
Do not audit attempts to receive pxe_server packets.
</summary>
@@ -52438,7 +52255,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pxe_server_packets" lineno="67903">
+<interface name="corenet_sendrecv_pxe_server_packets" lineno="68026">
<summary>
Send and receive pxe_server packets.
</summary>
@@ -52449,7 +52266,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="67919">
+<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68042">
<summary>
Do not audit attempts to send and receive pxe_server packets.
</summary>
@@ -52460,7 +52277,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pxe_server_packets" lineno="67934">
+<interface name="corenet_relabelto_pxe_server_packets" lineno="68057">
<summary>
Relabel packets to pxe_server the packet type.
</summary>
@@ -52470,7 +52287,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="67956">
+<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68079">
<summary>
Send and receive TCP traffic on the pyzor port.
</summary>
@@ -52481,7 +52298,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pyzor_port" lineno="67971">
+<interface name="corenet_udp_send_pyzor_port" lineno="68094">
<summary>
Send UDP traffic on the pyzor port.
</summary>
@@ -52492,7 +52309,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="67986">
+<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68109">
<summary>
Do not audit attempts to send UDP traffic on the pyzor port.
</summary>
@@ -52503,7 +52320,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pyzor_port" lineno="68001">
+<interface name="corenet_udp_receive_pyzor_port" lineno="68124">
<summary>
Receive UDP traffic on the pyzor port.
</summary>
@@ -52514,7 +52331,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68016">
+<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68139">
<summary>
Do not audit attempts to receive UDP traffic on the pyzor port.
</summary>
@@ -52525,7 +52342,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68031">
+<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68154">
<summary>
Send and receive UDP traffic on the pyzor port.
</summary>
@@ -52536,7 +52353,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68047">
+<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68170">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pyzor port.
@@ -52548,7 +52365,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pyzor_port" lineno="68062">
+<interface name="corenet_tcp_bind_pyzor_port" lineno="68185">
<summary>
Bind TCP sockets to the pyzor port.
</summary>
@@ -52559,7 +52376,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pyzor_port" lineno="68082">
+<interface name="corenet_udp_bind_pyzor_port" lineno="68205">
<summary>
Bind UDP sockets to the pyzor port.
</summary>
@@ -52570,7 +52387,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pyzor_port" lineno="68101">
+<interface name="corenet_tcp_connect_pyzor_port" lineno="68224">
<summary>
Make a TCP connection to the pyzor port.
</summary>
@@ -52580,7 +52397,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pyzor_client_packets" lineno="68121">
+<interface name="corenet_send_pyzor_client_packets" lineno="68244">
<summary>
Send pyzor_client packets.
</summary>
@@ -52591,7 +52408,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68140">
+<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68263">
<summary>
Do not audit attempts to send pyzor_client packets.
</summary>
@@ -52602,7 +52419,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pyzor_client_packets" lineno="68159">
+<interface name="corenet_receive_pyzor_client_packets" lineno="68282">
<summary>
Receive pyzor_client packets.
</summary>
@@ -52613,7 +52430,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68178">
+<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68301">
<summary>
Do not audit attempts to receive pyzor_client packets.
</summary>
@@ -52624,7 +52441,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68197">
+<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68320">
<summary>
Send and receive pyzor_client packets.
</summary>
@@ -52635,7 +52452,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68213">
+<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68336">
<summary>
Do not audit attempts to send and receive pyzor_client packets.
</summary>
@@ -52646,7 +52463,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pyzor_client_packets" lineno="68228">
+<interface name="corenet_relabelto_pyzor_client_packets" lineno="68351">
<summary>
Relabel packets to pyzor_client the packet type.
</summary>
@@ -52656,7 +52473,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pyzor_server_packets" lineno="68248">
+<interface name="corenet_send_pyzor_server_packets" lineno="68371">
<summary>
Send pyzor_server packets.
</summary>
@@ -52667,7 +52484,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68267">
+<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68390">
<summary>
Do not audit attempts to send pyzor_server packets.
</summary>
@@ -52678,7 +52495,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pyzor_server_packets" lineno="68286">
+<interface name="corenet_receive_pyzor_server_packets" lineno="68409">
<summary>
Receive pyzor_server packets.
</summary>
@@ -52689,7 +52506,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68305">
+<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68428">
<summary>
Do not audit attempts to receive pyzor_server packets.
</summary>
@@ -52700,7 +52517,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68324">
+<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68447">
<summary>
Send and receive pyzor_server packets.
</summary>
@@ -52711,7 +52528,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68340">
+<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68463">
<summary>
Do not audit attempts to send and receive pyzor_server packets.
</summary>
@@ -52722,7 +52539,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pyzor_server_packets" lineno="68355">
+<interface name="corenet_relabelto_pyzor_server_packets" lineno="68478">
<summary>
Relabel packets to pyzor_server the packet type.
</summary>
@@ -52732,7 +52549,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68377">
+<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68500">
<summary>
Send and receive TCP traffic on the radacct port.
</summary>
@@ -52743,7 +52560,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_radacct_port" lineno="68392">
+<interface name="corenet_udp_send_radacct_port" lineno="68515">
<summary>
Send UDP traffic on the radacct port.
</summary>
@@ -52754,7 +52571,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68407">
+<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68530">
<summary>
Do not audit attempts to send UDP traffic on the radacct port.
</summary>
@@ -52765,7 +52582,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_radacct_port" lineno="68422">
+<interface name="corenet_udp_receive_radacct_port" lineno="68545">
<summary>
Receive UDP traffic on the radacct port.
</summary>
@@ -52776,7 +52593,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68437">
+<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68560">
<summary>
Do not audit attempts to receive UDP traffic on the radacct port.
</summary>
@@ -52787,7 +52604,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_radacct_port" lineno="68452">
+<interface name="corenet_udp_sendrecv_radacct_port" lineno="68575">
<summary>
Send and receive UDP traffic on the radacct port.
</summary>
@@ -52798,7 +52615,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="68468">
+<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="68591">
<summary>
Do not audit attempts to send and receive
UDP traffic on the radacct port.
@@ -52810,7 +52627,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_radacct_port" lineno="68483">
+<interface name="corenet_tcp_bind_radacct_port" lineno="68606">
<summary>
Bind TCP sockets to the radacct port.
</summary>
@@ -52821,7 +52638,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_radacct_port" lineno="68503">
+<interface name="corenet_udp_bind_radacct_port" lineno="68626">
<summary>
Bind UDP sockets to the radacct port.
</summary>
@@ -52832,7 +52649,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_radacct_port" lineno="68522">
+<interface name="corenet_tcp_connect_radacct_port" lineno="68645">
<summary>
Make a TCP connection to the radacct port.
</summary>
@@ -52842,7 +52659,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radacct_client_packets" lineno="68542">
+<interface name="corenet_send_radacct_client_packets" lineno="68665">
<summary>
Send radacct_client packets.
</summary>
@@ -52853,7 +52670,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="68561">
+<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="68684">
<summary>
Do not audit attempts to send radacct_client packets.
</summary>
@@ -52864,7 +52681,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radacct_client_packets" lineno="68580">
+<interface name="corenet_receive_radacct_client_packets" lineno="68703">
<summary>
Receive radacct_client packets.
</summary>
@@ -52875,7 +52692,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="68599">
+<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="68722">
<summary>
Do not audit attempts to receive radacct_client packets.
</summary>
@@ -52886,7 +52703,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radacct_client_packets" lineno="68618">
+<interface name="corenet_sendrecv_radacct_client_packets" lineno="68741">
<summary>
Send and receive radacct_client packets.
</summary>
@@ -52897,7 +52714,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="68634">
+<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="68757">
<summary>
Do not audit attempts to send and receive radacct_client packets.
</summary>
@@ -52908,7 +52725,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radacct_client_packets" lineno="68649">
+<interface name="corenet_relabelto_radacct_client_packets" lineno="68772">
<summary>
Relabel packets to radacct_client the packet type.
</summary>
@@ -52918,7 +52735,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radacct_server_packets" lineno="68669">
+<interface name="corenet_send_radacct_server_packets" lineno="68792">
<summary>
Send radacct_server packets.
</summary>
@@ -52929,7 +52746,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="68688">
+<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="68811">
<summary>
Do not audit attempts to send radacct_server packets.
</summary>
@@ -52940,7 +52757,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radacct_server_packets" lineno="68707">
+<interface name="corenet_receive_radacct_server_packets" lineno="68830">
<summary>
Receive radacct_server packets.
</summary>
@@ -52951,7 +52768,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="68726">
+<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="68849">
<summary>
Do not audit attempts to receive radacct_server packets.
</summary>
@@ -52962,7 +52779,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radacct_server_packets" lineno="68745">
+<interface name="corenet_sendrecv_radacct_server_packets" lineno="68868">
<summary>
Send and receive radacct_server packets.
</summary>
@@ -52973,7 +52790,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="68761">
+<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="68884">
<summary>
Do not audit attempts to send and receive radacct_server packets.
</summary>
@@ -52984,7 +52801,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radacct_server_packets" lineno="68776">
+<interface name="corenet_relabelto_radacct_server_packets" lineno="68899">
<summary>
Relabel packets to radacct_server the packet type.
</summary>
@@ -52994,7 +52811,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_radius_port" lineno="68798">
+<interface name="corenet_tcp_sendrecv_radius_port" lineno="68921">
<summary>
Send and receive TCP traffic on the radius port.
</summary>
@@ -53005,7 +52822,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_radius_port" lineno="68813">
+<interface name="corenet_udp_send_radius_port" lineno="68936">
<summary>
Send UDP traffic on the radius port.
</summary>
@@ -53016,7 +52833,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_radius_port" lineno="68828">
+<interface name="corenet_dontaudit_udp_send_radius_port" lineno="68951">
<summary>
Do not audit attempts to send UDP traffic on the radius port.
</summary>
@@ -53027,7 +52844,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_radius_port" lineno="68843">
+<interface name="corenet_udp_receive_radius_port" lineno="68966">
<summary>
Receive UDP traffic on the radius port.
</summary>
@@ -53038,7 +52855,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="68858">
+<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="68981">
<summary>
Do not audit attempts to receive UDP traffic on the radius port.
</summary>
@@ -53049,7 +52866,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_radius_port" lineno="68873">
+<interface name="corenet_udp_sendrecv_radius_port" lineno="68996">
<summary>
Send and receive UDP traffic on the radius port.
</summary>
@@ -53060,7 +52877,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="68889">
+<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69012">
<summary>
Do not audit attempts to send and receive
UDP traffic on the radius port.
@@ -53072,7 +52889,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_radius_port" lineno="68904">
+<interface name="corenet_tcp_bind_radius_port" lineno="69027">
<summary>
Bind TCP sockets to the radius port.
</summary>
@@ -53083,7 +52900,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_radius_port" lineno="68924">
+<interface name="corenet_udp_bind_radius_port" lineno="69047">
<summary>
Bind UDP sockets to the radius port.
</summary>
@@ -53094,7 +52911,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_radius_port" lineno="68943">
+<interface name="corenet_tcp_connect_radius_port" lineno="69066">
<summary>
Make a TCP connection to the radius port.
</summary>
@@ -53104,7 +52921,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radius_client_packets" lineno="68963">
+<interface name="corenet_send_radius_client_packets" lineno="69086">
<summary>
Send radius_client packets.
</summary>
@@ -53115,7 +52932,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radius_client_packets" lineno="68982">
+<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69105">
<summary>
Do not audit attempts to send radius_client packets.
</summary>
@@ -53126,7 +52943,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radius_client_packets" lineno="69001">
+<interface name="corenet_receive_radius_client_packets" lineno="69124">
<summary>
Receive radius_client packets.
</summary>
@@ -53137,7 +52954,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69020">
+<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69143">
<summary>
Do not audit attempts to receive radius_client packets.
</summary>
@@ -53148,7 +52965,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radius_client_packets" lineno="69039">
+<interface name="corenet_sendrecv_radius_client_packets" lineno="69162">
<summary>
Send and receive radius_client packets.
</summary>
@@ -53159,7 +52976,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69055">
+<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69178">
<summary>
Do not audit attempts to send and receive radius_client packets.
</summary>
@@ -53170,7 +52987,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radius_client_packets" lineno="69070">
+<interface name="corenet_relabelto_radius_client_packets" lineno="69193">
<summary>
Relabel packets to radius_client the packet type.
</summary>
@@ -53180,7 +52997,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radius_server_packets" lineno="69090">
+<interface name="corenet_send_radius_server_packets" lineno="69213">
<summary>
Send radius_server packets.
</summary>
@@ -53191,7 +53008,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69109">
+<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69232">
<summary>
Do not audit attempts to send radius_server packets.
</summary>
@@ -53202,7 +53019,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radius_server_packets" lineno="69128">
+<interface name="corenet_receive_radius_server_packets" lineno="69251">
<summary>
Receive radius_server packets.
</summary>
@@ -53213,7 +53030,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69147">
+<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69270">
<summary>
Do not audit attempts to receive radius_server packets.
</summary>
@@ -53224,7 +53041,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radius_server_packets" lineno="69166">
+<interface name="corenet_sendrecv_radius_server_packets" lineno="69289">
<summary>
Send and receive radius_server packets.
</summary>
@@ -53235,7 +53052,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69182">
+<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69305">
<summary>
Do not audit attempts to send and receive radius_server packets.
</summary>
@@ -53246,7 +53063,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radius_server_packets" lineno="69197">
+<interface name="corenet_relabelto_radius_server_packets" lineno="69320">
<summary>
Relabel packets to radius_server the packet type.
</summary>
@@ -53256,7 +53073,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69219">
+<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69342">
<summary>
Send and receive TCP traffic on the radsec port.
</summary>
@@ -53267,7 +53084,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_radsec_port" lineno="69234">
+<interface name="corenet_udp_send_radsec_port" lineno="69357">
<summary>
Send UDP traffic on the radsec port.
</summary>
@@ -53278,7 +53095,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69249">
+<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69372">
<summary>
Do not audit attempts to send UDP traffic on the radsec port.
</summary>
@@ -53289,7 +53106,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_radsec_port" lineno="69264">
+<interface name="corenet_udp_receive_radsec_port" lineno="69387">
<summary>
Receive UDP traffic on the radsec port.
</summary>
@@ -53300,7 +53117,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69279">
+<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69402">
<summary>
Do not audit attempts to receive UDP traffic on the radsec port.
</summary>
@@ -53311,7 +53128,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_radsec_port" lineno="69294">
+<interface name="corenet_udp_sendrecv_radsec_port" lineno="69417">
<summary>
Send and receive UDP traffic on the radsec port.
</summary>
@@ -53322,7 +53139,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69310">
+<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69433">
<summary>
Do not audit attempts to send and receive
UDP traffic on the radsec port.
@@ -53334,7 +53151,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_radsec_port" lineno="69325">
+<interface name="corenet_tcp_bind_radsec_port" lineno="69448">
<summary>
Bind TCP sockets to the radsec port.
</summary>
@@ -53345,7 +53162,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_radsec_port" lineno="69345">
+<interface name="corenet_udp_bind_radsec_port" lineno="69468">
<summary>
Bind UDP sockets to the radsec port.
</summary>
@@ -53356,7 +53173,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_radsec_port" lineno="69364">
+<interface name="corenet_tcp_connect_radsec_port" lineno="69487">
<summary>
Make a TCP connection to the radsec port.
</summary>
@@ -53366,7 +53183,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radsec_client_packets" lineno="69384">
+<interface name="corenet_send_radsec_client_packets" lineno="69507">
<summary>
Send radsec_client packets.
</summary>
@@ -53377,7 +53194,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69403">
+<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69526">
<summary>
Do not audit attempts to send radsec_client packets.
</summary>
@@ -53388,7 +53205,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radsec_client_packets" lineno="69422">
+<interface name="corenet_receive_radsec_client_packets" lineno="69545">
<summary>
Receive radsec_client packets.
</summary>
@@ -53399,7 +53216,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="69441">
+<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="69564">
<summary>
Do not audit attempts to receive radsec_client packets.
</summary>
@@ -53410,7 +53227,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radsec_client_packets" lineno="69460">
+<interface name="corenet_sendrecv_radsec_client_packets" lineno="69583">
<summary>
Send and receive radsec_client packets.
</summary>
@@ -53421,7 +53238,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="69476">
+<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="69599">
<summary>
Do not audit attempts to send and receive radsec_client packets.
</summary>
@@ -53432,7 +53249,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radsec_client_packets" lineno="69491">
+<interface name="corenet_relabelto_radsec_client_packets" lineno="69614">
<summary>
Relabel packets to radsec_client the packet type.
</summary>
@@ -53442,7 +53259,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radsec_server_packets" lineno="69511">
+<interface name="corenet_send_radsec_server_packets" lineno="69634">
<summary>
Send radsec_server packets.
</summary>
@@ -53453,7 +53270,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="69530">
+<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="69653">
<summary>
Do not audit attempts to send radsec_server packets.
</summary>
@@ -53464,7 +53281,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radsec_server_packets" lineno="69549">
+<interface name="corenet_receive_radsec_server_packets" lineno="69672">
<summary>
Receive radsec_server packets.
</summary>
@@ -53475,7 +53292,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="69568">
+<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="69691">
<summary>
Do not audit attempts to receive radsec_server packets.
</summary>
@@ -53486,7 +53303,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radsec_server_packets" lineno="69587">
+<interface name="corenet_sendrecv_radsec_server_packets" lineno="69710">
<summary>
Send and receive radsec_server packets.
</summary>
@@ -53497,7 +53314,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="69603">
+<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="69726">
<summary>
Do not audit attempts to send and receive radsec_server packets.
</summary>
@@ -53508,7 +53325,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radsec_server_packets" lineno="69618">
+<interface name="corenet_relabelto_radsec_server_packets" lineno="69741">
<summary>
Relabel packets to radsec_server the packet type.
</summary>
@@ -53518,7 +53335,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_razor_port" lineno="69640">
+<interface name="corenet_tcp_sendrecv_razor_port" lineno="69763">
<summary>
Send and receive TCP traffic on the razor port.
</summary>
@@ -53529,7 +53346,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_razor_port" lineno="69655">
+<interface name="corenet_udp_send_razor_port" lineno="69778">
<summary>
Send UDP traffic on the razor port.
</summary>
@@ -53540,7 +53357,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_razor_port" lineno="69670">
+<interface name="corenet_dontaudit_udp_send_razor_port" lineno="69793">
<summary>
Do not audit attempts to send UDP traffic on the razor port.
</summary>
@@ -53551,7 +53368,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_razor_port" lineno="69685">
+<interface name="corenet_udp_receive_razor_port" lineno="69808">
<summary>
Receive UDP traffic on the razor port.
</summary>
@@ -53562,7 +53379,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="69700">
+<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="69823">
<summary>
Do not audit attempts to receive UDP traffic on the razor port.
</summary>
@@ -53573,7 +53390,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_razor_port" lineno="69715">
+<interface name="corenet_udp_sendrecv_razor_port" lineno="69838">
<summary>
Send and receive UDP traffic on the razor port.
</summary>
@@ -53584,7 +53401,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="69731">
+<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="69854">
<summary>
Do not audit attempts to send and receive
UDP traffic on the razor port.
@@ -53596,7 +53413,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_razor_port" lineno="69746">
+<interface name="corenet_tcp_bind_razor_port" lineno="69869">
<summary>
Bind TCP sockets to the razor port.
</summary>
@@ -53607,7 +53424,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_razor_port" lineno="69766">
+<interface name="corenet_udp_bind_razor_port" lineno="69889">
<summary>
Bind UDP sockets to the razor port.
</summary>
@@ -53618,7 +53435,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_razor_port" lineno="69785">
+<interface name="corenet_tcp_connect_razor_port" lineno="69908">
<summary>
Make a TCP connection to the razor port.
</summary>
@@ -53628,7 +53445,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_razor_client_packets" lineno="69805">
+<interface name="corenet_send_razor_client_packets" lineno="69928">
<summary>
Send razor_client packets.
</summary>
@@ -53639,7 +53456,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_razor_client_packets" lineno="69824">
+<interface name="corenet_dontaudit_send_razor_client_packets" lineno="69947">
<summary>
Do not audit attempts to send razor_client packets.
</summary>
@@ -53650,7 +53467,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_razor_client_packets" lineno="69843">
+<interface name="corenet_receive_razor_client_packets" lineno="69966">
<summary>
Receive razor_client packets.
</summary>
@@ -53661,7 +53478,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="69862">
+<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="69985">
<summary>
Do not audit attempts to receive razor_client packets.
</summary>
@@ -53672,7 +53489,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_razor_client_packets" lineno="69881">
+<interface name="corenet_sendrecv_razor_client_packets" lineno="70004">
<summary>
Send and receive razor_client packets.
</summary>
@@ -53683,7 +53500,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="69897">
+<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70020">
<summary>
Do not audit attempts to send and receive razor_client packets.
</summary>
@@ -53694,7 +53511,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_razor_client_packets" lineno="69912">
+<interface name="corenet_relabelto_razor_client_packets" lineno="70035">
<summary>
Relabel packets to razor_client the packet type.
</summary>
@@ -53704,7 +53521,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_razor_server_packets" lineno="69932">
+<interface name="corenet_send_razor_server_packets" lineno="70055">
<summary>
Send razor_server packets.
</summary>
@@ -53715,7 +53532,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_razor_server_packets" lineno="69951">
+<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70074">
<summary>
Do not audit attempts to send razor_server packets.
</summary>
@@ -53726,7 +53543,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_razor_server_packets" lineno="69970">
+<interface name="corenet_receive_razor_server_packets" lineno="70093">
<summary>
Receive razor_server packets.
</summary>
@@ -53737,7 +53554,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="69989">
+<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70112">
<summary>
Do not audit attempts to receive razor_server packets.
</summary>
@@ -53748,7 +53565,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_razor_server_packets" lineno="70008">
+<interface name="corenet_sendrecv_razor_server_packets" lineno="70131">
<summary>
Send and receive razor_server packets.
</summary>
@@ -53759,7 +53576,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70024">
+<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70147">
<summary>
Do not audit attempts to send and receive razor_server packets.
</summary>
@@ -53770,7 +53587,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_razor_server_packets" lineno="70039">
+<interface name="corenet_relabelto_razor_server_packets" lineno="70162">
<summary>
Relabel packets to razor_server the packet type.
</summary>
@@ -53780,7 +53597,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_redis_port" lineno="70061">
+<interface name="corenet_tcp_sendrecv_redis_port" lineno="70184">
<summary>
Send and receive TCP traffic on the redis port.
</summary>
@@ -53791,7 +53608,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_redis_port" lineno="70076">
+<interface name="corenet_udp_send_redis_port" lineno="70199">
<summary>
Send UDP traffic on the redis port.
</summary>
@@ -53802,7 +53619,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70091">
+<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70214">
<summary>
Do not audit attempts to send UDP traffic on the redis port.
</summary>
@@ -53813,7 +53630,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_redis_port" lineno="70106">
+<interface name="corenet_udp_receive_redis_port" lineno="70229">
<summary>
Receive UDP traffic on the redis port.
</summary>
@@ -53824,7 +53641,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70121">
+<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70244">
<summary>
Do not audit attempts to receive UDP traffic on the redis port.
</summary>
@@ -53835,7 +53652,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_redis_port" lineno="70136">
+<interface name="corenet_udp_sendrecv_redis_port" lineno="70259">
<summary>
Send and receive UDP traffic on the redis port.
</summary>
@@ -53846,7 +53663,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70152">
+<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70275">
<summary>
Do not audit attempts to send and receive
UDP traffic on the redis port.
@@ -53858,7 +53675,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_redis_port" lineno="70167">
+<interface name="corenet_tcp_bind_redis_port" lineno="70290">
<summary>
Bind TCP sockets to the redis port.
</summary>
@@ -53869,7 +53686,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_redis_port" lineno="70187">
+<interface name="corenet_udp_bind_redis_port" lineno="70310">
<summary>
Bind UDP sockets to the redis port.
</summary>
@@ -53880,7 +53697,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_redis_port" lineno="70206">
+<interface name="corenet_tcp_connect_redis_port" lineno="70329">
<summary>
Make a TCP connection to the redis port.
</summary>
@@ -53890,7 +53707,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_redis_client_packets" lineno="70226">
+<interface name="corenet_send_redis_client_packets" lineno="70349">
<summary>
Send redis_client packets.
</summary>
@@ -53901,7 +53718,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70245">
+<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70368">
<summary>
Do not audit attempts to send redis_client packets.
</summary>
@@ -53912,7 +53729,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_redis_client_packets" lineno="70264">
+<interface name="corenet_receive_redis_client_packets" lineno="70387">
<summary>
Receive redis_client packets.
</summary>
@@ -53923,7 +53740,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70283">
+<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70406">
<summary>
Do not audit attempts to receive redis_client packets.
</summary>
@@ -53934,7 +53751,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_redis_client_packets" lineno="70302">
+<interface name="corenet_sendrecv_redis_client_packets" lineno="70425">
<summary>
Send and receive redis_client packets.
</summary>
@@ -53945,7 +53762,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70318">
+<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70441">
<summary>
Do not audit attempts to send and receive redis_client packets.
</summary>
@@ -53956,7 +53773,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_redis_client_packets" lineno="70333">
+<interface name="corenet_relabelto_redis_client_packets" lineno="70456">
<summary>
Relabel packets to redis_client the packet type.
</summary>
@@ -53966,7 +53783,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_redis_server_packets" lineno="70353">
+<interface name="corenet_send_redis_server_packets" lineno="70476">
<summary>
Send redis_server packets.
</summary>
@@ -53977,7 +53794,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70372">
+<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70495">
<summary>
Do not audit attempts to send redis_server packets.
</summary>
@@ -53988,7 +53805,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_redis_server_packets" lineno="70391">
+<interface name="corenet_receive_redis_server_packets" lineno="70514">
<summary>
Receive redis_server packets.
</summary>
@@ -53999,7 +53816,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70410">
+<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70533">
<summary>
Do not audit attempts to receive redis_server packets.
</summary>
@@ -54010,7 +53827,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_redis_server_packets" lineno="70429">
+<interface name="corenet_sendrecv_redis_server_packets" lineno="70552">
<summary>
Send and receive redis_server packets.
</summary>
@@ -54021,7 +53838,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="70445">
+<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="70568">
<summary>
Do not audit attempts to send and receive redis_server packets.
</summary>
@@ -54032,7 +53849,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_redis_server_packets" lineno="70460">
+<interface name="corenet_relabelto_redis_server_packets" lineno="70583">
<summary>
Relabel packets to redis_server the packet type.
</summary>
@@ -54042,7 +53859,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_repository_port" lineno="70482">
+<interface name="corenet_tcp_sendrecv_repository_port" lineno="70605">
<summary>
Send and receive TCP traffic on the repository port.
</summary>
@@ -54053,7 +53870,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_repository_port" lineno="70497">
+<interface name="corenet_udp_send_repository_port" lineno="70620">
<summary>
Send UDP traffic on the repository port.
</summary>
@@ -54064,7 +53881,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_repository_port" lineno="70512">
+<interface name="corenet_dontaudit_udp_send_repository_port" lineno="70635">
<summary>
Do not audit attempts to send UDP traffic on the repository port.
</summary>
@@ -54075,7 +53892,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_repository_port" lineno="70527">
+<interface name="corenet_udp_receive_repository_port" lineno="70650">
<summary>
Receive UDP traffic on the repository port.
</summary>
@@ -54086,7 +53903,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="70542">
+<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="70665">
<summary>
Do not audit attempts to receive UDP traffic on the repository port.
</summary>
@@ -54097,7 +53914,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_repository_port" lineno="70557">
+<interface name="corenet_udp_sendrecv_repository_port" lineno="70680">
<summary>
Send and receive UDP traffic on the repository port.
</summary>
@@ -54108,7 +53925,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="70573">
+<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="70696">
<summary>
Do not audit attempts to send and receive
UDP traffic on the repository port.
@@ -54120,7 +53937,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_repository_port" lineno="70588">
+<interface name="corenet_tcp_bind_repository_port" lineno="70711">
<summary>
Bind TCP sockets to the repository port.
</summary>
@@ -54131,7 +53948,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_repository_port" lineno="70608">
+<interface name="corenet_udp_bind_repository_port" lineno="70731">
<summary>
Bind UDP sockets to the repository port.
</summary>
@@ -54142,7 +53959,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_repository_port" lineno="70627">
+<interface name="corenet_tcp_connect_repository_port" lineno="70750">
<summary>
Make a TCP connection to the repository port.
</summary>
@@ -54152,7 +53969,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_repository_client_packets" lineno="70647">
+<interface name="corenet_send_repository_client_packets" lineno="70770">
<summary>
Send repository_client packets.
</summary>
@@ -54163,7 +53980,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_repository_client_packets" lineno="70666">
+<interface name="corenet_dontaudit_send_repository_client_packets" lineno="70789">
<summary>
Do not audit attempts to send repository_client packets.
</summary>
@@ -54174,7 +53991,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_repository_client_packets" lineno="70685">
+<interface name="corenet_receive_repository_client_packets" lineno="70808">
<summary>
Receive repository_client packets.
</summary>
@@ -54185,7 +54002,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="70704">
+<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="70827">
<summary>
Do not audit attempts to receive repository_client packets.
</summary>
@@ -54196,7 +54013,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_repository_client_packets" lineno="70723">
+<interface name="corenet_sendrecv_repository_client_packets" lineno="70846">
<summary>
Send and receive repository_client packets.
</summary>
@@ -54207,7 +54024,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="70739">
+<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="70862">
<summary>
Do not audit attempts to send and receive repository_client packets.
</summary>
@@ -54218,7 +54035,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_repository_client_packets" lineno="70754">
+<interface name="corenet_relabelto_repository_client_packets" lineno="70877">
<summary>
Relabel packets to repository_client the packet type.
</summary>
@@ -54228,7 +54045,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_repository_server_packets" lineno="70774">
+<interface name="corenet_send_repository_server_packets" lineno="70897">
<summary>
Send repository_server packets.
</summary>
@@ -54239,7 +54056,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_repository_server_packets" lineno="70793">
+<interface name="corenet_dontaudit_send_repository_server_packets" lineno="70916">
<summary>
Do not audit attempts to send repository_server packets.
</summary>
@@ -54250,7 +54067,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_repository_server_packets" lineno="70812">
+<interface name="corenet_receive_repository_server_packets" lineno="70935">
<summary>
Receive repository_server packets.
</summary>
@@ -54261,7 +54078,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="70831">
+<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="70954">
<summary>
Do not audit attempts to receive repository_server packets.
</summary>
@@ -54272,7 +54089,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_repository_server_packets" lineno="70850">
+<interface name="corenet_sendrecv_repository_server_packets" lineno="70973">
<summary>
Send and receive repository_server packets.
</summary>
@@ -54283,7 +54100,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="70866">
+<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="70989">
<summary>
Do not audit attempts to send and receive repository_server packets.
</summary>
@@ -54294,7 +54111,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_repository_server_packets" lineno="70881">
+<interface name="corenet_relabelto_repository_server_packets" lineno="71004">
<summary>
Relabel packets to repository_server the packet type.
</summary>
@@ -54304,7 +54121,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ricci_port" lineno="70903">
+<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71026">
<summary>
Send and receive TCP traffic on the ricci port.
</summary>
@@ -54315,7 +54132,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ricci_port" lineno="70918">
+<interface name="corenet_udp_send_ricci_port" lineno="71041">
<summary>
Send UDP traffic on the ricci port.
</summary>
@@ -54326,7 +54143,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="70933">
+<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71056">
<summary>
Do not audit attempts to send UDP traffic on the ricci port.
</summary>
@@ -54337,7 +54154,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ricci_port" lineno="70948">
+<interface name="corenet_udp_receive_ricci_port" lineno="71071">
<summary>
Receive UDP traffic on the ricci port.
</summary>
@@ -54348,7 +54165,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="70963">
+<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71086">
<summary>
Do not audit attempts to receive UDP traffic on the ricci port.
</summary>
@@ -54359,7 +54176,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ricci_port" lineno="70978">
+<interface name="corenet_udp_sendrecv_ricci_port" lineno="71101">
<summary>
Send and receive UDP traffic on the ricci port.
</summary>
@@ -54370,7 +54187,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="70994">
+<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71117">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ricci port.
@@ -54382,7 +54199,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ricci_port" lineno="71009">
+<interface name="corenet_tcp_bind_ricci_port" lineno="71132">
<summary>
Bind TCP sockets to the ricci port.
</summary>
@@ -54393,7 +54210,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ricci_port" lineno="71029">
+<interface name="corenet_udp_bind_ricci_port" lineno="71152">
<summary>
Bind UDP sockets to the ricci port.
</summary>
@@ -54404,7 +54221,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ricci_port" lineno="71048">
+<interface name="corenet_tcp_connect_ricci_port" lineno="71171">
<summary>
Make a TCP connection to the ricci port.
</summary>
@@ -54414,7 +54231,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_client_packets" lineno="71068">
+<interface name="corenet_send_ricci_client_packets" lineno="71191">
<summary>
Send ricci_client packets.
</summary>
@@ -54425,7 +54242,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71087">
+<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71210">
<summary>
Do not audit attempts to send ricci_client packets.
</summary>
@@ -54436,7 +54253,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_client_packets" lineno="71106">
+<interface name="corenet_receive_ricci_client_packets" lineno="71229">
<summary>
Receive ricci_client packets.
</summary>
@@ -54447,7 +54264,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71125">
+<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71248">
<summary>
Do not audit attempts to receive ricci_client packets.
</summary>
@@ -54458,7 +54275,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_client_packets" lineno="71144">
+<interface name="corenet_sendrecv_ricci_client_packets" lineno="71267">
<summary>
Send and receive ricci_client packets.
</summary>
@@ -54469,7 +54286,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71160">
+<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71283">
<summary>
Do not audit attempts to send and receive ricci_client packets.
</summary>
@@ -54480,7 +54297,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_client_packets" lineno="71175">
+<interface name="corenet_relabelto_ricci_client_packets" lineno="71298">
<summary>
Relabel packets to ricci_client the packet type.
</summary>
@@ -54490,7 +54307,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_server_packets" lineno="71195">
+<interface name="corenet_send_ricci_server_packets" lineno="71318">
<summary>
Send ricci_server packets.
</summary>
@@ -54501,7 +54318,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71214">
+<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71337">
<summary>
Do not audit attempts to send ricci_server packets.
</summary>
@@ -54512,7 +54329,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_server_packets" lineno="71233">
+<interface name="corenet_receive_ricci_server_packets" lineno="71356">
<summary>
Receive ricci_server packets.
</summary>
@@ -54523,7 +54340,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71252">
+<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71375">
<summary>
Do not audit attempts to receive ricci_server packets.
</summary>
@@ -54534,7 +54351,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_server_packets" lineno="71271">
+<interface name="corenet_sendrecv_ricci_server_packets" lineno="71394">
<summary>
Send and receive ricci_server packets.
</summary>
@@ -54545,7 +54362,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71287">
+<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71410">
<summary>
Do not audit attempts to send and receive ricci_server packets.
</summary>
@@ -54556,7 +54373,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_server_packets" lineno="71302">
+<interface name="corenet_relabelto_ricci_server_packets" lineno="71425">
<summary>
Relabel packets to ricci_server the packet type.
</summary>
@@ -54566,7 +54383,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71324">
+<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71447">
<summary>
Send and receive TCP traffic on the ricci_modcluster port.
</summary>
@@ -54577,7 +54394,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71339">
+<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71462">
<summary>
Send UDP traffic on the ricci_modcluster port.
</summary>
@@ -54588,7 +54405,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71354">
+<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71477">
<summary>
Do not audit attempts to send UDP traffic on the ricci_modcluster port.
</summary>
@@ -54599,7 +54416,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71369">
+<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71492">
<summary>
Receive UDP traffic on the ricci_modcluster port.
</summary>
@@ -54610,7 +54427,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71384">
+<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71507">
<summary>
Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
</summary>
@@ -54621,7 +54438,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71399">
+<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71522">
<summary>
Send and receive UDP traffic on the ricci_modcluster port.
</summary>
@@ -54632,7 +54449,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71415">
+<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71538">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ricci_modcluster port.
@@ -54644,7 +54461,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71430">
+<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71553">
<summary>
Bind TCP sockets to the ricci_modcluster port.
</summary>
@@ -54655,7 +54472,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="71450">
+<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="71573">
<summary>
Bind UDP sockets to the ricci_modcluster port.
</summary>
@@ -54666,7 +54483,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="71469">
+<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="71592">
<summary>
Make a TCP connection to the ricci_modcluster port.
</summary>
@@ -54676,7 +54493,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_modcluster_client_packets" lineno="71489">
+<interface name="corenet_send_ricci_modcluster_client_packets" lineno="71612">
<summary>
Send ricci_modcluster_client packets.
</summary>
@@ -54687,7 +54504,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="71508">
+<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="71631">
<summary>
Do not audit attempts to send ricci_modcluster_client packets.
</summary>
@@ -54698,7 +54515,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="71527">
+<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="71650">
<summary>
Receive ricci_modcluster_client packets.
</summary>
@@ -54709,7 +54526,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="71546">
+<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="71669">
<summary>
Do not audit attempts to receive ricci_modcluster_client packets.
</summary>
@@ -54720,7 +54537,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="71565">
+<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="71688">
<summary>
Send and receive ricci_modcluster_client packets.
</summary>
@@ -54731,7 +54548,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="71581">
+<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="71704">
<summary>
Do not audit attempts to send and receive ricci_modcluster_client packets.
</summary>
@@ -54742,7 +54559,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="71596">
+<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="71719">
<summary>
Relabel packets to ricci_modcluster_client the packet type.
</summary>
@@ -54752,7 +54569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_modcluster_server_packets" lineno="71616">
+<interface name="corenet_send_ricci_modcluster_server_packets" lineno="71739">
<summary>
Send ricci_modcluster_server packets.
</summary>
@@ -54763,7 +54580,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="71635">
+<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="71758">
<summary>
Do not audit attempts to send ricci_modcluster_server packets.
</summary>
@@ -54774,7 +54591,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="71654">
+<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="71777">
<summary>
Receive ricci_modcluster_server packets.
</summary>
@@ -54785,7 +54602,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="71673">
+<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="71796">
<summary>
Do not audit attempts to receive ricci_modcluster_server packets.
</summary>
@@ -54796,7 +54613,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="71692">
+<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="71815">
<summary>
Send and receive ricci_modcluster_server packets.
</summary>
@@ -54807,7 +54624,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="71708">
+<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="71831">
<summary>
Do not audit attempts to send and receive ricci_modcluster_server packets.
</summary>
@@ -54818,7 +54635,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="71723">
+<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="71846">
<summary>
Relabel packets to ricci_modcluster_server the packet type.
</summary>
@@ -54828,7 +54645,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="71745">
+<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="71868">
<summary>
Send and receive TCP traffic on the rlogind port.
</summary>
@@ -54839,7 +54656,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rlogind_port" lineno="71760">
+<interface name="corenet_udp_send_rlogind_port" lineno="71883">
<summary>
Send UDP traffic on the rlogind port.
</summary>
@@ -54850,7 +54667,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="71775">
+<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="71898">
<summary>
Do not audit attempts to send UDP traffic on the rlogind port.
</summary>
@@ -54861,7 +54678,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rlogind_port" lineno="71790">
+<interface name="corenet_udp_receive_rlogind_port" lineno="71913">
<summary>
Receive UDP traffic on the rlogind port.
</summary>
@@ -54872,7 +54689,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="71805">
+<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="71928">
<summary>
Do not audit attempts to receive UDP traffic on the rlogind port.
</summary>
@@ -54883,7 +54700,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rlogind_port" lineno="71820">
+<interface name="corenet_udp_sendrecv_rlogind_port" lineno="71943">
<summary>
Send and receive UDP traffic on the rlogind port.
</summary>
@@ -54894,7 +54711,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="71836">
+<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="71959">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rlogind port.
@@ -54906,7 +54723,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rlogind_port" lineno="71851">
+<interface name="corenet_tcp_bind_rlogind_port" lineno="71974">
<summary>
Bind TCP sockets to the rlogind port.
</summary>
@@ -54917,7 +54734,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rlogind_port" lineno="71871">
+<interface name="corenet_udp_bind_rlogind_port" lineno="71994">
<summary>
Bind UDP sockets to the rlogind port.
</summary>
@@ -54928,7 +54745,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rlogind_port" lineno="71890">
+<interface name="corenet_tcp_connect_rlogind_port" lineno="72013">
<summary>
Make a TCP connection to the rlogind port.
</summary>
@@ -54938,7 +54755,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rlogind_client_packets" lineno="71910">
+<interface name="corenet_send_rlogind_client_packets" lineno="72033">
<summary>
Send rlogind_client packets.
</summary>
@@ -54949,7 +54766,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="71929">
+<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72052">
<summary>
Do not audit attempts to send rlogind_client packets.
</summary>
@@ -54960,7 +54777,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rlogind_client_packets" lineno="71948">
+<interface name="corenet_receive_rlogind_client_packets" lineno="72071">
<summary>
Receive rlogind_client packets.
</summary>
@@ -54971,7 +54788,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="71967">
+<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72090">
<summary>
Do not audit attempts to receive rlogind_client packets.
</summary>
@@ -54982,7 +54799,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rlogind_client_packets" lineno="71986">
+<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72109">
<summary>
Send and receive rlogind_client packets.
</summary>
@@ -54993,7 +54810,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72002">
+<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72125">
<summary>
Do not audit attempts to send and receive rlogind_client packets.
</summary>
@@ -55004,7 +54821,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rlogind_client_packets" lineno="72017">
+<interface name="corenet_relabelto_rlogind_client_packets" lineno="72140">
<summary>
Relabel packets to rlogind_client the packet type.
</summary>
@@ -55014,7 +54831,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rlogind_server_packets" lineno="72037">
+<interface name="corenet_send_rlogind_server_packets" lineno="72160">
<summary>
Send rlogind_server packets.
</summary>
@@ -55025,7 +54842,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72056">
+<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72179">
<summary>
Do not audit attempts to send rlogind_server packets.
</summary>
@@ -55036,7 +54853,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rlogind_server_packets" lineno="72075">
+<interface name="corenet_receive_rlogind_server_packets" lineno="72198">
<summary>
Receive rlogind_server packets.
</summary>
@@ -55047,7 +54864,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72094">
+<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72217">
<summary>
Do not audit attempts to receive rlogind_server packets.
</summary>
@@ -55058,7 +54875,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72113">
+<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72236">
<summary>
Send and receive rlogind_server packets.
</summary>
@@ -55069,7 +54886,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72129">
+<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72252">
<summary>
Do not audit attempts to send and receive rlogind_server packets.
</summary>
@@ -55080,7 +54897,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rlogind_server_packets" lineno="72144">
+<interface name="corenet_relabelto_rlogind_server_packets" lineno="72267">
<summary>
Relabel packets to rlogind_server the packet type.
</summary>
@@ -55090,7 +54907,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72166">
+<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72289">
<summary>
Send and receive TCP traffic on the rndc port.
</summary>
@@ -55101,7 +54918,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rndc_port" lineno="72181">
+<interface name="corenet_udp_send_rndc_port" lineno="72304">
<summary>
Send UDP traffic on the rndc port.
</summary>
@@ -55112,7 +54929,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72196">
+<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72319">
<summary>
Do not audit attempts to send UDP traffic on the rndc port.
</summary>
@@ -55123,7 +54940,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rndc_port" lineno="72211">
+<interface name="corenet_udp_receive_rndc_port" lineno="72334">
<summary>
Receive UDP traffic on the rndc port.
</summary>
@@ -55134,7 +54951,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72226">
+<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72349">
<summary>
Do not audit attempts to receive UDP traffic on the rndc port.
</summary>
@@ -55145,7 +54962,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rndc_port" lineno="72241">
+<interface name="corenet_udp_sendrecv_rndc_port" lineno="72364">
<summary>
Send and receive UDP traffic on the rndc port.
</summary>
@@ -55156,7 +54973,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72257">
+<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72380">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rndc port.
@@ -55168,7 +54985,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rndc_port" lineno="72272">
+<interface name="corenet_tcp_bind_rndc_port" lineno="72395">
<summary>
Bind TCP sockets to the rndc port.
</summary>
@@ -55179,7 +54996,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rndc_port" lineno="72292">
+<interface name="corenet_udp_bind_rndc_port" lineno="72415">
<summary>
Bind UDP sockets to the rndc port.
</summary>
@@ -55190,7 +55007,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rndc_port" lineno="72311">
+<interface name="corenet_tcp_connect_rndc_port" lineno="72434">
<summary>
Make a TCP connection to the rndc port.
</summary>
@@ -55200,7 +55017,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rndc_client_packets" lineno="72331">
+<interface name="corenet_send_rndc_client_packets" lineno="72454">
<summary>
Send rndc_client packets.
</summary>
@@ -55211,7 +55028,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72350">
+<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72473">
<summary>
Do not audit attempts to send rndc_client packets.
</summary>
@@ -55222,7 +55039,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rndc_client_packets" lineno="72369">
+<interface name="corenet_receive_rndc_client_packets" lineno="72492">
<summary>
Receive rndc_client packets.
</summary>
@@ -55233,7 +55050,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72388">
+<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72511">
<summary>
Do not audit attempts to receive rndc_client packets.
</summary>
@@ -55244,7 +55061,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rndc_client_packets" lineno="72407">
+<interface name="corenet_sendrecv_rndc_client_packets" lineno="72530">
<summary>
Send and receive rndc_client packets.
</summary>
@@ -55255,7 +55072,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72423">
+<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72546">
<summary>
Do not audit attempts to send and receive rndc_client packets.
</summary>
@@ -55266,7 +55083,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rndc_client_packets" lineno="72438">
+<interface name="corenet_relabelto_rndc_client_packets" lineno="72561">
<summary>
Relabel packets to rndc_client the packet type.
</summary>
@@ -55276,7 +55093,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rndc_server_packets" lineno="72458">
+<interface name="corenet_send_rndc_server_packets" lineno="72581">
<summary>
Send rndc_server packets.
</summary>
@@ -55287,7 +55104,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="72477">
+<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="72600">
<summary>
Do not audit attempts to send rndc_server packets.
</summary>
@@ -55298,7 +55115,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rndc_server_packets" lineno="72496">
+<interface name="corenet_receive_rndc_server_packets" lineno="72619">
<summary>
Receive rndc_server packets.
</summary>
@@ -55309,7 +55126,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="72515">
+<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="72638">
<summary>
Do not audit attempts to receive rndc_server packets.
</summary>
@@ -55320,7 +55137,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rndc_server_packets" lineno="72534">
+<interface name="corenet_sendrecv_rndc_server_packets" lineno="72657">
<summary>
Send and receive rndc_server packets.
</summary>
@@ -55331,7 +55148,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="72550">
+<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="72673">
<summary>
Do not audit attempts to send and receive rndc_server packets.
</summary>
@@ -55342,7 +55159,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rndc_server_packets" lineno="72565">
+<interface name="corenet_relabelto_rndc_server_packets" lineno="72688">
<summary>
Relabel packets to rndc_server the packet type.
</summary>
@@ -55352,7 +55169,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_router_port" lineno="72587">
+<interface name="corenet_tcp_sendrecv_router_port" lineno="72710">
<summary>
Send and receive TCP traffic on the router port.
</summary>
@@ -55363,7 +55180,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_router_port" lineno="72602">
+<interface name="corenet_udp_send_router_port" lineno="72725">
<summary>
Send UDP traffic on the router port.
</summary>
@@ -55374,7 +55191,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_router_port" lineno="72617">
+<interface name="corenet_dontaudit_udp_send_router_port" lineno="72740">
<summary>
Do not audit attempts to send UDP traffic on the router port.
</summary>
@@ -55385,7 +55202,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_router_port" lineno="72632">
+<interface name="corenet_udp_receive_router_port" lineno="72755">
<summary>
Receive UDP traffic on the router port.
</summary>
@@ -55396,7 +55213,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_router_port" lineno="72647">
+<interface name="corenet_dontaudit_udp_receive_router_port" lineno="72770">
<summary>
Do not audit attempts to receive UDP traffic on the router port.
</summary>
@@ -55407,7 +55224,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_router_port" lineno="72662">
+<interface name="corenet_udp_sendrecv_router_port" lineno="72785">
<summary>
Send and receive UDP traffic on the router port.
</summary>
@@ -55418,7 +55235,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="72678">
+<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="72801">
<summary>
Do not audit attempts to send and receive
UDP traffic on the router port.
@@ -55430,7 +55247,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_router_port" lineno="72693">
+<interface name="corenet_tcp_bind_router_port" lineno="72816">
<summary>
Bind TCP sockets to the router port.
</summary>
@@ -55441,7 +55258,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_router_port" lineno="72713">
+<interface name="corenet_udp_bind_router_port" lineno="72836">
<summary>
Bind UDP sockets to the router port.
</summary>
@@ -55452,7 +55269,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_router_port" lineno="72732">
+<interface name="corenet_tcp_connect_router_port" lineno="72855">
<summary>
Make a TCP connection to the router port.
</summary>
@@ -55462,7 +55279,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_router_client_packets" lineno="72752">
+<interface name="corenet_send_router_client_packets" lineno="72875">
<summary>
Send router_client packets.
</summary>
@@ -55473,7 +55290,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_router_client_packets" lineno="72771">
+<interface name="corenet_dontaudit_send_router_client_packets" lineno="72894">
<summary>
Do not audit attempts to send router_client packets.
</summary>
@@ -55484,7 +55301,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_router_client_packets" lineno="72790">
+<interface name="corenet_receive_router_client_packets" lineno="72913">
<summary>
Receive router_client packets.
</summary>
@@ -55495,7 +55312,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_router_client_packets" lineno="72809">
+<interface name="corenet_dontaudit_receive_router_client_packets" lineno="72932">
<summary>
Do not audit attempts to receive router_client packets.
</summary>
@@ -55506,7 +55323,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_router_client_packets" lineno="72828">
+<interface name="corenet_sendrecv_router_client_packets" lineno="72951">
<summary>
Send and receive router_client packets.
</summary>
@@ -55517,7 +55334,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="72844">
+<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="72967">
<summary>
Do not audit attempts to send and receive router_client packets.
</summary>
@@ -55528,7 +55345,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_router_client_packets" lineno="72859">
+<interface name="corenet_relabelto_router_client_packets" lineno="72982">
<summary>
Relabel packets to router_client the packet type.
</summary>
@@ -55538,7 +55355,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_router_server_packets" lineno="72879">
+<interface name="corenet_send_router_server_packets" lineno="73002">
<summary>
Send router_server packets.
</summary>
@@ -55549,7 +55366,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_router_server_packets" lineno="72898">
+<interface name="corenet_dontaudit_send_router_server_packets" lineno="73021">
<summary>
Do not audit attempts to send router_server packets.
</summary>
@@ -55560,7 +55377,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_router_server_packets" lineno="72917">
+<interface name="corenet_receive_router_server_packets" lineno="73040">
<summary>
Receive router_server packets.
</summary>
@@ -55571,7 +55388,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_router_server_packets" lineno="72936">
+<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73059">
<summary>
Do not audit attempts to receive router_server packets.
</summary>
@@ -55582,7 +55399,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_router_server_packets" lineno="72955">
+<interface name="corenet_sendrecv_router_server_packets" lineno="73078">
<summary>
Send and receive router_server packets.
</summary>
@@ -55593,7 +55410,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="72971">
+<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73094">
<summary>
Do not audit attempts to send and receive router_server packets.
</summary>
@@ -55604,7 +55421,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_router_server_packets" lineno="72986">
+<interface name="corenet_relabelto_router_server_packets" lineno="73109">
<summary>
Relabel packets to router_server the packet type.
</summary>
@@ -55614,7 +55431,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73008">
+<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73131">
<summary>
Send and receive TCP traffic on the rsh port.
</summary>
@@ -55625,7 +55442,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rsh_port" lineno="73023">
+<interface name="corenet_udp_send_rsh_port" lineno="73146">
<summary>
Send UDP traffic on the rsh port.
</summary>
@@ -55636,7 +55453,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73038">
+<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73161">
<summary>
Do not audit attempts to send UDP traffic on the rsh port.
</summary>
@@ -55647,7 +55464,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rsh_port" lineno="73053">
+<interface name="corenet_udp_receive_rsh_port" lineno="73176">
<summary>
Receive UDP traffic on the rsh port.
</summary>
@@ -55658,7 +55475,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73068">
+<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73191">
<summary>
Do not audit attempts to receive UDP traffic on the rsh port.
</summary>
@@ -55669,7 +55486,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rsh_port" lineno="73083">
+<interface name="corenet_udp_sendrecv_rsh_port" lineno="73206">
<summary>
Send and receive UDP traffic on the rsh port.
</summary>
@@ -55680,7 +55497,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73099">
+<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73222">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rsh port.
@@ -55692,7 +55509,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rsh_port" lineno="73114">
+<interface name="corenet_tcp_bind_rsh_port" lineno="73237">
<summary>
Bind TCP sockets to the rsh port.
</summary>
@@ -55703,7 +55520,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rsh_port" lineno="73134">
+<interface name="corenet_udp_bind_rsh_port" lineno="73257">
<summary>
Bind UDP sockets to the rsh port.
</summary>
@@ -55714,7 +55531,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rsh_port" lineno="73153">
+<interface name="corenet_tcp_connect_rsh_port" lineno="73276">
<summary>
Make a TCP connection to the rsh port.
</summary>
@@ -55724,7 +55541,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsh_client_packets" lineno="73173">
+<interface name="corenet_send_rsh_client_packets" lineno="73296">
<summary>
Send rsh_client packets.
</summary>
@@ -55735,7 +55552,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73192">
+<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73315">
<summary>
Do not audit attempts to send rsh_client packets.
</summary>
@@ -55746,7 +55563,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsh_client_packets" lineno="73211">
+<interface name="corenet_receive_rsh_client_packets" lineno="73334">
<summary>
Receive rsh_client packets.
</summary>
@@ -55757,7 +55574,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73230">
+<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73353">
<summary>
Do not audit attempts to receive rsh_client packets.
</summary>
@@ -55768,7 +55585,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsh_client_packets" lineno="73249">
+<interface name="corenet_sendrecv_rsh_client_packets" lineno="73372">
<summary>
Send and receive rsh_client packets.
</summary>
@@ -55779,7 +55596,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73265">
+<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73388">
<summary>
Do not audit attempts to send and receive rsh_client packets.
</summary>
@@ -55790,7 +55607,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsh_client_packets" lineno="73280">
+<interface name="corenet_relabelto_rsh_client_packets" lineno="73403">
<summary>
Relabel packets to rsh_client the packet type.
</summary>
@@ -55800,7 +55617,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsh_server_packets" lineno="73300">
+<interface name="corenet_send_rsh_server_packets" lineno="73423">
<summary>
Send rsh_server packets.
</summary>
@@ -55811,7 +55628,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73319">
+<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73442">
<summary>
Do not audit attempts to send rsh_server packets.
</summary>
@@ -55822,7 +55639,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsh_server_packets" lineno="73338">
+<interface name="corenet_receive_rsh_server_packets" lineno="73461">
<summary>
Receive rsh_server packets.
</summary>
@@ -55833,7 +55650,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73357">
+<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73480">
<summary>
Do not audit attempts to receive rsh_server packets.
</summary>
@@ -55844,7 +55661,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsh_server_packets" lineno="73376">
+<interface name="corenet_sendrecv_rsh_server_packets" lineno="73499">
<summary>
Send and receive rsh_server packets.
</summary>
@@ -55855,7 +55672,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73392">
+<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73515">
<summary>
Do not audit attempts to send and receive rsh_server packets.
</summary>
@@ -55866,7 +55683,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsh_server_packets" lineno="73407">
+<interface name="corenet_relabelto_rsh_server_packets" lineno="73530">
<summary>
Relabel packets to rsh_server the packet type.
</summary>
@@ -55876,7 +55693,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73429">
+<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73552">
<summary>
Send and receive TCP traffic on the rsync port.
</summary>
@@ -55887,7 +55704,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rsync_port" lineno="73444">
+<interface name="corenet_udp_send_rsync_port" lineno="73567">
<summary>
Send UDP traffic on the rsync port.
</summary>
@@ -55898,7 +55715,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="73459">
+<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="73582">
<summary>
Do not audit attempts to send UDP traffic on the rsync port.
</summary>
@@ -55909,7 +55726,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rsync_port" lineno="73474">
+<interface name="corenet_udp_receive_rsync_port" lineno="73597">
<summary>
Receive UDP traffic on the rsync port.
</summary>
@@ -55920,7 +55737,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="73489">
+<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="73612">
<summary>
Do not audit attempts to receive UDP traffic on the rsync port.
</summary>
@@ -55931,7 +55748,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rsync_port" lineno="73504">
+<interface name="corenet_udp_sendrecv_rsync_port" lineno="73627">
<summary>
Send and receive UDP traffic on the rsync port.
</summary>
@@ -55942,7 +55759,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="73520">
+<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="73643">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rsync port.
@@ -55954,7 +55771,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rsync_port" lineno="73535">
+<interface name="corenet_tcp_bind_rsync_port" lineno="73658">
<summary>
Bind TCP sockets to the rsync port.
</summary>
@@ -55965,7 +55782,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rsync_port" lineno="73555">
+<interface name="corenet_udp_bind_rsync_port" lineno="73678">
<summary>
Bind UDP sockets to the rsync port.
</summary>
@@ -55976,7 +55793,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rsync_port" lineno="73574">
+<interface name="corenet_tcp_connect_rsync_port" lineno="73697">
<summary>
Make a TCP connection to the rsync port.
</summary>
@@ -55986,7 +55803,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsync_client_packets" lineno="73594">
+<interface name="corenet_send_rsync_client_packets" lineno="73717">
<summary>
Send rsync_client packets.
</summary>
@@ -55997,7 +55814,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="73613">
+<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="73736">
<summary>
Do not audit attempts to send rsync_client packets.
</summary>
@@ -56008,7 +55825,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsync_client_packets" lineno="73632">
+<interface name="corenet_receive_rsync_client_packets" lineno="73755">
<summary>
Receive rsync_client packets.
</summary>
@@ -56019,7 +55836,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="73651">
+<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="73774">
<summary>
Do not audit attempts to receive rsync_client packets.
</summary>
@@ -56030,7 +55847,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsync_client_packets" lineno="73670">
+<interface name="corenet_sendrecv_rsync_client_packets" lineno="73793">
<summary>
Send and receive rsync_client packets.
</summary>
@@ -56041,7 +55858,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="73686">
+<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="73809">
<summary>
Do not audit attempts to send and receive rsync_client packets.
</summary>
@@ -56052,7 +55869,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsync_client_packets" lineno="73701">
+<interface name="corenet_relabelto_rsync_client_packets" lineno="73824">
<summary>
Relabel packets to rsync_client the packet type.
</summary>
@@ -56062,7 +55879,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsync_server_packets" lineno="73721">
+<interface name="corenet_send_rsync_server_packets" lineno="73844">
<summary>
Send rsync_server packets.
</summary>
@@ -56073,7 +55890,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="73740">
+<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="73863">
<summary>
Do not audit attempts to send rsync_server packets.
</summary>
@@ -56084,7 +55901,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsync_server_packets" lineno="73759">
+<interface name="corenet_receive_rsync_server_packets" lineno="73882">
<summary>
Receive rsync_server packets.
</summary>
@@ -56095,7 +55912,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="73778">
+<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="73901">
<summary>
Do not audit attempts to receive rsync_server packets.
</summary>
@@ -56106,7 +55923,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsync_server_packets" lineno="73797">
+<interface name="corenet_sendrecv_rsync_server_packets" lineno="73920">
<summary>
Send and receive rsync_server packets.
</summary>
@@ -56117,7 +55934,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="73813">
+<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="73936">
<summary>
Do not audit attempts to send and receive rsync_server packets.
</summary>
@@ -56128,7 +55945,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsync_server_packets" lineno="73828">
+<interface name="corenet_relabelto_rsync_server_packets" lineno="73951">
<summary>
Relabel packets to rsync_server the packet type.
</summary>
@@ -56138,7 +55955,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="73850">
+<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="73973">
<summary>
Send and receive TCP traffic on the rtorrent port.
</summary>
@@ -56149,7 +55966,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rtorrent_port" lineno="73865">
+<interface name="corenet_udp_send_rtorrent_port" lineno="73988">
<summary>
Send UDP traffic on the rtorrent port.
</summary>
@@ -56160,7 +55977,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="73880">
+<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74003">
<summary>
Do not audit attempts to send UDP traffic on the rtorrent port.
</summary>
@@ -56171,7 +55988,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rtorrent_port" lineno="73895">
+<interface name="corenet_udp_receive_rtorrent_port" lineno="74018">
<summary>
Receive UDP traffic on the rtorrent port.
</summary>
@@ -56182,7 +55999,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="73910">
+<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74033">
<summary>
Do not audit attempts to receive UDP traffic on the rtorrent port.
</summary>
@@ -56193,7 +56010,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="73925">
+<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74048">
<summary>
Send and receive UDP traffic on the rtorrent port.
</summary>
@@ -56204,7 +56021,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="73941">
+<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74064">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rtorrent port.
@@ -56216,7 +56033,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rtorrent_port" lineno="73956">
+<interface name="corenet_tcp_bind_rtorrent_port" lineno="74079">
<summary>
Bind TCP sockets to the rtorrent port.
</summary>
@@ -56227,7 +56044,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rtorrent_port" lineno="73976">
+<interface name="corenet_udp_bind_rtorrent_port" lineno="74099">
<summary>
Bind UDP sockets to the rtorrent port.
</summary>
@@ -56238,7 +56055,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rtorrent_port" lineno="73995">
+<interface name="corenet_tcp_connect_rtorrent_port" lineno="74118">
<summary>
Make a TCP connection to the rtorrent port.
</summary>
@@ -56248,7 +56065,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtorrent_client_packets" lineno="74015">
+<interface name="corenet_send_rtorrent_client_packets" lineno="74138">
<summary>
Send rtorrent_client packets.
</summary>
@@ -56259,7 +56076,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74034">
+<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74157">
<summary>
Do not audit attempts to send rtorrent_client packets.
</summary>
@@ -56270,7 +56087,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtorrent_client_packets" lineno="74053">
+<interface name="corenet_receive_rtorrent_client_packets" lineno="74176">
<summary>
Receive rtorrent_client packets.
</summary>
@@ -56281,7 +56098,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74072">
+<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74195">
<summary>
Do not audit attempts to receive rtorrent_client packets.
</summary>
@@ -56292,7 +56109,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74091">
+<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74214">
<summary>
Send and receive rtorrent_client packets.
</summary>
@@ -56303,7 +56120,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74107">
+<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74230">
<summary>
Do not audit attempts to send and receive rtorrent_client packets.
</summary>
@@ -56314,7 +56131,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74122">
+<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74245">
<summary>
Relabel packets to rtorrent_client the packet type.
</summary>
@@ -56324,7 +56141,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtorrent_server_packets" lineno="74142">
+<interface name="corenet_send_rtorrent_server_packets" lineno="74265">
<summary>
Send rtorrent_server packets.
</summary>
@@ -56335,7 +56152,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74161">
+<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74284">
<summary>
Do not audit attempts to send rtorrent_server packets.
</summary>
@@ -56346,7 +56163,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtorrent_server_packets" lineno="74180">
+<interface name="corenet_receive_rtorrent_server_packets" lineno="74303">
<summary>
Receive rtorrent_server packets.
</summary>
@@ -56357,7 +56174,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74199">
+<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74322">
<summary>
Do not audit attempts to receive rtorrent_server packets.
</summary>
@@ -56368,7 +56185,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74218">
+<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74341">
<summary>
Send and receive rtorrent_server packets.
</summary>
@@ -56379,7 +56196,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74234">
+<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74357">
<summary>
Do not audit attempts to send and receive rtorrent_server packets.
</summary>
@@ -56390,7 +56207,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74249">
+<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74372">
<summary>
Relabel packets to rtorrent_server the packet type.
</summary>
@@ -56400,7 +56217,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74271">
+<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74394">
<summary>
Send and receive TCP traffic on the rtsp port.
</summary>
@@ -56411,7 +56228,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rtsp_port" lineno="74286">
+<interface name="corenet_udp_send_rtsp_port" lineno="74409">
<summary>
Send UDP traffic on the rtsp port.
</summary>
@@ -56422,7 +56239,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74301">
+<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74424">
<summary>
Do not audit attempts to send UDP traffic on the rtsp port.
</summary>
@@ -56433,7 +56250,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rtsp_port" lineno="74316">
+<interface name="corenet_udp_receive_rtsp_port" lineno="74439">
<summary>
Receive UDP traffic on the rtsp port.
</summary>
@@ -56444,7 +56261,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74331">
+<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74454">
<summary>
Do not audit attempts to receive UDP traffic on the rtsp port.
</summary>
@@ -56455,7 +56272,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74346">
+<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74469">
<summary>
Send and receive UDP traffic on the rtsp port.
</summary>
@@ -56466,7 +56283,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74362">
+<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74485">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rtsp port.
@@ -56478,7 +56295,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rtsp_port" lineno="74377">
+<interface name="corenet_tcp_bind_rtsp_port" lineno="74500">
<summary>
Bind TCP sockets to the rtsp port.
</summary>
@@ -56489,7 +56306,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rtsp_port" lineno="74397">
+<interface name="corenet_udp_bind_rtsp_port" lineno="74520">
<summary>
Bind UDP sockets to the rtsp port.
</summary>
@@ -56500,7 +56317,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rtsp_port" lineno="74416">
+<interface name="corenet_tcp_connect_rtsp_port" lineno="74539">
<summary>
Make a TCP connection to the rtsp port.
</summary>
@@ -56510,7 +56327,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtsp_client_packets" lineno="74436">
+<interface name="corenet_send_rtsp_client_packets" lineno="74559">
<summary>
Send rtsp_client packets.
</summary>
@@ -56521,7 +56338,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="74455">
+<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="74578">
<summary>
Do not audit attempts to send rtsp_client packets.
</summary>
@@ -56532,7 +56349,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtsp_client_packets" lineno="74474">
+<interface name="corenet_receive_rtsp_client_packets" lineno="74597">
<summary>
Receive rtsp_client packets.
</summary>
@@ -56543,7 +56360,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="74493">
+<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="74616">
<summary>
Do not audit attempts to receive rtsp_client packets.
</summary>
@@ -56554,7 +56371,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtsp_client_packets" lineno="74512">
+<interface name="corenet_sendrecv_rtsp_client_packets" lineno="74635">
<summary>
Send and receive rtsp_client packets.
</summary>
@@ -56565,7 +56382,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="74528">
+<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="74651">
<summary>
Do not audit attempts to send and receive rtsp_client packets.
</summary>
@@ -56576,7 +56393,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtsp_client_packets" lineno="74543">
+<interface name="corenet_relabelto_rtsp_client_packets" lineno="74666">
<summary>
Relabel packets to rtsp_client the packet type.
</summary>
@@ -56586,7 +56403,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtsp_server_packets" lineno="74563">
+<interface name="corenet_send_rtsp_server_packets" lineno="74686">
<summary>
Send rtsp_server packets.
</summary>
@@ -56597,7 +56414,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="74582">
+<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="74705">
<summary>
Do not audit attempts to send rtsp_server packets.
</summary>
@@ -56608,7 +56425,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtsp_server_packets" lineno="74601">
+<interface name="corenet_receive_rtsp_server_packets" lineno="74724">
<summary>
Receive rtsp_server packets.
</summary>
@@ -56619,7 +56436,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="74620">
+<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="74743">
<summary>
Do not audit attempts to receive rtsp_server packets.
</summary>
@@ -56630,7 +56447,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtsp_server_packets" lineno="74639">
+<interface name="corenet_sendrecv_rtsp_server_packets" lineno="74762">
<summary>
Send and receive rtsp_server packets.
</summary>
@@ -56641,7 +56458,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="74655">
+<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="74778">
<summary>
Do not audit attempts to send and receive rtsp_server packets.
</summary>
@@ -56652,7 +56469,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtsp_server_packets" lineno="74670">
+<interface name="corenet_relabelto_rtsp_server_packets" lineno="74793">
<summary>
Relabel packets to rtsp_server the packet type.
</summary>
@@ -56662,7 +56479,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rwho_port" lineno="74692">
+<interface name="corenet_tcp_sendrecv_rwho_port" lineno="74815">
<summary>
Send and receive TCP traffic on the rwho port.
</summary>
@@ -56673,7 +56490,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rwho_port" lineno="74707">
+<interface name="corenet_udp_send_rwho_port" lineno="74830">
<summary>
Send UDP traffic on the rwho port.
</summary>
@@ -56684,7 +56501,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="74722">
+<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="74845">
<summary>
Do not audit attempts to send UDP traffic on the rwho port.
</summary>
@@ -56695,7 +56512,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rwho_port" lineno="74737">
+<interface name="corenet_udp_receive_rwho_port" lineno="74860">
<summary>
Receive UDP traffic on the rwho port.
</summary>
@@ -56706,7 +56523,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="74752">
+<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="74875">
<summary>
Do not audit attempts to receive UDP traffic on the rwho port.
</summary>
@@ -56717,7 +56534,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rwho_port" lineno="74767">
+<interface name="corenet_udp_sendrecv_rwho_port" lineno="74890">
<summary>
Send and receive UDP traffic on the rwho port.
</summary>
@@ -56728,7 +56545,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="74783">
+<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="74906">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rwho port.
@@ -56740,7 +56557,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rwho_port" lineno="74798">
+<interface name="corenet_tcp_bind_rwho_port" lineno="74921">
<summary>
Bind TCP sockets to the rwho port.
</summary>
@@ -56751,7 +56568,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rwho_port" lineno="74818">
+<interface name="corenet_udp_bind_rwho_port" lineno="74941">
<summary>
Bind UDP sockets to the rwho port.
</summary>
@@ -56762,7 +56579,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rwho_port" lineno="74837">
+<interface name="corenet_tcp_connect_rwho_port" lineno="74960">
<summary>
Make a TCP connection to the rwho port.
</summary>
@@ -56772,7 +56589,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rwho_client_packets" lineno="74857">
+<interface name="corenet_send_rwho_client_packets" lineno="74980">
<summary>
Send rwho_client packets.
</summary>
@@ -56783,7 +56600,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="74876">
+<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="74999">
<summary>
Do not audit attempts to send rwho_client packets.
</summary>
@@ -56794,7 +56611,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rwho_client_packets" lineno="74895">
+<interface name="corenet_receive_rwho_client_packets" lineno="75018">
<summary>
Receive rwho_client packets.
</summary>
@@ -56805,7 +56622,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="74914">
+<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75037">
<summary>
Do not audit attempts to receive rwho_client packets.
</summary>
@@ -56816,7 +56633,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rwho_client_packets" lineno="74933">
+<interface name="corenet_sendrecv_rwho_client_packets" lineno="75056">
<summary>
Send and receive rwho_client packets.
</summary>
@@ -56827,7 +56644,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="74949">
+<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75072">
<summary>
Do not audit attempts to send and receive rwho_client packets.
</summary>
@@ -56838,7 +56655,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rwho_client_packets" lineno="74964">
+<interface name="corenet_relabelto_rwho_client_packets" lineno="75087">
<summary>
Relabel packets to rwho_client the packet type.
</summary>
@@ -56848,7 +56665,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rwho_server_packets" lineno="74984">
+<interface name="corenet_send_rwho_server_packets" lineno="75107">
<summary>
Send rwho_server packets.
</summary>
@@ -56859,7 +56676,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75003">
+<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75126">
<summary>
Do not audit attempts to send rwho_server packets.
</summary>
@@ -56870,7 +56687,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rwho_server_packets" lineno="75022">
+<interface name="corenet_receive_rwho_server_packets" lineno="75145">
<summary>
Receive rwho_server packets.
</summary>
@@ -56881,7 +56698,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75041">
+<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75164">
<summary>
Do not audit attempts to receive rwho_server packets.
</summary>
@@ -56892,7 +56709,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rwho_server_packets" lineno="75060">
+<interface name="corenet_sendrecv_rwho_server_packets" lineno="75183">
<summary>
Send and receive rwho_server packets.
</summary>
@@ -56903,7 +56720,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75076">
+<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75199">
<summary>
Do not audit attempts to send and receive rwho_server packets.
</summary>
@@ -56914,7 +56731,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rwho_server_packets" lineno="75091">
+<interface name="corenet_relabelto_rwho_server_packets" lineno="75214">
<summary>
Relabel packets to rwho_server the packet type.
</summary>
@@ -56924,7 +56741,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_salt_port" lineno="75113">
+<interface name="corenet_tcp_sendrecv_salt_port" lineno="75236">
<summary>
Send and receive TCP traffic on the salt port.
</summary>
@@ -56935,7 +56752,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_salt_port" lineno="75128">
+<interface name="corenet_udp_send_salt_port" lineno="75251">
<summary>
Send UDP traffic on the salt port.
</summary>
@@ -56946,7 +56763,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75143">
+<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75266">
<summary>
Do not audit attempts to send UDP traffic on the salt port.
</summary>
@@ -56957,7 +56774,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_salt_port" lineno="75158">
+<interface name="corenet_udp_receive_salt_port" lineno="75281">
<summary>
Receive UDP traffic on the salt port.
</summary>
@@ -56968,7 +56785,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75173">
+<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75296">
<summary>
Do not audit attempts to receive UDP traffic on the salt port.
</summary>
@@ -56979,7 +56796,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_salt_port" lineno="75188">
+<interface name="corenet_udp_sendrecv_salt_port" lineno="75311">
<summary>
Send and receive UDP traffic on the salt port.
</summary>
@@ -56990,7 +56807,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75204">
+<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75327">
<summary>
Do not audit attempts to send and receive
UDP traffic on the salt port.
@@ -57002,7 +56819,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_salt_port" lineno="75219">
+<interface name="corenet_tcp_bind_salt_port" lineno="75342">
<summary>
Bind TCP sockets to the salt port.
</summary>
@@ -57013,7 +56830,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_salt_port" lineno="75239">
+<interface name="corenet_udp_bind_salt_port" lineno="75362">
<summary>
Bind UDP sockets to the salt port.
</summary>
@@ -57024,7 +56841,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_salt_port" lineno="75258">
+<interface name="corenet_tcp_connect_salt_port" lineno="75381">
<summary>
Make a TCP connection to the salt port.
</summary>
@@ -57034,7 +56851,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_salt_client_packets" lineno="75278">
+<interface name="corenet_send_salt_client_packets" lineno="75401">
<summary>
Send salt_client packets.
</summary>
@@ -57045,7 +56862,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75297">
+<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75420">
<summary>
Do not audit attempts to send salt_client packets.
</summary>
@@ -57056,7 +56873,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_salt_client_packets" lineno="75316">
+<interface name="corenet_receive_salt_client_packets" lineno="75439">
<summary>
Receive salt_client packets.
</summary>
@@ -57067,7 +56884,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75335">
+<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75458">
<summary>
Do not audit attempts to receive salt_client packets.
</summary>
@@ -57078,7 +56895,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_salt_client_packets" lineno="75354">
+<interface name="corenet_sendrecv_salt_client_packets" lineno="75477">
<summary>
Send and receive salt_client packets.
</summary>
@@ -57089,7 +56906,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75370">
+<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75493">
<summary>
Do not audit attempts to send and receive salt_client packets.
</summary>
@@ -57100,7 +56917,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_salt_client_packets" lineno="75385">
+<interface name="corenet_relabelto_salt_client_packets" lineno="75508">
<summary>
Relabel packets to salt_client the packet type.
</summary>
@@ -57110,7 +56927,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_salt_server_packets" lineno="75405">
+<interface name="corenet_send_salt_server_packets" lineno="75528">
<summary>
Send salt_server packets.
</summary>
@@ -57121,7 +56938,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75424">
+<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75547">
<summary>
Do not audit attempts to send salt_server packets.
</summary>
@@ -57132,7 +56949,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_salt_server_packets" lineno="75443">
+<interface name="corenet_receive_salt_server_packets" lineno="75566">
<summary>
Receive salt_server packets.
</summary>
@@ -57143,7 +56960,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="75462">
+<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="75585">
<summary>
Do not audit attempts to receive salt_server packets.
</summary>
@@ -57154,7 +56971,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_salt_server_packets" lineno="75481">
+<interface name="corenet_sendrecv_salt_server_packets" lineno="75604">
<summary>
Send and receive salt_server packets.
</summary>
@@ -57165,7 +56982,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="75497">
+<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="75620">
<summary>
Do not audit attempts to send and receive salt_server packets.
</summary>
@@ -57176,7 +56993,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_salt_server_packets" lineno="75512">
+<interface name="corenet_relabelto_salt_server_packets" lineno="75635">
<summary>
Relabel packets to salt_server the packet type.
</summary>
@@ -57186,7 +57003,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sap_port" lineno="75534">
+<interface name="corenet_tcp_sendrecv_sap_port" lineno="75657">
<summary>
Send and receive TCP traffic on the sap port.
</summary>
@@ -57197,7 +57014,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_sap_port" lineno="75549">
+<interface name="corenet_udp_send_sap_port" lineno="75672">
<summary>
Send UDP traffic on the sap port.
</summary>
@@ -57208,7 +57025,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_sap_port" lineno="75564">
+<interface name="corenet_dontaudit_udp_send_sap_port" lineno="75687">
<summary>
Do not audit attempts to send UDP traffic on the sap port.
</summary>
@@ -57219,7 +57036,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_sap_port" lineno="75579">
+<interface name="corenet_udp_receive_sap_port" lineno="75702">
<summary>
Receive UDP traffic on the sap port.
</summary>
@@ -57230,7 +57047,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="75594">
+<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="75717">
<summary>
Do not audit attempts to receive UDP traffic on the sap port.
</summary>
@@ -57241,7 +57058,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_sap_port" lineno="75609">
+<interface name="corenet_udp_sendrecv_sap_port" lineno="75732">
<summary>
Send and receive UDP traffic on the sap port.
</summary>
@@ -57252,7 +57069,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="75625">
+<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="75748">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sap port.
@@ -57264,7 +57081,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_sap_port" lineno="75640">
+<interface name="corenet_tcp_bind_sap_port" lineno="75763">
<summary>
Bind TCP sockets to the sap port.
</summary>
@@ -57275,7 +57092,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sap_port" lineno="75660">
+<interface name="corenet_udp_bind_sap_port" lineno="75783">
<summary>
Bind UDP sockets to the sap port.
</summary>
@@ -57286,7 +57103,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sap_port" lineno="75679">
+<interface name="corenet_tcp_connect_sap_port" lineno="75802">
<summary>
Make a TCP connection to the sap port.
</summary>
@@ -57296,7 +57113,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sap_client_packets" lineno="75699">
+<interface name="corenet_send_sap_client_packets" lineno="75822">
<summary>
Send sap_client packets.
</summary>
@@ -57307,7 +57124,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sap_client_packets" lineno="75718">
+<interface name="corenet_dontaudit_send_sap_client_packets" lineno="75841">
<summary>
Do not audit attempts to send sap_client packets.
</summary>
@@ -57318,7 +57135,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sap_client_packets" lineno="75737">
+<interface name="corenet_receive_sap_client_packets" lineno="75860">
<summary>
Receive sap_client packets.
</summary>
@@ -57329,7 +57146,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="75756">
+<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="75879">
<summary>
Do not audit attempts to receive sap_client packets.
</summary>
@@ -57340,7 +57157,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sap_client_packets" lineno="75775">
+<interface name="corenet_sendrecv_sap_client_packets" lineno="75898">
<summary>
Send and receive sap_client packets.
</summary>
@@ -57351,7 +57168,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="75791">
+<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="75914">
<summary>
Do not audit attempts to send and receive sap_client packets.
</summary>
@@ -57362,7 +57179,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sap_client_packets" lineno="75806">
+<interface name="corenet_relabelto_sap_client_packets" lineno="75929">
<summary>
Relabel packets to sap_client the packet type.
</summary>
@@ -57372,7 +57189,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sap_server_packets" lineno="75826">
+<interface name="corenet_send_sap_server_packets" lineno="75949">
<summary>
Send sap_server packets.
</summary>
@@ -57383,7 +57200,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sap_server_packets" lineno="75845">
+<interface name="corenet_dontaudit_send_sap_server_packets" lineno="75968">
<summary>
Do not audit attempts to send sap_server packets.
</summary>
@@ -57394,7 +57211,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sap_server_packets" lineno="75864">
+<interface name="corenet_receive_sap_server_packets" lineno="75987">
<summary>
Receive sap_server packets.
</summary>
@@ -57405,7 +57222,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="75883">
+<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76006">
<summary>
Do not audit attempts to receive sap_server packets.
</summary>
@@ -57416,7 +57233,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sap_server_packets" lineno="75902">
+<interface name="corenet_sendrecv_sap_server_packets" lineno="76025">
<summary>
Send and receive sap_server packets.
</summary>
@@ -57427,7 +57244,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="75918">
+<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76041">
<summary>
Do not audit attempts to send and receive sap_server packets.
</summary>
@@ -57438,7 +57255,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sap_server_packets" lineno="75933">
+<interface name="corenet_relabelto_sap_server_packets" lineno="76056">
<summary>
Relabel packets to sap_server the packet type.
</summary>
@@ -57448,7 +57265,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="75955">
+<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76078">
<summary>
Send and receive TCP traffic on the servistaitsm port.
</summary>
@@ -57459,7 +57276,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_servistaitsm_port" lineno="75970">
+<interface name="corenet_udp_send_servistaitsm_port" lineno="76093">
<summary>
Send UDP traffic on the servistaitsm port.
</summary>
@@ -57470,7 +57287,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="75985">
+<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76108">
<summary>
Do not audit attempts to send UDP traffic on the servistaitsm port.
</summary>
@@ -57481,7 +57298,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_servistaitsm_port" lineno="76000">
+<interface name="corenet_udp_receive_servistaitsm_port" lineno="76123">
<summary>
Receive UDP traffic on the servistaitsm port.
</summary>
@@ -57492,7 +57309,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76015">
+<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76138">
<summary>
Do not audit attempts to receive UDP traffic on the servistaitsm port.
</summary>
@@ -57503,7 +57320,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76030">
+<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76153">
<summary>
Send and receive UDP traffic on the servistaitsm port.
</summary>
@@ -57514,7 +57331,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76046">
+<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76169">
<summary>
Do not audit attempts to send and receive
UDP traffic on the servistaitsm port.
@@ -57526,7 +57343,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76061">
+<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76184">
<summary>
Bind TCP sockets to the servistaitsm port.
</summary>
@@ -57537,7 +57354,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_servistaitsm_port" lineno="76081">
+<interface name="corenet_udp_bind_servistaitsm_port" lineno="76204">
<summary>
Bind UDP sockets to the servistaitsm port.
</summary>
@@ -57548,7 +57365,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76100">
+<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76223">
<summary>
Make a TCP connection to the servistaitsm port.
</summary>
@@ -57558,7 +57375,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_servistaitsm_client_packets" lineno="76120">
+<interface name="corenet_send_servistaitsm_client_packets" lineno="76243">
<summary>
Send servistaitsm_client packets.
</summary>
@@ -57569,7 +57386,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76139">
+<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76262">
<summary>
Do not audit attempts to send servistaitsm_client packets.
</summary>
@@ -57580,7 +57397,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_servistaitsm_client_packets" lineno="76158">
+<interface name="corenet_receive_servistaitsm_client_packets" lineno="76281">
<summary>
Receive servistaitsm_client packets.
</summary>
@@ -57591,7 +57408,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76177">
+<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76300">
<summary>
Do not audit attempts to receive servistaitsm_client packets.
</summary>
@@ -57602,7 +57419,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76196">
+<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76319">
<summary>
Send and receive servistaitsm_client packets.
</summary>
@@ -57613,7 +57430,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76212">
+<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76335">
<summary>
Do not audit attempts to send and receive servistaitsm_client packets.
</summary>
@@ -57624,7 +57441,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76227">
+<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76350">
<summary>
Relabel packets to servistaitsm_client the packet type.
</summary>
@@ -57634,7 +57451,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_servistaitsm_server_packets" lineno="76247">
+<interface name="corenet_send_servistaitsm_server_packets" lineno="76370">
<summary>
Send servistaitsm_server packets.
</summary>
@@ -57645,7 +57462,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76266">
+<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76389">
<summary>
Do not audit attempts to send servistaitsm_server packets.
</summary>
@@ -57656,7 +57473,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_servistaitsm_server_packets" lineno="76285">
+<interface name="corenet_receive_servistaitsm_server_packets" lineno="76408">
<summary>
Receive servistaitsm_server packets.
</summary>
@@ -57667,7 +57484,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76304">
+<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76427">
<summary>
Do not audit attempts to receive servistaitsm_server packets.
</summary>
@@ -57678,7 +57495,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76323">
+<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76446">
<summary>
Send and receive servistaitsm_server packets.
</summary>
@@ -57689,7 +57506,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76339">
+<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76462">
<summary>
Do not audit attempts to send and receive servistaitsm_server packets.
</summary>
@@ -57700,7 +57517,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76354">
+<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76477">
<summary>
Relabel packets to servistaitsm_server the packet type.
</summary>
@@ -57710,7 +57527,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76376">
+<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76499">
<summary>
Send and receive TCP traffic on the sieve port.
</summary>
@@ -57721,7 +57538,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_sieve_port" lineno="76391">
+<interface name="corenet_udp_send_sieve_port" lineno="76514">
<summary>
Send UDP traffic on the sieve port.
</summary>
@@ -57732,7 +57549,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76406">
+<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76529">
<summary>
Do not audit attempts to send UDP traffic on the sieve port.
</summary>
@@ -57743,7 +57560,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_sieve_port" lineno="76421">
+<interface name="corenet_udp_receive_sieve_port" lineno="76544">
<summary>
Receive UDP traffic on the sieve port.
</summary>
@@ -57754,7 +57571,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76436">
+<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76559">
<summary>
Do not audit attempts to receive UDP traffic on the sieve port.
</summary>
@@ -57765,7 +57582,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_sieve_port" lineno="76451">
+<interface name="corenet_udp_sendrecv_sieve_port" lineno="76574">
<summary>
Send and receive UDP traffic on the sieve port.
</summary>
@@ -57776,7 +57593,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="76467">
+<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="76590">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sieve port.
@@ -57788,7 +57605,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_sieve_port" lineno="76482">
+<interface name="corenet_tcp_bind_sieve_port" lineno="76605">
<summary>
Bind TCP sockets to the sieve port.
</summary>
@@ -57799,7 +57616,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sieve_port" lineno="76502">
+<interface name="corenet_udp_bind_sieve_port" lineno="76625">
<summary>
Bind UDP sockets to the sieve port.
</summary>
@@ -57810,7 +57627,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sieve_port" lineno="76521">
+<interface name="corenet_tcp_connect_sieve_port" lineno="76644">
<summary>
Make a TCP connection to the sieve port.
</summary>
@@ -57820,7 +57637,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sieve_client_packets" lineno="76541">
+<interface name="corenet_send_sieve_client_packets" lineno="76664">
<summary>
Send sieve_client packets.
</summary>
@@ -57831,7 +57648,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="76560">
+<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="76683">
<summary>
Do not audit attempts to send sieve_client packets.
</summary>
@@ -57842,7 +57659,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sieve_client_packets" lineno="76579">
+<interface name="corenet_receive_sieve_client_packets" lineno="76702">
<summary>
Receive sieve_client packets.
</summary>
@@ -57853,7 +57670,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="76598">
+<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="76721">
<summary>
Do not audit attempts to receive sieve_client packets.
</summary>
@@ -57864,7 +57681,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sieve_client_packets" lineno="76617">
+<interface name="corenet_sendrecv_sieve_client_packets" lineno="76740">
<summary>
Send and receive sieve_client packets.
</summary>
@@ -57875,7 +57692,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="76633">
+<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="76756">
<summary>
Do not audit attempts to send and receive sieve_client packets.
</summary>
@@ -57886,7 +57703,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sieve_client_packets" lineno="76648">
+<interface name="corenet_relabelto_sieve_client_packets" lineno="76771">
<summary>
Relabel packets to sieve_client the packet type.
</summary>
@@ -57896,7 +57713,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sieve_server_packets" lineno="76668">
+<interface name="corenet_send_sieve_server_packets" lineno="76791">
<summary>
Send sieve_server packets.
</summary>
@@ -57907,7 +57724,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="76687">
+<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="76810">
<summary>
Do not audit attempts to send sieve_server packets.
</summary>
@@ -57918,7 +57735,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sieve_server_packets" lineno="76706">
+<interface name="corenet_receive_sieve_server_packets" lineno="76829">
<summary>
Receive sieve_server packets.
</summary>
@@ -57929,7 +57746,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="76725">
+<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="76848">
<summary>
Do not audit attempts to receive sieve_server packets.
</summary>
@@ -57940,7 +57757,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sieve_server_packets" lineno="76744">
+<interface name="corenet_sendrecv_sieve_server_packets" lineno="76867">
<summary>
Send and receive sieve_server packets.
</summary>
@@ -57951,7 +57768,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="76760">
+<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="76883">
<summary>
Do not audit attempts to send and receive sieve_server packets.
</summary>
@@ -57962,7 +57779,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sieve_server_packets" lineno="76775">
+<interface name="corenet_relabelto_sieve_server_packets" lineno="76898">
<summary>
Relabel packets to sieve_server the packet type.
</summary>
@@ -57972,7 +57789,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sip_port" lineno="76797">
+<interface name="corenet_tcp_sendrecv_sip_port" lineno="76920">
<summary>
Send and receive TCP traffic on the sip port.
</summary>
@@ -57983,7 +57800,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_sip_port" lineno="76812">
+<interface name="corenet_udp_send_sip_port" lineno="76935">
<summary>
Send UDP traffic on the sip port.
</summary>
@@ -57994,7 +57811,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_sip_port" lineno="76827">
+<interface name="corenet_dontaudit_udp_send_sip_port" lineno="76950">
<summary>
Do not audit attempts to send UDP traffic on the sip port.
</summary>
@@ -58005,7 +57822,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_sip_port" lineno="76842">
+<interface name="corenet_udp_receive_sip_port" lineno="76965">
<summary>
Receive UDP traffic on the sip port.
</summary>
@@ -58016,7 +57833,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="76857">
+<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="76980">
<summary>
Do not audit attempts to receive UDP traffic on the sip port.
</summary>
@@ -58027,7 +57844,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_sip_port" lineno="76872">
+<interface name="corenet_udp_sendrecv_sip_port" lineno="76995">
<summary>
Send and receive UDP traffic on the sip port.
</summary>
@@ -58038,7 +57855,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="76888">
+<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77011">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sip port.
@@ -58050,7 +57867,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_sip_port" lineno="76903">
+<interface name="corenet_tcp_bind_sip_port" lineno="77026">
<summary>
Bind TCP sockets to the sip port.
</summary>
@@ -58061,7 +57878,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sip_port" lineno="76923">
+<interface name="corenet_udp_bind_sip_port" lineno="77046">
<summary>
Bind UDP sockets to the sip port.
</summary>
@@ -58072,7 +57889,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sip_port" lineno="76942">
+<interface name="corenet_tcp_connect_sip_port" lineno="77065">
<summary>
Make a TCP connection to the sip port.
</summary>
@@ -58082,7 +57899,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sip_client_packets" lineno="76962">
+<interface name="corenet_send_sip_client_packets" lineno="77085">
<summary>
Send sip_client packets.
</summary>
@@ -58093,7 +57910,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sip_client_packets" lineno="76981">
+<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77104">
<summary>
Do not audit attempts to send sip_client packets.
</summary>
@@ -58104,7 +57921,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sip_client_packets" lineno="77000">
+<interface name="corenet_receive_sip_client_packets" lineno="77123">
<summary>
Receive sip_client packets.
</summary>
@@ -58115,7 +57932,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77019">
+<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77142">
<summary>
Do not audit attempts to receive sip_client packets.
</summary>
@@ -58126,7 +57943,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sip_client_packets" lineno="77038">
+<interface name="corenet_sendrecv_sip_client_packets" lineno="77161">
<summary>
Send and receive sip_client packets.
</summary>
@@ -58137,7 +57954,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77054">
+<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77177">
<summary>
Do not audit attempts to send and receive sip_client packets.
</summary>
@@ -58148,7 +57965,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sip_client_packets" lineno="77069">
+<interface name="corenet_relabelto_sip_client_packets" lineno="77192">
<summary>
Relabel packets to sip_client the packet type.
</summary>
@@ -58158,7 +57975,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sip_server_packets" lineno="77089">
+<interface name="corenet_send_sip_server_packets" lineno="77212">
<summary>
Send sip_server packets.
</summary>
@@ -58169,7 +57986,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77108">
+<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77231">
<summary>
Do not audit attempts to send sip_server packets.
</summary>
@@ -58180,7 +57997,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sip_server_packets" lineno="77127">
+<interface name="corenet_receive_sip_server_packets" lineno="77250">
<summary>
Receive sip_server packets.
</summary>
@@ -58191,7 +58008,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77146">
+<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77269">
<summary>
Do not audit attempts to receive sip_server packets.
</summary>
@@ -58202,7 +58019,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sip_server_packets" lineno="77165">
+<interface name="corenet_sendrecv_sip_server_packets" lineno="77288">
<summary>
Send and receive sip_server packets.
</summary>
@@ -58213,7 +58030,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77181">
+<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77304">
<summary>
Do not audit attempts to send and receive sip_server packets.
</summary>
@@ -58224,7 +58041,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sip_server_packets" lineno="77196">
+<interface name="corenet_relabelto_sip_server_packets" lineno="77319">
<summary>
Relabel packets to sip_server the packet type.
</summary>
@@ -58234,7 +58051,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77218">
+<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77341">
<summary>
Send and receive TCP traffic on the sixxsconfig port.
</summary>
@@ -58245,7 +58062,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_sixxsconfig_port" lineno="77233">
+<interface name="corenet_udp_send_sixxsconfig_port" lineno="77356">
<summary>
Send UDP traffic on the sixxsconfig port.
</summary>
@@ -58256,7 +58073,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77248">
+<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77371">
<summary>
Do not audit attempts to send UDP traffic on the sixxsconfig port.
</summary>
@@ -58267,7 +58084,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77263">
+<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77386">
<summary>
Receive UDP traffic on the sixxsconfig port.
</summary>
@@ -58278,7 +58095,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77278">
+<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77401">
<summary>
Do not audit attempts to receive UDP traffic on the sixxsconfig port.
</summary>
@@ -58289,7 +58106,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77293">
+<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77416">
<summary>
Send and receive UDP traffic on the sixxsconfig port.
</summary>
@@ -58300,7 +58117,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77309">
+<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77432">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sixxsconfig port.
@@ -58312,7 +58129,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77324">
+<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77447">
<summary>
Bind TCP sockets to the sixxsconfig port.
</summary>
@@ -58323,7 +58140,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77344">
+<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77467">
<summary>
Bind UDP sockets to the sixxsconfig port.
</summary>
@@ -58334,7 +58151,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77363">
+<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77486">
<summary>
Make a TCP connection to the sixxsconfig port.
</summary>
@@ -58344,7 +58161,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sixxsconfig_client_packets" lineno="77383">
+<interface name="corenet_send_sixxsconfig_client_packets" lineno="77506">
<summary>
Send sixxsconfig_client packets.
</summary>
@@ -58355,7 +58172,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77402">
+<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77525">
<summary>
Do not audit attempts to send sixxsconfig_client packets.
</summary>
@@ -58366,7 +58183,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77421">
+<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77544">
<summary>
Receive sixxsconfig_client packets.
</summary>
@@ -58377,7 +58194,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="77440">
+<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="77563">
<summary>
Do not audit attempts to receive sixxsconfig_client packets.
</summary>
@@ -58388,7 +58205,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="77459">
+<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="77582">
<summary>
Send and receive sixxsconfig_client packets.
</summary>
@@ -58399,7 +58216,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="77475">
+<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="77598">
<summary>
Do not audit attempts to send and receive sixxsconfig_client packets.
</summary>
@@ -58410,7 +58227,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="77490">
+<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="77613">
<summary>
Relabel packets to sixxsconfig_client the packet type.
</summary>
@@ -58420,7 +58237,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sixxsconfig_server_packets" lineno="77510">
+<interface name="corenet_send_sixxsconfig_server_packets" lineno="77633">
<summary>
Send sixxsconfig_server packets.
</summary>
@@ -58431,7 +58248,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="77529">
+<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="77652">
<summary>
Do not audit attempts to send sixxsconfig_server packets.
</summary>
@@ -58442,7 +58259,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sixxsconfig_server_packets" lineno="77548">
+<interface name="corenet_receive_sixxsconfig_server_packets" lineno="77671">
<summary>
Receive sixxsconfig_server packets.
</summary>
@@ -58453,7 +58270,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="77567">
+<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="77690">
<summary>
Do not audit attempts to receive sixxsconfig_server packets.
</summary>
@@ -58464,7 +58281,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="77586">
+<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="77709">
<summary>
Send and receive sixxsconfig_server packets.
</summary>
@@ -58475,7 +58292,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="77602">
+<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="77725">
<summary>
Do not audit attempts to send and receive sixxsconfig_server packets.
</summary>
@@ -58486,7 +58303,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="77617">
+<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="77740">
<summary>
Relabel packets to sixxsconfig_server the packet type.
</summary>
@@ -58496,7 +58313,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_smbd_port" lineno="77639">
+<interface name="corenet_tcp_sendrecv_smbd_port" lineno="77762">
<summary>
Send and receive TCP traffic on the smbd port.
</summary>
@@ -58507,7 +58324,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_smbd_port" lineno="77654">
+<interface name="corenet_udp_send_smbd_port" lineno="77777">
<summary>
Send UDP traffic on the smbd port.
</summary>
@@ -58518,7 +58335,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="77669">
+<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="77792">
<summary>
Do not audit attempts to send UDP traffic on the smbd port.
</summary>
@@ -58529,7 +58346,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_smbd_port" lineno="77684">
+<interface name="corenet_udp_receive_smbd_port" lineno="77807">
<summary>
Receive UDP traffic on the smbd port.
</summary>
@@ -58540,7 +58357,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="77699">
+<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="77822">
<summary>
Do not audit attempts to receive UDP traffic on the smbd port.
</summary>
@@ -58551,7 +58368,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_smbd_port" lineno="77714">
+<interface name="corenet_udp_sendrecv_smbd_port" lineno="77837">
<summary>
Send and receive UDP traffic on the smbd port.
</summary>
@@ -58562,7 +58379,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="77730">
+<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="77853">
<summary>
Do not audit attempts to send and receive
UDP traffic on the smbd port.
@@ -58574,7 +58391,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_smbd_port" lineno="77745">
+<interface name="corenet_tcp_bind_smbd_port" lineno="77868">
<summary>
Bind TCP sockets to the smbd port.
</summary>
@@ -58585,7 +58402,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_smbd_port" lineno="77765">
+<interface name="corenet_udp_bind_smbd_port" lineno="77888">
<summary>
Bind UDP sockets to the smbd port.
</summary>
@@ -58596,7 +58413,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_smbd_port" lineno="77784">
+<interface name="corenet_tcp_connect_smbd_port" lineno="77907">
<summary>
Make a TCP connection to the smbd port.
</summary>
@@ -58606,7 +58423,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smbd_client_packets" lineno="77804">
+<interface name="corenet_send_smbd_client_packets" lineno="77927">
<summary>
Send smbd_client packets.
</summary>
@@ -58617,7 +58434,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="77823">
+<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="77946">
<summary>
Do not audit attempts to send smbd_client packets.
</summary>
@@ -58628,7 +58445,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smbd_client_packets" lineno="77842">
+<interface name="corenet_receive_smbd_client_packets" lineno="77965">
<summary>
Receive smbd_client packets.
</summary>
@@ -58639,7 +58456,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="77861">
+<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="77984">
<summary>
Do not audit attempts to receive smbd_client packets.
</summary>
@@ -58650,7 +58467,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smbd_client_packets" lineno="77880">
+<interface name="corenet_sendrecv_smbd_client_packets" lineno="78003">
<summary>
Send and receive smbd_client packets.
</summary>
@@ -58661,7 +58478,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="77896">
+<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78019">
<summary>
Do not audit attempts to send and receive smbd_client packets.
</summary>
@@ -58672,7 +58489,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smbd_client_packets" lineno="77911">
+<interface name="corenet_relabelto_smbd_client_packets" lineno="78034">
<summary>
Relabel packets to smbd_client the packet type.
</summary>
@@ -58682,7 +58499,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smbd_server_packets" lineno="77931">
+<interface name="corenet_send_smbd_server_packets" lineno="78054">
<summary>
Send smbd_server packets.
</summary>
@@ -58693,7 +58510,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="77950">
+<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78073">
<summary>
Do not audit attempts to send smbd_server packets.
</summary>
@@ -58704,7 +58521,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smbd_server_packets" lineno="77969">
+<interface name="corenet_receive_smbd_server_packets" lineno="78092">
<summary>
Receive smbd_server packets.
</summary>
@@ -58715,7 +58532,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="77988">
+<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78111">
<summary>
Do not audit attempts to receive smbd_server packets.
</summary>
@@ -58726,7 +58543,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smbd_server_packets" lineno="78007">
+<interface name="corenet_sendrecv_smbd_server_packets" lineno="78130">
<summary>
Send and receive smbd_server packets.
</summary>
@@ -58737,7 +58554,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78023">
+<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78146">
<summary>
Do not audit attempts to send and receive smbd_server packets.
</summary>
@@ -58748,7 +58565,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smbd_server_packets" lineno="78038">
+<interface name="corenet_relabelto_smbd_server_packets" lineno="78161">
<summary>
Relabel packets to smbd_server the packet type.
</summary>
@@ -58758,7 +58575,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78060">
+<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78183">
<summary>
Send and receive TCP traffic on the smtp port.
</summary>
@@ -58769,7 +58586,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_smtp_port" lineno="78075">
+<interface name="corenet_udp_send_smtp_port" lineno="78198">
<summary>
Send UDP traffic on the smtp port.
</summary>
@@ -58780,7 +58597,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78090">
+<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78213">
<summary>
Do not audit attempts to send UDP traffic on the smtp port.
</summary>
@@ -58791,7 +58608,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_smtp_port" lineno="78105">
+<interface name="corenet_udp_receive_smtp_port" lineno="78228">
<summary>
Receive UDP traffic on the smtp port.
</summary>
@@ -58802,7 +58619,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78120">
+<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78243">
<summary>
Do not audit attempts to receive UDP traffic on the smtp port.
</summary>
@@ -58813,7 +58630,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_smtp_port" lineno="78135">
+<interface name="corenet_udp_sendrecv_smtp_port" lineno="78258">
<summary>
Send and receive UDP traffic on the smtp port.
</summary>
@@ -58824,7 +58641,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78151">
+<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78274">
<summary>
Do not audit attempts to send and receive
UDP traffic on the smtp port.
@@ -58836,7 +58653,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_smtp_port" lineno="78166">
+<interface name="corenet_tcp_bind_smtp_port" lineno="78289">
<summary>
Bind TCP sockets to the smtp port.
</summary>
@@ -58847,7 +58664,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_smtp_port" lineno="78186">
+<interface name="corenet_udp_bind_smtp_port" lineno="78309">
<summary>
Bind UDP sockets to the smtp port.
</summary>
@@ -58858,7 +58675,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_smtp_port" lineno="78205">
+<interface name="corenet_tcp_connect_smtp_port" lineno="78328">
<summary>
Make a TCP connection to the smtp port.
</summary>
@@ -58868,7 +58685,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smtp_client_packets" lineno="78225">
+<interface name="corenet_send_smtp_client_packets" lineno="78348">
<summary>
Send smtp_client packets.
</summary>
@@ -58879,7 +58696,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78244">
+<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78367">
<summary>
Do not audit attempts to send smtp_client packets.
</summary>
@@ -58890,7 +58707,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smtp_client_packets" lineno="78263">
+<interface name="corenet_receive_smtp_client_packets" lineno="78386">
<summary>
Receive smtp_client packets.
</summary>
@@ -58901,7 +58718,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78282">
+<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78405">
<summary>
Do not audit attempts to receive smtp_client packets.
</summary>
@@ -58912,7 +58729,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smtp_client_packets" lineno="78301">
+<interface name="corenet_sendrecv_smtp_client_packets" lineno="78424">
<summary>
Send and receive smtp_client packets.
</summary>
@@ -58923,7 +58740,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78317">
+<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78440">
<summary>
Do not audit attempts to send and receive smtp_client packets.
</summary>
@@ -58934,7 +58751,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smtp_client_packets" lineno="78332">
+<interface name="corenet_relabelto_smtp_client_packets" lineno="78455">
<summary>
Relabel packets to smtp_client the packet type.
</summary>
@@ -58944,7 +58761,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smtp_server_packets" lineno="78352">
+<interface name="corenet_send_smtp_server_packets" lineno="78475">
<summary>
Send smtp_server packets.
</summary>
@@ -58955,7 +58772,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78371">
+<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78494">
<summary>
Do not audit attempts to send smtp_server packets.
</summary>
@@ -58966,7 +58783,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smtp_server_packets" lineno="78390">
+<interface name="corenet_receive_smtp_server_packets" lineno="78513">
<summary>
Receive smtp_server packets.
</summary>
@@ -58977,7 +58794,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78409">
+<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78532">
<summary>
Do not audit attempts to receive smtp_server packets.
</summary>
@@ -58988,7 +58805,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smtp_server_packets" lineno="78428">
+<interface name="corenet_sendrecv_smtp_server_packets" lineno="78551">
<summary>
Send and receive smtp_server packets.
</summary>
@@ -58999,7 +58816,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="78444">
+<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="78567">
<summary>
Do not audit attempts to send and receive smtp_server packets.
</summary>
@@ -59010,7 +58827,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smtp_server_packets" lineno="78459">
+<interface name="corenet_relabelto_smtp_server_packets" lineno="78582">
<summary>
Relabel packets to smtp_server the packet type.
</summary>
@@ -59020,7 +58837,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_snmp_port" lineno="78481">
+<interface name="corenet_tcp_sendrecv_snmp_port" lineno="78604">
<summary>
Send and receive TCP traffic on the snmp port.
</summary>
@@ -59031,7 +58848,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_snmp_port" lineno="78496">
+<interface name="corenet_udp_send_snmp_port" lineno="78619">
<summary>
Send UDP traffic on the snmp port.
</summary>
@@ -59042,7 +58859,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="78511">
+<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="78634">
<summary>
Do not audit attempts to send UDP traffic on the snmp port.
</summary>
@@ -59053,7 +58870,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_snmp_port" lineno="78526">
+<interface name="corenet_udp_receive_snmp_port" lineno="78649">
<summary>
Receive UDP traffic on the snmp port.
</summary>
@@ -59064,7 +58881,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="78541">
+<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="78664">
<summary>
Do not audit attempts to receive UDP traffic on the snmp port.
</summary>
@@ -59075,7 +58892,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_snmp_port" lineno="78556">
+<interface name="corenet_udp_sendrecv_snmp_port" lineno="78679">
<summary>
Send and receive UDP traffic on the snmp port.
</summary>
@@ -59086,7 +58903,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="78572">
+<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="78695">
<summary>
Do not audit attempts to send and receive
UDP traffic on the snmp port.
@@ -59098,7 +58915,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_snmp_port" lineno="78587">
+<interface name="corenet_tcp_bind_snmp_port" lineno="78710">
<summary>
Bind TCP sockets to the snmp port.
</summary>
@@ -59109,7 +58926,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_snmp_port" lineno="78607">
+<interface name="corenet_udp_bind_snmp_port" lineno="78730">
<summary>
Bind UDP sockets to the snmp port.
</summary>
@@ -59120,7 +58937,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_snmp_port" lineno="78626">
+<interface name="corenet_tcp_connect_snmp_port" lineno="78749">
<summary>
Make a TCP connection to the snmp port.
</summary>
@@ -59130,7 +58947,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_snmp_client_packets" lineno="78646">
+<interface name="corenet_send_snmp_client_packets" lineno="78769">
<summary>
Send snmp_client packets.
</summary>
@@ -59141,7 +58958,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="78665">
+<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="78788">
<summary>
Do not audit attempts to send snmp_client packets.
</summary>
@@ -59152,7 +58969,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_snmp_client_packets" lineno="78684">
+<interface name="corenet_receive_snmp_client_packets" lineno="78807">
<summary>
Receive snmp_client packets.
</summary>
@@ -59163,7 +58980,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="78703">
+<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="78826">
<summary>
Do not audit attempts to receive snmp_client packets.
</summary>
@@ -59174,7 +58991,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_snmp_client_packets" lineno="78722">
+<interface name="corenet_sendrecv_snmp_client_packets" lineno="78845">
<summary>
Send and receive snmp_client packets.
</summary>
@@ -59185,7 +59002,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="78738">
+<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="78861">
<summary>
Do not audit attempts to send and receive snmp_client packets.
</summary>
@@ -59196,7 +59013,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_snmp_client_packets" lineno="78753">
+<interface name="corenet_relabelto_snmp_client_packets" lineno="78876">
<summary>
Relabel packets to snmp_client the packet type.
</summary>
@@ -59206,7 +59023,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_snmp_server_packets" lineno="78773">
+<interface name="corenet_send_snmp_server_packets" lineno="78896">
<summary>
Send snmp_server packets.
</summary>
@@ -59217,7 +59034,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="78792">
+<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="78915">
<summary>
Do not audit attempts to send snmp_server packets.
</summary>
@@ -59228,7 +59045,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_snmp_server_packets" lineno="78811">
+<interface name="corenet_receive_snmp_server_packets" lineno="78934">
<summary>
Receive snmp_server packets.
</summary>
@@ -59239,7 +59056,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="78830">
+<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="78953">
<summary>
Do not audit attempts to receive snmp_server packets.
</summary>
@@ -59250,7 +59067,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_snmp_server_packets" lineno="78849">
+<interface name="corenet_sendrecv_snmp_server_packets" lineno="78972">
<summary>
Send and receive snmp_server packets.
</summary>
@@ -59261,7 +59078,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="78865">
+<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="78988">
<summary>
Do not audit attempts to send and receive snmp_server packets.
</summary>
@@ -59272,7 +59089,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_snmp_server_packets" lineno="78880">
+<interface name="corenet_relabelto_snmp_server_packets" lineno="79003">
<summary>
Relabel packets to snmp_server the packet type.
</summary>
@@ -59282,7 +59099,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_socks_port" lineno="78902">
+<interface name="corenet_tcp_sendrecv_socks_port" lineno="79025">
<summary>
Send and receive TCP traffic on the socks port.
</summary>
@@ -59293,7 +59110,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_socks_port" lineno="78917">
+<interface name="corenet_udp_send_socks_port" lineno="79040">
<summary>
Send UDP traffic on the socks port.
</summary>
@@ -59304,7 +59121,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_socks_port" lineno="78932">
+<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79055">
<summary>
Do not audit attempts to send UDP traffic on the socks port.
</summary>
@@ -59315,7 +59132,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_socks_port" lineno="78947">
+<interface name="corenet_udp_receive_socks_port" lineno="79070">
<summary>
Receive UDP traffic on the socks port.
</summary>
@@ -59326,7 +59143,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="78962">
+<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79085">
<summary>
Do not audit attempts to receive UDP traffic on the socks port.
</summary>
@@ -59337,7 +59154,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_socks_port" lineno="78977">
+<interface name="corenet_udp_sendrecv_socks_port" lineno="79100">
<summary>
Send and receive UDP traffic on the socks port.
</summary>
@@ -59348,7 +59165,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="78993">
+<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79116">
<summary>
Do not audit attempts to send and receive
UDP traffic on the socks port.
@@ -59360,7 +59177,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_socks_port" lineno="79008">
+<interface name="corenet_tcp_bind_socks_port" lineno="79131">
<summary>
Bind TCP sockets to the socks port.
</summary>
@@ -59371,7 +59188,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_socks_port" lineno="79028">
+<interface name="corenet_udp_bind_socks_port" lineno="79151">
<summary>
Bind UDP sockets to the socks port.
</summary>
@@ -59382,7 +59199,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_socks_port" lineno="79047">
+<interface name="corenet_tcp_connect_socks_port" lineno="79170">
<summary>
Make a TCP connection to the socks port.
</summary>
@@ -59392,7 +59209,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_socks_client_packets" lineno="79067">
+<interface name="corenet_send_socks_client_packets" lineno="79190">
<summary>
Send socks_client packets.
</summary>
@@ -59403,7 +59220,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79086">
+<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79209">
<summary>
Do not audit attempts to send socks_client packets.
</summary>
@@ -59414,7 +59231,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_socks_client_packets" lineno="79105">
+<interface name="corenet_receive_socks_client_packets" lineno="79228">
<summary>
Receive socks_client packets.
</summary>
@@ -59425,7 +59242,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79124">
+<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79247">
<summary>
Do not audit attempts to receive socks_client packets.
</summary>
@@ -59436,7 +59253,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_socks_client_packets" lineno="79143">
+<interface name="corenet_sendrecv_socks_client_packets" lineno="79266">
<summary>
Send and receive socks_client packets.
</summary>
@@ -59447,7 +59264,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79159">
+<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79282">
<summary>
Do not audit attempts to send and receive socks_client packets.
</summary>
@@ -59458,7 +59275,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_socks_client_packets" lineno="79174">
+<interface name="corenet_relabelto_socks_client_packets" lineno="79297">
<summary>
Relabel packets to socks_client the packet type.
</summary>
@@ -59468,7 +59285,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_socks_server_packets" lineno="79194">
+<interface name="corenet_send_socks_server_packets" lineno="79317">
<summary>
Send socks_server packets.
</summary>
@@ -59479,7 +59296,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79213">
+<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79336">
<summary>
Do not audit attempts to send socks_server packets.
</summary>
@@ -59490,7 +59307,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_socks_server_packets" lineno="79232">
+<interface name="corenet_receive_socks_server_packets" lineno="79355">
<summary>
Receive socks_server packets.
</summary>
@@ -59501,7 +59318,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79251">
+<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79374">
<summary>
Do not audit attempts to receive socks_server packets.
</summary>
@@ -59512,7 +59329,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_socks_server_packets" lineno="79270">
+<interface name="corenet_sendrecv_socks_server_packets" lineno="79393">
<summary>
Send and receive socks_server packets.
</summary>
@@ -59523,7 +59340,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79286">
+<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79409">
<summary>
Do not audit attempts to send and receive socks_server packets.
</summary>
@@ -59534,7 +59351,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_socks_server_packets" lineno="79301">
+<interface name="corenet_relabelto_socks_server_packets" lineno="79424">
<summary>
Relabel packets to socks_server the packet type.
</summary>
@@ -59544,7 +59361,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79323">
+<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79446">
<summary>
Send and receive TCP traffic on the soundd port.
</summary>
@@ -59555,7 +59372,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_soundd_port" lineno="79338">
+<interface name="corenet_udp_send_soundd_port" lineno="79461">
<summary>
Send UDP traffic on the soundd port.
</summary>
@@ -59566,7 +59383,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79353">
+<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79476">
<summary>
Do not audit attempts to send UDP traffic on the soundd port.
</summary>
@@ -59577,7 +59394,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_soundd_port" lineno="79368">
+<interface name="corenet_udp_receive_soundd_port" lineno="79491">
<summary>
Receive UDP traffic on the soundd port.
</summary>
@@ -59588,7 +59405,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79383">
+<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79506">
<summary>
Do not audit attempts to receive UDP traffic on the soundd port.
</summary>
@@ -59599,7 +59416,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_soundd_port" lineno="79398">
+<interface name="corenet_udp_sendrecv_soundd_port" lineno="79521">
<summary>
Send and receive UDP traffic on the soundd port.
</summary>
@@ -59610,7 +59427,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79414">
+<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79537">
<summary>
Do not audit attempts to send and receive
UDP traffic on the soundd port.
@@ -59622,7 +59439,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_soundd_port" lineno="79429">
+<interface name="corenet_tcp_bind_soundd_port" lineno="79552">
<summary>
Bind TCP sockets to the soundd port.
</summary>
@@ -59633,7 +59450,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_soundd_port" lineno="79449">
+<interface name="corenet_udp_bind_soundd_port" lineno="79572">
<summary>
Bind UDP sockets to the soundd port.
</summary>
@@ -59644,7 +59461,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_soundd_port" lineno="79468">
+<interface name="corenet_tcp_connect_soundd_port" lineno="79591">
<summary>
Make a TCP connection to the soundd port.
</summary>
@@ -59654,7 +59471,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_soundd_client_packets" lineno="79488">
+<interface name="corenet_send_soundd_client_packets" lineno="79611">
<summary>
Send soundd_client packets.
</summary>
@@ -59665,7 +59482,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="79507">
+<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="79630">
<summary>
Do not audit attempts to send soundd_client packets.
</summary>
@@ -59676,7 +59493,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_soundd_client_packets" lineno="79526">
+<interface name="corenet_receive_soundd_client_packets" lineno="79649">
<summary>
Receive soundd_client packets.
</summary>
@@ -59687,7 +59504,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="79545">
+<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="79668">
<summary>
Do not audit attempts to receive soundd_client packets.
</summary>
@@ -59698,7 +59515,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_soundd_client_packets" lineno="79564">
+<interface name="corenet_sendrecv_soundd_client_packets" lineno="79687">
<summary>
Send and receive soundd_client packets.
</summary>
@@ -59709,7 +59526,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="79580">
+<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="79703">
<summary>
Do not audit attempts to send and receive soundd_client packets.
</summary>
@@ -59720,7 +59537,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_soundd_client_packets" lineno="79595">
+<interface name="corenet_relabelto_soundd_client_packets" lineno="79718">
<summary>
Relabel packets to soundd_client the packet type.
</summary>
@@ -59730,7 +59547,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_soundd_server_packets" lineno="79615">
+<interface name="corenet_send_soundd_server_packets" lineno="79738">
<summary>
Send soundd_server packets.
</summary>
@@ -59741,7 +59558,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="79634">
+<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="79757">
<summary>
Do not audit attempts to send soundd_server packets.
</summary>
@@ -59752,7 +59569,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_soundd_server_packets" lineno="79653">
+<interface name="corenet_receive_soundd_server_packets" lineno="79776">
<summary>
Receive soundd_server packets.
</summary>
@@ -59763,7 +59580,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="79672">
+<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="79795">
<summary>
Do not audit attempts to receive soundd_server packets.
</summary>
@@ -59774,7 +59591,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_soundd_server_packets" lineno="79691">
+<interface name="corenet_sendrecv_soundd_server_packets" lineno="79814">
<summary>
Send and receive soundd_server packets.
</summary>
@@ -59785,7 +59602,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="79707">
+<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="79830">
<summary>
Do not audit attempts to send and receive soundd_server packets.
</summary>
@@ -59796,7 +59613,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_soundd_server_packets" lineno="79722">
+<interface name="corenet_relabelto_soundd_server_packets" lineno="79845">
<summary>
Relabel packets to soundd_server the packet type.
</summary>
@@ -59806,7 +59623,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_spamd_port" lineno="79744">
+<interface name="corenet_tcp_sendrecv_spamd_port" lineno="79867">
<summary>
Send and receive TCP traffic on the spamd port.
</summary>
@@ -59817,7 +59634,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_spamd_port" lineno="79759">
+<interface name="corenet_udp_send_spamd_port" lineno="79882">
<summary>
Send UDP traffic on the spamd port.
</summary>
@@ -59828,7 +59645,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="79774">
+<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="79897">
<summary>
Do not audit attempts to send UDP traffic on the spamd port.
</summary>
@@ -59839,7 +59656,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_spamd_port" lineno="79789">
+<interface name="corenet_udp_receive_spamd_port" lineno="79912">
<summary>
Receive UDP traffic on the spamd port.
</summary>
@@ -59850,7 +59667,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="79804">
+<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="79927">
<summary>
Do not audit attempts to receive UDP traffic on the spamd port.
</summary>
@@ -59861,7 +59678,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_spamd_port" lineno="79819">
+<interface name="corenet_udp_sendrecv_spamd_port" lineno="79942">
<summary>
Send and receive UDP traffic on the spamd port.
</summary>
@@ -59872,7 +59689,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="79835">
+<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="79958">
<summary>
Do not audit attempts to send and receive
UDP traffic on the spamd port.
@@ -59884,7 +59701,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_spamd_port" lineno="79850">
+<interface name="corenet_tcp_bind_spamd_port" lineno="79973">
<summary>
Bind TCP sockets to the spamd port.
</summary>
@@ -59895,7 +59712,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_spamd_port" lineno="79870">
+<interface name="corenet_udp_bind_spamd_port" lineno="79993">
<summary>
Bind UDP sockets to the spamd port.
</summary>
@@ -59906,7 +59723,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_spamd_port" lineno="79889">
+<interface name="corenet_tcp_connect_spamd_port" lineno="80012">
<summary>
Make a TCP connection to the spamd port.
</summary>
@@ -59916,7 +59733,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_spamd_client_packets" lineno="79909">
+<interface name="corenet_send_spamd_client_packets" lineno="80032">
<summary>
Send spamd_client packets.
</summary>
@@ -59927,7 +59744,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="79928">
+<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80051">
<summary>
Do not audit attempts to send spamd_client packets.
</summary>
@@ -59938,7 +59755,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_spamd_client_packets" lineno="79947">
+<interface name="corenet_receive_spamd_client_packets" lineno="80070">
<summary>
Receive spamd_client packets.
</summary>
@@ -59949,7 +59766,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="79966">
+<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80089">
<summary>
Do not audit attempts to receive spamd_client packets.
</summary>
@@ -59960,7 +59777,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_spamd_client_packets" lineno="79985">
+<interface name="corenet_sendrecv_spamd_client_packets" lineno="80108">
<summary>
Send and receive spamd_client packets.
</summary>
@@ -59971,7 +59788,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80001">
+<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80124">
<summary>
Do not audit attempts to send and receive spamd_client packets.
</summary>
@@ -59982,7 +59799,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_spamd_client_packets" lineno="80016">
+<interface name="corenet_relabelto_spamd_client_packets" lineno="80139">
<summary>
Relabel packets to spamd_client the packet type.
</summary>
@@ -59992,7 +59809,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_spamd_server_packets" lineno="80036">
+<interface name="corenet_send_spamd_server_packets" lineno="80159">
<summary>
Send spamd_server packets.
</summary>
@@ -60003,7 +59820,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80055">
+<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80178">
<summary>
Do not audit attempts to send spamd_server packets.
</summary>
@@ -60014,7 +59831,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_spamd_server_packets" lineno="80074">
+<interface name="corenet_receive_spamd_server_packets" lineno="80197">
<summary>
Receive spamd_server packets.
</summary>
@@ -60025,7 +59842,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80093">
+<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80216">
<summary>
Do not audit attempts to receive spamd_server packets.
</summary>
@@ -60036,7 +59853,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_spamd_server_packets" lineno="80112">
+<interface name="corenet_sendrecv_spamd_server_packets" lineno="80235">
<summary>
Send and receive spamd_server packets.
</summary>
@@ -60047,7 +59864,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80128">
+<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80251">
<summary>
Do not audit attempts to send and receive spamd_server packets.
</summary>
@@ -60058,7 +59875,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_spamd_server_packets" lineno="80143">
+<interface name="corenet_relabelto_spamd_server_packets" lineno="80266">
<summary>
Relabel packets to spamd_server the packet type.
</summary>
@@ -60068,7 +59885,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_speech_port" lineno="80165">
+<interface name="corenet_tcp_sendrecv_speech_port" lineno="80288">
<summary>
Send and receive TCP traffic on the speech port.
</summary>
@@ -60079,7 +59896,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_speech_port" lineno="80180">
+<interface name="corenet_udp_send_speech_port" lineno="80303">
<summary>
Send UDP traffic on the speech port.
</summary>
@@ -60090,7 +59907,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80195">
+<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80318">
<summary>
Do not audit attempts to send UDP traffic on the speech port.
</summary>
@@ -60101,7 +59918,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_speech_port" lineno="80210">
+<interface name="corenet_udp_receive_speech_port" lineno="80333">
<summary>
Receive UDP traffic on the speech port.
</summary>
@@ -60112,7 +59929,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80225">
+<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80348">
<summary>
Do not audit attempts to receive UDP traffic on the speech port.
</summary>
@@ -60123,7 +59940,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_speech_port" lineno="80240">
+<interface name="corenet_udp_sendrecv_speech_port" lineno="80363">
<summary>
Send and receive UDP traffic on the speech port.
</summary>
@@ -60134,7 +59951,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80256">
+<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80379">
<summary>
Do not audit attempts to send and receive
UDP traffic on the speech port.
@@ -60146,7 +59963,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_speech_port" lineno="80271">
+<interface name="corenet_tcp_bind_speech_port" lineno="80394">
<summary>
Bind TCP sockets to the speech port.
</summary>
@@ -60157,7 +59974,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_speech_port" lineno="80291">
+<interface name="corenet_udp_bind_speech_port" lineno="80414">
<summary>
Bind UDP sockets to the speech port.
</summary>
@@ -60168,7 +59985,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_speech_port" lineno="80310">
+<interface name="corenet_tcp_connect_speech_port" lineno="80433">
<summary>
Make a TCP connection to the speech port.
</summary>
@@ -60178,7 +59995,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_speech_client_packets" lineno="80330">
+<interface name="corenet_send_speech_client_packets" lineno="80453">
<summary>
Send speech_client packets.
</summary>
@@ -60189,7 +60006,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80349">
+<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80472">
<summary>
Do not audit attempts to send speech_client packets.
</summary>
@@ -60200,7 +60017,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_speech_client_packets" lineno="80368">
+<interface name="corenet_receive_speech_client_packets" lineno="80491">
<summary>
Receive speech_client packets.
</summary>
@@ -60211,7 +60028,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80387">
+<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80510">
<summary>
Do not audit attempts to receive speech_client packets.
</summary>
@@ -60222,7 +60039,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_speech_client_packets" lineno="80406">
+<interface name="corenet_sendrecv_speech_client_packets" lineno="80529">
<summary>
Send and receive speech_client packets.
</summary>
@@ -60233,7 +60050,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80422">
+<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80545">
<summary>
Do not audit attempts to send and receive speech_client packets.
</summary>
@@ -60244,7 +60061,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_speech_client_packets" lineno="80437">
+<interface name="corenet_relabelto_speech_client_packets" lineno="80560">
<summary>
Relabel packets to speech_client the packet type.
</summary>
@@ -60254,7 +60071,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_speech_server_packets" lineno="80457">
+<interface name="corenet_send_speech_server_packets" lineno="80580">
<summary>
Send speech_server packets.
</summary>
@@ -60265,7 +60082,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_speech_server_packets" lineno="80476">
+<interface name="corenet_dontaudit_send_speech_server_packets" lineno="80599">
<summary>
Do not audit attempts to send speech_server packets.
</summary>
@@ -60276,7 +60093,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_speech_server_packets" lineno="80495">
+<interface name="corenet_receive_speech_server_packets" lineno="80618">
<summary>
Receive speech_server packets.
</summary>
@@ -60287,7 +60104,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="80514">
+<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="80637">
<summary>
Do not audit attempts to receive speech_server packets.
</summary>
@@ -60298,7 +60115,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_speech_server_packets" lineno="80533">
+<interface name="corenet_sendrecv_speech_server_packets" lineno="80656">
<summary>
Send and receive speech_server packets.
</summary>
@@ -60309,7 +60126,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="80549">
+<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="80672">
<summary>
Do not audit attempts to send and receive speech_server packets.
</summary>
@@ -60320,7 +60137,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_speech_server_packets" lineno="80564">
+<interface name="corenet_relabelto_speech_server_packets" lineno="80687">
<summary>
Relabel packets to speech_server the packet type.
</summary>
@@ -60330,7 +60147,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_squid_port" lineno="80586">
+<interface name="corenet_tcp_sendrecv_squid_port" lineno="80709">
<summary>
Send and receive TCP traffic on the squid port.
</summary>
@@ -60341,7 +60158,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_squid_port" lineno="80601">
+<interface name="corenet_udp_send_squid_port" lineno="80724">
<summary>
Send UDP traffic on the squid port.
</summary>
@@ -60352,7 +60169,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_squid_port" lineno="80616">
+<interface name="corenet_dontaudit_udp_send_squid_port" lineno="80739">
<summary>
Do not audit attempts to send UDP traffic on the squid port.
</summary>
@@ -60363,7 +60180,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_squid_port" lineno="80631">
+<interface name="corenet_udp_receive_squid_port" lineno="80754">
<summary>
Receive UDP traffic on the squid port.
</summary>
@@ -60374,7 +60191,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="80646">
+<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="80769">
<summary>
Do not audit attempts to receive UDP traffic on the squid port.
</summary>
@@ -60385,7 +60202,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_squid_port" lineno="80661">
+<interface name="corenet_udp_sendrecv_squid_port" lineno="80784">
<summary>
Send and receive UDP traffic on the squid port.
</summary>
@@ -60396,7 +60213,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="80677">
+<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="80800">
<summary>
Do not audit attempts to send and receive
UDP traffic on the squid port.
@@ -60408,7 +60225,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_squid_port" lineno="80692">
+<interface name="corenet_tcp_bind_squid_port" lineno="80815">
<summary>
Bind TCP sockets to the squid port.
</summary>
@@ -60419,7 +60236,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_squid_port" lineno="80712">
+<interface name="corenet_udp_bind_squid_port" lineno="80835">
<summary>
Bind UDP sockets to the squid port.
</summary>
@@ -60430,7 +60247,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_squid_port" lineno="80731">
+<interface name="corenet_tcp_connect_squid_port" lineno="80854">
<summary>
Make a TCP connection to the squid port.
</summary>
@@ -60440,7 +60257,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_squid_client_packets" lineno="80751">
+<interface name="corenet_send_squid_client_packets" lineno="80874">
<summary>
Send squid_client packets.
</summary>
@@ -60451,7 +60268,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_squid_client_packets" lineno="80770">
+<interface name="corenet_dontaudit_send_squid_client_packets" lineno="80893">
<summary>
Do not audit attempts to send squid_client packets.
</summary>
@@ -60462,7 +60279,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_squid_client_packets" lineno="80789">
+<interface name="corenet_receive_squid_client_packets" lineno="80912">
<summary>
Receive squid_client packets.
</summary>
@@ -60473,7 +60290,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="80808">
+<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="80931">
<summary>
Do not audit attempts to receive squid_client packets.
</summary>
@@ -60484,7 +60301,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_squid_client_packets" lineno="80827">
+<interface name="corenet_sendrecv_squid_client_packets" lineno="80950">
<summary>
Send and receive squid_client packets.
</summary>
@@ -60495,7 +60312,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="80843">
+<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="80966">
<summary>
Do not audit attempts to send and receive squid_client packets.
</summary>
@@ -60506,7 +60323,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_squid_client_packets" lineno="80858">
+<interface name="corenet_relabelto_squid_client_packets" lineno="80981">
<summary>
Relabel packets to squid_client the packet type.
</summary>
@@ -60516,7 +60333,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_squid_server_packets" lineno="80878">
+<interface name="corenet_send_squid_server_packets" lineno="81001">
<summary>
Send squid_server packets.
</summary>
@@ -60527,7 +60344,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_squid_server_packets" lineno="80897">
+<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81020">
<summary>
Do not audit attempts to send squid_server packets.
</summary>
@@ -60538,7 +60355,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_squid_server_packets" lineno="80916">
+<interface name="corenet_receive_squid_server_packets" lineno="81039">
<summary>
Receive squid_server packets.
</summary>
@@ -60549,7 +60366,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="80935">
+<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81058">
<summary>
Do not audit attempts to receive squid_server packets.
</summary>
@@ -60560,7 +60377,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_squid_server_packets" lineno="80954">
+<interface name="corenet_sendrecv_squid_server_packets" lineno="81077">
<summary>
Send and receive squid_server packets.
</summary>
@@ -60571,7 +60388,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="80970">
+<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81093">
<summary>
Do not audit attempts to send and receive squid_server packets.
</summary>
@@ -60582,7 +60399,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_squid_server_packets" lineno="80985">
+<interface name="corenet_relabelto_squid_server_packets" lineno="81108">
<summary>
Relabel packets to squid_server the packet type.
</summary>
@@ -60592,7 +60409,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81007">
+<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81130">
<summary>
Send and receive TCP traffic on the ssdp port.
</summary>
@@ -60603,7 +60420,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ssdp_port" lineno="81022">
+<interface name="corenet_udp_send_ssdp_port" lineno="81145">
<summary>
Send UDP traffic on the ssdp port.
</summary>
@@ -60614,7 +60431,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81037">
+<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81160">
<summary>
Do not audit attempts to send UDP traffic on the ssdp port.
</summary>
@@ -60625,7 +60442,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ssdp_port" lineno="81052">
+<interface name="corenet_udp_receive_ssdp_port" lineno="81175">
<summary>
Receive UDP traffic on the ssdp port.
</summary>
@@ -60636,7 +60453,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81067">
+<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81190">
<summary>
Do not audit attempts to receive UDP traffic on the ssdp port.
</summary>
@@ -60647,7 +60464,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81082">
+<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81205">
<summary>
Send and receive UDP traffic on the ssdp port.
</summary>
@@ -60658,7 +60475,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81098">
+<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81221">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ssdp port.
@@ -60670,7 +60487,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ssdp_port" lineno="81113">
+<interface name="corenet_tcp_bind_ssdp_port" lineno="81236">
<summary>
Bind TCP sockets to the ssdp port.
</summary>
@@ -60681,7 +60498,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ssdp_port" lineno="81133">
+<interface name="corenet_udp_bind_ssdp_port" lineno="81256">
<summary>
Bind UDP sockets to the ssdp port.
</summary>
@@ -60692,7 +60509,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ssdp_port" lineno="81152">
+<interface name="corenet_tcp_connect_ssdp_port" lineno="81275">
<summary>
Make a TCP connection to the ssdp port.
</summary>
@@ -60702,7 +60519,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssdp_client_packets" lineno="81172">
+<interface name="corenet_send_ssdp_client_packets" lineno="81295">
<summary>
Send ssdp_client packets.
</summary>
@@ -60713,7 +60530,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81191">
+<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81314">
<summary>
Do not audit attempts to send ssdp_client packets.
</summary>
@@ -60724,7 +60541,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssdp_client_packets" lineno="81210">
+<interface name="corenet_receive_ssdp_client_packets" lineno="81333">
<summary>
Receive ssdp_client packets.
</summary>
@@ -60735,7 +60552,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81229">
+<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81352">
<summary>
Do not audit attempts to receive ssdp_client packets.
</summary>
@@ -60746,7 +60563,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81248">
+<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81371">
<summary>
Send and receive ssdp_client packets.
</summary>
@@ -60757,7 +60574,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81264">
+<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81387">
<summary>
Do not audit attempts to send and receive ssdp_client packets.
</summary>
@@ -60768,7 +60585,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssdp_client_packets" lineno="81279">
+<interface name="corenet_relabelto_ssdp_client_packets" lineno="81402">
<summary>
Relabel packets to ssdp_client the packet type.
</summary>
@@ -60778,7 +60595,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssdp_server_packets" lineno="81299">
+<interface name="corenet_send_ssdp_server_packets" lineno="81422">
<summary>
Send ssdp_server packets.
</summary>
@@ -60789,7 +60606,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81318">
+<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81441">
<summary>
Do not audit attempts to send ssdp_server packets.
</summary>
@@ -60800,7 +60617,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssdp_server_packets" lineno="81337">
+<interface name="corenet_receive_ssdp_server_packets" lineno="81460">
<summary>
Receive ssdp_server packets.
</summary>
@@ -60811,7 +60628,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81356">
+<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81479">
<summary>
Do not audit attempts to receive ssdp_server packets.
</summary>
@@ -60822,7 +60639,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81375">
+<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81498">
<summary>
Send and receive ssdp_server packets.
</summary>
@@ -60833,7 +60650,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81391">
+<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81514">
<summary>
Do not audit attempts to send and receive ssdp_server packets.
</summary>
@@ -60844,7 +60661,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssdp_server_packets" lineno="81406">
+<interface name="corenet_relabelto_ssdp_server_packets" lineno="81529">
<summary>
Relabel packets to ssdp_server the packet type.
</summary>
@@ -60854,7 +60671,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81428">
+<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81551">
<summary>
Send and receive TCP traffic on the ssh port.
</summary>
@@ -60865,7 +60682,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ssh_port" lineno="81443">
+<interface name="corenet_udp_send_ssh_port" lineno="81566">
<summary>
Send UDP traffic on the ssh port.
</summary>
@@ -60876,7 +60693,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="81458">
+<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="81581">
<summary>
Do not audit attempts to send UDP traffic on the ssh port.
</summary>
@@ -60887,7 +60704,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ssh_port" lineno="81473">
+<interface name="corenet_udp_receive_ssh_port" lineno="81596">
<summary>
Receive UDP traffic on the ssh port.
</summary>
@@ -60898,7 +60715,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="81488">
+<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="81611">
<summary>
Do not audit attempts to receive UDP traffic on the ssh port.
</summary>
@@ -60909,7 +60726,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ssh_port" lineno="81503">
+<interface name="corenet_udp_sendrecv_ssh_port" lineno="81626">
<summary>
Send and receive UDP traffic on the ssh port.
</summary>
@@ -60920,7 +60737,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="81519">
+<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="81642">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ssh port.
@@ -60932,7 +60749,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ssh_port" lineno="81534">
+<interface name="corenet_tcp_bind_ssh_port" lineno="81657">
<summary>
Bind TCP sockets to the ssh port.
</summary>
@@ -60943,7 +60760,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ssh_port" lineno="81554">
+<interface name="corenet_udp_bind_ssh_port" lineno="81677">
<summary>
Bind UDP sockets to the ssh port.
</summary>
@@ -60954,7 +60771,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ssh_port" lineno="81573">
+<interface name="corenet_tcp_connect_ssh_port" lineno="81696">
<summary>
Make a TCP connection to the ssh port.
</summary>
@@ -60964,7 +60781,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssh_client_packets" lineno="81593">
+<interface name="corenet_send_ssh_client_packets" lineno="81716">
<summary>
Send ssh_client packets.
</summary>
@@ -60975,7 +60792,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="81612">
+<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="81735">
<summary>
Do not audit attempts to send ssh_client packets.
</summary>
@@ -60986,7 +60803,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssh_client_packets" lineno="81631">
+<interface name="corenet_receive_ssh_client_packets" lineno="81754">
<summary>
Receive ssh_client packets.
</summary>
@@ -60997,7 +60814,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="81650">
+<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="81773">
<summary>
Do not audit attempts to receive ssh_client packets.
</summary>
@@ -61008,7 +60825,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssh_client_packets" lineno="81669">
+<interface name="corenet_sendrecv_ssh_client_packets" lineno="81792">
<summary>
Send and receive ssh_client packets.
</summary>
@@ -61019,7 +60836,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="81685">
+<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="81808">
<summary>
Do not audit attempts to send and receive ssh_client packets.
</summary>
@@ -61030,7 +60847,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssh_client_packets" lineno="81700">
+<interface name="corenet_relabelto_ssh_client_packets" lineno="81823">
<summary>
Relabel packets to ssh_client the packet type.
</summary>
@@ -61040,7 +60857,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssh_server_packets" lineno="81720">
+<interface name="corenet_send_ssh_server_packets" lineno="81843">
<summary>
Send ssh_server packets.
</summary>
@@ -61051,7 +60868,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="81739">
+<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="81862">
<summary>
Do not audit attempts to send ssh_server packets.
</summary>
@@ -61062,7 +60879,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssh_server_packets" lineno="81758">
+<interface name="corenet_receive_ssh_server_packets" lineno="81881">
<summary>
Receive ssh_server packets.
</summary>
@@ -61073,7 +60890,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="81777">
+<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="81900">
<summary>
Do not audit attempts to receive ssh_server packets.
</summary>
@@ -61084,7 +60901,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssh_server_packets" lineno="81796">
+<interface name="corenet_sendrecv_ssh_server_packets" lineno="81919">
<summary>
Send and receive ssh_server packets.
</summary>
@@ -61095,7 +60912,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="81812">
+<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="81935">
<summary>
Do not audit attempts to send and receive ssh_server packets.
</summary>
@@ -61106,7 +60923,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssh_server_packets" lineno="81827">
+<interface name="corenet_relabelto_ssh_server_packets" lineno="81950">
<summary>
Relabel packets to ssh_server the packet type.
</summary>
@@ -61116,7 +60933,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="81849">
+<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="81972">
<summary>
Send and receive TCP traffic on the stunnel port.
</summary>
@@ -61127,7 +60944,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_stunnel_port" lineno="81864">
+<interface name="corenet_udp_send_stunnel_port" lineno="81987">
<summary>
Send UDP traffic on the stunnel port.
</summary>
@@ -61138,7 +60955,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="81879">
+<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82002">
<summary>
Do not audit attempts to send UDP traffic on the stunnel port.
</summary>
@@ -61149,7 +60966,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_stunnel_port" lineno="81894">
+<interface name="corenet_udp_receive_stunnel_port" lineno="82017">
<summary>
Receive UDP traffic on the stunnel port.
</summary>
@@ -61160,7 +60977,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="81909">
+<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82032">
<summary>
Do not audit attempts to receive UDP traffic on the stunnel port.
</summary>
@@ -61171,7 +60988,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_stunnel_port" lineno="81924">
+<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82047">
<summary>
Send and receive UDP traffic on the stunnel port.
</summary>
@@ -61182,7 +60999,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="81940">
+<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82063">
<summary>
Do not audit attempts to send and receive
UDP traffic on the stunnel port.
@@ -61194,7 +61011,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_stunnel_port" lineno="81955">
+<interface name="corenet_tcp_bind_stunnel_port" lineno="82078">
<summary>
Bind TCP sockets to the stunnel port.
</summary>
@@ -61205,7 +61022,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_stunnel_port" lineno="81975">
+<interface name="corenet_udp_bind_stunnel_port" lineno="82098">
<summary>
Bind UDP sockets to the stunnel port.
</summary>
@@ -61216,7 +61033,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_stunnel_port" lineno="81994">
+<interface name="corenet_tcp_connect_stunnel_port" lineno="82117">
<summary>
Make a TCP connection to the stunnel port.
</summary>
@@ -61226,7 +61043,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_stunnel_client_packets" lineno="82014">
+<interface name="corenet_send_stunnel_client_packets" lineno="82137">
<summary>
Send stunnel_client packets.
</summary>
@@ -61237,7 +61054,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82033">
+<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82156">
<summary>
Do not audit attempts to send stunnel_client packets.
</summary>
@@ -61248,7 +61065,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_stunnel_client_packets" lineno="82052">
+<interface name="corenet_receive_stunnel_client_packets" lineno="82175">
<summary>
Receive stunnel_client packets.
</summary>
@@ -61259,7 +61076,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82071">
+<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82194">
<summary>
Do not audit attempts to receive stunnel_client packets.
</summary>
@@ -61270,7 +61087,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82090">
+<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82213">
<summary>
Send and receive stunnel_client packets.
</summary>
@@ -61281,7 +61098,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82106">
+<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82229">
<summary>
Do not audit attempts to send and receive stunnel_client packets.
</summary>
@@ -61292,7 +61109,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_stunnel_client_packets" lineno="82121">
+<interface name="corenet_relabelto_stunnel_client_packets" lineno="82244">
<summary>
Relabel packets to stunnel_client the packet type.
</summary>
@@ -61302,7 +61119,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_stunnel_server_packets" lineno="82141">
+<interface name="corenet_send_stunnel_server_packets" lineno="82264">
<summary>
Send stunnel_server packets.
</summary>
@@ -61313,7 +61130,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82160">
+<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82283">
<summary>
Do not audit attempts to send stunnel_server packets.
</summary>
@@ -61324,7 +61141,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_stunnel_server_packets" lineno="82179">
+<interface name="corenet_receive_stunnel_server_packets" lineno="82302">
<summary>
Receive stunnel_server packets.
</summary>
@@ -61335,7 +61152,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82198">
+<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82321">
<summary>
Do not audit attempts to receive stunnel_server packets.
</summary>
@@ -61346,7 +61163,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82217">
+<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82340">
<summary>
Send and receive stunnel_server packets.
</summary>
@@ -61357,7 +61174,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82233">
+<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82356">
<summary>
Do not audit attempts to send and receive stunnel_server packets.
</summary>
@@ -61368,7 +61185,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_stunnel_server_packets" lineno="82248">
+<interface name="corenet_relabelto_stunnel_server_packets" lineno="82371">
<summary>
Relabel packets to stunnel_server the packet type.
</summary>
@@ -61378,7 +61195,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_svn_port" lineno="82270">
+<interface name="corenet_tcp_sendrecv_svn_port" lineno="82393">
<summary>
Send and receive TCP traffic on the svn port.
</summary>
@@ -61389,7 +61206,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_svn_port" lineno="82285">
+<interface name="corenet_udp_send_svn_port" lineno="82408">
<summary>
Send UDP traffic on the svn port.
</summary>
@@ -61400,7 +61217,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82300">
+<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82423">
<summary>
Do not audit attempts to send UDP traffic on the svn port.
</summary>
@@ -61411,7 +61228,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_svn_port" lineno="82315">
+<interface name="corenet_udp_receive_svn_port" lineno="82438">
<summary>
Receive UDP traffic on the svn port.
</summary>
@@ -61422,7 +61239,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82330">
+<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82453">
<summary>
Do not audit attempts to receive UDP traffic on the svn port.
</summary>
@@ -61433,7 +61250,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_svn_port" lineno="82345">
+<interface name="corenet_udp_sendrecv_svn_port" lineno="82468">
<summary>
Send and receive UDP traffic on the svn port.
</summary>
@@ -61444,7 +61261,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82361">
+<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82484">
<summary>
Do not audit attempts to send and receive
UDP traffic on the svn port.
@@ -61456,7 +61273,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_svn_port" lineno="82376">
+<interface name="corenet_tcp_bind_svn_port" lineno="82499">
<summary>
Bind TCP sockets to the svn port.
</summary>
@@ -61467,7 +61284,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_svn_port" lineno="82396">
+<interface name="corenet_udp_bind_svn_port" lineno="82519">
<summary>
Bind UDP sockets to the svn port.
</summary>
@@ -61478,7 +61295,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_svn_port" lineno="82415">
+<interface name="corenet_tcp_connect_svn_port" lineno="82538">
<summary>
Make a TCP connection to the svn port.
</summary>
@@ -61488,7 +61305,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svn_client_packets" lineno="82435">
+<interface name="corenet_send_svn_client_packets" lineno="82558">
<summary>
Send svn_client packets.
</summary>
@@ -61499,7 +61316,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svn_client_packets" lineno="82454">
+<interface name="corenet_dontaudit_send_svn_client_packets" lineno="82577">
<summary>
Do not audit attempts to send svn_client packets.
</summary>
@@ -61510,7 +61327,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svn_client_packets" lineno="82473">
+<interface name="corenet_receive_svn_client_packets" lineno="82596">
<summary>
Receive svn_client packets.
</summary>
@@ -61521,7 +61338,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="82492">
+<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="82615">
<summary>
Do not audit attempts to receive svn_client packets.
</summary>
@@ -61532,7 +61349,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svn_client_packets" lineno="82511">
+<interface name="corenet_sendrecv_svn_client_packets" lineno="82634">
<summary>
Send and receive svn_client packets.
</summary>
@@ -61543,7 +61360,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="82527">
+<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="82650">
<summary>
Do not audit attempts to send and receive svn_client packets.
</summary>
@@ -61554,7 +61371,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svn_client_packets" lineno="82542">
+<interface name="corenet_relabelto_svn_client_packets" lineno="82665">
<summary>
Relabel packets to svn_client the packet type.
</summary>
@@ -61564,7 +61381,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svn_server_packets" lineno="82562">
+<interface name="corenet_send_svn_server_packets" lineno="82685">
<summary>
Send svn_server packets.
</summary>
@@ -61575,7 +61392,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svn_server_packets" lineno="82581">
+<interface name="corenet_dontaudit_send_svn_server_packets" lineno="82704">
<summary>
Do not audit attempts to send svn_server packets.
</summary>
@@ -61586,7 +61403,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svn_server_packets" lineno="82600">
+<interface name="corenet_receive_svn_server_packets" lineno="82723">
<summary>
Receive svn_server packets.
</summary>
@@ -61597,7 +61414,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="82619">
+<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="82742">
<summary>
Do not audit attempts to receive svn_server packets.
</summary>
@@ -61608,7 +61425,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svn_server_packets" lineno="82638">
+<interface name="corenet_sendrecv_svn_server_packets" lineno="82761">
<summary>
Send and receive svn_server packets.
</summary>
@@ -61619,7 +61436,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="82654">
+<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="82777">
<summary>
Do not audit attempts to send and receive svn_server packets.
</summary>
@@ -61630,7 +61447,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svn_server_packets" lineno="82669">
+<interface name="corenet_relabelto_svn_server_packets" lineno="82792">
<summary>
Relabel packets to svn_server the packet type.
</summary>
@@ -61640,7 +61457,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="82691">
+<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="82814">
<summary>
Send and receive TCP traffic on the svrloc port.
</summary>
@@ -61651,7 +61468,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_svrloc_port" lineno="82706">
+<interface name="corenet_udp_send_svrloc_port" lineno="82829">
<summary>
Send UDP traffic on the svrloc port.
</summary>
@@ -61662,7 +61479,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="82721">
+<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="82844">
<summary>
Do not audit attempts to send UDP traffic on the svrloc port.
</summary>
@@ -61673,7 +61490,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_svrloc_port" lineno="82736">
+<interface name="corenet_udp_receive_svrloc_port" lineno="82859">
<summary>
Receive UDP traffic on the svrloc port.
</summary>
@@ -61684,7 +61501,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="82751">
+<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="82874">
<summary>
Do not audit attempts to receive UDP traffic on the svrloc port.
</summary>
@@ -61695,7 +61512,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_svrloc_port" lineno="82766">
+<interface name="corenet_udp_sendrecv_svrloc_port" lineno="82889">
<summary>
Send and receive UDP traffic on the svrloc port.
</summary>
@@ -61706,7 +61523,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="82782">
+<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="82905">
<summary>
Do not audit attempts to send and receive
UDP traffic on the svrloc port.
@@ -61718,7 +61535,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_svrloc_port" lineno="82797">
+<interface name="corenet_tcp_bind_svrloc_port" lineno="82920">
<summary>
Bind TCP sockets to the svrloc port.
</summary>
@@ -61729,7 +61546,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_svrloc_port" lineno="82817">
+<interface name="corenet_udp_bind_svrloc_port" lineno="82940">
<summary>
Bind UDP sockets to the svrloc port.
</summary>
@@ -61740,7 +61557,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_svrloc_port" lineno="82836">
+<interface name="corenet_tcp_connect_svrloc_port" lineno="82959">
<summary>
Make a TCP connection to the svrloc port.
</summary>
@@ -61750,7 +61567,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svrloc_client_packets" lineno="82856">
+<interface name="corenet_send_svrloc_client_packets" lineno="82979">
<summary>
Send svrloc_client packets.
</summary>
@@ -61761,7 +61578,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="82875">
+<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="82998">
<summary>
Do not audit attempts to send svrloc_client packets.
</summary>
@@ -61772,7 +61589,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svrloc_client_packets" lineno="82894">
+<interface name="corenet_receive_svrloc_client_packets" lineno="83017">
<summary>
Receive svrloc_client packets.
</summary>
@@ -61783,7 +61600,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="82913">
+<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83036">
<summary>
Do not audit attempts to receive svrloc_client packets.
</summary>
@@ -61794,7 +61611,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svrloc_client_packets" lineno="82932">
+<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83055">
<summary>
Send and receive svrloc_client packets.
</summary>
@@ -61805,7 +61622,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="82948">
+<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83071">
<summary>
Do not audit attempts to send and receive svrloc_client packets.
</summary>
@@ -61816,7 +61633,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svrloc_client_packets" lineno="82963">
+<interface name="corenet_relabelto_svrloc_client_packets" lineno="83086">
<summary>
Relabel packets to svrloc_client the packet type.
</summary>
@@ -61826,7 +61643,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svrloc_server_packets" lineno="82983">
+<interface name="corenet_send_svrloc_server_packets" lineno="83106">
<summary>
Send svrloc_server packets.
</summary>
@@ -61837,7 +61654,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83002">
+<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83125">
<summary>
Do not audit attempts to send svrloc_server packets.
</summary>
@@ -61848,7 +61665,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svrloc_server_packets" lineno="83021">
+<interface name="corenet_receive_svrloc_server_packets" lineno="83144">
<summary>
Receive svrloc_server packets.
</summary>
@@ -61859,7 +61676,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83040">
+<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83163">
<summary>
Do not audit attempts to receive svrloc_server packets.
</summary>
@@ -61870,7 +61687,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83059">
+<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83182">
<summary>
Send and receive svrloc_server packets.
</summary>
@@ -61881,7 +61698,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83075">
+<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83198">
<summary>
Do not audit attempts to send and receive svrloc_server packets.
</summary>
@@ -61892,7 +61709,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svrloc_server_packets" lineno="83090">
+<interface name="corenet_relabelto_svrloc_server_packets" lineno="83213">
<summary>
Relabel packets to svrloc_server the packet type.
</summary>
@@ -61902,7 +61719,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_swat_port" lineno="83112">
+<interface name="corenet_tcp_sendrecv_swat_port" lineno="83235">
<summary>
Send and receive TCP traffic on the swat port.
</summary>
@@ -61913,7 +61730,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_swat_port" lineno="83127">
+<interface name="corenet_udp_send_swat_port" lineno="83250">
<summary>
Send UDP traffic on the swat port.
</summary>
@@ -61924,7 +61741,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83142">
+<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83265">
<summary>
Do not audit attempts to send UDP traffic on the swat port.
</summary>
@@ -61935,7 +61752,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_swat_port" lineno="83157">
+<interface name="corenet_udp_receive_swat_port" lineno="83280">
<summary>
Receive UDP traffic on the swat port.
</summary>
@@ -61946,7 +61763,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83172">
+<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83295">
<summary>
Do not audit attempts to receive UDP traffic on the swat port.
</summary>
@@ -61957,7 +61774,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_swat_port" lineno="83187">
+<interface name="corenet_udp_sendrecv_swat_port" lineno="83310">
<summary>
Send and receive UDP traffic on the swat port.
</summary>
@@ -61968,7 +61785,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83203">
+<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83326">
<summary>
Do not audit attempts to send and receive
UDP traffic on the swat port.
@@ -61980,7 +61797,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_swat_port" lineno="83218">
+<interface name="corenet_tcp_bind_swat_port" lineno="83341">
<summary>
Bind TCP sockets to the swat port.
</summary>
@@ -61991,7 +61808,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_swat_port" lineno="83238">
+<interface name="corenet_udp_bind_swat_port" lineno="83361">
<summary>
Bind UDP sockets to the swat port.
</summary>
@@ -62002,7 +61819,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_swat_port" lineno="83257">
+<interface name="corenet_tcp_connect_swat_port" lineno="83380">
<summary>
Make a TCP connection to the swat port.
</summary>
@@ -62012,7 +61829,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_swat_client_packets" lineno="83277">
+<interface name="corenet_send_swat_client_packets" lineno="83400">
<summary>
Send swat_client packets.
</summary>
@@ -62023,7 +61840,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83296">
+<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83419">
<summary>
Do not audit attempts to send swat_client packets.
</summary>
@@ -62034,7 +61851,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_swat_client_packets" lineno="83315">
+<interface name="corenet_receive_swat_client_packets" lineno="83438">
<summary>
Receive swat_client packets.
</summary>
@@ -62045,7 +61862,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83334">
+<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83457">
<summary>
Do not audit attempts to receive swat_client packets.
</summary>
@@ -62056,7 +61873,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_swat_client_packets" lineno="83353">
+<interface name="corenet_sendrecv_swat_client_packets" lineno="83476">
<summary>
Send and receive swat_client packets.
</summary>
@@ -62067,7 +61884,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83369">
+<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83492">
<summary>
Do not audit attempts to send and receive swat_client packets.
</summary>
@@ -62078,7 +61895,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_swat_client_packets" lineno="83384">
+<interface name="corenet_relabelto_swat_client_packets" lineno="83507">
<summary>
Relabel packets to swat_client the packet type.
</summary>
@@ -62088,7 +61905,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_swat_server_packets" lineno="83404">
+<interface name="corenet_send_swat_server_packets" lineno="83527">
<summary>
Send swat_server packets.
</summary>
@@ -62099,7 +61916,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83423">
+<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83546">
<summary>
Do not audit attempts to send swat_server packets.
</summary>
@@ -62110,7 +61927,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_swat_server_packets" lineno="83442">
+<interface name="corenet_receive_swat_server_packets" lineno="83565">
<summary>
Receive swat_server packets.
</summary>
@@ -62121,7 +61938,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="83461">
+<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="83584">
<summary>
Do not audit attempts to receive swat_server packets.
</summary>
@@ -62132,7 +61949,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_swat_server_packets" lineno="83480">
+<interface name="corenet_sendrecv_swat_server_packets" lineno="83603">
<summary>
Send and receive swat_server packets.
</summary>
@@ -62143,7 +61960,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="83496">
+<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="83619">
<summary>
Do not audit attempts to send and receive swat_server packets.
</summary>
@@ -62154,7 +61971,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_swat_server_packets" lineno="83511">
+<interface name="corenet_relabelto_swat_server_packets" lineno="83634">
<summary>
Relabel packets to swat_server the packet type.
</summary>
@@ -62164,7 +61981,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="83533">
+<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="83656">
<summary>
Send and receive TCP traffic on the syncthing port.
</summary>
@@ -62175,7 +61992,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_syncthing_port" lineno="83548">
+<interface name="corenet_udp_send_syncthing_port" lineno="83671">
<summary>
Send UDP traffic on the syncthing port.
</summary>
@@ -62186,7 +62003,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="83563">
+<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="83686">
<summary>
Do not audit attempts to send UDP traffic on the syncthing port.
</summary>
@@ -62197,7 +62014,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_syncthing_port" lineno="83578">
+<interface name="corenet_udp_receive_syncthing_port" lineno="83701">
<summary>
Receive UDP traffic on the syncthing port.
</summary>
@@ -62208,7 +62025,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="83593">
+<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="83716">
<summary>
Do not audit attempts to receive UDP traffic on the syncthing port.
</summary>
@@ -62219,7 +62036,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_syncthing_port" lineno="83608">
+<interface name="corenet_udp_sendrecv_syncthing_port" lineno="83731">
<summary>
Send and receive UDP traffic on the syncthing port.
</summary>
@@ -62230,7 +62047,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="83624">
+<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="83747">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syncthing port.
@@ -62242,7 +62059,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_syncthing_port" lineno="83639">
+<interface name="corenet_tcp_bind_syncthing_port" lineno="83762">
<summary>
Bind TCP sockets to the syncthing port.
</summary>
@@ -62253,7 +62070,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syncthing_port" lineno="83659">
+<interface name="corenet_udp_bind_syncthing_port" lineno="83782">
<summary>
Bind UDP sockets to the syncthing port.
</summary>
@@ -62264,7 +62081,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syncthing_port" lineno="83678">
+<interface name="corenet_tcp_connect_syncthing_port" lineno="83801">
<summary>
Make a TCP connection to the syncthing port.
</summary>
@@ -62274,7 +62091,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_client_packets" lineno="83698">
+<interface name="corenet_send_syncthing_client_packets" lineno="83821">
<summary>
Send syncthing_client packets.
</summary>
@@ -62285,7 +62102,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="83717">
+<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="83840">
<summary>
Do not audit attempts to send syncthing_client packets.
</summary>
@@ -62296,7 +62113,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_client_packets" lineno="83736">
+<interface name="corenet_receive_syncthing_client_packets" lineno="83859">
<summary>
Receive syncthing_client packets.
</summary>
@@ -62307,7 +62124,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="83755">
+<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="83878">
<summary>
Do not audit attempts to receive syncthing_client packets.
</summary>
@@ -62318,7 +62135,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_client_packets" lineno="83774">
+<interface name="corenet_sendrecv_syncthing_client_packets" lineno="83897">
<summary>
Send and receive syncthing_client packets.
</summary>
@@ -62329,7 +62146,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="83790">
+<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="83913">
<summary>
Do not audit attempts to send and receive syncthing_client packets.
</summary>
@@ -62340,7 +62157,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_client_packets" lineno="83805">
+<interface name="corenet_relabelto_syncthing_client_packets" lineno="83928">
<summary>
Relabel packets to syncthing_client the packet type.
</summary>
@@ -62350,7 +62167,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_server_packets" lineno="83825">
+<interface name="corenet_send_syncthing_server_packets" lineno="83948">
<summary>
Send syncthing_server packets.
</summary>
@@ -62361,7 +62178,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="83844">
+<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="83967">
<summary>
Do not audit attempts to send syncthing_server packets.
</summary>
@@ -62372,7 +62189,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_server_packets" lineno="83863">
+<interface name="corenet_receive_syncthing_server_packets" lineno="83986">
<summary>
Receive syncthing_server packets.
</summary>
@@ -62383,7 +62200,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="83882">
+<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84005">
<summary>
Do not audit attempts to receive syncthing_server packets.
</summary>
@@ -62394,7 +62211,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_server_packets" lineno="83901">
+<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84024">
<summary>
Send and receive syncthing_server packets.
</summary>
@@ -62405,7 +62222,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="83917">
+<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84040">
<summary>
Do not audit attempts to send and receive syncthing_server packets.
</summary>
@@ -62416,7 +62233,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_server_packets" lineno="83932">
+<interface name="corenet_relabelto_syncthing_server_packets" lineno="84055">
<summary>
Relabel packets to syncthing_server the packet type.
</summary>
@@ -62426,7 +62243,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="83954">
+<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84077">
<summary>
Send and receive TCP traffic on the syncthing_admin port.
</summary>
@@ -62437,7 +62254,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_syncthing_admin_port" lineno="83969">
+<interface name="corenet_udp_send_syncthing_admin_port" lineno="84092">
<summary>
Send UDP traffic on the syncthing_admin port.
</summary>
@@ -62448,7 +62265,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="83984">
+<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84107">
<summary>
Do not audit attempts to send UDP traffic on the syncthing_admin port.
</summary>
@@ -62459,7 +62276,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_syncthing_admin_port" lineno="83999">
+<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84122">
<summary>
Receive UDP traffic on the syncthing_admin port.
</summary>
@@ -62470,7 +62287,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84014">
+<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84137">
<summary>
Do not audit attempts to receive UDP traffic on the syncthing_admin port.
</summary>
@@ -62481,7 +62298,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84029">
+<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84152">
<summary>
Send and receive UDP traffic on the syncthing_admin port.
</summary>
@@ -62492,7 +62309,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84045">
+<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84168">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syncthing_admin port.
@@ -62504,7 +62321,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84060">
+<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84183">
<summary>
Bind TCP sockets to the syncthing_admin port.
</summary>
@@ -62515,7 +62332,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84080">
+<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84203">
<summary>
Bind UDP sockets to the syncthing_admin port.
</summary>
@@ -62526,7 +62343,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84099">
+<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84222">
<summary>
Make a TCP connection to the syncthing_admin port.
</summary>
@@ -62536,7 +62353,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_admin_client_packets" lineno="84119">
+<interface name="corenet_send_syncthing_admin_client_packets" lineno="84242">
<summary>
Send syncthing_admin_client packets.
</summary>
@@ -62547,7 +62364,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84138">
+<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84261">
<summary>
Do not audit attempts to send syncthing_admin_client packets.
</summary>
@@ -62558,7 +62375,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84157">
+<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84280">
<summary>
Receive syncthing_admin_client packets.
</summary>
@@ -62569,7 +62386,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84176">
+<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84299">
<summary>
Do not audit attempts to receive syncthing_admin_client packets.
</summary>
@@ -62580,7 +62397,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84195">
+<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84318">
<summary>
Send and receive syncthing_admin_client packets.
</summary>
@@ -62591,7 +62408,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84211">
+<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84334">
<summary>
Do not audit attempts to send and receive syncthing_admin_client packets.
</summary>
@@ -62602,7 +62419,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84226">
+<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84349">
<summary>
Relabel packets to syncthing_admin_client the packet type.
</summary>
@@ -62612,7 +62429,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_admin_server_packets" lineno="84246">
+<interface name="corenet_send_syncthing_admin_server_packets" lineno="84369">
<summary>
Send syncthing_admin_server packets.
</summary>
@@ -62623,7 +62440,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84265">
+<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84388">
<summary>
Do not audit attempts to send syncthing_admin_server packets.
</summary>
@@ -62634,7 +62451,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84284">
+<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84407">
<summary>
Receive syncthing_admin_server packets.
</summary>
@@ -62645,7 +62462,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84303">
+<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84426">
<summary>
Do not audit attempts to receive syncthing_admin_server packets.
</summary>
@@ -62656,7 +62473,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84322">
+<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84445">
<summary>
Send and receive syncthing_admin_server packets.
</summary>
@@ -62667,7 +62484,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84338">
+<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84461">
<summary>
Do not audit attempts to send and receive syncthing_admin_server packets.
</summary>
@@ -62678,7 +62495,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84353">
+<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84476">
<summary>
Relabel packets to syncthing_admin_server the packet type.
</summary>
@@ -62688,7 +62505,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84375">
+<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84498">
<summary>
Send and receive TCP traffic on the syncthing_discovery port.
</summary>
@@ -62699,7 +62516,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84390">
+<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84513">
<summary>
Send UDP traffic on the syncthing_discovery port.
</summary>
@@ -62710,7 +62527,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84405">
+<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84528">
<summary>
Do not audit attempts to send UDP traffic on the syncthing_discovery port.
</summary>
@@ -62721,7 +62538,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84420">
+<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84543">
<summary>
Receive UDP traffic on the syncthing_discovery port.
</summary>
@@ -62732,7 +62549,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84435">
+<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84558">
<summary>
Do not audit attempts to receive UDP traffic on the syncthing_discovery port.
</summary>
@@ -62743,7 +62560,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="84450">
+<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="84573">
<summary>
Send and receive UDP traffic on the syncthing_discovery port.
</summary>
@@ -62754,7 +62571,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="84466">
+<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="84589">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syncthing_discovery port.
@@ -62766,7 +62583,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="84481">
+<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="84604">
<summary>
Bind TCP sockets to the syncthing_discovery port.
</summary>
@@ -62777,7 +62594,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="84501">
+<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="84624">
<summary>
Bind UDP sockets to the syncthing_discovery port.
</summary>
@@ -62788,7 +62605,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="84520">
+<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="84643">
<summary>
Make a TCP connection to the syncthing_discovery port.
</summary>
@@ -62798,7 +62615,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_discovery_client_packets" lineno="84540">
+<interface name="corenet_send_syncthing_discovery_client_packets" lineno="84663">
<summary>
Send syncthing_discovery_client packets.
</summary>
@@ -62809,7 +62626,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="84559">
+<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="84682">
<summary>
Do not audit attempts to send syncthing_discovery_client packets.
</summary>
@@ -62820,7 +62637,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="84578">
+<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="84701">
<summary>
Receive syncthing_discovery_client packets.
</summary>
@@ -62831,7 +62648,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="84597">
+<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="84720">
<summary>
Do not audit attempts to receive syncthing_discovery_client packets.
</summary>
@@ -62842,7 +62659,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="84616">
+<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="84739">
<summary>
Send and receive syncthing_discovery_client packets.
</summary>
@@ -62853,7 +62670,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="84632">
+<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="84755">
<summary>
Do not audit attempts to send and receive syncthing_discovery_client packets.
</summary>
@@ -62864,7 +62681,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="84647">
+<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="84770">
<summary>
Relabel packets to syncthing_discovery_client the packet type.
</summary>
@@ -62874,7 +62691,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_discovery_server_packets" lineno="84667">
+<interface name="corenet_send_syncthing_discovery_server_packets" lineno="84790">
<summary>
Send syncthing_discovery_server packets.
</summary>
@@ -62885,7 +62702,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="84686">
+<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="84809">
<summary>
Do not audit attempts to send syncthing_discovery_server packets.
</summary>
@@ -62896,7 +62713,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="84705">
+<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="84828">
<summary>
Receive syncthing_discovery_server packets.
</summary>
@@ -62907,7 +62724,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="84724">
+<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="84847">
<summary>
Do not audit attempts to receive syncthing_discovery_server packets.
</summary>
@@ -62918,7 +62735,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="84743">
+<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="84866">
<summary>
Send and receive syncthing_discovery_server packets.
</summary>
@@ -62929,7 +62746,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="84759">
+<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="84882">
<summary>
Do not audit attempts to send and receive syncthing_discovery_server packets.
</summary>
@@ -62940,7 +62757,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="84774">
+<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="84897">
<summary>
Relabel packets to syncthing_discovery_server the packet type.
</summary>
@@ -62950,7 +62767,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="84796">
+<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="84919">
<summary>
Send and receive TCP traffic on the sype_transport port.
</summary>
@@ -62961,7 +62778,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_sype_transport_port" lineno="84811">
+<interface name="corenet_udp_send_sype_transport_port" lineno="84934">
<summary>
Send UDP traffic on the sype_transport port.
</summary>
@@ -62972,7 +62789,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="84826">
+<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="84949">
<summary>
Do not audit attempts to send UDP traffic on the sype_transport port.
</summary>
@@ -62983,7 +62800,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_sype_transport_port" lineno="84841">
+<interface name="corenet_udp_receive_sype_transport_port" lineno="84964">
<summary>
Receive UDP traffic on the sype_transport port.
</summary>
@@ -62994,7 +62811,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="84856">
+<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="84979">
<summary>
Do not audit attempts to receive UDP traffic on the sype_transport port.
</summary>
@@ -63005,7 +62822,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="84871">
+<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="84994">
<summary>
Send and receive UDP traffic on the sype_transport port.
</summary>
@@ -63016,7 +62833,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="84887">
+<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85010">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sype_transport port.
@@ -63028,7 +62845,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_sype_transport_port" lineno="84902">
+<interface name="corenet_tcp_bind_sype_transport_port" lineno="85025">
<summary>
Bind TCP sockets to the sype_transport port.
</summary>
@@ -63039,7 +62856,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sype_transport_port" lineno="84922">
+<interface name="corenet_udp_bind_sype_transport_port" lineno="85045">
<summary>
Bind UDP sockets to the sype_transport port.
</summary>
@@ -63050,7 +62867,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sype_transport_port" lineno="84941">
+<interface name="corenet_tcp_connect_sype_transport_port" lineno="85064">
<summary>
Make a TCP connection to the sype_transport port.
</summary>
@@ -63060,7 +62877,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sype_transport_client_packets" lineno="84961">
+<interface name="corenet_send_sype_transport_client_packets" lineno="85084">
<summary>
Send sype_transport_client packets.
</summary>
@@ -63071,7 +62888,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="84980">
+<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85103">
<summary>
Do not audit attempts to send sype_transport_client packets.
</summary>
@@ -63082,7 +62899,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sype_transport_client_packets" lineno="84999">
+<interface name="corenet_receive_sype_transport_client_packets" lineno="85122">
<summary>
Receive sype_transport_client packets.
</summary>
@@ -63093,7 +62910,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85018">
+<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85141">
<summary>
Do not audit attempts to receive sype_transport_client packets.
</summary>
@@ -63104,7 +62921,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85037">
+<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85160">
<summary>
Send and receive sype_transport_client packets.
</summary>
@@ -63115,7 +62932,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85053">
+<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85176">
<summary>
Do not audit attempts to send and receive sype_transport_client packets.
</summary>
@@ -63126,7 +62943,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85068">
+<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85191">
<summary>
Relabel packets to sype_transport_client the packet type.
</summary>
@@ -63136,7 +62953,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sype_transport_server_packets" lineno="85088">
+<interface name="corenet_send_sype_transport_server_packets" lineno="85211">
<summary>
Send sype_transport_server packets.
</summary>
@@ -63147,7 +62964,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85107">
+<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85230">
<summary>
Do not audit attempts to send sype_transport_server packets.
</summary>
@@ -63158,7 +62975,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sype_transport_server_packets" lineno="85126">
+<interface name="corenet_receive_sype_transport_server_packets" lineno="85249">
<summary>
Receive sype_transport_server packets.
</summary>
@@ -63169,7 +62986,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85145">
+<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85268">
<summary>
Do not audit attempts to receive sype_transport_server packets.
</summary>
@@ -63180,7 +62997,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85164">
+<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85287">
<summary>
Send and receive sype_transport_server packets.
</summary>
@@ -63191,7 +63008,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85180">
+<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85303">
<summary>
Do not audit attempts to send and receive sype_transport_server packets.
</summary>
@@ -63202,7 +63019,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85195">
+<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85318">
<summary>
Relabel packets to sype_transport_server the packet type.
</summary>
@@ -63212,7 +63029,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85217">
+<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85340">
<summary>
Send and receive TCP traffic on the syslogd port.
</summary>
@@ -63223,7 +63040,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_syslogd_port" lineno="85232">
+<interface name="corenet_udp_send_syslogd_port" lineno="85355">
<summary>
Send UDP traffic on the syslogd port.
</summary>
@@ -63234,7 +63051,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85247">
+<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85370">
<summary>
Do not audit attempts to send UDP traffic on the syslogd port.
</summary>
@@ -63245,7 +63062,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_syslogd_port" lineno="85262">
+<interface name="corenet_udp_receive_syslogd_port" lineno="85385">
<summary>
Receive UDP traffic on the syslogd port.
</summary>
@@ -63256,7 +63073,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85277">
+<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85400">
<summary>
Do not audit attempts to receive UDP traffic on the syslogd port.
</summary>
@@ -63267,7 +63084,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85292">
+<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85415">
<summary>
Send and receive UDP traffic on the syslogd port.
</summary>
@@ -63278,7 +63095,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85308">
+<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85431">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syslogd port.
@@ -63290,7 +63107,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_syslogd_port" lineno="85323">
+<interface name="corenet_tcp_bind_syslogd_port" lineno="85446">
<summary>
Bind TCP sockets to the syslogd port.
</summary>
@@ -63301,7 +63118,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syslogd_port" lineno="85343">
+<interface name="corenet_udp_bind_syslogd_port" lineno="85466">
<summary>
Bind UDP sockets to the syslogd port.
</summary>
@@ -63312,7 +63129,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syslogd_port" lineno="85362">
+<interface name="corenet_tcp_connect_syslogd_port" lineno="85485">
<summary>
Make a TCP connection to the syslogd port.
</summary>
@@ -63322,7 +63139,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslogd_client_packets" lineno="85382">
+<interface name="corenet_send_syslogd_client_packets" lineno="85505">
<summary>
Send syslogd_client packets.
</summary>
@@ -63333,7 +63150,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85401">
+<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85524">
<summary>
Do not audit attempts to send syslogd_client packets.
</summary>
@@ -63344,7 +63161,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslogd_client_packets" lineno="85420">
+<interface name="corenet_receive_syslogd_client_packets" lineno="85543">
<summary>
Receive syslogd_client packets.
</summary>
@@ -63355,7 +63172,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="85439">
+<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="85562">
<summary>
Do not audit attempts to receive syslogd_client packets.
</summary>
@@ -63366,7 +63183,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslogd_client_packets" lineno="85458">
+<interface name="corenet_sendrecv_syslogd_client_packets" lineno="85581">
<summary>
Send and receive syslogd_client packets.
</summary>
@@ -63377,7 +63194,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="85474">
+<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="85597">
<summary>
Do not audit attempts to send and receive syslogd_client packets.
</summary>
@@ -63388,7 +63205,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslogd_client_packets" lineno="85489">
+<interface name="corenet_relabelto_syslogd_client_packets" lineno="85612">
<summary>
Relabel packets to syslogd_client the packet type.
</summary>
@@ -63398,7 +63215,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslogd_server_packets" lineno="85509">
+<interface name="corenet_send_syslogd_server_packets" lineno="85632">
<summary>
Send syslogd_server packets.
</summary>
@@ -63409,7 +63226,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="85528">
+<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="85651">
<summary>
Do not audit attempts to send syslogd_server packets.
</summary>
@@ -63420,7 +63237,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslogd_server_packets" lineno="85547">
+<interface name="corenet_receive_syslogd_server_packets" lineno="85670">
<summary>
Receive syslogd_server packets.
</summary>
@@ -63431,7 +63248,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="85566">
+<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="85689">
<summary>
Do not audit attempts to receive syslogd_server packets.
</summary>
@@ -63442,7 +63259,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslogd_server_packets" lineno="85585">
+<interface name="corenet_sendrecv_syslogd_server_packets" lineno="85708">
<summary>
Send and receive syslogd_server packets.
</summary>
@@ -63453,7 +63270,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="85601">
+<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="85724">
<summary>
Do not audit attempts to send and receive syslogd_server packets.
</summary>
@@ -63464,7 +63281,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslogd_server_packets" lineno="85616">
+<interface name="corenet_relabelto_syslogd_server_packets" lineno="85739">
<summary>
Relabel packets to syslogd_server the packet type.
</summary>
@@ -63474,7 +63291,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="85638">
+<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="85761">
<summary>
Send and receive TCP traffic on the syslog_tls port.
</summary>
@@ -63485,7 +63302,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_syslog_tls_port" lineno="85653">
+<interface name="corenet_udp_send_syslog_tls_port" lineno="85776">
<summary>
Send UDP traffic on the syslog_tls port.
</summary>
@@ -63496,7 +63313,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="85668">
+<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="85791">
<summary>
Do not audit attempts to send UDP traffic on the syslog_tls port.
</summary>
@@ -63507,7 +63324,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_syslog_tls_port" lineno="85683">
+<interface name="corenet_udp_receive_syslog_tls_port" lineno="85806">
<summary>
Receive UDP traffic on the syslog_tls port.
</summary>
@@ -63518,7 +63335,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="85698">
+<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="85821">
<summary>
Do not audit attempts to receive UDP traffic on the syslog_tls port.
</summary>
@@ -63529,7 +63346,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="85713">
+<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="85836">
<summary>
Send and receive UDP traffic on the syslog_tls port.
</summary>
@@ -63540,7 +63357,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="85729">
+<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="85852">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syslog_tls port.
@@ -63552,7 +63369,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_syslog_tls_port" lineno="85744">
+<interface name="corenet_tcp_bind_syslog_tls_port" lineno="85867">
<summary>
Bind TCP sockets to the syslog_tls port.
</summary>
@@ -63563,7 +63380,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syslog_tls_port" lineno="85764">
+<interface name="corenet_udp_bind_syslog_tls_port" lineno="85887">
<summary>
Bind UDP sockets to the syslog_tls port.
</summary>
@@ -63574,7 +63391,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syslog_tls_port" lineno="85783">
+<interface name="corenet_tcp_connect_syslog_tls_port" lineno="85906">
<summary>
Make a TCP connection to the syslog_tls port.
</summary>
@@ -63584,7 +63401,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslog_tls_client_packets" lineno="85803">
+<interface name="corenet_send_syslog_tls_client_packets" lineno="85926">
<summary>
Send syslog_tls_client packets.
</summary>
@@ -63595,7 +63412,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="85822">
+<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="85945">
<summary>
Do not audit attempts to send syslog_tls_client packets.
</summary>
@@ -63606,7 +63423,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslog_tls_client_packets" lineno="85841">
+<interface name="corenet_receive_syslog_tls_client_packets" lineno="85964">
<summary>
Receive syslog_tls_client packets.
</summary>
@@ -63617,7 +63434,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="85860">
+<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="85983">
<summary>
Do not audit attempts to receive syslog_tls_client packets.
</summary>
@@ -63628,7 +63445,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="85879">
+<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86002">
<summary>
Send and receive syslog_tls_client packets.
</summary>
@@ -63639,7 +63456,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="85895">
+<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86018">
<summary>
Do not audit attempts to send and receive syslog_tls_client packets.
</summary>
@@ -63650,7 +63467,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="85910">
+<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86033">
<summary>
Relabel packets to syslog_tls_client the packet type.
</summary>
@@ -63660,7 +63477,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslog_tls_server_packets" lineno="85930">
+<interface name="corenet_send_syslog_tls_server_packets" lineno="86053">
<summary>
Send syslog_tls_server packets.
</summary>
@@ -63671,7 +63488,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="85949">
+<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86072">
<summary>
Do not audit attempts to send syslog_tls_server packets.
</summary>
@@ -63682,7 +63499,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslog_tls_server_packets" lineno="85968">
+<interface name="corenet_receive_syslog_tls_server_packets" lineno="86091">
<summary>
Receive syslog_tls_server packets.
</summary>
@@ -63693,7 +63510,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="85987">
+<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86110">
<summary>
Do not audit attempts to receive syslog_tls_server packets.
</summary>
@@ -63704,7 +63521,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86006">
+<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86129">
<summary>
Send and receive syslog_tls_server packets.
</summary>
@@ -63715,7 +63532,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86022">
+<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86145">
<summary>
Do not audit attempts to send and receive syslog_tls_server packets.
</summary>
@@ -63726,7 +63543,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86037">
+<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86160">
<summary>
Relabel packets to syslog_tls_server the packet type.
</summary>
@@ -63736,7 +63553,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86059">
+<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86182">
<summary>
Send and receive TCP traffic on the tcs port.
</summary>
@@ -63747,7 +63564,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_tcs_port" lineno="86074">
+<interface name="corenet_udp_send_tcs_port" lineno="86197">
<summary>
Send UDP traffic on the tcs port.
</summary>
@@ -63758,7 +63575,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86089">
+<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86212">
<summary>
Do not audit attempts to send UDP traffic on the tcs port.
</summary>
@@ -63769,7 +63586,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_tcs_port" lineno="86104">
+<interface name="corenet_udp_receive_tcs_port" lineno="86227">
<summary>
Receive UDP traffic on the tcs port.
</summary>
@@ -63780,7 +63597,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86119">
+<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86242">
<summary>
Do not audit attempts to receive UDP traffic on the tcs port.
</summary>
@@ -63791,7 +63608,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_tcs_port" lineno="86134">
+<interface name="corenet_udp_sendrecv_tcs_port" lineno="86257">
<summary>
Send and receive UDP traffic on the tcs port.
</summary>
@@ -63802,7 +63619,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86150">
+<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86273">
<summary>
Do not audit attempts to send and receive
UDP traffic on the tcs port.
@@ -63814,7 +63631,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_tcs_port" lineno="86165">
+<interface name="corenet_tcp_bind_tcs_port" lineno="86288">
<summary>
Bind TCP sockets to the tcs port.
</summary>
@@ -63825,7 +63642,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_tcs_port" lineno="86185">
+<interface name="corenet_udp_bind_tcs_port" lineno="86308">
<summary>
Bind UDP sockets to the tcs port.
</summary>
@@ -63836,7 +63653,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_tcs_port" lineno="86204">
+<interface name="corenet_tcp_connect_tcs_port" lineno="86327">
<summary>
Make a TCP connection to the tcs port.
</summary>
@@ -63846,7 +63663,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tcs_client_packets" lineno="86224">
+<interface name="corenet_send_tcs_client_packets" lineno="86347">
<summary>
Send tcs_client packets.
</summary>
@@ -63857,7 +63674,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86243">
+<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86366">
<summary>
Do not audit attempts to send tcs_client packets.
</summary>
@@ -63868,7 +63685,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tcs_client_packets" lineno="86262">
+<interface name="corenet_receive_tcs_client_packets" lineno="86385">
<summary>
Receive tcs_client packets.
</summary>
@@ -63879,7 +63696,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86281">
+<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86404">
<summary>
Do not audit attempts to receive tcs_client packets.
</summary>
@@ -63890,7 +63707,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tcs_client_packets" lineno="86300">
+<interface name="corenet_sendrecv_tcs_client_packets" lineno="86423">
<summary>
Send and receive tcs_client packets.
</summary>
@@ -63901,7 +63718,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86316">
+<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86439">
<summary>
Do not audit attempts to send and receive tcs_client packets.
</summary>
@@ -63912,7 +63729,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tcs_client_packets" lineno="86331">
+<interface name="corenet_relabelto_tcs_client_packets" lineno="86454">
<summary>
Relabel packets to tcs_client the packet type.
</summary>
@@ -63922,7 +63739,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tcs_server_packets" lineno="86351">
+<interface name="corenet_send_tcs_server_packets" lineno="86474">
<summary>
Send tcs_server packets.
</summary>
@@ -63933,7 +63750,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86370">
+<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86493">
<summary>
Do not audit attempts to send tcs_server packets.
</summary>
@@ -63944,7 +63761,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tcs_server_packets" lineno="86389">
+<interface name="corenet_receive_tcs_server_packets" lineno="86512">
<summary>
Receive tcs_server packets.
</summary>
@@ -63955,7 +63772,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86408">
+<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86531">
<summary>
Do not audit attempts to receive tcs_server packets.
</summary>
@@ -63966,7 +63783,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tcs_server_packets" lineno="86427">
+<interface name="corenet_sendrecv_tcs_server_packets" lineno="86550">
<summary>
Send and receive tcs_server packets.
</summary>
@@ -63977,7 +63794,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="86443">
+<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="86566">
<summary>
Do not audit attempts to send and receive tcs_server packets.
</summary>
@@ -63988,7 +63805,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tcs_server_packets" lineno="86458">
+<interface name="corenet_relabelto_tcs_server_packets" lineno="86581">
<summary>
Relabel packets to tcs_server the packet type.
</summary>
@@ -63998,7 +63815,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="86480">
+<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="86603">
<summary>
Send and receive TCP traffic on the telnetd port.
</summary>
@@ -64009,7 +63826,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_telnetd_port" lineno="86495">
+<interface name="corenet_udp_send_telnetd_port" lineno="86618">
<summary>
Send UDP traffic on the telnetd port.
</summary>
@@ -64020,7 +63837,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="86510">
+<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="86633">
<summary>
Do not audit attempts to send UDP traffic on the telnetd port.
</summary>
@@ -64031,7 +63848,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_telnetd_port" lineno="86525">
+<interface name="corenet_udp_receive_telnetd_port" lineno="86648">
<summary>
Receive UDP traffic on the telnetd port.
</summary>
@@ -64042,7 +63859,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="86540">
+<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="86663">
<summary>
Do not audit attempts to receive UDP traffic on the telnetd port.
</summary>
@@ -64053,7 +63870,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_telnetd_port" lineno="86555">
+<interface name="corenet_udp_sendrecv_telnetd_port" lineno="86678">
<summary>
Send and receive UDP traffic on the telnetd port.
</summary>
@@ -64064,7 +63881,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="86571">
+<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="86694">
<summary>
Do not audit attempts to send and receive
UDP traffic on the telnetd port.
@@ -64076,7 +63893,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_telnetd_port" lineno="86586">
+<interface name="corenet_tcp_bind_telnetd_port" lineno="86709">
<summary>
Bind TCP sockets to the telnetd port.
</summary>
@@ -64087,7 +63904,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_telnetd_port" lineno="86606">
+<interface name="corenet_udp_bind_telnetd_port" lineno="86729">
<summary>
Bind UDP sockets to the telnetd port.
</summary>
@@ -64098,7 +63915,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_telnetd_port" lineno="86625">
+<interface name="corenet_tcp_connect_telnetd_port" lineno="86748">
<summary>
Make a TCP connection to the telnetd port.
</summary>
@@ -64108,7 +63925,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_telnetd_client_packets" lineno="86645">
+<interface name="corenet_send_telnetd_client_packets" lineno="86768">
<summary>
Send telnetd_client packets.
</summary>
@@ -64119,7 +63936,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="86664">
+<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="86787">
<summary>
Do not audit attempts to send telnetd_client packets.
</summary>
@@ -64130,7 +63947,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_telnetd_client_packets" lineno="86683">
+<interface name="corenet_receive_telnetd_client_packets" lineno="86806">
<summary>
Receive telnetd_client packets.
</summary>
@@ -64141,7 +63958,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="86702">
+<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="86825">
<summary>
Do not audit attempts to receive telnetd_client packets.
</summary>
@@ -64152,7 +63969,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_telnetd_client_packets" lineno="86721">
+<interface name="corenet_sendrecv_telnetd_client_packets" lineno="86844">
<summary>
Send and receive telnetd_client packets.
</summary>
@@ -64163,7 +63980,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="86737">
+<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="86860">
<summary>
Do not audit attempts to send and receive telnetd_client packets.
</summary>
@@ -64174,7 +63991,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_telnetd_client_packets" lineno="86752">
+<interface name="corenet_relabelto_telnetd_client_packets" lineno="86875">
<summary>
Relabel packets to telnetd_client the packet type.
</summary>
@@ -64184,7 +64001,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_telnetd_server_packets" lineno="86772">
+<interface name="corenet_send_telnetd_server_packets" lineno="86895">
<summary>
Send telnetd_server packets.
</summary>
@@ -64195,7 +64012,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="86791">
+<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="86914">
<summary>
Do not audit attempts to send telnetd_server packets.
</summary>
@@ -64206,7 +64023,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_telnetd_server_packets" lineno="86810">
+<interface name="corenet_receive_telnetd_server_packets" lineno="86933">
<summary>
Receive telnetd_server packets.
</summary>
@@ -64217,7 +64034,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="86829">
+<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="86952">
<summary>
Do not audit attempts to receive telnetd_server packets.
</summary>
@@ -64228,7 +64045,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_telnetd_server_packets" lineno="86848">
+<interface name="corenet_sendrecv_telnetd_server_packets" lineno="86971">
<summary>
Send and receive telnetd_server packets.
</summary>
@@ -64239,7 +64056,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="86864">
+<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="86987">
<summary>
Do not audit attempts to send and receive telnetd_server packets.
</summary>
@@ -64250,7 +64067,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_telnetd_server_packets" lineno="86879">
+<interface name="corenet_relabelto_telnetd_server_packets" lineno="87002">
<summary>
Relabel packets to telnetd_server the packet type.
</summary>
@@ -64260,7 +64077,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_tftp_port" lineno="86901">
+<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87024">
<summary>
Send and receive TCP traffic on the tftp port.
</summary>
@@ -64271,7 +64088,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_tftp_port" lineno="86916">
+<interface name="corenet_udp_send_tftp_port" lineno="87039">
<summary>
Send UDP traffic on the tftp port.
</summary>
@@ -64282,7 +64099,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="86931">
+<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87054">
<summary>
Do not audit attempts to send UDP traffic on the tftp port.
</summary>
@@ -64293,7 +64110,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_tftp_port" lineno="86946">
+<interface name="corenet_udp_receive_tftp_port" lineno="87069">
<summary>
Receive UDP traffic on the tftp port.
</summary>
@@ -64304,7 +64121,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="86961">
+<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87084">
<summary>
Do not audit attempts to receive UDP traffic on the tftp port.
</summary>
@@ -64315,7 +64132,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_tftp_port" lineno="86976">
+<interface name="corenet_udp_sendrecv_tftp_port" lineno="87099">
<summary>
Send and receive UDP traffic on the tftp port.
</summary>
@@ -64326,7 +64143,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="86992">
+<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87115">
<summary>
Do not audit attempts to send and receive
UDP traffic on the tftp port.
@@ -64338,7 +64155,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_tftp_port" lineno="87007">
+<interface name="corenet_tcp_bind_tftp_port" lineno="87130">
<summary>
Bind TCP sockets to the tftp port.
</summary>
@@ -64349,7 +64166,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_tftp_port" lineno="87027">
+<interface name="corenet_udp_bind_tftp_port" lineno="87150">
<summary>
Bind UDP sockets to the tftp port.
</summary>
@@ -64360,7 +64177,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_tftp_port" lineno="87046">
+<interface name="corenet_tcp_connect_tftp_port" lineno="87169">
<summary>
Make a TCP connection to the tftp port.
</summary>
@@ -64370,7 +64187,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tftp_client_packets" lineno="87066">
+<interface name="corenet_send_tftp_client_packets" lineno="87189">
<summary>
Send tftp_client packets.
</summary>
@@ -64381,7 +64198,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87085">
+<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87208">
<summary>
Do not audit attempts to send tftp_client packets.
</summary>
@@ -64392,7 +64209,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tftp_client_packets" lineno="87104">
+<interface name="corenet_receive_tftp_client_packets" lineno="87227">
<summary>
Receive tftp_client packets.
</summary>
@@ -64403,7 +64220,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87123">
+<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87246">
<summary>
Do not audit attempts to receive tftp_client packets.
</summary>
@@ -64414,7 +64231,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tftp_client_packets" lineno="87142">
+<interface name="corenet_sendrecv_tftp_client_packets" lineno="87265">
<summary>
Send and receive tftp_client packets.
</summary>
@@ -64425,7 +64242,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87158">
+<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87281">
<summary>
Do not audit attempts to send and receive tftp_client packets.
</summary>
@@ -64436,7 +64253,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tftp_client_packets" lineno="87173">
+<interface name="corenet_relabelto_tftp_client_packets" lineno="87296">
<summary>
Relabel packets to tftp_client the packet type.
</summary>
@@ -64446,7 +64263,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tftp_server_packets" lineno="87193">
+<interface name="corenet_send_tftp_server_packets" lineno="87316">
<summary>
Send tftp_server packets.
</summary>
@@ -64457,7 +64274,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87212">
+<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87335">
<summary>
Do not audit attempts to send tftp_server packets.
</summary>
@@ -64468,7 +64285,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tftp_server_packets" lineno="87231">
+<interface name="corenet_receive_tftp_server_packets" lineno="87354">
<summary>
Receive tftp_server packets.
</summary>
@@ -64479,7 +64296,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87250">
+<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87373">
<summary>
Do not audit attempts to receive tftp_server packets.
</summary>
@@ -64490,7 +64307,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tftp_server_packets" lineno="87269">
+<interface name="corenet_sendrecv_tftp_server_packets" lineno="87392">
<summary>
Send and receive tftp_server packets.
</summary>
@@ -64501,7 +64318,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87285">
+<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87408">
<summary>
Do not audit attempts to send and receive tftp_server packets.
</summary>
@@ -64512,7 +64329,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tftp_server_packets" lineno="87300">
+<interface name="corenet_relabelto_tftp_server_packets" lineno="87423">
<summary>
Relabel packets to tftp_server the packet type.
</summary>
@@ -64522,7 +64339,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_tor_port" lineno="87322">
+<interface name="corenet_tcp_sendrecv_tor_port" lineno="87445">
<summary>
Send and receive TCP traffic on the tor port.
</summary>
@@ -64533,7 +64350,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_tor_port" lineno="87337">
+<interface name="corenet_udp_send_tor_port" lineno="87460">
<summary>
Send UDP traffic on the tor port.
</summary>
@@ -64544,7 +64361,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87352">
+<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87475">
<summary>
Do not audit attempts to send UDP traffic on the tor port.
</summary>
@@ -64555,7 +64372,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_tor_port" lineno="87367">
+<interface name="corenet_udp_receive_tor_port" lineno="87490">
<summary>
Receive UDP traffic on the tor port.
</summary>
@@ -64566,7 +64383,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87382">
+<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87505">
<summary>
Do not audit attempts to receive UDP traffic on the tor port.
</summary>
@@ -64577,7 +64394,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_tor_port" lineno="87397">
+<interface name="corenet_udp_sendrecv_tor_port" lineno="87520">
<summary>
Send and receive UDP traffic on the tor port.
</summary>
@@ -64588,7 +64405,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87413">
+<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87536">
<summary>
Do not audit attempts to send and receive
UDP traffic on the tor port.
@@ -64600,7 +64417,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_tor_port" lineno="87428">
+<interface name="corenet_tcp_bind_tor_port" lineno="87551">
<summary>
Bind TCP sockets to the tor port.
</summary>
@@ -64611,7 +64428,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_tor_port" lineno="87448">
+<interface name="corenet_udp_bind_tor_port" lineno="87571">
<summary>
Bind UDP sockets to the tor port.
</summary>
@@ -64622,7 +64439,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_tor_port" lineno="87467">
+<interface name="corenet_tcp_connect_tor_port" lineno="87590">
<summary>
Make a TCP connection to the tor port.
</summary>
@@ -64632,7 +64449,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tor_client_packets" lineno="87487">
+<interface name="corenet_send_tor_client_packets" lineno="87610">
<summary>
Send tor_client packets.
</summary>
@@ -64643,7 +64460,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tor_client_packets" lineno="87506">
+<interface name="corenet_dontaudit_send_tor_client_packets" lineno="87629">
<summary>
Do not audit attempts to send tor_client packets.
</summary>
@@ -64654,7 +64471,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tor_client_packets" lineno="87525">
+<interface name="corenet_receive_tor_client_packets" lineno="87648">
<summary>
Receive tor_client packets.
</summary>
@@ -64665,7 +64482,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="87544">
+<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="87667">
<summary>
Do not audit attempts to receive tor_client packets.
</summary>
@@ -64676,7 +64493,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tor_client_packets" lineno="87563">
+<interface name="corenet_sendrecv_tor_client_packets" lineno="87686">
<summary>
Send and receive tor_client packets.
</summary>
@@ -64687,7 +64504,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="87579">
+<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="87702">
<summary>
Do not audit attempts to send and receive tor_client packets.
</summary>
@@ -64698,7 +64515,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tor_client_packets" lineno="87594">
+<interface name="corenet_relabelto_tor_client_packets" lineno="87717">
<summary>
Relabel packets to tor_client the packet type.
</summary>
@@ -64708,7 +64525,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tor_server_packets" lineno="87614">
+<interface name="corenet_send_tor_server_packets" lineno="87737">
<summary>
Send tor_server packets.
</summary>
@@ -64719,7 +64536,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tor_server_packets" lineno="87633">
+<interface name="corenet_dontaudit_send_tor_server_packets" lineno="87756">
<summary>
Do not audit attempts to send tor_server packets.
</summary>
@@ -64730,7 +64547,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tor_server_packets" lineno="87652">
+<interface name="corenet_receive_tor_server_packets" lineno="87775">
<summary>
Receive tor_server packets.
</summary>
@@ -64741,7 +64558,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="87671">
+<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="87794">
<summary>
Do not audit attempts to receive tor_server packets.
</summary>
@@ -64752,7 +64569,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tor_server_packets" lineno="87690">
+<interface name="corenet_sendrecv_tor_server_packets" lineno="87813">
<summary>
Send and receive tor_server packets.
</summary>
@@ -64763,7 +64580,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="87706">
+<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="87829">
<summary>
Do not audit attempts to send and receive tor_server packets.
</summary>
@@ -64774,7 +64591,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tor_server_packets" lineno="87721">
+<interface name="corenet_relabelto_tor_server_packets" lineno="87844">
<summary>
Relabel packets to tor_server the packet type.
</summary>
@@ -64784,7 +64601,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="87743">
+<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="87866">
<summary>
Send and receive TCP traffic on the traceroute port.
</summary>
@@ -64795,7 +64612,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_traceroute_port" lineno="87758">
+<interface name="corenet_udp_send_traceroute_port" lineno="87881">
<summary>
Send UDP traffic on the traceroute port.
</summary>
@@ -64806,7 +64623,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="87773">
+<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="87896">
<summary>
Do not audit attempts to send UDP traffic on the traceroute port.
</summary>
@@ -64817,7 +64634,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_traceroute_port" lineno="87788">
+<interface name="corenet_udp_receive_traceroute_port" lineno="87911">
<summary>
Receive UDP traffic on the traceroute port.
</summary>
@@ -64828,7 +64645,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="87803">
+<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="87926">
<summary>
Do not audit attempts to receive UDP traffic on the traceroute port.
</summary>
@@ -64839,7 +64656,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_traceroute_port" lineno="87818">
+<interface name="corenet_udp_sendrecv_traceroute_port" lineno="87941">
<summary>
Send and receive UDP traffic on the traceroute port.
</summary>
@@ -64850,7 +64667,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="87834">
+<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="87957">
<summary>
Do not audit attempts to send and receive
UDP traffic on the traceroute port.
@@ -64862,7 +64679,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_traceroute_port" lineno="87849">
+<interface name="corenet_tcp_bind_traceroute_port" lineno="87972">
<summary>
Bind TCP sockets to the traceroute port.
</summary>
@@ -64873,7 +64690,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_traceroute_port" lineno="87869">
+<interface name="corenet_udp_bind_traceroute_port" lineno="87992">
<summary>
Bind UDP sockets to the traceroute port.
</summary>
@@ -64884,7 +64701,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_traceroute_port" lineno="87888">
+<interface name="corenet_tcp_connect_traceroute_port" lineno="88011">
<summary>
Make a TCP connection to the traceroute port.
</summary>
@@ -64894,7 +64711,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_traceroute_client_packets" lineno="87908">
+<interface name="corenet_send_traceroute_client_packets" lineno="88031">
<summary>
Send traceroute_client packets.
</summary>
@@ -64905,7 +64722,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="87927">
+<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88050">
<summary>
Do not audit attempts to send traceroute_client packets.
</summary>
@@ -64916,7 +64733,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_traceroute_client_packets" lineno="87946">
+<interface name="corenet_receive_traceroute_client_packets" lineno="88069">
<summary>
Receive traceroute_client packets.
</summary>
@@ -64927,7 +64744,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="87965">
+<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88088">
<summary>
Do not audit attempts to receive traceroute_client packets.
</summary>
@@ -64938,7 +64755,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_traceroute_client_packets" lineno="87984">
+<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88107">
<summary>
Send and receive traceroute_client packets.
</summary>
@@ -64949,7 +64766,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88000">
+<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88123">
<summary>
Do not audit attempts to send and receive traceroute_client packets.
</summary>
@@ -64960,7 +64777,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_traceroute_client_packets" lineno="88015">
+<interface name="corenet_relabelto_traceroute_client_packets" lineno="88138">
<summary>
Relabel packets to traceroute_client the packet type.
</summary>
@@ -64970,7 +64787,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_traceroute_server_packets" lineno="88035">
+<interface name="corenet_send_traceroute_server_packets" lineno="88158">
<summary>
Send traceroute_server packets.
</summary>
@@ -64981,7 +64798,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88054">
+<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88177">
<summary>
Do not audit attempts to send traceroute_server packets.
</summary>
@@ -64992,7 +64809,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_traceroute_server_packets" lineno="88073">
+<interface name="corenet_receive_traceroute_server_packets" lineno="88196">
<summary>
Receive traceroute_server packets.
</summary>
@@ -65003,7 +64820,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88092">
+<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88215">
<summary>
Do not audit attempts to receive traceroute_server packets.
</summary>
@@ -65014,7 +64831,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88111">
+<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88234">
<summary>
Send and receive traceroute_server packets.
</summary>
@@ -65025,7 +64842,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88127">
+<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88250">
<summary>
Do not audit attempts to send and receive traceroute_server packets.
</summary>
@@ -65036,7 +64853,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_traceroute_server_packets" lineno="88142">
+<interface name="corenet_relabelto_traceroute_server_packets" lineno="88265">
<summary>
Relabel packets to traceroute_server the packet type.
</summary>
@@ -65046,7 +64863,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88164">
+<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88287">
<summary>
Send and receive TCP traffic on the transproxy port.
</summary>
@@ -65057,7 +64874,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_transproxy_port" lineno="88179">
+<interface name="corenet_udp_send_transproxy_port" lineno="88302">
<summary>
Send UDP traffic on the transproxy port.
</summary>
@@ -65068,7 +64885,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88194">
+<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88317">
<summary>
Do not audit attempts to send UDP traffic on the transproxy port.
</summary>
@@ -65079,7 +64896,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_transproxy_port" lineno="88209">
+<interface name="corenet_udp_receive_transproxy_port" lineno="88332">
<summary>
Receive UDP traffic on the transproxy port.
</summary>
@@ -65090,7 +64907,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88224">
+<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88347">
<summary>
Do not audit attempts to receive UDP traffic on the transproxy port.
</summary>
@@ -65101,7 +64918,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88239">
+<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88362">
<summary>
Send and receive UDP traffic on the transproxy port.
</summary>
@@ -65112,7 +64929,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88255">
+<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88378">
<summary>
Do not audit attempts to send and receive
UDP traffic on the transproxy port.
@@ -65124,7 +64941,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_transproxy_port" lineno="88270">
+<interface name="corenet_tcp_bind_transproxy_port" lineno="88393">
<summary>
Bind TCP sockets to the transproxy port.
</summary>
@@ -65135,7 +64952,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_transproxy_port" lineno="88290">
+<interface name="corenet_udp_bind_transproxy_port" lineno="88413">
<summary>
Bind UDP sockets to the transproxy port.
</summary>
@@ -65146,7 +64963,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_transproxy_port" lineno="88309">
+<interface name="corenet_tcp_connect_transproxy_port" lineno="88432">
<summary>
Make a TCP connection to the transproxy port.
</summary>
@@ -65156,7 +64973,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_transproxy_client_packets" lineno="88329">
+<interface name="corenet_send_transproxy_client_packets" lineno="88452">
<summary>
Send transproxy_client packets.
</summary>
@@ -65167,7 +64984,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88348">
+<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88471">
<summary>
Do not audit attempts to send transproxy_client packets.
</summary>
@@ -65178,7 +64995,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_transproxy_client_packets" lineno="88367">
+<interface name="corenet_receive_transproxy_client_packets" lineno="88490">
<summary>
Receive transproxy_client packets.
</summary>
@@ -65189,7 +65006,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88386">
+<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88509">
<summary>
Do not audit attempts to receive transproxy_client packets.
</summary>
@@ -65200,7 +65017,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88405">
+<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88528">
<summary>
Send and receive transproxy_client packets.
</summary>
@@ -65211,7 +65028,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88421">
+<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88544">
<summary>
Do not audit attempts to send and receive transproxy_client packets.
</summary>
@@ -65222,7 +65039,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_transproxy_client_packets" lineno="88436">
+<interface name="corenet_relabelto_transproxy_client_packets" lineno="88559">
<summary>
Relabel packets to transproxy_client the packet type.
</summary>
@@ -65232,7 +65049,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_transproxy_server_packets" lineno="88456">
+<interface name="corenet_send_transproxy_server_packets" lineno="88579">
<summary>
Send transproxy_server packets.
</summary>
@@ -65243,7 +65060,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="88475">
+<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="88598">
<summary>
Do not audit attempts to send transproxy_server packets.
</summary>
@@ -65254,7 +65071,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_transproxy_server_packets" lineno="88494">
+<interface name="corenet_receive_transproxy_server_packets" lineno="88617">
<summary>
Receive transproxy_server packets.
</summary>
@@ -65265,7 +65082,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="88513">
+<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="88636">
<summary>
Do not audit attempts to receive transproxy_server packets.
</summary>
@@ -65276,7 +65093,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_transproxy_server_packets" lineno="88532">
+<interface name="corenet_sendrecv_transproxy_server_packets" lineno="88655">
<summary>
Send and receive transproxy_server packets.
</summary>
@@ -65287,7 +65104,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="88548">
+<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="88671">
<summary>
Do not audit attempts to send and receive transproxy_server packets.
</summary>
@@ -65298,7 +65115,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_transproxy_server_packets" lineno="88563">
+<interface name="corenet_relabelto_transproxy_server_packets" lineno="88686">
<summary>
Relabel packets to transproxy_server the packet type.
</summary>
@@ -65308,7 +65125,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="88585">
+<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="88708">
<summary>
Send and receive TCP traffic on the trisoap port.
</summary>
@@ -65319,7 +65136,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_trisoap_port" lineno="88600">
+<interface name="corenet_udp_send_trisoap_port" lineno="88723">
<summary>
Send UDP traffic on the trisoap port.
</summary>
@@ -65330,7 +65147,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="88615">
+<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="88738">
<summary>
Do not audit attempts to send UDP traffic on the trisoap port.
</summary>
@@ -65341,7 +65158,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_trisoap_port" lineno="88630">
+<interface name="corenet_udp_receive_trisoap_port" lineno="88753">
<summary>
Receive UDP traffic on the trisoap port.
</summary>
@@ -65352,7 +65169,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="88645">
+<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="88768">
<summary>
Do not audit attempts to receive UDP traffic on the trisoap port.
</summary>
@@ -65363,7 +65180,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_trisoap_port" lineno="88660">
+<interface name="corenet_udp_sendrecv_trisoap_port" lineno="88783">
<summary>
Send and receive UDP traffic on the trisoap port.
</summary>
@@ -65374,7 +65191,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="88676">
+<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="88799">
<summary>
Do not audit attempts to send and receive
UDP traffic on the trisoap port.
@@ -65386,7 +65203,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_trisoap_port" lineno="88691">
+<interface name="corenet_tcp_bind_trisoap_port" lineno="88814">
<summary>
Bind TCP sockets to the trisoap port.
</summary>
@@ -65397,7 +65214,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_trisoap_port" lineno="88711">
+<interface name="corenet_udp_bind_trisoap_port" lineno="88834">
<summary>
Bind UDP sockets to the trisoap port.
</summary>
@@ -65408,7 +65225,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_trisoap_port" lineno="88730">
+<interface name="corenet_tcp_connect_trisoap_port" lineno="88853">
<summary>
Make a TCP connection to the trisoap port.
</summary>
@@ -65418,7 +65235,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trisoap_client_packets" lineno="88750">
+<interface name="corenet_send_trisoap_client_packets" lineno="88873">
<summary>
Send trisoap_client packets.
</summary>
@@ -65429,7 +65246,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="88769">
+<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="88892">
<summary>
Do not audit attempts to send trisoap_client packets.
</summary>
@@ -65440,7 +65257,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trisoap_client_packets" lineno="88788">
+<interface name="corenet_receive_trisoap_client_packets" lineno="88911">
<summary>
Receive trisoap_client packets.
</summary>
@@ -65451,7 +65268,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="88807">
+<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="88930">
<summary>
Do not audit attempts to receive trisoap_client packets.
</summary>
@@ -65462,7 +65279,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trisoap_client_packets" lineno="88826">
+<interface name="corenet_sendrecv_trisoap_client_packets" lineno="88949">
<summary>
Send and receive trisoap_client packets.
</summary>
@@ -65473,7 +65290,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="88842">
+<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="88965">
<summary>
Do not audit attempts to send and receive trisoap_client packets.
</summary>
@@ -65484,7 +65301,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trisoap_client_packets" lineno="88857">
+<interface name="corenet_relabelto_trisoap_client_packets" lineno="88980">
<summary>
Relabel packets to trisoap_client the packet type.
</summary>
@@ -65494,7 +65311,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trisoap_server_packets" lineno="88877">
+<interface name="corenet_send_trisoap_server_packets" lineno="89000">
<summary>
Send trisoap_server packets.
</summary>
@@ -65505,7 +65322,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="88896">
+<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89019">
<summary>
Do not audit attempts to send trisoap_server packets.
</summary>
@@ -65516,7 +65333,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trisoap_server_packets" lineno="88915">
+<interface name="corenet_receive_trisoap_server_packets" lineno="89038">
<summary>
Receive trisoap_server packets.
</summary>
@@ -65527,7 +65344,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="88934">
+<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89057">
<summary>
Do not audit attempts to receive trisoap_server packets.
</summary>
@@ -65538,7 +65355,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trisoap_server_packets" lineno="88953">
+<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89076">
<summary>
Send and receive trisoap_server packets.
</summary>
@@ -65549,7 +65366,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="88969">
+<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89092">
<summary>
Do not audit attempts to send and receive trisoap_server packets.
</summary>
@@ -65560,7 +65377,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trisoap_server_packets" lineno="88984">
+<interface name="corenet_relabelto_trisoap_server_packets" lineno="89107">
<summary>
Relabel packets to trisoap_server the packet type.
</summary>
@@ -65570,7 +65387,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89006">
+<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89129">
<summary>
Send and receive TCP traffic on the trivnet1 port.
</summary>
@@ -65581,7 +65398,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_trivnet1_port" lineno="89021">
+<interface name="corenet_udp_send_trivnet1_port" lineno="89144">
<summary>
Send UDP traffic on the trivnet1 port.
</summary>
@@ -65592,7 +65409,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89036">
+<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89159">
<summary>
Do not audit attempts to send UDP traffic on the trivnet1 port.
</summary>
@@ -65603,7 +65420,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_trivnet1_port" lineno="89051">
+<interface name="corenet_udp_receive_trivnet1_port" lineno="89174">
<summary>
Receive UDP traffic on the trivnet1 port.
</summary>
@@ -65614,7 +65431,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89066">
+<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89189">
<summary>
Do not audit attempts to receive UDP traffic on the trivnet1 port.
</summary>
@@ -65625,7 +65442,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89081">
+<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89204">
<summary>
Send and receive UDP traffic on the trivnet1 port.
</summary>
@@ -65636,7 +65453,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89097">
+<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89220">
<summary>
Do not audit attempts to send and receive
UDP traffic on the trivnet1 port.
@@ -65648,7 +65465,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_trivnet1_port" lineno="89112">
+<interface name="corenet_tcp_bind_trivnet1_port" lineno="89235">
<summary>
Bind TCP sockets to the trivnet1 port.
</summary>
@@ -65659,7 +65476,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_trivnet1_port" lineno="89132">
+<interface name="corenet_udp_bind_trivnet1_port" lineno="89255">
<summary>
Bind UDP sockets to the trivnet1 port.
</summary>
@@ -65670,7 +65487,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_trivnet1_port" lineno="89151">
+<interface name="corenet_tcp_connect_trivnet1_port" lineno="89274">
<summary>
Make a TCP connection to the trivnet1 port.
</summary>
@@ -65680,7 +65497,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trivnet1_client_packets" lineno="89171">
+<interface name="corenet_send_trivnet1_client_packets" lineno="89294">
<summary>
Send trivnet1_client packets.
</summary>
@@ -65691,7 +65508,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89190">
+<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89313">
<summary>
Do not audit attempts to send trivnet1_client packets.
</summary>
@@ -65702,7 +65519,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trivnet1_client_packets" lineno="89209">
+<interface name="corenet_receive_trivnet1_client_packets" lineno="89332">
<summary>
Receive trivnet1_client packets.
</summary>
@@ -65713,7 +65530,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89228">
+<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89351">
<summary>
Do not audit attempts to receive trivnet1_client packets.
</summary>
@@ -65724,7 +65541,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89247">
+<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89370">
<summary>
Send and receive trivnet1_client packets.
</summary>
@@ -65735,7 +65552,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89263">
+<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89386">
<summary>
Do not audit attempts to send and receive trivnet1_client packets.
</summary>
@@ -65746,7 +65563,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89278">
+<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89401">
<summary>
Relabel packets to trivnet1_client the packet type.
</summary>
@@ -65756,7 +65573,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trivnet1_server_packets" lineno="89298">
+<interface name="corenet_send_trivnet1_server_packets" lineno="89421">
<summary>
Send trivnet1_server packets.
</summary>
@@ -65767,7 +65584,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89317">
+<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89440">
<summary>
Do not audit attempts to send trivnet1_server packets.
</summary>
@@ -65778,7 +65595,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trivnet1_server_packets" lineno="89336">
+<interface name="corenet_receive_trivnet1_server_packets" lineno="89459">
<summary>
Receive trivnet1_server packets.
</summary>
@@ -65789,7 +65606,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89355">
+<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89478">
<summary>
Do not audit attempts to receive trivnet1_server packets.
</summary>
@@ -65800,7 +65617,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89374">
+<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89497">
<summary>
Send and receive trivnet1_server packets.
</summary>
@@ -65811,7 +65628,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89390">
+<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89513">
<summary>
Do not audit attempts to send and receive trivnet1_server packets.
</summary>
@@ -65822,7 +65639,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89405">
+<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89528">
<summary>
Relabel packets to trivnet1_server the packet type.
</summary>
@@ -65832,7 +65649,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ups_port" lineno="89427">
+<interface name="corenet_tcp_sendrecv_ups_port" lineno="89550">
<summary>
Send and receive TCP traffic on the ups port.
</summary>
@@ -65843,7 +65660,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ups_port" lineno="89442">
+<interface name="corenet_udp_send_ups_port" lineno="89565">
<summary>
Send UDP traffic on the ups port.
</summary>
@@ -65854,7 +65671,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ups_port" lineno="89457">
+<interface name="corenet_dontaudit_udp_send_ups_port" lineno="89580">
<summary>
Do not audit attempts to send UDP traffic on the ups port.
</summary>
@@ -65865,7 +65682,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ups_port" lineno="89472">
+<interface name="corenet_udp_receive_ups_port" lineno="89595">
<summary>
Receive UDP traffic on the ups port.
</summary>
@@ -65876,7 +65693,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="89487">
+<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="89610">
<summary>
Do not audit attempts to receive UDP traffic on the ups port.
</summary>
@@ -65887,7 +65704,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ups_port" lineno="89502">
+<interface name="corenet_udp_sendrecv_ups_port" lineno="89625">
<summary>
Send and receive UDP traffic on the ups port.
</summary>
@@ -65898,7 +65715,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="89518">
+<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="89641">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ups port.
@@ -65910,7 +65727,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ups_port" lineno="89533">
+<interface name="corenet_tcp_bind_ups_port" lineno="89656">
<summary>
Bind TCP sockets to the ups port.
</summary>
@@ -65921,7 +65738,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ups_port" lineno="89553">
+<interface name="corenet_udp_bind_ups_port" lineno="89676">
<summary>
Bind UDP sockets to the ups port.
</summary>
@@ -65932,7 +65749,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ups_port" lineno="89572">
+<interface name="corenet_tcp_connect_ups_port" lineno="89695">
<summary>
Make a TCP connection to the ups port.
</summary>
@@ -65942,7 +65759,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ups_client_packets" lineno="89592">
+<interface name="corenet_send_ups_client_packets" lineno="89715">
<summary>
Send ups_client packets.
</summary>
@@ -65953,7 +65770,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ups_client_packets" lineno="89611">
+<interface name="corenet_dontaudit_send_ups_client_packets" lineno="89734">
<summary>
Do not audit attempts to send ups_client packets.
</summary>
@@ -65964,7 +65781,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ups_client_packets" lineno="89630">
+<interface name="corenet_receive_ups_client_packets" lineno="89753">
<summary>
Receive ups_client packets.
</summary>
@@ -65975,7 +65792,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="89649">
+<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="89772">
<summary>
Do not audit attempts to receive ups_client packets.
</summary>
@@ -65986,7 +65803,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ups_client_packets" lineno="89668">
+<interface name="corenet_sendrecv_ups_client_packets" lineno="89791">
<summary>
Send and receive ups_client packets.
</summary>
@@ -65997,7 +65814,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="89684">
+<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="89807">
<summary>
Do not audit attempts to send and receive ups_client packets.
</summary>
@@ -66008,7 +65825,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ups_client_packets" lineno="89699">
+<interface name="corenet_relabelto_ups_client_packets" lineno="89822">
<summary>
Relabel packets to ups_client the packet type.
</summary>
@@ -66018,7 +65835,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ups_server_packets" lineno="89719">
+<interface name="corenet_send_ups_server_packets" lineno="89842">
<summary>
Send ups_server packets.
</summary>
@@ -66029,7 +65846,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ups_server_packets" lineno="89738">
+<interface name="corenet_dontaudit_send_ups_server_packets" lineno="89861">
<summary>
Do not audit attempts to send ups_server packets.
</summary>
@@ -66040,7 +65857,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ups_server_packets" lineno="89757">
+<interface name="corenet_receive_ups_server_packets" lineno="89880">
<summary>
Receive ups_server packets.
</summary>
@@ -66051,7 +65868,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="89776">
+<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="89899">
<summary>
Do not audit attempts to receive ups_server packets.
</summary>
@@ -66062,7 +65879,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ups_server_packets" lineno="89795">
+<interface name="corenet_sendrecv_ups_server_packets" lineno="89918">
<summary>
Send and receive ups_server packets.
</summary>
@@ -66073,7 +65890,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="89811">
+<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="89934">
<summary>
Do not audit attempts to send and receive ups_server packets.
</summary>
@@ -66084,7 +65901,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ups_server_packets" lineno="89826">
+<interface name="corenet_relabelto_ups_server_packets" lineno="89949">
<summary>
Relabel packets to ups_server the packet type.
</summary>
@@ -66094,7 +65911,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="89848">
+<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="89971">
<summary>
Send and receive TCP traffic on the utcpserver port.
</summary>
@@ -66105,7 +65922,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_utcpserver_port" lineno="89863">
+<interface name="corenet_udp_send_utcpserver_port" lineno="89986">
<summary>
Send UDP traffic on the utcpserver port.
</summary>
@@ -66116,7 +65933,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="89878">
+<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90001">
<summary>
Do not audit attempts to send UDP traffic on the utcpserver port.
</summary>
@@ -66127,7 +65944,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_utcpserver_port" lineno="89893">
+<interface name="corenet_udp_receive_utcpserver_port" lineno="90016">
<summary>
Receive UDP traffic on the utcpserver port.
</summary>
@@ -66138,7 +65955,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="89908">
+<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90031">
<summary>
Do not audit attempts to receive UDP traffic on the utcpserver port.
</summary>
@@ -66149,7 +65966,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="89923">
+<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90046">
<summary>
Send and receive UDP traffic on the utcpserver port.
</summary>
@@ -66160,7 +65977,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="89939">
+<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90062">
<summary>
Do not audit attempts to send and receive
UDP traffic on the utcpserver port.
@@ -66172,7 +65989,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_utcpserver_port" lineno="89954">
+<interface name="corenet_tcp_bind_utcpserver_port" lineno="90077">
<summary>
Bind TCP sockets to the utcpserver port.
</summary>
@@ -66183,7 +66000,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_utcpserver_port" lineno="89974">
+<interface name="corenet_udp_bind_utcpserver_port" lineno="90097">
<summary>
Bind UDP sockets to the utcpserver port.
</summary>
@@ -66194,7 +66011,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_utcpserver_port" lineno="89993">
+<interface name="corenet_tcp_connect_utcpserver_port" lineno="90116">
<summary>
Make a TCP connection to the utcpserver port.
</summary>
@@ -66204,7 +66021,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_utcpserver_client_packets" lineno="90013">
+<interface name="corenet_send_utcpserver_client_packets" lineno="90136">
<summary>
Send utcpserver_client packets.
</summary>
@@ -66215,7 +66032,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90032">
+<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90155">
<summary>
Do not audit attempts to send utcpserver_client packets.
</summary>
@@ -66226,7 +66043,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_utcpserver_client_packets" lineno="90051">
+<interface name="corenet_receive_utcpserver_client_packets" lineno="90174">
<summary>
Receive utcpserver_client packets.
</summary>
@@ -66237,7 +66054,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90070">
+<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90193">
<summary>
Do not audit attempts to receive utcpserver_client packets.
</summary>
@@ -66248,7 +66065,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90089">
+<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90212">
<summary>
Send and receive utcpserver_client packets.
</summary>
@@ -66259,7 +66076,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90105">
+<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90228">
<summary>
Do not audit attempts to send and receive utcpserver_client packets.
</summary>
@@ -66270,7 +66087,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90120">
+<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90243">
<summary>
Relabel packets to utcpserver_client the packet type.
</summary>
@@ -66280,7 +66097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_utcpserver_server_packets" lineno="90140">
+<interface name="corenet_send_utcpserver_server_packets" lineno="90263">
<summary>
Send utcpserver_server packets.
</summary>
@@ -66291,7 +66108,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90159">
+<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90282">
<summary>
Do not audit attempts to send utcpserver_server packets.
</summary>
@@ -66302,7 +66119,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_utcpserver_server_packets" lineno="90178">
+<interface name="corenet_receive_utcpserver_server_packets" lineno="90301">
<summary>
Receive utcpserver_server packets.
</summary>
@@ -66313,7 +66130,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90197">
+<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90320">
<summary>
Do not audit attempts to receive utcpserver_server packets.
</summary>
@@ -66324,7 +66141,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90216">
+<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90339">
<summary>
Send and receive utcpserver_server packets.
</summary>
@@ -66335,7 +66152,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90232">
+<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90355">
<summary>
Do not audit attempts to send and receive utcpserver_server packets.
</summary>
@@ -66346,7 +66163,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90247">
+<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90370">
<summary>
Relabel packets to utcpserver_server the packet type.
</summary>
@@ -66356,7 +66173,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90269">
+<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90392">
<summary>
Send and receive TCP traffic on the uucpd port.
</summary>
@@ -66367,7 +66184,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_uucpd_port" lineno="90284">
+<interface name="corenet_udp_send_uucpd_port" lineno="90407">
<summary>
Send UDP traffic on the uucpd port.
</summary>
@@ -66378,7 +66195,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90299">
+<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90422">
<summary>
Do not audit attempts to send UDP traffic on the uucpd port.
</summary>
@@ -66389,7 +66206,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_uucpd_port" lineno="90314">
+<interface name="corenet_udp_receive_uucpd_port" lineno="90437">
<summary>
Receive UDP traffic on the uucpd port.
</summary>
@@ -66400,7 +66217,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90329">
+<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90452">
<summary>
Do not audit attempts to receive UDP traffic on the uucpd port.
</summary>
@@ -66411,7 +66228,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90344">
+<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90467">
<summary>
Send and receive UDP traffic on the uucpd port.
</summary>
@@ -66422,7 +66239,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90360">
+<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90483">
<summary>
Do not audit attempts to send and receive
UDP traffic on the uucpd port.
@@ -66434,7 +66251,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_uucpd_port" lineno="90375">
+<interface name="corenet_tcp_bind_uucpd_port" lineno="90498">
<summary>
Bind TCP sockets to the uucpd port.
</summary>
@@ -66445,7 +66262,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_uucpd_port" lineno="90395">
+<interface name="corenet_udp_bind_uucpd_port" lineno="90518">
<summary>
Bind UDP sockets to the uucpd port.
</summary>
@@ -66456,7 +66273,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_uucpd_port" lineno="90414">
+<interface name="corenet_tcp_connect_uucpd_port" lineno="90537">
<summary>
Make a TCP connection to the uucpd port.
</summary>
@@ -66466,7 +66283,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_uucpd_client_packets" lineno="90434">
+<interface name="corenet_send_uucpd_client_packets" lineno="90557">
<summary>
Send uucpd_client packets.
</summary>
@@ -66477,7 +66294,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="90453">
+<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="90576">
<summary>
Do not audit attempts to send uucpd_client packets.
</summary>
@@ -66488,7 +66305,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_uucpd_client_packets" lineno="90472">
+<interface name="corenet_receive_uucpd_client_packets" lineno="90595">
<summary>
Receive uucpd_client packets.
</summary>
@@ -66499,7 +66316,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="90491">
+<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="90614">
<summary>
Do not audit attempts to receive uucpd_client packets.
</summary>
@@ -66510,7 +66327,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_uucpd_client_packets" lineno="90510">
+<interface name="corenet_sendrecv_uucpd_client_packets" lineno="90633">
<summary>
Send and receive uucpd_client packets.
</summary>
@@ -66521,7 +66338,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="90526">
+<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="90649">
<summary>
Do not audit attempts to send and receive uucpd_client packets.
</summary>
@@ -66532,7 +66349,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_uucpd_client_packets" lineno="90541">
+<interface name="corenet_relabelto_uucpd_client_packets" lineno="90664">
<summary>
Relabel packets to uucpd_client the packet type.
</summary>
@@ -66542,7 +66359,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_uucpd_server_packets" lineno="90561">
+<interface name="corenet_send_uucpd_server_packets" lineno="90684">
<summary>
Send uucpd_server packets.
</summary>
@@ -66553,7 +66370,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="90580">
+<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="90703">
<summary>
Do not audit attempts to send uucpd_server packets.
</summary>
@@ -66564,7 +66381,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_uucpd_server_packets" lineno="90599">
+<interface name="corenet_receive_uucpd_server_packets" lineno="90722">
<summary>
Receive uucpd_server packets.
</summary>
@@ -66575,7 +66392,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="90618">
+<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="90741">
<summary>
Do not audit attempts to receive uucpd_server packets.
</summary>
@@ -66586,7 +66403,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_uucpd_server_packets" lineno="90637">
+<interface name="corenet_sendrecv_uucpd_server_packets" lineno="90760">
<summary>
Send and receive uucpd_server packets.
</summary>
@@ -66597,7 +66414,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="90653">
+<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="90776">
<summary>
Do not audit attempts to send and receive uucpd_server packets.
</summary>
@@ -66608,7 +66425,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_uucpd_server_packets" lineno="90668">
+<interface name="corenet_relabelto_uucpd_server_packets" lineno="90791">
<summary>
Relabel packets to uucpd_server the packet type.
</summary>
@@ -66618,7 +66435,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="90690">
+<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="90813">
<summary>
Send and receive TCP traffic on the varnishd port.
</summary>
@@ -66629,7 +66446,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_varnishd_port" lineno="90705">
+<interface name="corenet_udp_send_varnishd_port" lineno="90828">
<summary>
Send UDP traffic on the varnishd port.
</summary>
@@ -66640,7 +66457,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="90720">
+<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="90843">
<summary>
Do not audit attempts to send UDP traffic on the varnishd port.
</summary>
@@ -66651,7 +66468,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_varnishd_port" lineno="90735">
+<interface name="corenet_udp_receive_varnishd_port" lineno="90858">
<summary>
Receive UDP traffic on the varnishd port.
</summary>
@@ -66662,7 +66479,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="90750">
+<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="90873">
<summary>
Do not audit attempts to receive UDP traffic on the varnishd port.
</summary>
@@ -66673,7 +66490,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_varnishd_port" lineno="90765">
+<interface name="corenet_udp_sendrecv_varnishd_port" lineno="90888">
<summary>
Send and receive UDP traffic on the varnishd port.
</summary>
@@ -66684,7 +66501,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="90781">
+<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="90904">
<summary>
Do not audit attempts to send and receive
UDP traffic on the varnishd port.
@@ -66696,7 +66513,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_varnishd_port" lineno="90796">
+<interface name="corenet_tcp_bind_varnishd_port" lineno="90919">
<summary>
Bind TCP sockets to the varnishd port.
</summary>
@@ -66707,7 +66524,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_varnishd_port" lineno="90816">
+<interface name="corenet_udp_bind_varnishd_port" lineno="90939">
<summary>
Bind UDP sockets to the varnishd port.
</summary>
@@ -66718,7 +66535,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_varnishd_port" lineno="90835">
+<interface name="corenet_tcp_connect_varnishd_port" lineno="90958">
<summary>
Make a TCP connection to the varnishd port.
</summary>
@@ -66728,7 +66545,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_varnishd_client_packets" lineno="90855">
+<interface name="corenet_send_varnishd_client_packets" lineno="90978">
<summary>
Send varnishd_client packets.
</summary>
@@ -66739,7 +66556,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="90874">
+<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="90997">
<summary>
Do not audit attempts to send varnishd_client packets.
</summary>
@@ -66750,7 +66567,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_varnishd_client_packets" lineno="90893">
+<interface name="corenet_receive_varnishd_client_packets" lineno="91016">
<summary>
Receive varnishd_client packets.
</summary>
@@ -66761,7 +66578,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="90912">
+<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91035">
<summary>
Do not audit attempts to receive varnishd_client packets.
</summary>
@@ -66772,7 +66589,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_varnishd_client_packets" lineno="90931">
+<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91054">
<summary>
Send and receive varnishd_client packets.
</summary>
@@ -66783,7 +66600,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="90947">
+<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91070">
<summary>
Do not audit attempts to send and receive varnishd_client packets.
</summary>
@@ -66794,7 +66611,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_varnishd_client_packets" lineno="90962">
+<interface name="corenet_relabelto_varnishd_client_packets" lineno="91085">
<summary>
Relabel packets to varnishd_client the packet type.
</summary>
@@ -66804,7 +66621,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_varnishd_server_packets" lineno="90982">
+<interface name="corenet_send_varnishd_server_packets" lineno="91105">
<summary>
Send varnishd_server packets.
</summary>
@@ -66815,7 +66632,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91001">
+<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91124">
<summary>
Do not audit attempts to send varnishd_server packets.
</summary>
@@ -66826,7 +66643,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_varnishd_server_packets" lineno="91020">
+<interface name="corenet_receive_varnishd_server_packets" lineno="91143">
<summary>
Receive varnishd_server packets.
</summary>
@@ -66837,7 +66654,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91039">
+<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91162">
<summary>
Do not audit attempts to receive varnishd_server packets.
</summary>
@@ -66848,7 +66665,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91058">
+<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91181">
<summary>
Send and receive varnishd_server packets.
</summary>
@@ -66859,7 +66676,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91074">
+<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91197">
<summary>
Do not audit attempts to send and receive varnishd_server packets.
</summary>
@@ -66870,7 +66687,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_varnishd_server_packets" lineno="91089">
+<interface name="corenet_relabelto_varnishd_server_packets" lineno="91212">
<summary>
Relabel packets to varnishd_server the packet type.
</summary>
@@ -66880,7 +66697,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_virt_port" lineno="91111">
+<interface name="corenet_tcp_sendrecv_virt_port" lineno="91234">
<summary>
Send and receive TCP traffic on the virt port.
</summary>
@@ -66891,7 +66708,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_virt_port" lineno="91126">
+<interface name="corenet_udp_send_virt_port" lineno="91249">
<summary>
Send UDP traffic on the virt port.
</summary>
@@ -66902,7 +66719,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91141">
+<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91264">
<summary>
Do not audit attempts to send UDP traffic on the virt port.
</summary>
@@ -66913,7 +66730,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_virt_port" lineno="91156">
+<interface name="corenet_udp_receive_virt_port" lineno="91279">
<summary>
Receive UDP traffic on the virt port.
</summary>
@@ -66924,7 +66741,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91171">
+<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91294">
<summary>
Do not audit attempts to receive UDP traffic on the virt port.
</summary>
@@ -66935,7 +66752,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_virt_port" lineno="91186">
+<interface name="corenet_udp_sendrecv_virt_port" lineno="91309">
<summary>
Send and receive UDP traffic on the virt port.
</summary>
@@ -66946,7 +66763,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91202">
+<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91325">
<summary>
Do not audit attempts to send and receive
UDP traffic on the virt port.
@@ -66958,7 +66775,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_virt_port" lineno="91217">
+<interface name="corenet_tcp_bind_virt_port" lineno="91340">
<summary>
Bind TCP sockets to the virt port.
</summary>
@@ -66969,7 +66786,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_virt_port" lineno="91237">
+<interface name="corenet_udp_bind_virt_port" lineno="91360">
<summary>
Bind UDP sockets to the virt port.
</summary>
@@ -66980,7 +66797,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_virt_port" lineno="91256">
+<interface name="corenet_tcp_connect_virt_port" lineno="91379">
<summary>
Make a TCP connection to the virt port.
</summary>
@@ -66990,7 +66807,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_client_packets" lineno="91276">
+<interface name="corenet_send_virt_client_packets" lineno="91399">
<summary>
Send virt_client packets.
</summary>
@@ -67001,7 +66818,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91295">
+<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91418">
<summary>
Do not audit attempts to send virt_client packets.
</summary>
@@ -67012,7 +66829,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_client_packets" lineno="91314">
+<interface name="corenet_receive_virt_client_packets" lineno="91437">
<summary>
Receive virt_client packets.
</summary>
@@ -67023,7 +66840,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91333">
+<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91456">
<summary>
Do not audit attempts to receive virt_client packets.
</summary>
@@ -67034,7 +66851,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_client_packets" lineno="91352">
+<interface name="corenet_sendrecv_virt_client_packets" lineno="91475">
<summary>
Send and receive virt_client packets.
</summary>
@@ -67045,7 +66862,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91368">
+<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91491">
<summary>
Do not audit attempts to send and receive virt_client packets.
</summary>
@@ -67056,7 +66873,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_client_packets" lineno="91383">
+<interface name="corenet_relabelto_virt_client_packets" lineno="91506">
<summary>
Relabel packets to virt_client the packet type.
</summary>
@@ -67066,7 +66883,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_server_packets" lineno="91403">
+<interface name="corenet_send_virt_server_packets" lineno="91526">
<summary>
Send virt_server packets.
</summary>
@@ -67077,7 +66894,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91422">
+<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91545">
<summary>
Do not audit attempts to send virt_server packets.
</summary>
@@ -67088,7 +66905,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_server_packets" lineno="91441">
+<interface name="corenet_receive_virt_server_packets" lineno="91564">
<summary>
Receive virt_server packets.
</summary>
@@ -67099,7 +66916,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="91460">
+<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="91583">
<summary>
Do not audit attempts to receive virt_server packets.
</summary>
@@ -67110,7 +66927,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_server_packets" lineno="91479">
+<interface name="corenet_sendrecv_virt_server_packets" lineno="91602">
<summary>
Send and receive virt_server packets.
</summary>
@@ -67121,7 +66938,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="91495">
+<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="91618">
<summary>
Do not audit attempts to send and receive virt_server packets.
</summary>
@@ -67132,7 +66949,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_server_packets" lineno="91510">
+<interface name="corenet_relabelto_virt_server_packets" lineno="91633">
<summary>
Relabel packets to virt_server the packet type.
</summary>
@@ -67142,7 +66959,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="91532">
+<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="91655">
<summary>
Send and receive TCP traffic on the virtual_places port.
</summary>
@@ -67153,7 +66970,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_virtual_places_port" lineno="91547">
+<interface name="corenet_udp_send_virtual_places_port" lineno="91670">
<summary>
Send UDP traffic on the virtual_places port.
</summary>
@@ -67164,7 +66981,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="91562">
+<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="91685">
<summary>
Do not audit attempts to send UDP traffic on the virtual_places port.
</summary>
@@ -67175,7 +66992,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_virtual_places_port" lineno="91577">
+<interface name="corenet_udp_receive_virtual_places_port" lineno="91700">
<summary>
Receive UDP traffic on the virtual_places port.
</summary>
@@ -67186,7 +67003,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="91592">
+<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="91715">
<summary>
Do not audit attempts to receive UDP traffic on the virtual_places port.
</summary>
@@ -67197,7 +67014,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="91607">
+<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="91730">
<summary>
Send and receive UDP traffic on the virtual_places port.
</summary>
@@ -67208,7 +67025,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="91623">
+<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="91746">
<summary>
Do not audit attempts to send and receive
UDP traffic on the virtual_places port.
@@ -67220,7 +67037,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_virtual_places_port" lineno="91638">
+<interface name="corenet_tcp_bind_virtual_places_port" lineno="91761">
<summary>
Bind TCP sockets to the virtual_places port.
</summary>
@@ -67231,7 +67048,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_virtual_places_port" lineno="91658">
+<interface name="corenet_udp_bind_virtual_places_port" lineno="91781">
<summary>
Bind UDP sockets to the virtual_places port.
</summary>
@@ -67242,7 +67059,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_virtual_places_port" lineno="91677">
+<interface name="corenet_tcp_connect_virtual_places_port" lineno="91800">
<summary>
Make a TCP connection to the virtual_places port.
</summary>
@@ -67252,7 +67069,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virtual_places_client_packets" lineno="91697">
+<interface name="corenet_send_virtual_places_client_packets" lineno="91820">
<summary>
Send virtual_places_client packets.
</summary>
@@ -67263,7 +67080,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="91716">
+<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="91839">
<summary>
Do not audit attempts to send virtual_places_client packets.
</summary>
@@ -67274,7 +67091,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virtual_places_client_packets" lineno="91735">
+<interface name="corenet_receive_virtual_places_client_packets" lineno="91858">
<summary>
Receive virtual_places_client packets.
</summary>
@@ -67285,7 +67102,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="91754">
+<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="91877">
<summary>
Do not audit attempts to receive virtual_places_client packets.
</summary>
@@ -67296,7 +67113,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="91773">
+<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="91896">
<summary>
Send and receive virtual_places_client packets.
</summary>
@@ -67307,7 +67124,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="91789">
+<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="91912">
<summary>
Do not audit attempts to send and receive virtual_places_client packets.
</summary>
@@ -67318,7 +67135,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virtual_places_client_packets" lineno="91804">
+<interface name="corenet_relabelto_virtual_places_client_packets" lineno="91927">
<summary>
Relabel packets to virtual_places_client the packet type.
</summary>
@@ -67328,7 +67145,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virtual_places_server_packets" lineno="91824">
+<interface name="corenet_send_virtual_places_server_packets" lineno="91947">
<summary>
Send virtual_places_server packets.
</summary>
@@ -67339,7 +67156,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="91843">
+<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="91966">
<summary>
Do not audit attempts to send virtual_places_server packets.
</summary>
@@ -67350,7 +67167,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virtual_places_server_packets" lineno="91862">
+<interface name="corenet_receive_virtual_places_server_packets" lineno="91985">
<summary>
Receive virtual_places_server packets.
</summary>
@@ -67361,7 +67178,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="91881">
+<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92004">
<summary>
Do not audit attempts to receive virtual_places_server packets.
</summary>
@@ -67372,7 +67189,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="91900">
+<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92023">
<summary>
Send and receive virtual_places_server packets.
</summary>
@@ -67383,7 +67200,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="91916">
+<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92039">
<summary>
Do not audit attempts to send and receive virtual_places_server packets.
</summary>
@@ -67394,7 +67211,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virtual_places_server_packets" lineno="91931">
+<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92054">
<summary>
Relabel packets to virtual_places_server the packet type.
</summary>
@@ -67404,7 +67221,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="91953">
+<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92076">
<summary>
Send and receive TCP traffic on the virt_migration port.
</summary>
@@ -67415,7 +67232,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_virt_migration_port" lineno="91968">
+<interface name="corenet_udp_send_virt_migration_port" lineno="92091">
<summary>
Send UDP traffic on the virt_migration port.
</summary>
@@ -67426,7 +67243,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="91983">
+<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92106">
<summary>
Do not audit attempts to send UDP traffic on the virt_migration port.
</summary>
@@ -67437,7 +67254,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_virt_migration_port" lineno="91998">
+<interface name="corenet_udp_receive_virt_migration_port" lineno="92121">
<summary>
Receive UDP traffic on the virt_migration port.
</summary>
@@ -67448,7 +67265,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92013">
+<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92136">
<summary>
Do not audit attempts to receive UDP traffic on the virt_migration port.
</summary>
@@ -67459,7 +67276,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92028">
+<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92151">
<summary>
Send and receive UDP traffic on the virt_migration port.
</summary>
@@ -67470,7 +67287,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92044">
+<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92167">
<summary>
Do not audit attempts to send and receive
UDP traffic on the virt_migration port.
@@ -67482,7 +67299,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_virt_migration_port" lineno="92059">
+<interface name="corenet_tcp_bind_virt_migration_port" lineno="92182">
<summary>
Bind TCP sockets to the virt_migration port.
</summary>
@@ -67493,7 +67310,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_virt_migration_port" lineno="92079">
+<interface name="corenet_udp_bind_virt_migration_port" lineno="92202">
<summary>
Bind UDP sockets to the virt_migration port.
</summary>
@@ -67504,7 +67321,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_virt_migration_port" lineno="92098">
+<interface name="corenet_tcp_connect_virt_migration_port" lineno="92221">
<summary>
Make a TCP connection to the virt_migration port.
</summary>
@@ -67514,7 +67331,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_migration_client_packets" lineno="92118">
+<interface name="corenet_send_virt_migration_client_packets" lineno="92241">
<summary>
Send virt_migration_client packets.
</summary>
@@ -67525,7 +67342,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92137">
+<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92260">
<summary>
Do not audit attempts to send virt_migration_client packets.
</summary>
@@ -67536,7 +67353,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_migration_client_packets" lineno="92156">
+<interface name="corenet_receive_virt_migration_client_packets" lineno="92279">
<summary>
Receive virt_migration_client packets.
</summary>
@@ -67547,7 +67364,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92175">
+<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92298">
<summary>
Do not audit attempts to receive virt_migration_client packets.
</summary>
@@ -67558,7 +67375,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92194">
+<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92317">
<summary>
Send and receive virt_migration_client packets.
</summary>
@@ -67569,7 +67386,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92210">
+<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92333">
<summary>
Do not audit attempts to send and receive virt_migration_client packets.
</summary>
@@ -67580,7 +67397,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92225">
+<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92348">
<summary>
Relabel packets to virt_migration_client the packet type.
</summary>
@@ -67590,7 +67407,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_migration_server_packets" lineno="92245">
+<interface name="corenet_send_virt_migration_server_packets" lineno="92368">
<summary>
Send virt_migration_server packets.
</summary>
@@ -67601,7 +67418,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92264">
+<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92387">
<summary>
Do not audit attempts to send virt_migration_server packets.
</summary>
@@ -67612,7 +67429,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_migration_server_packets" lineno="92283">
+<interface name="corenet_receive_virt_migration_server_packets" lineno="92406">
<summary>
Receive virt_migration_server packets.
</summary>
@@ -67623,7 +67440,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92302">
+<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92425">
<summary>
Do not audit attempts to receive virt_migration_server packets.
</summary>
@@ -67634,7 +67451,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92321">
+<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92444">
<summary>
Send and receive virt_migration_server packets.
</summary>
@@ -67645,7 +67462,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92337">
+<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92460">
<summary>
Do not audit attempts to send and receive virt_migration_server packets.
</summary>
@@ -67656,7 +67473,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92352">
+<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92475">
<summary>
Relabel packets to virt_migration_server the packet type.
</summary>
@@ -67666,7 +67483,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92374">
+<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92497">
<summary>
Send and receive TCP traffic on the vnc port.
</summary>
@@ -67677,7 +67494,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_vnc_port" lineno="92389">
+<interface name="corenet_udp_send_vnc_port" lineno="92512">
<summary>
Send UDP traffic on the vnc port.
</summary>
@@ -67688,7 +67505,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92404">
+<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92527">
<summary>
Do not audit attempts to send UDP traffic on the vnc port.
</summary>
@@ -67699,7 +67516,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_vnc_port" lineno="92419">
+<interface name="corenet_udp_receive_vnc_port" lineno="92542">
<summary>
Receive UDP traffic on the vnc port.
</summary>
@@ -67710,7 +67527,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92434">
+<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92557">
<summary>
Do not audit attempts to receive UDP traffic on the vnc port.
</summary>
@@ -67721,7 +67538,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_vnc_port" lineno="92449">
+<interface name="corenet_udp_sendrecv_vnc_port" lineno="92572">
<summary>
Send and receive UDP traffic on the vnc port.
</summary>
@@ -67732,7 +67549,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="92465">
+<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="92588">
<summary>
Do not audit attempts to send and receive
UDP traffic on the vnc port.
@@ -67744,7 +67561,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_vnc_port" lineno="92480">
+<interface name="corenet_tcp_bind_vnc_port" lineno="92603">
<summary>
Bind TCP sockets to the vnc port.
</summary>
@@ -67755,7 +67572,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_vnc_port" lineno="92500">
+<interface name="corenet_udp_bind_vnc_port" lineno="92623">
<summary>
Bind UDP sockets to the vnc port.
</summary>
@@ -67766,7 +67583,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_vnc_port" lineno="92519">
+<interface name="corenet_tcp_connect_vnc_port" lineno="92642">
<summary>
Make a TCP connection to the vnc port.
</summary>
@@ -67776,7 +67593,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_vnc_client_packets" lineno="92539">
+<interface name="corenet_send_vnc_client_packets" lineno="92662">
<summary>
Send vnc_client packets.
</summary>
@@ -67787,7 +67604,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="92558">
+<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="92681">
<summary>
Do not audit attempts to send vnc_client packets.
</summary>
@@ -67798,7 +67615,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_vnc_client_packets" lineno="92577">
+<interface name="corenet_receive_vnc_client_packets" lineno="92700">
<summary>
Receive vnc_client packets.
</summary>
@@ -67809,7 +67626,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="92596">
+<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="92719">
<summary>
Do not audit attempts to receive vnc_client packets.
</summary>
@@ -67820,7 +67637,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_vnc_client_packets" lineno="92615">
+<interface name="corenet_sendrecv_vnc_client_packets" lineno="92738">
<summary>
Send and receive vnc_client packets.
</summary>
@@ -67831,7 +67648,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="92631">
+<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="92754">
<summary>
Do not audit attempts to send and receive vnc_client packets.
</summary>
@@ -67842,7 +67659,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_vnc_client_packets" lineno="92646">
+<interface name="corenet_relabelto_vnc_client_packets" lineno="92769">
<summary>
Relabel packets to vnc_client the packet type.
</summary>
@@ -67852,7 +67669,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_vnc_server_packets" lineno="92666">
+<interface name="corenet_send_vnc_server_packets" lineno="92789">
<summary>
Send vnc_server packets.
</summary>
@@ -67863,7 +67680,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="92685">
+<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="92808">
<summary>
Do not audit attempts to send vnc_server packets.
</summary>
@@ -67874,7 +67691,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_vnc_server_packets" lineno="92704">
+<interface name="corenet_receive_vnc_server_packets" lineno="92827">
<summary>
Receive vnc_server packets.
</summary>
@@ -67885,7 +67702,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="92723">
+<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="92846">
<summary>
Do not audit attempts to receive vnc_server packets.
</summary>
@@ -67896,7 +67713,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_vnc_server_packets" lineno="92742">
+<interface name="corenet_sendrecv_vnc_server_packets" lineno="92865">
<summary>
Send and receive vnc_server packets.
</summary>
@@ -67907,7 +67724,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="92758">
+<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="92881">
<summary>
Do not audit attempts to send and receive vnc_server packets.
</summary>
@@ -67918,7 +67735,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_vnc_server_packets" lineno="92773">
+<interface name="corenet_relabelto_vnc_server_packets" lineno="92896">
<summary>
Relabel packets to vnc_server the packet type.
</summary>
@@ -67928,7 +67745,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_wccp_port" lineno="92795">
+<interface name="corenet_tcp_sendrecv_wccp_port" lineno="92918">
<summary>
Send and receive TCP traffic on the wccp port.
</summary>
@@ -67939,7 +67756,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_wccp_port" lineno="92810">
+<interface name="corenet_udp_send_wccp_port" lineno="92933">
<summary>
Send UDP traffic on the wccp port.
</summary>
@@ -67950,7 +67767,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="92825">
+<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="92948">
<summary>
Do not audit attempts to send UDP traffic on the wccp port.
</summary>
@@ -67961,7 +67778,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_wccp_port" lineno="92840">
+<interface name="corenet_udp_receive_wccp_port" lineno="92963">
<summary>
Receive UDP traffic on the wccp port.
</summary>
@@ -67972,7 +67789,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="92855">
+<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="92978">
<summary>
Do not audit attempts to receive UDP traffic on the wccp port.
</summary>
@@ -67983,7 +67800,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_wccp_port" lineno="92870">
+<interface name="corenet_udp_sendrecv_wccp_port" lineno="92993">
<summary>
Send and receive UDP traffic on the wccp port.
</summary>
@@ -67994,7 +67811,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="92886">
+<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93009">
<summary>
Do not audit attempts to send and receive
UDP traffic on the wccp port.
@@ -68006,7 +67823,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_wccp_port" lineno="92901">
+<interface name="corenet_tcp_bind_wccp_port" lineno="93024">
<summary>
Bind TCP sockets to the wccp port.
</summary>
@@ -68017,7 +67834,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_wccp_port" lineno="92921">
+<interface name="corenet_udp_bind_wccp_port" lineno="93044">
<summary>
Bind UDP sockets to the wccp port.
</summary>
@@ -68028,7 +67845,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_wccp_port" lineno="92940">
+<interface name="corenet_tcp_connect_wccp_port" lineno="93063">
<summary>
Make a TCP connection to the wccp port.
</summary>
@@ -68038,7 +67855,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wccp_client_packets" lineno="92960">
+<interface name="corenet_send_wccp_client_packets" lineno="93083">
<summary>
Send wccp_client packets.
</summary>
@@ -68049,7 +67866,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="92979">
+<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93102">
<summary>
Do not audit attempts to send wccp_client packets.
</summary>
@@ -68060,7 +67877,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wccp_client_packets" lineno="92998">
+<interface name="corenet_receive_wccp_client_packets" lineno="93121">
<summary>
Receive wccp_client packets.
</summary>
@@ -68071,7 +67888,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93017">
+<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93140">
<summary>
Do not audit attempts to receive wccp_client packets.
</summary>
@@ -68082,7 +67899,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wccp_client_packets" lineno="93036">
+<interface name="corenet_sendrecv_wccp_client_packets" lineno="93159">
<summary>
Send and receive wccp_client packets.
</summary>
@@ -68093,7 +67910,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93052">
+<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93175">
<summary>
Do not audit attempts to send and receive wccp_client packets.
</summary>
@@ -68104,7 +67921,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wccp_client_packets" lineno="93067">
+<interface name="corenet_relabelto_wccp_client_packets" lineno="93190">
<summary>
Relabel packets to wccp_client the packet type.
</summary>
@@ -68114,7 +67931,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wccp_server_packets" lineno="93087">
+<interface name="corenet_send_wccp_server_packets" lineno="93210">
<summary>
Send wccp_server packets.
</summary>
@@ -68125,7 +67942,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93106">
+<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93229">
<summary>
Do not audit attempts to send wccp_server packets.
</summary>
@@ -68136,7 +67953,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wccp_server_packets" lineno="93125">
+<interface name="corenet_receive_wccp_server_packets" lineno="93248">
<summary>
Receive wccp_server packets.
</summary>
@@ -68147,7 +67964,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93144">
+<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93267">
<summary>
Do not audit attempts to receive wccp_server packets.
</summary>
@@ -68158,7 +67975,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wccp_server_packets" lineno="93163">
+<interface name="corenet_sendrecv_wccp_server_packets" lineno="93286">
<summary>
Send and receive wccp_server packets.
</summary>
@@ -68169,7 +67986,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93179">
+<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93302">
<summary>
Do not audit attempts to send and receive wccp_server packets.
</summary>
@@ -68180,7 +67997,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wccp_server_packets" lineno="93194">
+<interface name="corenet_relabelto_wccp_server_packets" lineno="93317">
<summary>
Relabel packets to wccp_server the packet type.
</summary>
@@ -68190,7 +68007,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_websm_port" lineno="93216">
+<interface name="corenet_tcp_sendrecv_websm_port" lineno="93339">
<summary>
Send and receive TCP traffic on the websm port.
</summary>
@@ -68201,7 +68018,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_websm_port" lineno="93231">
+<interface name="corenet_udp_send_websm_port" lineno="93354">
<summary>
Send UDP traffic on the websm port.
</summary>
@@ -68212,7 +68029,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93246">
+<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93369">
<summary>
Do not audit attempts to send UDP traffic on the websm port.
</summary>
@@ -68223,7 +68040,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_websm_port" lineno="93261">
+<interface name="corenet_udp_receive_websm_port" lineno="93384">
<summary>
Receive UDP traffic on the websm port.
</summary>
@@ -68234,7 +68051,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93276">
+<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93399">
<summary>
Do not audit attempts to receive UDP traffic on the websm port.
</summary>
@@ -68245,7 +68062,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_websm_port" lineno="93291">
+<interface name="corenet_udp_sendrecv_websm_port" lineno="93414">
<summary>
Send and receive UDP traffic on the websm port.
</summary>
@@ -68256,7 +68073,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93307">
+<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93430">
<summary>
Do not audit attempts to send and receive
UDP traffic on the websm port.
@@ -68268,7 +68085,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_websm_port" lineno="93322">
+<interface name="corenet_tcp_bind_websm_port" lineno="93445">
<summary>
Bind TCP sockets to the websm port.
</summary>
@@ -68279,7 +68096,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_websm_port" lineno="93342">
+<interface name="corenet_udp_bind_websm_port" lineno="93465">
<summary>
Bind UDP sockets to the websm port.
</summary>
@@ -68290,7 +68107,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_websm_port" lineno="93361">
+<interface name="corenet_tcp_connect_websm_port" lineno="93484">
<summary>
Make a TCP connection to the websm port.
</summary>
@@ -68300,7 +68117,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_websm_client_packets" lineno="93381">
+<interface name="corenet_send_websm_client_packets" lineno="93504">
<summary>
Send websm_client packets.
</summary>
@@ -68311,7 +68128,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93400">
+<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93523">
<summary>
Do not audit attempts to send websm_client packets.
</summary>
@@ -68322,7 +68139,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_websm_client_packets" lineno="93419">
+<interface name="corenet_receive_websm_client_packets" lineno="93542">
<summary>
Receive websm_client packets.
</summary>
@@ -68333,7 +68150,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="93438">
+<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="93561">
<summary>
Do not audit attempts to receive websm_client packets.
</summary>
@@ -68344,7 +68161,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_websm_client_packets" lineno="93457">
+<interface name="corenet_sendrecv_websm_client_packets" lineno="93580">
<summary>
Send and receive websm_client packets.
</summary>
@@ -68355,7 +68172,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="93473">
+<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="93596">
<summary>
Do not audit attempts to send and receive websm_client packets.
</summary>
@@ -68366,7 +68183,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_websm_client_packets" lineno="93488">
+<interface name="corenet_relabelto_websm_client_packets" lineno="93611">
<summary>
Relabel packets to websm_client the packet type.
</summary>
@@ -68376,7 +68193,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_websm_server_packets" lineno="93508">
+<interface name="corenet_send_websm_server_packets" lineno="93631">
<summary>
Send websm_server packets.
</summary>
@@ -68387,7 +68204,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_websm_server_packets" lineno="93527">
+<interface name="corenet_dontaudit_send_websm_server_packets" lineno="93650">
<summary>
Do not audit attempts to send websm_server packets.
</summary>
@@ -68398,7 +68215,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_websm_server_packets" lineno="93546">
+<interface name="corenet_receive_websm_server_packets" lineno="93669">
<summary>
Receive websm_server packets.
</summary>
@@ -68409,7 +68226,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="93565">
+<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="93688">
<summary>
Do not audit attempts to receive websm_server packets.
</summary>
@@ -68420,7 +68237,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_websm_server_packets" lineno="93584">
+<interface name="corenet_sendrecv_websm_server_packets" lineno="93707">
<summary>
Send and receive websm_server packets.
</summary>
@@ -68431,7 +68248,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="93600">
+<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="93723">
<summary>
Do not audit attempts to send and receive websm_server packets.
</summary>
@@ -68442,7 +68259,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_websm_server_packets" lineno="93615">
+<interface name="corenet_relabelto_websm_server_packets" lineno="93738">
<summary>
Relabel packets to websm_server the packet type.
</summary>
@@ -68452,7 +68269,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_whois_port" lineno="93637">
+<interface name="corenet_tcp_sendrecv_whois_port" lineno="93760">
<summary>
Send and receive TCP traffic on the whois port.
</summary>
@@ -68463,7 +68280,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_whois_port" lineno="93652">
+<interface name="corenet_udp_send_whois_port" lineno="93775">
<summary>
Send UDP traffic on the whois port.
</summary>
@@ -68474,7 +68291,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_whois_port" lineno="93667">
+<interface name="corenet_dontaudit_udp_send_whois_port" lineno="93790">
<summary>
Do not audit attempts to send UDP traffic on the whois port.
</summary>
@@ -68485,7 +68302,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_whois_port" lineno="93682">
+<interface name="corenet_udp_receive_whois_port" lineno="93805">
<summary>
Receive UDP traffic on the whois port.
</summary>
@@ -68496,7 +68313,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="93697">
+<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="93820">
<summary>
Do not audit attempts to receive UDP traffic on the whois port.
</summary>
@@ -68507,7 +68324,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_whois_port" lineno="93712">
+<interface name="corenet_udp_sendrecv_whois_port" lineno="93835">
<summary>
Send and receive UDP traffic on the whois port.
</summary>
@@ -68518,7 +68335,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="93728">
+<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="93851">
<summary>
Do not audit attempts to send and receive
UDP traffic on the whois port.
@@ -68530,7 +68347,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_whois_port" lineno="93743">
+<interface name="corenet_tcp_bind_whois_port" lineno="93866">
<summary>
Bind TCP sockets to the whois port.
</summary>
@@ -68541,7 +68358,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_whois_port" lineno="93763">
+<interface name="corenet_udp_bind_whois_port" lineno="93886">
<summary>
Bind UDP sockets to the whois port.
</summary>
@@ -68552,7 +68369,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_whois_port" lineno="93782">
+<interface name="corenet_tcp_connect_whois_port" lineno="93905">
<summary>
Make a TCP connection to the whois port.
</summary>
@@ -68562,7 +68379,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_whois_client_packets" lineno="93802">
+<interface name="corenet_send_whois_client_packets" lineno="93925">
<summary>
Send whois_client packets.
</summary>
@@ -68573,7 +68390,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_whois_client_packets" lineno="93821">
+<interface name="corenet_dontaudit_send_whois_client_packets" lineno="93944">
<summary>
Do not audit attempts to send whois_client packets.
</summary>
@@ -68584,7 +68401,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_whois_client_packets" lineno="93840">
+<interface name="corenet_receive_whois_client_packets" lineno="93963">
<summary>
Receive whois_client packets.
</summary>
@@ -68595,7 +68412,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="93859">
+<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="93982">
<summary>
Do not audit attempts to receive whois_client packets.
</summary>
@@ -68606,7 +68423,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_whois_client_packets" lineno="93878">
+<interface name="corenet_sendrecv_whois_client_packets" lineno="94001">
<summary>
Send and receive whois_client packets.
</summary>
@@ -68617,7 +68434,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="93894">
+<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94017">
<summary>
Do not audit attempts to send and receive whois_client packets.
</summary>
@@ -68628,7 +68445,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_whois_client_packets" lineno="93909">
+<interface name="corenet_relabelto_whois_client_packets" lineno="94032">
<summary>
Relabel packets to whois_client the packet type.
</summary>
@@ -68638,7 +68455,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_whois_server_packets" lineno="93929">
+<interface name="corenet_send_whois_server_packets" lineno="94052">
<summary>
Send whois_server packets.
</summary>
@@ -68649,7 +68466,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_whois_server_packets" lineno="93948">
+<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94071">
<summary>
Do not audit attempts to send whois_server packets.
</summary>
@@ -68660,7 +68477,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_whois_server_packets" lineno="93967">
+<interface name="corenet_receive_whois_server_packets" lineno="94090">
<summary>
Receive whois_server packets.
</summary>
@@ -68671,7 +68488,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="93986">
+<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94109">
<summary>
Do not audit attempts to receive whois_server packets.
</summary>
@@ -68682,7 +68499,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_whois_server_packets" lineno="94005">
+<interface name="corenet_sendrecv_whois_server_packets" lineno="94128">
<summary>
Send and receive whois_server packets.
</summary>
@@ -68693,7 +68510,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94021">
+<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94144">
<summary>
Do not audit attempts to send and receive whois_server packets.
</summary>
@@ -68704,7 +68521,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_whois_server_packets" lineno="94036">
+<interface name="corenet_relabelto_whois_server_packets" lineno="94159">
<summary>
Relabel packets to whois_server the packet type.
</summary>
@@ -68714,7 +68531,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94058">
+<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94181">
<summary>
Send and receive TCP traffic on the winshadow port.
</summary>
@@ -68725,7 +68542,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_winshadow_port" lineno="94073">
+<interface name="corenet_udp_send_winshadow_port" lineno="94196">
<summary>
Send UDP traffic on the winshadow port.
</summary>
@@ -68736,7 +68553,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94088">
+<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94211">
<summary>
Do not audit attempts to send UDP traffic on the winshadow port.
</summary>
@@ -68747,7 +68564,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_winshadow_port" lineno="94103">
+<interface name="corenet_udp_receive_winshadow_port" lineno="94226">
<summary>
Receive UDP traffic on the winshadow port.
</summary>
@@ -68758,7 +68575,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94118">
+<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94241">
<summary>
Do not audit attempts to receive UDP traffic on the winshadow port.
</summary>
@@ -68769,7 +68586,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94133">
+<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94256">
<summary>
Send and receive UDP traffic on the winshadow port.
</summary>
@@ -68780,7 +68597,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94149">
+<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94272">
<summary>
Do not audit attempts to send and receive
UDP traffic on the winshadow port.
@@ -68792,7 +68609,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_winshadow_port" lineno="94164">
+<interface name="corenet_tcp_bind_winshadow_port" lineno="94287">
<summary>
Bind TCP sockets to the winshadow port.
</summary>
@@ -68803,7 +68620,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_winshadow_port" lineno="94184">
+<interface name="corenet_udp_bind_winshadow_port" lineno="94307">
<summary>
Bind UDP sockets to the winshadow port.
</summary>
@@ -68814,7 +68631,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_winshadow_port" lineno="94203">
+<interface name="corenet_tcp_connect_winshadow_port" lineno="94326">
<summary>
Make a TCP connection to the winshadow port.
</summary>
@@ -68824,7 +68641,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_winshadow_client_packets" lineno="94223">
+<interface name="corenet_send_winshadow_client_packets" lineno="94346">
<summary>
Send winshadow_client packets.
</summary>
@@ -68835,7 +68652,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94242">
+<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94365">
<summary>
Do not audit attempts to send winshadow_client packets.
</summary>
@@ -68846,7 +68663,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_winshadow_client_packets" lineno="94261">
+<interface name="corenet_receive_winshadow_client_packets" lineno="94384">
<summary>
Receive winshadow_client packets.
</summary>
@@ -68857,7 +68674,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94280">
+<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94403">
<summary>
Do not audit attempts to receive winshadow_client packets.
</summary>
@@ -68868,7 +68685,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94299">
+<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94422">
<summary>
Send and receive winshadow_client packets.
</summary>
@@ -68879,7 +68696,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94315">
+<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94438">
<summary>
Do not audit attempts to send and receive winshadow_client packets.
</summary>
@@ -68890,7 +68707,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_winshadow_client_packets" lineno="94330">
+<interface name="corenet_relabelto_winshadow_client_packets" lineno="94453">
<summary>
Relabel packets to winshadow_client the packet type.
</summary>
@@ -68900,7 +68717,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_winshadow_server_packets" lineno="94350">
+<interface name="corenet_send_winshadow_server_packets" lineno="94473">
<summary>
Send winshadow_server packets.
</summary>
@@ -68911,7 +68728,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94369">
+<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94492">
<summary>
Do not audit attempts to send winshadow_server packets.
</summary>
@@ -68922,7 +68739,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_winshadow_server_packets" lineno="94388">
+<interface name="corenet_receive_winshadow_server_packets" lineno="94511">
<summary>
Receive winshadow_server packets.
</summary>
@@ -68933,7 +68750,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94407">
+<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94530">
<summary>
Do not audit attempts to receive winshadow_server packets.
</summary>
@@ -68944,7 +68761,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94426">
+<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94549">
<summary>
Send and receive winshadow_server packets.
</summary>
@@ -68955,7 +68772,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="94442">
+<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="94565">
<summary>
Do not audit attempts to send and receive winshadow_server packets.
</summary>
@@ -68966,7 +68783,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_winshadow_server_packets" lineno="94457">
+<interface name="corenet_relabelto_winshadow_server_packets" lineno="94580">
<summary>
Relabel packets to winshadow_server the packet type.
</summary>
@@ -68976,7 +68793,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="94479">
+<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="94602">
<summary>
Send and receive TCP traffic on the wsdapi port.
</summary>
@@ -68987,7 +68804,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_wsdapi_port" lineno="94494">
+<interface name="corenet_udp_send_wsdapi_port" lineno="94617">
<summary>
Send UDP traffic on the wsdapi port.
</summary>
@@ -68998,7 +68815,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="94509">
+<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="94632">
<summary>
Do not audit attempts to send UDP traffic on the wsdapi port.
</summary>
@@ -69009,7 +68826,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_wsdapi_port" lineno="94524">
+<interface name="corenet_udp_receive_wsdapi_port" lineno="94647">
<summary>
Receive UDP traffic on the wsdapi port.
</summary>
@@ -69020,7 +68837,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="94539">
+<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="94662">
<summary>
Do not audit attempts to receive UDP traffic on the wsdapi port.
</summary>
@@ -69031,7 +68848,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="94554">
+<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="94677">
<summary>
Send and receive UDP traffic on the wsdapi port.
</summary>
@@ -69042,7 +68859,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="94570">
+<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="94693">
<summary>
Do not audit attempts to send and receive
UDP traffic on the wsdapi port.
@@ -69054,7 +68871,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_wsdapi_port" lineno="94585">
+<interface name="corenet_tcp_bind_wsdapi_port" lineno="94708">
<summary>
Bind TCP sockets to the wsdapi port.
</summary>
@@ -69065,7 +68882,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_wsdapi_port" lineno="94605">
+<interface name="corenet_udp_bind_wsdapi_port" lineno="94728">
<summary>
Bind UDP sockets to the wsdapi port.
</summary>
@@ -69076,7 +68893,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_wsdapi_port" lineno="94624">
+<interface name="corenet_tcp_connect_wsdapi_port" lineno="94747">
<summary>
Make a TCP connection to the wsdapi port.
</summary>
@@ -69086,7 +68903,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsdapi_client_packets" lineno="94644">
+<interface name="corenet_send_wsdapi_client_packets" lineno="94767">
<summary>
Send wsdapi_client packets.
</summary>
@@ -69097,7 +68914,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="94663">
+<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="94786">
<summary>
Do not audit attempts to send wsdapi_client packets.
</summary>
@@ -69108,7 +68925,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsdapi_client_packets" lineno="94682">
+<interface name="corenet_receive_wsdapi_client_packets" lineno="94805">
<summary>
Receive wsdapi_client packets.
</summary>
@@ -69119,7 +68936,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="94701">
+<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="94824">
<summary>
Do not audit attempts to receive wsdapi_client packets.
</summary>
@@ -69130,7 +68947,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="94720">
+<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="94843">
<summary>
Send and receive wsdapi_client packets.
</summary>
@@ -69141,7 +68958,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="94736">
+<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="94859">
<summary>
Do not audit attempts to send and receive wsdapi_client packets.
</summary>
@@ -69152,7 +68969,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsdapi_client_packets" lineno="94751">
+<interface name="corenet_relabelto_wsdapi_client_packets" lineno="94874">
<summary>
Relabel packets to wsdapi_client the packet type.
</summary>
@@ -69162,7 +68979,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsdapi_server_packets" lineno="94771">
+<interface name="corenet_send_wsdapi_server_packets" lineno="94894">
<summary>
Send wsdapi_server packets.
</summary>
@@ -69173,7 +68990,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="94790">
+<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="94913">
<summary>
Do not audit attempts to send wsdapi_server packets.
</summary>
@@ -69184,7 +69001,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsdapi_server_packets" lineno="94809">
+<interface name="corenet_receive_wsdapi_server_packets" lineno="94932">
<summary>
Receive wsdapi_server packets.
</summary>
@@ -69195,7 +69012,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="94828">
+<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="94951">
<summary>
Do not audit attempts to receive wsdapi_server packets.
</summary>
@@ -69206,7 +69023,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="94847">
+<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="94970">
<summary>
Send and receive wsdapi_server packets.
</summary>
@@ -69217,7 +69034,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="94863">
+<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="94986">
<summary>
Do not audit attempts to send and receive wsdapi_server packets.
</summary>
@@ -69228,7 +69045,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsdapi_server_packets" lineno="94878">
+<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95001">
<summary>
Relabel packets to wsdapi_server the packet type.
</summary>
@@ -69238,7 +69055,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="94900">
+<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95023">
<summary>
Send and receive TCP traffic on the wsicopy port.
</summary>
@@ -69249,7 +69066,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_wsicopy_port" lineno="94915">
+<interface name="corenet_udp_send_wsicopy_port" lineno="95038">
<summary>
Send UDP traffic on the wsicopy port.
</summary>
@@ -69260,7 +69077,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="94930">
+<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95053">
<summary>
Do not audit attempts to send UDP traffic on the wsicopy port.
</summary>
@@ -69271,7 +69088,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_wsicopy_port" lineno="94945">
+<interface name="corenet_udp_receive_wsicopy_port" lineno="95068">
<summary>
Receive UDP traffic on the wsicopy port.
</summary>
@@ -69282,7 +69099,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="94960">
+<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95083">
<summary>
Do not audit attempts to receive UDP traffic on the wsicopy port.
</summary>
@@ -69293,7 +69110,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="94975">
+<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95098">
<summary>
Send and receive UDP traffic on the wsicopy port.
</summary>
@@ -69304,7 +69121,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="94991">
+<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95114">
<summary>
Do not audit attempts to send and receive
UDP traffic on the wsicopy port.
@@ -69316,7 +69133,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_wsicopy_port" lineno="95006">
+<interface name="corenet_tcp_bind_wsicopy_port" lineno="95129">
<summary>
Bind TCP sockets to the wsicopy port.
</summary>
@@ -69327,7 +69144,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_wsicopy_port" lineno="95026">
+<interface name="corenet_udp_bind_wsicopy_port" lineno="95149">
<summary>
Bind UDP sockets to the wsicopy port.
</summary>
@@ -69338,7 +69155,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_wsicopy_port" lineno="95045">
+<interface name="corenet_tcp_connect_wsicopy_port" lineno="95168">
<summary>
Make a TCP connection to the wsicopy port.
</summary>
@@ -69348,7 +69165,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsicopy_client_packets" lineno="95065">
+<interface name="corenet_send_wsicopy_client_packets" lineno="95188">
<summary>
Send wsicopy_client packets.
</summary>
@@ -69359,7 +69176,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95084">
+<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95207">
<summary>
Do not audit attempts to send wsicopy_client packets.
</summary>
@@ -69370,7 +69187,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsicopy_client_packets" lineno="95103">
+<interface name="corenet_receive_wsicopy_client_packets" lineno="95226">
<summary>
Receive wsicopy_client packets.
</summary>
@@ -69381,7 +69198,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95122">
+<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95245">
<summary>
Do not audit attempts to receive wsicopy_client packets.
</summary>
@@ -69392,7 +69209,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95141">
+<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95264">
<summary>
Send and receive wsicopy_client packets.
</summary>
@@ -69403,7 +69220,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95157">
+<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95280">
<summary>
Do not audit attempts to send and receive wsicopy_client packets.
</summary>
@@ -69414,7 +69231,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95172">
+<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95295">
<summary>
Relabel packets to wsicopy_client the packet type.
</summary>
@@ -69424,7 +69241,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsicopy_server_packets" lineno="95192">
+<interface name="corenet_send_wsicopy_server_packets" lineno="95315">
<summary>
Send wsicopy_server packets.
</summary>
@@ -69435,7 +69252,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95211">
+<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95334">
<summary>
Do not audit attempts to send wsicopy_server packets.
</summary>
@@ -69446,7 +69263,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsicopy_server_packets" lineno="95230">
+<interface name="corenet_receive_wsicopy_server_packets" lineno="95353">
<summary>
Receive wsicopy_server packets.
</summary>
@@ -69457,7 +69274,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95249">
+<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95372">
<summary>
Do not audit attempts to receive wsicopy_server packets.
</summary>
@@ -69468,7 +69285,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95268">
+<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95391">
<summary>
Send and receive wsicopy_server packets.
</summary>
@@ -69479,7 +69296,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95284">
+<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95407">
<summary>
Do not audit attempts to send and receive wsicopy_server packets.
</summary>
@@ -69490,7 +69307,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95299">
+<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95422">
<summary>
Relabel packets to wsicopy_server the packet type.
</summary>
@@ -69500,7 +69317,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95321">
+<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95444">
<summary>
Send and receive TCP traffic on the xdmcp port.
</summary>
@@ -69511,7 +69328,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_xdmcp_port" lineno="95336">
+<interface name="corenet_udp_send_xdmcp_port" lineno="95459">
<summary>
Send UDP traffic on the xdmcp port.
</summary>
@@ -69522,7 +69339,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95351">
+<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95474">
<summary>
Do not audit attempts to send UDP traffic on the xdmcp port.
</summary>
@@ -69533,7 +69350,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_xdmcp_port" lineno="95366">
+<interface name="corenet_udp_receive_xdmcp_port" lineno="95489">
<summary>
Receive UDP traffic on the xdmcp port.
</summary>
@@ -69544,7 +69361,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95381">
+<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95504">
<summary>
Do not audit attempts to receive UDP traffic on the xdmcp port.
</summary>
@@ -69555,7 +69372,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95396">
+<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95519">
<summary>
Send and receive UDP traffic on the xdmcp port.
</summary>
@@ -69566,7 +69383,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95412">
+<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95535">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xdmcp port.
@@ -69578,7 +69395,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_xdmcp_port" lineno="95427">
+<interface name="corenet_tcp_bind_xdmcp_port" lineno="95550">
<summary>
Bind TCP sockets to the xdmcp port.
</summary>
@@ -69589,7 +69406,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xdmcp_port" lineno="95447">
+<interface name="corenet_udp_bind_xdmcp_port" lineno="95570">
<summary>
Bind UDP sockets to the xdmcp port.
</summary>
@@ -69600,7 +69417,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xdmcp_port" lineno="95466">
+<interface name="corenet_tcp_connect_xdmcp_port" lineno="95589">
<summary>
Make a TCP connection to the xdmcp port.
</summary>
@@ -69610,7 +69427,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xdmcp_client_packets" lineno="95486">
+<interface name="corenet_send_xdmcp_client_packets" lineno="95609">
<summary>
Send xdmcp_client packets.
</summary>
@@ -69621,7 +69438,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="95505">
+<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="95628">
<summary>
Do not audit attempts to send xdmcp_client packets.
</summary>
@@ -69632,7 +69449,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xdmcp_client_packets" lineno="95524">
+<interface name="corenet_receive_xdmcp_client_packets" lineno="95647">
<summary>
Receive xdmcp_client packets.
</summary>
@@ -69643,7 +69460,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="95543">
+<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="95666">
<summary>
Do not audit attempts to receive xdmcp_client packets.
</summary>
@@ -69654,7 +69471,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="95562">
+<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="95685">
<summary>
Send and receive xdmcp_client packets.
</summary>
@@ -69665,7 +69482,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="95578">
+<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="95701">
<summary>
Do not audit attempts to send and receive xdmcp_client packets.
</summary>
@@ -69676,7 +69493,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xdmcp_client_packets" lineno="95593">
+<interface name="corenet_relabelto_xdmcp_client_packets" lineno="95716">
<summary>
Relabel packets to xdmcp_client the packet type.
</summary>
@@ -69686,7 +69503,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xdmcp_server_packets" lineno="95613">
+<interface name="corenet_send_xdmcp_server_packets" lineno="95736">
<summary>
Send xdmcp_server packets.
</summary>
@@ -69697,7 +69514,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="95632">
+<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="95755">
<summary>
Do not audit attempts to send xdmcp_server packets.
</summary>
@@ -69708,7 +69525,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xdmcp_server_packets" lineno="95651">
+<interface name="corenet_receive_xdmcp_server_packets" lineno="95774">
<summary>
Receive xdmcp_server packets.
</summary>
@@ -69719,7 +69536,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="95670">
+<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="95793">
<summary>
Do not audit attempts to receive xdmcp_server packets.
</summary>
@@ -69730,7 +69547,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="95689">
+<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="95812">
<summary>
Send and receive xdmcp_server packets.
</summary>
@@ -69741,7 +69558,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="95705">
+<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="95828">
<summary>
Do not audit attempts to send and receive xdmcp_server packets.
</summary>
@@ -69752,7 +69569,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xdmcp_server_packets" lineno="95720">
+<interface name="corenet_relabelto_xdmcp_server_packets" lineno="95843">
<summary>
Relabel packets to xdmcp_server the packet type.
</summary>
@@ -69762,7 +69579,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xen_port" lineno="95742">
+<interface name="corenet_tcp_sendrecv_xen_port" lineno="95865">
<summary>
Send and receive TCP traffic on the xen port.
</summary>
@@ -69773,7 +69590,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_xen_port" lineno="95757">
+<interface name="corenet_udp_send_xen_port" lineno="95880">
<summary>
Send UDP traffic on the xen port.
</summary>
@@ -69784,7 +69601,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_xen_port" lineno="95772">
+<interface name="corenet_dontaudit_udp_send_xen_port" lineno="95895">
<summary>
Do not audit attempts to send UDP traffic on the xen port.
</summary>
@@ -69795,7 +69612,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_xen_port" lineno="95787">
+<interface name="corenet_udp_receive_xen_port" lineno="95910">
<summary>
Receive UDP traffic on the xen port.
</summary>
@@ -69806,7 +69623,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="95802">
+<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="95925">
<summary>
Do not audit attempts to receive UDP traffic on the xen port.
</summary>
@@ -69817,7 +69634,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_xen_port" lineno="95817">
+<interface name="corenet_udp_sendrecv_xen_port" lineno="95940">
<summary>
Send and receive UDP traffic on the xen port.
</summary>
@@ -69828,7 +69645,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="95833">
+<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="95956">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xen port.
@@ -69840,7 +69657,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_xen_port" lineno="95848">
+<interface name="corenet_tcp_bind_xen_port" lineno="95971">
<summary>
Bind TCP sockets to the xen port.
</summary>
@@ -69851,7 +69668,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xen_port" lineno="95868">
+<interface name="corenet_udp_bind_xen_port" lineno="95991">
<summary>
Bind UDP sockets to the xen port.
</summary>
@@ -69862,7 +69679,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xen_port" lineno="95887">
+<interface name="corenet_tcp_connect_xen_port" lineno="96010">
<summary>
Make a TCP connection to the xen port.
</summary>
@@ -69872,7 +69689,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xen_client_packets" lineno="95907">
+<interface name="corenet_send_xen_client_packets" lineno="96030">
<summary>
Send xen_client packets.
</summary>
@@ -69883,7 +69700,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xen_client_packets" lineno="95926">
+<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96049">
<summary>
Do not audit attempts to send xen_client packets.
</summary>
@@ -69894,7 +69711,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xen_client_packets" lineno="95945">
+<interface name="corenet_receive_xen_client_packets" lineno="96068">
<summary>
Receive xen_client packets.
</summary>
@@ -69905,7 +69722,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="95964">
+<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96087">
<summary>
Do not audit attempts to receive xen_client packets.
</summary>
@@ -69916,7 +69733,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xen_client_packets" lineno="95983">
+<interface name="corenet_sendrecv_xen_client_packets" lineno="96106">
<summary>
Send and receive xen_client packets.
</summary>
@@ -69927,7 +69744,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="95999">
+<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96122">
<summary>
Do not audit attempts to send and receive xen_client packets.
</summary>
@@ -69938,7 +69755,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xen_client_packets" lineno="96014">
+<interface name="corenet_relabelto_xen_client_packets" lineno="96137">
<summary>
Relabel packets to xen_client the packet type.
</summary>
@@ -69948,7 +69765,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xen_server_packets" lineno="96034">
+<interface name="corenet_send_xen_server_packets" lineno="96157">
<summary>
Send xen_server packets.
</summary>
@@ -69959,7 +69776,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96053">
+<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96176">
<summary>
Do not audit attempts to send xen_server packets.
</summary>
@@ -69970,7 +69787,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xen_server_packets" lineno="96072">
+<interface name="corenet_receive_xen_server_packets" lineno="96195">
<summary>
Receive xen_server packets.
</summary>
@@ -69981,7 +69798,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96091">
+<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96214">
<summary>
Do not audit attempts to receive xen_server packets.
</summary>
@@ -69992,7 +69809,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xen_server_packets" lineno="96110">
+<interface name="corenet_sendrecv_xen_server_packets" lineno="96233">
<summary>
Send and receive xen_server packets.
</summary>
@@ -70003,7 +69820,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96126">
+<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96249">
<summary>
Do not audit attempts to send and receive xen_server packets.
</summary>
@@ -70014,7 +69831,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xen_server_packets" lineno="96141">
+<interface name="corenet_relabelto_xen_server_packets" lineno="96264">
<summary>
Relabel packets to xen_server the packet type.
</summary>
@@ -70024,7 +69841,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96163">
+<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96286">
<summary>
Send and receive TCP traffic on the xfs port.
</summary>
@@ -70035,7 +69852,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_xfs_port" lineno="96178">
+<interface name="corenet_udp_send_xfs_port" lineno="96301">
<summary>
Send UDP traffic on the xfs port.
</summary>
@@ -70046,7 +69863,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96193">
+<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96316">
<summary>
Do not audit attempts to send UDP traffic on the xfs port.
</summary>
@@ -70057,7 +69874,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_xfs_port" lineno="96208">
+<interface name="corenet_udp_receive_xfs_port" lineno="96331">
<summary>
Receive UDP traffic on the xfs port.
</summary>
@@ -70068,7 +69885,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96223">
+<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96346">
<summary>
Do not audit attempts to receive UDP traffic on the xfs port.
</summary>
@@ -70079,7 +69896,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_xfs_port" lineno="96238">
+<interface name="corenet_udp_sendrecv_xfs_port" lineno="96361">
<summary>
Send and receive UDP traffic on the xfs port.
</summary>
@@ -70090,7 +69907,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96254">
+<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96377">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xfs port.
@@ -70102,7 +69919,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_xfs_port" lineno="96269">
+<interface name="corenet_tcp_bind_xfs_port" lineno="96392">
<summary>
Bind TCP sockets to the xfs port.
</summary>
@@ -70113,7 +69930,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xfs_port" lineno="96289">
+<interface name="corenet_udp_bind_xfs_port" lineno="96412">
<summary>
Bind UDP sockets to the xfs port.
</summary>
@@ -70124,7 +69941,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xfs_port" lineno="96308">
+<interface name="corenet_tcp_connect_xfs_port" lineno="96431">
<summary>
Make a TCP connection to the xfs port.
</summary>
@@ -70134,7 +69951,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xfs_client_packets" lineno="96328">
+<interface name="corenet_send_xfs_client_packets" lineno="96451">
<summary>
Send xfs_client packets.
</summary>
@@ -70145,7 +69962,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96347">
+<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96470">
<summary>
Do not audit attempts to send xfs_client packets.
</summary>
@@ -70156,7 +69973,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xfs_client_packets" lineno="96366">
+<interface name="corenet_receive_xfs_client_packets" lineno="96489">
<summary>
Receive xfs_client packets.
</summary>
@@ -70167,7 +69984,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96385">
+<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96508">
<summary>
Do not audit attempts to receive xfs_client packets.
</summary>
@@ -70178,7 +69995,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xfs_client_packets" lineno="96404">
+<interface name="corenet_sendrecv_xfs_client_packets" lineno="96527">
<summary>
Send and receive xfs_client packets.
</summary>
@@ -70189,7 +70006,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96420">
+<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96543">
<summary>
Do not audit attempts to send and receive xfs_client packets.
</summary>
@@ -70200,7 +70017,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xfs_client_packets" lineno="96435">
+<interface name="corenet_relabelto_xfs_client_packets" lineno="96558">
<summary>
Relabel packets to xfs_client the packet type.
</summary>
@@ -70210,7 +70027,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xfs_server_packets" lineno="96455">
+<interface name="corenet_send_xfs_server_packets" lineno="96578">
<summary>
Send xfs_server packets.
</summary>
@@ -70221,7 +70038,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="96474">
+<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="96597">
<summary>
Do not audit attempts to send xfs_server packets.
</summary>
@@ -70232,7 +70049,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xfs_server_packets" lineno="96493">
+<interface name="corenet_receive_xfs_server_packets" lineno="96616">
<summary>
Receive xfs_server packets.
</summary>
@@ -70243,7 +70060,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="96512">
+<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="96635">
<summary>
Do not audit attempts to receive xfs_server packets.
</summary>
@@ -70254,7 +70071,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xfs_server_packets" lineno="96531">
+<interface name="corenet_sendrecv_xfs_server_packets" lineno="96654">
<summary>
Send and receive xfs_server packets.
</summary>
@@ -70265,7 +70082,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="96547">
+<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="96670">
<summary>
Do not audit attempts to send and receive xfs_server packets.
</summary>
@@ -70276,7 +70093,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xfs_server_packets" lineno="96562">
+<interface name="corenet_relabelto_xfs_server_packets" lineno="96685">
<summary>
Relabel packets to xfs_server the packet type.
</summary>
@@ -70286,7 +70103,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xserver_port" lineno="96584">
+<interface name="corenet_tcp_sendrecv_xserver_port" lineno="96707">
<summary>
Send and receive TCP traffic on the xserver port.
</summary>
@@ -70297,7 +70114,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_xserver_port" lineno="96599">
+<interface name="corenet_udp_send_xserver_port" lineno="96722">
<summary>
Send UDP traffic on the xserver port.
</summary>
@@ -70308,7 +70125,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="96614">
+<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="96737">
<summary>
Do not audit attempts to send UDP traffic on the xserver port.
</summary>
@@ -70319,7 +70136,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_xserver_port" lineno="96629">
+<interface name="corenet_udp_receive_xserver_port" lineno="96752">
<summary>
Receive UDP traffic on the xserver port.
</summary>
@@ -70330,7 +70147,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="96644">
+<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="96767">
<summary>
Do not audit attempts to receive UDP traffic on the xserver port.
</summary>
@@ -70341,7 +70158,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_xserver_port" lineno="96659">
+<interface name="corenet_udp_sendrecv_xserver_port" lineno="96782">
<summary>
Send and receive UDP traffic on the xserver port.
</summary>
@@ -70352,7 +70169,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="96675">
+<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="96798">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xserver port.
@@ -70364,7 +70181,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_xserver_port" lineno="96690">
+<interface name="corenet_tcp_bind_xserver_port" lineno="96813">
<summary>
Bind TCP sockets to the xserver port.
</summary>
@@ -70375,7 +70192,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xserver_port" lineno="96710">
+<interface name="corenet_udp_bind_xserver_port" lineno="96833">
<summary>
Bind UDP sockets to the xserver port.
</summary>
@@ -70386,7 +70203,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xserver_port" lineno="96729">
+<interface name="corenet_tcp_connect_xserver_port" lineno="96852">
<summary>
Make a TCP connection to the xserver port.
</summary>
@@ -70396,7 +70213,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xserver_client_packets" lineno="96749">
+<interface name="corenet_send_xserver_client_packets" lineno="96872">
<summary>
Send xserver_client packets.
</summary>
@@ -70407,7 +70224,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="96768">
+<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="96891">
<summary>
Do not audit attempts to send xserver_client packets.
</summary>
@@ -70418,7 +70235,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xserver_client_packets" lineno="96787">
+<interface name="corenet_receive_xserver_client_packets" lineno="96910">
<summary>
Receive xserver_client packets.
</summary>
@@ -70429,7 +70246,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="96806">
+<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="96929">
<summary>
Do not audit attempts to receive xserver_client packets.
</summary>
@@ -70440,7 +70257,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xserver_client_packets" lineno="96825">
+<interface name="corenet_sendrecv_xserver_client_packets" lineno="96948">
<summary>
Send and receive xserver_client packets.
</summary>
@@ -70451,7 +70268,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="96841">
+<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="96964">
<summary>
Do not audit attempts to send and receive xserver_client packets.
</summary>
@@ -70462,7 +70279,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xserver_client_packets" lineno="96856">
+<interface name="corenet_relabelto_xserver_client_packets" lineno="96979">
<summary>
Relabel packets to xserver_client the packet type.
</summary>
@@ -70472,7 +70289,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xserver_server_packets" lineno="96876">
+<interface name="corenet_send_xserver_server_packets" lineno="96999">
<summary>
Send xserver_server packets.
</summary>
@@ -70483,7 +70300,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="96895">
+<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97018">
<summary>
Do not audit attempts to send xserver_server packets.
</summary>
@@ -70494,7 +70311,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xserver_server_packets" lineno="96914">
+<interface name="corenet_receive_xserver_server_packets" lineno="97037">
<summary>
Receive xserver_server packets.
</summary>
@@ -70505,7 +70322,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="96933">
+<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97056">
<summary>
Do not audit attempts to receive xserver_server packets.
</summary>
@@ -70516,7 +70333,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xserver_server_packets" lineno="96952">
+<interface name="corenet_sendrecv_xserver_server_packets" lineno="97075">
<summary>
Send and receive xserver_server packets.
</summary>
@@ -70527,7 +70344,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="96968">
+<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97091">
<summary>
Do not audit attempts to send and receive xserver_server packets.
</summary>
@@ -70538,7 +70355,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xserver_server_packets" lineno="96983">
+<interface name="corenet_relabelto_xserver_server_packets" lineno="97106">
<summary>
Relabel packets to xserver_server the packet type.
</summary>
@@ -70548,7 +70365,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97005">
+<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97128">
<summary>
Send and receive TCP traffic on the zarafa port.
</summary>
@@ -70559,7 +70376,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zarafa_port" lineno="97020">
+<interface name="corenet_udp_send_zarafa_port" lineno="97143">
<summary>
Send UDP traffic on the zarafa port.
</summary>
@@ -70570,7 +70387,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97035">
+<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97158">
<summary>
Do not audit attempts to send UDP traffic on the zarafa port.
</summary>
@@ -70581,7 +70398,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zarafa_port" lineno="97050">
+<interface name="corenet_udp_receive_zarafa_port" lineno="97173">
<summary>
Receive UDP traffic on the zarafa port.
</summary>
@@ -70592,7 +70409,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97065">
+<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97188">
<summary>
Do not audit attempts to receive UDP traffic on the zarafa port.
</summary>
@@ -70603,7 +70420,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97080">
+<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97203">
<summary>
Send and receive UDP traffic on the zarafa port.
</summary>
@@ -70614,7 +70431,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97096">
+<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97219">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zarafa port.
@@ -70626,7 +70443,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zarafa_port" lineno="97111">
+<interface name="corenet_tcp_bind_zarafa_port" lineno="97234">
<summary>
Bind TCP sockets to the zarafa port.
</summary>
@@ -70637,7 +70454,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zarafa_port" lineno="97131">
+<interface name="corenet_udp_bind_zarafa_port" lineno="97254">
<summary>
Bind UDP sockets to the zarafa port.
</summary>
@@ -70648,7 +70465,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zarafa_port" lineno="97150">
+<interface name="corenet_tcp_connect_zarafa_port" lineno="97273">
<summary>
Make a TCP connection to the zarafa port.
</summary>
@@ -70658,7 +70475,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zarafa_client_packets" lineno="97170">
+<interface name="corenet_send_zarafa_client_packets" lineno="97293">
<summary>
Send zarafa_client packets.
</summary>
@@ -70669,7 +70486,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97189">
+<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97312">
<summary>
Do not audit attempts to send zarafa_client packets.
</summary>
@@ -70680,7 +70497,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zarafa_client_packets" lineno="97208">
+<interface name="corenet_receive_zarafa_client_packets" lineno="97331">
<summary>
Receive zarafa_client packets.
</summary>
@@ -70691,7 +70508,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97227">
+<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97350">
<summary>
Do not audit attempts to receive zarafa_client packets.
</summary>
@@ -70702,7 +70519,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97246">
+<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97369">
<summary>
Send and receive zarafa_client packets.
</summary>
@@ -70713,7 +70530,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97262">
+<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97385">
<summary>
Do not audit attempts to send and receive zarafa_client packets.
</summary>
@@ -70724,7 +70541,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zarafa_client_packets" lineno="97277">
+<interface name="corenet_relabelto_zarafa_client_packets" lineno="97400">
<summary>
Relabel packets to zarafa_client the packet type.
</summary>
@@ -70734,7 +70551,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zarafa_server_packets" lineno="97297">
+<interface name="corenet_send_zarafa_server_packets" lineno="97420">
<summary>
Send zarafa_server packets.
</summary>
@@ -70745,7 +70562,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97316">
+<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97439">
<summary>
Do not audit attempts to send zarafa_server packets.
</summary>
@@ -70756,7 +70573,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zarafa_server_packets" lineno="97335">
+<interface name="corenet_receive_zarafa_server_packets" lineno="97458">
<summary>
Receive zarafa_server packets.
</summary>
@@ -70767,7 +70584,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97354">
+<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97477">
<summary>
Do not audit attempts to receive zarafa_server packets.
</summary>
@@ -70778,7 +70595,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97373">
+<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97496">
<summary>
Send and receive zarafa_server packets.
</summary>
@@ -70789,7 +70606,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97389">
+<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97512">
<summary>
Do not audit attempts to send and receive zarafa_server packets.
</summary>
@@ -70800,7 +70617,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zarafa_server_packets" lineno="97404">
+<interface name="corenet_relabelto_zarafa_server_packets" lineno="97527">
<summary>
Relabel packets to zarafa_server the packet type.
</summary>
@@ -70810,7 +70627,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97426">
+<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97549">
<summary>
Send and receive TCP traffic on the zabbix port.
</summary>
@@ -70821,7 +70638,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zabbix_port" lineno="97441">
+<interface name="corenet_udp_send_zabbix_port" lineno="97564">
<summary>
Send UDP traffic on the zabbix port.
</summary>
@@ -70832,7 +70649,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="97456">
+<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="97579">
<summary>
Do not audit attempts to send UDP traffic on the zabbix port.
</summary>
@@ -70843,7 +70660,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zabbix_port" lineno="97471">
+<interface name="corenet_udp_receive_zabbix_port" lineno="97594">
<summary>
Receive UDP traffic on the zabbix port.
</summary>
@@ -70854,7 +70671,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="97486">
+<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="97609">
<summary>
Do not audit attempts to receive UDP traffic on the zabbix port.
</summary>
@@ -70865,7 +70682,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zabbix_port" lineno="97501">
+<interface name="corenet_udp_sendrecv_zabbix_port" lineno="97624">
<summary>
Send and receive UDP traffic on the zabbix port.
</summary>
@@ -70876,7 +70693,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="97517">
+<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="97640">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zabbix port.
@@ -70888,7 +70705,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zabbix_port" lineno="97532">
+<interface name="corenet_tcp_bind_zabbix_port" lineno="97655">
<summary>
Bind TCP sockets to the zabbix port.
</summary>
@@ -70899,7 +70716,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zabbix_port" lineno="97552">
+<interface name="corenet_udp_bind_zabbix_port" lineno="97675">
<summary>
Bind UDP sockets to the zabbix port.
</summary>
@@ -70910,7 +70727,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zabbix_port" lineno="97571">
+<interface name="corenet_tcp_connect_zabbix_port" lineno="97694">
<summary>
Make a TCP connection to the zabbix port.
</summary>
@@ -70920,7 +70737,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_client_packets" lineno="97591">
+<interface name="corenet_send_zabbix_client_packets" lineno="97714">
<summary>
Send zabbix_client packets.
</summary>
@@ -70931,7 +70748,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="97610">
+<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="97733">
<summary>
Do not audit attempts to send zabbix_client packets.
</summary>
@@ -70942,7 +70759,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_client_packets" lineno="97629">
+<interface name="corenet_receive_zabbix_client_packets" lineno="97752">
<summary>
Receive zabbix_client packets.
</summary>
@@ -70953,7 +70770,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="97648">
+<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="97771">
<summary>
Do not audit attempts to receive zabbix_client packets.
</summary>
@@ -70964,7 +70781,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_client_packets" lineno="97667">
+<interface name="corenet_sendrecv_zabbix_client_packets" lineno="97790">
<summary>
Send and receive zabbix_client packets.
</summary>
@@ -70975,7 +70792,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="97683">
+<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="97806">
<summary>
Do not audit attempts to send and receive zabbix_client packets.
</summary>
@@ -70986,7 +70803,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_client_packets" lineno="97698">
+<interface name="corenet_relabelto_zabbix_client_packets" lineno="97821">
<summary>
Relabel packets to zabbix_client the packet type.
</summary>
@@ -70996,7 +70813,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_server_packets" lineno="97718">
+<interface name="corenet_send_zabbix_server_packets" lineno="97841">
<summary>
Send zabbix_server packets.
</summary>
@@ -71007,7 +70824,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="97737">
+<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="97860">
<summary>
Do not audit attempts to send zabbix_server packets.
</summary>
@@ -71018,7 +70835,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_server_packets" lineno="97756">
+<interface name="corenet_receive_zabbix_server_packets" lineno="97879">
<summary>
Receive zabbix_server packets.
</summary>
@@ -71029,7 +70846,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="97775">
+<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="97898">
<summary>
Do not audit attempts to receive zabbix_server packets.
</summary>
@@ -71040,7 +70857,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_server_packets" lineno="97794">
+<interface name="corenet_sendrecv_zabbix_server_packets" lineno="97917">
<summary>
Send and receive zabbix_server packets.
</summary>
@@ -71051,7 +70868,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="97810">
+<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="97933">
<summary>
Do not audit attempts to send and receive zabbix_server packets.
</summary>
@@ -71062,7 +70879,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_server_packets" lineno="97825">
+<interface name="corenet_relabelto_zabbix_server_packets" lineno="97948">
<summary>
Relabel packets to zabbix_server the packet type.
</summary>
@@ -71072,7 +70889,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="97847">
+<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="97970">
<summary>
Send and receive TCP traffic on the zabbix_agent port.
</summary>
@@ -71083,7 +70900,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zabbix_agent_port" lineno="97862">
+<interface name="corenet_udp_send_zabbix_agent_port" lineno="97985">
<summary>
Send UDP traffic on the zabbix_agent port.
</summary>
@@ -71094,7 +70911,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="97877">
+<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98000">
<summary>
Do not audit attempts to send UDP traffic on the zabbix_agent port.
</summary>
@@ -71105,7 +70922,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zabbix_agent_port" lineno="97892">
+<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98015">
<summary>
Receive UDP traffic on the zabbix_agent port.
</summary>
@@ -71116,7 +70933,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="97907">
+<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98030">
<summary>
Do not audit attempts to receive UDP traffic on the zabbix_agent port.
</summary>
@@ -71127,7 +70944,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="97922">
+<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98045">
<summary>
Send and receive UDP traffic on the zabbix_agent port.
</summary>
@@ -71138,7 +70955,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="97938">
+<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98061">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zabbix_agent port.
@@ -71150,7 +70967,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="97953">
+<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98076">
<summary>
Bind TCP sockets to the zabbix_agent port.
</summary>
@@ -71161,7 +70978,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zabbix_agent_port" lineno="97973">
+<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98096">
<summary>
Bind UDP sockets to the zabbix_agent port.
</summary>
@@ -71172,7 +70989,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="97992">
+<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98115">
<summary>
Make a TCP connection to the zabbix_agent port.
</summary>
@@ -71182,7 +70999,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_agent_client_packets" lineno="98012">
+<interface name="corenet_send_zabbix_agent_client_packets" lineno="98135">
<summary>
Send zabbix_agent_client packets.
</summary>
@@ -71193,7 +71010,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98031">
+<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98154">
<summary>
Do not audit attempts to send zabbix_agent_client packets.
</summary>
@@ -71204,7 +71021,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98050">
+<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98173">
<summary>
Receive zabbix_agent_client packets.
</summary>
@@ -71215,7 +71032,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98069">
+<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98192">
<summary>
Do not audit attempts to receive zabbix_agent_client packets.
</summary>
@@ -71226,7 +71043,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98088">
+<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98211">
<summary>
Send and receive zabbix_agent_client packets.
</summary>
@@ -71237,7 +71054,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98104">
+<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98227">
<summary>
Do not audit attempts to send and receive zabbix_agent_client packets.
</summary>
@@ -71248,7 +71065,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98119">
+<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98242">
<summary>
Relabel packets to zabbix_agent_client the packet type.
</summary>
@@ -71258,7 +71075,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_agent_server_packets" lineno="98139">
+<interface name="corenet_send_zabbix_agent_server_packets" lineno="98262">
<summary>
Send zabbix_agent_server packets.
</summary>
@@ -71269,7 +71086,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98158">
+<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98281">
<summary>
Do not audit attempts to send zabbix_agent_server packets.
</summary>
@@ -71280,7 +71097,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98177">
+<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98300">
<summary>
Receive zabbix_agent_server packets.
</summary>
@@ -71291,7 +71108,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98196">
+<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98319">
<summary>
Do not audit attempts to receive zabbix_agent_server packets.
</summary>
@@ -71302,7 +71119,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98215">
+<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98338">
<summary>
Send and receive zabbix_agent_server packets.
</summary>
@@ -71313,7 +71130,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98231">
+<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98354">
<summary>
Do not audit attempts to send and receive zabbix_agent_server packets.
</summary>
@@ -71324,7 +71141,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98246">
+<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98369">
<summary>
Relabel packets to zabbix_agent_server the packet type.
</summary>
@@ -71334,7 +71151,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98268">
+<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98391">
<summary>
Send and receive TCP traffic on the zookeeper_client port.
</summary>
@@ -71345,7 +71162,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zookeeper_client_port" lineno="98283">
+<interface name="corenet_udp_send_zookeeper_client_port" lineno="98406">
<summary>
Send UDP traffic on the zookeeper_client port.
</summary>
@@ -71356,7 +71173,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98298">
+<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98421">
<summary>
Do not audit attempts to send UDP traffic on the zookeeper_client port.
</summary>
@@ -71367,7 +71184,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98313">
+<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98436">
<summary>
Receive UDP traffic on the zookeeper_client port.
</summary>
@@ -71378,7 +71195,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98328">
+<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98451">
<summary>
Do not audit attempts to receive UDP traffic on the zookeeper_client port.
</summary>
@@ -71389,7 +71206,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98343">
+<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98466">
<summary>
Send and receive UDP traffic on the zookeeper_client port.
</summary>
@@ -71400,7 +71217,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98359">
+<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98482">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zookeeper_client port.
@@ -71412,7 +71229,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98374">
+<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98497">
<summary>
Bind TCP sockets to the zookeeper_client port.
</summary>
@@ -71423,7 +71240,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98394">
+<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98517">
<summary>
Bind UDP sockets to the zookeeper_client port.
</summary>
@@ -71434,7 +71251,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98413">
+<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98536">
<summary>
Make a TCP connection to the zookeeper_client port.
</summary>
@@ -71444,7 +71261,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_client_client_packets" lineno="98433">
+<interface name="corenet_send_zookeeper_client_client_packets" lineno="98556">
<summary>
Send zookeeper_client_client packets.
</summary>
@@ -71455,7 +71272,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="98452">
+<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="98575">
<summary>
Do not audit attempts to send zookeeper_client_client packets.
</summary>
@@ -71466,7 +71283,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_client_client_packets" lineno="98471">
+<interface name="corenet_receive_zookeeper_client_client_packets" lineno="98594">
<summary>
Receive zookeeper_client_client packets.
</summary>
@@ -71477,7 +71294,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="98490">
+<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="98613">
<summary>
Do not audit attempts to receive zookeeper_client_client packets.
</summary>
@@ -71488,7 +71305,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="98509">
+<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="98632">
<summary>
Send and receive zookeeper_client_client packets.
</summary>
@@ -71499,7 +71316,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="98525">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="98648">
<summary>
Do not audit attempts to send and receive zookeeper_client_client packets.
</summary>
@@ -71510,7 +71327,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="98540">
+<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="98663">
<summary>
Relabel packets to zookeeper_client_client the packet type.
</summary>
@@ -71520,7 +71337,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_client_server_packets" lineno="98560">
+<interface name="corenet_send_zookeeper_client_server_packets" lineno="98683">
<summary>
Send zookeeper_client_server packets.
</summary>
@@ -71531,7 +71348,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="98579">
+<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="98702">
<summary>
Do not audit attempts to send zookeeper_client_server packets.
</summary>
@@ -71542,7 +71359,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_client_server_packets" lineno="98598">
+<interface name="corenet_receive_zookeeper_client_server_packets" lineno="98721">
<summary>
Receive zookeeper_client_server packets.
</summary>
@@ -71553,7 +71370,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="98617">
+<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="98740">
<summary>
Do not audit attempts to receive zookeeper_client_server packets.
</summary>
@@ -71564,7 +71381,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="98636">
+<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="98759">
<summary>
Send and receive zookeeper_client_server packets.
</summary>
@@ -71575,7 +71392,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="98652">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="98775">
<summary>
Do not audit attempts to send and receive zookeeper_client_server packets.
</summary>
@@ -71586,7 +71403,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="98667">
+<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="98790">
<summary>
Relabel packets to zookeeper_client_server the packet type.
</summary>
@@ -71596,7 +71413,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="98689">
+<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="98812">
<summary>
Send and receive TCP traffic on the zookeeper_election port.
</summary>
@@ -71607,7 +71424,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zookeeper_election_port" lineno="98704">
+<interface name="corenet_udp_send_zookeeper_election_port" lineno="98827">
<summary>
Send UDP traffic on the zookeeper_election port.
</summary>
@@ -71618,7 +71435,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="98719">
+<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="98842">
<summary>
Do not audit attempts to send UDP traffic on the zookeeper_election port.
</summary>
@@ -71629,7 +71446,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zookeeper_election_port" lineno="98734">
+<interface name="corenet_udp_receive_zookeeper_election_port" lineno="98857">
<summary>
Receive UDP traffic on the zookeeper_election port.
</summary>
@@ -71640,7 +71457,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="98749">
+<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="98872">
<summary>
Do not audit attempts to receive UDP traffic on the zookeeper_election port.
</summary>
@@ -71651,7 +71468,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="98764">
+<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="98887">
<summary>
Send and receive UDP traffic on the zookeeper_election port.
</summary>
@@ -71662,7 +71479,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="98780">
+<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="98903">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zookeeper_election port.
@@ -71674,7 +71491,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="98795">
+<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="98918">
<summary>
Bind TCP sockets to the zookeeper_election port.
</summary>
@@ -71685,7 +71502,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zookeeper_election_port" lineno="98815">
+<interface name="corenet_udp_bind_zookeeper_election_port" lineno="98938">
<summary>
Bind UDP sockets to the zookeeper_election port.
</summary>
@@ -71696,7 +71513,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="98834">
+<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="98957">
<summary>
Make a TCP connection to the zookeeper_election port.
</summary>
@@ -71706,7 +71523,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_election_client_packets" lineno="98854">
+<interface name="corenet_send_zookeeper_election_client_packets" lineno="98977">
<summary>
Send zookeeper_election_client packets.
</summary>
@@ -71717,7 +71534,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="98873">
+<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="98996">
<summary>
Do not audit attempts to send zookeeper_election_client packets.
</summary>
@@ -71728,7 +71545,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_election_client_packets" lineno="98892">
+<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99015">
<summary>
Receive zookeeper_election_client packets.
</summary>
@@ -71739,7 +71556,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="98911">
+<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99034">
<summary>
Do not audit attempts to receive zookeeper_election_client packets.
</summary>
@@ -71750,7 +71567,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="98930">
+<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99053">
<summary>
Send and receive zookeeper_election_client packets.
</summary>
@@ -71761,7 +71578,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="98946">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99069">
<summary>
Do not audit attempts to send and receive zookeeper_election_client packets.
</summary>
@@ -71772,7 +71589,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="98961">
+<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99084">
<summary>
Relabel packets to zookeeper_election_client the packet type.
</summary>
@@ -71782,7 +71599,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_election_server_packets" lineno="98981">
+<interface name="corenet_send_zookeeper_election_server_packets" lineno="99104">
<summary>
Send zookeeper_election_server packets.
</summary>
@@ -71793,7 +71610,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99000">
+<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99123">
<summary>
Do not audit attempts to send zookeeper_election_server packets.
</summary>
@@ -71804,7 +71621,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99019">
+<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99142">
<summary>
Receive zookeeper_election_server packets.
</summary>
@@ -71815,7 +71632,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99038">
+<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99161">
<summary>
Do not audit attempts to receive zookeeper_election_server packets.
</summary>
@@ -71826,7 +71643,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99057">
+<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99180">
<summary>
Send and receive zookeeper_election_server packets.
</summary>
@@ -71837,7 +71654,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99073">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99196">
<summary>
Do not audit attempts to send and receive zookeeper_election_server packets.
</summary>
@@ -71848,7 +71665,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99088">
+<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99211">
<summary>
Relabel packets to zookeeper_election_server the packet type.
</summary>
@@ -71858,7 +71675,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99110">
+<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99233">
<summary>
Send and receive TCP traffic on the zookeeper_leader port.
</summary>
@@ -71869,7 +71686,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99125">
+<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99248">
<summary>
Send UDP traffic on the zookeeper_leader port.
</summary>
@@ -71880,7 +71697,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99140">
+<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99263">
<summary>
Do not audit attempts to send UDP traffic on the zookeeper_leader port.
</summary>
@@ -71891,7 +71708,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99155">
+<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99278">
<summary>
Receive UDP traffic on the zookeeper_leader port.
</summary>
@@ -71902,7 +71719,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99170">
+<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99293">
<summary>
Do not audit attempts to receive UDP traffic on the zookeeper_leader port.
</summary>
@@ -71913,7 +71730,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99185">
+<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99308">
<summary>
Send and receive UDP traffic on the zookeeper_leader port.
</summary>
@@ -71924,7 +71741,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99201">
+<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99324">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zookeeper_leader port.
@@ -71936,7 +71753,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99216">
+<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99339">
<summary>
Bind TCP sockets to the zookeeper_leader port.
</summary>
@@ -71947,7 +71764,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99236">
+<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99359">
<summary>
Bind UDP sockets to the zookeeper_leader port.
</summary>
@@ -71958,7 +71775,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99255">
+<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99378">
<summary>
Make a TCP connection to the zookeeper_leader port.
</summary>
@@ -71968,7 +71785,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99275">
+<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99398">
<summary>
Send zookeeper_leader_client packets.
</summary>
@@ -71979,7 +71796,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99294">
+<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99417">
<summary>
Do not audit attempts to send zookeeper_leader_client packets.
</summary>
@@ -71990,7 +71807,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99313">
+<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99436">
<summary>
Receive zookeeper_leader_client packets.
</summary>
@@ -72001,7 +71818,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99332">
+<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99455">
<summary>
Do not audit attempts to receive zookeeper_leader_client packets.
</summary>
@@ -72012,7 +71829,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99351">
+<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99474">
<summary>
Send and receive zookeeper_leader_client packets.
</summary>
@@ -72023,7 +71840,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99367">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99490">
<summary>
Do not audit attempts to send and receive zookeeper_leader_client packets.
</summary>
@@ -72034,7 +71851,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99382">
+<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99505">
<summary>
Relabel packets to zookeeper_leader_client the packet type.
</summary>
@@ -72044,7 +71861,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99402">
+<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99525">
<summary>
Send zookeeper_leader_server packets.
</summary>
@@ -72055,7 +71872,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99421">
+<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99544">
<summary>
Do not audit attempts to send zookeeper_leader_server packets.
</summary>
@@ -72066,7 +71883,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="99440">
+<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="99563">
<summary>
Receive zookeeper_leader_server packets.
</summary>
@@ -72077,7 +71894,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="99459">
+<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="99582">
<summary>
Do not audit attempts to receive zookeeper_leader_server packets.
</summary>
@@ -72088,7 +71905,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="99478">
+<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="99601">
<summary>
Send and receive zookeeper_leader_server packets.
</summary>
@@ -72099,7 +71916,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="99494">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="99617">
<summary>
Do not audit attempts to send and receive zookeeper_leader_server packets.
</summary>
@@ -72110,7 +71927,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="99509">
+<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="99632">
<summary>
Relabel packets to zookeeper_leader_server the packet type.
</summary>
@@ -72120,7 +71937,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zebra_port" lineno="99531">
+<interface name="corenet_tcp_sendrecv_zebra_port" lineno="99654">
<summary>
Send and receive TCP traffic on the zebra port.
</summary>
@@ -72131,7 +71948,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zebra_port" lineno="99546">
+<interface name="corenet_udp_send_zebra_port" lineno="99669">
<summary>
Send UDP traffic on the zebra port.
</summary>
@@ -72142,7 +71959,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="99561">
+<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="99684">
<summary>
Do not audit attempts to send UDP traffic on the zebra port.
</summary>
@@ -72153,7 +71970,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zebra_port" lineno="99576">
+<interface name="corenet_udp_receive_zebra_port" lineno="99699">
<summary>
Receive UDP traffic on the zebra port.
</summary>
@@ -72164,7 +71981,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="99591">
+<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="99714">
<summary>
Do not audit attempts to receive UDP traffic on the zebra port.
</summary>
@@ -72175,7 +71992,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zebra_port" lineno="99606">
+<interface name="corenet_udp_sendrecv_zebra_port" lineno="99729">
<summary>
Send and receive UDP traffic on the zebra port.
</summary>
@@ -72186,7 +72003,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="99622">
+<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="99745">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zebra port.
@@ -72198,7 +72015,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zebra_port" lineno="99637">
+<interface name="corenet_tcp_bind_zebra_port" lineno="99760">
<summary>
Bind TCP sockets to the zebra port.
</summary>
@@ -72209,7 +72026,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zebra_port" lineno="99657">
+<interface name="corenet_udp_bind_zebra_port" lineno="99780">
<summary>
Bind UDP sockets to the zebra port.
</summary>
@@ -72220,7 +72037,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zebra_port" lineno="99676">
+<interface name="corenet_tcp_connect_zebra_port" lineno="99799">
<summary>
Make a TCP connection to the zebra port.
</summary>
@@ -72230,7 +72047,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zebra_client_packets" lineno="99696">
+<interface name="corenet_send_zebra_client_packets" lineno="99819">
<summary>
Send zebra_client packets.
</summary>
@@ -72241,7 +72058,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="99715">
+<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="99838">
<summary>
Do not audit attempts to send zebra_client packets.
</summary>
@@ -72252,7 +72069,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zebra_client_packets" lineno="99734">
+<interface name="corenet_receive_zebra_client_packets" lineno="99857">
<summary>
Receive zebra_client packets.
</summary>
@@ -72263,7 +72080,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="99753">
+<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="99876">
<summary>
Do not audit attempts to receive zebra_client packets.
</summary>
@@ -72274,7 +72091,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zebra_client_packets" lineno="99772">
+<interface name="corenet_sendrecv_zebra_client_packets" lineno="99895">
<summary>
Send and receive zebra_client packets.
</summary>
@@ -72285,7 +72102,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="99788">
+<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="99911">
<summary>
Do not audit attempts to send and receive zebra_client packets.
</summary>
@@ -72296,7 +72113,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zebra_client_packets" lineno="99803">
+<interface name="corenet_relabelto_zebra_client_packets" lineno="99926">
<summary>
Relabel packets to zebra_client the packet type.
</summary>
@@ -72306,7 +72123,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zebra_server_packets" lineno="99823">
+<interface name="corenet_send_zebra_server_packets" lineno="99946">
<summary>
Send zebra_server packets.
</summary>
@@ -72317,7 +72134,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="99842">
+<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="99965">
<summary>
Do not audit attempts to send zebra_server packets.
</summary>
@@ -72328,7 +72145,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zebra_server_packets" lineno="99861">
+<interface name="corenet_receive_zebra_server_packets" lineno="99984">
<summary>
Receive zebra_server packets.
</summary>
@@ -72339,7 +72156,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="99880">
+<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100003">
<summary>
Do not audit attempts to receive zebra_server packets.
</summary>
@@ -72350,7 +72167,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zebra_server_packets" lineno="99899">
+<interface name="corenet_sendrecv_zebra_server_packets" lineno="100022">
<summary>
Send and receive zebra_server packets.
</summary>
@@ -72361,7 +72178,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="99915">
+<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100038">
<summary>
Do not audit attempts to send and receive zebra_server packets.
</summary>
@@ -72372,7 +72189,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zebra_server_packets" lineno="99930">
+<interface name="corenet_relabelto_zebra_server_packets" lineno="100053">
<summary>
Relabel packets to zebra_server the packet type.
</summary>
@@ -72382,7 +72199,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zented_port" lineno="99952">
+<interface name="corenet_tcp_sendrecv_zented_port" lineno="100075">
<summary>
Send and receive TCP traffic on the zented port.
</summary>
@@ -72393,7 +72210,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zented_port" lineno="99967">
+<interface name="corenet_udp_send_zented_port" lineno="100090">
<summary>
Send UDP traffic on the zented port.
</summary>
@@ -72404,7 +72221,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zented_port" lineno="99982">
+<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100105">
<summary>
Do not audit attempts to send UDP traffic on the zented port.
</summary>
@@ -72415,7 +72232,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zented_port" lineno="99997">
+<interface name="corenet_udp_receive_zented_port" lineno="100120">
<summary>
Receive UDP traffic on the zented port.
</summary>
@@ -72426,7 +72243,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100012">
+<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100135">
<summary>
Do not audit attempts to receive UDP traffic on the zented port.
</summary>
@@ -72437,7 +72254,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zented_port" lineno="100027">
+<interface name="corenet_udp_sendrecv_zented_port" lineno="100150">
<summary>
Send and receive UDP traffic on the zented port.
</summary>
@@ -72448,7 +72265,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100043">
+<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100166">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zented port.
@@ -72460,7 +72277,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zented_port" lineno="100058">
+<interface name="corenet_tcp_bind_zented_port" lineno="100181">
<summary>
Bind TCP sockets to the zented port.
</summary>
@@ -72471,7 +72288,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zented_port" lineno="100078">
+<interface name="corenet_udp_bind_zented_port" lineno="100201">
<summary>
Bind UDP sockets to the zented port.
</summary>
@@ -72482,7 +72299,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zented_port" lineno="100097">
+<interface name="corenet_tcp_connect_zented_port" lineno="100220">
<summary>
Make a TCP connection to the zented port.
</summary>
@@ -72492,7 +72309,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zented_client_packets" lineno="100117">
+<interface name="corenet_send_zented_client_packets" lineno="100240">
<summary>
Send zented_client packets.
</summary>
@@ -72503,7 +72320,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100136">
+<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100259">
<summary>
Do not audit attempts to send zented_client packets.
</summary>
@@ -72514,7 +72331,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zented_client_packets" lineno="100155">
+<interface name="corenet_receive_zented_client_packets" lineno="100278">
<summary>
Receive zented_client packets.
</summary>
@@ -72525,7 +72342,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100174">
+<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100297">
<summary>
Do not audit attempts to receive zented_client packets.
</summary>
@@ -72536,7 +72353,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zented_client_packets" lineno="100193">
+<interface name="corenet_sendrecv_zented_client_packets" lineno="100316">
<summary>
Send and receive zented_client packets.
</summary>
@@ -72547,7 +72364,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100209">
+<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100332">
<summary>
Do not audit attempts to send and receive zented_client packets.
</summary>
@@ -72558,7 +72375,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zented_client_packets" lineno="100224">
+<interface name="corenet_relabelto_zented_client_packets" lineno="100347">
<summary>
Relabel packets to zented_client the packet type.
</summary>
@@ -72568,7 +72385,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zented_server_packets" lineno="100244">
+<interface name="corenet_send_zented_server_packets" lineno="100367">
<summary>
Send zented_server packets.
</summary>
@@ -72579,7 +72396,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100263">
+<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100386">
<summary>
Do not audit attempts to send zented_server packets.
</summary>
@@ -72590,7 +72407,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zented_server_packets" lineno="100282">
+<interface name="corenet_receive_zented_server_packets" lineno="100405">
<summary>
Receive zented_server packets.
</summary>
@@ -72601,7 +72418,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100301">
+<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100424">
<summary>
Do not audit attempts to receive zented_server packets.
</summary>
@@ -72612,7 +72429,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zented_server_packets" lineno="100320">
+<interface name="corenet_sendrecv_zented_server_packets" lineno="100443">
<summary>
Send and receive zented_server packets.
</summary>
@@ -72623,7 +72440,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100336">
+<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100459">
<summary>
Do not audit attempts to send and receive zented_server packets.
</summary>
@@ -72634,7 +72451,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zented_server_packets" lineno="100351">
+<interface name="corenet_relabelto_zented_server_packets" lineno="100474">
<summary>
Relabel packets to zented_server the packet type.
</summary>
@@ -72644,7 +72461,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zope_port" lineno="100373">
+<interface name="corenet_tcp_sendrecv_zope_port" lineno="100496">
<summary>
Send and receive TCP traffic on the zope port.
</summary>
@@ -72655,7 +72472,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zope_port" lineno="100388">
+<interface name="corenet_udp_send_zope_port" lineno="100511">
<summary>
Send UDP traffic on the zope port.
</summary>
@@ -72666,7 +72483,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100403">
+<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100526">
<summary>
Do not audit attempts to send UDP traffic on the zope port.
</summary>
@@ -72677,7 +72494,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zope_port" lineno="100418">
+<interface name="corenet_udp_receive_zope_port" lineno="100541">
<summary>
Receive UDP traffic on the zope port.
</summary>
@@ -72688,7 +72505,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100433">
+<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100556">
<summary>
Do not audit attempts to receive UDP traffic on the zope port.
</summary>
@@ -72699,7 +72516,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zope_port" lineno="100448">
+<interface name="corenet_udp_sendrecv_zope_port" lineno="100571">
<summary>
Send and receive UDP traffic on the zope port.
</summary>
@@ -72710,7 +72527,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="100464">
+<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="100587">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zope port.
@@ -72722,7 +72539,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zope_port" lineno="100479">
+<interface name="corenet_tcp_bind_zope_port" lineno="100602">
<summary>
Bind TCP sockets to the zope port.
</summary>
@@ -72733,7 +72550,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zope_port" lineno="100499">
+<interface name="corenet_udp_bind_zope_port" lineno="100622">
<summary>
Bind UDP sockets to the zope port.
</summary>
@@ -72744,7 +72561,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zope_port" lineno="100518">
+<interface name="corenet_tcp_connect_zope_port" lineno="100641">
<summary>
Make a TCP connection to the zope port.
</summary>
@@ -72754,7 +72571,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zope_client_packets" lineno="100538">
+<interface name="corenet_send_zope_client_packets" lineno="100661">
<summary>
Send zope_client packets.
</summary>
@@ -72765,7 +72582,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zope_client_packets" lineno="100557">
+<interface name="corenet_dontaudit_send_zope_client_packets" lineno="100680">
<summary>
Do not audit attempts to send zope_client packets.
</summary>
@@ -72776,7 +72593,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zope_client_packets" lineno="100576">
+<interface name="corenet_receive_zope_client_packets" lineno="100699">
<summary>
Receive zope_client packets.
</summary>
@@ -72787,7 +72604,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="100595">
+<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="100718">
<summary>
Do not audit attempts to receive zope_client packets.
</summary>
@@ -72798,7 +72615,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zope_client_packets" lineno="100614">
+<interface name="corenet_sendrecv_zope_client_packets" lineno="100737">
<summary>
Send and receive zope_client packets.
</summary>
@@ -72809,7 +72626,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="100630">
+<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="100753">
<summary>
Do not audit attempts to send and receive zope_client packets.
</summary>
@@ -72820,7 +72637,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zope_client_packets" lineno="100645">
+<interface name="corenet_relabelto_zope_client_packets" lineno="100768">
<summary>
Relabel packets to zope_client the packet type.
</summary>
@@ -72830,7 +72647,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zope_server_packets" lineno="100665">
+<interface name="corenet_send_zope_server_packets" lineno="100788">
<summary>
Send zope_server packets.
</summary>
@@ -72841,7 +72658,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zope_server_packets" lineno="100684">
+<interface name="corenet_dontaudit_send_zope_server_packets" lineno="100807">
<summary>
Do not audit attempts to send zope_server packets.
</summary>
@@ -72852,7 +72669,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zope_server_packets" lineno="100703">
+<interface name="corenet_receive_zope_server_packets" lineno="100826">
<summary>
Receive zope_server packets.
</summary>
@@ -72863,7 +72680,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="100722">
+<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="100845">
<summary>
Do not audit attempts to receive zope_server packets.
</summary>
@@ -72874,7 +72691,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zope_server_packets" lineno="100741">
+<interface name="corenet_sendrecv_zope_server_packets" lineno="100864">
<summary>
Send and receive zope_server packets.
</summary>
@@ -72885,7 +72702,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="100757">
+<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="100880">
<summary>
Do not audit attempts to send and receive zope_server packets.
</summary>
@@ -72896,7 +72713,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zope_server_packets" lineno="100772">
+<interface name="corenet_relabelto_zope_server_packets" lineno="100895">
<summary>
Relabel packets to zope_server the packet type.
</summary>
@@ -72906,7 +72723,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lo_if" lineno="100795">
+<interface name="corenet_tcp_sendrecv_lo_if" lineno="100918">
<summary>
Send and receive TCP network traffic on the lo interface.
</summary>
@@ -72917,7 +72734,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_lo_if" lineno="100814">
+<interface name="corenet_udp_send_lo_if" lineno="100937">
<summary>
Send UDP network traffic on the lo interface.
</summary>
@@ -72928,7 +72745,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_udp_receive_lo_if" lineno="100833">
+<interface name="corenet_udp_receive_lo_if" lineno="100956">
<summary>
Receive UDP network traffic on the lo interface.
</summary>
@@ -72939,7 +72756,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_udp_sendrecv_lo_if" lineno="100852">
+<interface name="corenet_udp_sendrecv_lo_if" lineno="100975">
<summary>
Send and receive UDP network traffic on the lo interface.
</summary>
@@ -72950,7 +72767,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_raw_send_lo_if" lineno="100868">
+<interface name="corenet_raw_send_lo_if" lineno="100991">
<summary>
Send raw IP packets on the lo interface.
</summary>
@@ -72961,7 +72778,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_raw_receive_lo_if" lineno="100887">
+<interface name="corenet_raw_receive_lo_if" lineno="101010">
<summary>
Receive raw IP packets on the lo interface.
</summary>
@@ -72972,7 +72789,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_raw_sendrecv_lo_if" lineno="100906">
+<interface name="corenet_raw_sendrecv_lo_if" lineno="101029">
<summary>
Send and receive raw IP packets on the lo interface.
</summary>
@@ -74220,7 +74037,27 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_framebuffer_dev" lineno="2200">
+<interface name="dev_ioctl_input_dev" lineno="2200">
+<summary>
+IOCTL the input event devices (/dev/input).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_rw_ipmi_dev" lineno="2218">
+<summary>
+Read and write ipmi devices (/dev/ipmi*).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_getattr_framebuffer_dev" lineno="2236">
<summary>
Get the attributes of the framebuffer device node.
</summary>
@@ -74230,7 +74067,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_framebuffer_dev" lineno="2218">
+<interface name="dev_setattr_framebuffer_dev" lineno="2254">
<summary>
Set the attributes of the framebuffer device node.
</summary>
@@ -74240,7 +74077,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_framebuffer_dev" lineno="2237">
+<interface name="dev_dontaudit_setattr_framebuffer_dev" lineno="2273">
<summary>
Dot not audit attempts to set the attributes
of the framebuffer device node.
@@ -74251,7 +74088,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_framebuffer" lineno="2255">
+<interface name="dev_read_framebuffer" lineno="2291">
<summary>
Read the framebuffer.
</summary>
@@ -74261,7 +74098,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_framebuffer" lineno="2273">
+<interface name="dev_dontaudit_read_framebuffer" lineno="2309">
<summary>
Do not audit attempts to read the framebuffer.
</summary>
@@ -74271,7 +74108,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_framebuffer" lineno="2291">
+<interface name="dev_write_framebuffer" lineno="2327">
<summary>
Write the framebuffer.
</summary>
@@ -74281,7 +74118,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_framebuffer" lineno="2309">
+<interface name="dev_rw_framebuffer" lineno="2345">
<summary>
Read and write the framebuffer.
</summary>
@@ -74291,7 +74128,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_kmsg" lineno="2327">
+<interface name="dev_read_kmsg" lineno="2363">
<summary>
Read the kernel messages
</summary>
@@ -74301,7 +74138,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_kmsg" lineno="2345">
+<interface name="dev_dontaudit_read_kmsg" lineno="2381">
<summary>
Do not audit attempts to read the kernel messages
</summary>
@@ -74311,7 +74148,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_kmsg" lineno="2363">
+<interface name="dev_write_kmsg" lineno="2399">
<summary>
Write to the kernel messages device
</summary>
@@ -74321,7 +74158,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_kmsg" lineno="2381">
+<interface name="dev_rw_kmsg" lineno="2417">
<summary>
Read and write to the kernel messages device
</summary>
@@ -74331,7 +74168,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mounton_kmsg" lineno="2399">
+<interface name="dev_mounton_kmsg" lineno="2435">
<summary>
Mount on the kernel messages device
</summary>
@@ -74341,7 +74178,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_ksm_dev" lineno="2417">
+<interface name="dev_getattr_ksm_dev" lineno="2453">
<summary>
Get the attributes of the ksm devices.
</summary>
@@ -74351,7 +74188,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_ksm_dev" lineno="2435">
+<interface name="dev_setattr_ksm_dev" lineno="2471">
<summary>
Set the attributes of the ksm devices.
</summary>
@@ -74361,7 +74198,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_ksm" lineno="2453">
+<interface name="dev_read_ksm" lineno="2489">
<summary>
Read the ksm devices.
</summary>
@@ -74371,7 +74208,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_ksm" lineno="2471">
+<interface name="dev_rw_ksm" lineno="2507">
<summary>
Read and write to ksm devices.
</summary>
@@ -74381,7 +74218,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_kvm_dev" lineno="2489">
+<interface name="dev_getattr_kvm_dev" lineno="2525">
<summary>
Get the attributes of the kvm devices.
</summary>
@@ -74391,7 +74228,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_kvm_dev" lineno="2507">
+<interface name="dev_setattr_kvm_dev" lineno="2543">
<summary>
Set the attributes of the kvm devices.
</summary>
@@ -74401,7 +74238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_kvm" lineno="2525">
+<interface name="dev_read_kvm" lineno="2561">
<summary>
Read the kvm devices.
</summary>
@@ -74411,7 +74248,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_kvm" lineno="2543">
+<interface name="dev_rw_kvm" lineno="2579">
<summary>
Read and write to kvm devices.
</summary>
@@ -74421,7 +74258,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_lirc" lineno="2561">
+<interface name="dev_read_lirc" lineno="2597">
<summary>
Read the lirc device.
</summary>
@@ -74431,7 +74268,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_lirc" lineno="2579">
+<interface name="dev_rw_lirc" lineno="2615">
<summary>
Read and write the lirc device.
</summary>
@@ -74441,7 +74278,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_filetrans_lirc" lineno="2603">
+<interface name="dev_filetrans_lirc" lineno="2639">
<summary>
Automatic type transition to the type
for lirc device nodes when created in /dev.
@@ -74457,7 +74294,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dev_rw_loop_control" lineno="2621">
+<interface name="dev_rw_loop_control" lineno="2657">
<summary>
Read and write the loop-control device.
</summary>
@@ -74467,7 +74304,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_lvm_control" lineno="2639">
+<interface name="dev_getattr_lvm_control" lineno="2675">
<summary>
Get the attributes of the lvm comtrol device.
</summary>
@@ -74477,7 +74314,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_lvm_control" lineno="2657">
+<interface name="dev_read_lvm_control" lineno="2693">
<summary>
Read the lvm comtrol device.
</summary>
@@ -74487,7 +74324,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_lvm_control" lineno="2675">
+<interface name="dev_rw_lvm_control" lineno="2711">
<summary>
Read and write the lvm control device.
</summary>
@@ -74497,7 +74334,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_rw_lvm_control" lineno="2693">
+<interface name="dev_dontaudit_rw_lvm_control" lineno="2729">
<summary>
Do not audit attempts to read and write lvm control device.
</summary>
@@ -74507,7 +74344,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_delete_lvm_control_dev" lineno="2711">
+<interface name="dev_delete_lvm_control_dev" lineno="2747">
<summary>
Delete the lvm control device.
</summary>
@@ -74517,7 +74354,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_memory_dev" lineno="2729">
+<interface name="dev_dontaudit_getattr_memory_dev" lineno="2765">
<summary>
dontaudit getattr raw memory devices (e.g. /dev/mem).
</summary>
@@ -74527,20 +74364,44 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_raw_memory" lineno="2747">
+<interface name="dev_read_raw_memory" lineno="2786">
<summary>
Read raw memory devices (e.g. /dev/mem).
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_read_raw_memory_cond" lineno="2816">
+<summary>
+Read raw memory devices (e.g. /dev/mem) if a tunable is set.
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
+<param name="tunable">
+<summary>
+Tunable to depend on
+</summary>
+</param>
</interface>
-<interface name="dev_dontaudit_read_raw_memory" lineno="2770">
+<interface name="dev_dontaudit_read_raw_memory" lineno="2843">
<summary>
Do not audit attempts to read raw memory devices
(e.g. /dev/mem).
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
</summary>
<param name="domain">
<summary>
@@ -74548,19 +74409,43 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_raw_memory" lineno="2788">
+<interface name="dev_write_raw_memory" lineno="2864">
<summary>
Write raw memory devices (e.g. /dev/mem).
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_write_raw_memory_cond" lineno="2894">
+<summary>
+Write raw memory devices (e.g. /dev/mem) if a tunable is set.
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
+<param name="tunable">
+<summary>
+Tunable to depend on
+</summary>
+</param>
</interface>
-<interface name="dev_rx_raw_memory" lineno="2810">
+<interface name="dev_rx_raw_memory" lineno="2920">
<summary>
Read and execute raw memory devices (e.g. /dev/mem).
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
</summary>
<param name="domain">
<summary>
@@ -74568,9 +74453,12 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_wx_raw_memory" lineno="2829">
+<interface name="dev_wx_raw_memory" lineno="2942">
<summary>
Write and execute raw memory devices (e.g. /dev/mem).
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
</summary>
<param name="domain">
<summary>
@@ -74578,7 +74466,25 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_misc_dev" lineno="2848">
+<interface name="dev_wx_raw_memory_cond" lineno="2969">
+<summary>
+Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set.
+This is extremely dangerous as it can bypass the
+SELinux protections, and should only be used by trusted
+domains.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="tunable">
+<summary>
+Tunable to depend on
+</summary>
+</param>
+</interface>
+<interface name="dev_getattr_misc_dev" lineno="2992">
<summary>
Get the attributes of miscellaneous devices.
</summary>
@@ -74588,7 +74494,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_misc_dev" lineno="2867">
+<interface name="dev_dontaudit_getattr_misc_dev" lineno="3011">
<summary>
Do not audit attempts to get the attributes
of miscellaneous devices.
@@ -74599,7 +74505,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_misc_dev" lineno="2885">
+<interface name="dev_setattr_misc_dev" lineno="3029">
<summary>
Set the attributes of miscellaneous devices.
</summary>
@@ -74609,7 +74515,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_misc_dev" lineno="2904">
+<interface name="dev_dontaudit_setattr_misc_dev" lineno="3048">
<summary>
Do not audit attempts to set the attributes
of miscellaneous devices.
@@ -74620,7 +74526,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_misc" lineno="2922">
+<interface name="dev_read_misc" lineno="3066">
<summary>
Read miscellaneous devices.
</summary>
@@ -74630,7 +74536,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_misc" lineno="2940">
+<interface name="dev_write_misc" lineno="3084">
<summary>
Write miscellaneous devices.
</summary>
@@ -74640,7 +74546,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_rw_misc" lineno="2958">
+<interface name="dev_dontaudit_rw_misc" lineno="3102">
<summary>
Do not audit attempts to read and write miscellaneous devices.
</summary>
@@ -74650,7 +74556,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_modem_dev" lineno="2976">
+<interface name="dev_getattr_modem_dev" lineno="3120">
<summary>
Get the attributes of the modem devices.
</summary>
@@ -74660,7 +74566,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_modem_dev" lineno="2994">
+<interface name="dev_setattr_modem_dev" lineno="3138">
<summary>
Set the attributes of the modem devices.
</summary>
@@ -74670,7 +74576,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_modem" lineno="3012">
+<interface name="dev_read_modem" lineno="3156">
<summary>
Read the modem devices.
</summary>
@@ -74680,7 +74586,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_modem" lineno="3030">
+<interface name="dev_rw_modem" lineno="3174">
<summary>
Read and write to modem devices.
</summary>
@@ -74690,7 +74596,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_mouse_dev" lineno="3048">
+<interface name="dev_getattr_mouse_dev" lineno="3192">
<summary>
Get the attributes of the mouse devices.
</summary>
@@ -74700,7 +74606,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_mouse_dev" lineno="3066">
+<interface name="dev_setattr_mouse_dev" lineno="3210">
<summary>
Set the attributes of the mouse devices.
</summary>
@@ -74710,7 +74616,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_mouse" lineno="3084">
+<interface name="dev_read_mouse" lineno="3228">
<summary>
Read the mouse devices.
</summary>
@@ -74720,7 +74626,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_mouse" lineno="3102">
+<interface name="dev_rw_mouse" lineno="3246">
<summary>
Read and write to mouse devices.
</summary>
@@ -74730,7 +74636,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_mtrr_dev" lineno="3121">
+<interface name="dev_getattr_mtrr_dev" lineno="3265">
<summary>
Get the attributes of the memory type range
registers (MTRR) device.
@@ -74741,7 +74647,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_write_mtrr" lineno="3141">
+<interface name="dev_dontaudit_write_mtrr" lineno="3285">
<summary>
Do not audit attempts to write the memory type
range registers (MTRR).
@@ -74752,7 +74658,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_mtrr" lineno="3160">
+<interface name="dev_rw_mtrr" lineno="3304">
<summary>
Read and write the memory type range registers (MTRR).
</summary>
@@ -74762,7 +74668,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_netcontrol_dev" lineno="3179">
+<interface name="dev_getattr_netcontrol_dev" lineno="3323">
<summary>
Get the attributes of the network control device (Deprecated)
</summary>
@@ -74772,7 +74678,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_netcontrol" lineno="3194">
+<interface name="dev_read_netcontrol" lineno="3338">
<summary>
Read the network control identity. (Deprecated)
</summary>
@@ -74782,7 +74688,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_netcontrol" lineno="3209">
+<interface name="dev_rw_netcontrol" lineno="3353">
<summary>
Read and write the the network control device. (Deprecated)
</summary>
@@ -74792,7 +74698,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_null_dev" lineno="3224">
+<interface name="dev_getattr_null_dev" lineno="3368">
<summary>
Get the attributes of the null device nodes.
</summary>
@@ -74802,7 +74708,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_null_dev" lineno="3242">
+<interface name="dev_setattr_null_dev" lineno="3386">
<summary>
Set the attributes of the null device nodes.
</summary>
@@ -74812,7 +74718,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_delete_null" lineno="3260">
+<interface name="dev_delete_null" lineno="3404">
<summary>
Delete the null device (/dev/null).
</summary>
@@ -74822,7 +74728,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_null" lineno="3278">
+<interface name="dev_rw_null" lineno="3422">
<summary>
Read and write to the null device (/dev/null).
</summary>
@@ -74832,7 +74738,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_null_dev" lineno="3296">
+<interface name="dev_create_null_dev" lineno="3440">
<summary>
Create the null device (/dev/null).
</summary>
@@ -74842,7 +74748,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_null_service" lineno="3315">
+<interface name="dev_manage_null_service" lineno="3459">
<summary>
Manage services with script type null_device_t for when
/lib/systemd/system/something.service is a link to /dev/null
@@ -74853,7 +74759,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3335">
+<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3479">
<summary>
Do not audit attempts to get the attributes
of the BIOS non-volatile RAM device.
@@ -74864,7 +74770,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_nvram" lineno="3353">
+<interface name="dev_rw_nvram" lineno="3497">
<summary>
Read and write BIOS non-volatile RAM.
</summary>
@@ -74874,7 +74780,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_printer_dev" lineno="3371">
+<interface name="dev_getattr_printer_dev" lineno="3515">
<summary>
Get the attributes of the printer device nodes.
</summary>
@@ -74884,7 +74790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_printer_dev" lineno="3389">
+<interface name="dev_setattr_printer_dev" lineno="3533">
<summary>
Set the attributes of the printer device nodes.
</summary>
@@ -74894,7 +74800,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_append_printer" lineno="3408">
+<interface name="dev_append_printer" lineno="3552">
<summary>
Append the printer device.
</summary>
@@ -74904,7 +74810,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_printer" lineno="3426">
+<interface name="dev_rw_printer" lineno="3570">
<summary>
Read and write the printer device.
</summary>
@@ -74914,7 +74820,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_pmqos_dev" lineno="3444">
+<interface name="dev_getattr_pmqos_dev" lineno="3588">
<summary>
Get the attributes of PM QoS devices
</summary>
@@ -74924,7 +74830,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_pmqos" lineno="3462">
+<interface name="dev_read_pmqos" lineno="3606">
<summary>
Read the PM QoS devices.
</summary>
@@ -74934,7 +74840,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_pmqos" lineno="3480">
+<interface name="dev_rw_pmqos" lineno="3624">
<summary>
Read and write the the PM QoS devices.
</summary>
@@ -74944,17 +74850,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_printk" lineno="3498">
-<summary>
-Read printk devices (e.g., /dev/kmsg /dev/mcelog)
-</summary>
-<param name="domain" unused="true">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="dev_getattr_qemu_dev" lineno="3513">
+<interface name="dev_getattr_qemu_dev" lineno="3643">
<summary>
Get the attributes of the QEMU
microcode and id interfaces.
@@ -74965,7 +74861,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_qemu_dev" lineno="3532">
+<interface name="dev_setattr_qemu_dev" lineno="3662">
<summary>
Set the attributes of the QEMU
microcode and id interfaces.
@@ -74976,7 +74872,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_qemu" lineno="3550">
+<interface name="dev_read_qemu" lineno="3680">
<summary>
Read the QEMU device
</summary>
@@ -74986,7 +74882,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_qemu" lineno="3568">
+<interface name="dev_rw_qemu" lineno="3698">
<summary>
Read and write the the QEMU device.
</summary>
@@ -74996,7 +74892,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_rand" lineno="3602">
+<interface name="dev_read_rand" lineno="3732">
<summary>
Read from random number generator
devices (e.g., /dev/random).
@@ -75022,7 +74918,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_dontaudit_read_rand" lineno="3621">
+<interface name="dev_dontaudit_read_rand" lineno="3751">
<summary>
Do not audit attempts to read from random
number generator devices (e.g., /dev/random)
@@ -75033,7 +74929,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_append_rand" lineno="3640">
+<interface name="dev_dontaudit_append_rand" lineno="3770">
<summary>
Do not audit attempts to append to random
number generator devices (e.g., /dev/random)
@@ -75044,7 +74940,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_rand" lineno="3660">
+<interface name="dev_write_rand" lineno="3790">
<summary>
Write to the random device (e.g., /dev/random). This adds
entropy used to generate the random data read from the
@@ -75056,7 +74952,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_realtime_clock" lineno="3678">
+<interface name="dev_create_rand_dev" lineno="3808">
+<summary>
+Create the random device (/dev/random).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_read_realtime_clock" lineno="3826">
<summary>
Read the realtime clock (/dev/rtc).
</summary>
@@ -75066,7 +74972,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_realtime_clock" lineno="3696">
+<interface name="dev_write_realtime_clock" lineno="3844">
<summary>
Set the realtime clock (/dev/rtc).
</summary>
@@ -75076,7 +74982,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_realtime_clock" lineno="3716">
+<interface name="dev_rw_realtime_clock" lineno="3864">
<summary>
Read and set the realtime clock (/dev/rtc).
</summary>
@@ -75086,7 +74992,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_scanner_dev" lineno="3731">
+<interface name="dev_getattr_scanner_dev" lineno="3879">
<summary>
Get the attributes of the scanner device.
</summary>
@@ -75096,7 +75002,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3750">
+<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3898">
<summary>
Do not audit attempts to get the attributes of
the scanner device.
@@ -75107,7 +75013,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_scanner_dev" lineno="3768">
+<interface name="dev_setattr_scanner_dev" lineno="3916">
<summary>
Set the attributes of the scanner device.
</summary>
@@ -75117,7 +75023,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3787">
+<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3935">
<summary>
Do not audit attempts to set the attributes of
the scanner device.
@@ -75128,7 +75034,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_scanner" lineno="3805">
+<interface name="dev_rw_scanner" lineno="3953">
<summary>
Read and write the scanner device.
</summary>
@@ -75138,7 +75044,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_sound_dev" lineno="3823">
+<interface name="dev_getattr_sound_dev" lineno="3971">
<summary>
Get the attributes of the sound devices.
</summary>
@@ -75148,7 +75054,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_sound_dev" lineno="3841">
+<interface name="dev_setattr_sound_dev" lineno="3989">
<summary>
Set the attributes of the sound devices.
</summary>
@@ -75158,7 +75064,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_sound" lineno="3859">
+<interface name="dev_read_sound" lineno="4007">
<summary>
Read the sound devices.
</summary>
@@ -75168,7 +75074,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_sound" lineno="3878">
+<interface name="dev_write_sound" lineno="4026">
<summary>
Write the sound devices.
</summary>
@@ -75178,7 +75084,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_sound_mixer" lineno="3897">
+<interface name="dev_read_sound_mixer" lineno="4045">
<summary>
Read the sound mixer devices.
</summary>
@@ -75188,7 +75094,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_sound_mixer" lineno="3916">
+<interface name="dev_write_sound_mixer" lineno="4064">
<summary>
Write the sound mixer devices.
</summary>
@@ -75198,7 +75104,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_power_mgmt_dev" lineno="3935">
+<interface name="dev_getattr_power_mgmt_dev" lineno="4083">
<summary>
Get the attributes of the the power management device.
</summary>
@@ -75208,7 +75114,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_power_mgmt_dev" lineno="3953">
+<interface name="dev_setattr_power_mgmt_dev" lineno="4101">
<summary>
Set the attributes of the the power management device.
</summary>
@@ -75218,7 +75124,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_power_management" lineno="3971">
+<interface name="dev_rw_power_management" lineno="4119">
<summary>
Read and write the the power management device.
</summary>
@@ -75228,7 +75134,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_smartcard_dev" lineno="3989">
+<interface name="dev_getattr_smartcard_dev" lineno="4137">
<summary>
Getattr on smartcard devices
</summary>
@@ -75238,7 +75144,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4008">
+<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4156">
<summary>
dontaudit getattr on smartcard devices
</summary>
@@ -75248,7 +75154,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_smartcard" lineno="4027">
+<interface name="dev_rw_smartcard" lineno="4175">
<summary>
Read and write smartcard devices.
</summary>
@@ -75258,7 +75164,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_smartcard" lineno="4045">
+<interface name="dev_manage_smartcard" lineno="4193">
<summary>
Create, read, write, and delete smartcard devices.
</summary>
@@ -75268,7 +75174,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mounton_sysfs" lineno="4063">
+<interface name="dev_rw_sysdig" lineno="4211">
+<summary>
+Read, write and map the sysdig device.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_mounton_sysfs" lineno="4230">
<summary>
Mount a filesystem on sysfs.
</summary>
@@ -75278,7 +75194,7 @@ Domain allow access.
</summary>
</param>
</interface>
-<interface name="dev_associate_sysfs" lineno="4081">
+<interface name="dev_associate_sysfs" lineno="4248">
<summary>
Associate a file to a sysfs filesystem.
</summary>
@@ -75288,7 +75204,7 @@ The type of the file to be associated to sysfs.
</summary>
</param>
</interface>
-<interface name="dev_getattr_sysfs_dirs" lineno="4099">
+<interface name="dev_getattr_sysfs_dirs" lineno="4266">
<summary>
Get the attributes of sysfs directories.
</summary>
@@ -75298,7 +75214,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_sysfs" lineno="4117">
+<interface name="dev_getattr_sysfs" lineno="4284">
<summary>
Get the attributes of sysfs filesystem
</summary>
@@ -75308,7 +75224,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mount_sysfs" lineno="4135">
+<interface name="dev_mount_sysfs" lineno="4302">
<summary>
mount a sysfs filesystem
</summary>
@@ -75318,7 +75234,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_sysfs" lineno="4153">
+<interface name="dev_dontaudit_getattr_sysfs" lineno="4320">
<summary>
Do not audit getting the attributes of sysfs filesystem
</summary>
@@ -75328,7 +75244,7 @@ Domain to dontaudit access from
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_sysfs" lineno="4171">
+<interface name="dev_dontaudit_read_sysfs" lineno="4338">
<summary>
Dont audit attempts to read hardware state information
</summary>
@@ -75338,7 +75254,7 @@ Domain for which the attempts do not need to be audited
</summary>
</param>
</interface>
-<interface name="dev_mounton_sysfs_dirs" lineno="4191">
+<interface name="dev_mounton_sysfs_dirs" lineno="4358">
<summary>
mounton sysfs directories.
</summary>
@@ -75348,7 +75264,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_search_sysfs" lineno="4209">
+<interface name="dev_search_sysfs" lineno="4376">
<summary>
Search the sysfs directories.
</summary>
@@ -75358,7 +75274,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_search_sysfs" lineno="4227">
+<interface name="dev_dontaudit_search_sysfs" lineno="4394">
<summary>
Do not audit attempts to search sysfs.
</summary>
@@ -75368,7 +75284,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_list_sysfs" lineno="4245">
+<interface name="dev_list_sysfs" lineno="4412">
<summary>
List the contents of the sysfs directories.
</summary>
@@ -75378,7 +75294,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_sysfs_dirs" lineno="4264">
+<interface name="dev_write_sysfs_dirs" lineno="4431">
<summary>
Write in a sysfs directories.
</summary>
@@ -75388,7 +75304,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4282">
+<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4449">
<summary>
Do not audit attempts to write in a sysfs directory.
</summary>
@@ -75398,7 +75314,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_manage_sysfs_dirs" lineno="4301">
+<interface name="dev_manage_sysfs_dirs" lineno="4468">
<summary>
Create, read, write, and delete sysfs
directories.
@@ -75409,7 +75325,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_sysfs" lineno="4328">
+<interface name="dev_read_sysfs" lineno="4495">
<summary>
Read hardware state information.
</summary>
@@ -75428,7 +75344,24 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_rw_sysfs" lineno="4349">
+<interface name="dev_write_sysfs" lineno="4523">
+<summary>
+Write to hardware state information.
+</summary>
+<desc>
+<p>
+Allow the specified domain to write to the sysfs
+filesystem.
+</p>
+</desc>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<infoflow type="read" weight="10"/>
+</interface>
+<interface name="dev_rw_sysfs" lineno="4542">
<summary>
Allow caller to modify hardware state information.
</summary>
@@ -75438,7 +75371,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_sysfs_files" lineno="4370">
+<interface name="dev_create_sysfs_files" lineno="4563">
<summary>
Add a sysfs file
</summary>
@@ -75448,7 +75381,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_sysfs_dirs" lineno="4388">
+<interface name="dev_relabel_sysfs_dirs" lineno="4581">
<summary>
Relabel hardware state directories.
</summary>
@@ -75458,7 +75391,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_all_sysfs" lineno="4406">
+<interface name="dev_relabel_all_sysfs" lineno="4599">
<summary>
Relabel from/to all sysfs types.
</summary>
@@ -75468,7 +75401,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_all_sysfs" lineno="4426">
+<interface name="dev_setattr_all_sysfs" lineno="4619">
<summary>
Set the attributes of sysfs files, directories and symlinks.
</summary>
@@ -75478,7 +75411,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_tpm" lineno="4446">
+<interface name="dev_rw_tpm" lineno="4639">
<summary>
Read and write the TPM device.
</summary>
@@ -75488,7 +75421,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_urand" lineno="4487">
+<interface name="dev_read_urand" lineno="4680">
<summary>
Read from pseudo random number generator devices (e.g., /dev/urandom).
</summary>
@@ -75521,7 +75454,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_dontaudit_read_urand" lineno="4506">
+<interface name="dev_dontaudit_read_urand" lineno="4699">
<summary>
Do not audit attempts to read from pseudo
random devices (e.g., /dev/urandom)
@@ -75532,7 +75465,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_urand" lineno="4525">
+<interface name="dev_write_urand" lineno="4718">
<summary>
Write to the pseudo random device (e.g., /dev/urandom). This
sets the random number generator seed.
@@ -75543,7 +75476,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_generic_usb_dev" lineno="4543">
+<interface name="dev_create_urand_dev" lineno="4736">
+<summary>
+Create the urandom device (/dev/urandom).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_getattr_generic_usb_dev" lineno="4754">
<summary>
Getattr generic the USB devices.
</summary>
@@ -75553,7 +75496,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_generic_usb_dev" lineno="4561">
+<interface name="dev_setattr_generic_usb_dev" lineno="4772">
<summary>
Setattr generic the USB devices.
</summary>
@@ -75563,7 +75506,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_generic_usb_dev" lineno="4579">
+<interface name="dev_read_generic_usb_dev" lineno="4790">
<summary>
Read generic the USB devices.
</summary>
@@ -75573,7 +75516,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_generic_usb_dev" lineno="4597">
+<interface name="dev_rw_generic_usb_dev" lineno="4808">
<summary>
Read and write generic the USB devices.
</summary>
@@ -75583,7 +75526,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_generic_usb_dev" lineno="4615">
+<interface name="dev_relabel_generic_usb_dev" lineno="4826">
<summary>
Relabel generic the USB devices.
</summary>
@@ -75593,7 +75536,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_usbmon_dev" lineno="4633">
+<interface name="dev_read_usbmon_dev" lineno="4844">
<summary>
Read USB monitor devices.
</summary>
@@ -75603,7 +75546,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_usbmon_dev" lineno="4651">
+<interface name="dev_write_usbmon_dev" lineno="4862">
<summary>
Write USB monitor devices.
</summary>
@@ -75613,7 +75556,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mount_usbfs" lineno="4669">
+<interface name="dev_mount_usbfs" lineno="4880">
<summary>
Mount a usbfs filesystem.
</summary>
@@ -75623,7 +75566,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_associate_usbfs" lineno="4687">
+<interface name="dev_associate_usbfs" lineno="4898">
<summary>
Associate a file to a usbfs filesystem.
</summary>
@@ -75633,7 +75576,7 @@ The type of the file to be associated to usbfs.
</summary>
</param>
</interface>
-<interface name="dev_getattr_usbfs_dirs" lineno="4705">
+<interface name="dev_getattr_usbfs_dirs" lineno="4916">
<summary>
Get the attributes of a directory in the usb filesystem.
</summary>
@@ -75643,7 +75586,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="4724">
+<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="4935">
<summary>
Do not audit attempts to get the attributes
of a directory in the usb filesystem.
@@ -75654,7 +75597,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_search_usbfs" lineno="4742">
+<interface name="dev_search_usbfs" lineno="4953">
<summary>
Search the directory containing USB hardware information.
</summary>
@@ -75664,7 +75607,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_list_usbfs" lineno="4760">
+<interface name="dev_list_usbfs" lineno="4971">
<summary>
Allow caller to get a list of usb hardware.
</summary>
@@ -75674,7 +75617,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_usbfs_files" lineno="4781">
+<interface name="dev_setattr_usbfs_files" lineno="4992">
<summary>
Set the attributes of usbfs filesystem.
</summary>
@@ -75684,7 +75627,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_usbfs" lineno="4801">
+<interface name="dev_read_usbfs" lineno="5012">
<summary>
Read USB hardware information using
the usbfs filesystem interface.
@@ -75695,7 +75638,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_usbfs" lineno="4821">
+<interface name="dev_rw_usbfs" lineno="5032">
<summary>
Allow caller to modify usb hardware configuration files.
</summary>
@@ -75705,7 +75648,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_video_dev" lineno="4841">
+<interface name="dev_getattr_video_dev" lineno="5052">
<summary>
Get the attributes of video4linux devices.
</summary>
@@ -75715,7 +75658,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_userio_dev" lineno="4859">
+<interface name="dev_rw_userio_dev" lineno="5070">
<summary>
Read and write userio device.
</summary>
@@ -75725,7 +75668,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_video_dev" lineno="4878">
+<interface name="dev_dontaudit_getattr_video_dev" lineno="5089">
<summary>
Do not audit attempts to get the attributes
of video4linux device nodes.
@@ -75736,7 +75679,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_video_dev" lineno="4896">
+<interface name="dev_setattr_video_dev" lineno="5107">
<summary>
Set the attributes of video4linux device nodes.
</summary>
@@ -75746,7 +75689,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_video_dev" lineno="4915">
+<interface name="dev_dontaudit_setattr_video_dev" lineno="5126">
<summary>
Do not audit attempts to set the attributes
of video4linux device nodes.
@@ -75757,7 +75700,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_video_dev" lineno="4933">
+<interface name="dev_read_video_dev" lineno="5144">
<summary>
Read the video4linux devices.
</summary>
@@ -75767,7 +75710,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_video_dev" lineno="4951">
+<interface name="dev_write_video_dev" lineno="5162">
<summary>
Write the video4linux devices.
</summary>
@@ -75777,7 +75720,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_vfio_dev" lineno="4969">
+<interface name="dev_rw_vfio_dev" lineno="5180">
<summary>
Read and write vfio devices.
</summary>
@@ -75787,7 +75730,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabelfrom_vfio_dev" lineno="4987">
+<interface name="dev_relabelfrom_vfio_dev" lineno="5198">
<summary>
Relabel vfio devices.
</summary>
@@ -75797,7 +75740,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_vhost" lineno="5005">
+<interface name="dev_rw_vhost" lineno="5216">
<summary>
Allow read/write the vhost devices
</summary>
@@ -75807,7 +75750,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_vmware" lineno="5023">
+<interface name="dev_rw_vmware" lineno="5234">
<summary>
Read and write VMWare devices.
</summary>
@@ -75817,7 +75760,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rwx_vmware" lineno="5041">
+<interface name="dev_rwx_vmware" lineno="5252">
<summary>
Read, write, and mmap VMWare devices.
</summary>
@@ -75827,7 +75770,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_watchdog" lineno="5060">
+<interface name="dev_read_watchdog" lineno="5271">
<summary>
Read from watchdog devices.
</summary>
@@ -75837,7 +75780,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_watchdog" lineno="5078">
+<interface name="dev_write_watchdog" lineno="5289">
<summary>
Write to watchdog devices.
</summary>
@@ -75847,7 +75790,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_wireless" lineno="5096">
+<interface name="dev_read_wireless" lineno="5307">
+<summary>
+Read the wireless device.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_rw_wireless" lineno="5325">
<summary>
Read and write the the wireless device.
</summary>
@@ -75857,7 +75810,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_wireless" lineno="5114">
+<interface name="dev_manage_wireless" lineno="5343">
<summary>
manage the wireless device.
</summary>
@@ -75867,7 +75820,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_xen" lineno="5132">
+<interface name="dev_rw_xen" lineno="5361">
<summary>
Read and write Xen devices.
</summary>
@@ -75877,7 +75830,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_xen" lineno="5151">
+<interface name="dev_manage_xen" lineno="5380">
<summary>
Create, read, write, and delete Xen devices.
</summary>
@@ -75887,7 +75840,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_filetrans_xen" lineno="5175">
+<interface name="dev_filetrans_xen" lineno="5404">
<summary>
Automatic type transition to the type
for xen device nodes when created in /dev.
@@ -75903,7 +75856,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dev_getattr_xserver_misc_dev" lineno="5193">
+<interface name="dev_getattr_xserver_misc_dev" lineno="5422">
<summary>
Get the attributes of X server miscellaneous devices.
</summary>
@@ -75913,7 +75866,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_xserver_misc_dev" lineno="5211">
+<interface name="dev_setattr_xserver_misc_dev" lineno="5440">
<summary>
Set the attributes of X server miscellaneous devices.
</summary>
@@ -75923,7 +75876,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_xserver_misc" lineno="5229">
+<interface name="dev_rw_xserver_misc" lineno="5458">
<summary>
Read and write X server miscellaneous devices.
</summary>
@@ -75933,7 +75886,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_map_xserver_misc" lineno="5247">
+<interface name="dev_map_xserver_misc" lineno="5476">
<summary>
Map X server miscellaneous devices.
</summary>
@@ -75943,7 +75896,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_zero" lineno="5265">
+<interface name="dev_rw_zero" lineno="5494">
<summary>
Read and write to the zero device (/dev/zero).
</summary>
@@ -75953,7 +75906,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rwx_zero" lineno="5283">
+<interface name="dev_rwx_zero" lineno="5512">
<summary>
Read, write, and execute the zero device (/dev/zero).
</summary>
@@ -75963,7 +75916,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_execmod_zero" lineno="5302">
+<interface name="dev_execmod_zero" lineno="5531">
<summary>
Execmod the zero device (/dev/zero).
</summary>
@@ -75973,7 +75926,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_zero_dev" lineno="5321">
+<interface name="dev_create_zero_dev" lineno="5550">
<summary>
Create the zero device (/dev/zero).
</summary>
@@ -75983,7 +75936,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_cpu_online" lineno="5344">
+<interface name="dev_read_cpu_online" lineno="5573">
<summary>
Read cpu online hardware state information
</summary>
@@ -75998,7 +75951,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_unconfined" lineno="5364">
+<interface name="dev_unconfined" lineno="5593">
<summary>
Unconfined access to devices.
</summary>
@@ -76008,7 +75961,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_cpu_online" lineno="5384">
+<interface name="dev_relabel_cpu_online" lineno="5613">
<summary>
Relabel cpu online hardware state information.
</summary>
@@ -76018,7 +75971,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_usbmon_dev" lineno="5403">
+<interface name="dev_dontaudit_read_usbmon_dev" lineno="5632">
<summary>
Dont audit attempts to read usbmon devices
</summary>
@@ -76146,7 +76099,7 @@ Domain allowed access.
</interface>
<interface name="domain_system_change_exemption" lineno="198">
<summary>
-Makes caller and execption to the constraint
+Makes caller and exception to the constraint
preventing changing to the system user
identity and system role.
</summary>
@@ -76669,7 +76622,7 @@ Domain to not audit.
</interface>
<interface name="domain_dontaudit_getattr_all_key_sockets" lineno="1052">
<summary>
-Do not audit attempts to get attribues of
+Do not audit attempts to get attributes of
all domains IPSEC key management sockets.
</summary>
<param name="domain">
@@ -76680,7 +76633,7 @@ Domain to not audit.
</interface>
<interface name="domain_dontaudit_getattr_all_packet_sockets" lineno="1071">
<summary>
-Do not audit attempts to get attribues of
+Do not audit attempts to get attributes of
all domains packet sockets.
</summary>
<param name="domain">
@@ -76691,7 +76644,7 @@ Domain to not audit.
</interface>
<interface name="domain_dontaudit_getattr_all_raw_sockets" lineno="1090">
<summary>
-Do not audit attempts to get attribues of
+Do not audit attempts to get attributes of
all domains raw sockets.
</summary>
<param name="domain">
@@ -76928,7 +76881,25 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="domain_unconfined_signal" lineno="1500">
+<interface name="domain_public_key" lineno="1508">
+<summary>
+Allow all domains to search specified type keys.
+</summary>
+<desc>
+<p>
+When setting up IMA/EVM key(s) are added to the
+kernel keyring but the type of the key is the domain
+adding the key. This interface will allow all domains
+search the key so IMA/EVM validation can happen.
+</p>
+</desc>
+<param name="type">
+<summary>
+Type of key to be searched.
+</summary>
+</param>
+</interface>
+<interface name="domain_unconfined_signal" lineno="1526">
<summary>
Send generic signals to the unconfined domain.
</summary>
@@ -76938,7 +76909,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="domain_unconfined" lineno="1518">
+<interface name="domain_unconfined" lineno="1544">
<summary>
Unconfined access to domains.
</summary>
@@ -76948,7 +76919,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="domain_dontaudit_getsched_all_domains" lineno="1546">
+<interface name="domain_dontaudit_getsched_all_domains" lineno="1572">
<summary>
Do not audit getting the scheduler information of all domains.
</summary>
@@ -77021,7 +76992,7 @@ Related interfaces:
<li>files_config_files()</li>
<li>files_lock_file()</li>
<li>files_mountpoint()</li>
-<li>files_pid_file()</li>
+<li>files_runtime_file()</li>
<li>files_security_file()</li>
<li>files_security_mountpoint()</li>
<li>files_tmp_file()</li>
@@ -77106,6 +77077,45 @@ Type to be used for mount points.
<interface name="files_pid_file" lineno="231">
<summary>
Make the specified type usable for
+runtime process ID files. (Deprecated)
+</summary>
+<desc>
+<p>
+Make the specified type usable for runtime process ID files,
+typically found in /var/run.
+This will also make the type usable for files, making
+calls to files_type() redundant. Failure to use this interface
+for a PID file type may result in problems with starting
+or stopping services.
+</p>
+<p>
+Related interfaces:
+</p>
+<ul>
+<li>files_runtime_filetrans()</li>
+</ul>
+<p>
+Example usage with a domain that can create and
+write its PID file with a private PID file type in the
+/var/run directory:
+</p>
+<p>
+type mypidfile_t;
+files_runtime_file(mypidfile_t)
+allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
+files_runtime_filetrans(mydomain_t, mypidfile_t, file)
+</p>
+</desc>
+<param name="type">
+<summary>
+Type to be used for PID files.
+</summary>
+</param>
+<infoflow type="none"/>
+</interface>
+<interface name="files_runtime_file" lineno="275">
+<summary>
+Make the specified type usable for
runtime process ID files.
</summary>
<desc>
@@ -77121,7 +77131,7 @@ or stopping services.
Related interfaces:
</p>
<ul>
-<li>files_pid_filetrans()</li>
+<li>files_runtime_filetrans()</li>
</ul>
<p>
Example usage with a domain that can create and
@@ -77130,9 +77140,9 @@ write its PID file with a private PID file type in the
</p>
<p>
type mypidfile_t;
-files_pid_file(mypidfile_t)
+files_runtime_file(mypidfile_t)
allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
-files_pid_filetrans(mydomain_t, mypidfile_t, file)
+files_runtime_filetrans(mydomain_t, mypidfile_t, file)
</p>
</desc>
<param name="type">
@@ -77142,7 +77152,7 @@ Type to be used for PID files.
</param>
<infoflow type="none"/>
</interface>
-<interface name="files_config_file" lineno="271">
+<interface name="files_config_file" lineno="315">
<summary>
Make the specified type a
configuration file.
@@ -77173,7 +77183,7 @@ Type to be used as a configuration file.
</param>
<infoflow type="none"/>
</interface>
-<interface name="files_poly" lineno="291">
+<interface name="files_poly" lineno="335">
<summary>
Make the specified type a
polyinstantiated directory.
@@ -77185,7 +77195,7 @@ polyinstantiated directory.
</summary>
</param>
</interface>
-<interface name="files_poly_parent" lineno="312">
+<interface name="files_poly_parent" lineno="356">
<summary>
Make the specified type a parent
of a polyinstantiated directory.
@@ -77197,7 +77207,7 @@ parent directory.
</summary>
</param>
</interface>
-<interface name="files_poly_member" lineno="333">
+<interface name="files_poly_member" lineno="377">
<summary>
Make the specified type a
polyinstantiation member directory.
@@ -77209,7 +77219,7 @@ member directory.
</summary>
</param>
</interface>
-<interface name="files_poly_member_tmp" lineno="360">
+<interface name="files_poly_member_tmp" lineno="404">
<summary>
Make the domain use the specified
type of polyinstantiated directory.
@@ -77227,7 +77237,7 @@ member directory.
</summary>
</param>
</interface>
-<interface name="files_tmp_file" lineno="407">
+<interface name="files_tmp_file" lineno="451">
<summary>
Make the specified type a file
used for temporary files.
@@ -77266,7 +77276,7 @@ temporary file.
</param>
<infoflow type="none"/>
</interface>
-<interface name="files_tmpfs_file" lineno="428">
+<interface name="files_tmpfs_file" lineno="472">
<summary>
Transform the type into a file, for use on a
virtual memory filesystem (tmpfs).
@@ -77277,7 +77287,7 @@ The type to be transformed.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_dirs" lineno="447">
+<interface name="files_getattr_all_dirs" lineno="491">
<summary>
Get the attributes of all directories.
</summary>
@@ -77287,7 +77297,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_dirs" lineno="466">
+<interface name="files_dontaudit_getattr_all_dirs" lineno="510">
<summary>
Do not audit attempts to get the attributes
of all directories.
@@ -77298,7 +77308,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_non_security" lineno="484">
+<interface name="files_list_non_security" lineno="528">
<summary>
List all non-security directories.
</summary>
@@ -77308,7 +77318,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_non_security" lineno="503">
+<interface name="files_dontaudit_list_non_security" lineno="547">
<summary>
Do not audit attempts to list all
non-security directories.
@@ -77319,7 +77329,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_mounton_non_security" lineno="522">
+<interface name="files_mounton_non_security" lineno="566">
<summary>
Mount a filesystem on all non-security
directories and files.
@@ -77330,7 +77340,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_non_security_dirs" lineno="541">
+<interface name="files_write_non_security_dirs" lineno="585">
<summary>
Allow attempts to modify any directory
</summary>
@@ -77340,7 +77350,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_non_security_dirs" lineno="559">
+<interface name="files_manage_non_security_dirs" lineno="603">
<summary>
Allow attempts to manage non-security directories
</summary>
@@ -77350,7 +77360,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_non_security_dirs" lineno="577">
+<interface name="files_relabel_non_security_dirs" lineno="621">
<summary>
Relabel from/to non-security directories.
</summary>
@@ -77360,7 +77370,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_files" lineno="595">
+<interface name="files_getattr_all_files" lineno="639">
<summary>
Get the attributes of all files.
</summary>
@@ -77370,7 +77380,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_files" lineno="615">
+<interface name="files_dontaudit_getattr_all_files" lineno="659">
<summary>
Do not audit attempts to get the attributes
of all files.
@@ -77381,7 +77391,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_files" lineno="634">
+<interface name="files_dontaudit_getattr_non_security_files" lineno="678">
<summary>
Do not audit attempts to get the attributes
of non security files.
@@ -77392,7 +77402,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_non_security_files" lineno="653">
+<interface name="files_manage_non_security_files" lineno="697">
<summary>
Create, read, write, and delete all non-security files.
</summary>
@@ -77403,7 +77413,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_non_security_files" lineno="672">
+<interface name="files_relabel_non_security_files" lineno="716">
<summary>
Relabel from/to all non-security files.
</summary>
@@ -77414,7 +77424,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_all_files" lineno="690">
+<interface name="files_read_all_files" lineno="734">
<summary>
Read all files.
</summary>
@@ -77424,7 +77434,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_execmod_all_files" lineno="721">
+<interface name="files_execmod_all_files" lineno="765">
<summary>
Allow shared library text relocations in all files.
</summary>
@@ -77442,7 +77452,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_non_security_files" lineno="740">
+<interface name="files_read_non_security_files" lineno="784">
<summary>
Read all non-security files.
</summary>
@@ -77453,7 +77463,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_all_dirs_except" lineno="766">
+<interface name="files_read_all_dirs_except" lineno="810">
<summary>
Read all directories on the filesystem, except
the listed exceptions.
@@ -77470,7 +77480,7 @@ must be negated by the caller.
</summary>
</param>
</interface>
-<interface name="files_read_all_files_except" lineno="791">
+<interface name="files_read_all_files_except" lineno="835">
<summary>
Read all files on the filesystem, except
the listed exceptions.
@@ -77487,7 +77497,7 @@ must be negated by the caller.
</summary>
</param>
</interface>
-<interface name="files_read_all_symlinks_except" lineno="816">
+<interface name="files_read_all_symlinks_except" lineno="860">
<summary>
Read all symbolic links on the filesystem, except
the listed exceptions.
@@ -77504,7 +77514,7 @@ must be negated by the caller.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_symlinks" lineno="834">
+<interface name="files_getattr_all_symlinks" lineno="878">
<summary>
Get the attributes of all symbolic links.
</summary>
@@ -77514,7 +77524,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_symlinks" lineno="853">
+<interface name="files_dontaudit_getattr_all_symlinks" lineno="897">
<summary>
Do not audit attempts to get the attributes
of all symbolic links.
@@ -77525,7 +77535,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_all_symlinks" lineno="871">
+<interface name="files_dontaudit_read_all_symlinks" lineno="915">
<summary>
Do not audit attempts to read all symbolic links.
</summary>
@@ -77535,7 +77545,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="890">
+<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="934">
<summary>
Do not audit attempts to get the attributes
of non security symbolic links.
@@ -77546,7 +77556,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="909">
+<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="953">
<summary>
Do not audit attempts to get the attributes
of non security block devices.
@@ -77557,7 +77567,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="928">
+<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="972">
<summary>
Do not audit attempts to get the attributes
of non security character devices.
@@ -77568,7 +77578,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_symlinks" lineno="947">
+<interface name="files_read_all_symlinks" lineno="991">
<summary>
Read all symbolic links.
</summary>
@@ -77579,7 +77589,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_all_pipes" lineno="966">
+<interface name="files_getattr_all_pipes" lineno="1010">
<summary>
Get the attributes of all named pipes.
</summary>
@@ -77589,7 +77599,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_pipes" lineno="986">
+<interface name="files_dontaudit_getattr_all_pipes" lineno="1030">
<summary>
Do not audit attempts to get the attributes
of all named pipes.
@@ -77600,7 +77610,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1005">
+<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1049">
<summary>
Do not audit attempts to get the attributes
of non security named pipes.
@@ -77611,7 +77621,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_sockets" lineno="1023">
+<interface name="files_getattr_all_sockets" lineno="1067">
<summary>
Get the attributes of all named sockets.
</summary>
@@ -77621,7 +77631,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_sockets" lineno="1043">
+<interface name="files_dontaudit_getattr_all_sockets" lineno="1087">
<summary>
Do not audit attempts to get the attributes
of all named sockets.
@@ -77632,7 +77642,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1062">
+<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1106">
<summary>
Do not audit attempts to get the attributes
of non security named sockets.
@@ -77643,7 +77653,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_blk_files" lineno="1080">
+<interface name="files_read_all_blk_files" lineno="1124">
<summary>
Read all block nodes with file types.
</summary>
@@ -77653,7 +77663,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_all_chr_files" lineno="1098">
+<interface name="files_read_all_chr_files" lineno="1142">
<summary>
Read all character nodes with file types.
</summary>
@@ -77663,7 +77673,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_files" lineno="1124">
+<interface name="files_relabel_all_files" lineno="1168">
<summary>
Relabel all files on the filesystem, except
the listed exceptions.
@@ -77681,7 +77691,7 @@ must be negated by the caller.
</param>
<rolecap/>
</interface>
-<interface name="files_rw_all_files" lineno="1162">
+<interface name="files_rw_all_files" lineno="1206">
<summary>
rw all files on the filesystem, except
the listed exceptions.
@@ -77699,7 +77709,7 @@ must be negated by the caller.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_files" lineno="1188">
+<interface name="files_manage_all_files" lineno="1232">
<summary>
Manage all files on the filesystem, except
the listed exceptions.
@@ -77717,7 +77727,7 @@ must be negated by the caller.
</param>
<rolecap/>
</interface>
-<interface name="files_search_all" lineno="1215">
+<interface name="files_search_all" lineno="1259">
<summary>
Search the contents of all directories on
extended attribute filesystems.
@@ -77728,7 +77738,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_all" lineno="1234">
+<interface name="files_list_all" lineno="1278">
<summary>
List the contents of all directories on
extended attribute filesystems.
@@ -77739,7 +77749,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_files_as" lineno="1252">
+<interface name="files_create_all_files_as" lineno="1296">
<summary>
Create all files as is.
</summary>
@@ -77749,7 +77759,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_all_dirs" lineno="1272">
+<interface name="files_dontaudit_search_all_dirs" lineno="1316">
<summary>
Do not audit attempts to search the
contents of any directories on extended
@@ -77761,7 +77771,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_file_type_fs" lineno="1295">
+<interface name="files_getattr_all_file_type_fs" lineno="1339">
<summary>
Get the attributes of all filesystems
with the type of a file.
@@ -77772,7 +77782,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_all_file_type_fs" lineno="1313">
+<interface name="files_relabelto_all_file_type_fs" lineno="1357">
<summary>
Relabel a filesystem to the type of a file.
</summary>
@@ -77782,7 +77792,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_file_type_fs" lineno="1331">
+<interface name="files_relabel_all_file_type_fs" lineno="1375">
<summary>
Relabel a filesystem to and from the type of a file.
</summary>
@@ -77792,7 +77802,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mount_all_file_type_fs" lineno="1349">
+<interface name="files_mount_all_file_type_fs" lineno="1393">
<summary>
Mount all filesystems with the type of a file.
</summary>
@@ -77802,7 +77812,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_unmount_all_file_type_fs" lineno="1367">
+<interface name="files_unmount_all_file_type_fs" lineno="1411">
<summary>
Unmount all filesystems with the type of a file.
</summary>
@@ -77812,7 +77822,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_non_auth_dirs" lineno="1386">
+<interface name="files_list_non_auth_dirs" lineno="1430">
<summary>
Read all non-authentication related
directories.
@@ -77823,7 +77833,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_non_auth_files" lineno="1405">
+<interface name="files_read_non_auth_files" lineno="1449">
<summary>
Read all non-authentication related
files.
@@ -77834,7 +77844,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_non_auth_symlinks" lineno="1424">
+<interface name="files_read_non_auth_symlinks" lineno="1468">
<summary>
Read all non-authentication related
symbolic links.
@@ -77845,7 +77855,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_non_auth_files" lineno="1442">
+<interface name="files_rw_non_auth_files" lineno="1486">
<summary>
rw non-authentication related files.
</summary>
@@ -77855,7 +77865,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_non_auth_files" lineno="1462">
+<interface name="files_manage_non_auth_files" lineno="1506">
<summary>
Manage non-authentication related
files.
@@ -77867,7 +77877,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_map_non_auth_files" lineno="1490">
+<interface name="files_map_non_auth_files" lineno="1534">
<summary>
Mmap non-authentication related
files.
@@ -77879,7 +77889,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_non_auth_files" lineno="1510">
+<interface name="files_relabel_non_auth_files" lineno="1554">
<summary>
Relabel all non-authentication related
files.
@@ -77891,7 +77901,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_config_dirs" lineno="1543">
+<interface name="files_manage_config_dirs" lineno="1587">
<summary>
Manage all configuration directories on filesystem
</summary>
@@ -77902,7 +77912,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_relabel_config_dirs" lineno="1562">
+<interface name="files_relabel_config_dirs" lineno="1606">
<summary>
Relabel configuration directories
</summary>
@@ -77913,7 +77923,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_read_config_files" lineno="1580">
+<interface name="files_read_config_files" lineno="1624">
<summary>
Read config files in /etc.
</summary>
@@ -77923,7 +77933,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_config_files" lineno="1601">
+<interface name="files_manage_config_files" lineno="1645">
<summary>
Manage all configuration files on filesystem
</summary>
@@ -77934,7 +77944,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_relabel_config_files" lineno="1620">
+<interface name="files_relabel_config_files" lineno="1664">
<summary>
Relabel configuration files
</summary>
@@ -77945,7 +77955,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_mounton_all_mountpoints" lineno="1638">
+<interface name="files_mounton_all_mountpoints" lineno="1682">
<summary>
Mount a filesystem on all mount points.
</summary>
@@ -77955,7 +77965,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_mountpoints" lineno="1657">
+<interface name="files_getattr_all_mountpoints" lineno="1703">
<summary>
Get the attributes of all mount points.
</summary>
@@ -77965,7 +77975,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_all_mountpoints" lineno="1675">
+<interface name="files_setattr_all_mountpoints" lineno="1721">
<summary>
Set the attributes of all mount points.
</summary>
@@ -77975,7 +77985,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1693">
+<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1739">
<summary>
Do not audit attempts to set the attributes on all mount points.
</summary>
@@ -77985,7 +77995,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_all_mountpoints" lineno="1711">
+<interface name="files_search_all_mountpoints" lineno="1757">
<summary>
Search all mount points.
</summary>
@@ -77995,7 +78005,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_all_mountpoints" lineno="1729">
+<interface name="files_dontaudit_search_all_mountpoints" lineno="1775">
<summary>
Do not audit searching of all mount points.
</summary>
@@ -78005,7 +78015,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_all_mountpoints" lineno="1747">
+<interface name="files_list_all_mountpoints" lineno="1793">
<summary>
List all mount points.
</summary>
@@ -78015,7 +78025,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_all_mountpoints" lineno="1765">
+<interface name="files_dontaudit_list_all_mountpoints" lineno="1811">
<summary>
Do not audit listing of all mount points.
</summary>
@@ -78025,7 +78035,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_all_mountpoints" lineno="1783">
+<interface name="files_dontaudit_write_all_mountpoints" lineno="1829">
<summary>
Do not audit attempts to write to mount points.
</summary>
@@ -78035,7 +78045,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_root" lineno="1801">
+<interface name="files_list_root" lineno="1847">
<summary>
List the contents of the root directory.
</summary>
@@ -78045,7 +78055,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_root_symlinks" lineno="1821">
+<interface name="files_delete_root_symlinks" lineno="1867">
<summary>
Delete symbolic links in the
root directory.
@@ -78056,7 +78066,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_root_dirs" lineno="1839">
+<interface name="files_dontaudit_write_root_dirs" lineno="1885">
<summary>
Do not audit attempts to write to / dirs.
</summary>
@@ -78066,7 +78076,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_root_dir" lineno="1858">
+<interface name="files_dontaudit_rw_root_dir" lineno="1904">
<summary>
Do not audit attempts to write
files in the root directory.
@@ -78077,7 +78087,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_watch_root_dirs" lineno="1876">
+<interface name="files_watch_root_dirs" lineno="1922">
<summary>
Watch the root directory.
</summary>
@@ -78087,7 +78097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_root_filetrans" lineno="1910">
+<interface name="files_root_filetrans" lineno="1956">
<summary>
Create an object in the root directory, with a private
type using a type transition.
@@ -78113,7 +78123,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_root_files" lineno="1929">
+<interface name="files_dontaudit_read_root_files" lineno="1975">
<summary>
Do not audit attempts to read files in
the root directory.
@@ -78124,7 +78134,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_root_files" lineno="1948">
+<interface name="files_dontaudit_rw_root_files" lineno="1994">
<summary>
Do not audit attempts to read or write
files in the root directory.
@@ -78135,7 +78145,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_root_chr_files" lineno="1967">
+<interface name="files_dontaudit_rw_root_chr_files" lineno="2013">
<summary>
Do not audit attempts to read or write
character device nodes in the root directory.
@@ -78146,7 +78156,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_delete_root_chr_files" lineno="1986">
+<interface name="files_delete_root_chr_files" lineno="2032">
<summary>
Delete character device nodes in
the root directory.
@@ -78157,7 +78167,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_root_files" lineno="2004">
+<interface name="files_delete_root_files" lineno="2050">
<summary>
Delete files in the root directory.
</summary>
@@ -78167,7 +78177,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_root_files" lineno="2022">
+<interface name="files_exec_root_files" lineno="2068">
<summary>
Execute files in the root directory.
</summary>
@@ -78177,7 +78187,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_root_dir_entry" lineno="2040">
+<interface name="files_delete_root_dir_entry" lineno="2086">
<summary>
Remove entries from the root directory.
</summary>
@@ -78187,7 +78197,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_root_dir" lineno="2058">
+<interface name="files_manage_root_dir" lineno="2104">
<summary>
Manage the root directory.
</summary>
@@ -78197,7 +78207,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_rootfs" lineno="2077">
+<interface name="files_getattr_rootfs" lineno="2123">
<summary>
Get the attributes of a rootfs
file system.
@@ -78208,7 +78218,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_associate_rootfs" lineno="2095">
+<interface name="files_associate_rootfs" lineno="2141">
<summary>
Associate to root file system.
</summary>
@@ -78218,7 +78228,7 @@ Type of the file to associate.
</summary>
</param>
</interface>
-<interface name="files_relabel_rootfs" lineno="2113">
+<interface name="files_relabel_rootfs" lineno="2159">
<summary>
Relabel to and from rootfs file system.
</summary>
@@ -78228,7 +78238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_unmount_rootfs" lineno="2131">
+<interface name="files_unmount_rootfs" lineno="2177">
<summary>
Unmount a rootfs filesystem.
</summary>
@@ -78238,7 +78248,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_root" lineno="2149">
+<interface name="files_mounton_root" lineno="2195">
<summary>
Mount on the root directory (/)
</summary>
@@ -78248,7 +78258,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_boot_dirs" lineno="2167">
+<interface name="files_getattr_boot_dirs" lineno="2213">
<summary>
Get attributes of the /boot directory.
</summary>
@@ -78258,7 +78268,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_boot_dirs" lineno="2186">
+<interface name="files_dontaudit_getattr_boot_dirs" lineno="2232">
<summary>
Do not audit attempts to get attributes
of the /boot directory.
@@ -78269,7 +78279,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_boot" lineno="2204">
+<interface name="files_search_boot" lineno="2250">
<summary>
Search the /boot directory.
</summary>
@@ -78279,7 +78289,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_boot" lineno="2222">
+<interface name="files_dontaudit_search_boot" lineno="2268">
<summary>
Do not audit attempts to search the /boot directory.
</summary>
@@ -78289,7 +78299,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_boot" lineno="2240">
+<interface name="files_list_boot" lineno="2286">
<summary>
List the /boot directory.
</summary>
@@ -78299,7 +78309,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_boot" lineno="2258">
+<interface name="files_dontaudit_list_boot" lineno="2304">
<summary>
Do not audit attempts to list the /boot directory.
</summary>
@@ -78309,7 +78319,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_boot_dirs" lineno="2276">
+<interface name="files_create_boot_dirs" lineno="2322">
<summary>
Create directories in /boot
</summary>
@@ -78319,7 +78329,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_boot_dirs" lineno="2295">
+<interface name="files_manage_boot_dirs" lineno="2341">
<summary>
Create, read, write, and delete
directories in /boot.
@@ -78330,7 +78340,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_boot_filetrans" lineno="2329">
+<interface name="files_boot_filetrans" lineno="2375">
<summary>
Create a private type object in boot
with an automatic type transition
@@ -78356,7 +78366,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_read_boot_files" lineno="2348">
+<interface name="files_read_boot_files" lineno="2394">
<summary>
read files in the /boot directory.
</summary>
@@ -78367,7 +78377,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_boot_files" lineno="2368">
+<interface name="files_manage_boot_files" lineno="2414">
<summary>
Create, read, write, and delete files
in the /boot directory.
@@ -78379,7 +78389,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabelfrom_boot_files" lineno="2386">
+<interface name="files_relabelfrom_boot_files" lineno="2432">
<summary>
Relabel from files in the /boot directory.
</summary>
@@ -78389,7 +78399,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_boot_symlinks" lineno="2404">
+<interface name="files_read_boot_symlinks" lineno="2450">
<summary>
Read symbolic links in the /boot directory.
</summary>
@@ -78399,7 +78409,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_boot_symlinks" lineno="2423">
+<interface name="files_rw_boot_symlinks" lineno="2469">
<summary>
Read and write symbolic links
in the /boot directory.
@@ -78410,7 +78420,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_boot_symlinks" lineno="2443">
+<interface name="files_manage_boot_symlinks" lineno="2489">
<summary>
Create, read, write, and delete symbolic links
in the /boot directory.
@@ -78421,7 +78431,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_kernel_img" lineno="2461">
+<interface name="files_read_kernel_img" lineno="2507">
<summary>
Read kernel files in the /boot directory.
</summary>
@@ -78431,7 +78441,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_kernel_img" lineno="2482">
+<interface name="files_create_kernel_img" lineno="2528">
<summary>
Install a kernel into the /boot directory.
</summary>
@@ -78442,7 +78452,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_delete_kernel" lineno="2502">
+<interface name="files_delete_kernel" lineno="2548">
<summary>
Delete a kernel from /boot.
</summary>
@@ -78453,7 +78463,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_default_dirs" lineno="2520">
+<interface name="files_getattr_default_dirs" lineno="2566">
<summary>
Getattr of directories with the default file type.
</summary>
@@ -78463,7 +78473,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_default_dirs" lineno="2539">
+<interface name="files_dontaudit_getattr_default_dirs" lineno="2585">
<summary>
Do not audit attempts to get the attributes of
directories with the default file type.
@@ -78474,7 +78484,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_default" lineno="2557">
+<interface name="files_search_default" lineno="2603">
<summary>
Search the contents of directories with the default file type.
</summary>
@@ -78484,7 +78494,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_default" lineno="2575">
+<interface name="files_list_default" lineno="2621">
<summary>
List contents of directories with the default file type.
</summary>
@@ -78494,7 +78504,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_default" lineno="2594">
+<interface name="files_dontaudit_list_default" lineno="2640">
<summary>
Do not audit attempts to list contents of
directories with the default file type.
@@ -78505,7 +78515,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_default_dirs" lineno="2613">
+<interface name="files_manage_default_dirs" lineno="2659">
<summary>
Create, read, write, and delete directories with
the default file type.
@@ -78516,7 +78526,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_default" lineno="2631">
+<interface name="files_mounton_default" lineno="2677">
<summary>
Mount a filesystem on a directory with the default file type.
</summary>
@@ -78526,7 +78536,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_default_files" lineno="2650">
+<interface name="files_dontaudit_getattr_default_files" lineno="2696">
<summary>
Do not audit attempts to get the attributes of
files with the default file type.
@@ -78537,7 +78547,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_default_files" lineno="2668">
+<interface name="files_read_default_files" lineno="2714">
<summary>
Read files with the default file type.
</summary>
@@ -78547,7 +78557,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_default_files" lineno="2687">
+<interface name="files_dontaudit_read_default_files" lineno="2733">
<summary>
Do not audit attempts to read files
with the default file type.
@@ -78558,7 +78568,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_default_files" lineno="2706">
+<interface name="files_manage_default_files" lineno="2752">
<summary>
Create, read, write, and delete files with
the default file type.
@@ -78569,7 +78579,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_default_symlinks" lineno="2724">
+<interface name="files_read_default_symlinks" lineno="2770">
<summary>
Read symbolic links with the default file type.
</summary>
@@ -78579,7 +78589,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_default_sockets" lineno="2742">
+<interface name="files_read_default_sockets" lineno="2788">
<summary>
Read sockets with the default file type.
</summary>
@@ -78589,7 +78599,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_default_pipes" lineno="2760">
+<interface name="files_read_default_pipes" lineno="2806">
<summary>
Read named pipes with the default file type.
</summary>
@@ -78599,7 +78609,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_etc" lineno="2778">
+<interface name="files_search_etc" lineno="2824">
<summary>
Search the contents of /etc directories.
</summary>
@@ -78609,7 +78619,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_etc_dirs" lineno="2796">
+<interface name="files_setattr_etc_dirs" lineno="2842">
<summary>
Set the attributes of the /etc directories.
</summary>
@@ -78619,7 +78629,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_etc" lineno="2814">
+<interface name="files_list_etc" lineno="2860">
<summary>
List the contents of /etc directories.
</summary>
@@ -78629,7 +78639,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_etc_dirs" lineno="2832">
+<interface name="files_dontaudit_write_etc_dirs" lineno="2878">
<summary>
Do not audit attempts to write to /etc dirs.
</summary>
@@ -78639,7 +78649,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_rw_etc_dirs" lineno="2850">
+<interface name="files_rw_etc_dirs" lineno="2896">
<summary>
Add and remove entries from /etc directories.
</summary>
@@ -78649,7 +78659,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_etc_dirs" lineno="2869">
+<interface name="files_manage_etc_dirs" lineno="2915">
<summary>
Manage generic directories in /etc
</summary>
@@ -78660,7 +78670,7 @@ Domain allowed access
</param>
</interface>
-<interface name="files_relabelto_etc_dirs" lineno="2887">
+<interface name="files_relabelto_etc_dirs" lineno="2933">
<summary>
Relabel directories to etc_t.
</summary>
@@ -78670,7 +78680,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_etc_dirs" lineno="2906">
+<interface name="files_mounton_etc_dirs" lineno="2952">
<summary>
Mount a filesystem on the
etc directories.
@@ -78681,7 +78691,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_etc_dirs" lineno="2924">
+<interface name="files_watch_etc_dirs" lineno="2970">
<summary>
Watch /etc directories
</summary>
@@ -78691,7 +78701,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_etc_files" lineno="2976">
+<interface name="files_read_etc_files" lineno="3022">
<summary>
Read generic files in /etc.
</summary>
@@ -78735,7 +78745,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_map_etc_files" lineno="3008">
+<interface name="files_map_etc_files" lineno="3054">
<summary>
Map generic files in /etc.
</summary>
@@ -78757,7 +78767,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_dontaudit_write_etc_files" lineno="3026">
+<interface name="files_dontaudit_write_etc_files" lineno="3072">
<summary>
Do not audit attempts to write generic files in /etc.
</summary>
@@ -78767,7 +78777,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_etc_files" lineno="3045">
+<interface name="files_rw_etc_files" lineno="3091">
<summary>
Read and write generic files in /etc.
</summary>
@@ -78778,7 +78788,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_etc_files" lineno="3067">
+<interface name="files_manage_etc_files" lineno="3113">
<summary>
Create, read, write, and delete generic
files in /etc.
@@ -78790,7 +78800,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_delete_etc_files" lineno="3086">
+<interface name="files_delete_etc_files" lineno="3132">
<summary>
Delete system configuration files in /etc.
</summary>
@@ -78800,7 +78810,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_etc_files" lineno="3104">
+<interface name="files_exec_etc_files" lineno="3150">
<summary>
Execute generic files in /etc.
</summary>
@@ -78810,7 +78820,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_get_etc_unit_status" lineno="3124">
+<interface name="files_get_etc_unit_status" lineno="3170">
<summary>
Get etc_t service status.
</summary>
@@ -78820,7 +78830,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_start_etc_service" lineno="3142">
+<interface name="files_start_etc_service" lineno="3188">
<summary>
start etc_t service
</summary>
@@ -78830,7 +78840,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_stop_etc_service" lineno="3160">
+<interface name="files_stop_etc_service" lineno="3206">
<summary>
stop etc_t service
</summary>
@@ -78840,7 +78850,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_etc_files" lineno="3178">
+<interface name="files_relabel_etc_files" lineno="3224">
<summary>
Relabel from and to generic files in /etc.
</summary>
@@ -78850,7 +78860,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_etc_symlinks" lineno="3197">
+<interface name="files_read_etc_symlinks" lineno="3243">
<summary>
Read symbolic links in /etc.
</summary>
@@ -78860,7 +78870,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_etc_symlinks" lineno="3215">
+<interface name="files_watch_etc_symlinks" lineno="3261">
+<summary>
+Watch /etc symlinks
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_manage_etc_symlinks" lineno="3279">
<summary>
Create, read, write, and delete symbolic links in /etc.
</summary>
@@ -78870,7 +78890,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_etc_filetrans" lineno="3249">
+<interface name="files_etc_filetrans" lineno="3313">
<summary>
Create objects in /etc with a private
type using a type_transition.
@@ -78896,7 +78916,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_create_boot_flag" lineno="3279">
+<interface name="files_create_boot_flag" lineno="3343">
<summary>
Create a boot flag.
</summary>
@@ -78918,7 +78938,7 @@ The name of the object being created.
</param>
<rolecap/>
</interface>
-<interface name="files_delete_boot_flag" lineno="3305">
+<interface name="files_delete_boot_flag" lineno="3369">
<summary>
Delete a boot flag.
</summary>
@@ -78935,7 +78955,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_etc_runtime_dirs" lineno="3324">
+<interface name="files_getattr_etc_runtime_dirs" lineno="3388">
<summary>
Get the attributes of the
etc_runtime directories.
@@ -78946,7 +78966,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_etc_runtime_dirs" lineno="3343">
+<interface name="files_mounton_etc_runtime_dirs" lineno="3407">
<summary>
Mount a filesystem on the
etc_runtime directories.
@@ -78957,7 +78977,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_etc_runtime_dirs" lineno="3361">
+<interface name="files_relabelto_etc_runtime_dirs" lineno="3425">
<summary>
Relabel to etc_runtime_t dirs.
</summary>
@@ -78967,7 +78987,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3379">
+<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3443">
<summary>
Do not audit attempts to set the attributes of the etc_runtime files
</summary>
@@ -78977,7 +78997,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_etc_runtime_files" lineno="3417">
+<interface name="files_read_etc_runtime_files" lineno="3481">
<summary>
Read files in /etc that are dynamically
created on boot, such as mtab.
@@ -79007,7 +79027,7 @@ Domain allowed access.
<infoflow type="read" weight="10" />
<rolecap/>
</interface>
-<interface name="files_dontaudit_read_etc_runtime_files" lineno="3439">
+<interface name="files_dontaudit_read_etc_runtime_files" lineno="3503">
<summary>
Do not audit attempts to read files
in /etc that are dynamically
@@ -79019,7 +79039,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_etc_files" lineno="3458">
+<interface name="files_dontaudit_read_etc_files" lineno="3522">
<summary>
Do not audit attempts to read files
in /etc
@@ -79030,7 +79050,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_etc_runtime_files" lineno="3477">
+<interface name="files_dontaudit_write_etc_runtime_files" lineno="3541">
<summary>
Do not audit attempts to write
etc runtime files.
@@ -79041,7 +79061,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_rw_etc_runtime_files" lineno="3497">
+<interface name="files_rw_etc_runtime_files" lineno="3561">
<summary>
Read and write files in /etc that are dynamically
created on boot, such as mtab.
@@ -79053,7 +79073,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_etc_runtime_files" lineno="3519">
+<interface name="files_manage_etc_runtime_files" lineno="3583">
<summary>
Create, read, write, and delete files in
/etc that are dynamically created on boot,
@@ -79066,7 +79086,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabelto_etc_runtime_files" lineno="3537">
+<interface name="files_relabelto_etc_runtime_files" lineno="3601">
<summary>
Relabel to etc_runtime_t files.
</summary>
@@ -79076,7 +79096,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_etc_filetrans_etc_runtime" lineno="3566">
+<interface name="files_etc_filetrans_etc_runtime" lineno="3630">
<summary>
Create, etc runtime objects with an automatic
type transition.
@@ -79097,7 +79117,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_getattr_home_dir" lineno="3585">
+<interface name="files_getattr_home_dir" lineno="3649">
<summary>
Get the attributes of the home directories root
(/home).
@@ -79108,7 +79128,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_home_dir" lineno="3606">
+<interface name="files_dontaudit_getattr_home_dir" lineno="3670">
<summary>
Do not audit attempts to get the
attributes of the home directories root
@@ -79120,7 +79140,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_home" lineno="3625">
+<interface name="files_search_home" lineno="3689">
<summary>
Search home directories root (/home).
</summary>
@@ -79130,7 +79150,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_home" lineno="3645">
+<interface name="files_dontaudit_search_home" lineno="3709">
<summary>
Do not audit attempts to search
home directories root (/home).
@@ -79141,7 +79161,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_home" lineno="3665">
+<interface name="files_dontaudit_list_home" lineno="3729">
<summary>
Do not audit attempts to list
home directories root (/home).
@@ -79152,7 +79172,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_home" lineno="3684">
+<interface name="files_list_home" lineno="3748">
<summary>
Get listing of home directories.
</summary>
@@ -79162,7 +79182,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_home" lineno="3703">
+<interface name="files_relabelto_home" lineno="3767">
<summary>
Relabel to user home root (/home).
</summary>
@@ -79172,7 +79192,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelfrom_home" lineno="3721">
+<interface name="files_relabelfrom_home" lineno="3785">
<summary>
Relabel from user home root (/home).
</summary>
@@ -79182,7 +79202,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_home_filetrans" lineno="3754">
+<interface name="files_home_filetrans" lineno="3818">
<summary>
Create objects in /home.
</summary>
@@ -79207,7 +79227,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_getattr_lost_found_dirs" lineno="3772">
+<interface name="files_getattr_lost_found_dirs" lineno="3836">
<summary>
Get the attributes of lost+found directories.
</summary>
@@ -79217,7 +79237,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3791">
+<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3855">
<summary>
Do not audit attempts to get the attributes of
lost+found directories.
@@ -79228,7 +79248,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_lost_found" lineno="3809">
+<interface name="files_list_lost_found" lineno="3873">
<summary>
List the contents of lost+found directories.
</summary>
@@ -79238,7 +79258,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_lost_found" lineno="3829">
+<interface name="files_manage_lost_found" lineno="3893">
<summary>
Create, read, write, and delete objects in
lost+found directories.
@@ -79250,7 +79270,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_search_mnt" lineno="3851">
+<interface name="files_search_mnt" lineno="3915">
<summary>
Search the contents of /mnt.
</summary>
@@ -79260,7 +79280,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_mnt" lineno="3869">
+<interface name="files_dontaudit_search_mnt" lineno="3933">
<summary>
Do not audit attempts to search /mnt.
</summary>
@@ -79270,7 +79290,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_mnt" lineno="3887">
+<interface name="files_list_mnt" lineno="3951">
<summary>
List the contents of /mnt.
</summary>
@@ -79280,7 +79300,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_mnt" lineno="3905">
+<interface name="files_dontaudit_list_mnt" lineno="3969">
<summary>
Do not audit attempts to list the contents of /mnt.
</summary>
@@ -79290,7 +79310,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_mnt" lineno="3923">
+<interface name="files_mounton_mnt" lineno="3987">
<summary>
Mount a filesystem on /mnt.
</summary>
@@ -79300,7 +79320,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_mnt_dirs" lineno="3942">
+<interface name="files_manage_mnt_dirs" lineno="4006">
<summary>
Create, read, write, and delete directories in /mnt.
</summary>
@@ -79311,7 +79331,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_mnt_files" lineno="3960">
+<interface name="files_manage_mnt_files" lineno="4024">
<summary>
Create, read, write, and delete files in /mnt.
</summary>
@@ -79321,7 +79341,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_mnt_files" lineno="3978">
+<interface name="files_read_mnt_files" lineno="4042">
<summary>
read files in /mnt.
</summary>
@@ -79331,7 +79351,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_mnt_symlinks" lineno="3996">
+<interface name="files_read_mnt_symlinks" lineno="4060">
<summary>
Read symbolic links in /mnt.
</summary>
@@ -79341,7 +79361,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_mnt_symlinks" lineno="4014">
+<interface name="files_manage_mnt_symlinks" lineno="4078">
<summary>
Create, read, write, and delete symbolic links in /mnt.
</summary>
@@ -79351,7 +79371,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_kernel_modules" lineno="4032">
+<interface name="files_search_kernel_modules" lineno="4096">
<summary>
Search the contents of the kernel module directories.
</summary>
@@ -79361,7 +79381,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_kernel_modules" lineno="4051">
+<interface name="files_list_kernel_modules" lineno="4115">
<summary>
List the contents of the kernel module directories.
</summary>
@@ -79371,7 +79391,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_kernel_modules" lineno="4070">
+<interface name="files_getattr_kernel_modules" lineno="4134">
<summary>
Get the attributes of kernel module files.
</summary>
@@ -79381,7 +79401,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_kernel_modules" lineno="4088">
+<interface name="files_read_kernel_modules" lineno="4152">
<summary>
Read kernel module files.
</summary>
@@ -79391,7 +79411,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_kernel_modules" lineno="4108">
+<interface name="files_mmap_read_kernel_modules" lineno="4172">
+<summary>
+Read and mmap kernel module files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_write_kernel_modules" lineno="4193">
<summary>
Write kernel module files.
</summary>
@@ -79401,7 +79431,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_kernel_modules" lineno="4127">
+<interface name="files_delete_kernel_modules" lineno="4212">
<summary>
Delete kernel module files.
</summary>
@@ -79411,7 +79441,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_kernel_modules" lineno="4147">
+<interface name="files_manage_kernel_modules" lineno="4232">
<summary>
Create, read, write, and delete
kernel module files.
@@ -79423,7 +79453,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_kernel_modules" lineno="4166">
+<interface name="files_relabel_kernel_modules" lineno="4252">
<summary>
Relabel from and to kernel module files.
</summary>
@@ -79433,7 +79463,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_kernel_modules_filetrans" lineno="4201">
+<interface name="files_kernel_modules_filetrans" lineno="4287">
<summary>
Create objects in the kernel module directories
with a private type via an automatic type transition.
@@ -79459,7 +79489,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_load_kernel_modules" lineno="4219">
+<interface name="files_load_kernel_modules" lineno="4305">
<summary>
Load kernel module files.
</summary>
@@ -79469,7 +79499,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_world_readable" lineno="4239">
+<interface name="files_list_world_readable" lineno="4325">
<summary>
List world-readable directories.
</summary>
@@ -79480,7 +79510,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_world_readable_files" lineno="4258">
+<interface name="files_read_world_readable_files" lineno="4344">
<summary>
Read world-readable files.
</summary>
@@ -79491,7 +79521,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_world_readable_symlinks" lineno="4277">
+<interface name="files_read_world_readable_symlinks" lineno="4363">
<summary>
Read world-readable symbolic links.
</summary>
@@ -79502,7 +79532,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_world_readable_pipes" lineno="4295">
+<interface name="files_read_world_readable_pipes" lineno="4381">
<summary>
Read world-readable named pipes.
</summary>
@@ -79512,7 +79542,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_world_readable_sockets" lineno="4313">
+<interface name="files_read_world_readable_sockets" lineno="4399">
<summary>
Read world-readable sockets.
</summary>
@@ -79522,7 +79552,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_associate_tmp" lineno="4333">
+<interface name="files_associate_tmp" lineno="4419">
<summary>
Allow the specified type to associate
to a filesystem with the type of the
@@ -79534,7 +79564,7 @@ Type of the file to associate.
</summary>
</param>
</interface>
-<interface name="files_getattr_tmp_dirs" lineno="4351">
+<interface name="files_getattr_tmp_dirs" lineno="4437">
<summary>
Get the attributes of the tmp directory (/tmp).
</summary>
@@ -79544,7 +79574,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4370">
+<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4456">
<summary>
Do not audit attempts to get the
attributes of the tmp directory (/tmp).
@@ -79555,7 +79585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_tmp" lineno="4388">
+<interface name="files_search_tmp" lineno="4474">
<summary>
Search the tmp directory (/tmp).
</summary>
@@ -79565,7 +79595,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_tmp" lineno="4406">
+<interface name="files_dontaudit_search_tmp" lineno="4492">
<summary>
Do not audit attempts to search the tmp directory (/tmp).
</summary>
@@ -79575,7 +79605,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_tmp" lineno="4424">
+<interface name="files_list_tmp" lineno="4510">
<summary>
Read the tmp directory (/tmp).
</summary>
@@ -79585,7 +79615,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_tmp" lineno="4442">
+<interface name="files_dontaudit_list_tmp" lineno="4528">
<summary>
Do not audit listing of the tmp directory (/tmp).
</summary>
@@ -79595,7 +79625,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="files_delete_tmp_dir_entry" lineno="4460">
+<interface name="files_delete_tmp_dir_entry" lineno="4546">
<summary>
Remove entries from the tmp directory.
</summary>
@@ -79605,7 +79635,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_tmp_files" lineno="4478">
+<interface name="files_read_generic_tmp_files" lineno="4564">
<summary>
Read files in the tmp directory (/tmp).
</summary>
@@ -79615,7 +79645,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_tmp_dirs" lineno="4496">
+<interface name="files_manage_generic_tmp_dirs" lineno="4582">
<summary>
Manage temporary directories in /tmp.
</summary>
@@ -79625,7 +79655,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_tmp_files" lineno="4514">
+<interface name="files_manage_generic_tmp_files" lineno="4600">
<summary>
Manage temporary files and directories in /tmp.
</summary>
@@ -79635,7 +79665,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_tmp_symlinks" lineno="4532">
+<interface name="files_read_generic_tmp_symlinks" lineno="4618">
<summary>
Read symbolic links in the tmp directory (/tmp).
</summary>
@@ -79645,7 +79675,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_generic_tmp_sockets" lineno="4550">
+<interface name="files_rw_generic_tmp_sockets" lineno="4636">
<summary>
Read and write generic named sockets in the tmp directory (/tmp).
</summary>
@@ -79655,7 +79685,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_tmp" lineno="4568">
+<interface name="files_mounton_tmp" lineno="4654">
<summary>
Mount filesystems in the tmp directory (/tmp)
</summary>
@@ -79665,7 +79695,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_all_tmp_dirs" lineno="4586">
+<interface name="files_setattr_all_tmp_dirs" lineno="4672">
<summary>
Set the attributes of all tmp directories.
</summary>
@@ -79675,7 +79705,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_all_tmp" lineno="4604">
+<interface name="files_list_all_tmp" lineno="4690">
<summary>
List all tmp directories.
</summary>
@@ -79685,7 +79715,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_tmp_dirs" lineno="4624">
+<interface name="files_relabel_all_tmp_dirs" lineno="4710">
<summary>
Relabel to and from all temporary
directory types.
@@ -79697,7 +79727,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4645">
+<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4731">
<summary>
Do not audit attempts to get the attributes
of all tmp files.
@@ -79708,7 +79738,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_tmp_files" lineno="4664">
+<interface name="files_getattr_all_tmp_files" lineno="4750">
<summary>
Allow attempts to get the attributes
of all tmp files.
@@ -79719,7 +79749,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_tmp_files" lineno="4684">
+<interface name="files_relabel_all_tmp_files" lineno="4770">
<summary>
Relabel to and from all temporary
file types.
@@ -79731,7 +79761,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4705">
+<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4791">
<summary>
Do not audit attempts to get the attributes
of all tmp sock_file.
@@ -79742,7 +79772,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_tmp_files" lineno="4723">
+<interface name="files_read_all_tmp_files" lineno="4809">
<summary>
Read all tmp files.
</summary>
@@ -79752,7 +79782,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_tmp_filetrans" lineno="4757">
+<interface name="files_tmp_filetrans" lineno="4843">
<summary>
Create an object in the tmp directories, with a private
type using a type transition.
@@ -79778,7 +79808,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_purge_tmp" lineno="4775">
+<interface name="files_purge_tmp" lineno="4861">
<summary>
Delete the contents of /tmp.
</summary>
@@ -79788,7 +79818,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_usr_dirs" lineno="4798">
+<interface name="files_setattr_usr_dirs" lineno="4884">
<summary>
Set the attributes of the /usr directory.
</summary>
@@ -79798,7 +79828,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_usr" lineno="4816">
+<interface name="files_search_usr" lineno="4902">
<summary>
Search the content of /usr.
</summary>
@@ -79808,7 +79838,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_usr" lineno="4835">
+<interface name="files_list_usr" lineno="4921">
<summary>
List the contents of generic
directories in /usr.
@@ -79819,7 +79849,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_usr_dirs" lineno="4853">
+<interface name="files_dontaudit_write_usr_dirs" lineno="4939">
<summary>
Do not audit write of /usr dirs
</summary>
@@ -79829,7 +79859,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_rw_usr_dirs" lineno="4871">
+<interface name="files_rw_usr_dirs" lineno="4957">
<summary>
Add and remove entries from /usr directories.
</summary>
@@ -79839,7 +79869,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_usr_dirs" lineno="4890">
+<interface name="files_dontaudit_rw_usr_dirs" lineno="4976">
<summary>
Do not audit attempts to add and remove
entries from /usr directories.
@@ -79850,7 +79880,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_delete_usr_dirs" lineno="4908">
+<interface name="files_delete_usr_dirs" lineno="4994">
<summary>
Delete generic directories in /usr in the caller domain.
</summary>
@@ -79860,7 +79890,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_usr_dirs" lineno="4926">
+<interface name="files_watch_usr_dirs" lineno="5012">
<summary>
Watch generic directories in /usr.
</summary>
@@ -79870,7 +79900,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_usr_files" lineno="4944">
+<interface name="files_delete_usr_files" lineno="5030">
<summary>
Delete generic files in /usr in the caller domain.
</summary>
@@ -79880,7 +79910,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_usr_files" lineno="4962">
+<interface name="files_getattr_usr_files" lineno="5048">
<summary>
Get the attributes of files in /usr.
</summary>
@@ -79890,7 +79920,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_map_usr_files" lineno="4981">
+<interface name="files_map_usr_files" lineno="5067">
<summary>
Map generic files in /usr.
</summary>
@@ -79901,7 +79931,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_read_usr_files" lineno="5017">
+<interface name="files_read_usr_files" lineno="5103">
<summary>
Read generic files in /usr.
</summary>
@@ -79929,7 +79959,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_exec_usr_files" lineno="5037">
+<interface name="files_exec_usr_files" lineno="5123">
<summary>
Execute generic programs in /usr in the caller domain.
</summary>
@@ -79939,7 +79969,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_usr_files" lineno="5057">
+<interface name="files_dontaudit_write_usr_files" lineno="5143">
<summary>
dontaudit write of /usr files
</summary>
@@ -79949,7 +79979,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_usr_files" lineno="5075">
+<interface name="files_manage_usr_files" lineno="5161">
<summary>
Create, read, write, and delete files in the /usr directory.
</summary>
@@ -79959,7 +79989,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_usr_files" lineno="5093">
+<interface name="files_relabelto_usr_files" lineno="5179">
<summary>
Relabel a file to the type used in /usr.
</summary>
@@ -79969,7 +79999,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelfrom_usr_files" lineno="5111">
+<interface name="files_relabelfrom_usr_files" lineno="5197">
<summary>
Relabel a file from the type used in /usr.
</summary>
@@ -79979,7 +80009,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_usr_symlinks" lineno="5129">
+<interface name="files_read_usr_symlinks" lineno="5215">
<summary>
Read symbolic links in /usr.
</summary>
@@ -79989,7 +80019,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_usr_filetrans" lineno="5162">
+<interface name="files_usr_filetrans" lineno="5248">
<summary>
Create objects in the /usr directory
</summary>
@@ -80014,7 +80044,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_search_src" lineno="5180">
+<interface name="files_search_src" lineno="5266">
<summary>
Search directories in /usr/src.
</summary>
@@ -80024,7 +80054,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_src" lineno="5198">
+<interface name="files_dontaudit_search_src" lineno="5284">
<summary>
Do not audit attempts to search /usr/src.
</summary>
@@ -80034,7 +80064,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_usr_src_files" lineno="5216">
+<interface name="files_getattr_usr_src_files" lineno="5302">
<summary>
Get the attributes of files in /usr/src.
</summary>
@@ -80044,7 +80074,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_usr_src_files" lineno="5237">
+<interface name="files_read_usr_src_files" lineno="5323">
<summary>
Read files in /usr/src.
</summary>
@@ -80054,7 +80084,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_usr_src_files" lineno="5258">
+<interface name="files_exec_usr_src_files" lineno="5344">
<summary>
Execute programs in /usr/src in the caller domain.
</summary>
@@ -80064,7 +80094,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_kernel_symbol_table" lineno="5278">
+<interface name="files_create_kernel_symbol_table" lineno="5364">
<summary>
Install a system.map into the /boot directory.
</summary>
@@ -80074,7 +80104,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_kernel_symbol_table" lineno="5297">
+<interface name="files_read_kernel_symbol_table" lineno="5383">
<summary>
Read system.map in the /boot directory.
</summary>
@@ -80084,7 +80114,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_kernel_symbol_table" lineno="5316">
+<interface name="files_delete_kernel_symbol_table" lineno="5402">
<summary>
Delete a system.map in the /boot directory.
</summary>
@@ -80094,7 +80124,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_var" lineno="5335">
+<interface name="files_search_var" lineno="5421">
<summary>
Search the contents of /var.
</summary>
@@ -80104,7 +80134,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_var_dirs" lineno="5353">
+<interface name="files_dontaudit_write_var_dirs" lineno="5439">
<summary>
Do not audit attempts to write to /var.
</summary>
@@ -80114,7 +80144,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_write_var_dirs" lineno="5371">
+<interface name="files_write_var_dirs" lineno="5457">
<summary>
Allow attempts to write to /var.dirs
</summary>
@@ -80124,7 +80154,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_var" lineno="5390">
+<interface name="files_dontaudit_search_var" lineno="5476">
<summary>
Do not audit attempts to search
the contents of /var.
@@ -80135,7 +80165,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_var" lineno="5408">
+<interface name="files_list_var" lineno="5494">
<summary>
List the contents of /var.
</summary>
@@ -80145,7 +80175,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_var" lineno="5427">
+<interface name="files_dontaudit_list_var" lineno="5513">
<summary>
Do not audit attempts to list
the contents of /var.
@@ -80156,7 +80186,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_var_dirs" lineno="5446">
+<interface name="files_manage_var_dirs" lineno="5532">
<summary>
Create, read, write, and delete directories
in the /var directory.
@@ -80167,7 +80197,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_var_dirs" lineno="5464">
+<interface name="files_relabel_var_dirs" lineno="5550">
<summary>
relabelto/from var directories
</summary>
@@ -80177,7 +80207,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_var_files" lineno="5482">
+<interface name="files_read_var_files" lineno="5568">
<summary>
Read files in the /var directory.
</summary>
@@ -80187,7 +80217,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_append_var_files" lineno="5500">
+<interface name="files_append_var_files" lineno="5586">
<summary>
Append files in the /var directory.
</summary>
@@ -80197,7 +80227,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_var_files" lineno="5518">
+<interface name="files_rw_var_files" lineno="5604">
<summary>
Read and write files in the /var directory.
</summary>
@@ -80207,7 +80237,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_var_files" lineno="5537">
+<interface name="files_dontaudit_rw_var_files" lineno="5623">
<summary>
Do not audit attempts to read and write
files in the /var directory.
@@ -80218,7 +80248,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_var_files" lineno="5555">
+<interface name="files_manage_var_files" lineno="5641">
<summary>
Create, read, write, and delete files in the /var directory.
</summary>
@@ -80228,7 +80258,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_var_symlinks" lineno="5573">
+<interface name="files_read_var_symlinks" lineno="5659">
<summary>
Read symbolic links in the /var directory.
</summary>
@@ -80238,7 +80268,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_var_symlinks" lineno="5592">
+<interface name="files_manage_var_symlinks" lineno="5678">
<summary>
Create, read, write, and delete symbolic
links in the /var directory.
@@ -80249,7 +80279,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_var_filetrans" lineno="5625">
+<interface name="files_var_filetrans" lineno="5711">
<summary>
Create objects in the /var directory
</summary>
@@ -80274,7 +80304,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_getattr_var_lib_dirs" lineno="5643">
+<interface name="files_getattr_var_lib_dirs" lineno="5729">
<summary>
Get the attributes of the /var/lib directory.
</summary>
@@ -80284,7 +80314,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_var_lib" lineno="5675">
+<interface name="files_search_var_lib" lineno="5761">
<summary>
Search the /var/lib directory.
</summary>
@@ -80308,7 +80338,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="5"/>
</interface>
-<interface name="files_dontaudit_search_var_lib" lineno="5695">
+<interface name="files_dontaudit_search_var_lib" lineno="5781">
<summary>
Do not audit attempts to search the
contents of /var/lib.
@@ -80320,7 +80350,7 @@ Domain to not audit.
</param>
<infoflow type="read" weight="5"/>
</interface>
-<interface name="files_list_var_lib" lineno="5713">
+<interface name="files_list_var_lib" lineno="5799">
<summary>
List the contents of the /var/lib directory.
</summary>
@@ -80330,7 +80360,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_var_lib_dirs" lineno="5731">
+<interface name="files_rw_var_lib_dirs" lineno="5817">
<summary>
Read-write /var/lib directories
</summary>
@@ -80340,7 +80370,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_var_lib_dirs" lineno="5749">
+<interface name="files_manage_var_lib_dirs" lineno="5835">
<summary>
manage var_lib_t dirs
</summary>
@@ -80350,7 +80380,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_var_lib_dirs" lineno="5768">
+<interface name="files_relabel_var_lib_dirs" lineno="5854">
<summary>
relabel var_lib_t dirs
</summary>
@@ -80360,7 +80390,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_var_lib_filetrans" lineno="5802">
+<interface name="files_var_lib_filetrans" lineno="5888">
<summary>
Create objects in the /var/lib directory
</summary>
@@ -80385,7 +80415,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_read_var_lib_files" lineno="5821">
+<interface name="files_read_var_lib_files" lineno="5907">
<summary>
Read generic files in /var/lib.
</summary>
@@ -80395,7 +80425,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_var_lib_symlinks" lineno="5840">
+<interface name="files_read_var_lib_symlinks" lineno="5926">
<summary>
Read generic symbolic links in /var/lib
</summary>
@@ -80405,7 +80435,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_urandom_seed" lineno="5862">
+<interface name="files_manage_urandom_seed" lineno="5948">
<summary>
Create, read, write, and delete the
pseudorandom number generator seed.
@@ -80416,7 +80446,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_mounttab" lineno="5882">
+<interface name="files_manage_mounttab" lineno="5968">
<summary>
Allow domain to manage mount tables
necessary for rpcd, nfsd, etc.
@@ -80427,7 +80457,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_lock_dirs" lineno="5901">
+<interface name="files_setattr_lock_dirs" lineno="5987">
<summary>
Set the attributes of the generic lock directories.
</summary>
@@ -80437,7 +80467,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_locks" lineno="5919">
+<interface name="files_search_locks" lineno="6005">
<summary>
Search the locks directory (/var/lock).
</summary>
@@ -80447,7 +80477,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_locks" lineno="5939">
+<interface name="files_dontaudit_search_locks" lineno="6025">
<summary>
Do not audit attempts to search the
locks directory (/var/lock).
@@ -80458,7 +80488,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_locks" lineno="5958">
+<interface name="files_list_locks" lineno="6044">
<summary>
List generic lock directories.
</summary>
@@ -80468,7 +80498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_check_write_lock_dirs" lineno="5977">
+<interface name="files_check_write_lock_dirs" lineno="6063">
<summary>
Test write access on lock directories.
</summary>
@@ -80478,7 +80508,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_add_entry_lock_dirs" lineno="5996">
+<interface name="files_add_entry_lock_dirs" lineno="6082">
<summary>
Add entries in the /var/lock directories.
</summary>
@@ -80488,7 +80518,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_lock_dirs" lineno="6016">
+<interface name="files_rw_lock_dirs" lineno="6102">
<summary>
Add and remove entries in the /var/lock
directories.
@@ -80499,7 +80529,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_lock_dirs" lineno="6035">
+<interface name="files_create_lock_dirs" lineno="6121">
<summary>
Create lock directories
</summary>
@@ -80509,7 +80539,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_relabel_all_lock_dirs" lineno="6056">
+<interface name="files_relabel_all_lock_dirs" lineno="6142">
<summary>
Relabel to and from all lock directory types.
</summary>
@@ -80520,7 +80550,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_generic_locks" lineno="6077">
+<interface name="files_getattr_generic_locks" lineno="6163">
<summary>
Get the attributes of generic lock files.
</summary>
@@ -80530,7 +80560,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_generic_locks" lineno="6098">
+<interface name="files_delete_generic_locks" lineno="6184">
<summary>
Delete generic lock files.
</summary>
@@ -80540,7 +80570,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_locks" lineno="6119">
+<interface name="files_manage_generic_locks" lineno="6205">
<summary>
Create, read, write, and delete generic
lock files.
@@ -80551,7 +80581,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_locks" lineno="6141">
+<interface name="files_delete_all_locks" lineno="6227">
<summary>
Delete all lock files.
</summary>
@@ -80562,7 +80592,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_all_locks" lineno="6162">
+<interface name="files_read_all_locks" lineno="6248">
<summary>
Read all lock files.
</summary>
@@ -80572,7 +80602,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_all_locks" lineno="6185">
+<interface name="files_manage_all_locks" lineno="6271">
<summary>
manage all lock files.
</summary>
@@ -80582,7 +80612,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_locks" lineno="6208">
+<interface name="files_relabel_all_locks" lineno="6294">
<summary>
Relabel from/to all lock files.
</summary>
@@ -80592,7 +80622,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_lock_filetrans" lineno="6247">
+<interface name="files_lock_filetrans" lineno="6333">
<summary>
Create an object in the locks directory, with a private
type using a type transition.
@@ -80618,7 +80648,91 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_pid_dirs" lineno="6268">
+<interface name="files_dontaudit_getattr_pid_dirs" lineno="6354">
+<summary>
+Do not audit attempts to get the attributes
+of the /var/run directory. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="files_mounton_pid_dirs" lineno="6369">
+<summary>
+mounton a /var/run directory. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_setattr_pid_dirs" lineno="6384">
+<summary>
+Set the attributes of the /var/run directory. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_search_pids" lineno="6400">
+<summary>
+Search the contents of runtime process
+ID directories (/var/run). (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_dontaudit_search_pids" lineno="6416">
+<summary>
+Do not audit attempts to search
+the /var/run directory. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="files_list_pids" lineno="6432">
+<summary>
+List the contents of the runtime process
+ID directories (/var/run). (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_check_write_pid_dirs" lineno="6447">
+<summary>
+Check write access on /var/run directories. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_create_pid_dirs" lineno="6462">
+<summary>
+Create a /var/run directory. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6478">
<summary>
Do not audit attempts to get the attributes
of the /var/run directory.
@@ -80629,7 +80743,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_mounton_pid_dirs" lineno="6287">
+<interface name="files_mounton_runtime_dirs" lineno="6497">
<summary>
mounton a /var/run directory.
</summary>
@@ -80639,7 +80753,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_pid_dirs" lineno="6305">
+<interface name="files_setattr_runtime_dirs" lineno="6515">
<summary>
Set the attributes of the /var/run directory.
</summary>
@@ -80649,7 +80763,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_pids" lineno="6325">
+<interface name="files_search_runtime" lineno="6535">
<summary>
Search the contents of runtime process
ID directories (/var/run).
@@ -80660,7 +80774,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_pids" lineno="6345">
+<interface name="files_dontaudit_search_runtime" lineno="6555">
<summary>
Do not audit attempts to search
the /var/run directory.
@@ -80671,7 +80785,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_pids" lineno="6365">
+<interface name="files_list_runtime" lineno="6575">
<summary>
List the contents of the runtime process
ID directories (/var/run).
@@ -80682,7 +80796,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_check_write_pid_dirs" lineno="6384">
+<interface name="files_check_write_runtime_dirs" lineno="6594">
<summary>
Check write access on /var/run directories.
</summary>
@@ -80692,7 +80806,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_pid_dirs" lineno="6402">
+<interface name="files_create_runtime_dirs" lineno="6612">
<summary>
Create a /var/run directory.
</summary>
@@ -80702,7 +80816,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_watch_runtime_dirs" lineno="6420">
+<interface name="files_watch_runtime_dirs" lineno="6630">
<summary>
Watch /var/run directories.
</summary>
@@ -80712,9 +80826,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_pids" lineno="6438">
+<interface name="files_read_generic_pids" lineno="6648">
<summary>
-Read generic process ID files.
+Read generic process ID files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -80722,9 +80836,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_generic_pid_pipes" lineno="6458">
+<interface name="files_write_generic_pid_pipes" lineno="6663">
<summary>
-Write named generic process ID pipes
+Write named generic process ID pipes. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -80732,9 +80846,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_pid_filetrans" lineno="6519">
+<interface name="files_pid_filetrans" lineno="6720">
<summary>
-Create an object in the process ID directory, with a private type.
+Create an object in the process ID directory, with a private type. (Deprecated)
</summary>
<desc>
<p>
@@ -80748,7 +80862,7 @@ either the program must be SELinux-aware, or use this interface.
Related interfaces:
</p>
<ul>
-<li>files_pid_file()</li>
+<li>files_runtime_file()</li>
</ul>
<p>
Example usage with a domain that can create and
@@ -80757,9 +80871,9 @@ write its PID file with a private PID file type in the
</p>
<p>
type mypidfile_t;
-files_pid_file(mypidfile_t)
+files_runtime_file(mypidfile_t)
allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
-files_pid_filetrans(mydomain_t, mypidfile_t, file)
+files_runtime_filetrans(mydomain_t, mypidfile_t, file)
</p>
</desc>
<param name="domain">
@@ -80784,9 +80898,9 @@ The name of the object being created.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="files_pid_filetrans_lock_dir" lineno="6544">
+<interface name="files_pid_filetrans_lock_dir" lineno="6740">
<summary>
-Create a generic lock directory within the run directories
+Create a generic lock directory within the run directories. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -80799,9 +80913,9 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_rw_generic_pids" lineno="6562">
+<interface name="files_rw_generic_pids" lineno="6755">
<summary>
-Read and write generic process ID files.
+Read and write generic process ID files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -80809,10 +80923,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_pids" lineno="6583">
+<interface name="files_dontaudit_getattr_all_pids" lineno="6771">
<summary>
Do not audit attempts to get the attributes of
-daemon runtime data files.
+daemon runtime data files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -80820,9 +80934,9 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_all_pids" lineno="6603">
+<interface name="files_dontaudit_write_all_pids" lineno="6786">
<summary>
-Do not audit attempts to write to daemon runtime data files.
+Do not audit attempts to write to daemon runtime data files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -80830,9 +80944,9 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_ioctl_all_pids" lineno="6623">
+<interface name="files_dontaudit_ioctl_all_pids" lineno="6801">
<summary>
-Do not audit attempts to ioctl daemon runtime data files.
+Do not audit attempts to ioctl daemon runtime data files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -80840,10 +80954,10 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_all_pid_dirs" lineno="6644">
+<interface name="files_manage_all_pid_dirs" lineno="6817">
<summary>
manage all pidfile directories
-in the /var/run directory.
+in the /var/run directory. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -80851,9 +80965,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_all_pids" lineno="6663">
+<interface name="files_read_all_pids" lineno="6833">
<summary>
-Read all process ID files.
+Read all process ID files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -80862,7 +80976,68 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_exec_generic_pid_files" lineno="6684">
+<interface name="files_exec_generic_pid_files" lineno="6848">
+<summary>
+Execute generic programs in /var/run in the caller domain. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_relabel_all_pid_files" lineno="6863">
+<summary>
+Relabel all pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_delete_all_pids" lineno="6879">
+<summary>
+Delete all process IDs. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="files_create_all_pid_sockets" lineno="6898">
+<summary>
+Create all pid sockets. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_create_all_pid_pipes" lineno="6913">
+<summary>
+Create all pid named pipes. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_read_runtime_files" lineno="6928">
+<summary>
+Read generic runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_exec_runtime" lineno="6948">
<summary>
Execute generic programs in /var/run in the caller domain.
</summary>
@@ -80872,9 +81047,19 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_pid_files" lineno="6702">
+<interface name="files_rw_runtime_files" lineno="6966">
+<summary>
+Read and write generic runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_delete_runtime_symlinks" lineno="6986">
<summary>
-Relable all pid files
+Delete generic runtime symlinks.
</summary>
<param name="domain">
<summary>
@@ -80882,9 +81067,19 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_pids" lineno="6721">
+<interface name="files_write_runtime_pipes" lineno="7004">
<summary>
-Delete all process IDs.
+Write named generic runtime pipes.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_delete_all_runtime_dirs" lineno="7024">
+<summary>
+Delete all runtime dirs.
</summary>
<param name="domain">
<summary>
@@ -80893,9 +81088,9 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_create_all_pid_sockets" lineno="6746">
+<interface name="files_manage_all_runtime_dirs" lineno="7042">
<summary>
-Create all pid sockets
+Create, read, write, and delete all runtime directories.
</summary>
<param name="domain">
<summary>
@@ -80903,9 +81098,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_pid_pipes" lineno="6764">
+<interface name="files_relabel_all_runtime_dirs" lineno="7060">
<summary>
-Create all pid named pipes
+Relabel all runtime directories.
</summary>
<param name="domain">
<summary>
@@ -80913,7 +81108,230 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_spool_sockets" lineno="6782">
+<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7079">
+<summary>
+Do not audit attempts to get the attributes of
+all runtime data files.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="files_read_all_runtime_files" lineno="7100">
+<summary>
+Read all runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7121">
+<summary>
+Do not audit attempts to ioctl all runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="files_dontaudit_write_all_runtime_files" lineno="7141">
+<summary>
+Do not audit attempts to write to all runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="files_delete_all_runtime_files" lineno="7162">
+<summary>
+Delete all runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="files_manage_all_runtime_files" lineno="7181">
+<summary>
+Create, read, write and delete all
+var_run (pid) files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_relabel_all_runtime_files" lineno="7199">
+<summary>
+Relabel all runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_delete_all_runtime_symlinks" lineno="7218">
+<summary>
+Delete all runtime symlinks.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="files_manage_all_runtime_symlinks" lineno="7237">
+<summary>
+Create, read, write and delete all
+var_run (pid) symbolic links.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_relabel_all_runtime_symlinks" lineno="7255">
+<summary>
+Relabel all runtime symbolic links.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_create_all_runtime_pipes" lineno="7273">
+<summary>
+Create all runtime named pipes
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_delete_all_runtime_pipes" lineno="7292">
+<summary>
+Delete all runtime named pipes
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_create_all_runtime_sockets" lineno="7311">
+<summary>
+Create all runtime sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_delete_all_runtime_sockets" lineno="7329">
+<summary>
+Delete all runtime sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_relabel_all_runtime_sockets" lineno="7347">
+<summary>
+Relabel all runtime named sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_runtime_filetrans" lineno="7407">
+<summary>
+Create an object in the /run directory, with a private type.
+</summary>
+<desc>
+<p>
+Create an object in the process ID directory (e.g., /var/run)
+with a private type. Typically this is used for creating
+private PID files in /var/run with the private type instead
+of the general PID file type. To accomplish this goal,
+either the program must be SELinux-aware, or use this interface.
+</p>
+<p>
+Related interfaces:
+</p>
+<ul>
+<li>files_runtime_file()</li>
+</ul>
+<p>
+Example usage with a domain that can create and
+write its PID file with a private PID file type in the
+/var/run directory:
+</p>
+<p>
+type mypidfile_t;
+files_runtime_file(mypidfile_t)
+allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
+files_runtime_filetrans(mydomain_t, mypidfile_t, file)
+</p>
+</desc>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="private type">
+<summary>
+The type of the object to be created.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+<infoflow type="write" weight="10"/>
+</interface>
+<interface name="files_runtime_filetrans_lock_dir" lineno="7432">
+<summary>
+Create a generic lock directory within the run directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="files_create_all_spool_sockets" lineno="7450">
<summary>
Create all spool sockets
</summary>
@@ -80923,7 +81341,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_spool_sockets" lineno="6800">
+<interface name="files_delete_all_spool_sockets" lineno="7468">
<summary>
Delete all spool sockets
</summary>
@@ -80933,9 +81351,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_pid_dirs" lineno="6818">
+<interface name="files_delete_all_pid_dirs" lineno="7486">
<summary>
-Delete all process ID directories.
+Delete all process ID directories. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -80943,48 +81361,48 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_all_pids" lineno="6840">
+<interface name="files_manage_all_pids" lineno="7502">
<summary>
Create, read, write and delete all
-var_run (pid) content
+var_run (pid) content (Deprecated)
</summary>
<param name="domain">
<summary>
-Domain alloed access.
+Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_pid_dirs" lineno="6860">
+<interface name="files_relabel_all_pid_dirs" lineno="7519">
<summary>
-Relabel to/from all var_run (pid) directories
+Relabel to/from all var_run (pid) directories (Deprecated)
</summary>
<param name="domain">
<summary>
-Domain alloed access.
+Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_pid_sock_files" lineno="6878">
+<interface name="files_relabel_all_pid_sock_files" lineno="7534">
<summary>
-Relabel to/from all var_run (pid) socket files
+Relabel to/from all var_run (pid) socket files (Deprecated)
</summary>
<param name="domain">
<summary>
-Domain alloed access.
+Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_pids" lineno="6896">
+<interface name="files_relabel_all_pids" lineno="7549">
<summary>
-Relabel to/from all var_run (pid) files and directories
+Relabel to/from all var_run (pid) files and directories (Deprecated)
</summary>
<param name="domain">
<summary>
-Domain alloed access.
+Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_all_poly_members" lineno="6917">
+<interface name="files_mounton_all_poly_members" lineno="7567">
<summary>
Mount filesystems on all polyinstantiation
member directories.
@@ -80995,7 +81413,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_spool" lineno="6936">
+<interface name="files_search_spool" lineno="7586">
<summary>
Search the contents of generic spool
directories (/var/spool).
@@ -81006,7 +81424,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_spool" lineno="6955">
+<interface name="files_dontaudit_search_spool" lineno="7605">
<summary>
Do not audit attempts to search generic
spool directories.
@@ -81017,7 +81435,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_spool" lineno="6974">
+<interface name="files_list_spool" lineno="7624">
<summary>
List the contents of generic spool
(/var/spool) directories.
@@ -81028,7 +81446,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_spool_dirs" lineno="6993">
+<interface name="files_manage_generic_spool_dirs" lineno="7643">
<summary>
Create, read, write, and delete generic
spool directories (/var/spool).
@@ -81039,7 +81457,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_spool" lineno="7012">
+<interface name="files_read_generic_spool" lineno="7662">
<summary>
Read generic spool files.
</summary>
@@ -81049,7 +81467,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_spool" lineno="7032">
+<interface name="files_manage_generic_spool" lineno="7682">
<summary>
Create, read, write, and delete generic
spool files.
@@ -81060,7 +81478,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_spool_filetrans" lineno="7068">
+<interface name="files_spool_filetrans" lineno="7718">
<summary>
Create objects in the spool directory
with a private type with a type transition.
@@ -81087,7 +81505,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_polyinstantiate_all" lineno="7088">
+<interface name="files_polyinstantiate_all" lineno="7738">
<summary>
Allow access to manage all polyinstantiated
directories on the system.
@@ -81098,7 +81516,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_unconfined" lineno="7142">
+<interface name="files_unconfined" lineno="7792">
<summary>
Unconfined access to files.
</summary>
@@ -81108,7 +81526,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_etc_runtime_lnk_files" lineno="7164">
+<interface name="files_manage_etc_runtime_lnk_files" lineno="7814">
<summary>
Create, read, write, and delete symbolic links in
/etc that are dynamically created on boot.
@@ -81120,7 +81538,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_read_etc_runtime" lineno="7182">
+<interface name="files_dontaudit_read_etc_runtime" lineno="7832">
<summary>
Do not audit attempts to read etc_runtime resources
</summary>
@@ -81130,7 +81548,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_src" lineno="7200">
+<interface name="files_list_src" lineno="7850">
<summary>
List usr/src files
</summary>
@@ -81140,7 +81558,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_read_src_files" lineno="7218">
+<interface name="files_read_src_files" lineno="7868">
<summary>
Read usr/src files
</summary>
@@ -81150,7 +81568,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_manage_src_files" lineno="7236">
+<interface name="files_manage_src_files" lineno="7886">
<summary>
Manage /usr/src files
</summary>
@@ -81160,7 +81578,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_lib_filetrans_kernel_modules" lineno="7267">
+<interface name="files_lib_filetrans_kernel_modules" lineno="7917">
<summary>
Create a resource in the generic lib location
with an automatic type transition towards the kernel modules
@@ -81182,7 +81600,7 @@ Optional name of the resource
</summary>
</param>
</interface>
-<interface name="files_read_etc_runtime" lineno="7285">
+<interface name="files_read_etc_runtime" lineno="7935">
<summary>
Read etc runtime resources
</summary>
@@ -81192,7 +81610,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_relabel_all_non_security_file_types" lineno="7307">
+<interface name="files_relabel_all_non_security_file_types" lineno="7957">
<summary>
Allow relabel from and to non-security types
</summary>
@@ -81203,7 +81621,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_non_security_file_types" lineno="7337">
+<interface name="files_manage_all_non_security_file_types" lineno="7987">
<summary>
Manage non-security-sensitive resource types
</summary>
@@ -81214,7 +81632,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_all_pidfiles" lineno="7359">
+<interface name="files_relabel_all_pidfiles" lineno="8009">
<summary>
Allow relabeling from and to any pidfile associated type
</summary>
@@ -81252,7 +81670,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_associate" lineno="59">
+<interface name="fs_image_file" lineno="57">
+<summary>
+Transform specified type into a filesystem
+image file type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_associate" lineno="80">
<summary>
Associate the specified file type to persistent
filesystems with extended attributes. This
@@ -81265,7 +81694,7 @@ The type of the to be associated.
</summary>
</param>
</interface>
-<interface name="fs_associate_noxattr" lineno="81">
+<interface name="fs_associate_noxattr" lineno="102">
<summary>
Associate the specified file type to
filesystems which lack extended attributes
@@ -81279,7 +81708,7 @@ The type of the to be associated.
</summary>
</param>
</interface>
-<interface name="fs_exec_noxattr" lineno="101">
+<interface name="fs_exec_noxattr" lineno="122">
<summary>
Execute files on a filesystem that does
not support extended attributes.
@@ -81291,7 +81720,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_xattr_type" lineno="121">
+<interface name="fs_xattr_type" lineno="142">
<summary>
Transform specified type into a filesystem
type which has extended attribute
@@ -81303,7 +81732,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_xattr_fs" lineno="159">
+<interface name="fs_getattr_all_xattr_fs" lineno="180">
<summary>
Get the attributes of all the
filesystems which have extended
@@ -81331,7 +81760,7 @@ Domain allowed access.
<infoflow type="read" weight="5"/>
<rolecap/>
</interface>
-<interface name="fs_mount_xattr_fs" lineno="179">
+<interface name="fs_mount_xattr_fs" lineno="200">
<summary>
Mount a persistent filesystem which
has extended attributes, such as
@@ -81343,7 +81772,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_xattr_fs" lineno="200">
+<interface name="fs_remount_xattr_fs" lineno="221">
<summary>
Remount a persistent filesystem which
has extended attributes, such as
@@ -81356,7 +81785,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_xattr_fs" lineno="220">
+<interface name="fs_unmount_xattr_fs" lineno="241">
<summary>
Unmount a persistent filesystem which
has extended attributes, such as
@@ -81368,7 +81797,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_xattr_fs" lineno="256">
+<interface name="fs_getattr_xattr_fs" lineno="277">
<summary>
Get the attributes of persistent
filesystems which have extended
@@ -81396,7 +81825,7 @@ Domain allowed access.
<infoflow type="read" weight="5"/>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_getattr_xattr_fs" lineno="277">
+<interface name="fs_dontaudit_getattr_xattr_fs" lineno="298">
<summary>
Do not audit attempts to
get the attributes of a persistent
@@ -81409,7 +81838,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_xattr_fs" lineno="297">
+<interface name="fs_relabelfrom_xattr_fs" lineno="318">
<summary>
Allow changing of the label of a
filesystem with extended attributes
@@ -81421,7 +81850,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_get_xattr_fs_quotas" lineno="317">
+<interface name="fs_get_xattr_fs_quotas" lineno="338">
<summary>
Get the filesystem quotas of a filesystem
with extended attributes.
@@ -81433,7 +81862,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_set_xattr_fs_quotas" lineno="337">
+<interface name="fs_set_xattr_fs_quotas" lineno="358">
<summary>
Set the filesystem quotas of a filesystem
with extended attributes.
@@ -81445,7 +81874,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_read_anon_inodefs_files" lineno="355">
+<interface name="fs_read_anon_inodefs_files" lineno="376">
<summary>
Read files on anon_inodefs file systems.
</summary>
@@ -81455,7 +81884,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_anon_inodefs_files" lineno="375">
+<interface name="fs_rw_anon_inodefs_files" lineno="396">
<summary>
Read and write files on anon_inodefs
file systems.
@@ -81466,7 +81895,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_rw_anon_inodefs_files" lineno="395">
+<interface name="fs_dontaudit_rw_anon_inodefs_files" lineno="416">
<summary>
Do not audit attempts to read or write files on
anon_inodefs file systems.
@@ -81477,7 +81906,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mount_autofs" lineno="414">
+<interface name="fs_mount_autofs" lineno="435">
<summary>
Mount an automount pseudo filesystem.
</summary>
@@ -81487,7 +81916,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_autofs" lineno="433">
+<interface name="fs_remount_autofs" lineno="454">
<summary>
Remount an automount pseudo filesystem
This allows some mount options to be changed.
@@ -81498,7 +81927,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_autofs" lineno="451">
+<interface name="fs_unmount_autofs" lineno="472">
<summary>
Unmount an automount pseudo filesystem.
</summary>
@@ -81508,7 +81937,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_autofs" lineno="470">
+<interface name="fs_getattr_autofs" lineno="491">
<summary>
Get the attributes of an automount
pseudo filesystem.
@@ -81519,7 +81948,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_auto_mountpoints" lineno="497">
+<interface name="fs_search_auto_mountpoints" lineno="518">
<summary>
Search automount filesystem to use automatically
mounted filesystems.
@@ -81538,7 +81967,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="5"/>
</interface>
-<interface name="fs_list_auto_mountpoints" lineno="517">
+<interface name="fs_list_auto_mountpoints" lineno="538">
<summary>
Read directories of automatically
mounted filesystems.
@@ -81550,7 +81979,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_list_auto_mountpoints" lineno="536">
+<interface name="fs_dontaudit_list_auto_mountpoints" lineno="557">
<summary>
Do not audit attempts to list directories of automatically
mounted filesystems.
@@ -81561,7 +81990,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_autofs_symlinks" lineno="555">
+<interface name="fs_manage_autofs_symlinks" lineno="576">
<summary>
Create, read, write, and delete symbolic links
on an autofs filesystem.
@@ -81572,7 +82001,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_binfmt_misc_dirs" lineno="574">
+<interface name="fs_getattr_binfmt_misc_dirs" lineno="595">
<summary>
Get the attributes of directories on
binfmt_misc filesystems.
@@ -81583,7 +82012,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_register_binary_executable_type" lineno="610">
+<interface name="fs_register_binary_executable_type" lineno="631">
<summary>
Register an interpreter for new binary
file types, using the kernel binfmt_misc
@@ -81610,7 +82039,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_mount_cgroup" lineno="630">
+<interface name="fs_mount_cgroup" lineno="651">
<summary>
Mount cgroup filesystems.
</summary>
@@ -81620,7 +82049,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_cgroup" lineno="648">
+<interface name="fs_remount_cgroup" lineno="669">
<summary>
Remount cgroup filesystems.
</summary>
@@ -81630,7 +82059,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_cgroup" lineno="666">
+<interface name="fs_unmount_cgroup" lineno="687">
<summary>
Unmount cgroup filesystems.
</summary>
@@ -81640,7 +82069,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_cgroup" lineno="684">
+<interface name="fs_getattr_cgroup" lineno="705">
<summary>
Get attributes of cgroup filesystems.
</summary>
@@ -81650,7 +82079,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_cgroup_dirs" lineno="702">
+<interface name="fs_search_cgroup_dirs" lineno="723">
<summary>
Search cgroup directories.
</summary>
@@ -81660,7 +82089,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_cgroup_dirs" lineno="722">
+<interface name="fs_list_cgroup_dirs" lineno="743">
<summary>
list cgroup directories.
</summary>
@@ -81670,7 +82099,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_delete_cgroup_dirs" lineno="741">
+<interface name="fs_delete_cgroup_dirs" lineno="762">
<summary>
Delete cgroup directories.
</summary>
@@ -81680,7 +82109,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_cgroup_dirs" lineno="760">
+<interface name="fs_manage_cgroup_dirs" lineno="781">
<summary>
Manage cgroup directories.
</summary>
@@ -81690,7 +82119,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_cgroup_dirs" lineno="780">
+<interface name="fs_relabel_cgroup_dirs" lineno="801">
<summary>
Relabel cgroup directories.
</summary>
@@ -81700,7 +82129,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_cgroup_files" lineno="798">
+<interface name="fs_getattr_cgroup_files" lineno="819">
<summary>
Get attributes of cgroup files.
</summary>
@@ -81710,7 +82139,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cgroup_files" lineno="818">
+<interface name="fs_read_cgroup_files" lineno="839">
<summary>
Read cgroup files.
</summary>
@@ -81720,7 +82149,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_watch_cgroup_files" lineno="839">
+<interface name="fs_watch_cgroup_files" lineno="860">
<summary>
Watch cgroup files.
</summary>
@@ -81730,7 +82159,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_create_cgroup_links" lineno="858">
+<interface name="fs_create_cgroup_links" lineno="879">
<summary>
Create cgroup lnk_files.
</summary>
@@ -81740,7 +82169,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_write_cgroup_files" lineno="878">
+<interface name="fs_write_cgroup_files" lineno="899">
<summary>
Write cgroup files.
</summary>
@@ -81750,7 +82179,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_cgroup_files" lineno="897">
+<interface name="fs_rw_cgroup_files" lineno="918">
<summary>
Read and write cgroup files.
</summary>
@@ -81760,7 +82189,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_rw_cgroup_files" lineno="919">
+<interface name="fs_dontaudit_rw_cgroup_files" lineno="940">
<summary>
Do not audit attempts to open,
get attributes, read and write
@@ -81772,7 +82201,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_cgroup_files" lineno="937">
+<interface name="fs_manage_cgroup_files" lineno="958">
<summary>
Manage cgroup files.
</summary>
@@ -81782,7 +82211,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_cgroup_symlinks" lineno="957">
+<interface name="fs_relabel_cgroup_symlinks" lineno="978">
<summary>
Relabel cgroup symbolic links.
</summary>
@@ -81792,7 +82221,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mounton_cgroup" lineno="975">
+<interface name="fs_mounton_cgroup" lineno="996">
<summary>
Mount on cgroup directories.
</summary>
@@ -81802,7 +82231,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_cgroup_filetrans" lineno="1009">
+<interface name="fs_cgroup_filetrans" lineno="1030">
<summary>
Create an object in a cgroup tmpfs filesystem, with a private
type using a type transition.
@@ -81828,7 +82257,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_cifs_dirs" lineno="1030">
+<interface name="fs_dontaudit_list_cifs_dirs" lineno="1051">
<summary>
Do not audit attempts to read
dirs on a CIFS or SMB filesystem.
@@ -81839,7 +82268,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mount_cifs" lineno="1048">
+<interface name="fs_mount_cifs" lineno="1069">
<summary>
Mount a CIFS or SMB network filesystem.
</summary>
@@ -81849,7 +82278,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_cifs" lineno="1067">
+<interface name="fs_remount_cifs" lineno="1088">
<summary>
Remount a CIFS or SMB network filesystem.
This allows some mount options to be changed.
@@ -81860,7 +82289,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_cifs" lineno="1085">
+<interface name="fs_unmount_cifs" lineno="1106">
<summary>
Unmount a CIFS or SMB network filesystem.
</summary>
@@ -81870,7 +82299,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_cifs" lineno="1105">
+<interface name="fs_getattr_cifs" lineno="1126">
<summary>
Get the attributes of a CIFS or
SMB network filesystem.
@@ -81882,7 +82311,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_search_cifs" lineno="1123">
+<interface name="fs_search_cifs" lineno="1144">
<summary>
Search directories on a CIFS or SMB filesystem.
</summary>
@@ -81892,7 +82321,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_cifs" lineno="1142">
+<interface name="fs_list_cifs" lineno="1163">
<summary>
List the contents of directories on a
CIFS or SMB filesystem.
@@ -81903,7 +82332,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_cifs" lineno="1161">
+<interface name="fs_dontaudit_list_cifs" lineno="1182">
<summary>
Do not audit attempts to list the contents
of directories on a CIFS or SMB filesystem.
@@ -81914,7 +82343,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mounton_cifs" lineno="1179">
+<interface name="fs_mounton_cifs" lineno="1200">
<summary>
Mounton a CIFS filesystem.
</summary>
@@ -81924,7 +82353,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_files" lineno="1198">
+<interface name="fs_read_cifs_files" lineno="1219">
<summary>
Read files on a CIFS or SMB filesystem.
</summary>
@@ -81935,7 +82364,73 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_noxattr_fs" lineno="1219">
+<interface name="fs_read_all_inherited_image_files" lineno="1239">
+<summary>
+Read all inherited filesystem image files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_read_all_image_files" lineno="1258">
+<summary>
+Read all filesystem image files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_mmap_read_all_image_files" lineno="1277">
+<summary>
+Mmap-read all filesystem image files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_rw_all_image_files" lineno="1296">
+<summary>
+Read and write all filesystem image files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_mmap_rw_all_image_files" lineno="1315">
+<summary>
+Mmap-Read-write all filesystem image files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_dontaudit_write_all_image_files" lineno="1334">
+<summary>
+Do not audit attempts to write all filesystem image files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="fs_getattr_noxattr_fs" lineno="1354">
<summary>
Get the attributes of filesystems that
do not have extended attribute support.
@@ -81947,7 +82442,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_list_noxattr_fs" lineno="1237">
+<interface name="fs_list_noxattr_fs" lineno="1372">
<summary>
Read all noxattrfs directories.
</summary>
@@ -81957,7 +82452,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_noxattr_fs" lineno="1256">
+<interface name="fs_dontaudit_list_noxattr_fs" lineno="1391">
<summary>
Do not audit attempts to list all
noxattrfs directories.
@@ -81968,7 +82463,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_noxattr_fs_dirs" lineno="1274">
+<interface name="fs_manage_noxattr_fs_dirs" lineno="1409">
<summary>
Create, read, write, and delete all noxattrfs directories.
</summary>
@@ -81978,7 +82473,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_noxattr_fs_files" lineno="1292">
+<interface name="fs_read_noxattr_fs_files" lineno="1427">
<summary>
Read all noxattrfs files.
</summary>
@@ -81988,7 +82483,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1312">
+<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1447">
<summary>
Do not audit attempts to read all
noxattrfs files.
@@ -81999,7 +82494,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1330">
+<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1465">
<summary>
Dont audit attempts to write to noxattrfs files.
</summary>
@@ -82009,7 +82504,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_noxattr_fs_files" lineno="1348">
+<interface name="fs_manage_noxattr_fs_files" lineno="1483">
<summary>
Create, read, write, and delete all noxattrfs files.
</summary>
@@ -82019,7 +82514,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_noxattr_fs_symlinks" lineno="1367">
+<interface name="fs_read_noxattr_fs_symlinks" lineno="1502">
<summary>
Read all noxattrfs symbolic links.
</summary>
@@ -82029,7 +82524,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_noxattr_fs_symlinks" lineno="1386">
+<interface name="fs_manage_noxattr_fs_symlinks" lineno="1521">
<summary>
Manage all noxattrfs symbolic links.
</summary>
@@ -82039,9 +82534,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_noxattr_fs" lineno="1406">
+<interface name="fs_relabelfrom_noxattr_fs" lineno="1541">
<summary>
-Relabel all objets from filesystems that
+Relabel all objects from filesystems that
do not support extended attributes.
</summary>
<param name="domain">
@@ -82050,7 +82545,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_cifs_files" lineno="1432">
+<interface name="fs_dontaudit_read_cifs_files" lineno="1567">
<summary>
Do not audit attempts to read
files on a CIFS or SMB filesystem.
@@ -82061,7 +82556,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_append_cifs_files" lineno="1452">
+<interface name="fs_append_cifs_files" lineno="1587">
<summary>
Append files
on a CIFS filesystem.
@@ -82073,7 +82568,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_append_cifs_files" lineno="1472">
+<interface name="fs_dontaudit_append_cifs_files" lineno="1607">
<summary>
dontaudit Append files
on a CIFS filesystem.
@@ -82085,7 +82580,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_rw_cifs_files" lineno="1491">
+<interface name="fs_dontaudit_rw_cifs_files" lineno="1626">
<summary>
Do not audit attempts to read or
write files on a CIFS or SMB filesystem.
@@ -82096,7 +82591,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_symlinks" lineno="1509">
+<interface name="fs_read_cifs_symlinks" lineno="1644">
<summary>
Read symbolic links on a CIFS or SMB filesystem.
</summary>
@@ -82106,7 +82601,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_named_pipes" lineno="1529">
+<interface name="fs_read_cifs_named_pipes" lineno="1664">
<summary>
Read named pipes
on a CIFS or SMB network filesystem.
@@ -82117,7 +82612,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_named_sockets" lineno="1548">
+<interface name="fs_read_cifs_named_sockets" lineno="1683">
<summary>
Read named sockets
on a CIFS or SMB network filesystem.
@@ -82128,7 +82623,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_exec_cifs_files" lineno="1569">
+<interface name="fs_exec_cifs_files" lineno="1704">
<summary>
Execute files on a CIFS or SMB
network filesystem, in the caller
@@ -82141,7 +82636,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_cifs_dirs" lineno="1590">
+<interface name="fs_manage_cifs_dirs" lineno="1725">
<summary>
Create, read, write, and delete directories
on a CIFS or SMB network filesystem.
@@ -82153,7 +82648,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1610">
+<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1745">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -82165,7 +82660,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_files" lineno="1630">
+<interface name="fs_manage_cifs_files" lineno="1765">
<summary>
Create, read, write, and delete files
on a CIFS or SMB network filesystem.
@@ -82177,7 +82672,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_cifs_files" lineno="1650">
+<interface name="fs_dontaudit_manage_cifs_files" lineno="1785">
<summary>
Do not audit attempts to create, read,
write, and delete files
@@ -82189,7 +82684,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_symlinks" lineno="1669">
+<interface name="fs_manage_cifs_symlinks" lineno="1804">
<summary>
Create, read, write, and delete symbolic links
on a CIFS or SMB network filesystem.
@@ -82200,7 +82695,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_named_pipes" lineno="1688">
+<interface name="fs_manage_cifs_named_pipes" lineno="1823">
<summary>
Create, read, write, and delete named pipes
on a CIFS or SMB network filesystem.
@@ -82211,7 +82706,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_named_sockets" lineno="1707">
+<interface name="fs_manage_cifs_named_sockets" lineno="1842">
<summary>
Create, read, write, and delete named sockets
on a CIFS or SMB network filesystem.
@@ -82222,7 +82717,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_cifs_domtrans" lineno="1750">
+<interface name="fs_cifs_domtrans" lineno="1885">
<summary>
Execute a file on a CIFS or SMB filesystem
in the specified domain.
@@ -82257,7 +82752,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="fs_manage_configfs_dirs" lineno="1770">
+<interface name="fs_manage_configfs_dirs" lineno="1905">
<summary>
Create, read, write, and delete dirs
on a configfs filesystem.
@@ -82268,7 +82763,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_configfs_files" lineno="1789">
+<interface name="fs_manage_configfs_files" lineno="1924">
<summary>
Create, read, write, and delete files
on a configfs filesystem.
@@ -82279,7 +82774,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_dos_fs" lineno="1808">
+<interface name="fs_mount_dos_fs" lineno="1943">
<summary>
Mount a DOS filesystem, such as
FAT32 or NTFS.
@@ -82290,7 +82785,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_dos_fs" lineno="1828">
+<interface name="fs_remount_dos_fs" lineno="1963">
<summary>
Remount a DOS filesystem, such as
FAT32 or NTFS. This allows
@@ -82302,7 +82797,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_dos_fs" lineno="1847">
+<interface name="fs_unmount_dos_fs" lineno="1982">
<summary>
Unmount a DOS filesystem, such as
FAT32 or NTFS.
@@ -82313,7 +82808,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_dos_fs" lineno="1867">
+<interface name="fs_getattr_dos_fs" lineno="2002">
<summary>
Get the attributes of a DOS
filesystem, such as FAT32 or NTFS.
@@ -82325,7 +82820,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_relabelfrom_dos_fs" lineno="1886">
+<interface name="fs_relabelfrom_dos_fs" lineno="2021">
<summary>
Allow changing of the label of a
DOS filesystem using the context= mount option.
@@ -82336,7 +82831,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_dos_dirs" lineno="1904">
+<interface name="fs_getattr_dos_dirs" lineno="2039">
<summary>
Get attributes of directories on a dosfs filesystem.
</summary>
@@ -82346,7 +82841,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_dos" lineno="1922">
+<interface name="fs_search_dos" lineno="2057">
<summary>
Search dosfs filesystem.
</summary>
@@ -82356,7 +82851,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_dos" lineno="1940">
+<interface name="fs_list_dos" lineno="2075">
<summary>
List dirs DOS filesystem.
</summary>
@@ -82366,7 +82861,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_dos_dirs" lineno="1959">
+<interface name="fs_manage_dos_dirs" lineno="2094">
<summary>
Create, read, write, and delete dirs
on a DOS filesystem.
@@ -82377,7 +82872,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_dos_files" lineno="1977">
+<interface name="fs_read_dos_files" lineno="2112">
<summary>
Read files on a DOS filesystem.
</summary>
@@ -82387,7 +82882,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_dos_files" lineno="1996">
+<interface name="fs_mmap_read_dos_files" lineno="2130">
+<summary>
+Read and map files on a DOS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_manage_dos_files" lineno="2150">
<summary>
Create, read, write, and delete files
on a DOS filesystem.
@@ -82398,7 +82903,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_efivars" lineno="2014">
+<interface name="fs_list_efivars" lineno="2168">
<summary>
List dirs in efivarfs filesystem.
</summary>
@@ -82408,7 +82913,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_efivarfs_files" lineno="2034">
+<interface name="fs_read_efivarfs_files" lineno="2188">
<summary>
Read files in efivarfs
- contains Linux Kernel configuration options for UEFI systems
@@ -82420,7 +82925,19 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_fusefs" lineno="2052">
+<interface name="fs_manage_efivarfs_files" lineno="2208">
+<summary>
+Create, read, write, and delete files
+on a efivarfs filesystem.
+- contains Linux Kernel configuration options for UEFI systems
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_getattr_fusefs" lineno="2226">
<summary>
stat a FUSE filesystem
</summary>
@@ -82430,7 +82947,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_fusefs" lineno="2070">
+<interface name="fs_mount_fusefs" lineno="2244">
<summary>
Mount a FUSE filesystem.
</summary>
@@ -82440,7 +82957,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_fusefs" lineno="2088">
+<interface name="fs_unmount_fusefs" lineno="2262">
<summary>
Unmount a FUSE filesystem.
</summary>
@@ -82450,7 +82967,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mounton_fusefs" lineno="2106">
+<interface name="fs_mounton_fusefs" lineno="2280">
<summary>
Mounton a FUSEFS filesystem.
</summary>
@@ -82460,7 +82977,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_fusefs" lineno="2126">
+<interface name="fs_search_fusefs" lineno="2300">
<summary>
Search directories
on a FUSEFS filesystem.
@@ -82472,7 +82989,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_list_fusefs" lineno="2145">
+<interface name="fs_dontaudit_list_fusefs" lineno="2319">
<summary>
Do not audit attempts to list the contents
of directories on a FUSEFS filesystem.
@@ -82483,7 +83000,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_fusefs_dirs" lineno="2165">
+<interface name="fs_manage_fusefs_dirs" lineno="2339">
<summary>
Create, read, write, and delete directories
on a FUSEFS filesystem.
@@ -82495,7 +83012,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2185">
+<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2359">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -82507,7 +83024,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_fusefs_files" lineno="2204">
+<interface name="fs_read_fusefs_files" lineno="2378">
<summary>
Read, a FUSEFS filesystem.
</summary>
@@ -82518,7 +83035,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_exec_fusefs_files" lineno="2223">
+<interface name="fs_exec_fusefs_files" lineno="2397">
<summary>
Execute files on a FUSEFS filesystem.
</summary>
@@ -82529,7 +83046,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_fusefs_files" lineno="2243">
+<interface name="fs_manage_fusefs_files" lineno="2417">
<summary>
Create, read, write, and delete files
on a FUSEFS filesystem.
@@ -82541,7 +83058,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_fusefs_files" lineno="2263">
+<interface name="fs_dontaudit_manage_fusefs_files" lineno="2437">
<summary>
Do not audit attempts to create,
read, write, and delete files
@@ -82553,7 +83070,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_fusefs_symlinks" lineno="2281">
+<interface name="fs_read_fusefs_symlinks" lineno="2455">
<summary>
Read symbolic links on a FUSEFS filesystem.
</summary>
@@ -82563,7 +83080,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_hugetlbfs" lineno="2301">
+<interface name="fs_getattr_hugetlbfs" lineno="2475">
<summary>
Get the attributes of an hugetlbfs
filesystem.
@@ -82574,7 +83091,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_hugetlbfs" lineno="2319">
+<interface name="fs_list_hugetlbfs" lineno="2493">
<summary>
List hugetlbfs.
</summary>
@@ -82584,7 +83101,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_hugetlbfs_dirs" lineno="2337">
+<interface name="fs_manage_hugetlbfs_dirs" lineno="2511">
<summary>
Manage hugetlbfs dirs.
</summary>
@@ -82594,7 +83111,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2355">
+<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2529">
<summary>
Read and write inherited hugetlbfs files.
</summary>
@@ -82604,7 +83121,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_hugetlbfs_files" lineno="2373">
+<interface name="fs_rw_hugetlbfs_files" lineno="2547">
<summary>
Read and write hugetlbfs files.
</summary>
@@ -82614,7 +83131,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2391">
+<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2565">
<summary>
Read, map and write hugetlbfs files.
</summary>
@@ -82624,7 +83141,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_associate_hugetlbfs" lineno="2410">
+<interface name="fs_associate_hugetlbfs" lineno="2584">
<summary>
Allow the type to associate to hugetlbfs filesystems.
</summary>
@@ -82634,7 +83151,7 @@ The type of the object to be associated.
</summary>
</param>
</interface>
-<interface name="fs_search_inotifyfs" lineno="2428">
+<interface name="fs_search_inotifyfs" lineno="2602">
<summary>
Search inotifyfs filesystem.
</summary>
@@ -82644,7 +83161,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_inotifyfs" lineno="2446">
+<interface name="fs_list_inotifyfs" lineno="2620">
<summary>
List inotifyfs filesystem.
</summary>
@@ -82654,7 +83171,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_inotifyfs" lineno="2464">
+<interface name="fs_dontaudit_list_inotifyfs" lineno="2638">
<summary>
Dontaudit List inotifyfs filesystem.
</summary>
@@ -82664,7 +83181,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_hugetlbfs_filetrans" lineno="2498">
+<interface name="fs_hugetlbfs_filetrans" lineno="2672">
<summary>
Create an object in a hugetlbfs filesystem, with a private
type using a type transition.
@@ -82690,7 +83207,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="fs_mount_iso9660_fs" lineno="2518">
+<interface name="fs_mount_iso9660_fs" lineno="2692">
<summary>
Mount an iso9660 filesystem, which
is usually used on CDs.
@@ -82701,7 +83218,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_iso9660_fs" lineno="2538">
+<interface name="fs_remount_iso9660_fs" lineno="2712">
<summary>
Remount an iso9660 filesystem, which
is usually used on CDs. This allows
@@ -82713,7 +83230,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_iso9660_fs" lineno="2557">
+<interface name="fs_relabelfrom_iso9660_fs" lineno="2731">
<summary>
Allow changing of the label of a
filesystem with iso9660 type
@@ -82724,7 +83241,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_iso9660_fs" lineno="2576">
+<interface name="fs_unmount_iso9660_fs" lineno="2750">
<summary>
Unmount an iso9660 filesystem, which
is usually used on CDs.
@@ -82735,7 +83252,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_iso9660_fs" lineno="2596">
+<interface name="fs_getattr_iso9660_fs" lineno="2770">
<summary>
Get the attributes of an iso9660
filesystem, which is usually used on CDs.
@@ -82747,7 +83264,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_iso9660_files" lineno="2615">
+<interface name="fs_getattr_iso9660_files" lineno="2789">
<summary>
Get the attributes of files on an iso9660
filesystem, which is usually used on CDs.
@@ -82758,7 +83275,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_iso9660_files" lineno="2635">
+<interface name="fs_read_iso9660_files" lineno="2809">
<summary>
Read files on an iso9660 filesystem, which
is usually used on CDs.
@@ -82769,7 +83286,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_nfs" lineno="2655">
+<interface name="fs_mount_nfs" lineno="2829">
<summary>
Mount a NFS filesystem.
</summary>
@@ -82779,7 +83296,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_nfs" lineno="2674">
+<interface name="fs_remount_nfs" lineno="2848">
<summary>
Remount a NFS filesystem. This allows
some mount options to be changed.
@@ -82790,7 +83307,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_nfs" lineno="2692">
+<interface name="fs_unmount_nfs" lineno="2866">
<summary>
Unmount a NFS filesystem.
</summary>
@@ -82800,7 +83317,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nfs" lineno="2711">
+<interface name="fs_getattr_nfs" lineno="2885">
<summary>
Get the attributes of a NFS filesystem.
</summary>
@@ -82811,7 +83328,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_search_nfs" lineno="2729">
+<interface name="fs_search_nfs" lineno="2903">
<summary>
Search directories on a NFS filesystem.
</summary>
@@ -82821,7 +83338,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_nfs" lineno="2747">
+<interface name="fs_list_nfs" lineno="2921">
<summary>
List NFS filesystem.
</summary>
@@ -82831,7 +83348,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_nfs" lineno="2766">
+<interface name="fs_dontaudit_list_nfs" lineno="2940">
<summary>
Do not audit attempts to list the contents
of directories on a NFS filesystem.
@@ -82842,7 +83359,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mounton_nfs" lineno="2784">
+<interface name="fs_mounton_nfs" lineno="2958">
<summary>
Mounton a NFS filesystem.
</summary>
@@ -82852,7 +83369,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_files" lineno="2803">
+<interface name="fs_read_nfs_files" lineno="2977">
<summary>
Read files on a NFS filesystem.
</summary>
@@ -82863,7 +83380,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_read_nfs_files" lineno="2823">
+<interface name="fs_dontaudit_read_nfs_files" lineno="2997">
<summary>
Do not audit attempts to read
files on a NFS filesystem.
@@ -82874,7 +83391,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_write_nfs_files" lineno="2841">
+<interface name="fs_write_nfs_files" lineno="3015">
<summary>
Read files on a NFS filesystem.
</summary>
@@ -82884,7 +83401,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_exec_nfs_files" lineno="2861">
+<interface name="fs_exec_nfs_files" lineno="3035">
<summary>
Execute files on a NFS filesystem.
</summary>
@@ -82895,7 +83412,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_append_nfs_files" lineno="2882">
+<interface name="fs_append_nfs_files" lineno="3056">
<summary>
Append files
on a NFS filesystem.
@@ -82907,7 +83424,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_append_nfs_files" lineno="2902">
+<interface name="fs_dontaudit_append_nfs_files" lineno="3076">
<summary>
dontaudit Append files
on a NFS filesystem.
@@ -82919,7 +83436,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_rw_nfs_files" lineno="2921">
+<interface name="fs_dontaudit_rw_nfs_files" lineno="3095">
<summary>
Do not audit attempts to read or
write files on a NFS filesystem.
@@ -82930,7 +83447,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_symlinks" lineno="2939">
+<interface name="fs_read_nfs_symlinks" lineno="3113">
<summary>
Read symbolic links on a NFS filesystem.
</summary>
@@ -82940,7 +83457,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_nfs_symlinks" lineno="2958">
+<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3132">
<summary>
Dontaudit read symbolic links on a NFS filesystem.
</summary>
@@ -82950,7 +83467,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_named_sockets" lineno="2976">
+<interface name="fs_read_nfs_named_sockets" lineno="3150">
<summary>
Read named sockets on a NFS filesystem.
</summary>
@@ -82960,7 +83477,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_named_pipes" lineno="2995">
+<interface name="fs_read_nfs_named_pipes" lineno="3169">
<summary>
Read named pipes on a NFS network filesystem.
</summary>
@@ -82971,7 +83488,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_rpc_dirs" lineno="3014">
+<interface name="fs_getattr_rpc_dirs" lineno="3188">
<summary>
Get the attributes of directories of RPC
file system pipes.
@@ -82982,7 +83499,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_rpc" lineno="3033">
+<interface name="fs_search_rpc" lineno="3207">
<summary>
Search directories of RPC file system pipes.
</summary>
@@ -82992,7 +83509,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_removable" lineno="3051">
+<interface name="fs_search_removable" lineno="3225">
<summary>
Search removable storage directories.
</summary>
@@ -83002,7 +83519,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_removable" lineno="3069">
+<interface name="fs_dontaudit_list_removable" lineno="3243">
<summary>
Do not audit attempts to list removable storage directories.
</summary>
@@ -83012,7 +83529,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="fs_read_removable_files" lineno="3087">
+<interface name="fs_read_removable_files" lineno="3261">
<summary>
Read removable storage files.
</summary>
@@ -83022,7 +83539,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_removable_files" lineno="3105">
+<interface name="fs_dontaudit_read_removable_files" lineno="3279">
<summary>
Do not audit attempts to read removable storage files.
</summary>
@@ -83032,7 +83549,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_removable_files" lineno="3123">
+<interface name="fs_dontaudit_write_removable_files" lineno="3297">
<summary>
Do not audit attempts to write removable storage files.
</summary>
@@ -83042,7 +83559,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="fs_read_removable_symlinks" lineno="3141">
+<interface name="fs_read_removable_symlinks" lineno="3315">
<summary>
Read removable storage symbolic links.
</summary>
@@ -83052,7 +83569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_removable_blk_files" lineno="3159">
+<interface name="fs_read_removable_blk_files" lineno="3333">
<summary>
Read block nodes on removable filesystems.
</summary>
@@ -83062,7 +83579,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_removable_blk_files" lineno="3178">
+<interface name="fs_rw_removable_blk_files" lineno="3352">
<summary>
Read and write block nodes on removable filesystems.
</summary>
@@ -83072,7 +83589,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_rpc" lineno="3197">
+<interface name="fs_list_rpc" lineno="3371">
<summary>
Read directories of RPC file system pipes.
</summary>
@@ -83082,7 +83599,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_rpc_files" lineno="3215">
+<interface name="fs_read_rpc_files" lineno="3389">
<summary>
Read files of RPC file system pipes.
</summary>
@@ -83092,7 +83609,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_rpc_symlinks" lineno="3233">
+<interface name="fs_read_rpc_symlinks" lineno="3407">
<summary>
Read symbolic links of RPC file system pipes.
</summary>
@@ -83102,7 +83619,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_rpc_sockets" lineno="3251">
+<interface name="fs_read_rpc_sockets" lineno="3425">
<summary>
Read sockets of RPC file system pipes.
</summary>
@@ -83112,7 +83629,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_rpc_sockets" lineno="3269">
+<interface name="fs_rw_rpc_sockets" lineno="3443">
<summary>
Read and write sockets of RPC file system pipes.
</summary>
@@ -83122,7 +83639,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_dirs" lineno="3289">
+<interface name="fs_manage_nfs_dirs" lineno="3463">
<summary>
Create, read, write, and delete directories
on a NFS filesystem.
@@ -83134,7 +83651,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3309">
+<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3483">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -83146,7 +83663,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_files" lineno="3329">
+<interface name="fs_manage_nfs_files" lineno="3503">
<summary>
Create, read, write, and delete files
on a NFS filesystem.
@@ -83158,7 +83675,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_nfs_files" lineno="3349">
+<interface name="fs_dontaudit_manage_nfs_files" lineno="3523">
<summary>
Do not audit attempts to create,
read, write, and delete files
@@ -83170,7 +83687,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_symlinks" lineno="3369">
+<interface name="fs_manage_nfs_symlinks" lineno="3543">
<summary>
Create, read, write, and delete symbolic links
on a NFS network filesystem.
@@ -83182,7 +83699,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_nfs_named_pipes" lineno="3388">
+<interface name="fs_manage_nfs_named_pipes" lineno="3562">
<summary>
Create, read, write, and delete named pipes
on a NFS filesystem.
@@ -83193,7 +83710,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_named_sockets" lineno="3407">
+<interface name="fs_manage_nfs_named_sockets" lineno="3581">
<summary>
Create, read, write, and delete named sockets
on a NFS filesystem.
@@ -83204,7 +83721,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_nfs_domtrans" lineno="3450">
+<interface name="fs_nfs_domtrans" lineno="3624">
<summary>
Execute a file on a NFS filesystem
in the specified domain.
@@ -83239,7 +83756,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="fs_mount_nfsd_fs" lineno="3469">
+<interface name="fs_mount_nfsd_fs" lineno="3643">
<summary>
Mount a NFS server pseudo filesystem.
</summary>
@@ -83249,7 +83766,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_nfsd_fs" lineno="3488">
+<interface name="fs_remount_nfsd_fs" lineno="3662">
<summary>
Mount a NFS server pseudo filesystem.
This allows some mount options to be changed.
@@ -83260,7 +83777,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_nfsd_fs" lineno="3506">
+<interface name="fs_unmount_nfsd_fs" lineno="3680">
<summary>
Unmount a NFS server pseudo filesystem.
</summary>
@@ -83270,7 +83787,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nfsd_fs" lineno="3525">
+<interface name="fs_getattr_nfsd_fs" lineno="3699">
<summary>
Get the attributes of a NFS server
pseudo filesystem.
@@ -83281,7 +83798,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_nfsd_fs" lineno="3543">
+<interface name="fs_search_nfsd_fs" lineno="3717">
<summary>
Search NFS server directories.
</summary>
@@ -83291,7 +83808,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_nfsd_fs" lineno="3561">
+<interface name="fs_list_nfsd_fs" lineno="3735">
<summary>
List NFS server directories.
</summary>
@@ -83301,7 +83818,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nfsd_files" lineno="3579">
+<interface name="fs_getattr_nfsd_files" lineno="3753">
<summary>
Getattr files on an nfsd filesystem
</summary>
@@ -83311,7 +83828,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_nfsd_fs" lineno="3597">
+<interface name="fs_rw_nfsd_fs" lineno="3771">
<summary>
Read and write NFS server files.
</summary>
@@ -83321,7 +83838,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nsfs_files" lineno="3615">
+<interface name="fs_read_nsfs_files" lineno="3789">
<summary>
Read nsfs inodes (e.g. /proc/pid/ns/uts)
</summary>
@@ -83331,7 +83848,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_pstorefs" lineno="3633">
+<interface name="fs_unmount_nsfs" lineno="3807">
+<summary>
+Unmount an nsfs filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_getattr_pstorefs" lineno="3825">
<summary>
Get the attributes of a pstore filesystem.
</summary>
@@ -83341,7 +83868,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_pstore_dirs" lineno="3652">
+<interface name="fs_getattr_pstore_dirs" lineno="3844">
<summary>
Get the attributes of directories
of a pstore filesystem.
@@ -83352,7 +83879,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_pstore_dirs" lineno="3671">
+<interface name="fs_relabel_pstore_dirs" lineno="3863">
<summary>
Relabel to/from pstore_t directories.
</summary>
@@ -83362,7 +83889,39 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_associate_ramfs" lineno="3689">
+<interface name="fs_list_pstore_dirs" lineno="3882">
+<summary>
+List the directories
+of a pstore filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_read_pstore_files" lineno="3901">
+<summary>
+Read pstore_t files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_delete_pstore_files" lineno="3920">
+<summary>
+Delete the files
+of a pstore filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_associate_ramfs" lineno="3939">
<summary>
Allow the type to associate to ramfs filesystems.
</summary>
@@ -83372,7 +83931,7 @@ The type of the object to be associated.
</summary>
</param>
</interface>
-<interface name="fs_mount_ramfs" lineno="3707">
+<interface name="fs_mount_ramfs" lineno="3957">
<summary>
Mount a RAM filesystem.
</summary>
@@ -83382,7 +83941,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_ramfs" lineno="3726">
+<interface name="fs_remount_ramfs" lineno="3976">
<summary>
Remount a RAM filesystem. This allows
some mount options to be changed.
@@ -83393,7 +83952,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_ramfs" lineno="3744">
+<interface name="fs_unmount_ramfs" lineno="3994">
<summary>
Unmount a RAM filesystem.
</summary>
@@ -83403,7 +83962,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_ramfs" lineno="3762">
+<interface name="fs_getattr_ramfs" lineno="4012">
<summary>
Get the attributes of a RAM filesystem.
</summary>
@@ -83413,7 +83972,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_ramfs" lineno="3780">
+<interface name="fs_search_ramfs" lineno="4030">
<summary>
Search directories on a ramfs
</summary>
@@ -83423,7 +83982,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_search_ramfs" lineno="3798">
+<interface name="fs_dontaudit_search_ramfs" lineno="4048">
<summary>
Dontaudit Search directories on a ramfs
</summary>
@@ -83433,7 +83992,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_dirs" lineno="3817">
+<interface name="fs_manage_ramfs_dirs" lineno="4067">
<summary>
Create, read, write, and delete
directories on a ramfs.
@@ -83444,7 +84003,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_ramfs_files" lineno="3835">
+<interface name="fs_dontaudit_read_ramfs_files" lineno="4085">
<summary>
Dontaudit read on a ramfs files.
</summary>
@@ -83454,7 +84013,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_ramfs_pipes" lineno="3853">
+<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4103">
<summary>
Dontaudit read on a ramfs fifo_files.
</summary>
@@ -83464,7 +84023,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_files" lineno="3872">
+<interface name="fs_manage_ramfs_files" lineno="4122">
<summary>
Create, read, write, and delete
files on a ramfs filesystem.
@@ -83475,7 +84034,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_write_ramfs_pipes" lineno="3890">
+<interface name="fs_write_ramfs_pipes" lineno="4140">
<summary>
Write to named pipe on a ramfs filesystem.
</summary>
@@ -83485,7 +84044,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_ramfs_pipes" lineno="3909">
+<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4159">
<summary>
Do not audit attempts to write to named
pipes on a ramfs filesystem.
@@ -83496,7 +84055,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_rw_ramfs_pipes" lineno="3927">
+<interface name="fs_rw_ramfs_pipes" lineno="4177">
<summary>
Read and write a named pipe on a ramfs filesystem.
</summary>
@@ -83506,7 +84065,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_pipes" lineno="3946">
+<interface name="fs_manage_ramfs_pipes" lineno="4196">
<summary>
Create, read, write, and delete
named pipes on a ramfs filesystem.
@@ -83517,7 +84076,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_write_ramfs_sockets" lineno="3964">
+<interface name="fs_write_ramfs_sockets" lineno="4214">
<summary>
Write to named socket on a ramfs filesystem.
</summary>
@@ -83527,7 +84086,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_sockets" lineno="3983">
+<interface name="fs_manage_ramfs_sockets" lineno="4233">
<summary>
Create, read, write, and delete
named sockets on a ramfs filesystem.
@@ -83538,7 +84097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_romfs" lineno="4001">
+<interface name="fs_mount_romfs" lineno="4251">
<summary>
Mount a ROM filesystem.
</summary>
@@ -83548,7 +84107,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_romfs" lineno="4020">
+<interface name="fs_remount_romfs" lineno="4270">
<summary>
Remount a ROM filesystem. This allows
some mount options to be changed.
@@ -83559,7 +84118,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_romfs" lineno="4038">
+<interface name="fs_unmount_romfs" lineno="4288">
<summary>
Unmount a ROM filesystem.
</summary>
@@ -83569,7 +84128,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_romfs" lineno="4057">
+<interface name="fs_getattr_romfs" lineno="4307">
<summary>
Get the attributes of a ROM
filesystem.
@@ -83580,7 +84139,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_rpc_pipefs" lineno="4075">
+<interface name="fs_mount_rpc_pipefs" lineno="4325">
<summary>
Mount a RPC pipe filesystem.
</summary>
@@ -83590,7 +84149,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_rpc_pipefs" lineno="4094">
+<interface name="fs_remount_rpc_pipefs" lineno="4344">
<summary>
Remount a RPC pipe filesystem. This
allows some mount option to be changed.
@@ -83601,7 +84160,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_rpc_pipefs" lineno="4112">
+<interface name="fs_unmount_rpc_pipefs" lineno="4362">
<summary>
Unmount a RPC pipe filesystem.
</summary>
@@ -83611,7 +84170,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_rpc_pipefs" lineno="4131">
+<interface name="fs_getattr_rpc_pipefs" lineno="4381">
<summary>
Get the attributes of a RPC pipe
filesystem.
@@ -83622,7 +84181,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_rpc_named_pipes" lineno="4149">
+<interface name="fs_rw_rpc_named_pipes" lineno="4399">
<summary>
Read and write RPC pipe filesystem named pipes.
</summary>
@@ -83632,7 +84191,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_tmpfs" lineno="4167">
+<interface name="fs_mount_tmpfs" lineno="4417">
<summary>
Mount a tmpfs filesystem.
</summary>
@@ -83642,7 +84201,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_tmpfs" lineno="4185">
+<interface name="fs_remount_tmpfs" lineno="4435">
<summary>
Remount a tmpfs filesystem.
</summary>
@@ -83652,7 +84211,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_tmpfs" lineno="4203">
+<interface name="fs_unmount_tmpfs" lineno="4453">
<summary>
Unmount a tmpfs filesystem.
</summary>
@@ -83662,7 +84221,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_tmpfs" lineno="4221">
+<interface name="fs_dontaudit_getattr_tmpfs" lineno="4471">
<summary>
Do not audit getting the attributes of a tmpfs filesystem
</summary>
@@ -83672,7 +84231,7 @@ Domain to not audit
</summary>
</param>
</interface>
-<interface name="fs_getattr_tmpfs" lineno="4241">
+<interface name="fs_getattr_tmpfs" lineno="4491">
<summary>
Get the attributes of a tmpfs
filesystem.
@@ -83684,7 +84243,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_associate_tmpfs" lineno="4259">
+<interface name="fs_associate_tmpfs" lineno="4509">
<summary>
Allow the type to associate to tmpfs filesystems.
</summary>
@@ -83694,7 +84253,7 @@ The type of the object to be associated.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs" lineno="4277">
+<interface name="fs_relabelfrom_tmpfs" lineno="4527">
<summary>
Relabel from tmpfs filesystem.
</summary>
@@ -83704,7 +84263,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tmpfs_dirs" lineno="4295">
+<interface name="fs_getattr_tmpfs_dirs" lineno="4545">
<summary>
Get the attributes of tmpfs directories.
</summary>
@@ -83714,7 +84273,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4314">
+<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4564">
<summary>
Do not audit attempts to get the attributes
of tmpfs directories.
@@ -83725,7 +84284,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mounton_tmpfs" lineno="4332">
+<interface name="fs_mounton_tmpfs" lineno="4582">
<summary>
Mount on tmpfs directories.
</summary>
@@ -83735,7 +84294,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mounton_tmpfs_files" lineno="4350">
+<interface name="fs_mounton_tmpfs_files" lineno="4600">
<summary>
Mount on tmpfs files.
</summary>
@@ -83745,7 +84304,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_setattr_tmpfs_dirs" lineno="4368">
+<interface name="fs_setattr_tmpfs_dirs" lineno="4618">
<summary>
Set the attributes of tmpfs directories.
</summary>
@@ -83755,7 +84314,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_tmpfs" lineno="4386">
+<interface name="fs_search_tmpfs" lineno="4636">
<summary>
Search tmpfs directories.
</summary>
@@ -83765,7 +84324,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_tmpfs" lineno="4404">
+<interface name="fs_list_tmpfs" lineno="4654">
<summary>
List the contents of generic tmpfs directories.
</summary>
@@ -83775,7 +84334,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_tmpfs" lineno="4423">
+<interface name="fs_dontaudit_list_tmpfs" lineno="4673">
<summary>
Do not audit attempts to list the
contents of generic tmpfs directories.
@@ -83786,7 +84345,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_dirs" lineno="4442">
+<interface name="fs_manage_tmpfs_dirs" lineno="4692">
<summary>
Create, read, write, and delete
tmpfs directories
@@ -83797,7 +84356,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4461">
+<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4711">
<summary>
Do not audit attempts to write
tmpfs directories
@@ -83808,7 +84367,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4479">
+<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4729">
<summary>
Relabel from tmpfs_t dir
</summary>
@@ -83818,7 +84377,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_dirs" lineno="4497">
+<interface name="fs_relabel_tmpfs_dirs" lineno="4747">
<summary>
Relabel directory on tmpfs filesystems.
</summary>
@@ -83828,7 +84387,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_tmpfs_filetrans" lineno="4530">
+<interface name="fs_tmpfs_filetrans" lineno="4780">
<summary>
Create an object in a tmpfs filesystem, with a private
type using a type transition.
@@ -83854,7 +84413,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4550">
+<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4800">
<summary>
Do not audit attempts to getattr
generic tmpfs files.
@@ -83865,7 +84424,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_rw_tmpfs_files" lineno="4569">
+<interface name="fs_dontaudit_rw_tmpfs_files" lineno="4819">
<summary>
Do not audit attempts to read or write
generic tmpfs files.
@@ -83876,7 +84435,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_delete_tmpfs_symlinks" lineno="4587">
+<interface name="fs_delete_tmpfs_symlinks" lineno="4837">
<summary>
Delete tmpfs symbolic links.
</summary>
@@ -83886,7 +84445,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_auto_mountpoints" lineno="4606">
+<interface name="fs_manage_auto_mountpoints" lineno="4856">
<summary>
Create, read, write, and delete
auto moutpoints.
@@ -83897,7 +84456,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_tmpfs_files" lineno="4624">
+<interface name="fs_read_tmpfs_files" lineno="4874">
<summary>
Read generic tmpfs files.
</summary>
@@ -83907,7 +84466,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_tmpfs_files" lineno="4642">
+<interface name="fs_rw_tmpfs_files" lineno="4892">
<summary>
Read and write generic tmpfs files.
</summary>
@@ -83917,7 +84476,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_files" lineno="4660">
+<interface name="fs_relabel_tmpfs_files" lineno="4910">
<summary>
Relabel files on tmpfs filesystems.
</summary>
@@ -83927,7 +84486,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_tmpfs_symlinks" lineno="4678">
+<interface name="fs_read_tmpfs_symlinks" lineno="4928">
<summary>
Read tmpfs link files.
</summary>
@@ -83937,7 +84496,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs_sockets" lineno="4696">
+<interface name="fs_relabelfrom_tmpfs_sockets" lineno="4946">
<summary>
Relabelfrom socket files on tmpfs filesystems.
</summary>
@@ -83947,7 +84506,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="4714">
+<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="4964">
<summary>
Relabelfrom tmpfs link files.
</summary>
@@ -83957,7 +84516,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_tmpfs_chr_files" lineno="4732">
+<interface name="fs_rw_tmpfs_chr_files" lineno="4982">
<summary>
Read and write character nodes on tmpfs filesystems.
</summary>
@@ -83967,7 +84526,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="4751">
+<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5001">
<summary>
dontaudit Read and write character nodes on tmpfs filesystems.
</summary>
@@ -83977,7 +84536,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_chr_file" lineno="4770">
+<interface name="fs_relabel_tmpfs_chr_file" lineno="5020">
<summary>
Relabel character nodes on tmpfs filesystems.
</summary>
@@ -83987,7 +84546,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_tmpfs_blk_files" lineno="4789">
+<interface name="fs_rw_tmpfs_blk_files" lineno="5039">
<summary>
Read and write block nodes on tmpfs filesystems.
</summary>
@@ -83997,7 +84556,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_blk_file" lineno="4808">
+<interface name="fs_relabel_tmpfs_blk_file" lineno="5058">
<summary>
Relabel block nodes on tmpfs filesystems.
</summary>
@@ -84007,7 +84566,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_files" lineno="4828">
+<interface name="fs_manage_tmpfs_files" lineno="5078">
<summary>
Read and write, create and delete generic
files on tmpfs filesystems.
@@ -84018,7 +84577,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_symlinks" lineno="4847">
+<interface name="fs_manage_tmpfs_symlinks" lineno="5097">
<summary>
Read and write, create and delete symbolic
links on tmpfs filesystems.
@@ -84029,7 +84588,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_sockets" lineno="4866">
+<interface name="fs_manage_tmpfs_sockets" lineno="5116">
<summary>
Read and write, create and delete socket
files on tmpfs filesystems.
@@ -84040,7 +84599,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_chr_files" lineno="4885">
+<interface name="fs_manage_tmpfs_chr_files" lineno="5135">
<summary>
Read and write, create and delete character
nodes on tmpfs filesystems.
@@ -84051,7 +84610,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_blk_files" lineno="4904">
+<interface name="fs_manage_tmpfs_blk_files" lineno="5154">
<summary>
Read and write, create and delete block nodes
on tmpfs filesystems.
@@ -84062,7 +84621,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tracefs" lineno="4922">
+<interface name="fs_getattr_tracefs" lineno="5172">
<summary>
Get the attributes of a trace filesystem.
</summary>
@@ -84072,7 +84631,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tracefs_dirs" lineno="4940">
+<interface name="fs_getattr_tracefs_dirs" lineno="5190">
<summary>
Get attributes of dirs on tracefs filesystem.
</summary>
@@ -84082,7 +84641,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_tracefs" lineno="4958">
+<interface name="fs_search_tracefs" lineno="5208">
<summary>
search directories on a tracefs filesystem
</summary>
@@ -84092,7 +84651,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tracefs_files" lineno="4977">
+<interface name="fs_getattr_tracefs_files" lineno="5227">
<summary>
Get the attributes of files
on a trace filesystem.
@@ -84103,7 +84662,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_xenfs" lineno="4995">
+<interface name="fs_mount_xenfs" lineno="5245">
<summary>
Mount a XENFS filesystem.
</summary>
@@ -84113,7 +84672,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_xenfs" lineno="5013">
+<interface name="fs_search_xenfs" lineno="5263">
<summary>
Search the XENFS filesystem.
</summary>
@@ -84123,7 +84682,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_xenfs_dirs" lineno="5033">
+<interface name="fs_manage_xenfs_dirs" lineno="5283">
<summary>
Create, read, write, and delete directories
on a XENFS filesystem.
@@ -84135,7 +84694,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5053">
+<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5303">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -84147,7 +84706,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_xenfs_files" lineno="5073">
+<interface name="fs_manage_xenfs_files" lineno="5323">
<summary>
Create, read, write, and delete files
on a XENFS filesystem.
@@ -84159,7 +84718,17 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_xenfs_files" lineno="5093">
+<interface name="fs_mmap_xenfs_files" lineno="5341">
+<summary>
+Map files a XENFS filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_dontaudit_manage_xenfs_files" lineno="5361">
<summary>
Do not audit attempts to create,
read, write, and delete files
@@ -84171,7 +84740,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mount_all_fs" lineno="5111">
+<interface name="fs_mount_all_fs" lineno="5379">
<summary>
Mount all filesystems.
</summary>
@@ -84181,7 +84750,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_all_fs" lineno="5130">
+<interface name="fs_remount_all_fs" lineno="5398">
<summary>
Remount all filesystems. This
allows some mount options to be changed.
@@ -84192,7 +84761,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_all_fs" lineno="5148">
+<interface name="fs_unmount_all_fs" lineno="5416">
<summary>
Unmount all filesystems.
</summary>
@@ -84202,7 +84771,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_fs" lineno="5180">
+<interface name="fs_getattr_all_fs" lineno="5448">
<summary>
Get the attributes of all filesystems.
</summary>
@@ -84226,7 +84795,7 @@ Domain allowed access.
<infoflow type="read" weight="5"/>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_getattr_all_fs" lineno="5200">
+<interface name="fs_dontaudit_getattr_all_fs" lineno="5468">
<summary>
Do not audit attempts to get the attributes
all filesystems.
@@ -84237,7 +84806,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_get_all_fs_quotas" lineno="5219">
+<interface name="fs_get_all_fs_quotas" lineno="5487">
<summary>
Get the quotas of all filesystems.
</summary>
@@ -84248,7 +84817,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_set_all_quotas" lineno="5238">
+<interface name="fs_set_all_quotas" lineno="5506">
<summary>
Set the quotas of all filesystems.
</summary>
@@ -84259,7 +84828,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_relabelfrom_all_fs" lineno="5256">
+<interface name="fs_relabelfrom_all_fs" lineno="5524">
<summary>
Relabelfrom all filesystems.
</summary>
@@ -84269,7 +84838,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_dirs" lineno="5275">
+<interface name="fs_getattr_all_dirs" lineno="5543">
<summary>
Get the attributes of all directories
with a filesystem type.
@@ -84280,7 +84849,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_all" lineno="5293">
+<interface name="fs_search_all" lineno="5561">
<summary>
Search all directories with a filesystem type.
</summary>
@@ -84290,7 +84859,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_all" lineno="5311">
+<interface name="fs_list_all" lineno="5579">
<summary>
List all directories with a filesystem type.
</summary>
@@ -84300,7 +84869,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_files" lineno="5330">
+<interface name="fs_getattr_all_files" lineno="5598">
<summary>
Get the attributes of all files with
a filesystem type.
@@ -84311,7 +84880,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_files" lineno="5349">
+<interface name="fs_dontaudit_getattr_all_files" lineno="5617">
<summary>
Do not audit attempts to get the attributes
of all files with a filesystem type.
@@ -84322,7 +84891,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_symlinks" lineno="5368">
+<interface name="fs_getattr_all_symlinks" lineno="5636">
<summary>
Get the attributes of all symbolic links with
a filesystem type.
@@ -84333,7 +84902,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5387">
+<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5655">
<summary>
Do not audit attempts to get the attributes
of all symbolic links with a filesystem type.
@@ -84344,7 +84913,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_pipes" lineno="5406">
+<interface name="fs_getattr_all_pipes" lineno="5674">
<summary>
Get the attributes of all named pipes with
a filesystem type.
@@ -84355,7 +84924,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_pipes" lineno="5425">
+<interface name="fs_dontaudit_getattr_all_pipes" lineno="5693">
<summary>
Do not audit attempts to get the attributes
of all named pipes with a filesystem type.
@@ -84366,7 +84935,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_sockets" lineno="5444">
+<interface name="fs_getattr_all_sockets" lineno="5712">
<summary>
Get the attributes of all named sockets with
a filesystem type.
@@ -84377,7 +84946,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_sockets" lineno="5463">
+<interface name="fs_dontaudit_getattr_all_sockets" lineno="5731">
<summary>
Do not audit attempts to get the attributes
of all named sockets with a filesystem type.
@@ -84388,7 +84957,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_blk_files" lineno="5482">
+<interface name="fs_getattr_all_blk_files" lineno="5750">
<summary>
Get the attributes of all block device nodes with
a filesystem type.
@@ -84399,7 +84968,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_chr_files" lineno="5501">
+<interface name="fs_getattr_all_chr_files" lineno="5769">
<summary>
Get the attributes of all character device nodes with
a filesystem type.
@@ -84410,7 +84979,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unconfined" lineno="5519">
+<interface name="fs_unconfined" lineno="5787">
<summary>
Unconfined access to filesystems
</summary>
@@ -84703,7 +85272,17 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_read_ring_buffer" lineno="505">
+<interface name="kernel_write_key" lineno="504">
+<summary>
+allow write access to the kernel key ring.
+</summary>
+<param name="domain">
+<summary>
+Domain to allow.
+</summary>
+</param>
+</interface>
+<interface name="kernel_read_ring_buffer" lineno="523">
<summary>
Allows caller to read the ring buffer.
</summary>
@@ -84714,7 +85293,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_read_ring_buffer" lineno="524">
+<interface name="kernel_dontaudit_read_ring_buffer" lineno="542">
<summary>
Do not audit attempts to read the ring buffer.
</summary>
@@ -84724,7 +85303,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_change_ring_buffer_level" lineno="543">
+<interface name="kernel_change_ring_buffer_level" lineno="561">
<summary>
Change the level of kernel messages logged to the console.
</summary>
@@ -84735,7 +85314,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_clear_ring_buffer" lineno="563">
+<interface name="kernel_clear_ring_buffer" lineno="581">
<summary>
Allows the caller to clear the ring buffer.
</summary>
@@ -84746,7 +85325,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_request_load_module" lineno="595">
+<interface name="kernel_request_load_module" lineno="613">
<summary>
Allows caller to request the kernel to load a module
</summary>
@@ -84769,7 +85348,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_request_load_module" lineno="613">
+<interface name="kernel_dontaudit_request_load_module" lineno="631">
<summary>
Do not audit requests to the kernel to load a module.
</summary>
@@ -84779,7 +85358,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_get_sysvipc_info" lineno="631">
+<interface name="kernel_get_sysvipc_info" lineno="649">
<summary>
Get information on all System V IPC objects.
</summary>
@@ -84789,7 +85368,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_getattr_debugfs" lineno="649">
+<interface name="kernel_getattr_debugfs" lineno="667">
<summary>
Get the attributes of a kernel debugging filesystem.
</summary>
@@ -84799,7 +85378,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_mount_debugfs" lineno="667">
+<interface name="kernel_mount_debugfs" lineno="685">
<summary>
Mount a kernel debugging filesystem.
</summary>
@@ -84809,7 +85388,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_unmount_debugfs" lineno="685">
+<interface name="kernel_unmount_debugfs" lineno="703">
<summary>
Unmount a kernel debugging filesystem.
</summary>
@@ -84819,7 +85398,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_remount_debugfs" lineno="703">
+<interface name="kernel_remount_debugfs" lineno="721">
<summary>
Remount a kernel debugging filesystem.
</summary>
@@ -84829,7 +85408,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_search_debugfs" lineno="721">
+<interface name="kernel_search_debugfs" lineno="739">
<summary>
Search the contents of a kernel debugging filesystem.
</summary>
@@ -84839,7 +85418,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_search_debugfs" lineno="739">
+<interface name="kernel_dontaudit_search_debugfs" lineno="757">
<summary>
Do not audit attempts to search the kernel debugging filesystem.
</summary>
@@ -84849,7 +85428,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_read_debugfs" lineno="757">
+<interface name="kernel_read_debugfs" lineno="775">
<summary>
Read information from the debugging filesystem.
</summary>
@@ -84859,7 +85438,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_write_debugfs_dirs" lineno="777">
+<interface name="kernel_dontaudit_write_debugfs_dirs" lineno="795">
<summary>
Do not audit attempts to write kernel debugging filesystem dirs.
</summary>
@@ -84869,7 +85448,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_manage_debugfs" lineno="795">
+<interface name="kernel_manage_debugfs" lineno="813">
<summary>
Manage information from the debugging filesystem.
</summary>
@@ -84879,7 +85458,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_mount_kvmfs" lineno="815">
+<interface name="kernel_mount_kvmfs" lineno="833">
<summary>
Mount a kernel VM filesystem.
</summary>
@@ -84889,7 +85468,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_mount_proc" lineno="833">
+<interface name="kernel_mount_proc" lineno="851">
<summary>
mount the proc filesystem.
</summary>
@@ -84899,7 +85478,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_remount_proc" lineno="851">
+<interface name="kernel_remount_proc" lineno="869">
<summary>
remount the proc filesystem.
</summary>
@@ -84909,7 +85488,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_unmount_proc" lineno="869">
+<interface name="kernel_unmount_proc" lineno="887">
<summary>
Unmount the proc filesystem.
</summary>
@@ -84919,7 +85498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_getattr_proc" lineno="887">
+<interface name="kernel_getattr_proc" lineno="905">
<summary>
Get the attributes of the proc filesystem.
</summary>
@@ -84929,7 +85508,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_mounton_proc" lineno="906">
+<interface name="kernel_mounton_proc" lineno="924">
<summary>
Mount on proc directories.
</summary>
@@ -84940,7 +85519,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="925">
+<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="943">
<summary>
Do not audit attempts to set the
attributes of directories in /proc.
@@ -84951,7 +85530,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_search_proc" lineno="943">
+<interface name="kernel_search_proc" lineno="961">
<summary>
Search directories in /proc.
</summary>
@@ -84961,7 +85540,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_list_proc" lineno="961">
+<interface name="kernel_list_proc" lineno="979">
<summary>
List the contents of directories in /proc.
</summary>
@@ -84971,7 +85550,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_list_proc" lineno="980">
+<interface name="kernel_dontaudit_list_proc" lineno="998">
<summary>
Do not audit attempts to list the
contents of directories in /proc.
@@ -84982,7 +85561,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_write_proc_dirs" lineno="999">
+<interface name="kernel_dontaudit_write_proc_dirs" lineno="1017">
<summary>
Do not audit attempts to write the
directories in /proc.
@@ -84993,7 +85572,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_mounton_proc_dirs" lineno="1017">
+<interface name="kernel_mounton_proc_dirs" lineno="1035">
<summary>
Mount the directories in /proc.
</summary>
@@ -85003,7 +85582,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_getattr_proc_files" lineno="1035">
+<interface name="kernel_getattr_proc_files" lineno="1053">
<summary>
Get the attributes of files in /proc.
</summary>
@@ -85013,7 +85592,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_proc_symlinks" lineno="1062">
+<interface name="kernel_read_proc_symlinks" lineno="1080">
<summary>
Read generic symbolic links in /proc.
</summary>
@@ -85032,7 +85611,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="kernel_read_system_state" lineno="1101">
+<interface name="kernel_read_system_state" lineno="1119">
<summary>
Allows caller to read system state information in /proc.
</summary>
@@ -85063,7 +85642,7 @@ Domain allowed access.
<infoflow type="read" weight="10"/>
<rolecap/>
</interface>
-<interface name="kernel_write_proc_files" lineno="1127">
+<interface name="kernel_write_proc_files" lineno="1145">
<summary>
Write to generic proc entries.
</summary>
@@ -85074,7 +85653,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_read_system_state" lineno="1146">
+<interface name="kernel_dontaudit_read_system_state" lineno="1164">
<summary>
Do not audit attempts by caller to
read system state information in proc.
@@ -85085,7 +85664,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1165">
+<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1183">
<summary>
Do not audit attempts by caller to
read symbolic links in proc.
@@ -85096,7 +85675,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_rw_afs_state" lineno="1184">
+<interface name="kernel_rw_afs_state" lineno="1202">
<summary>
Allow caller to read and write state information for AFS.
</summary>
@@ -85107,7 +85686,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_software_raid_state" lineno="1204">
+<interface name="kernel_read_software_raid_state" lineno="1222">
<summary>
Allow caller to read the state information for software raid.
</summary>
@@ -85118,7 +85697,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_software_raid_state" lineno="1224">
+<interface name="kernel_rw_software_raid_state" lineno="1242">
<summary>
Allow caller to read and set the state information for software raid.
</summary>
@@ -85128,9 +85707,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_getattr_core_if" lineno="1244">
+<interface name="kernel_getattr_core_if" lineno="1262">
<summary>
-Allows caller to get attribues of core kernel interface.
+Allows caller to get attributes of core kernel interface.
</summary>
<param name="domain">
<summary>
@@ -85138,7 +85717,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_core_if" lineno="1265">
+<interface name="kernel_dontaudit_getattr_core_if" lineno="1283">
<summary>
Do not audit attempts to get the attributes of
core kernel interfaces.
@@ -85149,7 +85728,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_read_core_if" lineno="1283">
+<interface name="kernel_read_core_if" lineno="1301">
<summary>
Allows caller to read the core kernel interface.
</summary>
@@ -85159,7 +85738,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_messages" lineno="1307">
+<interface name="kernel_read_messages" lineno="1325">
<summary>
Allow caller to read kernel messages
using the /proc/kmsg interface.
@@ -85170,7 +85749,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_getattr_message_if" lineno="1329">
+<interface name="kernel_getattr_message_if" lineno="1347">
<summary>
Allow caller to get the attributes of kernel message
interface (/proc/kmsg).
@@ -85181,7 +85760,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_message_if" lineno="1348">
+<interface name="kernel_dontaudit_getattr_message_if" lineno="1366">
<summary>
Do not audit attempts by caller to get the attributes of kernel
message interfaces.
@@ -85192,7 +85771,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_mounton_message_if" lineno="1367">
+<interface name="kernel_mounton_message_if" lineno="1385">
<summary>
Mount on kernel message interfaces files.
</summary>
@@ -85203,7 +85782,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_search_network_state" lineno="1388">
+<interface name="kernel_dontaudit_search_network_state" lineno="1406">
<summary>
Do not audit attempts to search the network
state directory.
@@ -85215,7 +85794,7 @@ Domain to not audit.
</param>
</interface>
-<interface name="kernel_search_network_state" lineno="1407">
+<interface name="kernel_search_network_state" lineno="1425">
<summary>
Allow searching of network state directory.
</summary>
@@ -85226,7 +85805,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_read_network_state" lineno="1437">
+<interface name="kernel_read_network_state" lineno="1455">
<summary>
Read the network state information.
</summary>
@@ -85248,7 +85827,7 @@ Domain allowed access.
<infoflow type="read" weight="10"/>
<rolecap/>
</interface>
-<interface name="kernel_read_network_state_symlinks" lineno="1458">
+<interface name="kernel_read_network_state_symlinks" lineno="1476">
<summary>
Allow caller to read the network state symbolic links.
</summary>
@@ -85258,7 +85837,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_search_xen_state" lineno="1479">
+<interface name="kernel_search_xen_state" lineno="1497">
<summary>
Allow searching of xen state directory.
</summary>
@@ -85269,7 +85848,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_dontaudit_search_xen_state" lineno="1499">
+<interface name="kernel_dontaudit_search_xen_state" lineno="1517">
<summary>
Do not audit attempts to search the xen
state directory.
@@ -85281,7 +85860,7 @@ Domain to not audit.
</param>
</interface>
-<interface name="kernel_read_xen_state" lineno="1518">
+<interface name="kernel_read_xen_state" lineno="1536">
<summary>
Allow caller to read the xen state information.
</summary>
@@ -85292,7 +85871,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_read_xen_state_symlinks" lineno="1540">
+<interface name="kernel_read_xen_state_symlinks" lineno="1558">
<summary>
Allow caller to read the xen state symbolic links.
</summary>
@@ -85303,7 +85882,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_write_xen_state" lineno="1561">
+<interface name="kernel_write_xen_state" lineno="1579">
<summary>
Allow caller to write xen state information.
</summary>
@@ -85314,7 +85893,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_list_all_proc" lineno="1579">
+<interface name="kernel_list_all_proc" lineno="1597">
<summary>
Allow attempts to list all proc directories.
</summary>
@@ -85324,7 +85903,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_list_all_proc" lineno="1598">
+<interface name="kernel_dontaudit_list_all_proc" lineno="1616">
<summary>
Do not audit attempts to list all proc directories.
</summary>
@@ -85334,7 +85913,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_search_sysctl" lineno="1619">
+<interface name="kernel_dontaudit_search_sysctl" lineno="1637">
<summary>
Do not audit attempts by caller to search
the base directory of sysctls.
@@ -85346,7 +85925,7 @@ Domain to not audit.
</param>
</interface>
-<interface name="kernel_mounton_sysctl_dirs" lineno="1638">
+<interface name="kernel_mounton_sysctl_dirs" lineno="1656">
<summary>
Mount on sysctl_t dirs.
</summary>
@@ -85357,7 +85936,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_sysctl" lineno="1658">
+<interface name="kernel_read_sysctl" lineno="1676">
<summary>
Allow access to read sysctl directories.
</summary>
@@ -85368,7 +85947,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="kernel_mounton_sysctl_files" lineno="1678">
+<interface name="kernel_mounton_sysctl_files" lineno="1696">
<summary>
Mount on sysctl files.
</summary>
@@ -85379,7 +85958,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_device_sysctls" lineno="1698">
+<interface name="kernel_read_device_sysctls" lineno="1716">
<summary>
Allow caller to read the device sysctls.
</summary>
@@ -85390,7 +85969,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_device_sysctls" lineno="1719">
+<interface name="kernel_rw_device_sysctls" lineno="1737">
<summary>
Read and write device sysctls.
</summary>
@@ -85401,7 +85980,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_search_vm_sysctl" lineno="1739">
+<interface name="kernel_search_vm_sysctl" lineno="1757">
<summary>
Allow caller to search virtual memory sysctls.
</summary>
@@ -85411,7 +85990,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_vm_sysctls" lineno="1758">
+<interface name="kernel_read_vm_sysctls" lineno="1776">
<summary>
Allow caller to read virtual memory sysctls.
</summary>
@@ -85422,7 +86001,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_vm_sysctls" lineno="1779">
+<interface name="kernel_rw_vm_sysctls" lineno="1797">
<summary>
Read and write virtual memory sysctls.
</summary>
@@ -85433,7 +86012,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_search_network_sysctl" lineno="1801">
+<interface name="kernel_search_network_sysctl" lineno="1819">
<summary>
Search network sysctl directories.
</summary>
@@ -85443,7 +86022,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_search_network_sysctl" lineno="1819">
+<interface name="kernel_dontaudit_search_network_sysctl" lineno="1837">
<summary>
Do not audit attempts by caller to search network sysctl directories.
</summary>
@@ -85453,7 +86032,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_read_net_sysctls" lineno="1838">
+<interface name="kernel_read_net_sysctls" lineno="1856">
<summary>
Allow caller to read network sysctls.
</summary>
@@ -85464,7 +86043,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_net_sysctls" lineno="1859">
+<interface name="kernel_rw_net_sysctls" lineno="1877">
<summary>
Allow caller to modiry contents of sysctl network files.
</summary>
@@ -85475,7 +86054,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_unix_sysctls" lineno="1881">
+<interface name="kernel_read_unix_sysctls" lineno="1899">
<summary>
Allow caller to read unix domain
socket sysctls.
@@ -85487,7 +86066,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_unix_sysctls" lineno="1903">
+<interface name="kernel_rw_unix_sysctls" lineno="1921">
<summary>
Read and write unix domain
socket sysctls.
@@ -85499,7 +86078,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_hotplug_sysctls" lineno="1924">
+<interface name="kernel_read_hotplug_sysctls" lineno="1942">
<summary>
Read the hotplug sysctl.
</summary>
@@ -85510,7 +86089,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_hotplug_sysctls" lineno="1945">
+<interface name="kernel_rw_hotplug_sysctls" lineno="1963">
<summary>
Read and write the hotplug sysctl.
</summary>
@@ -85521,7 +86100,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_modprobe_sysctls" lineno="1966">
+<interface name="kernel_read_modprobe_sysctls" lineno="1984">
<summary>
Read the modprobe sysctl.
</summary>
@@ -85532,7 +86111,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_modprobe_sysctls" lineno="1987">
+<interface name="kernel_rw_modprobe_sysctls" lineno="2005">
<summary>
Read and write the modprobe sysctl.
</summary>
@@ -85543,7 +86122,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2007">
+<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2025">
<summary>
Do not audit attempts to search generic kernel sysctls.
</summary>
@@ -85553,7 +86132,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2025">
+<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2043">
<summary>
Do not audit attempted reading of kernel sysctls
</summary>
@@ -85563,7 +86142,7 @@ Domain to not audit accesses from
</summary>
</param>
</interface>
-<interface name="kernel_read_crypto_sysctls" lineno="2043">
+<interface name="kernel_read_crypto_sysctls" lineno="2061">
<summary>
Read generic crypto sysctls.
</summary>
@@ -85573,7 +86152,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_kernel_sysctls" lineno="2084">
+<interface name="kernel_read_kernel_sysctls" lineno="2102">
<summary>
Read general kernel sysctls.
</summary>
@@ -85605,7 +86184,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2104">
+<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2122">
<summary>
Do not audit attempts to write generic kernel sysctls.
</summary>
@@ -85615,7 +86194,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_rw_kernel_sysctl" lineno="2123">
+<interface name="kernel_rw_kernel_sysctl" lineno="2141">
<summary>
Read and write generic kernel sysctls.
</summary>
@@ -85626,7 +86205,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_mounton_kernel_sysctl_files" lineno="2144">
+<interface name="kernel_mounton_kernel_sysctl_files" lineno="2162">
<summary>
Mount on kernel sysctl files.
</summary>
@@ -85637,7 +86216,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2164">
+<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2182">
<summary>
Read kernel ns lastpid sysctls.
</summary>
@@ -85648,7 +86227,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2184">
+<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2202">
<summary>
Do not audit attempts to write kernel ns lastpid sysctls.
</summary>
@@ -85658,7 +86237,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2203">
+<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2221">
<summary>
Read and write kernel ns lastpid sysctls.
</summary>
@@ -85669,7 +86248,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_search_fs_sysctls" lineno="2224">
+<interface name="kernel_search_fs_sysctls" lineno="2242">
<summary>
Search filesystem sysctl directories.
</summary>
@@ -85680,7 +86259,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_fs_sysctls" lineno="2243">
+<interface name="kernel_read_fs_sysctls" lineno="2261">
<summary>
Read filesystem sysctls.
</summary>
@@ -85691,9 +86270,9 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_fs_sysctls" lineno="2264">
+<interface name="kernel_rw_fs_sysctls" lineno="2282">
<summary>
-Read and write fileystem sysctls.
+Read and write filesystem sysctls.
</summary>
<param name="domain">
<summary>
@@ -85702,7 +86281,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_irq_sysctls" lineno="2285">
+<interface name="kernel_read_irq_sysctls" lineno="2303">
<summary>
Read IRQ sysctls.
</summary>
@@ -85713,7 +86292,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_irq_sysctls" lineno="2306">
+<interface name="kernel_rw_irq_sysctls" lineno="2324">
<summary>
Read and write IRQ sysctls.
</summary>
@@ -85724,7 +86303,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_rpc_sysctls" lineno="2327">
+<interface name="kernel_read_rpc_sysctls" lineno="2345">
<summary>
Read RPC sysctls.
</summary>
@@ -85735,7 +86314,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_rpc_sysctls" lineno="2348">
+<interface name="kernel_rw_rpc_sysctls" lineno="2366">
<summary>
Read and write RPC sysctls.
</summary>
@@ -85746,7 +86325,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_list_all_sysctls" lineno="2368">
+<interface name="kernel_dontaudit_list_all_sysctls" lineno="2386">
<summary>
Do not audit attempts to list all sysctl directories.
</summary>
@@ -85756,7 +86335,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_read_all_sysctls" lineno="2388">
+<interface name="kernel_read_all_sysctls" lineno="2406">
<summary>
Allow caller to read all sysctls.
</summary>
@@ -85767,7 +86346,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_all_sysctls" lineno="2411">
+<interface name="kernel_rw_all_sysctls" lineno="2429">
<summary>
Read and write all sysctls.
</summary>
@@ -85778,7 +86357,18 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_kill_unlabeled" lineno="2435">
+<interface name="kernel_associate_proc" lineno="2454">
+<summary>
+Associate a file to proc_t (/proc)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="kernel_kill_unlabeled" lineno="2471">
<summary>
Send a kill signal to unlabeled processes.
</summary>
@@ -85788,7 +86378,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_mount_unlabeled" lineno="2453">
+<interface name="kernel_mount_unlabeled" lineno="2489">
<summary>
Mount a kernel unlabeled filesystem.
</summary>
@@ -85798,7 +86388,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_unmount_unlabeled" lineno="2471">
+<interface name="kernel_unmount_unlabeled" lineno="2507">
<summary>
Unmount a kernel unlabeled filesystem.
</summary>
@@ -85808,7 +86398,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_signal_unlabeled" lineno="2489">
+<interface name="kernel_signal_unlabeled" lineno="2525">
<summary>
Send general signals to unlabeled processes.
</summary>
@@ -85818,7 +86408,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_signull_unlabeled" lineno="2507">
+<interface name="kernel_signull_unlabeled" lineno="2543">
<summary>
Send a null signal to unlabeled processes.
</summary>
@@ -85828,7 +86418,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_sigstop_unlabeled" lineno="2525">
+<interface name="kernel_sigstop_unlabeled" lineno="2561">
<summary>
Send a stop signal to unlabeled processes.
</summary>
@@ -85838,7 +86428,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_sigchld_unlabeled" lineno="2543">
+<interface name="kernel_sigchld_unlabeled" lineno="2579">
<summary>
Send a child terminated signal to unlabeled processes.
</summary>
@@ -85848,7 +86438,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_getattr_unlabeled_dirs" lineno="2561">
+<interface name="kernel_getattr_unlabeled_dirs" lineno="2597">
<summary>
Get the attributes of unlabeled directories.
</summary>
@@ -85858,7 +86448,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_search_unlabeled" lineno="2579">
+<interface name="kernel_dontaudit_search_unlabeled" lineno="2615">
<summary>
Do not audit attempts to search unlabeled directories.
</summary>
@@ -85868,7 +86458,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_list_unlabeled" lineno="2597">
+<interface name="kernel_list_unlabeled" lineno="2633">
<summary>
List unlabeled directories.
</summary>
@@ -85878,7 +86468,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_unlabeled_state" lineno="2615">
+<interface name="kernel_read_unlabeled_state" lineno="2651">
<summary>
Read the process state (/proc/pid) of all unlabeled_t.
</summary>
@@ -85888,7 +86478,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_list_unlabeled" lineno="2635">
+<interface name="kernel_dontaudit_list_unlabeled" lineno="2671">
<summary>
Do not audit attempts to list unlabeled directories.
</summary>
@@ -85898,7 +86488,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_rw_unlabeled_dirs" lineno="2653">
+<interface name="kernel_rw_unlabeled_dirs" lineno="2689">
<summary>
Read and write unlabeled directories.
</summary>
@@ -85908,7 +86498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_dirs" lineno="2671">
+<interface name="kernel_delete_unlabeled_dirs" lineno="2707">
<summary>
Delete unlabeled directories.
</summary>
@@ -85918,7 +86508,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_dirs" lineno="2689">
+<interface name="kernel_manage_unlabeled_dirs" lineno="2725">
<summary>
Create, read, write, and delete unlabeled directories.
</summary>
@@ -85928,7 +86518,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_mounton_unlabeled_dirs" lineno="2707">
+<interface name="kernel_mounton_unlabeled_dirs" lineno="2743">
<summary>
Mount a filesystem on an unlabeled directory.
</summary>
@@ -85938,7 +86528,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_unlabeled_files" lineno="2725">
+<interface name="kernel_read_unlabeled_files" lineno="2761">
<summary>
Read unlabeled files.
</summary>
@@ -85948,7 +86538,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_rw_unlabeled_files" lineno="2743">
+<interface name="kernel_rw_unlabeled_files" lineno="2779">
<summary>
Read and write unlabeled files.
</summary>
@@ -85958,7 +86548,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_files" lineno="2761">
+<interface name="kernel_delete_unlabeled_files" lineno="2797">
<summary>
Delete unlabeled files.
</summary>
@@ -85968,7 +86558,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_files" lineno="2779">
+<interface name="kernel_manage_unlabeled_files" lineno="2815">
<summary>
Create, read, write, and delete unlabeled files.
</summary>
@@ -85978,7 +86568,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2798">
+<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2834">
<summary>
Do not audit attempts by caller to get the
attributes of an unlabeled file.
@@ -85989,7 +86579,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2817">
+<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2853">
<summary>
Do not audit attempts by caller to
read an unlabeled file.
@@ -86000,7 +86590,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_symlinks" lineno="2835">
+<interface name="kernel_delete_unlabeled_symlinks" lineno="2871">
<summary>
Delete unlabeled symbolic links.
</summary>
@@ -86010,7 +86600,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_symlinks" lineno="2853">
+<interface name="kernel_manage_unlabeled_symlinks" lineno="2889">
<summary>
Create, read, write, and delete unlabeled symbolic links.
</summary>
@@ -86020,7 +86610,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2872">
+<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2908">
<summary>
Do not audit attempts by caller to get the
attributes of unlabeled symbolic links.
@@ -86031,7 +86621,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="2891">
+<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="2927">
<summary>
Do not audit attempts by caller to get the
attributes of unlabeled named pipes.
@@ -86042,7 +86632,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="2910">
+<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="2946">
<summary>
Do not audit attempts by caller to get the
attributes of unlabeled named sockets.
@@ -86053,7 +86643,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="2929">
+<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="2965">
<summary>
Do not audit attempts by caller to get attributes for
unlabeled block devices.
@@ -86064,7 +86654,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_rw_unlabeled_blk_files" lineno="2947">
+<interface name="kernel_rw_unlabeled_blk_files" lineno="2983">
<summary>
Read and write unlabeled block device nodes.
</summary>
@@ -86074,7 +86664,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_blk_files" lineno="2965">
+<interface name="kernel_delete_unlabeled_blk_files" lineno="3001">
<summary>
Delete unlabeled block device nodes.
</summary>
@@ -86084,7 +86674,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_blk_files" lineno="2983">
+<interface name="kernel_manage_unlabeled_blk_files" lineno="3019">
<summary>
Create, read, write, and delete unlabeled block device nodes.
</summary>
@@ -86094,7 +86684,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3002">
+<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3038">
<summary>
Do not audit attempts by caller to get attributes for
unlabeled character devices.
@@ -86105,7 +86695,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3021">
+<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3057">
<summary>
Do not audit attempts to
write unlabeled character devices.
@@ -86116,7 +86706,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_chr_files" lineno="3039">
+<interface name="kernel_delete_unlabeled_chr_files" lineno="3075">
<summary>
Delete unlabeled character device nodes.
</summary>
@@ -86126,7 +86716,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_chr_files" lineno="3058">
+<interface name="kernel_manage_unlabeled_chr_files" lineno="3094">
<summary>
Create, read, write, and delete unlabeled character device nodes.
</summary>
@@ -86136,7 +86726,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3076">
+<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3112">
<summary>
Allow caller to relabel unlabeled directories.
</summary>
@@ -86146,7 +86736,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_files" lineno="3094">
+<interface name="kernel_relabelfrom_unlabeled_files" lineno="3130">
<summary>
Allow caller to relabel unlabeled files.
</summary>
@@ -86156,7 +86746,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3113">
+<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3149">
<summary>
Allow caller to relabel unlabeled symbolic links.
</summary>
@@ -86166,7 +86756,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3132">
+<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3168">
<summary>
Allow caller to relabel unlabeled named pipes.
</summary>
@@ -86176,7 +86766,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_pipes" lineno="3151">
+<interface name="kernel_delete_unlabeled_pipes" lineno="3187">
<summary>
Delete unlabeled named pipes
</summary>
@@ -86186,7 +86776,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3169">
+<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3205">
<summary>
Allow caller to relabel unlabeled named sockets.
</summary>
@@ -86196,7 +86786,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_sockets" lineno="3188">
+<interface name="kernel_delete_unlabeled_sockets" lineno="3224">
<summary>
Delete unlabeled named sockets.
</summary>
@@ -86206,7 +86796,27 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_sendrecv_unlabeled_association" lineno="3220">
+<interface name="kernel_relabelfrom_unlabeled_blk_devs" lineno="3242">
+<summary>
+Allow caller to relabel from unlabeled block devices.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kernel_relabelfrom_unlabeled_chr_devs" lineno="3260">
+<summary>
+Allow caller to relabel from unlabeled character devices.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="kernel_sendrecv_unlabeled_association" lineno="3293">
<summary>
Send and receive messages from an
unlabeled IPSEC association.
@@ -86217,7 +86827,7 @@ Send and receive messages from an
unlabeled IPSEC association. Network
connections that are not protected
by IPSEC have use an unlabeled
-assocation.
+association.
</p>
<p>
The corenetwork interface
@@ -86231,7 +86841,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3253">
+<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3326">
<summary>
Do not audit attempts to send and receive messages
from an unlabeled IPSEC association.
@@ -86242,7 +86852,7 @@ Do not audit attempts to send and receive messages
from an unlabeled IPSEC association. Network
connections that are not protected
by IPSEC have use an unlabeled
-assocation.
+association.
</p>
<p>
The corenetwork interface
@@ -86256,7 +86866,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3280">
+<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3353">
<summary>
Receive TCP packets from an unlabeled connection.
</summary>
@@ -86275,7 +86885,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3309">
+<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3382">
<summary>
Do not audit attempts to receive TCP packets from an unlabeled
connection.
@@ -86296,7 +86906,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_udp_recvfrom_unlabeled" lineno="3336">
+<interface name="kernel_udp_recvfrom_unlabeled" lineno="3409">
<summary>
Receive UDP packets from an unlabeled connection.
</summary>
@@ -86315,7 +86925,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3365">
+<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3438">
<summary>
Do not audit attempts to receive UDP packets from an unlabeled
connection.
@@ -86336,7 +86946,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_raw_recvfrom_unlabeled" lineno="3392">
+<interface name="kernel_raw_recvfrom_unlabeled" lineno="3465">
<summary>
Receive Raw IP packets from an unlabeled connection.
</summary>
@@ -86355,7 +86965,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3421">
+<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3494">
<summary>
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
@@ -86376,7 +86986,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_sendrecv_unlabeled_packets" lineno="3451">
+<interface name="kernel_sendrecv_unlabeled_packets" lineno="3524">
<summary>
Send and receive unlabeled packets.
</summary>
@@ -86398,7 +87008,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_recvfrom_unlabeled_peer" lineno="3479">
+<interface name="kernel_recvfrom_unlabeled_peer" lineno="3552">
<summary>
Receive packets from an unlabeled peer.
</summary>
@@ -86418,7 +87028,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3507">
+<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3580">
<summary>
Do not audit attempts to receive packets from an unlabeled peer.
</summary>
@@ -86438,7 +87048,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_database" lineno="3525">
+<interface name="kernel_relabelfrom_unlabeled_database" lineno="3598">
<summary>
Relabel from unlabeled database objects.
</summary>
@@ -86448,7 +87058,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_unconfined" lineno="3562">
+<interface name="kernel_unconfined" lineno="3635">
<summary>
Unconfined access to kernel module resources.
</summary>
@@ -86458,7 +87068,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_vm_overcommit_sysctl" lineno="3582">
+<interface name="kernel_read_vm_overcommit_sysctl" lineno="3655">
<summary>
Read virtual memory overcommit sysctl.
</summary>
@@ -86469,7 +87079,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3602">
+<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3675">
<summary>
Read and write virtual memory overcommit sysctl.
</summary>
@@ -86480,7 +87090,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3621">
+<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3694">
<summary>
Access unlabeled infiniband pkeys.
</summary>
@@ -86490,7 +87100,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3639">
+<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3712">
<summary>
Manage subnet on unlabeled Infiniband endports.
</summary>
@@ -87112,7 +87722,7 @@ Domain allowed access.
<interface name="mls_fd_share_all_levels" lineno="841">
<summary>
Make the file descriptors from the
-specifed domain inheritable by
+specified domain inheritable by
all levels.
</summary>
<param name="domain">
@@ -87122,19 +87732,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mls_context_translate_all_levels" lineno="861">
-<summary>
-Make specified domain MLS trusted
-for translating contexts at all levels. (Deprecated)
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="mls_db_read_all_levels" lineno="877">
+<interface name="mls_db_read_all_levels" lineno="861">
<summary>
Make specified domain MLS trusted
for reading from databases at any level.
@@ -87146,7 +87744,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mls_db_write_all_levels" lineno="897">
+<interface name="mls_db_write_all_levels" lineno="881">
<summary>
Make specified domain MLS trusted
for writing to databases at any level.
@@ -87158,7 +87756,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mls_db_upgrade" lineno="917">
+<interface name="mls_db_upgrade" lineno="901">
<summary>
Make specified domain MLS trusted
for raising the level of databases.
@@ -87170,7 +87768,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mls_db_downgrade" lineno="937">
+<interface name="mls_db_downgrade" lineno="921">
<summary>
Make specified domain MLS trusted
for lowering the level of databases.
@@ -87182,7 +87780,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mls_dbus_send_all_levels" lineno="957">
+<interface name="mls_dbus_send_all_levels" lineno="941">
<summary>
Make specified domain MLS trusted
for sending dbus messages to
@@ -87195,7 +87793,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mls_dbus_recv_all_levels" lineno="978">
+<interface name="mls_dbus_recv_all_levels" lineno="962">
<summary>
Make specified domain MLS trusted
for receiving dbus messages from
@@ -87455,7 +88053,19 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="selinux_set_parameters" lineno="469">
+<interface name="selinux_get_all_booleans" lineno="459">
+<summary>
+Allow caller to get the state of all Booleans to
+view conditional portions of the policy.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="selinux_set_parameters" lineno="493">
<summary>
Allow caller to set SELinux access vector cache parameters.
</summary>
@@ -87477,7 +88087,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="selinux_validate_context" lineno="488">
+<interface name="selinux_validate_context" lineno="512">
<summary>
Allows caller to validate security contexts.
</summary>
@@ -87488,7 +88098,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="selinux_dontaudit_validate_context" lineno="510">
+<interface name="selinux_dontaudit_validate_context" lineno="534">
<summary>
Do not audit attempts to validate security contexts.
</summary>
@@ -87499,7 +88109,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="selinux_compute_access_vector" lineno="531">
+<interface name="selinux_compute_access_vector" lineno="555">
<summary>
Allows caller to compute an access vector.
</summary>
@@ -87510,7 +88120,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="selinux_compute_create_context" lineno="554">
+<interface name="selinux_compute_create_context" lineno="578">
<summary>
Calculate the default type for object creation.
</summary>
@@ -87521,7 +88131,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="selinux_compute_member" lineno="576">
+<interface name="selinux_compute_member" lineno="600">
<summary>
Allows caller to compute polyinstatntiated
directory members.
@@ -87532,7 +88142,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="selinux_compute_relabel_context" lineno="606">
+<interface name="selinux_compute_relabel_context" lineno="630">
<summary>
Calculate the context for relabeling objects.
</summary>
@@ -87551,7 +88161,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="selinux_compute_user_contexts" lineno="627">
+<interface name="selinux_compute_user_contexts" lineno="651">
<summary>
Allows caller to compute possible contexts for a user.
</summary>
@@ -87561,9 +88171,20 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="selinux_map_security_files" lineno="649">
+<interface name="selinux_use_status_page" lineno="673">
+<summary>
+Allows the caller to use the SELinux status page.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="selinux_map_security_files" lineno="694">
<summary>
-Allows caller to map secuirty_t files.
+Allows caller to map secuirty_t files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -87571,7 +88192,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="selinux_unconfined" lineno="668">
+<interface name="selinux_unconfined" lineno="715">
<summary>
Unconfined access to the SELinux kernel security server.
</summary>
@@ -87794,7 +88415,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_getattr_fuse_dev" lineno="378">
+<interface name="storage_watch_fixed_disk" lineno="377">
+<summary>
+Watch fixed disk device nodes.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="storage_getattr_fuse_dev" lineno="398">
<summary>
Allow the caller to get the attributes
of device nodes of fuse devices.
@@ -87805,7 +88436,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_rw_fuse" lineno="397">
+<interface name="storage_rw_fuse" lineno="417">
<summary>
read or write fuse device interfaces.
</summary>
@@ -87815,7 +88446,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_rw_fuse" lineno="416">
+<interface name="storage_dontaudit_rw_fuse" lineno="436">
<summary>
Do not audit attempts to read or write
fuse device interfaces.
@@ -87826,7 +88457,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_getattr_scsi_generic_dev" lineno="435">
+<interface name="storage_getattr_scsi_generic_dev" lineno="455">
<summary>
Allow the caller to get the attributes of
the generic SCSI interface device nodes.
@@ -87837,7 +88468,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_setattr_scsi_generic_dev" lineno="455">
+<interface name="storage_setattr_scsi_generic_dev" lineno="475">
<summary>
Allow the caller to set the attributes of
the generic SCSI interface device nodes.
@@ -87848,7 +88479,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_read_scsi_generic" lineno="478">
+<interface name="storage_read_scsi_generic" lineno="498">
<summary>
Allow the caller to directly read, in a
generic fashion, from any SCSI device.
@@ -87862,7 +88493,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_write_scsi_generic" lineno="503">
+<interface name="storage_write_scsi_generic" lineno="523">
<summary>
Allow the caller to directly write, in a
generic fashion, from any SCSI device.
@@ -87876,10 +88507,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_setattr_scsi_generic_dev_dev" lineno="525">
+<interface name="storage_setattr_scsi_generic_dev_dev" lineno="545">
<summary>
Set attributes of the device nodes
-for the SCSI generic inerface.
+for the SCSI generic interface.
</summary>
<param name="domain">
<summary>
@@ -87887,7 +88518,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_rw_scsi_generic" lineno="545">
+<interface name="storage_dontaudit_rw_scsi_generic" lineno="565">
<summary>
Do not audit attempts to read or write
SCSI generic device interfaces.
@@ -87898,7 +88529,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_getattr_removable_dev" lineno="564">
+<interface name="storage_getattr_removable_dev" lineno="584">
<summary>
Allow the caller to get the attributes of removable
devices device nodes.
@@ -87909,7 +88540,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_getattr_removable_dev" lineno="584">
+<interface name="storage_dontaudit_getattr_removable_dev" lineno="604">
<summary>
Do not audit attempts made by the caller to get
the attributes of removable devices device nodes.
@@ -87920,7 +88551,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_read_removable_device" lineno="603">
+<interface name="storage_dontaudit_read_removable_device" lineno="623">
<summary>
Do not audit attempts made by the caller to read
removable devices device nodes.
@@ -87931,7 +88562,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_write_removable_device" lineno="623">
+<interface name="storage_dontaudit_write_removable_device" lineno="643">
<summary>
Do not audit attempts made by the caller to write
removable devices device nodes.
@@ -87942,7 +88573,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_setattr_removable_dev" lineno="642">
+<interface name="storage_setattr_removable_dev" lineno="662">
<summary>
Allow the caller to set the attributes of removable
devices device nodes.
@@ -87953,7 +88584,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_setattr_removable_dev" lineno="662">
+<interface name="storage_dontaudit_setattr_removable_dev" lineno="682">
<summary>
Do not audit attempts made by the caller to set
the attributes of removable devices device nodes.
@@ -87964,7 +88595,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_raw_read_removable_device" lineno="684">
+<interface name="storage_raw_read_removable_device" lineno="704">
<summary>
Allow the caller to directly read from
a removable device.
@@ -87978,7 +88609,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_raw_read_removable_device" lineno="703">
+<interface name="storage_dontaudit_raw_read_removable_device" lineno="723">
<summary>
Do not audit attempts to directly read removable devices.
</summary>
@@ -87988,7 +88619,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_raw_write_removable_device" lineno="725">
+<interface name="storage_raw_write_removable_device" lineno="745">
<summary>
Allow the caller to directly write to
a removable device.
@@ -88002,7 +88633,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_raw_write_removable_device" lineno="744">
+<interface name="storage_dontaudit_raw_write_removable_device" lineno="764">
<summary>
Do not audit attempts to directly write removable devices.
</summary>
@@ -88012,7 +88643,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_read_tape" lineno="763">
+<interface name="storage_read_tape" lineno="783">
<summary>
Allow the caller to directly read
a tape device.
@@ -88023,7 +88654,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_write_tape" lineno="783">
+<interface name="storage_write_tape" lineno="803">
<summary>
Allow the caller to directly write
a tape device.
@@ -88034,7 +88665,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_getattr_tape_dev" lineno="803">
+<interface name="storage_getattr_tape_dev" lineno="823">
<summary>
Allow the caller to get the attributes
of device nodes of tape devices.
@@ -88045,7 +88676,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_setattr_tape_dev" lineno="823">
+<interface name="storage_setattr_tape_dev" lineno="843">
<summary>
Allow the caller to set the attributes
of device nodes of tape devices.
@@ -88056,7 +88687,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_unconfined" lineno="842">
+<interface name="storage_unconfined" lineno="862">
<summary>
Unconfined access to storage devices.
</summary>
@@ -88156,7 +88787,7 @@ The type of the process creating the directory.
</summary>
</param>
</interface>
-<interface name="term_create_pty" lineno="184">
+<interface name="term_create_pty" lineno="185">
<summary>
Create a pty in the /dev/pts directory.
</summary>
@@ -88171,7 +88802,7 @@ The type of the pty.
</summary>
</param>
</interface>
-<interface name="term_write_all_terms" lineno="210">
+<interface name="term_write_all_terms" lineno="211">
<summary>
Write the console, all
ttys and all ptys.
@@ -88183,7 +88814,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_use_all_terms" lineno="233">
+<interface name="term_use_all_terms" lineno="234">
<summary>
Read and write the console, all
ttys and all ptys.
@@ -88195,7 +88826,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_write_console" lineno="255">
+<interface name="term_write_console" lineno="256">
<summary>
Write to the console.
</summary>
@@ -88206,7 +88837,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_read_console" lineno="275">
+<interface name="term_read_console" lineno="276">
<summary>
Read from the console.
</summary>
@@ -88217,7 +88848,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_read_console" lineno="295">
+<interface name="term_dontaudit_read_console" lineno="296">
<summary>
Do not audit attempts to read from the console.
</summary>
@@ -88228,7 +88859,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="term_use_console" lineno="314">
+<interface name="term_use_console" lineno="315">
<summary>
Read from and write to the console.
</summary>
@@ -88239,9 +88870,9 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_use_console" lineno="334">
+<interface name="term_dontaudit_use_console" lineno="335">
<summary>
-Do not audit attemtps to read from
+Do not audit attempts to read from
or write to the console.
</summary>
<param name="domain">
@@ -88250,7 +88881,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_setattr_console" lineno="354">
+<interface name="term_setattr_console" lineno="355">
<summary>
Set the attributes of the console
device node.
@@ -88262,7 +88893,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_relabel_console" lineno="373">
+<interface name="term_relabel_console" lineno="374">
<summary>
Relabel from and to the console type.
</summary>
@@ -88272,7 +88903,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_create_console_dev" lineno="392">
+<interface name="term_create_console_dev" lineno="393">
<summary>
Create the console device (/dev/console).
</summary>
@@ -88282,7 +88913,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_getattr_pty_fs" lineno="412">
+<interface name="term_getattr_pty_fs" lineno="413">
<summary>
Get the attributes of a pty filesystem
</summary>
@@ -88292,7 +88923,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_relabel_pty_fs" lineno="430">
+<interface name="term_relabel_pty_fs" lineno="431">
<summary>
Relabel from and to pty filesystem.
</summary>
@@ -88302,7 +88933,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_getattr_pty_dirs" lineno="450">
+<interface name="term_getattr_pty_dirs" lineno="451">
<summary>
Get the attributes of the
/dev/pts directory.
@@ -88313,7 +88944,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_getattr_pty_dirs" lineno="469">
+<interface name="term_dontaudit_getattr_pty_dirs" lineno="470">
<summary>
Do not audit attempts to get the
attributes of the /dev/pts directory.
@@ -88324,7 +88955,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_search_ptys" lineno="487">
+<interface name="term_search_ptys" lineno="488">
<summary>
Search the contents of the /dev/pts directory.
</summary>
@@ -88334,7 +88965,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_search_ptys" lineno="507">
+<interface name="term_dontaudit_search_ptys" lineno="508">
<summary>
Do not audit attempts to search the
contents of the /dev/pts directory.
@@ -88345,7 +88976,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_list_ptys" lineno="527">
+<interface name="term_list_ptys" lineno="528">
<summary>
Read the /dev/pts directory to
list all ptys.
@@ -88356,7 +88987,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_list_ptys" lineno="547">
+<interface name="term_dontaudit_list_ptys" lineno="548">
<summary>
Do not audit attempts to read the
/dev/pts directory.
@@ -88367,7 +88998,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_manage_pty_dirs" lineno="566">
+<interface name="term_dontaudit_manage_pty_dirs" lineno="567">
<summary>
Do not audit attempts to create, read,
write, or delete the /dev/pts directory.
@@ -88378,7 +89009,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_relabel_pty_dirs" lineno="584">
+<interface name="term_relabel_pty_dirs" lineno="585">
<summary>
Relabel from and to pty directories.
</summary>
@@ -88388,7 +89019,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_getattr_generic_ptys" lineno="603">
+<interface name="term_getattr_generic_ptys" lineno="604">
<summary>
Get the attributes of generic pty devices.
</summary>
@@ -88398,7 +89029,7 @@ Domain to allow
</summary>
</param>
</interface>
-<interface name="term_dontaudit_getattr_generic_ptys" lineno="622">
+<interface name="term_dontaudit_getattr_generic_ptys" lineno="623">
<summary>
Do not audit attempts to get the attributes
of generic pty devices.
@@ -88409,7 +89040,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_ioctl_generic_ptys" lineno="640">
+<interface name="term_ioctl_generic_ptys" lineno="641">
<summary>
ioctl of generic pty devices.
</summary>
@@ -88430,7 +89061,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_setattr_generic_ptys" lineno="682">
+<interface name="term_dontaudit_setattr_generic_ptys" lineno="681">
<summary>
Dontaudit setting the attributes of
generic pty devices.
@@ -88441,7 +89072,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_use_generic_ptys" lineno="702">
+<interface name="term_use_generic_ptys" lineno="701">
<summary>
Read and write the generic pty
type. This is generally only used in
@@ -88453,7 +89084,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_use_generic_ptys" lineno="724">
+<interface name="term_dontaudit_use_generic_ptys" lineno="723">
<summary>
Dot not audit attempts to read and
write the generic pty type. This is
@@ -88465,7 +89096,17 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_setattr_controlling_term" lineno="742">
+<interface name="term_create_controlling_term" lineno="741">
+<summary>
+Create the tty device.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="term_setattr_controlling_term" lineno="762">
<summary>
Set the attributes of the tty device
</summary>
@@ -88475,7 +89116,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_use_controlling_term" lineno="762">
+<interface name="term_use_controlling_term" lineno="782">
<summary>
Read and write the controlling
terminal (/dev/tty).
@@ -88486,7 +89127,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_getattr_ptmx" lineno="781">
+<interface name="term_create_ptmx" lineno="801">
+<summary>
+Create the pty multiplexor (/dev/ptmx).
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="term_getattr_ptmx" lineno="821">
<summary>
Get the attributes of the pty multiplexor (/dev/ptmx).
</summary>
@@ -88496,7 +89147,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_getattr_ptmx" lineno="800">
+<interface name="term_dontaudit_getattr_ptmx" lineno="840">
<summary>
Do not audit attempts to get attributes
on the pty multiplexor (/dev/ptmx).
@@ -88507,7 +89158,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_use_ptmx" lineno="818">
+<interface name="term_use_ptmx" lineno="858">
<summary>
Read and write the pty multiplexor (/dev/ptmx).
</summary>
@@ -88517,7 +89168,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_use_ptmx" lineno="838">
+<interface name="term_dontaudit_use_ptmx" lineno="878">
<summary>
Do not audit attempts to read and
write the pty multiplexor (/dev/ptmx).
@@ -88528,7 +89179,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_getattr_all_ptys" lineno="858">
+<interface name="term_getattr_all_ptys" lineno="898">
<summary>
Get the attributes of all
pty device nodes.
@@ -88540,7 +89191,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_getattr_all_ptys" lineno="881">
+<interface name="term_dontaudit_getattr_all_ptys" lineno="921">
<summary>
Do not audit attempts to get the
attributes of any pty
@@ -88552,7 +89203,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_setattr_all_ptys" lineno="901">
+<interface name="term_setattr_all_ptys" lineno="941">
<summary>
Set the attributes of all
pty device nodes.
@@ -88564,7 +89215,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_relabelto_all_ptys" lineno="922">
+<interface name="term_relabelto_all_ptys" lineno="962">
<summary>
Relabel to all ptys.
</summary>
@@ -88574,7 +89225,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_write_all_ptys" lineno="940">
+<interface name="term_write_all_ptys" lineno="980">
<summary>
Write to all ptys.
</summary>
@@ -88584,7 +89235,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_use_all_ptys" lineno="960">
+<interface name="term_use_all_ptys" lineno="1000">
<summary>
Read and write all ptys.
</summary>
@@ -88595,7 +89246,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_use_all_ptys" lineno="981">
+<interface name="term_dontaudit_use_all_ptys" lineno="1021">
<summary>
Do not audit attempts to read or write any ptys.
</summary>
@@ -88605,7 +89256,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_relabel_all_ptys" lineno="999">
+<interface name="term_relabel_all_ptys" lineno="1039">
<summary>
Relabel from and to all pty device nodes.
</summary>
@@ -88615,7 +89266,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_getattr_unallocated_ttys" lineno="1021">
+<interface name="term_getattr_unallocated_ttys" lineno="1061">
<summary>
Get the attributes of all unallocated
tty device nodes.
@@ -88627,7 +89278,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_setattr_unlink_unallocated_ttys" lineno="1041">
+<interface name="term_setattr_unlink_unallocated_ttys" lineno="1081">
<summary>
Setattr and unlink unallocated tty device nodes.
</summary>
@@ -88638,7 +89289,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_getattr_unallocated_ttys" lineno="1061">
+<interface name="term_dontaudit_getattr_unallocated_ttys" lineno="1101">
<summary>
Do not audit attempts to get the attributes
of all unallocated tty device nodes.
@@ -88649,7 +89300,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_setattr_unallocated_ttys" lineno="1081">
+<interface name="term_setattr_unallocated_ttys" lineno="1121">
<summary>
Set the attributes of all unallocated
tty device nodes.
@@ -88661,7 +89312,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_setattr_unallocated_ttys" lineno="1101">
+<interface name="term_dontaudit_setattr_unallocated_ttys" lineno="1141">
<summary>
Do not audit attempts to set the attributes
of unallocated tty device nodes.
@@ -88672,7 +89323,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_ioctl_unallocated_ttys" lineno="1120">
+<interface name="term_dontaudit_ioctl_unallocated_ttys" lineno="1160">
<summary>
Do not audit attempts to ioctl
unallocated tty device nodes.
@@ -88683,7 +89334,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_relabel_unallocated_ttys" lineno="1139">
+<interface name="term_relabel_unallocated_ttys" lineno="1179">
<summary>
Relabel from and to the unallocated
tty type.
@@ -88694,7 +89345,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_reset_tty_labels" lineno="1159">
+<interface name="term_reset_tty_labels" lineno="1199">
<summary>
Relabel from all user tty types to
the unallocated tty type.
@@ -88705,7 +89356,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_append_unallocated_ttys" lineno="1180">
+<interface name="term_append_unallocated_ttys" lineno="1220">
<summary>
Append to unallocated ttys.
</summary>
@@ -88715,7 +89366,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_write_unallocated_ttys" lineno="1199">
+<interface name="term_write_unallocated_ttys" lineno="1239">
<summary>
Write to unallocated ttys.
</summary>
@@ -88725,7 +89376,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_use_unallocated_ttys" lineno="1219">
+<interface name="term_use_unallocated_ttys" lineno="1259">
<summary>
Read and write unallocated ttys.
</summary>
@@ -88736,7 +89387,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_use_unallocated_ttys" lineno="1239">
+<interface name="term_dontaudit_use_unallocated_ttys" lineno="1279">
<summary>
Do not audit attempts to read or
write unallocated ttys.
@@ -88747,7 +89398,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_getattr_all_ttys" lineno="1258">
+<interface name="term_getattr_all_ttys" lineno="1298">
<summary>
Get the attributes of all tty device nodes.
</summary>
@@ -88758,7 +89409,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_getattr_all_ttys" lineno="1278">
+<interface name="term_dontaudit_getattr_all_ttys" lineno="1318">
<summary>
Do not audit attempts to get the
attributes of any tty device nodes.
@@ -88769,7 +89420,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_setattr_all_ttys" lineno="1298">
+<interface name="term_setattr_all_ttys" lineno="1338">
<summary>
Set the attributes of all tty device nodes.
</summary>
@@ -88780,7 +89431,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_relabel_all_ttys" lineno="1317">
+<interface name="term_relabel_all_ttys" lineno="1357">
<summary>
Relabel from and to all tty device nodes.
</summary>
@@ -88790,7 +89441,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_write_all_ttys" lineno="1336">
+<interface name="term_write_all_ttys" lineno="1376">
<summary>
Write to all ttys.
</summary>
@@ -88800,7 +89451,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_use_all_ttys" lineno="1356">
+<interface name="term_use_all_ttys" lineno="1396">
<summary>
Read and write all ttys.
</summary>
@@ -88811,7 +89462,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_use_all_ttys" lineno="1376">
+<interface name="term_dontaudit_use_all_ttys" lineno="1416">
<summary>
Do not audit attempts to read or write
any ttys.
@@ -88822,7 +89473,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_use_virtio_console" lineno="1394">
+<interface name="term_use_virtio_console" lineno="1434">
<summary>
Read from and write virtio console.
</summary>
@@ -89044,7 +89695,7 @@ generic user files.
</tunable>
</module>
<module name="guest" filename="policy/modules/roles/guest.if">
-<summary>Least privledge terminal user role.</summary>
+<summary>Least privilege terminal user role.</summary>
<interface name="guest_role_change" lineno="14">
<summary>
Change to the guest role.
@@ -89189,7 +89840,7 @@ Role allowed access.
</module>
<module name="sysadm" filename="policy/modules/roles/sysadm.if">
<summary>General system administration role</summary>
-<interface name="sysadm_role_change" lineno="14">
+<interface name="sysadm_role_change" lineno="19">
<summary>
Change to the system administrator role.
</summary>
@@ -89198,9 +89849,14 @@ Change to the system administrator role.
Role allowed access.
</summary>
</param>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
<rolecap/>
</interface>
-<interface name="sysadm_role_change_to" lineno="44">
+<interface name="sysadm_role_change_to" lineno="54">
<summary>
Change from the system administrator role.
</summary>
@@ -89222,7 +89878,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysadm_shell_domtrans" lineno="62">
+<interface name="sysadm_shell_domtrans" lineno="72">
<summary>
Execute a shell in the sysadm domain.
</summary>
@@ -89232,7 +89888,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysadm_bin_spec_domtrans" lineno="83">
+<interface name="sysadm_bin_spec_domtrans" lineno="93">
<summary>
Execute a generic bin program in the sysadm domain.
</summary>
@@ -89242,7 +89898,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysadm_entry_spec_domtrans" lineno="106">
+<interface name="sysadm_entry_spec_domtrans" lineno="116">
<summary>
Execute all entrypoint files in the sysadm domain. This
is an explicit transition, requiring the
@@ -89254,7 +89910,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysadm_entry_spec_domtrans_to" lineno="141">
+<interface name="sysadm_entry_spec_domtrans_to" lineno="151">
<summary>
Allow sysadm to execute all entrypoint files in
a specified domain. This is an explicit transition,
@@ -89278,7 +89934,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysadm_bin_spec_domtrans_to" lineno="175">
+<interface name="sysadm_bin_spec_domtrans_to" lineno="185">
<summary>
Allow sysadm to execute a generic bin program in
a specified domain. This is an explicit transition,
@@ -89301,7 +89957,7 @@ Domain to execute in.
</summary>
</param>
</interface>
-<interface name="sysadm_sigchld" lineno="196">
+<interface name="sysadm_sigchld" lineno="206">
<summary>
Send a SIGCHLD signal to sysadm users.
</summary>
@@ -89311,7 +89967,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysadm_use_fds" lineno="214">
+<interface name="sysadm_use_fds" lineno="224">
<summary>
Inherit and use sysadm file descriptors
</summary>
@@ -89321,7 +89977,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysadm_rw_pipes" lineno="232">
+<interface name="sysadm_rw_pipes" lineno="242">
<summary>
Read and write sysadm user unnamed pipes.
</summary>
@@ -89338,6 +89994,14 @@ Allow sysadm to debug or ptrace all processes.
</p>
</desc>
</tunable>
+<tunable name="sysadm_allow_rw_inherited_fifo" dftval="false">
+<desc>
+<p>
+Allow sysadm to read/write to fifo files inherited from
+a domain allowed to change role.
+</p>
+</desc>
+</tunable>
</module>
<module name="unprivuser" filename="policy/modules/roles/unprivuser.if">
<summary>Generic unprivileged user role</summary>
@@ -89428,7 +90092,7 @@ read generic user files.
</tunable>
</module>
<module name="xguest" filename="policy/modules/roles/xguest.if">
-<summary>Least privledge xwindows user role.</summary>
+<summary>Least privilege xwindows user role.</summary>
<interface name="xguest_role_change" lineno="14">
<summary>
Change to the xguest role.
@@ -89618,7 +90282,18 @@ Domain allowed access.
</interface>
<interface name="abrt_read_pid_files" lineno="234">
<summary>
-Read abrt PID files.
+Read abrt PID files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="abrt_manage_pid_files" lineno="249">
+<summary>
+Create, read, write, and delete
+abrt PID files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -89626,10 +90301,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="abrt_manage_pid_files" lineno="254">
+<interface name="abrt_manage_runtime_files" lineno="265">
<summary>
Create, read, write, and delete
-abrt PID files.
+abrt runtime files.
</summary>
<param name="domain">
<summary>
@@ -89637,7 +90312,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="abrt_admin" lineno="280">
+<interface name="abrt_admin" lineno="291">
<summary>
All of the rules required to
administrate an abrt environment,
@@ -89950,7 +90625,7 @@ Domain allowed to transition.
</interface>
<interface name="aiccu_read_pid_files" lineno="50">
<summary>
-Read aiccu PID files.
+Read aiccu PID files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -89958,7 +90633,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="aiccu_admin" lineno="76">
+<interface name="aiccu_admin" lineno="71">
<summary>
All of the rules required to
administrate an aiccu environment.
@@ -90129,7 +90804,27 @@ Domain allowed access.
</interface>
<interface name="amavis_setattr_pid_files" lineno="184">
<summary>
-Set attributes of amavis pid files.
+Set attributes of amavis pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="amavis_create_pid_files" lineno="199">
+<summary>
+Create amavis pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="amavis_setattr_runtime_files" lineno="214">
+<summary>
+Set attributes of amavis runtime files.
</summary>
<param name="domain">
<summary>
@@ -90137,9 +90832,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="amavis_create_pid_files" lineno="203">
+<interface name="amavis_create_runtime_files" lineno="233">
<summary>
-Create amavis pid files.
+Create amavis runtime files.
</summary>
<param name="domain">
<summary>
@@ -90147,7 +90842,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="amavis_admin" lineno="230">
+<interface name="amavis_admin" lineno="259">
<summary>
All of the rules required to
administrate an amavis environment.
@@ -90186,7 +90881,7 @@ The prefix to be used for deriving type names.
</summary>
</param>
</template>
-<interface name="apache_role" lineno="118">
+<interface name="apache_role" lineno="120">
<summary>
Role access for apache.
</summary>
@@ -90201,7 +90896,7 @@ User domain for the role.
</summary>
</param>
</interface>
-<interface name="apache_read_user_scripts" lineno="173">
+<interface name="apache_read_user_scripts" lineno="175">
<summary>
Read user httpd script executable files.
</summary>
@@ -90211,7 +90906,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_user_content" lineno="193">
+<interface name="apache_read_user_content" lineno="195">
<summary>
Read user httpd content.
</summary>
@@ -90221,7 +90916,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_domtrans" lineno="213">
+<interface name="apache_domtrans" lineno="215">
<summary>
Execute httpd with a domain transition.
</summary>
@@ -90231,7 +90926,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apache_initrc_domtrans" lineno="232">
+<interface name="apache_initrc_domtrans" lineno="234">
<summary>
Execute httpd server in the httpd domain.
</summary>
@@ -90241,7 +90936,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apache_signal" lineno="250">
+<interface name="apache_signal" lineno="252">
<summary>
Send generic signals to httpd.
</summary>
@@ -90251,7 +90946,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_signull" lineno="268">
+<interface name="apache_signull" lineno="270">
<summary>
Send null signals to httpd.
</summary>
@@ -90261,7 +90956,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_sigchld" lineno="286">
+<interface name="apache_sigchld" lineno="288">
<summary>
Send child terminated signals to httpd.
</summary>
@@ -90271,7 +90966,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_use_fds" lineno="305">
+<interface name="apache_use_fds" lineno="307">
<summary>
Inherit and use file descriptors
from httpd.
@@ -90282,7 +90977,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_rw_fifo_file" lineno="324">
+<interface name="apache_dontaudit_rw_fifo_file" lineno="326">
<summary>
Do not audit attempts to read and
write httpd unnamed pipes.
@@ -90293,7 +90988,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_rw_stream_sockets" lineno="343">
+<interface name="apache_dontaudit_rw_stream_sockets" lineno="345">
<summary>
Do not audit attempts to read and
write httpd unix domain stream sockets.
@@ -90304,7 +90999,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_rw_stream_sockets" lineno="362">
+<interface name="apache_rw_stream_sockets" lineno="364">
<summary>
Read and write httpd unix domain
stream sockets.
@@ -90315,7 +91010,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_rw_tcp_sockets" lineno="381">
+<interface name="apache_dontaudit_rw_tcp_sockets" lineno="383">
<summary>
Do not audit attempts to read and
write httpd TCP sockets.
@@ -90326,7 +91021,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_reload" lineno="399">
+<interface name="apache_reload" lineno="401">
<summary>
Reload the httpd service (systemd).
</summary>
@@ -90336,7 +91031,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_all_ra_content" lineno="418">
+<interface name="apache_read_all_ra_content" lineno="420">
<summary>
Read all appendable content
</summary>
@@ -90346,7 +91041,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_append_all_ra_content" lineno="437">
+<interface name="apache_append_all_ra_content" lineno="439">
<summary>
Append to all appendable web content
</summary>
@@ -90356,7 +91051,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_all_rw_content" lineno="455">
+<interface name="apache_read_all_rw_content" lineno="457">
<summary>
Read all read/write content
</summary>
@@ -90366,7 +91061,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_manage_all_rw_content" lineno="474">
+<interface name="apache_manage_all_rw_content" lineno="476">
<summary>
Manage all read/write content
</summary>
@@ -90376,7 +91071,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_all_content" lineno="493">
+<interface name="apache_read_all_content" lineno="495">
<summary>
Read all web content.
</summary>
@@ -90386,7 +91081,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_search_all_content" lineno="515">
+<interface name="apache_search_all_content" lineno="517">
<summary>
Search all apache content.
</summary>
@@ -90396,7 +91091,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_manage_all_content" lineno="535">
+<interface name="apache_list_all_content" lineno="535">
+<summary>
+List all apache content.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="apache_manage_all_content" lineno="555">
<summary>
Create, read, write, and delete
all httpd content.
@@ -90408,7 +91113,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_setattr_cache_dirs" lineno="559">
+<interface name="apache_setattr_cache_dirs" lineno="579">
<summary>
Set attributes httpd cache directories.
</summary>
@@ -90418,7 +91123,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_list_cache" lineno="577">
+<interface name="apache_list_cache" lineno="597">
<summary>
List httpd cache directories.
</summary>
@@ -90428,7 +91133,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_rw_cache_files" lineno="595">
+<interface name="apache_rw_cache_files" lineno="615">
<summary>
Read and write httpd cache files.
</summary>
@@ -90438,7 +91143,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_delete_cache_dirs" lineno="613">
+<interface name="apache_delete_cache_dirs" lineno="633">
<summary>
Delete httpd cache directories.
</summary>
@@ -90448,7 +91153,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_delete_cache_files" lineno="631">
+<interface name="apache_delete_cache_files" lineno="651">
<summary>
Delete httpd cache files.
</summary>
@@ -90458,7 +91163,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_config" lineno="650">
+<interface name="apache_read_config" lineno="670">
<summary>
Read httpd configuration files.
</summary>
@@ -90469,7 +91174,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_search_config" lineno="671">
+<interface name="apache_search_config" lineno="691">
<summary>
Search httpd configuration directories.
</summary>
@@ -90479,7 +91184,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_manage_config" lineno="691">
+<interface name="apache_manage_config" lineno="711">
<summary>
Create, read, write, and delete
httpd configuration files.
@@ -90490,7 +91195,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_domtrans_helper" lineno="713">
+<interface name="apache_domtrans_helper" lineno="733">
<summary>
Execute the Apache helper program
with a domain transition.
@@ -90501,7 +91206,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_run_helper" lineno="740">
+<interface name="apache_run_helper" lineno="760">
<summary>
Execute the Apache helper program with
a domain transition, and allow the
@@ -90519,7 +91224,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_read_log" lineno="760">
+<interface name="apache_read_log" lineno="780">
<summary>
Read httpd log files.
</summary>
@@ -90530,7 +91235,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_append_log" lineno="781">
+<interface name="apache_append_log" lineno="801">
<summary>
Append httpd log files.
</summary>
@@ -90540,7 +91245,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_append_log" lineno="802">
+<interface name="apache_dontaudit_append_log" lineno="822">
<summary>
Do not audit attempts to append
httpd log files.
@@ -90551,7 +91256,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_manage_log" lineno="821">
+<interface name="apache_manage_log" lineno="841">
<summary>
Create, read, write, and delete
httpd log files.
@@ -90562,7 +91267,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_write_log" lineno="842">
+<interface name="apache_write_log" lineno="862">
<summary>
Write apache log files.
</summary>
@@ -90572,7 +91277,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_search_modules" lineno="862">
+<interface name="apache_dontaudit_search_modules" lineno="882">
<summary>
Do not audit attempts to search
httpd module directories.
@@ -90583,7 +91288,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_list_modules" lineno="880">
+<interface name="apache_list_modules" lineno="900">
<summary>
List httpd module directories.
</summary>
@@ -90593,7 +91298,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_exec_modules" lineno="898">
+<interface name="apache_exec_modules" lineno="918">
<summary>
Execute httpd module files.
</summary>
@@ -90603,7 +91308,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_module_files" lineno="918">
+<interface name="apache_read_module_files" lineno="938">
<summary>
Read httpd module files.
</summary>
@@ -90613,7 +91318,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_domtrans_rotatelogs" lineno="938">
+<interface name="apache_domtrans_rotatelogs" lineno="958">
<summary>
Execute a domain transition to
run httpd_rotatelogs.
@@ -90624,7 +91329,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apache_list_sys_content" lineno="957">
+<interface name="apache_list_sys_content" lineno="977">
<summary>
List httpd system content directories.
</summary>
@@ -90634,7 +91339,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_manage_sys_content" lineno="978">
+<interface name="apache_manage_sys_content" lineno="998">
<summary>
Create, read, write, and delete
httpd system content files.
@@ -90646,7 +91351,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_manage_sys_rw_content" lineno="1000">
+<interface name="apache_manage_sys_rw_content" lineno="1020">
<summary>
Create, read, write, and delete
httpd system rw content.
@@ -90657,7 +91362,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_domtrans_sys_script" lineno="1022">
+<interface name="apache_domtrans_sys_script" lineno="1042">
<summary>
Execute all httpd scripts in the
system script domain.
@@ -90668,7 +91373,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1045">
+<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1065">
<summary>
Do not audit attempts to read and
write httpd system script unix
@@ -90680,7 +91385,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_domtrans_all_scripts" lineno="1064">
+<interface name="apache_domtrans_all_scripts" lineno="1084">
<summary>
Execute all user scripts in the user
script domain.
@@ -90691,7 +91396,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apache_run_all_scripts" lineno="1089">
+<interface name="apache_run_all_scripts" lineno="1109">
<summary>
Execute all user scripts in the user
script domain. Add user script domains
@@ -90708,7 +91413,7 @@ Role allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_squirrelmail_data" lineno="1108">
+<interface name="apache_read_squirrelmail_data" lineno="1128">
<summary>
Read httpd squirrelmail data files.
</summary>
@@ -90718,7 +91423,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_append_squirrelmail_data" lineno="1126">
+<interface name="apache_append_squirrelmail_data" lineno="1146">
<summary>
Append httpd squirrelmail data files.
</summary>
@@ -90728,7 +91433,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_search_sys_content" lineno="1144">
+<interface name="apache_delete_squirrelmail_spool" lineno="1164">
+<summary>
+delete httpd squirrelmail spool files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="apache_search_sys_content" lineno="1182">
<summary>
Search httpd system content.
</summary>
@@ -90738,7 +91453,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_sys_content" lineno="1163">
+<interface name="apache_read_sys_content" lineno="1201">
<summary>
Read httpd system content.
</summary>
@@ -90748,7 +91463,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_search_sys_scripts" lineno="1183">
+<interface name="apache_search_sys_scripts" lineno="1221">
<summary>
Search httpd system CGI directories.
</summary>
@@ -90758,7 +91473,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_manage_all_user_content" lineno="1203">
+<interface name="apache_manage_all_user_content" lineno="1241">
<summary>
Create, read, write, and delete all
user httpd content.
@@ -90770,7 +91485,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_search_sys_script_state" lineno="1224">
+<interface name="apache_search_sys_script_state" lineno="1262">
<summary>
Search system script state directories.
</summary>
@@ -90780,7 +91495,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_tmp_files" lineno="1242">
+<interface name="apache_read_tmp_files" lineno="1280">
<summary>
Read httpd tmp files.
</summary>
@@ -90790,7 +91505,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_write_tmp_files" lineno="1262">
+<interface name="apache_dontaudit_write_tmp_files" lineno="1300">
<summary>
Do not audit attempts to write
httpd tmp files.
@@ -90801,7 +91516,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_delete_lib_files" lineno="1280">
+<interface name="apache_delete_lib_files" lineno="1318">
<summary>
Delete httpd_var_lib_t files
</summary>
@@ -90811,7 +91526,7 @@ Domain that can delete the files
</summary>
</param>
</interface>
-<interface name="apache_cgi_domain" lineno="1311">
+<interface name="apache_cgi_domain" lineno="1349">
<summary>
Execute CGI in the specified domain.
</summary>
@@ -90833,7 +91548,7 @@ Type of the executable to enter the cgi domain.
</summary>
</param>
</interface>
-<interface name="apache_admin" lineno="1339">
+<interface name="apache_admin" lineno="1377">
<summary>
All of the rules required to
administrate an apache environment.
@@ -90954,7 +91669,7 @@ with avahi service via dbus.
<tunable name="httpd_enable_cgi" dftval="false">
<desc>
<p>
-Determine wether httpd can use support.
+Determine whether httpd can use support.
</p>
</desc>
</tunable>
@@ -91160,7 +91875,7 @@ Domain allowed to transition.
</interface>
<interface name="apcupsd_read_pid_files" lineno="52">
<summary>
-Read apcupsd PID files.
+Read apcupsd PID files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -91168,7 +91883,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apcupsd_read_log" lineno="72">
+<interface name="apcupsd_read_log" lineno="67">
<summary>
Read apcupsd log files.
</summary>
@@ -91179,7 +91894,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apcupsd_append_log" lineno="92">
+<interface name="apcupsd_append_log" lineno="87">
<summary>
Append apcupsd log files.
</summary>
@@ -91189,7 +91904,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apcupsd_cgi_script_domtrans" lineno="113">
+<interface name="apcupsd_cgi_script_domtrans" lineno="108">
<summary>
Execute a domain transition to
run httpd_apcupsd_cgi_script.
@@ -91200,7 +91915,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apcupsd_admin" lineno="143">
+<interface name="apcupsd_admin" lineno="138">
<summary>
All of the rules required to
administrate an apcupsd environment.
@@ -91228,6 +91943,46 @@ be labeled public_content_rw_t.
</desc>
</tunable>
</module>
+<module name="aptcacher" filename="policy/modules/services/aptcacher.if">
+<summary>apt-cacher, cache for Debian APT repositories.</summary>
+<interface name="aptcacher_domtrans_acngtool" lineno="13">
+<summary>
+Execute acngtool in the acngtool domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="aptcacher_run_acngtool" lineno="38">
+<summary>
+Execute acngtool in the acngtool domain, and
+allow the specified role the acngtool domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+</interface>
+<interface name="aptcacher_stream_connect" lineno="58">
+<summary>
+Connect to aptcacher using a unix
+stream socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+</module>
<module name="arpwatch" filename="policy/modules/services/arpwatch.if">
<summary>Ethernet activity monitor.</summary>
<interface name="arpwatch_initrc_domtrans" lineno="14">
@@ -91368,7 +92123,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="asterisk_admin" lineno="120">
+<interface name="asterisk_admin" lineno="114">
<summary>
All of the rules required to
administrate an asterisk environment.
@@ -91547,7 +92302,7 @@ Domain allowed access.
</interface>
<interface name="avahi_create_pid_dirs" lineno="146">
<summary>
-Create avahi pid directories.
+Create avahi pid directories. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -91555,9 +92310,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="avahi_setattr_pid_dirs" lineno="165">
+<interface name="avahi_setattr_pid_dirs" lineno="161">
<summary>
-Set attributes of avahi pid directories.
+Set attributes of avahi pid directories. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -91565,9 +92320,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="avahi_manage_pid_files" lineno="184">
+<interface name="avahi_setattr_runtime_dirs" lineno="176">
<summary>
-Create, read, and write avahi pid files.
+Set attributes of avahi runtime directories.
</summary>
<param name="domain">
<summary>
@@ -91575,10 +92330,30 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="avahi_dontaudit_search_pid" lineno="204">
+<interface name="avahi_create_runtime_dirs" lineno="195">
+<summary>
+Create avahi runtime directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="avahi_manage_pid_files" lineno="214">
+<summary>
+Create, read, and write avahi pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="avahi_dontaudit_search_pid" lineno="230">
<summary>
Do not audit attempts to search
-avahi pid directories.
+avahi pid directories. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -91586,10 +92361,10 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="avahi_filetrans_pid" lineno="233">
+<interface name="avahi_filetrans_pid" lineno="256">
<summary>
Create specified objects in generic
-pid directories with the avahi pid file type.
+pid directories with the avahi pid file type. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -91607,7 +92382,49 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="avahi_admin" lineno="258">
+<interface name="avahi_manage_runtime_files" lineno="271">
+<summary>
+Create, read, and write avahi runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="avahi_dontaudit_search_runtime" lineno="291">
+<summary>
+Do not audit attempts to search
+avahi runtime directories.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="avahi_filetrans_runtime" lineno="320">
+<summary>
+Create specified objects in generic
+runtime directories with the avahi runtime file type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object_class">
+<summary>
+Class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="avahi_admin" lineno="345">
<summary>
All of the rules required to
administrate an avahi environment.
@@ -91769,7 +92586,7 @@ Domain allowed access.
</interface>
<interface name="bind_setattr_pid_dirs" lineno="267">
<summary>
-Set attributes of bind pid directories.
+Set attributes of bind pid directories. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -91777,7 +92594,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="bind_setattr_zone_dirs" lineno="285">
+<interface name="bind_setattr_zone_dirs" lineno="281">
<summary>
Set attributes of bind zone directories.
</summary>
@@ -91787,7 +92604,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="bind_read_zone" lineno="303">
+<interface name="bind_read_zone" lineno="299">
<summary>
Read bind zone files.
</summary>
@@ -91797,7 +92614,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="bind_manage_zone" lineno="323">
+<interface name="bind_manage_zone" lineno="319">
<summary>
Create, read, write, and delete
bind zone files.
@@ -91808,7 +92625,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="bind_admin" lineno="349">
+<interface name="bind_admin" lineno="345">
<summary>
All of the rules required to
administrate an bind environment.
@@ -92211,6 +93028,37 @@ Role allowed access.
<rolecap/>
</interface>
</module>
+<module name="certbot" filename="policy/modules/services/certbot.if">
+<summary>SSL certificate requesting tool certbot AKA letsencrypt.</summary>
+<interface name="certbot_domtrans" lineno="14">
+<summary>
+Execute certbot/letsencrypt in the certbot
+domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="certbot_run" lineno="39">
+<summary>
+Execute certbot/letsencrypt in the certbot
+domain, and allow the specified role
+the firstboot domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+</interface>
+</module>
<module name="certmaster" filename="policy/modules/services/certmaster.if">
<summary>Remote certificate distribution framework.</summary>
<interface name="certmaster_domtrans" lineno="13">
@@ -92318,7 +93166,7 @@ Domain allowed to transition.
</interface>
<interface name="certmonger_read_pid_files" lineno="72">
<summary>
-Read certmonger PID files.
+Read certmonger PID files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -92326,7 +93174,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="certmonger_search_lib" lineno="91">
+<interface name="certmonger_search_lib" lineno="86">
<summary>
Search certmonger lib directories.
</summary>
@@ -92336,7 +93184,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="certmonger_read_lib_files" lineno="110">
+<interface name="certmonger_read_lib_files" lineno="105">
<summary>
Read certmonger lib files.
</summary>
@@ -92346,7 +93194,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="certmonger_manage_lib_files" lineno="130">
+<interface name="certmonger_manage_lib_files" lineno="125">
<summary>
Create, read, write, and delete
certmonger lib files.
@@ -92357,7 +93205,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="certmonger_admin" lineno="156">
+<interface name="certmonger_admin" lineno="151">
<summary>
All of the rules required to
administrate an certmonger environment.
@@ -92760,7 +93608,7 @@ Domain allowed access.
<interface name="clamav_manage_pid_content" lineno="101">
<summary>
Create, read, write, and delete
-clamav pid content.
+clamav pid content. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -92768,7 +93616,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_read_config" lineno="121">
+<interface name="clamav_read_config" lineno="115">
<summary>
Read clamav configuration files.
</summary>
@@ -92778,7 +93626,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_search_lib" lineno="140">
+<interface name="clamav_search_lib" lineno="134">
<summary>
Search clamav library directories.
</summary>
@@ -92788,7 +93636,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_domtrans_clamscan" lineno="159">
+<interface name="clamav_domtrans_clamscan" lineno="153">
<summary>
Execute a domain transition to run clamscan.
</summary>
@@ -92798,7 +93646,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="clamav_exec_clamscan" lineno="178">
+<interface name="clamav_exec_clamscan" lineno="172">
<summary>
Execute clamscan in the caller domain.
</summary>
@@ -92808,7 +93656,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_read_state_clamd" lineno="197">
+<interface name="clamav_read_state_clamd" lineno="191">
<summary>
Read clamd process state files.
</summary>
@@ -92818,7 +93666,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_read_signatures" lineno="225">
+<interface name="clamav_read_signatures" lineno="219">
<summary>
Read clam virus signature files
</summary>
@@ -92835,7 +93683,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_scannable_files" lineno="246">
+<interface name="clamav_scannable_files" lineno="240">
<summary>
Denote a particular type to be scanned by ClamAV
</summary>
@@ -92845,7 +93693,7 @@ Type that clamd_t and clamscan_t can read.
</summary>
</param>
</interface>
-<interface name="clamav_domtrans_freshclam" lineno="264">
+<interface name="clamav_domtrans_freshclam" lineno="258">
<summary>
Execute a domain transition to run freshclam.
</summary>
@@ -92855,7 +93703,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="clamav_run_freshclam" lineno="290">
+<interface name="clamav_run_freshclam" lineno="284">
<summary>
Execute freshclam in the freshclam domain, and
allow the specified role the freshclam domain.
@@ -92872,7 +93720,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="clamav_exec_freshclam" lineno="309">
+<interface name="clamav_exec_freshclam" lineno="303">
<summary>
Execute freshclam in the caller domain.
</summary>
@@ -92882,7 +93730,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_enabledisable_clamd" lineno="328">
+<interface name="clamav_enabledisable_clamd" lineno="322">
<summary>
Allow specified domain to enable clamd units
</summary>
@@ -92892,7 +93740,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_startstop_clamd" lineno="347">
+<interface name="clamav_startstop_clamd" lineno="341">
<summary>
Allow specified domain to start clamd units
</summary>
@@ -92902,7 +93750,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_status_clamd" lineno="366">
+<interface name="clamav_status_clamd" lineno="360">
<summary>
Allow specified domain to get status of clamd
</summary>
@@ -92912,7 +93760,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_reload_clamd" lineno="385">
+<interface name="clamav_reload_clamd" lineno="379">
<summary>
Allow specified domain reload of clamd
</summary>
@@ -92922,7 +93770,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="clamav_admin" lineno="411">
+<interface name="clamav_admin" lineno="405">
<summary>
All of the rules required to
administrate an clamav environment.
@@ -93054,7 +93902,7 @@ Domain allowed to transition.
</interface>
<interface name="cmirrord_read_pid_files" lineno="52">
<summary>
-Read cmirrord PID files.
+Read cmirrord PID files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -93062,7 +93910,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cmirrord_rw_shm" lineno="71">
+<interface name="cmirrord_rw_shm" lineno="66">
<summary>
Read and write cmirrord shared memory.
</summary>
@@ -93072,7 +93920,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cmirrord_admin" lineno="101">
+<interface name="cmirrord_admin" lineno="96">
<summary>
All of the rules required to
administrate an cmirrord environment.
@@ -93329,75 +94177,6 @@ to the network using TCP.
</desc>
</tunable>
</module>
-<module name="consolekit" filename="policy/modules/services/consolekit.if">
-<summary>Framework for facilitating multiple user sessions on desktops.</summary>
-<interface name="consolekit_domtrans" lineno="13">
-<summary>
-Execute a domain transition to run consolekit.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="consolekit_dbus_chat" lineno="33">
-<summary>
-Send and receive messages from
-consolekit over dbus.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="consolekit_use_inhibit_lock" lineno="57">
-<summary>
-Use consolekit inhibit locks.
-
-The program gets passed an FD to a fifo_file to hold.
-When the application is done with the lock, it closes the FD.
-Implements this API: https://www.freedesktop.org/wiki/Software/systemd/inhibit/
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="consolekit_read_log" lineno="76">
-<summary>
-Read consolekit log files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="consolekit_manage_log" lineno="96">
-<summary>
-Create, read, write, and delete
-consolekit log files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="consolekit_read_pid_files" lineno="115">
-<summary>
-Read consolekit PID files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-</module>
<module name="consolesetup" filename="policy/modules/services/consolesetup.if">
<summary>console font and keymap setup program for debian</summary>
<interface name="consolesetup_domtrans" lineno="13">
@@ -93447,6 +94226,18 @@ Domain allowed access.
<interface name="consolesetup_pid_filetrans_runtime" lineno="98">
<summary>
Create a console-setup directory in
+the runtime directory. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="consolesetup_runtime_filetrans_runtime_dir" lineno="115">
+<summary>
+Create a console-setup directory in
the runtime directory.
</summary>
<param name="domain">
@@ -93511,7 +94302,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corosync_rw_tmpfs" lineno="110">
+<interface name="corosync_mmap_rw_tmpfs" lineno="110">
+<summary>
+Memmap, read and write corosync tmpfs files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corosync_rw_tmpfs" lineno="129">
<summary>
Read and write corosync tmpfs files.
</summary>
@@ -93521,7 +94322,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corosync_admin" lineno="136">
+<interface name="corosync_read_state" lineno="148">
+<summary>
+Read process state of corosync.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="corosync_admin" lineno="173">
<summary>
All of the rules required to
administrate an corosync environment.
@@ -93573,7 +94384,17 @@ Domain allowed access.
</interface>
<interface name="couchdb_read_pid_files" lineno="70">
<summary>
-Read couchdb pid files.
+Read couchdb pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="couchdb_read_runtime_files" lineno="85">
+<summary>
+Read couchdb runtime files.
</summary>
<param name="domain">
<summary>
@@ -93581,7 +94402,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="couchdb_admin" lineno="96">
+<interface name="couchdb_admin" lineno="111">
<summary>
All of the rules required to
administrate an couchdb environment.
@@ -93771,7 +94592,7 @@ User domain for the role.
<interface name="cron_system_entry" lineno="312">
<summary>
Make the specified program domain
-accessable from the system cron jobs.
+accessible from the system cron jobs.
</summary>
<param name="domain">
<summary>
@@ -93961,7 +94782,7 @@ Domain allowed access.
<interface name="cron_manage_pid_files" lineno="641">
<summary>
Create, read, write, and delete
-crond pid files.
+crond pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -93969,7 +94790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_anacron_domtrans_system_job" lineno="660">
+<interface name="cron_anacron_domtrans_system_job" lineno="656">
<summary>
Execute anacron in the cron
system domain.
@@ -93980,7 +94801,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="cron_use_system_job_fds" lineno="679">
+<interface name="cron_use_system_job_fds" lineno="675">
<summary>
Use system cron job file descriptors.
</summary>
@@ -93990,7 +94811,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_manage_system_spool" lineno="697">
+<interface name="cron_manage_system_spool" lineno="693">
<summary>
Create, read, write, and delete the system spool.
</summary>
@@ -94000,7 +94821,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_read_system_spool" lineno="716">
+<interface name="cron_read_system_spool" lineno="712">
<summary>
Read the system spool.
</summary>
@@ -94010,7 +94831,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_rw_tmp_files" lineno="736">
+<interface name="cron_rw_tmp_files" lineno="732">
<summary>
Read and write crond temporary files.
</summary>
@@ -94020,7 +94841,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_read_system_job_lib_files" lineno="754">
+<interface name="cron_read_system_job_lib_files" lineno="750">
<summary>
Read system cron job lib files.
</summary>
@@ -94030,7 +94851,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_manage_system_job_lib_files" lineno="774">
+<interface name="cron_manage_system_job_lib_files" lineno="770">
<summary>
Create, read, write, and delete
system cron job lib files.
@@ -94041,7 +94862,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_write_system_job_pipes" lineno="793">
+<interface name="cron_write_system_job_pipes" lineno="789">
<summary>
Write system cron job unnamed pipes.
</summary>
@@ -94051,7 +94872,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_rw_system_job_pipes" lineno="812">
+<interface name="cron_rw_system_job_pipes" lineno="808">
<summary>
Read and write system cron job
unnamed pipes.
@@ -94062,7 +94883,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_rw_system_job_stream_sockets" lineno="831">
+<interface name="cron_rw_system_job_stream_sockets" lineno="827">
<summary>
Read and write inherited system cron
job unix domain stream sockets.
@@ -94073,7 +94894,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_read_system_job_tmp_files" lineno="849">
+<interface name="cron_read_system_job_tmp_files" lineno="845">
<summary>
Read system cron job temporary files.
</summary>
@@ -94083,7 +94904,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="869">
+<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="865">
<summary>
Do not audit attempts to append temporary
system cron job files.
@@ -94094,7 +94915,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="cron_rw_inherited_system_job_tmp_files" lineno="887">
+<interface name="cron_rw_inherited_system_job_tmp_files" lineno="883">
<summary>
Read and write to inherited system cron job temporary files.
</summary>
@@ -94104,7 +94925,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="906">
+<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="902">
<summary>
Do not audit attempts to write temporary
system cron job files.
@@ -94115,7 +94936,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="cron_exec_crontab" lineno="925">
+<interface name="cron_exec_crontab" lineno="921">
<summary>
Execute crontab in the caller domain.
</summary>
@@ -94126,7 +94947,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="cron_admin" lineno="951">
+<interface name="cron_admin" lineno="947">
<summary>
All of the rules required to
administrate a cron environment.
@@ -94292,7 +95113,17 @@ Domain allowed access.
</interface>
<interface name="cups_read_pid_files" lineno="107">
<summary>
-Read cups PID files.
+Read cups PID files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="cups_read_runtime_files" lineno="122">
+<summary>
+Read cups runtime files.
</summary>
<param name="domain">
<summary>
@@ -94300,7 +95131,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cups_domtrans_config" lineno="127">
+<interface name="cups_domtrans_config" lineno="142">
<summary>
Execute cups_config in the
cups config domain.
@@ -94311,7 +95142,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="cups_signal_config" lineno="147">
+<interface name="cups_signal_config" lineno="162">
<summary>
Send generic signals to the cups
configuration daemon.
@@ -94322,7 +95153,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cups_dbus_chat_config" lineno="166">
+<interface name="cups_dbus_chat_config" lineno="181">
<summary>
Send and receive messages from
cupsd_config over dbus.
@@ -94333,7 +95164,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cups_read_config" lineno="187">
+<interface name="cups_read_config" lineno="202">
<summary>
Read cups configuration files.
</summary>
@@ -94344,7 +95175,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="cups_read_rw_config" lineno="207">
+<interface name="cups_read_rw_config" lineno="222">
<summary>
Read cups-writable configuration files.
</summary>
@@ -94355,7 +95186,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="cups_read_log" lineno="227">
+<interface name="cups_read_log" lineno="242">
<summary>
Read cups log files.
</summary>
@@ -94366,7 +95197,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="cups_append_log" lineno="246">
+<interface name="cups_append_log" lineno="261">
<summary>
Append cups log files.
</summary>
@@ -94376,7 +95207,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cups_write_log" lineno="265">
+<interface name="cups_write_log" lineno="280">
<summary>
Write cups log files.
</summary>
@@ -94386,7 +95217,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cups_stream_connect_ptal" lineno="285">
+<interface name="cups_stream_connect_ptal" lineno="300">
<summary>
Connect to ptal over an unix
domain stream socket.
@@ -94397,7 +95228,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cups_read_state" lineno="304">
+<interface name="cups_read_state" lineno="319">
<summary>
Read the process state (/proc/pid) of cupsd.
</summary>
@@ -94407,7 +95238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cups_domtrans_hplip" lineno="326">
+<interface name="cups_domtrans_hplip" lineno="341">
<summary>
Execute HP Linux Imaging and
Printing applications in their
@@ -94419,7 +95250,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="cups_admin" lineno="352">
+<interface name="cups_admin" lineno="367">
<summary>
All of the rules required to
administrate an cups environment.
@@ -94644,7 +95475,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_connect_all_session_bus" lineno="170">
+<interface name="dbus_connect_all_session_bus" lineno="172">
<summary>
Acquire service on all DBUS
session busses.
@@ -94655,7 +95486,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_connect_spec_session_bus" lineno="196">
+<interface name="dbus_connect_spec_session_bus" lineno="198">
<summary>
Acquire service on specified
DBUS session bus.
@@ -94672,7 +95503,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_all_session_bus_client" lineno="216">
+<interface name="dbus_all_session_bus_client" lineno="218">
<summary>
Creating connections to all
DBUS session busses.
@@ -94683,7 +95514,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_spec_session_bus_client" lineno="248">
+<interface name="dbus_spec_session_bus_client" lineno="250">
<summary>
Creating connections to specified
DBUS session bus.
@@ -94700,7 +95531,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_send_all_session_bus" lineno="275">
+<interface name="dbus_send_all_session_bus" lineno="277">
<summary>
Send messages to all DBUS
session busses.
@@ -94711,7 +95542,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_send_spec_session_bus" lineno="301">
+<interface name="dbus_send_spec_session_bus" lineno="303">
<summary>
Send messages to specified
DBUS session busses.
@@ -94728,7 +95559,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_read_config" lineno="320">
+<interface name="dbus_read_config" lineno="322">
<summary>
Read dbus configuration content.
</summary>
@@ -94738,7 +95569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_read_lib_files" lineno="339">
+<interface name="dbus_read_lib_files" lineno="341">
<summary>
Read system dbus lib files.
</summary>
@@ -94748,7 +95579,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_relabel_lib_dirs" lineno="359">
+<interface name="dbus_relabel_lib_dirs" lineno="361">
<summary>
Relabel system dbus lib directory.
</summary>
@@ -94758,7 +95589,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_manage_lib_files" lineno="379">
+<interface name="dbus_manage_lib_files" lineno="381">
<summary>
Create, read, write, and delete
system dbus lib files.
@@ -94769,7 +95600,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_all_session_domain" lineno="405">
+<interface name="dbus_all_session_domain" lineno="407">
<summary>
Allow a application domain to be
started by the specified session bus.
@@ -94786,7 +95617,7 @@ entry point to this domain.
</summary>
</param>
</interface>
-<interface name="dbus_spec_session_domain" lineno="439">
+<interface name="dbus_spec_session_domain" lineno="441">
<summary>
Allow a application domain to be
started by the specified session bus.
@@ -94809,7 +95640,7 @@ entry point to this domain.
</summary>
</param>
</interface>
-<interface name="dbus_connect_system_bus" lineno="460">
+<interface name="dbus_connect_system_bus" lineno="462">
<summary>
Acquire service on the DBUS system bus.
</summary>
@@ -94819,7 +95650,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_send_system_bus" lineno="479">
+<interface name="dbus_send_system_bus" lineno="481">
<summary>
Send messages to the DBUS system bus.
</summary>
@@ -94829,7 +95660,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_system_bus_unconfined" lineno="498">
+<interface name="dbus_system_bus_unconfined" lineno="500">
<summary>
Unconfined access to DBUS system bus.
</summary>
@@ -94839,7 +95670,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_system_domain" lineno="523">
+<interface name="dbus_system_domain" lineno="525">
<summary>
Create a domain for processes which
can be started by the DBUS system bus.
@@ -94855,7 +95686,7 @@ Type of the program to be used as an entry point to this domain.
</summary>
</param>
</interface>
-<interface name="dbus_use_system_bus_fds" lineno="563">
+<interface name="dbus_use_system_bus_fds" lineno="565">
<summary>
Use and inherit DBUS system bus
file descriptors.
@@ -94866,7 +95697,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="582">
+<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="584">
<summary>
Do not audit attempts to read and
write DBUS system bus TCP sockets.
@@ -94877,7 +95708,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dbus_watch_system_bus_runtime_dirs" lineno="600">
+<interface name="dbus_watch_system_bus_runtime_dirs" lineno="602">
<summary>
Watch system bus runtime directories.
</summary>
@@ -94887,7 +95718,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="618">
+<interface name="dbus_list_system_bus_runtime" lineno="620">
+<summary>
+List system bus runtime directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="638">
<summary>
Watch system bus runtime named sockets.
</summary>
@@ -94897,7 +95738,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_unconfined" lineno="636">
+<interface name="dbus_read_system_bus_runtime_named_sockets" lineno="656">
+<summary>
+Read system bus runtime named sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dbus_unconfined" lineno="674">
<summary>
Unconfined access to DBUS.
</summary>
@@ -94907,7 +95758,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="666">
+<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="704">
<summary>
Create resources in /run or /var/run with the system_dbusd_runtime_t
label. This method is deprecated in favor of the init_daemon_run_dir
@@ -94929,7 +95780,7 @@ Optional file name used for the resource
</summary>
</param>
</interface>
-<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="680">
+<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="718">
<summary>
Create directories with the system_dbusd_runtime_t label
</summary>
@@ -94939,6 +95790,15 @@ Domain allowed access
</summary>
</param>
</interface>
+<tunable name="dbus_pass_tuntap_fd" dftval="false">
+<desc>
+<p>
+Allow dbus-daemon system bus to access /dev/net/tun
+which is needed to pass tun/tap device file descriptors
+over D-Bus. This is needed by openvpn3-linux.
+</p>
+</desc>
+</tunable>
</module>
<module name="dcc" filename="policy/modules/services/dcc.if">
<summary>Distributed checksum clearinghouse spam filtering.</summary>
@@ -95247,7 +96107,7 @@ Domain allowed access.
</interface>
<interface name="devicekit_read_pid_files" lineno="212">
<summary>
-Read devicekit PID files.
+Read devicekit PID files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -95255,10 +96115,20 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="devicekit_manage_pid_files" lineno="232">
+<interface name="devicekit_manage_pid_files" lineno="228">
<summary>
Create, read, write, and delete
-devicekit PID files.
+devicekit PID files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="devicekit_read_runtime_files" lineno="243">
+<summary>
+Read devicekit runtime files.
</summary>
<param name="domain">
<summary>
@@ -95266,7 +96136,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="devicekit_admin" lineno="258">
+<interface name="devicekit_manage_runtime_files" lineno="263">
+<summary>
+Create, read, write, and delete
+devicekit runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="devicekit_admin" lineno="289">
<summary>
All of the rules required to
administrate an devicekit environment.
@@ -95586,7 +96467,7 @@ Domain allowed access.
</interface>
<interface name="dnsmasq_delete_pid_files" lineno="149">
<summary>
-Delete dnsmasq pid files.
+Delete dnsmasq pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -95594,10 +96475,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dnsmasq_manage_pid_files" lineno="168">
+<interface name="dnsmasq_manage_pid_files" lineno="165">
<summary>
Create, read, write, and delete
-dnsmasq pid files
+dnsmasq pid files (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -95605,9 +96486,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dnsmasq_read_pid_files" lineno="188">
+<interface name="dnsmasq_read_pid_files" lineno="181">
<summary>
-Read dnsmasq pid files.
+Read dnsmasq pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -95615,9 +96496,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dnsmasq_create_pid_dirs" lineno="206">
+<interface name="dnsmasq_create_pid_dirs" lineno="196">
<summary>
-Create dnsmasq pid directories.
+Create dnsmasq pid directories. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -95625,11 +96506,11 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dnsmasq_spec_filetrans_pid" lineno="242">
+<interface name="dnsmasq_spec_filetrans_pid" lineno="228">
<summary>
Create specified objects in specified
directories with a type transition to
-the dnsmasq pid file type.
+the dnsmasq pid file type. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -95652,30 +96533,73 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dnsmasq_admin" lineno="267">
+<interface name="dnsmasq_create_runtime_dirs" lineno="243">
<summary>
-All of the rules required to
-administrate an dnsmasq environment.
+Create dnsmasq runtime directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<param name="role">
+</interface>
+<interface name="dnsmasq_virt_runtime_filetrans_runtime" lineno="274">
<summary>
-Role allowed access.
+Create specified objects in specified
+directories with a type transition to
+the dnsmasq runtime file type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
</summary>
</param>
-<rolecap/>
</interface>
-</module>
-<module name="dnssectrigger" filename="policy/modules/services/dnssectrigger.if">
-<summary>Enables DNSSEC protection for DNS traffic.</summary>
-<interface name="dnssectrigger_admin" lineno="20">
+<interface name="dnsmasq_read_runtime_files" lineno="293">
+<summary>
+Read dnsmasq runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dnsmasq_delete_runtime_files" lineno="312">
+<summary>
+Delete dnsmasq runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dnsmasq_manage_runtime_files" lineno="331">
+<summary>
+Create, read, write, and delete
+dnsmasq runtime files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dnsmasq_admin" lineno="357">
<summary>
All of the rules required to
-administrate an dnssec environment.
+administrate an dnsmasq environment.
</summary>
<param name="domain">
<summary>
@@ -95958,7 +96882,7 @@ Domain allowed access.
</interface>
<interface name="exim_read_pid_files" lineno="116">
<summary>
-Read exim pid files.
+Read exim pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -95966,7 +96890,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="exim_read_log" lineno="136">
+<interface name="exim_read_log" lineno="131">
<summary>
Read exim log files.
</summary>
@@ -95977,7 +96901,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="exim_append_log" lineno="155">
+<interface name="exim_append_log" lineno="150">
<summary>
Append exim log files.
</summary>
@@ -95987,7 +96911,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="exim_manage_log" lineno="176">
+<interface name="exim_manage_log" lineno="171">
<summary>
Create, read, write, and delete
exim log files.
@@ -95999,7 +96923,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="exim_manage_spool_dirs" lineno="196">
+<interface name="exim_manage_spool_dirs" lineno="191">
<summary>
Create, read, write, and delete
exim spool directories.
@@ -96010,7 +96934,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="exim_read_spool_files" lineno="215">
+<interface name="exim_read_spool_files" lineno="210">
<summary>
Read exim spool files.
</summary>
@@ -96020,7 +96944,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="exim_manage_spool_files" lineno="236">
+<interface name="exim_manage_spool_files" lineno="231">
<summary>
Create, read, write, and delete
exim spool files.
@@ -96031,7 +96955,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="exim_read_var_lib_files" lineno="255">
+<interface name="exim_read_var_lib_files" lineno="250">
<summary>
Read exim var lib files.
</summary>
@@ -96041,7 +96965,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="exim_manage_var_lib_files" lineno="274">
+<interface name="exim_manage_var_lib_files" lineno="269">
<summary>
Create, read, and write exim var lib files.
</summary>
@@ -96051,7 +96975,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="exim_admin" lineno="300">
+<interface name="exim_admin" lineno="295">
<summary>
All of the rules required to
administrate an exim environment.
@@ -96222,7 +97146,7 @@ Domain allowed access.
</interface>
<interface name="fail2ban_read_pid_files" lineno="233">
<summary>
-Read fail2ban pid files.
+Read fail2ban pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -96230,7 +97154,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fail2ban_admin" lineno="259">
+<interface name="fail2ban_admin" lineno="254">
<summary>
All of the rules required to
administrate an fail2ban environment.
@@ -96862,7 +97786,7 @@ Domain allowed access.
</interface>
<interface name="glance_read_pid_files" lineno="192">
<summary>
-Read glance pid files.
+Read glance pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -96870,10 +97794,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="glance_manage_pid_files" lineno="212">
+<interface name="glance_manage_pid_files" lineno="207">
<summary>
Create, read, write, and delete
-glance pid files.
+glance pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -96881,7 +97805,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="glance_admin" lineno="238">
+<interface name="glance_admin" lineno="228">
<summary>
All of the rules required to
administrate an glance environment.
@@ -97148,7 +98072,7 @@ Domain allowed access.
</interface>
<interface name="gssproxy_read_pid_files" lineno="108">
<summary>
-Read gssproxy PID files.
+Read gssproxy PID files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -97156,7 +98080,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="gssproxy_stream_connect" lineno="128">
+<interface name="gssproxy_stream_connect" lineno="123">
<summary>
Connect to gssproxy over an unix
domain stream socket.
@@ -97167,7 +98091,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="gssproxy_admin" lineno="150">
+<interface name="gssproxy_admin" lineno="145">
<summary>
All of the rules required to administrate
an gssproxy environment
@@ -97380,250 +98304,6 @@ Role allowed access.
<rolecap/>
</interface>
</module>
-<module name="hal" filename="policy/modules/services/hal.if">
-<summary>Hardware abstraction layer.</summary>
-<interface name="hal_domtrans" lineno="13">
-<summary>
-Execute hal in the hal domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="hal_getattr" lineno="32">
-<summary>
-Get attributes of hald processes.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_read_state" lineno="50">
-<summary>
-Read hal process state files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_ptrace" lineno="68">
-<summary>
-Trace hald processes.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_use_fds" lineno="86">
-<summary>
-Inherit and use hald file descriptors.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_dontaudit_use_fds" lineno="105">
-<summary>
-Do not audit attempts to inherited
-and use hald file descriptors.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="hal_rw_pipes" lineno="123">
-<summary>
-Read and write hald unnamed pipes.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_dontaudit_rw_pipes" lineno="142">
-<summary>
-Do not audit attempts to read and
-write hald unnamed pipes.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="hal_dgram_send" lineno="161">
-<summary>
-Send to hald over a unix domain
-datagram socket.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_stream_connect" lineno="181">
-<summary>
-Send to hald over a unix domain
-stream socket.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_dontaudit_rw_dgram_sockets" lineno="201">
-<summary>
-Do not audit attempts to read and
-write hald unix datagram sockets.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="hal_dbus_send" lineno="219">
-<summary>
-Send messages to hald over dbus.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_dbus_chat" lineno="239">
-<summary>
-Send and receive messages from
-hald over dbus.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_domtrans_mac" lineno="259">
-<summary>
-Execute hal mac in the hal mac domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="hal_write_log" lineno="278">
-<summary>
-Write hald log files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_dontaudit_write_log" lineno="298">
-<summary>
-Do not audit attempts to write hald
-log files.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="hal_manage_log" lineno="317">
-<summary>
-Create, read, write, and delete
-hald log files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_read_tmp_files" lineno="336">
-<summary>
-Read hald temporary files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_dontaudit_append_lib_files" lineno="356">
-<summary>
-Do not audit attempts to append
-hald libraries files.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="hal_read_pid_files" lineno="374">
-<summary>
-Read hald pid files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_rw_pid_files" lineno="393">
-<summary>
-Read and write hald pid files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_manage_pid_dirs" lineno="413">
-<summary>
-Create, read, write, and delete
-hald pid directories.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hal_manage_pid_files" lineno="433">
-<summary>
-Create, read, write, and delete
-hald pid files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-</module>
<module name="hddtemp" filename="policy/modules/services/hddtemp.if">
<summary>Hard disk temperature tool running as a daemon.</summary>
<interface name="hddtemp_domtrans" lineno="13">
@@ -97778,7 +98458,7 @@ Domain allowed to transition.
</interface>
<interface name="icecast_read_pid_files" lineno="68">
<summary>
-Read icecast pid files.
+Read icecast pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -97786,7 +98466,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="icecast_manage_pid_files" lineno="88">
+<interface name="icecast_manage_pid_files" lineno="83">
<summary>
Create, read, write, and delete
icecast pid files.
@@ -97797,7 +98477,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="icecast_read_log" lineno="108">
+<interface name="icecast_read_log" lineno="103">
<summary>
Read icecast log files.
</summary>
@@ -97808,7 +98488,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="icecast_append_log" lineno="127">
+<interface name="icecast_append_log" lineno="122">
<summary>
Append icecast log files.
</summary>
@@ -97818,7 +98498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="icecast_manage_log" lineno="147">
+<interface name="icecast_manage_log" lineno="142">
<summary>
Create, read, write, and delete
icecast log files.
@@ -97829,7 +98509,7 @@ Domain allow access.
</summary>
</param>
</interface>
-<interface name="icecast_admin" lineno="173">
+<interface name="icecast_admin" lineno="168">
<summary>
All of the rules required to
administrate an icecast environment.
@@ -97900,7 +98580,7 @@ Domain allowed access.
</interface>
<interface name="ifplugd_read_pid_files" lineno="90">
<summary>
-Read ifplugd pid files.
+Read ifplugd pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -97908,7 +98588,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ifplugd_admin" lineno="116">
+<interface name="ifplugd_admin" lineno="111">
<summary>
All of the rules required to
administrate an ifplugd environment.
@@ -98089,7 +98769,7 @@ The name of the object being created.
<interface name="inn_manage_pid" lineno="100">
<summary>
Create, read, write, and delete
-innd pid content.
+innd pid content. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -98097,7 +98777,40 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="inn_read_config" lineno="122">
+<interface name="inn_manage_runtime_dirs" lineno="118">
+<summary>
+Create, read, write, and delete
+innd runtime dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="inn_manage_runtime_files" lineno="138">
+<summary>
+Create, read, write, and delete
+innd runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="inn_manage_runtime_sockets" lineno="158">
+<summary>
+Create, read, write, and delete
+innd runtime named sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="inn_read_config" lineno="178">
<summary>
Read innd configuration content.
</summary>
@@ -98107,7 +98820,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="inn_read_news_lib" lineno="142">
+<interface name="inn_read_news_lib" lineno="198">
<summary>
Read innd news library content.
</summary>
@@ -98117,7 +98830,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="inn_read_news_spool" lineno="161">
+<interface name="inn_read_news_spool" lineno="217">
<summary>
Read innd news spool content.
</summary>
@@ -98127,7 +98840,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="inn_dgram_send" lineno="181">
+<interface name="inn_dgram_send" lineno="237">
<summary>
Send to a innd unix dgram socket.
</summary>
@@ -98137,7 +98850,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="inn_domtrans" lineno="200">
+<interface name="inn_domtrans" lineno="256">
<summary>
Execute innd in the innd domain.
</summary>
@@ -98147,7 +98860,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="inn_admin" lineno="226">
+<interface name="inn_admin" lineno="282">
<summary>
All of the rules required to
administrate an inn environment.
@@ -98321,7 +99034,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kerberos_read_config" lineno="109">
+<interface name="kerberos_read_config" lineno="108">
<summary>
Read kerberos configuration files.
</summary>
@@ -98332,7 +99045,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kerberos_dontaudit_write_config" lineno="132">
+<interface name="kerberos_dontaudit_write_config" lineno="131">
<summary>
Do not audit attempts to write
kerberos configuration files.
@@ -98343,7 +99056,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kerberos_rw_config" lineno="152">
+<interface name="kerberos_rw_config" lineno="151">
<summary>
Read and write kerberos
configuration files.
@@ -98355,7 +99068,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kerberos_manage_krb5_home_files" lineno="172">
+<interface name="kerberos_manage_krb5_home_files" lineno="171">
<summary>
Create, read, write, and delete
kerberos home files.
@@ -98366,7 +99079,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kerberos_relabel_krb5_home_files" lineno="191">
+<interface name="kerberos_relabel_krb5_home_files" lineno="190">
<summary>
Relabel kerberos home files.
</summary>
@@ -98376,7 +99089,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kerberos_home_filetrans_krb5_home" lineno="221">
+<interface name="kerberos_home_filetrans_krb5_home" lineno="220">
<summary>
Create objects in user home
directories with the krb5 home type.
@@ -98397,7 +99110,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="kerberos_read_keytab" lineno="240">
+<interface name="kerberos_read_keytab" lineno="239">
<summary>
Read kerberos key table files.
</summary>
@@ -98408,7 +99121,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kerberos_rw_keytab" lineno="259">
+<interface name="kerberos_rw_keytab" lineno="258">
<summary>
Read and write kerberos key table files.
</summary>
@@ -98418,7 +99131,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kerberos_manage_keytab_files" lineno="279">
+<interface name="kerberos_manage_keytab_files" lineno="278">
<summary>
Create, read, write, and delete
kerberos key table files.
@@ -98429,7 +99142,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kerberos_etc_filetrans_keytab" lineno="310">
+<interface name="kerberos_etc_filetrans_keytab" lineno="309">
<summary>
Create specified objects in generic
etc directories with the kerberos
@@ -98451,7 +99164,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="kerberos_read_kdc_config" lineno="329">
+<interface name="kerberos_read_kdc_config" lineno="328">
<summary>
Read kerberos kdc configuration files.
</summary>
@@ -98462,7 +99175,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kerberos_manage_host_rcache" lineno="350">
+<interface name="kerberos_manage_host_rcache" lineno="349">
<summary>
Create, read, write, and delete
kerberos host rcache files.
@@ -98474,7 +99187,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kerberos_tmp_filetrans_host_rcache" lineno="391">
+<interface name="kerberos_tmp_filetrans_host_rcache" lineno="390">
<summary>
Create objects in generic temporary
directories with the kerberos host
@@ -98496,7 +99209,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="kerberos_connect_524" lineno="409">
+<interface name="kerberos_connect_524" lineno="408">
<summary>
Connect to krb524 service.
</summary>
@@ -98506,7 +99219,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kerberos_admin" lineno="439">
+<interface name="kerberos_admin" lineno="437">
<summary>
All of the rules required to
administrate an kerberos environment.
@@ -98595,19 +99308,6 @@ Role allowed access.
<rolecap/>
</interface>
</module>
-<module name="keyboardd" filename="policy/modules/services/keyboardd.if">
-<summary>Xorg.conf keyboard layout callout.</summary>
-<interface name="keyboardd_read_pipes" lineno="13">
-<summary>
-Read keyboardd unnamed pipes.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-</module>
<module name="keystone" filename="policy/modules/services/keystone.if">
<summary>Python implementation of the OpenStack identity service API.</summary>
<interface name="keystone_admin" lineno="20">
@@ -99078,7 +99778,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<template name="lpd_domtrans_lpr" lineno="203">
+<interface name="lpd_domtrans_lpr" lineno="203">
<summary>
Transition to a user lpr domain.
</summary>
@@ -99087,7 +99787,7 @@ Transition to a user lpr domain.
Domain allowed to transition.
</summary>
</param>
-</template>
+</interface>
<interface name="lpd_run_lpr" lineno="229">
<summary>
Execute lpr in the lpr domain, and
@@ -99200,7 +99900,7 @@ Execute mailman in the caller domain.
</summary>
<param name="domain">
<summary>
-Domain allowd access.
+Domain allowed access.
</summary>
</param>
</interface>
@@ -99306,7 +100006,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mailman_domtrans_queue" lineno="336">
+<interface name="mailman_domtrans_queue" lineno="337">
<summary>
Execute mailman_queue in the
mailman_queue domain.
@@ -99377,7 +100077,17 @@ Domain allowed to transition.
<interface name="memcached_manage_pid_files" lineno="33">
<summary>
Create, read, write, and delete
-memcached pid files.
+memcached pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="memcached_read_pid_files" lineno="48">
+<summary>
+Read memcached pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -99385,9 +100095,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="memcached_read_pid_files" lineno="52">
+<interface name="memcached_manage_runtime_files" lineno="63">
<summary>
-Read memcached pid files.
+Create, read, write, and delete
+memcached runtime files.
</summary>
<param name="domain">
<summary>
@@ -99395,7 +100106,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="memcached_stream_connect" lineno="72">
+<interface name="memcached_stream_connect" lineno="83">
<summary>
Connect to memcached using a unix
domain stream socket.
@@ -99406,7 +100117,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="memcached_tcp_connect" lineno="91">
+<interface name="memcached_tcp_connect" lineno="102">
<summary>
Connect to memcache over the network.
</summary>
@@ -99416,7 +100127,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="memcached_admin" lineno="118">
+<interface name="memcached_admin" lineno="129">
<summary>
All of the rules required to
administrate an memcached environment.
@@ -99434,6 +100145,9 @@ Role allowed access.
<rolecap/>
</interface>
</module>
+<module name="memlockd" filename="policy/modules/services/memlockd.if">
+<summary>memory lock daemon, keeps important files in RAM.</summary>
+</module>
<module name="milter" filename="policy/modules/services/milter.if">
<summary>Milter mail filters.</summary>
<template name="milter_template" lineno="13">
@@ -100062,7 +100776,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_home_filetrans_mail_home_rw" lineno="279">
+<interface name="mta_home_filetrans_mail_home_rw" lineno="280">
<summary>
Create specified objects in user home
directories with the generic mail
@@ -100084,7 +100798,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="mta_system_content" lineno="297">
+<interface name="mta_system_content" lineno="298">
<summary>
Make the specified type by a system MTA.
</summary>
@@ -100094,7 +100808,7 @@ Type to be used as a mail client.
</summary>
</param>
</interface>
-<interface name="mta_sendmail_mailserver" lineno="330">
+<interface name="mta_sendmail_mailserver" lineno="331">
<summary>
Modified mailserver interface for
sendmail daemon use.
@@ -100119,7 +100833,7 @@ The type to be used for the mail server.
</summary>
</param>
</interface>
-<interface name="mta_use_mailserver_fds" lineno="351">
+<interface name="mta_use_mailserver_fds" lineno="352">
<summary>
Inherit FDs from mailserver_domain domains
</summary>
@@ -100129,7 +100843,7 @@ Type for a list server or delivery agent that inherits fds
</summary>
</param>
</interface>
-<interface name="mta_mailserver_sender" lineno="370">
+<interface name="mta_mailserver_sender" lineno="371">
<summary>
Make a type a mailserver type used
for sending mail.
@@ -100140,7 +100854,7 @@ Mail server domain type used for sending mail.
</summary>
</param>
</interface>
-<interface name="mta_mailserver_delivery" lineno="389">
+<interface name="mta_mailserver_delivery" lineno="390">
<summary>
Make a type a mailserver type used
for delivering mail to local users.
@@ -100151,7 +100865,7 @@ Mail server domain type used for delivering mail.
</summary>
</param>
</interface>
-<interface name="mta_mailserver_user_agent" lineno="409">
+<interface name="mta_mailserver_user_agent" lineno="410">
<summary>
Make a type a mailserver type used
for sending mail on behalf of local
@@ -100163,7 +100877,7 @@ Mail server domain type used for sending local mail.
</summary>
</param>
</interface>
-<interface name="mta_send_mail" lineno="427">
+<interface name="mta_send_mail" lineno="428">
<summary>
Send mail from the system.
</summary>
@@ -100173,7 +100887,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="mta_sendmail_domtrans" lineno="472">
+<interface name="mta_sendmail_domtrans" lineno="473">
<summary>
Execute send mail in a specified domain.
</summary>
@@ -100198,7 +100912,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="mta_signal_system_mail" lineno="494">
+<interface name="mta_signal_system_mail" lineno="495">
<summary>
Send signals to system mail.
</summary>
@@ -100208,7 +100922,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_kill_system_mail" lineno="512">
+<interface name="mta_kill_system_mail" lineno="513">
<summary>
Send kill signals to system mail.
</summary>
@@ -100218,7 +100932,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_sendmail_exec" lineno="530">
+<interface name="mta_sendmail_exec" lineno="531">
<summary>
Execute sendmail in the caller domain.
</summary>
@@ -100228,7 +100942,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_sendmail_entry_point" lineno="550">
+<interface name="mta_sendmail_entry_point" lineno="551">
<summary>
Make sendmail usable as an entry
point for the domain.
@@ -100239,7 +100953,7 @@ Domain to be entered.
</summary>
</param>
</interface>
-<interface name="mta_read_config" lineno="569">
+<interface name="mta_read_config" lineno="570">
<summary>
Read mail server configuration content.
</summary>
@@ -100250,7 +100964,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mta_write_config" lineno="591">
+<interface name="mta_write_config" lineno="592">
<summary>
Write mail server configuration files.
</summary>
@@ -100261,7 +100975,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mta_read_aliases" lineno="610">
+<interface name="mta_read_aliases" lineno="611">
<summary>
Read mail address alias files.
</summary>
@@ -100271,7 +100985,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_map_aliases" lineno="638">
+<interface name="mta_map_aliases" lineno="639">
<summary>
Read mail address alias files.
</summary>
@@ -100281,7 +100995,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_manage_aliases" lineno="657">
+<interface name="mta_manage_aliases" lineno="658">
<summary>
Create, read, write, and delete
mail address alias content.
@@ -100292,7 +101006,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_etc_filetrans_aliases" lineno="699">
+<interface name="mta_etc_filetrans_aliases" lineno="700">
<summary>
Create specified object in generic
etc directories with the mail address
@@ -100314,7 +101028,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="mta_spec_filetrans_aliases" lineno="734">
+<interface name="mta_spec_filetrans_aliases" lineno="735">
<summary>
Create specified objects in specified
directories with a type transition to
@@ -100341,7 +101055,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="mta_rw_aliases" lineno="753">
+<interface name="mta_rw_aliases" lineno="754">
<summary>
Read and write mail alias files.
</summary>
@@ -100352,7 +101066,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mta_dontaudit_rw_delivery_tcp_sockets" lineno="783">
+<interface name="mta_dontaudit_rw_delivery_tcp_sockets" lineno="784">
<summary>
Do not audit attempts to read
and write TCP sockets of mail
@@ -100364,7 +101078,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_dontaudit_read_spool_symlinks" lineno="802">
+<interface name="mta_dontaudit_read_spool_symlinks" lineno="803">
<summary>
Do not audit attempts to read
mail spool symlinks.
@@ -100375,7 +101089,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_getattr_spool" lineno="820">
+<interface name="mta_getattr_spool" lineno="821">
<summary>
Get attributes of mail spool content.
</summary>
@@ -100385,7 +101099,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_dontaudit_getattr_spool_files" lineno="842">
+<interface name="mta_dontaudit_getattr_spool_files" lineno="843">
<summary>
Do not audit attempts to get
attributes of mail spool files.
@@ -100396,7 +101110,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_spool_filetrans" lineno="880">
+<interface name="mta_spool_filetrans" lineno="881">
<summary>
Create specified objects in the
mail spool directory with a
@@ -100423,7 +101137,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="mta_read_spool_files" lineno="899">
+<interface name="mta_read_spool_files" lineno="900">
<summary>
Read mail spool files.
</summary>
@@ -100433,7 +101147,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_rw_spool" lineno="918">
+<interface name="mta_rw_spool" lineno="920">
<summary>
Read and write mail spool files.
</summary>
@@ -100443,7 +101157,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_append_spool" lineno="939">
+<interface name="mta_append_spool" lineno="941">
<summary>
Create, read, and write mail spool files.
</summary>
@@ -100453,7 +101167,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_delete_spool" lineno="960">
+<interface name="mta_delete_spool" lineno="962">
<summary>
Delete mail spool files.
</summary>
@@ -100463,7 +101177,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_manage_spool" lineno="980">
+<interface name="mta_manage_spool" lineno="982">
<summary>
Create, read, write, and delete
mail spool content.
@@ -100474,7 +101188,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_queue_filetrans" lineno="1018">
+<interface name="mta_queue_filetrans" lineno="1021">
<summary>
Create specified objects in the
mail queue spool directory with a
@@ -100501,7 +101215,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="mta_search_queue" lineno="1037">
+<interface name="mta_search_queue" lineno="1040">
<summary>
Search mail queue directories.
</summary>
@@ -100511,7 +101225,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_list_queue" lineno="1056">
+<interface name="mta_list_queue" lineno="1059">
<summary>
List mail queue directories.
</summary>
@@ -100521,7 +101235,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_read_queue" lineno="1075">
+<interface name="mta_read_queue" lineno="1078">
<summary>
Read mail queue files.
</summary>
@@ -100531,7 +101245,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_dontaudit_rw_queue" lineno="1095">
+<interface name="mta_dontaudit_rw_queue" lineno="1098">
<summary>
Do not audit attempts to read and
write mail queue content.
@@ -100542,7 +101256,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="mta_manage_queue" lineno="1115">
+<interface name="mta_manage_queue" lineno="1118">
<summary>
Create, read, write, and delete
mail queue content.
@@ -100553,7 +101267,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_read_sendmail_bin" lineno="1135">
+<interface name="mta_read_sendmail_bin" lineno="1138">
<summary>
Read sendmail binary.
</summary>
@@ -100563,7 +101277,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mta_rw_user_mail_stream_sockets" lineno="1154">
+<interface name="mta_rw_user_mail_stream_sockets" lineno="1157">
<summary>
Read and write unix domain stream
sockets of all base mail domains.
@@ -100866,7 +101580,7 @@ Domain allowed to transition.
</interface>
<interface name="mysql_read_pid_files" lineno="361">
<summary>
-Read mysqld pid files.
+Read mysqld pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -100874,9 +101588,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mysql_search_pid_files" lineno="381">
+<interface name="mysql_search_pid_files" lineno="376">
<summary>
-Search mysqld pid files.
+Search mysqld pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -100885,7 +101599,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="mysql_admin" lineno="407">
+<interface name="mysql_admin" lineno="397">
<summary>
All of the rules required to
administrate an mysqld environment.
@@ -100902,7 +101616,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mysql_setattr_run_dirs" lineno="449">
+<interface name="mysql_setattr_run_dirs" lineno="439">
<summary>
Set the attributes of the MySQL run directories
</summary>
@@ -100912,7 +101626,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="mysql_create_run_dirs" lineno="467">
+<interface name="mysql_create_run_dirs" lineno="457">
<summary>
Create MySQL run directories
</summary>
@@ -100922,7 +101636,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="mysql_generic_run_filetrans_run" lineno="498">
+<interface name="mysql_generic_run_filetrans_run" lineno="488">
<summary>
Automatically use the MySQL run label for created resources in generic
run locations. This method is deprecated in favor of the
@@ -101183,7 +101897,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_read_etc_files" lineno="184">
+<interface name="networkmanager_watch_etc_dirs" lineno="184">
+<summary>
+Watch networkmanager etc dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="networkmanager_read_etc_files" lineno="202">
<summary>
Read networkmanager etc files.
</summary>
@@ -101193,7 +101917,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_manage_lib_files" lineno="205">
+<interface name="networkmanager_manage_lib_files" lineno="223">
<summary>
Create, read, and write
networkmanager library files.
@@ -101204,7 +101928,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_read_lib_files" lineno="225">
+<interface name="networkmanager_read_lib_files" lineno="243">
<summary>
Read networkmanager lib files.
</summary>
@@ -101214,7 +101938,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_append_log_files" lineno="246">
+<interface name="networkmanager_append_log_files" lineno="264">
<summary>
Append networkmanager log files.
</summary>
@@ -101224,9 +101948,19 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_read_pid_files" lineno="266">
+<interface name="networkmanager_read_pid_files" lineno="284">
+<summary>
+Read networkmanager pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="networkmanager_read_runtime_files" lineno="299">
<summary>
-Read networkmanager pid files.
+Read networkmanager runtime files.
</summary>
<param name="domain">
<summary>
@@ -101234,7 +101968,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_stream_connect" lineno="287">
+<interface name="networkmanager_stream_connect" lineno="319">
<summary>
Connect to networkmanager over
a unix domain stream socket.
@@ -101245,7 +101979,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_enabledisable" lineno="306">
+<interface name="networkmanager_enabledisable" lineno="338">
<summary>
Allow specified domain to enable/disable NetworkManager units
</summary>
@@ -101255,7 +101989,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_startstop" lineno="325">
+<interface name="networkmanager_startstop" lineno="357">
<summary>
Allow specified domain to start/stop NetworkManager units
</summary>
@@ -101265,7 +101999,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_status" lineno="344">
+<interface name="networkmanager_status" lineno="376">
<summary>
Allow specified domain to get status of NetworkManager
</summary>
@@ -101275,7 +102009,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_admin" lineno="370">
+<interface name="networkmanager_admin" lineno="402">
<summary>
All of the rules required to
administrate an networkmanager environment.
@@ -101292,7 +102026,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="409">
+<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="441">
<summary>
Do not audit use of wpa_cli file descriptors
</summary>
@@ -101302,7 +102036,7 @@ Domain to dontaudit access.
</summary>
</param>
</interface>
-<interface name="networkmanager_domtrans_wpa_cli" lineno="428">
+<interface name="networkmanager_domtrans_wpa_cli" lineno="460">
<summary>
Execute wpa_cli in the wpa_cli domain.
</summary>
@@ -101312,7 +102046,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="networkmanager_run_wpa_cli" lineno="454">
+<interface name="networkmanager_run_wpa_cli" lineno="486">
<summary>
Execute wpa cli in the wpa_cli domain, and
allow the specified role the wpa_cli domain.
@@ -101329,7 +102063,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="networkmanager_rw_rawip_sockets" lineno="475">
+<interface name="networkmanager_rw_rawip_sockets" lineno="507">
<summary>
Read and write networkmanager rawip sockets.
</summary>
@@ -101365,7 +102099,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_use_ypbind" lineno="88">
+<interface name="nis_use_ypbind" lineno="87">
<summary>
Use the ypbind service to access NIS services.
</summary>
@@ -101373,7 +102107,7 @@ Use the ypbind service to access NIS services.
<p>
Allow the specified domain to use the ypbind service
to access Network Information Service (NIS) services.
-Information that can be retreived from NIS includes
+Information that can be retrieved from NIS includes
usernames, passwords, home directories, and groups.
If the network is configured to have a single sign-on
using NIS, it is likely that any program that does
@@ -101388,7 +102122,7 @@ Domain allowed access.
<infoflow type="both" weight="10"/>
<rolecap/>
</interface>
-<interface name="nis_authenticate" lineno="105">
+<interface name="nis_authenticate" lineno="104">
<summary>
Use nis to authenticate passwords.
</summary>
@@ -101399,7 +102133,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="nis_domtrans_ypbind" lineno="123">
+<interface name="nis_domtrans_ypbind" lineno="122">
<summary>
Execute ypbind in the ypbind domain.
</summary>
@@ -101409,7 +102143,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="nis_exec_ypbind" lineno="142">
+<interface name="nis_exec_ypbind" lineno="141">
<summary>
Execute ypbind in the caller domain.
</summary>
@@ -101419,7 +102153,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_run_ypbind" lineno="168">
+<interface name="nis_run_ypbind" lineno="167">
<summary>
Execute ypbind in the ypbind domain, and
allow the specified role the ypbind domain.
@@ -101436,7 +102170,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="nis_signal_ypbind" lineno="187">
+<interface name="nis_signal_ypbind" lineno="186">
<summary>
Send generic signals to ypbind.
</summary>
@@ -101446,7 +102180,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_list_var_yp" lineno="205">
+<interface name="nis_list_var_yp" lineno="204">
<summary>
List nis data directories.
</summary>
@@ -101456,9 +102190,19 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_read_ypbind_pid" lineno="224">
+<interface name="nis_read_ypbind_pid" lineno="223">
+<summary>
+Read ypbind pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="nis_read_ypbind_runtime_files" lineno="238">
<summary>
-Read ypbind pid files.
+Read ypbind runtime files.
</summary>
<param name="domain">
<summary>
@@ -101466,9 +102210,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_delete_ypbind_pid" lineno="243">
+<interface name="nis_delete_ypbind_pid" lineno="257">
<summary>
-Delete ypbind pid files.
+Delete ypbind pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -101476,7 +102220,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_read_ypserv_config" lineno="261">
+<interface name="nis_read_ypserv_config" lineno="271">
<summary>
Read ypserv configuration files.
</summary>
@@ -101486,7 +102230,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_domtrans_ypxfr" lineno="280">
+<interface name="nis_domtrans_ypxfr" lineno="290">
<summary>
Execute ypxfr in the ypxfr domain.
</summary>
@@ -101496,7 +102240,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="nis_initrc_domtrans" lineno="301">
+<interface name="nis_initrc_domtrans" lineno="311">
<summary>
Execute nis init scripts in
the init script domain.
@@ -101507,7 +102251,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="nis_initrc_domtrans_ypbind" lineno="320">
+<interface name="nis_initrc_domtrans_ypbind" lineno="330">
<summary>
Execute ypbind init scripts in
the init script domain.
@@ -101518,7 +102262,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="nis_admin" lineno="345">
+<interface name="nis_admin" lineno="355">
<summary>
All of the rules required to
administrate an nis environment.
@@ -101624,7 +102368,7 @@ Domain allowed access.
<interface name="nscd_dontaudit_search_pid" lineno="186">
<summary>
Do not audit attempts to search
-nscd pid directories.
+nscd pid directories. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -101632,9 +102376,9 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="nscd_read_pid" lineno="204">
+<interface name="nscd_read_pid" lineno="201">
<summary>
-Read nscd pid files.
+Read nscd pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -101642,7 +102386,28 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nscd_unconfined" lineno="223">
+<interface name="nscd_dontaudit_search_runtime" lineno="217">
+<summary>
+Do not audit attempts to search
+nscd runtime directories.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="nscd_read_runtime_files" lineno="235">
+<summary>
+Read nscd runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="nscd_unconfined" lineno="254">
<summary>
Unconfined access to nscd services.
</summary>
@@ -101652,7 +102417,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nscd_run" lineno="248">
+<interface name="nscd_run" lineno="279">
<summary>
Execute nscd in the nscd domain, and
allow the specified role the nscd domain.
@@ -101668,7 +102433,7 @@ Role allowed access.
</summary>
</param>
</interface>
-<interface name="nscd_initrc_domtrans" lineno="268">
+<interface name="nscd_initrc_domtrans" lineno="299">
<summary>
Execute the nscd server init
script in the initrc domain.
@@ -101679,7 +102444,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="nscd_admin" lineno="293">
+<interface name="nscd_admin" lineno="324">
<summary>
All of the rules required to
administrate an nscd environment.
@@ -101749,7 +102514,7 @@ Domain allowed to transition.
</interface>
<interface name="nslcd_read_pid_files" lineno="50">
<summary>
-Read nslcd pid files.
+Read nslcd pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -101757,7 +102522,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nslcd_stream_connect" lineno="70">
+<interface name="nslcd_stream_connect" lineno="65">
<summary>
Connect to nslcd over an unix
domain stream socket.
@@ -101768,7 +102533,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nslcd_admin" lineno="96">
+<interface name="nslcd_admin" lineno="91">
<summary>
All of the rules required to
administrate an nslcd environment.
@@ -102175,7 +102940,7 @@ Domain allowed to transition.
<interface name="oddjob_system_entry" lineno="38">
<summary>
Make the specified program domain
-accessable from the oddjob.
+accessible from the oddjob.
</summary>
<param name="domain">
<summary>
@@ -102401,7 +103166,17 @@ Domain allowed to transition.
</interface>
<interface name="openct_read_pid_files" lineno="69">
<summary>
-Read openct pid files.
+Read openct pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="openct_read_runtime_files" lineno="84">
+<summary>
+Read openct runtime files.
</summary>
<param name="domain">
<summary>
@@ -102409,7 +103184,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="openct_stream_connect" lineno="89">
+<interface name="openct_stream_connect" lineno="104">
<summary>
Connect to openct over an unix
domain stream socket.
@@ -102420,7 +103195,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="openct_admin" lineno="115">
+<interface name="openct_admin" lineno="130">
<summary>
All of the rules required to
administrate an openct environment.
@@ -102578,7 +103353,17 @@ Domain allowed to transition.
</interface>
<interface name="openvswitch_read_pid_files" lineno="32">
<summary>
-Read openvswitch pid files.
+Read openvswitch pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="openvswitch_read_runtime_files" lineno="47">
+<summary>
+Read openvswitch runtime files.
</summary>
<param name="domain">
<summary>
@@ -102586,7 +103371,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="openvswitch_admin" lineno="58">
+<interface name="openvswitch_admin" lineno="73">
<summary>
All of the rules required to
administrate an openvswitch environment.
@@ -102623,6 +103408,13 @@ Role allowed access.
</param>
<rolecap/>
</interface>
+<tunable name="pacemaker_startstop_all_services" dftval="false">
+<desc>
+<p>
+Allow pacemaker to start/stop services
+</p>
+</desc>
+</tunable>
</module>
<module name="pads" filename="policy/modules/services/pads.if">
<summary>Passive Asset Detection System.</summary>
@@ -102658,7 +103450,17 @@ Domain allowed to transition.
</interface>
<interface name="pcscd_read_pid_files" lineno="32">
<summary>
-Read pcscd pid files.
+Read pcscd pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="pcscd_read_runtime_files" lineno="47">
+<summary>
+Read pcscd runtime files.
</summary>
<param name="domain">
<summary>
@@ -102666,7 +103468,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="pcscd_stream_connect" lineno="52">
+<interface name="pcscd_stream_connect" lineno="67">
<summary>
Connect to pcscd over an unix
domain stream socket.
@@ -102677,7 +103479,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="pcscd_admin" lineno="81">
+<interface name="pcscd_admin" lineno="96">
<summary>
All of the rules required to
administrate an pcscd environment.
@@ -102933,7 +103735,27 @@ Domain allowed access.
</interface>
<interface name="plymouthd_read_pid_files" lineno="244">
<summary>
-Read plymouthd pid files.
+Read plymouthd pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="plymouthd_delete_pid_files" lineno="259">
+<summary>
+Delete the plymouthd pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="plymouthd_read_runtime_files" lineno="274">
+<summary>
+Read plymouthd runtime files.
</summary>
<param name="domain">
<summary>
@@ -102941,9 +103763,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="plymouthd_delete_pid_files" lineno="264">
+<interface name="plymouthd_delete_runtime_files" lineno="293">
<summary>
-Delete the plymouthd pid files.
+Delete the plymouthd runtime files.
</summary>
<param name="domain">
<summary>
@@ -102951,7 +103773,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="plymouthd_admin" lineno="290">
+<interface name="plymouthd_admin" lineno="319">
<summary>
All of the rules required to
administrate an plymouthd environment.
@@ -104263,7 +105085,7 @@ Domain allowed access.
</interface>
<interface name="ppp_read_pid_files" lineno="366">
<summary>
-Read ppp pid files.
+Read ppp pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -104271,10 +105093,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ppp_manage_pid_files" lineno="386">
+<interface name="ppp_manage_pid_files" lineno="382">
<summary>
Create, read, write, and delete
-ppp pid files.
+ppp pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -104282,9 +105104,51 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ppp_pid_filetrans" lineno="416">
+<interface name="ppp_pid_filetrans" lineno="408">
<summary>
Create specified pppd pid objects
+with a type transition. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object_class">
+<summary>
+Class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="ppp_read_runtime_files" lineno="423">
+<summary>
+Read ppp runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="ppp_manage_runtime_files" lineno="443">
+<summary>
+Create, read, write, and delete
+ppp runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="ppp_runtime_filetrans" lineno="473">
+<summary>
+Create specified pppd runtime objects
with a type transition.
</summary>
<param name="domain">
@@ -104303,7 +105167,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="ppp_initrc_domtrans" lineno="435">
+<interface name="ppp_initrc_domtrans" lineno="492">
<summary>
Execute pppd init script in
the initrc domain.
@@ -104314,7 +105178,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ppp_admin" lineno="460">
+<interface name="ppp_admin" lineno="517">
<summary>
All of the rules required to
administrate an ppp environment.
@@ -104608,7 +105472,7 @@ Domain allowed access.
</interface>
<interface name="psad_read_pid_files" lineno="111">
<summary>
-Read psad pid files.
+Read psad pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -104616,9 +105480,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="psad_rw_pid_files" lineno="130">
+<interface name="psad_rw_pid_files" lineno="125">
<summary>
-Read and write psad pid files.
+Read and write psad pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -104626,7 +105490,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="psad_read_log" lineno="150">
+<interface name="psad_read_log" lineno="140">
<summary>
Read psad log content.
</summary>
@@ -104637,7 +105501,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="psad_append_log" lineno="171">
+<interface name="psad_append_log" lineno="161">
<summary>
Append psad log files.
</summary>
@@ -104648,7 +105512,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="psad_rw_fifo_file" lineno="190">
+<interface name="psad_rw_fifo_file" lineno="180">
<summary>
Read and write psad fifo files.
</summary>
@@ -104658,7 +105522,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="psad_rw_tmp_files" lineno="209">
+<interface name="psad_rw_tmp_files" lineno="199">
<summary>
Read and write psad temporary files.
</summary>
@@ -104668,7 +105532,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="psad_admin" lineno="235">
+<interface name="psad_admin" lineno="225">
<summary>
All of the rules required to
administrate an psad environment.
@@ -104949,7 +105813,7 @@ Domain allowed to transition.
</interface>
<interface name="qpidd_read_pid_files" lineno="87">
<summary>
-Read qpidd pid files.
+Read qpidd pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -104957,7 +105821,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qpidd_search_lib" lineno="106">
+<interface name="qpidd_search_lib" lineno="101">
<summary>
Search qpidd lib directories.
</summary>
@@ -104967,7 +105831,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qpidd_read_lib_files" lineno="125">
+<interface name="qpidd_read_lib_files" lineno="120">
<summary>
Read qpidd lib files.
</summary>
@@ -104977,7 +105841,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qpidd_manage_lib_files" lineno="145">
+<interface name="qpidd_manage_lib_files" lineno="140">
<summary>
Create, read, write, and delete
qpidd lib files.
@@ -104988,7 +105852,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qpidd_admin" lineno="171">
+<interface name="qpidd_admin" lineno="166">
<summary>
All of the rules required to
administrate an qpidd environment.
@@ -105603,123 +106467,6 @@ Determine whether fenced can use ssh.
</desc>
</tunable>
</module>
-<module name="rhgb" filename="policy/modules/services/rhgb.if">
-<summary> Red Hat Graphical Boot.</summary>
-<interface name="rhgb_stub" lineno="13">
-<summary>
-RHGB stub interface. No access allowed.
-</summary>
-<param name="domain" unused="true">
-<summary>
-N/A
-</summary>
-</param>
-</interface>
-<interface name="rhgb_use_fds" lineno="29">
-<summary>
-Inherit and use rhgb file descriptors.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_getpgid" lineno="47">
-<summary>
-Get the process group of rhgb.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_signal" lineno="65">
-<summary>
-Send generic signals to rhgb.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_rw_stream_sockets" lineno="84">
-<summary>
-Read and write inherited rhgb unix
-domain stream sockets.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_dontaudit_rw_stream_sockets" lineno="103">
-<summary>
-Do not audit attempts to read and write
-rhgb unix domain stream sockets.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_stream_connect" lineno="122">
-<summary>
-Connected to rhgb with a unix
-domain stream socket.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_rw_shm" lineno="141">
-<summary>
-Read and write to rhgb shared memory.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_use_ptys" lineno="159">
-<summary>
-Read and write rhgb pty devices.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_dontaudit_use_ptys" lineno="179">
-<summary>
-Do not audit attempts to read and
-write rhgb pty devices.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="rhgb_rw_tmpfs_files" lineno="197">
-<summary>
-Read and write to rhgb tmpfs files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-</module>
<module name="rhsmcertd" filename="policy/modules/services/rhsmcertd.if">
<summary>Subscription Management Certificate Daemon.</summary>
<interface name="rhsmcertd_domtrans" lineno="13">
@@ -105819,7 +106566,7 @@ Domain allowed access.
</interface>
<interface name="rhsmcertd_read_pid_files" lineno="190">
<summary>
-Read rhsmcertd pid files.
+Read rhsmcertd pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -105827,7 +106574,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rhsmcertd_stream_connect" lineno="210">
+<interface name="rhsmcertd_stream_connect" lineno="205">
<summary>
Connect to rhsmcertd with a
unix domain stream socket.
@@ -105838,7 +106585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rhsmcertd_dbus_chat" lineno="230">
+<interface name="rhsmcertd_dbus_chat" lineno="225">
<summary>
Send and receive messages from
rhsmcertd over dbus.
@@ -105849,7 +106596,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rhsmcertd_dontaudit_dbus_chat" lineno="252">
+<interface name="rhsmcertd_dontaudit_dbus_chat" lineno="247">
<summary>
Do not audit attempts to send
and receive messages from
@@ -105861,7 +106608,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="rhsmcertd_admin" lineno="279">
+<interface name="rhsmcertd_admin" lineno="274">
<summary>
All of the rules required to
administrate an rhsmcertd environment.
@@ -105916,7 +106663,7 @@ Domain to not audit.
<interface name="ricci_dontaudit_rw_modcluster_pipes" lineno="72">
<summary>
Do not audit attempts to read write
-ricci modcluster unamed pipes.
+ricci modcluster unnamed pipes.
</summary>
<param name="domain">
<summary>
@@ -106103,26 +106850,6 @@ Role allowed access.
<rolecap/>
</interface>
</module>
-<module name="roundup" filename="policy/modules/services/roundup.if">
-<summary>Roundup Issue Tracking System.</summary>
-<interface name="roundup_admin" lineno="20">
-<summary>
-All of the rules required to
-administrate an roundup environment.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-</module>
<module name="rpc" filename="policy/modules/services/rpc.if">
<summary>Remote Procedure Call Daemon.</summary>
<interface name="rpc_stub" lineno="13">
@@ -106373,7 +107100,7 @@ Domain allowed access.
</interface>
<interface name="rpcbind_read_pid_files" lineno="52">
<summary>
-Read rpcbind pid files.
+Read rpcbind pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -106381,7 +107108,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpcbind_search_lib" lineno="71">
+<interface name="rpcbind_search_lib" lineno="66">
<summary>
Search rpcbind lib directories.
</summary>
@@ -106391,7 +107118,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpcbind_read_lib_files" lineno="90">
+<interface name="rpcbind_read_lib_files" lineno="85">
<summary>
Read rpcbind lib files.
</summary>
@@ -106401,7 +107128,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpcbind_manage_lib_files" lineno="110">
+<interface name="rpcbind_manage_lib_files" lineno="105">
<summary>
Create, read, write, and delete
rpcbind lib files.
@@ -106412,7 +107139,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpcbind_signull" lineno="129">
+<interface name="rpcbind_signull" lineno="124">
<summary>
Send null signals to rpcbind.
</summary>
@@ -106422,7 +107149,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="rpcbind_admin" lineno="154">
+<interface name="rpcbind_admin" lineno="149">
<summary>
All of the rules required to
administrate an rpcbind environment.
@@ -106990,7 +107717,47 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="samba_search_var" lineno="341">
+<interface name="samba_start" lineno="341">
+<summary>
+start samba daemon
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="samba_stop" lineno="361">
+<summary>
+stop samba daemon
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="samba_status" lineno="381">
+<summary>
+get status of samba daemon
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="samba_reload" lineno="401">
+<summary>
+reload samba daemon
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="samba_search_var" lineno="421">
<summary>
Search samba var directories.
</summary>
@@ -107000,7 +107767,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="samba_read_var_files" lineno="360">
+<interface name="samba_read_var_files" lineno="440">
<summary>
Read samba var files.
</summary>
@@ -107010,7 +107777,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="samba_dontaudit_write_var_files" lineno="380">
+<interface name="samba_dontaudit_write_var_files" lineno="460">
<summary>
Do not audit attempts to write
samba var files.
@@ -107021,7 +107788,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="samba_rw_var_files" lineno="398">
+<interface name="samba_rw_var_files" lineno="478">
<summary>
Read and write samba var files.
</summary>
@@ -107031,7 +107798,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="samba_manage_var_files" lineno="418">
+<interface name="samba_manage_var_files" lineno="498">
<summary>
Create, read, write, and delete
samba var files.
@@ -107042,7 +107809,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="samba_domtrans_smbcontrol" lineno="437">
+<interface name="samba_domtrans_smbcontrol" lineno="517">
<summary>
Execute smbcontrol in the smbcontrol domain.
</summary>
@@ -107052,7 +107819,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="samba_run_smbcontrol" lineno="463">
+<interface name="samba_run_smbcontrol" lineno="543">
<summary>
Execute smbcontrol in the smbcontrol
domain, and allow the specified
@@ -107069,7 +107836,7 @@ Role allowed access.
</summary>
</param>
</interface>
-<interface name="samba_domtrans_smbd" lineno="482">
+<interface name="samba_domtrans_smbd" lineno="562">
<summary>
Execute smbd in the smbd domain.
</summary>
@@ -107079,7 +107846,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="samba_signal_smbd" lineno="501">
+<interface name="samba_signal_smbd" lineno="581">
<summary>
Send generic signals to smbd.
</summary>
@@ -107089,7 +107856,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="samba_dontaudit_use_fds" lineno="519">
+<interface name="samba_dontaudit_use_fds" lineno="599">
<summary>
Do not audit attempts to inherit
and use smbd file descriptors.
@@ -107100,7 +107867,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="samba_write_smbmount_tcp_sockets" lineno="537">
+<interface name="samba_write_smbmount_tcp_sockets" lineno="617">
<summary>
Write smbmount tcp sockets.
</summary>
@@ -107110,7 +107877,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="samba_rw_smbmount_tcp_sockets" lineno="555">
+<interface name="samba_rw_smbmount_tcp_sockets" lineno="635">
<summary>
Read and write smbmount tcp sockets.
</summary>
@@ -107120,7 +107887,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="samba_domtrans_winbind_helper" lineno="574">
+<interface name="samba_domtrans_winbind_helper" lineno="654">
<summary>
Execute winbind helper in the
winbind helper domain.
@@ -107131,7 +107898,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="samba_getattr_winbind_exec" lineno="593">
+<interface name="samba_getattr_winbind_exec" lineno="673">
<summary>
Get attributes of winbind executable files.
</summary>
@@ -107141,7 +107908,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="samba_run_winbind_helper" lineno="619">
+<interface name="samba_run_winbind_helper" lineno="699">
<summary>
Execute winbind helper in the winbind
helper domain, and allow the specified
@@ -107159,9 +107926,19 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="samba_read_winbind_pid" lineno="638">
+<interface name="samba_read_winbind_pid" lineno="718">
+<summary>
+Read winbind pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="samba_read_winbind_runtime_files" lineno="733">
<summary>
-Read winbind pid files.
+Read winbind runtime files.
</summary>
<param name="domain">
<summary>
@@ -107169,7 +107946,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="samba_stream_connect_winbind" lineno="658">
+<interface name="samba_stream_connect_winbind" lineno="753">
<summary>
Connect to winbind with a unix
domain stream socket.
@@ -107180,7 +107957,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="samba_admin" lineno="684">
+<interface name="samba_admin" lineno="779">
<summary>
All of the rules required to
administrate an samba environment.
@@ -107315,7 +108092,7 @@ Domain allowed to transition.
<interface name="sanlock_manage_pid_files" lineno="52">
<summary>
Create, read, write, and delete
-sanlock pid files.
+sanlock pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -107323,7 +108100,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sanlock_stream_connect" lineno="72">
+<interface name="sanlock_stream_connect" lineno="67">
<summary>
Connect to sanlock with a unix
domain stream socket.
@@ -107334,7 +108111,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sanlock_admin" lineno="98">
+<interface name="sanlock_admin" lineno="93">
<summary>
All of the rules required to
administrate an sanlock environment.
@@ -107718,7 +108495,7 @@ Role allowed access.
</interface>
</module>
<module name="shibboleth" filename="policy/modules/services/shibboleth.if">
-<summary>Shibboleth authentication deamon</summary>
+<summary>Shibboleth authentication daemon</summary>
<interface name="shibboleth_read_config" lineno="14">
<summary>
Allow your application domain to access
@@ -107848,7 +108625,7 @@ Domain allowed to transition.
</interface>
<interface name="smokeping_read_pid_files" lineno="51">
<summary>
-Read smokeping pid files.
+Read smokeping pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -107856,10 +108633,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="smokeping_manage_pid_files" lineno="71">
+<interface name="smokeping_manage_pid_files" lineno="66">
<summary>
Create, read, write, and delete
-smokeping pid files.
+smokeping pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -107867,7 +108644,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="smokeping_getattr_lib_files" lineno="90">
+<interface name="smokeping_getattr_lib_files" lineno="80">
<summary>
Get attributes of smokeping lib files.
</summary>
@@ -107877,7 +108654,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="smokeping_read_lib_files" lineno="109">
+<interface name="smokeping_read_lib_files" lineno="99">
<summary>
Read smokeping lib files.
</summary>
@@ -107887,7 +108664,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="smokeping_manage_lib_files" lineno="129">
+<interface name="smokeping_manage_lib_files" lineno="119">
<summary>
Create, read, write, and delete
smokeping lib files.
@@ -107898,7 +108675,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="smokeping_admin" lineno="155">
+<interface name="smokeping_admin" lineno="145">
<summary>
All of the rules required to
administrate a smokeping environment.
@@ -108157,7 +108934,29 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_exec_spamd" lineno="114">
+<interface name="spamassassin_reload" lineno="115">
+<summary>
+reload SA service
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="spamassassin_status" lineno="135">
+<summary>
+Get SA service status
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="spamassassin_exec_spamd" lineno="154">
<summary>
Execute spamd in the caller domain.
</summary>
@@ -108167,7 +108966,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_domtrans_client" lineno="133">
+<interface name="spamassassin_domtrans_client" lineno="173">
<summary>
Execute spamc in the spamc domain.
</summary>
@@ -108177,7 +108976,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="spamassassin_exec_client" lineno="152">
+<interface name="spamassassin_exec_client" lineno="192">
<summary>
Execute spamc in the caller domain.
</summary>
@@ -108187,7 +108986,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_kill_client" lineno="171">
+<interface name="spamassassin_kill_client" lineno="211">
<summary>
Send kill signals to spamc.
</summary>
@@ -108197,7 +108996,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_domtrans_local_client" lineno="190">
+<interface name="spamassassin_domtrans_local_client" lineno="230">
<summary>
Execute spamassassin standalone client
in the user spamassassin domain.
@@ -108208,7 +109007,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="spamassassin_manage_spamd_home_content" lineno="210">
+<interface name="spamassassin_manage_spamd_home_content" lineno="250">
<summary>
Create, read, write, and delete
spamd home content.
@@ -108219,7 +109018,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_relabel_spamd_home_content" lineno="231">
+<interface name="spamassassin_relabel_spamd_home_content" lineno="271">
<summary>
Relabel spamd home content.
</summary>
@@ -108229,7 +109028,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_home_filetrans_spamd_home" lineno="263">
+<interface name="spamassassin_home_filetrans_spamd_home" lineno="303">
<summary>
Create objects in user home
directories with the spamd home type.
@@ -108250,7 +109049,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="spamassassin_read_lib_files" lineno="281">
+<interface name="spamassassin_read_lib_files" lineno="321">
<summary>
Read spamd lib files.
</summary>
@@ -108260,7 +109059,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_manage_lib_files" lineno="301">
+<interface name="spamassassin_manage_lib_files" lineno="341">
<summary>
Create, read, write, and delete
spamd lib files.
@@ -108271,9 +109070,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_read_spamd_pid_files" lineno="320">
+<interface name="spamassassin_read_spamd_pid_files" lineno="360">
<summary>
-Read spamd pid files.
+Read spamd pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -108281,7 +109080,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_read_spamd_tmp_files" lineno="339">
+<interface name="spamassassin_read_spamd_runtime_files" lineno="375">
+<summary>
+Read spamd runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="spamassassin_read_spamd_tmp_files" lineno="394">
<summary>
Read temporary spamd files.
</summary>
@@ -108291,7 +109100,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="358">
+<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="413">
<summary>
Do not audit attempts to get
attributes of temporary spamd sockets.
@@ -108302,7 +109111,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="spamassassin_stream_connect_spamd" lineno="377">
+<interface name="spamassassin_stream_connect_spamd" lineno="432">
<summary>
Connect to spamd with a unix
domain stream socket.
@@ -108313,7 +109122,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="spamassassin_admin" lineno="403">
+<interface name="spamassassin_admin" lineno="458">
<summary>
All of the rules required to
administrate an spamassassin environment.
@@ -108346,9 +109155,14 @@ generic user home content.
</p>
</desc>
</tunable>
-</module>
-<module name="speedtouch" filename="policy/modules/services/speedtouch.if">
-<summary>Alcatel speedtouch USB ADSL modem</summary>
+<tunable name="rspamd_spamd" dftval="false">
+<desc>
+<p>
+Determine whether extra rules should
+be enabled to support rspamd.
+</p>
+</desc>
+</tunable>
</module>
<module name="squid" filename="policy/modules/services/squid.if">
<summary>Squid caching http proxy server.</summary>
@@ -108545,7 +109359,7 @@ The role associated with the user domain.
</summary>
</param>
</template>
-<template name="ssh_server_template" lineno="169">
+<template name="ssh_server_template" lineno="168">
<summary>
The template to define a ssh server.
</summary>
@@ -108565,7 +109379,7 @@ is the prefix for sshd_t).
</summary>
</param>
</template>
-<template name="ssh_role_template" lineno="300">
+<template name="ssh_role_template" lineno="298">
<summary>
Role access for ssh
</summary>
@@ -108586,7 +109400,7 @@ User domain for the role
</summary>
</param>
</template>
-<interface name="ssh_sigchld" lineno="453">
+<interface name="ssh_sigchld" lineno="455">
<summary>
Send a SIGCHLD signal to the ssh server.
</summary>
@@ -108596,7 +109410,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_signal" lineno="471">
+<interface name="ssh_signal" lineno="473">
<summary>
Send a generic signal to the ssh server.
</summary>
@@ -108606,7 +109420,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_signull" lineno="489">
+<interface name="ssh_signull" lineno="491">
<summary>
Send a null signal to sshd processes.
</summary>
@@ -108616,7 +109430,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_read_pipes" lineno="507">
+<interface name="ssh_read_pipes" lineno="509">
<summary>
Read a ssh server unnamed pipe.
</summary>
@@ -108626,7 +109440,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_rw_pipes" lineno="524">
+<interface name="ssh_rw_pipes" lineno="526">
<summary>
Read and write a ssh server unnamed pipe.
</summary>
@@ -108636,7 +109450,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_rw_stream_sockets" lineno="542">
+<interface name="ssh_rw_stream_sockets" lineno="544">
<summary>
Read and write ssh server unix domain stream sockets.
</summary>
@@ -108646,7 +109460,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_rw_tcp_sockets" lineno="560">
+<interface name="ssh_rw_tcp_sockets" lineno="562">
<summary>
Read and write ssh server TCP sockets.
</summary>
@@ -108656,7 +109470,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="579">
+<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="581">
<summary>
Do not audit attempts to read and write
ssh server TCP sockets.
@@ -108667,7 +109481,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="ssh_exec_sshd" lineno="597">
+<interface name="ssh_exec_sshd" lineno="599">
<summary>
Execute the ssh daemon in the caller domain.
</summary>
@@ -108677,7 +109491,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_domtrans" lineno="616">
+<interface name="ssh_domtrans" lineno="618">
<summary>
Execute the ssh daemon sshd domain.
</summary>
@@ -108687,7 +109501,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ssh_exec" lineno="634">
+<interface name="ssh_exec" lineno="636">
<summary>
Execute the ssh client in the caller domain.
</summary>
@@ -108697,7 +109511,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_setattr_key_files" lineno="653">
+<interface name="ssh_setattr_key_files" lineno="655">
<summary>
Set the attributes of sshd key files.
</summary>
@@ -108707,7 +109521,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_agent_exec" lineno="672">
+<interface name="ssh_agent_exec" lineno="674">
<summary>
Execute the ssh agent client in the caller domain.
</summary>
@@ -108717,7 +109531,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_read_user_home_files" lineno="691">
+<interface name="ssh_read_user_home_files" lineno="693">
<summary>
Read ssh home directory content
</summary>
@@ -108727,7 +109541,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_domtrans_keygen" lineno="712">
+<interface name="ssh_domtrans_keygen" lineno="714">
<summary>
Execute the ssh key generator in the ssh keygen domain.
</summary>
@@ -108737,7 +109551,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ssh_dontaudit_read_server_keys" lineno="730">
+<interface name="ssh_dontaudit_read_server_keys" lineno="732">
<summary>
Read ssh server keys
</summary>
@@ -108747,7 +109561,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="ssh_manage_home_files" lineno="748">
+<interface name="ssh_manage_home_files" lineno="750">
<summary>
Manage ssh home directory content
</summary>
@@ -108757,7 +109571,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_delete_tmp" lineno="767">
+<interface name="ssh_delete_tmp" lineno="769">
<summary>
Delete from the ssh temp files.
</summary>
@@ -108767,6 +109581,16 @@ Domain allowed access.
</summary>
</param>
</interface>
+<interface name="ssh_dontaudit_agent_tmp" lineno="788">
+<summary>
+dontaudit access to ssh agent tmp dirs
+</summary>
+<param name="domain">
+<summary>
+Domain not to audit.
+</summary>
+</param>
+</interface>
<tunable name="allow_ssh_keysign" dftval="false">
<desc>
<p>
@@ -108876,7 +109700,7 @@ Domain allowed access.
</interface>
<interface name="sssd_read_pid_files" lineno="168">
<summary>
-Read sssd pid files.
+Read sssd pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -108884,10 +109708,20 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sssd_manage_pids" lineno="188">
+<interface name="sssd_manage_pids" lineno="184">
<summary>
Create, read, write, and delete
-sssd pid content.
+sssd pid content. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sssd_read_runtime_files" lineno="198">
+<summary>
+Read sssd runtime files.
</summary>
<param name="domain">
<summary>
@@ -108895,7 +109729,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sssd_search_lib" lineno="208">
+<interface name="sssd_search_lib" lineno="217">
<summary>
Search sssd lib directories.
</summary>
@@ -108905,7 +109739,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sssd_dontaudit_search_lib" lineno="228">
+<interface name="sssd_dontaudit_search_lib" lineno="237">
<summary>
Do not audit attempts to search
sssd lib directories.
@@ -108916,7 +109750,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="sssd_read_lib_files" lineno="246">
+<interface name="sssd_read_lib_files" lineno="255">
<summary>
Read sssd lib files.
</summary>
@@ -108926,7 +109760,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sssd_manage_lib_files" lineno="267">
+<interface name="sssd_manage_lib_files" lineno="276">
<summary>
Create, read, write, and delete
sssd lib files.
@@ -108937,7 +109771,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sssd_dbus_chat" lineno="288">
+<interface name="sssd_dbus_chat" lineno="297">
<summary>
Send and receive messages from
sssd over dbus.
@@ -108948,7 +109782,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sssd_stream_connect" lineno="309">
+<interface name="sssd_stream_connect" lineno="318">
<summary>
Connect to sssd with a unix
domain stream socket.
@@ -108959,7 +109793,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sssd_admin" lineno="335">
+<interface name="sssd_admin" lineno="344">
<summary>
All of the rules required to
administrate an sssd environment.
@@ -109427,7 +110261,94 @@ tcp sockets to all unreserved ports.
</module>
<module name="tpm2" filename="policy/modules/services/tpm2.if">
<summary>Trusted Platform Module 2.0</summary>
-<interface name="tpm2_enabledisable_abrmd" lineno="13">
+<interface name="tpm2_exec" lineno="14">
+<summary>
+Execute tpm2_* processes
+in the caller domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_domtrans" lineno="33">
+<summary>
+Execute tpm2_* processes in the tpm2 domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_run" lineno="58">
+<summary>
+Execute tpm2_* processes in the tpm2
+domain and allow the specified role
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_use_fds" lineno="78">
+<summary>
+Use tpm2 file descriptors.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_dontaudit_use_fds" lineno="97">
+<summary>
+Do not audit attempts to inherit file
+descriptors from tpm2.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_dbus_chat_abrmd" lineno="116">
+<summary>
+Send and receive messages from
+tpm2-abrmd over dbus.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_read_pipes" lineno="144">
+<summary>
+Allow tpm2 to read unnamed pipes from other process.
+</summary>
+<desc>
+<p>
+Allow the tpm to open and read pipes from other
+domain. This is seen when piping input to one
+of the tpm2_* processes. For example:
+sha512sum my_file | tpm2_hmac -k 0x81001000 -g sha256 /dev/stdin
+</p>
+</desc>
+<param name="domain">
+<summary>
+Domain of pipe to be read by tpm2_t.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_enabledisable_abrmd" lineno="162">
<summary>
Allow specified domain to enable/disable tpm2-abrmd unit
</summary>
@@ -109437,7 +110358,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="tpm2_startstop_abrmd" lineno="32">
+<interface name="tpm2_startstop_abrmd" lineno="181">
<summary>
Allow specified domain to start/stop tpm2-abrmd unit
</summary>
@@ -109447,7 +110368,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="tpm2_status_abrmd" lineno="51">
+<interface name="tpm2_status_abrmd" lineno="200">
<summary>
Allow specified domain to get status of tpm2-abrmd unit
</summary>
@@ -109457,6 +110378,16 @@ Domain allowed access.
</summary>
</param>
</interface>
+<interface name="tpm2_rw_abrmd_pipes" lineno="219">
+<summary>
+access tpm2-abrmd fifos
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access
+</summary>
+</param>
+</interface>
</module>
<module name="transproxy" filename="policy/modules/services/transproxy.if">
<summary>Portable Transparent Proxy Solution.</summary>
@@ -109502,7 +110433,7 @@ Domain allowed access.
</interface>
<interface name="tuned_read_pid_files" lineno="51">
<summary>
-Read tuned pid files.
+Read tuned pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -109510,10 +110441,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="tuned_manage_pid_files" lineno="71">
+<interface name="tuned_manage_pid_files" lineno="66">
<summary>
Create, read, write, and delete
-tuned pid files.
+tuned pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -109521,7 +110452,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="tuned_initrc_domtrans" lineno="91">
+<interface name="tuned_initrc_domtrans" lineno="81">
<summary>
Execute tuned init scripts in
the initrc domain.
@@ -109532,7 +110463,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="tuned_admin" lineno="116">
+<interface name="tuned_admin" lineno="106">
<summary>
All of the rules required to
administrate an tuned environment.
@@ -109813,7 +110744,7 @@ Domain allowed access.
</interface>
<interface name="uuidd_read_pid_files" lineno="129">
<summary>
-Read uuidd pid files.
+Read uuidd pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -109821,7 +110752,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="uuidd_stream_connect_manager" lineno="149">
+<interface name="uuidd_stream_connect_manager" lineno="144">
<summary>
Connect to uuidd with an unix
domain stream socket.
@@ -109832,7 +110763,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="uuidd_admin" lineno="175">
+<interface name="uuidd_admin" lineno="170">
<summary>
All of the rules required to
administrate an uuidd environment.
@@ -110013,7 +110944,7 @@ Domain allowed access.
</interface>
<interface name="vdagent_read_pid_files" lineno="69">
<summary>
-Read vdagent pid files.
+Read vdagent pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -110021,7 +110952,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="vdagent_stream_connect" lineno="89">
+<interface name="vdagent_stream_connect" lineno="84">
<summary>
Connect to vdagent with a unix
domain stream socket.
@@ -110032,7 +110963,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="vdagent_admin" lineno="115">
+<interface name="vdagent_admin" lineno="110">
<summary>
All of the rules required to
administrate an vdagent environment.
@@ -110117,7 +111048,7 @@ Domain allowed access.
</interface>
<interface name="vhostmd_read_pid_files" lineno="128">
<summary>
-Read vhostmd pid files.
+Read vhostmd pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -110125,10 +111056,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="vhostmd_manage_pid_files" lineno="148">
+<interface name="vhostmd_manage_pid_files" lineno="143">
<summary>
Create, read, write, and delete
-vhostmd pid files.
+vhostmd pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -110136,7 +111067,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="vhostmd_stream_connect" lineno="168">
+<interface name="vhostmd_stream_connect" lineno="158">
<summary>
Connect to vhostmd with a unix
domain stream socket.
@@ -110147,7 +111078,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="vhostmd_dontaudit_rw_stream_connect" lineno="188">
+<interface name="vhostmd_dontaudit_rw_stream_connect" lineno="178">
<summary>
Do not audit attempts to read and
write vhostmd unix domain stream sockets.
@@ -110158,7 +111089,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="vhostmd_admin" lineno="213">
+<interface name="vhostmd_admin" lineno="203">
<summary>
All of the rules required to
administrate an vhostmd environment.
@@ -110550,7 +111481,7 @@ The name of the object being created.
</interface>
<interface name="virt_read_pid_files" lineno="808">
<summary>
-Read virt pid files.
+Read virt pid files. (Depprecated)
</summary>
<param name="domain">
<summary>
@@ -110558,10 +111489,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_manage_pid_files" lineno="828">
+<interface name="virt_manage_pid_files" lineno="824">
<summary>
Create, read, write, and delete
-virt pid files.
+virt pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -110569,7 +111500,43 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_search_lib" lineno="847">
+<interface name="virt_read_runtime_files" lineno="838">
+<summary>
+Read virt runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="virt_runtime_filetrans" lineno="873">
+<summary>
+Create an object in the libvirt runtime directory, with a private type.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="private type">
+<summary>
+The type of the object to be created.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+<infoflow type="write" weight="10"/>
+</interface>
+<interface name="virt_search_lib" lineno="891">
<summary>
Search virt lib directories.
</summary>
@@ -110579,7 +111546,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_read_lib_files" lineno="866">
+<interface name="virt_read_lib_files" lineno="910">
<summary>
Read virt lib files.
</summary>
@@ -110589,7 +111556,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_manage_lib_files" lineno="887">
+<interface name="virt_manage_lib_files" lineno="931">
<summary>
Create, read, write, and delete
virt lib files.
@@ -110600,10 +111567,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_pid_filetrans" lineno="923">
+<interface name="virt_pid_filetrans" lineno="967">
<summary>
Create objects in virt pid
-directories with a private type.
+directories with a private type. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -110627,7 +111594,7 @@ The name of the object being created.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="virt_read_log" lineno="943">
+<interface name="virt_read_log" lineno="983">
<summary>
Read virt log files.
</summary>
@@ -110638,7 +111605,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="virt_append_log" lineno="962">
+<interface name="virt_append_log" lineno="1002">
<summary>
Append virt log files.
</summary>
@@ -110648,7 +111615,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_manage_log" lineno="982">
+<interface name="virt_manage_log" lineno="1022">
<summary>
Create, read, write, and delete
virt log files.
@@ -110659,7 +111626,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_search_images" lineno="1003">
+<interface name="virt_search_images" lineno="1043">
<summary>
Search virt image directories.
</summary>
@@ -110669,7 +111636,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_read_images" lineno="1022">
+<interface name="virt_read_images" lineno="1062">
<summary>
Read virt image files.
</summary>
@@ -110679,7 +111646,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_rw_all_image_chr_files" lineno="1058">
+<interface name="virt_rw_all_image_chr_files" lineno="1098">
<summary>
Read and write all virt image
character files.
@@ -110690,7 +111657,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_manage_virt_cache" lineno="1079">
+<interface name="virt_manage_virt_cache" lineno="1119">
<summary>
Create, read, write, and delete
virt cache content.
@@ -110701,7 +111668,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_manage_images" lineno="1101">
+<interface name="virt_manage_images" lineno="1141">
<summary>
Create, read, write, and delete
virt image files.
@@ -110712,7 +111679,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_admin" lineno="1143">
+<interface name="virt_admin" lineno="1183">
<summary>
All of the rules required to
administrate an virt environment.
@@ -110802,6 +111769,14 @@ can use vfio for pci device pass through (vt-d).
</p>
</desc>
</tunable>
+<tunable name="virt_use_evdev" dftval="false">
+<desc>
+<p>
+Determine whether confined virtual guests
+can use input devices via evdev pass through.
+</p>
+</desc>
+</tunable>
</module>
<module name="vnstatd" filename="policy/modules/services/vnstatd.if">
<summary>Console network traffic monitor.</summary>
@@ -110832,59 +111807,7 @@ Role allowed access.
</summary>
</param>
</interface>
-<interface name="vnstatd_domtrans" lineno="58">
-<summary>
-Execute a domain transition to run vnstatd.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="vnstatd_search_lib" lineno="79">
-<summary>
-Search vnstatd lib directories.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="vnstatd_manage_lib_dirs" lineno="101">
-<summary>
-Create, read, write, and delete
-vnstatd lib directories.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="vnstatd_read_lib_files" lineno="122">
-<summary>
-Read vnstatd lib files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="vnstatd_manage_lib_files" lineno="144">
-<summary>
-Create, read, write, and delete
-vnstatd lib files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="vnstatd_admin" lineno="172">
+<interface name="vnstatd_admin" lineno="65">
<summary>
All of the rules required to
administrate an vnstatd environment.
@@ -110902,19 +111825,6 @@ Role allowed access.
<rolecap/>
</interface>
</module>
-<module name="w3c" filename="policy/modules/services/w3c.if">
-<summary>W3C Markup Validator.</summary>
-<tunable name="allow_httpd_w3c_validator_script_anon_write" dftval="false">
-<desc>
-<p>
-Determine whether the script domain can
-modify public files used for public file
-transfer services. Directories/Files must
-be labeled public_content_rw_t.
-</p>
-</desc>
-</tunable>
-</module>
<module name="watchdog" filename="policy/modules/services/watchdog.if">
<summary>Software watchdog.</summary>
<interface name="watchdog_admin" lineno="20">
@@ -111075,9 +111985,6 @@ Role allowed access.
<rolecap/>
</interface>
</module>
-<module name="xprint" filename="policy/modules/services/xprint.if">
-<summary>A X11-based print system and API.</summary>
-</module>
<module name="xserver" filename="policy/modules/services/xserver.if">
<summary>X Windows Server</summary>
<interface name="xserver_restricted_role" lineno="19">
@@ -111096,7 +112003,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_role" lineno="139">
+<interface name="xserver_role" lineno="140">
<summary>
Rules required for using the X Windows server
and environment.
@@ -111112,7 +112019,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_ro_session" lineno="236">
+<interface name="xserver_ro_session" lineno="209">
<summary>
Create sessions on the X server, with read-only
access to the X server shared
@@ -111129,7 +112036,7 @@ The type of the domain SYSV tmpfs files.
</summary>
</param>
</interface>
-<interface name="xserver_rw_session" lineno="278">
+<interface name="xserver_rw_session" lineno="251">
<summary>
Create sessions on the X server, with read and write
access to the X server shared
@@ -111146,7 +112053,7 @@ The type of the domain SYSV tmpfs files.
</summary>
</param>
</interface>
-<interface name="xserver_non_drawing_client" lineno="298">
+<interface name="xserver_non_drawing_client" lineno="271">
<summary>
Create non-drawing client sessions on an X server.
</summary>
@@ -111156,7 +112063,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<template name="xserver_common_x_domain_template" lineno="337">
+<template name="xserver_common_x_domain_template" lineno="310">
<summary>
Interface to provide X object permissions on a given X server to
an X client domain. Provides the minimal set required by a basic
@@ -111174,7 +112081,7 @@ Client domain allowed access.
</summary>
</param>
</template>
-<template name="xserver_object_types_template" lineno="396">
+<template name="xserver_object_types_template" lineno="369">
<summary>
Template for creating the set of types used
in an X windows domain.
@@ -111186,7 +112093,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="xserver_user_x_domain_template" lineno="438">
+<template name="xserver_user_x_domain_template" lineno="411">
<summary>
Interface to provide X object permissions on a given X server to
an X client domain. Provides the minimal set required by a basic
@@ -111209,7 +112116,7 @@ The type of the domain SYSV tmpfs files.
</summary>
</param>
</template>
-<interface name="xserver_use_user_fonts" lineno="505">
+<interface name="xserver_use_user_fonts" lineno="478">
<summary>
Read user fonts, user font configuration,
and manage the user font cache.
@@ -111230,7 +112137,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_domtrans_xauth" lineno="537">
+<interface name="xserver_domtrans_xauth" lineno="510">
<summary>
Transition to the Xauthority domain.
</summary>
@@ -111240,7 +112147,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="xserver_user_home_dir_filetrans_user_xauth" lineno="560">
+<interface name="xserver_user_home_dir_filetrans_user_xauth" lineno="533">
<summary>
Create a Xauthority file in the user home directory.
</summary>
@@ -111255,7 +112162,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="xserver_user_home_dir_filetrans_user_iceauth" lineno="584">
+<interface name="xserver_user_home_dir_filetrans_user_iceauth" lineno="557">
<summary>
Create a ICEauthority file in
the user home directory.
@@ -111271,7 +112178,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="xserver_user_home_dir_filetrans_user_xsession_log" lineno="603">
+<interface name="xserver_user_home_dir_filetrans_user_xsession_log" lineno="576">
<summary>
Create a .xsession-errors log
file in the user home directory.
@@ -111282,7 +112189,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_user_xauth" lineno="621">
+<interface name="xserver_read_user_xauth" lineno="594">
<summary>
Read all users .Xauthority.
</summary>
@@ -111292,7 +112199,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_user_dmrc" lineno="640">
+<interface name="xserver_read_user_dmrc" lineno="613">
<summary>
Read all users .dmrc.
</summary>
@@ -111302,7 +112209,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_user_iceauth" lineno="659">
+<interface name="xserver_read_user_iceauth" lineno="632">
<summary>
Read all users .ICEauthority.
</summary>
@@ -111312,7 +112219,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_setattr_console_pipes" lineno="678">
+<interface name="xserver_setattr_console_pipes" lineno="651">
<summary>
Set the attributes of the X windows console named pipes.
</summary>
@@ -111322,7 +112229,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_console" lineno="696">
+<interface name="xserver_rw_console" lineno="669">
<summary>
Read and write the X windows console named pipe.
</summary>
@@ -111332,7 +112239,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_create_console_pipes" lineno="714">
+<interface name="xserver_create_console_pipes" lineno="687">
<summary>
Create the X windows console named pipes.
</summary>
@@ -111342,7 +112249,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_relabel_console_pipes" lineno="732">
+<interface name="xserver_relabel_console_pipes" lineno="705">
<summary>
relabel the X windows console named pipes.
</summary>
@@ -111352,7 +112259,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_use_xdm_fds" lineno="750">
+<interface name="xserver_use_xdm_fds" lineno="723">
<summary>
Use file descriptors for xdm.
</summary>
@@ -111362,7 +112269,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_use_xdm_fds" lineno="769">
+<interface name="xserver_dontaudit_use_xdm_fds" lineno="742">
<summary>
Do not audit attempts to inherit
XDM file descriptors.
@@ -111373,7 +112280,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_sigchld_xdm" lineno="787">
+<interface name="xserver_sigchld_xdm" lineno="760">
<summary>
Allow domain to send sigchld to xdm_t
</summary>
@@ -111383,7 +112290,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_xdm_pipes" lineno="805">
+<interface name="xserver_rw_xdm_pipes" lineno="778">
<summary>
Read and write XDM unnamed pipes.
</summary>
@@ -111393,7 +112300,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_rw_xdm_pipes" lineno="824">
+<interface name="xserver_dontaudit_rw_xdm_pipes" lineno="797">
<summary>
Do not audit attempts to read and write
XDM unnamed pipes.
@@ -111404,7 +112311,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_dbus_chat_xdm" lineno="844">
+<interface name="xserver_dbus_chat_xdm" lineno="817">
<summary>
Send and receive messages from
xdm over dbus.
@@ -111415,7 +112322,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_state" lineno="864">
+<interface name="xserver_read_xdm_state" lineno="837">
<summary>
Read xdm process state files.
</summary>
@@ -111425,7 +112332,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_setsched_xdm" lineno="886">
+<interface name="xserver_setsched_xdm" lineno="859">
<summary>
Set the priority of the X Display
Manager (XDM).
@@ -111436,18 +112343,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_xdm_spool_files" lineno="905">
-<summary>
-Create, read, write, and delete
-xdm_spool files.
-</summary>
-<param name="domain" unused="true">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="xserver_stream_connect_xdm" lineno="920">
+<interface name="xserver_stream_connect_xdm" lineno="878">
<summary>
Connect to XDM over a unix domain
stream socket.
@@ -111458,7 +112354,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_rw_config" lineno="939">
+<interface name="xserver_read_xdm_rw_config" lineno="897">
<summary>
Read xdm-writable configuration files.
</summary>
@@ -111468,7 +112364,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_setattr_xdm_tmp_dirs" lineno="958">
+<interface name="xserver_setattr_xdm_tmp_dirs" lineno="916">
<summary>
Set the attributes of XDM temporary directories.
</summary>
@@ -111478,7 +112374,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_create_xdm_tmp_sockets" lineno="977">
+<interface name="xserver_create_xdm_tmp_sockets" lineno="935">
<summary>
Create a named socket in a XDM
temporary directory.
@@ -111489,7 +112385,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_delete_xdm_tmp_sockets" lineno="998">
+<interface name="xserver_delete_xdm_tmp_sockets" lineno="956">
<summary>
Delete a named socket in a XDM
temporary directory.
@@ -111500,9 +112396,19 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_pid" lineno="1017">
+<interface name="xserver_read_xdm_pid" lineno="975">
+<summary>
+Read XDM pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xserver_read_xdm_runtime_files" lineno="990">
<summary>
-Read XDM pid files.
+Read XDM runtime files.
</summary>
<param name="domain">
<summary>
@@ -111510,7 +112416,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_lib_files" lineno="1036">
+<interface name="xserver_read_xdm_lib_files" lineno="1009">
<summary>
Read XDM var lib files.
</summary>
@@ -111520,7 +112426,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_xsession_entry_type" lineno="1054">
+<interface name="xserver_xsession_entry_type" lineno="1027">
<summary>
Make an X session script an entrypoint for the specified domain.
</summary>
@@ -111530,7 +112436,7 @@ The domain for which the shell is an entrypoint.
</summary>
</param>
</interface>
-<interface name="xserver_xsession_spec_domtrans" lineno="1091">
+<interface name="xserver_xsession_spec_domtrans" lineno="1064">
<summary>
Execute an X session in the target domain. This
is an explicit transition, requiring the
@@ -111559,7 +112465,7 @@ The type of the shell process.
</summary>
</param>
</interface>
-<interface name="xserver_write_inherited_xsession_log" lineno="1110">
+<interface name="xserver_write_inherited_xsession_log" lineno="1083">
<summary>
Write to inherited xsession log
files such as .xsession-errors.
@@ -111570,7 +112476,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_xsession_log" lineno="1130">
+<interface name="xserver_rw_xsession_log" lineno="1103">
<summary>
Read and write xsession log
files such as .xsession-errors.
@@ -111581,7 +112487,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_xsession_log" lineno="1149">
+<interface name="xserver_manage_xsession_log" lineno="1122">
<summary>
Manage xsession log files such
as .xsession-errors.
@@ -111592,7 +112498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_write_inherited_log" lineno="1168">
+<interface name="xserver_write_inherited_log" lineno="1141">
<summary>
Write to inherited X server log
files like /var/log/lightdm/lightdm.log
@@ -111603,7 +112509,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_getattr_log" lineno="1186">
+<interface name="xserver_getattr_log" lineno="1159">
<summary>
Get the attributes of X server logs.
</summary>
@@ -111613,7 +112519,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_write_log" lineno="1206">
+<interface name="xserver_dontaudit_write_log" lineno="1179">
<summary>
Do not audit attempts to write the X server
log files.
@@ -111624,7 +112530,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_delete_log" lineno="1224">
+<interface name="xserver_delete_log" lineno="1197">
<summary>
Delete X server log files.
</summary>
@@ -111634,7 +112540,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xkb_libs" lineno="1245">
+<interface name="xserver_read_xkb_libs" lineno="1218">
<summary>
Read X keyboard extension libraries.
</summary>
@@ -111644,7 +112550,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_create_xdm_tmp_dirs" lineno="1266">
+<interface name="xserver_create_xdm_tmp_dirs" lineno="1239">
<summary>
Create xdm temporary directories.
</summary>
@@ -111654,7 +112560,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_tmp_files" lineno="1284">
+<interface name="xserver_read_xdm_tmp_files" lineno="1257">
<summary>
Read xdm temporary files.
</summary>
@@ -111664,7 +112570,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1303">
+<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1276">
<summary>
Do not audit attempts to read xdm temporary files.
</summary>
@@ -111674,7 +112580,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_rw_xdm_tmp_files" lineno="1322">
+<interface name="xserver_rw_xdm_tmp_files" lineno="1295">
<summary>
Read write xdm temporary files.
</summary>
@@ -111684,7 +112590,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_xdm_tmp_files" lineno="1341">
+<interface name="xserver_manage_xdm_tmp_files" lineno="1314">
<summary>
Create, read, write, and delete xdm temporary files.
</summary>
@@ -111694,7 +112600,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1360">
+<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1333">
<summary>
Do not audit attempts to get the attributes of
xdm temporary named sockets.
@@ -111705,7 +112611,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_list_xdm_tmp" lineno="1378">
+<interface name="xserver_list_xdm_tmp" lineno="1351">
<summary>
list xdm_tmp_t directories
</summary>
@@ -111715,7 +112621,7 @@ Domain to allow
</summary>
</param>
</interface>
-<interface name="xserver_domtrans" lineno="1396">
+<interface name="xserver_domtrans" lineno="1369">
<summary>
Execute the X server in the X server domain.
</summary>
@@ -111725,7 +112631,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="xserver_signal" lineno="1415">
+<interface name="xserver_signal" lineno="1388">
<summary>
Signal X servers
</summary>
@@ -111735,7 +112641,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_kill" lineno="1433">
+<interface name="xserver_kill" lineno="1406">
<summary>
Kill X servers
</summary>
@@ -111745,7 +112651,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_state" lineno="1451">
+<interface name="xserver_read_state" lineno="1424">
<summary>
Allow reading xserver_t files to get cgroup and sessionid
</summary>
@@ -111755,7 +112661,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_shm" lineno="1471">
+<interface name="xserver_rw_shm" lineno="1444">
<summary>
Read and write X server Sys V Shared
memory segments.
@@ -111766,7 +112672,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1490">
+<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1463">
<summary>
Do not audit attempts to read and write to
X server sockets.
@@ -111777,7 +112683,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1509">
+<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1482">
<summary>
Do not audit attempts to read and write X server
unix domain stream sockets.
@@ -111788,7 +112694,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_stream_connect" lineno="1528">
+<interface name="xserver_stream_connect" lineno="1501">
<summary>
Connect to the X server over a unix domain
stream socket.
@@ -111799,7 +112705,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_tmp_files" lineno="1547">
+<interface name="xserver_read_tmp_files" lineno="1520">
<summary>
Read X server temporary files.
</summary>
@@ -111809,7 +112715,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dbus_chat" lineno="1566">
+<interface name="xserver_dbus_chat" lineno="1539">
<summary>
talk to xserver_t by dbus
</summary>
@@ -111819,7 +112725,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_core_devices" lineno="1587">
+<interface name="xserver_manage_core_devices" lineno="1560">
<summary>
Interface to provide X object permissions on a given X server to
an X client domain. Gives the domain permission to read the
@@ -111831,7 +112737,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_unconfined" lineno="1610">
+<interface name="xserver_unconfined" lineno="1583">
<summary>
Interface to provide X object permissions on a given X server to
an X client domain. Gives the domain complete control over the
@@ -111843,7 +112749,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_xdm_keys" lineno="1630">
+<interface name="xserver_rw_xdm_keys" lineno="1603">
<summary>
Manage keys for xdm.
</summary>
@@ -111853,7 +112759,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_link_xdm_keys" lineno="1648">
+<interface name="xserver_link_xdm_keys" lineno="1621">
<summary>
Manage keys for xdm.
</summary>
@@ -111863,7 +112769,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_mesa_shader_cache" lineno="1666">
+<interface name="xserver_rw_mesa_shader_cache" lineno="1639">
<summary>
Read and write the mesa shader cache.
</summary>
@@ -111873,6 +112779,16 @@ Domain allowed access.
</summary>
</param>
</interface>
+<interface name="xserver_manage_mesa_shader_cache" lineno="1660">
+<summary>
+Manage the mesa shader cache.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
<tunable name="allow_write_xshm" dftval="false">
<desc>
<p>
@@ -111903,6 +112819,13 @@ Support X userspace object manager
</p>
</desc>
</tunable>
+<tunable name="xserver_allow_dri" dftval="false">
+<desc>
+<p>
+Allow DRI access
+</p>
+</desc>
+</tunable>
</module>
<module name="zabbix" filename="policy/modules/services/zabbix.if">
<summary>Distributed infrastructure monitoring.</summary>
@@ -111949,7 +112872,7 @@ Domain allowed access.
</interface>
<interface name="zabbix_read_pid_files" lineno="91">
<summary>
-Read zabbix pid files.
+Read zabbix pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -111957,7 +112880,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="zabbix_agent_tcp_connect" lineno="110">
+<interface name="zabbix_agent_tcp_connect" lineno="105">
<summary>
Connect to zabbix agent on the TCP network.
</summary>
@@ -111967,7 +112890,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="zabbix_admin" lineno="137">
+<interface name="zabbix_admin" lineno="132">
<summary>
All of the rules required to
administrate an zabbix environment.
@@ -112164,7 +113087,7 @@ Type to be used as a domain type.
<interface name="application_executable_file" lineno="36">
<summary>
Make the specified type usable for files
-that are exectuables, such as binary programs.
+that are executables, such as binary programs.
This does not include shared libraries.
</summary>
<param name="type">
@@ -112301,7 +113224,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_use_pam_systemd" lineno="103">
+<interface name="auth_use_pam_systemd" lineno="99">
<summary>
Use the pam module systemd during authentication.
</summary>
@@ -112311,7 +113234,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_use_pam_motd_dynamic" lineno="120">
+<interface name="auth_use_pam_motd_dynamic" lineno="116">
<summary>
Use the pam module motd with dynamic support during authentication.
This module comes from Ubuntu (https://bugs.launchpad.net/ubuntu/+source/pam/+bug/399071)
@@ -112323,7 +113246,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_login_pgm_domain" lineno="144">
+<interface name="auth_login_pgm_domain" lineno="140">
<summary>
Make the specified domain used for a login program.
</summary>
@@ -112333,7 +113256,7 @@ Domain type used for a login program domain.
</summary>
</param>
</interface>
-<interface name="auth_login_entry_type" lineno="231">
+<interface name="auth_login_entry_type" lineno="227">
<summary>
Use the login program as an entry point program.
</summary>
@@ -112343,7 +113266,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_login_program" lineno="254">
+<interface name="auth_domtrans_login_program" lineno="250">
<summary>
Execute a login_program in the target domain.
</summary>
@@ -112358,7 +113281,7 @@ The type of the login_program process.
</summary>
</param>
</interface>
-<interface name="auth_ranged_domtrans_login_program" lineno="284">
+<interface name="auth_ranged_domtrans_login_program" lineno="280">
<summary>
Execute a login_program in the target domain,
with a range transition.
@@ -112379,7 +113302,7 @@ Range of the login program.
</summary>
</param>
</interface>
-<interface name="auth_search_cache" lineno="310">
+<interface name="auth_search_cache" lineno="306">
<summary>
Search authentication cache
</summary>
@@ -112389,7 +113312,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_cache" lineno="328">
+<interface name="auth_read_cache" lineno="324">
<summary>
Read authentication cache
</summary>
@@ -112399,7 +113322,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_cache" lineno="346">
+<interface name="auth_rw_cache" lineno="342">
<summary>
Read/Write authentication cache
</summary>
@@ -112409,7 +113332,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_cache" lineno="364">
+<interface name="auth_manage_cache" lineno="360">
<summary>
Manage authentication cache
</summary>
@@ -112419,7 +113342,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_var_filetrans_cache" lineno="383">
+<interface name="auth_var_filetrans_cache" lineno="379">
<summary>
Automatic transition from cache_t to cache.
</summary>
@@ -112429,7 +113352,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_chk_passwd" lineno="401">
+<interface name="auth_domtrans_chk_passwd" lineno="397">
<summary>
Run unix_chkpwd to check a password.
</summary>
@@ -112439,7 +113362,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_chkpwd" lineno="449">
+<interface name="auth_domtrans_chkpwd" lineno="445">
<summary>
Run unix_chkpwd to check a password.
Stripped down version to be called within boolean
@@ -112450,7 +113373,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_run_chk_passwd" lineno="475">
+<interface name="auth_run_chk_passwd" lineno="471">
<summary>
Execute chkpwd programs in the chkpwd domain.
</summary>
@@ -112465,7 +113388,7 @@ The role to allow the chkpwd domain.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_upd_passwd" lineno="494">
+<interface name="auth_domtrans_upd_passwd" lineno="490">
<summary>
Execute a domain transition to run unix_update.
</summary>
@@ -112475,7 +113398,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_run_upd_passwd" lineno="519">
+<interface name="auth_run_upd_passwd" lineno="515">
<summary>
Execute updpwd programs in the updpwd domain.
</summary>
@@ -112490,7 +113413,7 @@ The role to allow the updpwd domain.
</summary>
</param>
</interface>
-<interface name="auth_getattr_shadow" lineno="538">
+<interface name="auth_getattr_shadow" lineno="534">
<summary>
Get the attributes of the shadow passwords file.
</summary>
@@ -112500,7 +113423,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_dontaudit_getattr_shadow" lineno="558">
+<interface name="auth_dontaudit_getattr_shadow" lineno="554">
<summary>
Do not audit attempts to get the attributes
of the shadow passwords file.
@@ -112511,7 +113434,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_read_shadow" lineno="580">
+<interface name="auth_read_shadow" lineno="576">
<summary>
Read the shadow passwords file (/etc/shadow)
</summary>
@@ -112521,7 +113444,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_can_read_shadow_passwords" lineno="604">
+<interface name="auth_map_shadow" lineno="591">
+<summary>
+Map the shadow passwords file (/etc/shadow)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="auth_can_read_shadow_passwords" lineno="617">
<summary>
Pass shadow assertion for reading.
</summary>
@@ -112540,7 +113473,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_tunable_read_shadow" lineno="630">
+<interface name="auth_tunable_read_shadow" lineno="643">
<summary>
Read the shadow password file.
</summary>
@@ -112558,7 +113491,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_dontaudit_read_shadow" lineno="650">
+<interface name="auth_dontaudit_read_shadow" lineno="663">
<summary>
Do not audit attempts to read the shadow
password file (/etc/shadow).
@@ -112569,7 +113502,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_rw_shadow" lineno="668">
+<interface name="auth_rw_shadow" lineno="681">
<summary>
Read and write the shadow password file (/etc/shadow).
</summary>
@@ -112579,7 +113512,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_shadow" lineno="690">
+<interface name="auth_manage_shadow" lineno="703">
<summary>
Create, read, write, and delete the shadow
password file.
@@ -112590,7 +113523,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_etc_filetrans_shadow" lineno="710">
+<interface name="auth_etc_filetrans_shadow" lineno="723">
<summary>
Automatic transition from etc to shadow.
</summary>
@@ -112600,7 +113533,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabelto_shadow" lineno="729">
+<interface name="auth_relabelto_shadow" lineno="742">
<summary>
Relabel to the shadow
password file type.
@@ -112611,7 +113544,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabel_shadow" lineno="751">
+<interface name="auth_relabel_shadow" lineno="764">
<summary>
Relabel from and to the shadow
password file type.
@@ -112622,7 +113555,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_append_faillog" lineno="772">
+<interface name="auth_append_faillog" lineno="785">
<summary>
Append to the login failure log.
</summary>
@@ -112632,7 +113565,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_create_faillog_files" lineno="791">
+<interface name="auth_create_faillog_files" lineno="804">
<summary>
Create fail log lock (in /run/faillock).
</summary>
@@ -112642,7 +113575,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_faillog" lineno="809">
+<interface name="auth_rw_faillog" lineno="822">
<summary>
Read and write the login failure log.
</summary>
@@ -112652,7 +113585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_faillog" lineno="828">
+<interface name="auth_manage_faillog" lineno="841">
<summary>
Manage the login failure logs.
</summary>
@@ -112662,7 +113595,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_setattr_faillog_files" lineno="847">
+<interface name="auth_setattr_faillog_files" lineno="860">
<summary>
Setattr the login failure logs.
</summary>
@@ -112672,7 +113605,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_lastlog" lineno="866">
+<interface name="auth_read_lastlog" lineno="879">
<summary>
Read the last logins log.
</summary>
@@ -112683,7 +113616,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="auth_append_lastlog" lineno="885">
+<interface name="auth_append_lastlog" lineno="898">
<summary>
Append only to the last logins log.
</summary>
@@ -112693,7 +113626,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabel_lastlog" lineno="904">
+<interface name="auth_relabel_lastlog" lineno="917">
<summary>
relabel the last logins log.
</summary>
@@ -112703,7 +113636,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_lastlog" lineno="923">
+<interface name="auth_rw_lastlog" lineno="936">
<summary>
Read and write to the last logins log.
</summary>
@@ -112713,7 +113646,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_lastlog" lineno="942">
+<interface name="auth_manage_lastlog" lineno="955">
<summary>
Manage the last logins log.
</summary>
@@ -112723,7 +113656,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_pam" lineno="961">
+<interface name="auth_domtrans_pam" lineno="974">
<summary>
Execute pam programs in the pam domain.
</summary>
@@ -112733,7 +113666,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_signal_pam" lineno="979">
+<interface name="auth_signal_pam" lineno="992">
<summary>
Send generic signals to pam processes.
</summary>
@@ -112743,7 +113676,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_run_pam" lineno="1002">
+<interface name="auth_run_pam" lineno="1015">
<summary>
Execute pam programs in the PAM domain.
</summary>
@@ -112758,7 +113691,7 @@ The role to allow the PAM domain.
</summary>
</param>
</interface>
-<interface name="auth_exec_pam" lineno="1021">
+<interface name="auth_exec_pam" lineno="1034">
<summary>
Execute the pam program.
</summary>
@@ -112768,7 +113701,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_var_auth" lineno="1040">
+<interface name="auth_read_var_auth" lineno="1053">
<summary>
Read var auth files. Used by various other applications
and pam applets etc.
@@ -112779,7 +113712,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_var_auth" lineno="1060">
+<interface name="auth_rw_var_auth" lineno="1073">
<summary>
Read and write var auth files. Used by various other applications
and pam applets etc.
@@ -112790,7 +113723,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_var_auth" lineno="1080">
+<interface name="auth_manage_var_auth" lineno="1093">
<summary>
Manage var auth files. Used by various other applications
and pam applets etc.
@@ -112801,9 +113734,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_pam_pid" lineno="1101">
+<interface name="auth_read_pam_pid" lineno="1114">
<summary>
-Read PAM PID files.
+Read PAM PID files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -112811,9 +113744,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_dontaudit_read_pam_pid" lineno="1121">
+<interface name="auth_dontaudit_read_pam_pid" lineno="1129">
<summary>
-Do not audit attemps to read PAM PID files.
+Do not audit attempts to read PAM PID files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -112821,12 +113754,64 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_pid_filetrans_pam_var_run" lineno="1152">
+<interface name="auth_pid_filetrans_pam_var_run" lineno="1157">
<summary>
Create specified objects in
pid directories with the pam var
run file type using a
-file type transition.
+file type transition. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object_class">
+<summary>
+Class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="auth_delete_pam_pid" lineno="1172">
+<summary>
+Delete pam PID files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="auth_manage_pam_pid" lineno="1187">
+<summary>
+Manage pam PID files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="auth_manage_pam_runtime_dirs" lineno="1203">
+<summary>
+Manage pam runtime dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="auth_runtime_filetrans_pam_runtime" lineno="1234">
+<summary>
+Create specified objects in
+pid directories with the pam runtime
+file type using a type transition.
</summary>
<param name="domain">
<summary>
@@ -112844,9 +113829,29 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="auth_delete_pam_pid" lineno="1170">
+<interface name="auth_read_pam_runtime_files" lineno="1252">
+<summary>
+Read PAM runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="auth_dontaudit_read_pam_runtime_files" lineno="1272">
<summary>
-Delete pam PID files.
+Do not audit attempts to read PAM runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="auth_delete_pam_runtime_files" lineno="1290">
+<summary>
+Delete pam runtime files.
</summary>
<param name="domain">
<summary>
@@ -112854,9 +113859,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_pam_pid" lineno="1190">
+<interface name="auth_manage_pam_runtime_files" lineno="1309">
<summary>
-Manage pam PID files.
+Create, read, write, and delete pam runtime files.
</summary>
<param name="domain">
<summary>
@@ -112864,7 +113869,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_pam_console" lineno="1210">
+<interface name="auth_domtrans_pam_console" lineno="1328">
<summary>
Execute pam_console with a domain transition.
</summary>
@@ -112874,7 +113879,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_search_pam_console_data" lineno="1229">
+<interface name="auth_search_pam_console_data" lineno="1347">
<summary>
Search the contents of the
pam_console data directory.
@@ -112885,7 +113890,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_list_pam_console_data" lineno="1249">
+<interface name="auth_list_pam_console_data" lineno="1367">
<summary>
List the contents of the pam_console
data directory.
@@ -112896,7 +113901,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_create_pam_console_data_dirs" lineno="1268">
+<interface name="auth_create_pam_console_data_dirs" lineno="1386">
<summary>
Create pam var console pid directories.
</summary>
@@ -112906,7 +113911,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabel_pam_console_data_dirs" lineno="1287">
+<interface name="auth_relabel_pam_console_data_dirs" lineno="1405">
<summary>
Relabel pam_console data directories.
</summary>
@@ -112916,7 +113921,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_pam_console_data" lineno="1305">
+<interface name="auth_read_pam_console_data" lineno="1423">
<summary>
Read pam_console data files.
</summary>
@@ -112926,7 +113931,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_pam_console_data" lineno="1326">
+<interface name="auth_manage_pam_console_data" lineno="1444">
<summary>
Create, read, write, and delete
pam_console data files.
@@ -112937,7 +113942,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_delete_pam_console_data" lineno="1346">
+<interface name="auth_delete_pam_console_data" lineno="1464">
<summary>
Delete pam_console data.
</summary>
@@ -112947,11 +113952,34 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_pid_filetrans_pam_var_console" lineno="1379">
+<interface name="auth_pid_filetrans_pam_var_console" lineno="1497">
<summary>
Create specified objects in
pid directories with the pam var
console pid file type using a
+file type transition. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object_class">
+<summary>
+Class of the object being created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="auth_runtime_filetrans_pam_var_console" lineno="1525">
+<summary>
+Create specified objects in generic
+runtime directories with the pam var
+console runtime file type using a
file type transition.
</summary>
<param name="domain">
@@ -112970,7 +113998,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_utempter" lineno="1397">
+<interface name="auth_domtrans_utempter" lineno="1543">
<summary>
Execute utempter programs in the utempter domain.
</summary>
@@ -112980,7 +114008,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_run_utempter" lineno="1420">
+<interface name="auth_run_utempter" lineno="1566">
<summary>
Execute utempter programs in the utempter domain.
</summary>
@@ -112995,9 +114023,9 @@ The role to allow the utempter domain.
</summary>
</param>
</interface>
-<interface name="auth_dontaudit_exec_utempter" lineno="1439">
+<interface name="auth_dontaudit_exec_utempter" lineno="1585">
<summary>
-Do not audit attemps to execute utempter executable.
+Do not audit attempts to execute utempter executable.
</summary>
<param name="domain">
<summary>
@@ -113005,7 +114033,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_setattr_login_records" lineno="1457">
+<interface name="auth_setattr_login_records" lineno="1603">
<summary>
Set the attributes of login record files.
</summary>
@@ -113015,7 +114043,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_login_records" lineno="1477">
+<interface name="auth_read_login_records" lineno="1623">
<summary>
Read login records files (/var/log/wtmp).
</summary>
@@ -113026,7 +114054,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="auth_dontaudit_read_login_records" lineno="1498">
+<interface name="auth_dontaudit_read_login_records" lineno="1644">
<summary>
Do not audit attempts to read login records
files (/var/log/wtmp).
@@ -113038,7 +114066,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="auth_dontaudit_write_login_records" lineno="1517">
+<interface name="auth_dontaudit_write_login_records" lineno="1663">
<summary>
Do not audit attempts to write to
login records files.
@@ -113049,7 +114077,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_append_login_records" lineno="1535">
+<interface name="auth_append_login_records" lineno="1681">
<summary>
Append to login records (wtmp).
</summary>
@@ -113059,7 +114087,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_write_login_records" lineno="1554">
+<interface name="auth_write_login_records" lineno="1700">
<summary>
Write to login records (wtmp).
</summary>
@@ -113069,7 +114097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_login_records" lineno="1572">
+<interface name="auth_rw_login_records" lineno="1718">
<summary>
Read and write login records.
</summary>
@@ -113079,7 +114107,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_log_filetrans_login_records" lineno="1592">
+<interface name="auth_log_filetrans_login_records" lineno="1738">
<summary>
Create a login records in the log directory
using a type transition.
@@ -113090,7 +114118,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_login_records" lineno="1611">
+<interface name="auth_manage_login_records" lineno="1757">
<summary>
Create, read, write, and delete login
records files.
@@ -113101,7 +114129,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabel_login_records" lineno="1630">
+<interface name="auth_relabel_login_records" lineno="1776">
<summary>
Relabel login record files.
</summary>
@@ -113111,7 +114139,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_use_nsswitch" lineno="1658">
+<interface name="auth_use_nsswitch" lineno="1804">
<summary>
Use nsswitch to look up user, password, group, or
host information.
@@ -113131,7 +114159,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="auth_unconfined" lineno="1686">
+<interface name="auth_unconfined" lineno="1832">
<summary>
Unconfined access to the authlogin module.
</summary>
@@ -113612,105 +114640,6 @@ Domain allowed access.
<rolecap/>
</interface>
</module>
-<module name="hotplug" filename="policy/modules/system/hotplug.if">
-<summary>
-Policy for hotplug system, for supporting the
-connection and disconnection of devices at runtime.
-</summary>
-<interface name="hotplug_domtrans" lineno="16">
-<summary>
-Execute hotplug with a domain transition.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="hotplug_exec" lineno="35">
-<summary>
-Execute hotplug in the caller domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hotplug_use_fds" lineno="54">
-<summary>
-Inherit and use hotplug file descriptors.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hotplug_dontaudit_use_fds" lineno="73">
-<summary>
-Do not audit attempts to inherit
-hotplug file descriptors.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="hotplug_dontaudit_search_config" lineno="92">
-<summary>
-Do not audit attempts to search the
-hotplug configuration directories.
-</summary>
-<param name="domain">
-<summary>
-Domain to not audit.
-</summary>
-</param>
-</interface>
-<interface name="hotplug_getattr_config_dirs" lineno="110">
-<summary>
-Get the attributes of the hotplug configuration directory.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hotplug_search_config" lineno="128">
-<summary>
-Search the hotplug configuration directory.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="hotplug_read_config" lineno="147">
-<summary>
-Read the configuration files for hotplug.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="hotplug_search_pids" lineno="168">
-<summary>
-Search the hotplug PIDs.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-</module>
<module name="init" filename="policy/modules/system/init.if">
<summary>System initialization programs (init and init scripts).</summary>
<interface name="init_mountpoint" lineno="17">
@@ -113894,7 +114823,7 @@ Type of the program to be used as an entry point to this domain.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="init_ranged_daemon_domain" lineno="412">
+<interface name="init_ranged_daemon_domain" lineno="415">
<summary>
Create a domain for long running processes
(daemons/services) which are started by init scripts,
@@ -113936,7 +114865,7 @@ MLS/MCS range for the domain.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="init_abstract_socket_activation" lineno="443">
+<interface name="init_abstract_socket_activation" lineno="446">
<summary>
Abstract socket service activation (systemd).
</summary>
@@ -113946,7 +114875,7 @@ The domain to be started by systemd socket activation.
</summary>
</param>
</interface>
-<interface name="init_named_socket_activation" lineno="468">
+<interface name="init_named_socket_activation" lineno="471">
<summary>
Named socket service activation (systemd).
</summary>
@@ -113961,7 +114890,7 @@ The domain socket file type.
</summary>
</param>
</interface>
-<interface name="init_system_domain" lineno="519">
+<interface name="init_system_domain" lineno="522">
<summary>
Create a domain for short running processes
which are started by init scripts.
@@ -113998,7 +114927,7 @@ Type of the program to be used as an entry point to this domain.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="init_ranged_system_domain" lineno="581">
+<interface name="init_ranged_system_domain" lineno="584">
<summary>
Create a domain for short running processes
which are started by init scripts.
@@ -114041,7 +114970,7 @@ Range for the domain.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="init_dyntrans" lineno="612">
+<interface name="init_dyntrans" lineno="615">
<summary>
Allow domain dyntransition to init_t domain.
</summary>
@@ -114051,9 +114980,30 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_daemon_pid_file" lineno="641">
+<interface name="init_daemon_pid_file" lineno="644">
<summary>
Mark the file type as a daemon pid file, allowing initrc_t
+to create it (Deprecated)
+</summary>
+<param name="filetype">
+<summary>
+Type to mark as a daemon pid file
+</summary>
+</param>
+<param name="class">
+<summary>
+Class on which the type is applied
+</summary>
+</param>
+<param name="filename">
+<summary>
+Filename of the file that the init script creates
+</summary>
+</param>
+</interface>
+<interface name="init_daemon_runtime_file" lineno="671">
+<summary>
+Mark the file type as a daemon runtime file, allowing initrc_t
to create it
</summary>
<param name="filetype">
@@ -114072,7 +115022,7 @@ Filename of the file that the init script creates
</summary>
</param>
</interface>
-<interface name="init_daemon_lock_file" lineno="674">
+<interface name="init_daemon_lock_file" lineno="704">
<summary>
Mark the file type as a daemon lock file, allowing initrc_t
to create it
@@ -114093,7 +115043,7 @@ Filename of the file that the init script creates
</summary>
</param>
</interface>
-<interface name="init_domtrans" lineno="696">
+<interface name="init_domtrans" lineno="726">
<summary>
Execute init (/sbin/init) with a domain transition.
</summary>
@@ -114103,7 +115053,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_pgm_spec_user_daemon_domain" lineno="720">
+<interface name="init_pgm_spec_user_daemon_domain" lineno="750">
<summary>
Execute init (/sbin/init) with a domain transition
to the provided domain.
@@ -114119,7 +115069,7 @@ The type to be used as a systemd --user domain.
</summary>
</param>
</interface>
-<interface name="init_exec" lineno="748">
+<interface name="init_exec" lineno="778">
<summary>
Execute the init program in the caller domain.
</summary>
@@ -114130,7 +115080,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_pgm_entrypoint" lineno="769">
+<interface name="init_pgm_entrypoint" lineno="799">
<summary>
Allow the init program to be an entrypoint
for the specified domain.
@@ -114142,7 +115092,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_exec_rc" lineno="798">
+<interface name="init_exec_rc" lineno="828">
<summary>
Execute the rc application in the caller domain.
</summary>
@@ -114163,7 +115113,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getpgid" lineno="817">
+<interface name="init_getpgid" lineno="847">
<summary>
Get the process group of init.
</summary>
@@ -114173,7 +115123,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signal" lineno="835">
+<interface name="init_signal" lineno="865">
<summary>
Send init a generic signal.
</summary>
@@ -114183,7 +115133,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signull" lineno="853">
+<interface name="init_signull" lineno="883">
<summary>
Send init a null signal.
</summary>
@@ -114193,7 +115143,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_sigchld" lineno="871">
+<interface name="init_sigchld" lineno="901">
<summary>
Send init a SIGCHLD signal.
</summary>
@@ -114203,9 +115153,20 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stream_connect" lineno="889">
+<interface name="init_stream_connect" lineno="919">
+<summary>
+Connect to init with a unix socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_unix_stream_socket_connectto" lineno="940">
<summary>
Connect to init with a unix socket.
+Without any additional permissions.
</summary>
<param name="domain">
<summary>
@@ -114213,7 +115174,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_fds" lineno="949">
+<interface name="init_use_fds" lineno="998">
<summary>
Inherit and use file descriptors from init.
</summary>
@@ -114263,7 +115224,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="1"/>
</interface>
-<interface name="init_dontaudit_use_fds" lineno="968">
+<interface name="init_dontaudit_use_fds" lineno="1017">
<summary>
Do not audit attempts to inherit file
descriptors from init.
@@ -114274,7 +115235,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_dgram_send" lineno="987">
+<interface name="init_dgram_send" lineno="1036">
<summary>
Send messages to init unix datagram sockets.
</summary>
@@ -114285,7 +115246,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_rw_inherited_stream_socket" lineno="1007">
+<interface name="init_rw_inherited_stream_socket" lineno="1056">
<summary>
Read and write to inherited init unix streams.
</summary>
@@ -114295,7 +115256,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_stream_sockets" lineno="1026">
+<interface name="init_rw_stream_sockets" lineno="1075">
<summary>
Allow the specified domain to read/write to
init with unix domain stream sockets.
@@ -114306,7 +115267,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_system" lineno="1044">
+<interface name="init_start_system" lineno="1093">
<summary>
start service (systemd).
</summary>
@@ -114316,7 +115277,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_system" lineno="1062">
+<interface name="init_stop_system" lineno="1111">
<summary>
stop service (systemd).
</summary>
@@ -114326,7 +115287,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_system_status" lineno="1080">
+<interface name="init_get_system_status" lineno="1129">
<summary>
Get all service status (systemd).
</summary>
@@ -114336,7 +115297,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_enable" lineno="1098">
+<interface name="init_enable" lineno="1147">
<summary>
Enable all systemd services (systemd).
</summary>
@@ -114346,7 +115307,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_disable" lineno="1116">
+<interface name="init_disable" lineno="1165">
<summary>
Disable all services (systemd).
</summary>
@@ -114356,7 +115317,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_reload" lineno="1134">
+<interface name="init_reload" lineno="1183">
<summary>
Reload all services (systemd).
</summary>
@@ -114366,7 +115327,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_reboot_system" lineno="1152">
+<interface name="init_reboot_system" lineno="1201">
<summary>
Reboot the system (systemd).
</summary>
@@ -114376,7 +115337,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_shutdown_system" lineno="1170">
+<interface name="init_shutdown_system" lineno="1219">
<summary>
Shutdown (halt) the system (systemd).
</summary>
@@ -114386,7 +115347,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_service_status" lineno="1188">
+<interface name="init_service_status" lineno="1237">
<summary>
Allow specified domain to get init status
</summary>
@@ -114396,7 +115357,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="init_service_start" lineno="1207">
+<interface name="init_service_start" lineno="1256">
<summary>
Allow specified domain to get init start
</summary>
@@ -114406,7 +115367,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="init_dbus_chat" lineno="1227">
+<interface name="init_dbus_chat" lineno="1276">
<summary>
Send and receive messages from
systemd over dbus.
@@ -114417,7 +115378,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_var_lib_links" lineno="1247">
+<interface name="init_read_var_lib_links" lineno="1296">
<summary>
read/follow symlinks under /var/lib/systemd/
</summary>
@@ -114427,7 +115388,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_list_var_lib_dirs" lineno="1266">
+<interface name="init_list_var_lib_dirs" lineno="1315">
<summary>
List /var/lib/systemd/ dir
</summary>
@@ -114437,7 +115398,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_relabel_var_lib_dirs" lineno="1284">
+<interface name="init_relabel_var_lib_dirs" lineno="1333">
<summary>
Relabel dirs in /var/lib/systemd/.
</summary>
@@ -114447,7 +115408,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_var_lib_files" lineno="1302">
+<interface name="init_manage_var_lib_files" lineno="1351">
<summary>
Manage files in /var/lib/systemd/.
</summary>
@@ -114457,7 +115418,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_var_lib_filetrans" lineno="1337">
+<interface name="init_var_lib_filetrans" lineno="1386">
<summary>
Create files in /var/lib/systemd
with an automatic type transition.
@@ -114483,9 +115444,29 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_search_pids" lineno="1356">
+<interface name="init_search_pids" lineno="1405">
+<summary>
+Allow search directory in the /run/systemd directory. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_list_pids" lineno="1420">
+<summary>
+Allow listing of the /run/systemd directory. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_manage_pid_symlinks" lineno="1435">
<summary>
-Allow search directory in the /run/systemd directory.
+Create symbolic links in the /run/systemd directory. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -114493,9 +115474,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_list_pids" lineno="1374">
+<interface name="init_create_pid_files" lineno="1450">
<summary>
-Allow listing of the /run/systemd directory.
+Create files in the /run/systemd directory. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -114503,9 +115484,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_pid_symlinks" lineno="1393">
+<interface name="init_write_pid_files" lineno="1465">
<summary>
-Create symbolic links in the /run/systemd directory.
+Write files in the /run/systemd directory. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -114513,9 +115494,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_create_pid_files" lineno="1411">
+<interface name="init_manage_pid_dirs" lineno="1481">
<summary>
-Create files in the /run/systemd directory.
+Create, read, write, and delete
+directories in the /run/systemd directory. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -114523,17 +115505,52 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_write_pid_files" lineno="1429">
+<interface name="init_pid_filetrans" lineno="1511">
<summary>
-Write files in the /run/systemd directory.
+Create files in an init PID directory. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
+<param name="file_type">
+<summary>
+The type of the object to be created
+</summary>
+</param>
+<param name="object_class">
+<summary>
+The object class.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
</interface>
-<interface name="init_manage_pid_dirs" lineno="1448">
+<interface name="init_search_runtime" lineno="1526">
+<summary>
+Search init runtime directories, e.g. /run/systemd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_list_runtime" lineno="1544">
+<summary>
+List init runtime directories, e.g. /run/systemd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_manage_runtime_dirs" lineno="1564">
<summary>
Create, read, write, and delete
directories in the /run/systemd directory.
@@ -114544,9 +115561,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_pid_filetrans" lineno="1481">
+<interface name="init_runtime_filetrans" lineno="1597">
<summary>
-Create files in an init PID directory.
+Create files in an init runtime directory with a private type.
</summary>
<param name="domain">
<summary>
@@ -114569,7 +115586,37 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_getattr_initctl" lineno="1500">
+<interface name="init_write_runtime_files" lineno="1616">
+<summary>
+Write init runtime files, e.g. in /run/systemd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_create_runtime_files" lineno="1634">
+<summary>
+Create init runtime files, e.g. in /run/systemd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_manage_runtime_symlinks" lineno="1652">
+<summary>
+Create init runtime symbolic links, e.g. in /run/systemd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_getattr_initctl" lineno="1670">
<summary>
Get the attributes of initctl.
</summary>
@@ -114579,7 +115626,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_getattr_initctl" lineno="1521">
+<interface name="init_dontaudit_getattr_initctl" lineno="1691">
<summary>
Do not audit attempts to get the
attributes of initctl.
@@ -114590,7 +115637,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_write_initctl" lineno="1539">
+<interface name="init_write_initctl" lineno="1709">
<summary>
Write to initctl.
</summary>
@@ -114600,7 +115647,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_telinit" lineno="1560">
+<interface name="init_telinit" lineno="1730">
<summary>
Use telinit (Read and write initctl).
</summary>
@@ -114611,7 +115658,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_rw_initctl" lineno="1593">
+<interface name="init_rw_initctl" lineno="1763">
<summary>
Read and write initctl.
</summary>
@@ -114621,7 +115668,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_rw_initctl" lineno="1614">
+<interface name="init_dontaudit_rw_initctl" lineno="1784">
<summary>
Do not audit attempts to read and
write initctl.
@@ -114632,7 +115679,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_script_file_entry_type" lineno="1633">
+<interface name="init_script_file_entry_type" lineno="1803">
<summary>
Make init scripts an entry point for
the specified domain.
@@ -114643,7 +115690,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_spec_domtrans_script" lineno="1656">
+<interface name="init_spec_domtrans_script" lineno="1826">
<summary>
Execute init scripts with a specified domain transition.
</summary>
@@ -114653,7 +115700,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_domtrans_script" lineno="1683">
+<interface name="init_domtrans_script" lineno="1853">
<summary>
Execute init scripts with an automatic domain transition.
</summary>
@@ -114663,7 +115710,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_domtrans_labeled_script" lineno="1718">
+<interface name="init_domtrans_labeled_script" lineno="1888">
<summary>
Execute labelled init scripts with an automatic domain transition.
</summary>
@@ -114673,7 +115720,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_script_file_domtrans" lineno="1764">
+<interface name="init_script_file_domtrans" lineno="1934">
<summary>
Execute a init script in a specified domain.
</summary>
@@ -114698,7 +115745,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="init_kill_scripts" lineno="1783">
+<interface name="init_kill_scripts" lineno="1953">
<summary>
Send a kill signal to init scripts.
</summary>
@@ -114708,7 +115755,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_script_service" lineno="1801">
+<interface name="init_manage_script_service" lineno="1971">
<summary>
Allow manage service for initrc_exec_t scripts
</summary>
@@ -114718,7 +115765,7 @@ Target domain
</summary>
</param>
</interface>
-<interface name="init_labeled_script_domtrans" lineno="1826">
+<interface name="init_labeled_script_domtrans" lineno="1996">
<summary>
Transition to the init script domain
on a specified labeled init script.
@@ -114734,7 +115781,7 @@ Labeled init script file.
</summary>
</param>
</interface>
-<interface name="init_all_labeled_script_domtrans" lineno="1848">
+<interface name="init_all_labeled_script_domtrans" lineno="2018">
<summary>
Transition to the init script domain
for all labeled init script types
@@ -114745,7 +115792,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_get_script_status" lineno="1866">
+<interface name="init_get_script_status" lineno="2036">
<summary>
Allow getting service status of initrc_exec_t scripts
</summary>
@@ -114755,7 +115802,7 @@ Target domain
</summary>
</param>
</interface>
-<interface name="init_startstop_service" lineno="1906">
+<interface name="init_startstop_service" lineno="2076">
<summary>
Allow the role to start and stop
labeled services.
@@ -114786,7 +115833,7 @@ Systemd unit file type.
</summary>
</param>
</interface>
-<interface name="init_run_daemon" lineno="1960">
+<interface name="init_run_daemon" lineno="2132">
<summary>
Start and stop daemon programs directly.
</summary>
@@ -114808,7 +115855,7 @@ The role to be performing this action.
</summary>
</param>
</interface>
-<interface name="init_startstop_all_script_services" lineno="1982">
+<interface name="init_startstop_all_script_services" lineno="2154">
<summary>
Start and stop init_script_file_type services
</summary>
@@ -114818,7 +115865,7 @@ domain that can start and stop the services
</summary>
</param>
</interface>
-<interface name="init_read_state" lineno="2001">
+<interface name="init_read_state" lineno="2173">
<summary>
Read the process state (/proc/pid) of init.
</summary>
@@ -114828,7 +115875,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_read_state" lineno="2021">
+<interface name="init_dontaudit_read_state" lineno="2193">
<summary>
Dontaudit read the process state (/proc/pid) of init.
</summary>
@@ -114838,7 +115885,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_ptrace" lineno="2042">
+<interface name="init_ptrace" lineno="2214">
<summary>
Ptrace init
</summary>
@@ -114849,7 +115896,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_getattr" lineno="2061">
+<interface name="init_getattr" lineno="2233">
<summary>
get init process stats
</summary>
@@ -114860,7 +115907,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_read_script_pipes" lineno="2079">
+<interface name="init_read_script_pipes" lineno="2251">
<summary>
Read an init script unnamed pipe.
</summary>
@@ -114870,7 +115917,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_write_script_pipes" lineno="2097">
+<interface name="init_write_script_pipes" lineno="2269">
<summary>
Write an init script unnamed pipe.
</summary>
@@ -114880,7 +115927,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getattr_script_files" lineno="2115">
+<interface name="init_getattr_script_files" lineno="2287">
<summary>
Get the attribute of init script entrypoint files.
</summary>
@@ -114890,7 +115937,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_files" lineno="2134">
+<interface name="init_read_script_files" lineno="2306">
<summary>
Read init scripts.
</summary>
@@ -114900,7 +115947,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_exec_script_files" lineno="2153">
+<interface name="init_exec_script_files" lineno="2325">
<summary>
Execute init scripts in the caller domain.
</summary>
@@ -114910,7 +115957,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getattr_all_script_files" lineno="2172">
+<interface name="init_getattr_all_script_files" lineno="2344">
<summary>
Get the attribute of all init script entrypoint files.
</summary>
@@ -114920,7 +115967,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_all_script_files" lineno="2191">
+<interface name="init_read_all_script_files" lineno="2363">
<summary>
Read all init script files.
</summary>
@@ -114930,7 +115977,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_read_all_script_files" lineno="2215">
+<interface name="init_dontaudit_read_all_script_files" lineno="2387">
<summary>
Dontaudit read all init script files.
</summary>
@@ -114940,7 +115987,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_exec_all_script_files" lineno="2233">
+<interface name="init_exec_all_script_files" lineno="2405">
<summary>
Execute all init scripts in the caller domain.
</summary>
@@ -114950,7 +115997,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_state" lineno="2252">
+<interface name="init_read_script_state" lineno="2424">
<summary>
Read the process state (/proc/pid) of the init scripts.
</summary>
@@ -114960,7 +116007,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_script_fds" lineno="2271">
+<interface name="init_use_script_fds" lineno="2443">
<summary>
Inherit and use init script file descriptors.
</summary>
@@ -114970,7 +116017,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_use_script_fds" lineno="2290">
+<interface name="init_dontaudit_use_script_fds" lineno="2462">
<summary>
Do not audit attempts to inherit
init script file descriptors.
@@ -114981,7 +116028,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_search_script_keys" lineno="2308">
+<interface name="init_search_script_keys" lineno="2480">
<summary>
Search init script keys.
</summary>
@@ -114991,7 +116038,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getpgid_script" lineno="2326">
+<interface name="init_getpgid_script" lineno="2498">
<summary>
Get the process group ID of init scripts.
</summary>
@@ -115001,7 +116048,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_sigchld_script" lineno="2344">
+<interface name="init_sigchld_script" lineno="2516">
<summary>
Send SIGCHLD signals to init scripts.
</summary>
@@ -115011,7 +116058,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signal_script" lineno="2362">
+<interface name="init_signal_script" lineno="2534">
<summary>
Send generic signals to init scripts.
</summary>
@@ -115021,7 +116068,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signull_script" lineno="2380">
+<interface name="init_signull_script" lineno="2552">
<summary>
Send null signals to init scripts.
</summary>
@@ -115031,7 +116078,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_script_pipes" lineno="2398">
+<interface name="init_rw_script_pipes" lineno="2570">
<summary>
Read and write init script unnamed pipes.
</summary>
@@ -115041,7 +116088,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stream_connect_script" lineno="2417">
+<interface name="init_stream_connect_script" lineno="2589">
<summary>
Allow the specified domain to connect to
init scripts with a unix socket.
@@ -115052,7 +116099,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_script_stream_sockets" lineno="2436">
+<interface name="init_rw_script_stream_sockets" lineno="2608">
<summary>
Allow the specified domain to read/write to
init scripts with a unix domain stream sockets.
@@ -115063,7 +116110,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_stream_connect_script" lineno="2455">
+<interface name="init_dontaudit_stream_connect_script" lineno="2627">
<summary>
Dont audit the specified domain connecting to
init scripts with a unix domain stream socket.
@@ -115074,7 +116121,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_dbus_send_script" lineno="2472">
+<interface name="init_dbus_send_script" lineno="2644">
<summary>
Send messages to init scripts over dbus.
</summary>
@@ -115084,7 +116131,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dbus_chat_script" lineno="2492">
+<interface name="init_dbus_chat_script" lineno="2664">
<summary>
Send and receive messages from
init scripts over dbus.
@@ -115095,7 +116142,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_script_ptys" lineno="2521">
+<interface name="init_use_script_ptys" lineno="2693">
<summary>
Read and write the init script pty.
</summary>
@@ -115114,7 +116161,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_inherited_script_ptys" lineno="2540">
+<interface name="init_use_inherited_script_ptys" lineno="2712">
<summary>
Read and write inherited init script ptys.
</summary>
@@ -115124,7 +116171,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_use_script_ptys" lineno="2562">
+<interface name="init_dontaudit_use_script_ptys" lineno="2734">
<summary>
Do not audit attempts to read and
write the init script pty.
@@ -115135,7 +116182,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_getattr_script_status_files" lineno="2581">
+<interface name="init_getattr_script_status_files" lineno="2753">
<summary>
Get the attributes of init script
status files.
@@ -115146,7 +116193,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_read_script_status_files" lineno="2600">
+<interface name="init_dontaudit_read_script_status_files" lineno="2772">
<summary>
Do not audit attempts to read init script
status files.
@@ -115157,7 +116204,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_search_run" lineno="2619">
+<interface name="init_search_run" lineno="2791">
<summary>
Search the /run/systemd directory.
</summary>
@@ -115167,7 +116214,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_tmp_files" lineno="2638">
+<interface name="init_read_script_tmp_files" lineno="2810">
<summary>
Read init script temporary data.
</summary>
@@ -115177,7 +116224,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_inherited_script_tmp_files" lineno="2657">
+<interface name="init_rw_inherited_script_tmp_files" lineno="2829">
<summary>
Read and write init script inherited temporary data.
</summary>
@@ -115187,7 +116234,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_script_tmp_files" lineno="2675">
+<interface name="init_rw_script_tmp_files" lineno="2847">
<summary>
Read and write init script temporary data.
</summary>
@@ -115197,7 +116244,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_script_tmp_filetrans" lineno="2710">
+<interface name="init_script_tmp_filetrans" lineno="2882">
<summary>
Create files in a init script
temporary data directory.
@@ -115223,7 +116270,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_getattr_utmp" lineno="2729">
+<interface name="init_getattr_utmp" lineno="2901">
<summary>
Get the attributes of init script process id files.
</summary>
@@ -115233,7 +116280,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_utmp" lineno="2747">
+<interface name="init_read_utmp" lineno="2919">
<summary>
Read utmp.
</summary>
@@ -115243,7 +116290,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_write_utmp" lineno="2766">
+<interface name="init_dontaudit_write_utmp" lineno="2938">
<summary>
Do not audit attempts to write utmp.
</summary>
@@ -115253,7 +116300,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_write_utmp" lineno="2784">
+<interface name="init_write_utmp" lineno="2956">
<summary>
Write to utmp.
</summary>
@@ -115263,7 +116310,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_lock_utmp" lineno="2804">
+<interface name="init_dontaudit_lock_utmp" lineno="2976">
<summary>
Do not audit attempts to lock
init script pid files.
@@ -115274,7 +116321,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_rw_utmp" lineno="2822">
+<interface name="init_rw_utmp" lineno="2994">
<summary>
Read and write utmp.
</summary>
@@ -115284,7 +116331,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_rw_utmp" lineno="2841">
+<interface name="init_dontaudit_rw_utmp" lineno="3013">
<summary>
Do not audit attempts to read and write utmp.
</summary>
@@ -115294,7 +116341,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_manage_utmp" lineno="2859">
+<interface name="init_manage_utmp" lineno="3031">
<summary>
Create, read, write, and delete utmp.
</summary>
@@ -115304,7 +116351,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_relabel_utmp" lineno="2878">
+<interface name="init_relabel_utmp" lineno="3050">
<summary>
Relabel utmp.
</summary>
@@ -115314,18 +116361,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_pid_filetrans_utmp" lineno="2897">
-<summary>
-Create files in /var/run with the
-utmp file type.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_runtime_filetrans_utmp" lineno="2913">
+<interface name="init_runtime_filetrans_utmp" lineno="3069">
<summary>
Create files in /var/run with the
utmp file type.
@@ -115336,17 +116372,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_create_pid_dirs" lineno="2931">
-<summary>
-Create a directory in the /run/systemd directory.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_create_runtime_dirs" lineno="2946">
+<interface name="init_create_runtime_dirs" lineno="3087">
<summary>
Create a directory in the /run/systemd directory.
</summary>
@@ -115356,9 +116382,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rename_pid_files" lineno="2965">
+<interface name="init_read_runtime_files" lineno="3106">
<summary>
-Rename init_runtime_t files
+Read init_runtime_t files
</summary>
<param name="domain">
<summary>
@@ -115366,7 +116392,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_rename_runtime_files" lineno="2980">
+<interface name="init_rename_runtime_files" lineno="3124">
<summary>
Rename init_runtime_t files
</summary>
@@ -115376,9 +116402,9 @@ domain
</summary>
</param>
</interface>
-<interface name="init_delete_pid_files" lineno="2998">
+<interface name="init_setattr_runtime_files" lineno="3142">
<summary>
-Delete init_runtime_t files
+Setattr init_runtime_t files
</summary>
<param name="domain">
<summary>
@@ -115386,7 +116412,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_delete_runtime_files" lineno="3013">
+<interface name="init_delete_runtime_files" lineno="3160">
<summary>
Delete init_runtime_t files
</summary>
@@ -115396,18 +116422,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_write_pid_socket" lineno="3032">
-<summary>
-Allow the specified domain to write to
-init sock file.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_write_runtime_socket" lineno="3048">
+<interface name="init_write_runtime_socket" lineno="3179">
<summary>
Allow the specified domain to write to
init sock file.
@@ -115418,17 +116433,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_pid_pipes" lineno="3066">
-<summary>
-Read init unnamed pipes.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="init_read_runtime_pipes" lineno="3081">
+<interface name="init_read_runtime_pipes" lineno="3197">
<summary>
Read init unnamed pipes.
</summary>
@@ -115438,7 +116443,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_runtime_symlinks" lineno="3099">
+<interface name="init_read_runtime_symlinks" lineno="3215">
<summary>
read systemd unit symlinks (usually under /run/systemd/units/)
</summary>
@@ -115448,7 +116453,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_tcp_recvfrom_all_daemons" lineno="3117">
+<interface name="init_tcp_recvfrom_all_daemons" lineno="3233">
<summary>
Allow the specified domain to connect to daemon with a tcp socket
</summary>
@@ -115458,7 +116463,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_udp_recvfrom_all_daemons" lineno="3135">
+<interface name="init_udp_recvfrom_all_daemons" lineno="3251">
<summary>
Allow the specified domain to connect to daemon with a udp socket
</summary>
@@ -115468,7 +116473,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_status_files" lineno="3154">
+<interface name="init_read_script_status_files" lineno="3270">
<summary>
Allow reading the init script state files
</summary>
@@ -115478,7 +116483,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="init_relabelto_script_state" lineno="3172">
+<interface name="init_relabelto_script_state" lineno="3288">
<summary>
Label to init script status files
</summary>
@@ -115488,7 +116493,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="init_script_readable_type" lineno="3191">
+<interface name="init_script_readable_type" lineno="3307">
<summary>
Mark as a readable type for the initrc_t domain
</summary>
@@ -115498,7 +116503,7 @@ Type that initrc_t needs read access to
</summary>
</param>
</interface>
-<interface name="init_search_units" lineno="3209">
+<interface name="init_search_units" lineno="3325">
<summary>
Search systemd unit dirs.
</summary>
@@ -115508,7 +116513,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_list_unit_dirs" lineno="3234">
+<interface name="init_list_unit_dirs" lineno="3350">
<summary>
List systemd unit dirs.
</summary>
@@ -115518,7 +116523,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_generic_units_symlinks" lineno="3254">
+<interface name="init_read_generic_units_symlinks" lineno="3370">
<summary>
Read systemd unit links
</summary>
@@ -115528,7 +116533,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_generic_units_status" lineno="3272">
+<interface name="init_get_generic_units_status" lineno="3388">
<summary>
Get status of generic systemd units.
</summary>
@@ -115538,7 +116543,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_generic_units" lineno="3291">
+<interface name="init_start_generic_units" lineno="3407">
<summary>
Start generic systemd units.
</summary>
@@ -115548,7 +116553,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_generic_units" lineno="3310">
+<interface name="init_stop_generic_units" lineno="3426">
<summary>
Stop generic systemd units.
</summary>
@@ -115558,7 +116563,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_reload_generic_units" lineno="3329">
+<interface name="init_reload_generic_units" lineno="3445">
<summary>
Reload generic systemd units.
</summary>
@@ -115568,7 +116573,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_all_units_status" lineno="3348">
+<interface name="init_get_all_units_status" lineno="3464">
<summary>
Get status of all systemd units.
</summary>
@@ -115578,7 +116583,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_all_units" lineno="3367">
+<interface name="init_manage_all_units" lineno="3483">
<summary>
All perms on all systemd units.
</summary>
@@ -115588,7 +116593,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_all_units" lineno="3387">
+<interface name="init_start_all_units" lineno="3503">
<summary>
Start all systemd units.
</summary>
@@ -115598,7 +116603,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_all_units" lineno="3406">
+<interface name="init_stop_all_units" lineno="3522">
<summary>
Stop all systemd units.
</summary>
@@ -115608,7 +116613,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_reload_all_units" lineno="3425">
+<interface name="init_reload_all_units" lineno="3541">
<summary>
Reload all systemd units.
</summary>
@@ -115618,7 +116623,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_admin" lineno="3444">
+<interface name="init_manage_all_unit_files" lineno="3560">
+<summary>
+Manage systemd unit dirs and the files in them
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_admin" lineno="3580">
<summary>
Allow unconfined access to send instructions to init
</summary>
@@ -115628,7 +116643,7 @@ Target domain
</summary>
</param>
</interface>
-<interface name="init_getrlimit" lineno="3476">
+<interface name="init_getrlimit" lineno="3612">
<summary>
Allow getting init_t rlimit
</summary>
@@ -115797,7 +116812,7 @@ Domain allowed access.
</interface>
<interface name="ipsec_write_pid" lineno="259">
<summary>
-write the ipsec_runtime_t files.
+write the ipsec_runtime_t files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -115805,9 +116820,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ipsec_manage_pid" lineno="278">
+<interface name="ipsec_manage_pid" lineno="275">
<summary>
Create, read, write, and delete the IPSEC pid files.
+(Deprecated)
</summary>
<param name="domain">
<summary>
@@ -115815,7 +116831,27 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ipsec_domtrans_racoon" lineno="297">
+<interface name="ipsec_write_runtime_files" lineno="290">
+<summary>
+Write ipsec runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="ipsec_manage_runtime_files" lineno="309">
+<summary>
+Create, read, write, and delete the IPSEC runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="ipsec_domtrans_racoon" lineno="328">
<summary>
Execute racoon in the racoon domain.
</summary>
@@ -115825,7 +116861,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ipsec_run_racoon" lineno="321">
+<interface name="ipsec_run_racoon" lineno="352">
<summary>
Execute racoon and allow the specified role the domain.
</summary>
@@ -115841,7 +116877,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="ipsec_domtrans_setkey" lineno="340">
+<interface name="ipsec_domtrans_setkey" lineno="371">
<summary>
Execute setkey in the setkey domain.
</summary>
@@ -115851,7 +116887,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ipsec_run_setkey" lineno="364">
+<interface name="ipsec_run_setkey" lineno="395">
<summary>
Execute setkey and allow the specified role the domains.
</summary>
@@ -115867,7 +116903,7 @@ Role allowed access..
</param>
<rolecap/>
</interface>
-<interface name="ipsec_admin" lineno="390">
+<interface name="ipsec_admin" lineno="421">
<summary>
All of the rules required to
administrate an ipsec environment.
@@ -115985,7 +117021,7 @@ Domain allowed access.
</interface>
<interface name="iptables_dontaudit_read_pids" lineno="177">
<summary>
-dontaudit reading iptables_runtime_t
+dontaudit reading iptables_runtime_t (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -115993,7 +117029,17 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="iptables_startstop" lineno="195">
+<interface name="iptables_dontaudit_read_runtime_files" lineno="192">
+<summary>
+Do not audit reading iptables runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="iptables_startstop" lineno="210">
<summary>
Allow specified domain to start and stop iptables service
</summary>
@@ -116003,7 +117049,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_status" lineno="214">
+<interface name="iptables_status" lineno="229">
<summary>
Allow specified domain to get status of iptables service
</summary>
@@ -116013,7 +117059,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_admin" lineno="241">
+<interface name="iptables_admin" lineno="256">
<summary>
All of the rules required to
administrate an iptables
@@ -116746,7 +117792,17 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="logging_status_syslog" lineno="440">
+<interface name="logging_startstop_syslog" lineno="440">
+<summary>
+Allow specified domain to start/stop syslog units
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="logging_status_syslog" lineno="459">
<summary>
Allow specified domain to check status of syslog unit
</summary>
@@ -116756,7 +117812,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_setattr_syslogd_tmp_files" lineno="460">
+<interface name="logging_setattr_syslogd_tmp_files" lineno="479">
<summary>
Set the attributes of syslog temporary files.
</summary>
@@ -116767,7 +117823,18 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_relabel_syslogd_tmp_files" lineno="479">
+<interface name="logging_audit_socket_activation" lineno="498">
+<summary>
+Allow the domain to create the audit socket
+for syslogd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="logging_relabel_syslogd_tmp_files" lineno="517">
<summary>
Relabel to and from syslog temporary file type.
</summary>
@@ -116778,7 +117845,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_setattr_syslogd_tmp_dirs" lineno="498">
+<interface name="logging_setattr_syslogd_tmp_dirs" lineno="536">
<summary>
Set the attributes of syslog temporary directories.
</summary>
@@ -116789,7 +117856,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_relabel_syslogd_tmp_dirs" lineno="517">
+<interface name="logging_relabel_syslogd_tmp_dirs" lineno="555">
<summary>
Relabel to and from syslog temporary directory type.
</summary>
@@ -116800,7 +117867,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_log_filetrans" lineno="578">
+<interface name="logging_log_filetrans" lineno="616">
<summary>
Create an object in the log directory, with a private type.
</summary>
@@ -116853,7 +117920,7 @@ The name of the object being created.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="logging_send_syslog_msg" lineno="620">
+<interface name="logging_send_syslog_msg" lineno="658">
<summary>
Send system log messages.
</summary>
@@ -116885,7 +117952,18 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_relabelto_devlog_sock_files" lineno="663">
+<interface name="logging_use_syslogd_fd" lineno="701">
+<summary>
+Allow domain to use a file descriptor
+from syslogd.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="logging_relabelto_devlog_sock_files" lineno="720">
<summary>
Allow domain to relabelto devlog sock_files
</summary>
@@ -116896,7 +117974,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_create_devlog" lineno="681">
+<interface name="logging_create_devlog" lineno="738">
<summary>
Connect to the syslog control unix stream socket.
</summary>
@@ -116906,7 +117984,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_read_audit_config" lineno="702">
+<interface name="logging_read_audit_config" lineno="759">
<summary>
Read the auditd configuration files.
</summary>
@@ -116917,7 +117995,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_dontaudit_search_audit_config" lineno="725">
+<interface name="logging_dontaudit_search_audit_config" lineno="782">
<summary>
dontaudit search of auditd configuration files.
</summary>
@@ -116928,7 +118006,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="logging_read_syslog_config" lineno="744">
+<interface name="logging_read_syslog_config" lineno="801">
<summary>
Read syslog configuration files.
</summary>
@@ -116939,7 +118017,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_watch_runtime_dirs" lineno="762">
+<interface name="logging_watch_runtime_dirs" lineno="819">
<summary>
Watch syslog runtime dirs.
</summary>
@@ -116949,7 +118027,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_delete_devlog_socket" lineno="781">
+<interface name="logging_delete_devlog_socket" lineno="838">
<summary>
Delete the syslog socket files
</summary>
@@ -116960,7 +118038,17 @@ Domain allowed access
</param>
<rolecap/>
</interface>
-<interface name="logging_manage_pid_sockets" lineno="799">
+<interface name="logging_manage_pid_sockets" lineno="856">
+<summary>
+Create, read, write, and delete syslog PID sockets. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="logging_manage_runtime_sockets" lineno="871">
<summary>
Create, read, write, and delete syslog PID sockets.
</summary>
@@ -116970,7 +118058,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_search_logs" lineno="820">
+<interface name="logging_search_logs" lineno="892">
<summary>
Allows the domain to open a file in the
log directory, but does not allow the listing
@@ -116982,7 +118070,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_dontaudit_search_logs" lineno="840">
+<interface name="logging_dontaudit_search_logs" lineno="912">
<summary>
Do not audit attempts to search the var log directory.
</summary>
@@ -116992,7 +118080,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="logging_list_logs" lineno="858">
+<interface name="logging_list_logs" lineno="930">
<summary>
List the contents of the generic log directory (/var/log).
</summary>
@@ -117002,7 +118090,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_rw_generic_log_dirs" lineno="878">
+<interface name="logging_rw_generic_log_dirs" lineno="950">
<summary>
Read and write the generic log directory (/var/log).
</summary>
@@ -117012,7 +118100,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_search_all_logs" lineno="899">
+<interface name="logging_search_all_logs" lineno="971">
<summary>
Search through all log dirs.
</summary>
@@ -117023,7 +118111,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_setattr_all_log_dirs" lineno="918">
+<interface name="logging_setattr_all_log_dirs" lineno="990">
<summary>
Set attributes on all log dirs.
</summary>
@@ -117034,7 +118122,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_dontaudit_getattr_all_logs" lineno="937">
+<interface name="logging_dontaudit_getattr_all_logs" lineno="1009">
<summary>
Do not audit attempts to get the attributes
of any log files.
@@ -117045,9 +118133,9 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="logging_getattr_all_logs" lineno="955">
+<interface name="logging_getattr_all_logs" lineno="1027">
<summary>
-Read the atttributes of any log file
+Read the attributes of any log file
</summary>
<param name="domain">
<summary>
@@ -117055,7 +118143,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="logging_append_all_logs" lineno="973">
+<interface name="logging_append_all_logs" lineno="1045">
<summary>
Append to all log files.
</summary>
@@ -117065,7 +118153,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_append_all_inherited_logs" lineno="994">
+<interface name="logging_append_all_inherited_logs" lineno="1066">
<summary>
Append to all log files.
</summary>
@@ -117075,7 +118163,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_read_all_logs" lineno="1013">
+<interface name="logging_read_all_logs" lineno="1085">
<summary>
Read all log files.
</summary>
@@ -117086,7 +118174,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_exec_all_logs" lineno="1035">
+<interface name="logging_exec_all_logs" lineno="1107">
<summary>
Execute all log files in the caller domain.
</summary>
@@ -117096,7 +118184,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_rw_all_logs" lineno="1055">
+<interface name="logging_rw_all_logs" lineno="1127">
<summary>
read/write to all log files.
</summary>
@@ -117106,7 +118194,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_manage_all_logs" lineno="1075">
+<interface name="logging_manage_all_logs" lineno="1147">
<summary>
Create, read, write, and delete all log files.
</summary>
@@ -117117,7 +118205,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_manage_generic_log_dirs" lineno="1096">
+<interface name="logging_manage_generic_log_dirs" lineno="1168">
<summary>
Create, read, write, and delete generic log directories.
</summary>
@@ -117128,7 +118216,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_relabel_generic_log_dirs" lineno="1116">
+<interface name="logging_relabel_generic_log_dirs" lineno="1188">
<summary>
Relabel from and to generic log directory type.
</summary>
@@ -117139,7 +118227,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_read_generic_logs" lineno="1136">
+<interface name="logging_read_generic_logs" lineno="1208">
<summary>
Read generic log files.
</summary>
@@ -117150,7 +118238,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_mmap_generic_logs" lineno="1157">
+<interface name="logging_mmap_generic_logs" lineno="1229">
<summary>
Map generic log files.
</summary>
@@ -117161,7 +118249,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_write_generic_logs" lineno="1175">
+<interface name="logging_write_generic_logs" lineno="1247">
<summary>
Write generic log files.
</summary>
@@ -117171,7 +118259,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_dontaudit_write_generic_logs" lineno="1196">
+<interface name="logging_dontaudit_write_generic_logs" lineno="1268">
<summary>
Dontaudit Write generic log files.
</summary>
@@ -117181,7 +118269,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="logging_rw_generic_logs" lineno="1214">
+<interface name="logging_rw_generic_logs" lineno="1286">
<summary>
Read and write generic log files.
</summary>
@@ -117191,7 +118279,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_manage_generic_logs" lineno="1237">
+<interface name="logging_manage_generic_logs" lineno="1309">
<summary>
Create, read, write, and delete
generic log files.
@@ -117203,7 +118291,17 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_admin_audit" lineno="1263">
+<interface name="logging_watch_generic_logs_dir" lineno="1328">
+<summary>
+Watch generic log dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="logging_admin_audit" lineno="1353">
<summary>
All of the rules required to administrate
the audit environment
@@ -117220,7 +118318,7 @@ User role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_admin_syslog" lineno="1307">
+<interface name="logging_admin_syslog" lineno="1397">
<summary>
All of the rules required to administrate
the syslog environment
@@ -117237,7 +118335,7 @@ User role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_admin" lineno="1363">
+<interface name="logging_admin" lineno="1453">
<summary>
All of the rules required to administrate
the logging environment
@@ -117254,7 +118352,7 @@ User role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_syslog_managed_log_file" lineno="1386">
+<interface name="logging_syslog_managed_log_file" lineno="1476">
<summary>
Mark the type as a syslog managed log file
and introduce the proper file transition when
@@ -117272,7 +118370,7 @@ Name to use for the file
</summary>
</param>
</interface>
-<interface name="logging_syslog_managed_log_dir" lineno="1425">
+<interface name="logging_syslog_managed_log_dir" lineno="1515">
<summary>
Mark the type as a syslog managed log dir
and introduce the proper file transition when
@@ -117299,7 +118397,7 @@ Name to use for the directory
</summary>
</param>
</interface>
-<interface name="logging_mmap_journal" lineno="1447">
+<interface name="logging_mmap_journal" lineno="1537">
<summary>
Map files in /run/log/journal/ directory.
</summary>
@@ -117369,7 +118467,28 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="lvm_manage_config" lineno="116">
+<interface name="lvm_map_config" lineno="126">
+<summary>
+Map lvm config files.
+</summary>
+<desc>
+<p>
+Allow the specified domain to map lvm config files.
+</p>
+<p>
+Related interfaces:
+</p>
+<ul>
+<li>lvm_read_config()</li>
+</ul>
+</desc>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="lvm_manage_config" lineno="145">
<summary>
Manage LVM configuration files.
</summary>
@@ -117380,7 +118499,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="lvm_create_lock_dirs" lineno="137">
+<interface name="lvm_create_lock_dirs" lineno="166">
<summary>
Create lvm_lock_t directories
</summary>
@@ -117391,9 +118510,9 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="lvm_rw_inherited_pid_pipes" lineno="156">
+<interface name="lvm_rw_inherited_pid_pipes" lineno="185">
<summary>
-Read and write a lvm unnamed pipe.
+Read and write a lvm unnamed pipe. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -117401,7 +118520,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="lvm_domtrans_clvmd" lineno="174">
+<interface name="lvm_domtrans_clvmd" lineno="199">
<summary>
Execute a domain transition to run clvmd.
</summary>
@@ -117411,7 +118530,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="lvm_admin" lineno="199">
+<interface name="lvm_admin" lineno="224">
<summary>
All of the rules required to
administrate an lvm environment.
@@ -117610,7 +118729,19 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_read_fonts" lineno="296">
+<interface name="miscfiles_manage_generic_tls_privkey_symlinks" lineno="297">
+<summary>
+Manage generic SSL/TLS private
+keys.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="miscfiles_read_fonts" lineno="316">
<summary>
Read fonts.
</summary>
@@ -117621,7 +118752,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_setattr_fonts_dirs" lineno="327">
+<interface name="miscfiles_setattr_fonts_dirs" lineno="347">
<summary>
Set the attributes on a fonts directory.
</summary>
@@ -117632,7 +118763,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_dontaudit_setattr_fonts_dirs" lineno="347">
+<interface name="miscfiles_dontaudit_setattr_fonts_dirs" lineno="367">
<summary>
Do not audit attempts to set the attributes
on a fonts directory.
@@ -117644,7 +118775,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_dontaudit_write_fonts" lineno="366">
+<interface name="miscfiles_dontaudit_write_fonts" lineno="386">
<summary>
Do not audit attempts to write fonts.
</summary>
@@ -117655,7 +118786,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_manage_fonts" lineno="386">
+<interface name="miscfiles_manage_fonts" lineno="406">
<summary>
Create, read, write, and delete fonts.
</summary>
@@ -117666,7 +118797,18 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_setattr_fonts_cache_dirs" lineno="410">
+<interface name="miscfiles_watch_fonts_dirs" lineno="431">
+<summary>
+Watch fonts directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="miscfiles_setattr_fonts_cache_dirs" lineno="449">
<summary>
Set the attributes on a fonts cache directory.
</summary>
@@ -117676,7 +118818,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_dontaudit_setattr_fonts_cache_dirs" lineno="429">
+<interface name="miscfiles_dontaudit_setattr_fonts_cache_dirs" lineno="468">
<summary>
Do not audit attempts to set the attributes
on a fonts cache directory.
@@ -117687,7 +118829,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="miscfiles_manage_fonts_cache" lineno="448">
+<interface name="miscfiles_manage_fonts_cache" lineno="487">
<summary>
Create, read, write, and delete fonts cache.
</summary>
@@ -117698,7 +118840,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_read_hwdata" lineno="470">
+<interface name="miscfiles_read_hwdata" lineno="509">
<summary>
Read hardware identification data.
</summary>
@@ -117708,7 +118850,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_setattr_localization" lineno="490">
+<interface name="miscfiles_setattr_localization" lineno="529">
<summary>
Allow process to setattr localization info
</summary>
@@ -117718,7 +118860,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_read_localization" lineno="522">
+<interface name="miscfiles_read_localization" lineno="561">
<summary>
Allow process to read localization information.
</summary>
@@ -117740,7 +118882,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="miscfiles_rw_localization" lineno="545">
+<interface name="miscfiles_rw_localization" lineno="584">
<summary>
Allow process to write localization info
</summary>
@@ -117750,7 +118892,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_relabel_localization" lineno="565">
+<interface name="miscfiles_relabel_localization" lineno="604">
<summary>
Allow process to relabel localization info
</summary>
@@ -117760,7 +118902,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_legacy_read_localization" lineno="584">
+<interface name="miscfiles_legacy_read_localization" lineno="623">
<summary>
Allow process to read legacy time localization info
</summary>
@@ -117770,7 +118912,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_watch_localization" lineno="603">
+<interface name="miscfiles_watch_localization" lineno="642">
<summary>
Watch time localization info
</summary>
@@ -117780,7 +118922,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_search_man_pages" lineno="621">
+<interface name="miscfiles_search_man_pages" lineno="660">
<summary>
Search man pages.
</summary>
@@ -117790,7 +118932,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_dontaudit_search_man_pages" lineno="640">
+<interface name="miscfiles_dontaudit_search_man_pages" lineno="679">
<summary>
Do not audit attempts to search man pages.
</summary>
@@ -117800,7 +118942,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="miscfiles_read_man_pages" lineno="659">
+<interface name="miscfiles_read_man_pages" lineno="698">
<summary>
Read man pages
</summary>
@@ -117811,7 +118953,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_delete_man_pages" lineno="681">
+<interface name="miscfiles_delete_man_pages" lineno="720">
<summary>
Delete man pages
</summary>
@@ -117821,7 +118963,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_manage_man_pages" lineno="703">
+<interface name="miscfiles_manage_man_pages" lineno="742">
<summary>
Create, read, write, and delete man pages
</summary>
@@ -117831,7 +118973,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_read_man_cache" lineno="724">
+<interface name="miscfiles_read_man_cache" lineno="763">
<summary>
Read man cache content.
</summary>
@@ -117841,7 +118983,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_map_man_cache" lineno="745">
+<interface name="miscfiles_map_man_cache" lineno="784">
<summary>
Map man cache content.
</summary>
@@ -117851,7 +118993,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_manage_man_cache" lineno="764">
+<interface name="miscfiles_manage_man_cache" lineno="803">
<summary>
Create, read, write, and delete
man cache content.
@@ -117862,7 +119004,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_relabel_man_cache" lineno="785">
+<interface name="miscfiles_relabel_man_cache" lineno="824">
<summary>
Relabel from and to man cache.
</summary>
@@ -117872,7 +119014,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_read_public_files" lineno="806">
+<interface name="miscfiles_read_public_files" lineno="845">
<summary>
Read public files used for file
transfer services.
@@ -117884,7 +119026,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_manage_public_files" lineno="828">
+<interface name="miscfiles_manage_public_files" lineno="867">
<summary>
Create, read, write, and delete public files
and directories used for file transfer services.
@@ -117896,7 +119038,17 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_read_tetex_data" lineno="848">
+<interface name="miscfiles_watch_public_dirs" lineno="887">
+<summary>
+Watch public files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="miscfiles_read_tetex_data" lineno="905">
<summary>
Read TeX data
</summary>
@@ -117906,7 +119058,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_exec_tetex_data" lineno="872">
+<interface name="miscfiles_exec_tetex_data" lineno="929">
<summary>
Execute TeX data programs in the caller domain.
</summary>
@@ -117916,7 +119068,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_domain_entry_test_files" lineno="896">
+<interface name="miscfiles_domain_entry_test_files" lineno="953">
<summary>
Let test files be an entry point for
a specified domain.
@@ -117927,7 +119079,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_read_test_files" lineno="914">
+<interface name="miscfiles_read_test_files" lineno="971">
<summary>
Read test files and directories.
</summary>
@@ -117937,7 +119089,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_exec_test_files" lineno="933">
+<interface name="miscfiles_exec_test_files" lineno="990">
<summary>
Execute test files.
</summary>
@@ -117947,7 +119099,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_etc_filetrans_localization" lineno="953">
+<interface name="miscfiles_etc_filetrans_localization" lineno="1010">
<summary>
Create files in etc directories
with localization file type.
@@ -117958,7 +119110,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_manage_localization" lineno="973">
+<interface name="miscfiles_manage_localization" lineno="1030">
<summary>
Create, read, write, and delete localization
</summary>
@@ -117982,7 +119134,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="modutils_read_module_deps" lineno="31">
+<interface name="modutils_read_module_deps" lineno="32">
<summary>
Read the dependencies of kernel modules.
</summary>
@@ -117992,9 +119144,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="modutils_read_module_objects" lineno="50">
+<interface name="modutils_read_module_objects" lineno="51">
<summary>
-Read the kernel modules.
+Read the kernel modules. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -118002,7 +119154,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="modutils_read_module_config" lineno="71">
+<interface name="modutils_read_module_config" lineno="68">
<summary>
Read the configuration options used when
loading modules.
@@ -118014,7 +119166,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="modutils_rename_module_config" lineno="97">
+<interface name="modutils_rename_module_config" lineno="94">
<summary>
Rename a file with the configuration options used when
loading modules.
@@ -118025,7 +119177,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="modutils_delete_module_config" lineno="116">
+<interface name="modutils_delete_module_config" lineno="113">
<summary>
Unlink a file with the configuration options used when
loading modules.
@@ -118036,7 +119188,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="modutils_manage_module_config" lineno="135">
+<interface name="modutils_manage_module_config" lineno="132">
<summary>
Manage files with the configuration options used when
loading modules.
@@ -118047,7 +119199,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="modutils_domtrans" lineno="155">
+<interface name="modutils_domtrans" lineno="152">
<summary>
Execute any modutil,
like insmod, kmod, depmod or updates-modules,
@@ -118059,7 +119211,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="modutils_run" lineno="184">
+<interface name="modutils_run" lineno="181">
<summary>
Execute any modutil,
like insmod, kmod, depmod or updates-modules,
@@ -118079,7 +119231,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="modutils_exec" lineno="205">
+<interface name="modutils_exec" lineno="202">
<summary>
Execute any modutil,
like insmod, kmod, depmod or updates-modules,
@@ -118091,137 +119243,6 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="modutils_domtrans_insmod_uncond" lineno="226">
-<summary>
-Unconditionally execute insmod in the insmod domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="modutils_domtrans_insmod" lineno="241">
-<summary>
-Execute insmod in the insmod domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="modutils_run_insmod" lineno="265">
-<summary>
-Execute insmod in the insmod domain, and
-allow the specified role the insmod domain,
-and use the caller's terminal. Has a sigchld
-backchannel.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="modutils_exec_insmod" lineno="280">
-<summary>
-Execute insmod in the caller domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="modutils_domtrans_depmod" lineno="295">
-<summary>
-Execute depmod in the depmod domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="modutils_run_depmod" lineno="316">
-<summary>
-Execute depmod in the depmod domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="modutils_exec_depmod" lineno="331">
-<summary>
-Execute depmod in the caller domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="modutils_domtrans_update_mods" lineno="346">
-<summary>
-Execute update_modules in the update_modules domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="modutils_run_update_mods" lineno="367">
-<summary>
-Execute update_modules in the update_modules domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-<param name="role">
-<summary>
-Role allowed access.
-</summary>
-</param>
-<rolecap/>
-</interface>
-<interface name="modutils_exec_update_mods" lineno="382">
-<summary>
-Execute update_modules in the caller domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="modutils_read_var_run_files" lineno="397">
-<summary>
-Read kmod lib files.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
</module>
<module name="mount" filename="policy/modules/system/mount.if">
<summary>Policy for mount.</summary>
@@ -118419,41 +119440,12 @@ Role allowed access.
<rolecap/>
</interface>
</module>
-<module name="pcmcia" filename="policy/modules/system/pcmcia.if">
-<summary>PCMCIA card management services.</summary>
-<interface name="pcmcia_stub" lineno="13">
-<summary>
-PCMCIA stub interface. No access allowed.
-</summary>
-<param name="domain" unused="true">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="pcmcia_domtrans_cardmgr" lineno="29">
-<summary>
-Execute cardmgr in the cardmgr domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="pcmcia_use_cardmgr_fds" lineno="48">
-<summary>
-Inherit and use cardmgr file descriptors.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed access.
-</summary>
-</param>
-</interface>
-<interface name="pcmcia_domtrans_cardctl" lineno="66">
+<module name="raid" filename="policy/modules/system/raid.if">
+<summary>RAID array management tools.</summary>
+<interface name="raid_domtrans_mdadm" lineno="14">
<summary>
-Execute cardctl in the cardmgr domain.
+Execute software raid tools in
+the mdadm domain.
</summary>
<param name="domain">
<summary>
@@ -118461,38 +119453,26 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="pcmcia_run_cardctl" lineno="93">
+<interface name="raid_run_mdadm" lineno="40">
<summary>
-Execute cardctl in the cardmgr
+Execute mdadm in the mdadm
domain, and allow the specified
-role the cardmgr domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
+role the mdadm domain.
</summary>
-</param>
<param name="role">
<summary>
Role allowed access.
</summary>
</param>
-<rolecap/>
-</interface>
-<interface name="pcmcia_read_pid" lineno="112">
-<summary>
-Read cardmgr pid files.
-</summary>
<param name="domain">
<summary>
-Domain allowed access.
+Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="pcmcia_manage_pid" lineno="132">
+<interface name="raid_read_mdadm_pid" lineno="59">
<summary>
-Create, read, write, and delete
-cardmgr pid files.
+read mdadm pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -118500,10 +119480,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="pcmcia_manage_pid_chr_files" lineno="152">
+<interface name="raid_manage_mdadm_pid" lineno="75">
<summary>
Create, read, write, and delete
-cardmgr runtime character nodes.
+mdadm pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -118511,40 +119491,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-</module>
-<module name="raid" filename="policy/modules/system/raid.if">
-<summary>RAID array management tools.</summary>
-<interface name="raid_domtrans_mdadm" lineno="14">
-<summary>
-Execute software raid tools in
-the mdadm domain.
-</summary>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="raid_run_mdadm" lineno="40">
-<summary>
-Execute mdadm in the mdadm
-domain, and allow the specified
-role the mdadm domain.
-</summary>
-<param name="role">
+<interface name="raid_read_mdadm_runtime_files" lineno="90">
<summary>
-Role allowed access.
-</summary>
-</param>
-<param name="domain">
-<summary>
-Domain allowed to transition.
-</summary>
-</param>
-</interface>
-<interface name="raid_read_mdadm_pid" lineno="59">
-<summary>
-read mdadm pid files.
+Read mdadm runtime files.
</summary>
<param name="domain">
<summary>
@@ -118552,10 +119501,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="raid_manage_mdadm_pid" lineno="80">
+<interface name="raid_manage_mdadm_runtime_files" lineno="111">
<summary>
Create, read, write, and delete
-mdadm pid files.
+mdadm runtime files.
</summary>
<param name="domain">
<summary>
@@ -118563,7 +119512,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="raid_admin_mdadm" lineno="106">
+<interface name="raid_admin_mdadm" lineno="137">
<summary>
All of the rules required to
administrate an mdadm environment.
@@ -119265,7 +120214,7 @@ Domain allowed to transition.
</interface>
<interface name="setrans_translate_context" lineno="32">
<summary>
-Allow a domain to translate contexts. (Deprecated)
+Allow a domain to translate contexts.
</summary>
<param name="domain">
<summary>
@@ -119273,7 +120222,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="setrans_admin" lineno="52">
+<interface name="setrans_admin" lineno="58">
<summary>
All of the rules required to
administrate an setrans environment.
@@ -119497,7 +120446,39 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_dontaudit_read_config" lineno="377">
+<interface name="sysnet_mmap_config_files" lineno="385">
+<summary>
+Map network config files.
+</summary>
+<desc>
+<p>
+Allow the specified domain to mmap the
+general network configuration files.
+</p>
+</desc>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sysnet_mmap_read_config" lineno="410">
+<summary>
+map network config files.
+</summary>
+<desc>
+<p>
+Allow the specified domain to mmap the
+general network configuration files.
+</p>
+</desc>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sysnet_dontaudit_read_config" lineno="429">
<summary>
Do not audit attempts to read network config files.
</summary>
@@ -119507,7 +120488,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="sysnet_write_config" lineno="395">
+<interface name="sysnet_write_config" lineno="447">
<summary>
Write network config files.
</summary>
@@ -119517,7 +120498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_create_config" lineno="414">
+<interface name="sysnet_create_config" lineno="466">
<summary>
Create network config files.
</summary>
@@ -119527,7 +120508,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_relabel_config" lineno="433">
+<interface name="sysnet_relabel_config" lineno="485">
<summary>
Relabel network config files.
</summary>
@@ -119537,7 +120518,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_etc_filetrans_config" lineno="458">
+<interface name="sysnet_etc_filetrans_config" lineno="510">
<summary>
Create files in /etc with the type used for
the network config files.
@@ -119553,7 +120534,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="sysnet_manage_config" lineno="476">
+<interface name="sysnet_manage_config" lineno="528">
<summary>
Create, read, write, and delete network config files.
</summary>
@@ -119563,9 +120544,29 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_read_dhcpc_pid" lineno="504">
+<interface name="sysnet_read_dhcpc_pid" lineno="556">
+<summary>
+Read the dhcp client pid file. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sysnet_delete_dhcpc_pid" lineno="571">
+<summary>
+Delete the dhcp client pid file. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="sysnet_read_dhcpc_runtime_files" lineno="586">
<summary>
-Read the dhcp client pid file.
+Read dhcp client runtime files.
</summary>
<param name="domain">
<summary>
@@ -119573,9 +120574,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_delete_dhcpc_pid" lineno="523">
+<interface name="sysnet_delete_dhcpc_runtime_files" lineno="605">
<summary>
-Delete the dhcp client pid file.
+Delete the dhcp client runtime files.
</summary>
<param name="domain">
<summary>
@@ -119583,7 +120584,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_domtrans_ifconfig" lineno="541">
+<interface name="sysnet_domtrans_ifconfig" lineno="623">
<summary>
Execute ifconfig in the ifconfig domain.
</summary>
@@ -119593,7 +120594,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="sysnet_run_ifconfig" lineno="568">
+<interface name="sysnet_run_ifconfig" lineno="650">
<summary>
Execute ifconfig in the ifconfig domain, and
allow the specified role the ifconfig domain,
@@ -119611,7 +120612,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_exec_ifconfig" lineno="588">
+<interface name="sysnet_exec_ifconfig" lineno="670">
<summary>
Execute ifconfig in the caller domain.
</summary>
@@ -119621,7 +120622,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_signal_ifconfig" lineno="608">
+<interface name="sysnet_signal_ifconfig" lineno="690">
<summary>
Send a generic signal to ifconfig.
</summary>
@@ -119632,7 +120633,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_signull_ifconfig" lineno="627">
+<interface name="sysnet_signull_ifconfig" lineno="709">
<summary>
Send null signals to ifconfig.
</summary>
@@ -119643,7 +120644,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_read_dhcp_config" lineno="645">
+<interface name="sysnet_read_dhcp_config" lineno="727">
<summary>
Read the DHCP configuration files.
</summary>
@@ -119653,7 +120654,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_search_dhcp_state" lineno="665">
+<interface name="sysnet_search_dhcp_state" lineno="747">
<summary>
Search the DHCP state data directory.
</summary>
@@ -119663,7 +120664,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_dhcp_state_filetrans" lineno="709">
+<interface name="sysnet_dhcp_state_filetrans" lineno="791">
<summary>
Create DHCP state data.
</summary>
@@ -119698,7 +120699,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="sysnet_dns_name_resolve" lineno="729">
+<interface name="sysnet_dns_name_resolve" lineno="811">
<summary>
Perform a DNS name resolution.
</summary>
@@ -119709,7 +120710,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_use_ldap" lineno="780">
+<interface name="sysnet_use_ldap" lineno="861">
<summary>
Connect and use a LDAP server.
</summary>
@@ -119719,7 +120720,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_use_portmap" lineno="808">
+<interface name="sysnet_use_portmap" lineno="888">
<summary>
Connect and use remote port mappers.
</summary>
@@ -119729,7 +120730,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_dhcpc_script_entry" lineno="843">
+<interface name="sysnet_dhcpc_script_entry" lineno="922">
<summary>
Make the specified program domain
accessable from the DHCP hooks/scripts.
@@ -119745,6 +120746,14 @@ The type of the file used as an entrypoint to this domain.
</summary>
</param>
</interface>
+<tunable name="dhcpc_manage_samba" dftval="false">
+<desc>
+<p>
+Determine whether DHCP client
+can manage samba
+</p>
+</desc>
+</tunable>
</module>
<module name="systemd" filename="policy/modules/system/systemd.if">
<summary>Systemd components (not PID 1)</summary>
@@ -119768,7 +120777,7 @@ The user domain for the role.
</summary>
</param>
</template>
-<interface name="systemd_log_parse_environment" lineno="74">
+<interface name="systemd_log_parse_environment" lineno="82">
<summary>
Make the specified type usable as an
log parse environment type.
@@ -119779,7 +120788,7 @@ Type to be used as a log parse environment type.
</summary>
</param>
</interface>
-<interface name="systemd_use_nss" lineno="94">
+<interface name="systemd_use_nss" lineno="102">
<summary>
Allow domain to use systemd's Name Service Switch (NSS) module.
This module provides UNIX user and group name resolution for dynamic users
@@ -119791,7 +120800,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_PrivateDevices" lineno="121">
+<interface name="systemd_PrivateDevices" lineno="129">
<summary>
Allow domain to be used as a systemd service with a unit
that uses PrivateDevices=yes in section [Service].
@@ -119802,7 +120811,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_read_hwdb" lineno="138">
+<interface name="systemd_read_hwdb" lineno="146">
<summary>
Allow domain to read udev hwdb file
</summary>
@@ -119812,7 +120821,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_map_hwdb" lineno="156">
+<interface name="systemd_map_hwdb" lineno="164">
<summary>
Allow domain to map udev hwdb file
</summary>
@@ -119822,9 +120831,9 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_pids" lineno="174">
+<interface name="systemd_read_logind_pids" lineno="182">
<summary>
-Read systemd_login PID files.
+Read systemd_login PID files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -119832,9 +120841,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_logind_pid_pipes" lineno="194">
+<interface name="systemd_manage_logind_pid_pipes" lineno="197">
<summary>
-Manage systemd_login PID pipes.
+Manage systemd_login PID pipes. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -119842,9 +120851,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_logind_pid_pipes" lineno="213">
+<interface name="systemd_write_logind_pid_pipes" lineno="212">
<summary>
-Write systemd_login named pipe.
+Write systemd_login named pipe. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -119852,7 +120861,37 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_use_logind_fds" lineno="234">
+<interface name="systemd_read_logind_runtime_files" lineno="227">
+<summary>
+Read systemd-logind runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_manage_logind_runtime_pipes" lineno="247">
+<summary>
+Manage systemd-logind runtime pipes.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_write_logind_runtime_pipes" lineno="266">
+<summary>
+Write systemd-logind runtime named pipe.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_use_logind_fds" lineno="287">
<summary>
Use inherited systemd
logind file descriptors.
@@ -119863,7 +120902,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_sessions_files" lineno="252">
+<interface name="systemd_read_logind_sessions_files" lineno="305">
<summary>
Read logind sessions files.
</summary>
@@ -119873,7 +120912,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="273">
+<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="326">
<summary>
Write inherited logind sessions pipes.
</summary>
@@ -119883,7 +120922,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="293">
+<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="346">
<summary>
Write inherited logind inhibit pipes.
</summary>
@@ -119893,7 +120932,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_logind" lineno="314">
+<interface name="systemd_dbus_chat_logind" lineno="367">
<summary>
Send and receive messages from
systemd logind over dbus.
@@ -119904,20 +120943,19 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_kmod_files" lineno="335">
+<interface name="systemd_status_logind" lineno="387">
<summary>
-Allow process to write to systemd_kmod_conf_t.
+Get the system status information from systemd_login
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
-<rolecap/>
</interface>
-<interface name="systemd_status_logind" lineno="349">
+<interface name="systemd_signull_logind" lineno="406">
<summary>
-Get the system status information from systemd_login
+Send systemd_login a null signal.
</summary>
<param name="domain">
<summary>
@@ -119925,9 +120963,29 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_signull_logind" lineno="368">
+<interface name="systemd_manage_userdb_runtime_dirs" lineno="424">
<summary>
-Send systemd_login a null signal.
+Manage systemd userdb runtime directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_manage_userdb_runtime_sock_files" lineno="442">
+<summary>
+Manage socket files under /run/systemd/userdb .
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_stream_connect_userdb" lineno="460">
+<summary>
+Connect to /run/systemd/userdb/io.systemd.DynamicUser .
</summary>
<param name="domain">
<summary>
@@ -119935,7 +120993,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_machines" lineno="386">
+<interface name="systemd_read_machines" lineno="481">
<summary>
Allow reading /run/systemd/machines
</summary>
@@ -119945,7 +121003,7 @@ Domain that can access the machines files
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_hostnamed" lineno="406">
+<interface name="systemd_dbus_chat_hostnamed" lineno="501">
<summary>
Send and receive messages from
systemd hostnamed over dbus.
@@ -119956,7 +121014,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_use_passwd_agent_fds" lineno="426">
+<interface name="systemd_use_passwd_agent_fds" lineno="521">
<summary>
allow systemd_passwd_agent to inherit fds
</summary>
@@ -119966,7 +121024,7 @@ Domain that owns the fds
</summary>
</param>
</interface>
-<interface name="systemd_use_passwd_agent" lineno="445">
+<interface name="systemd_use_passwd_agent" lineno="540">
<summary>
Allow a systemd_passwd_agent_t process to interact with a daemon
that needs a password from the sysadmin.
@@ -119977,7 +121035,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="469">
+<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="564">
<summary>
Transition to systemd_passwd_runtime_t when creating dirs
</summary>
@@ -119987,7 +121045,19 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_passwd_runtime_symlinks" lineno="488">
+<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="585">
+<summary>
+Transition to systemd_userdb_runtime_t when
+creating the userdb directory inside an init runtime
+directory.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_manage_passwd_runtime_symlinks" lineno="603">
<summary>
Allow to domain to create systemd-passwd symlink
</summary>
@@ -119997,9 +121067,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_all_units" lineno="506">
+<interface name="systemd_manage_all_units" lineno="621">
<summary>
-manage systemd unit dirs and the files in them
+manage systemd unit dirs and the files in them (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -120007,7 +121077,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_journal_files" lineno="526">
+<interface name="systemd_read_journal_files" lineno="636">
<summary>
Allow domain to read systemd_journal_t files
</summary>
@@ -120017,7 +121087,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_journal_files" lineno="545">
+<interface name="systemd_manage_journal_files" lineno="655">
<summary>
Allow domain to create/manage systemd_journal_t files
</summary>
@@ -120027,7 +121097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_journal_dirs" lineno="565">
+<interface name="systemd_relabelto_journal_dirs" lineno="675">
<summary>
Relabel to systemd-journald directory type.
</summary>
@@ -120037,7 +121107,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_journal_files" lineno="584">
+<interface name="systemd_relabelto_journal_files" lineno="694">
<summary>
Relabel to systemd-journald file type.
</summary>
@@ -120047,7 +121117,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_networkd_units" lineno="604">
+<interface name="systemd_read_networkd_units" lineno="714">
<summary>
Allow domain to read systemd_networkd_t unit files
</summary>
@@ -120057,7 +121127,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_networkd_units" lineno="624">
+<interface name="systemd_manage_networkd_units" lineno="734">
<summary>
Allow domain to create/manage systemd_networkd_t unit files
</summary>
@@ -120067,7 +121137,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_enabledisable_networkd" lineno="644">
+<interface name="systemd_enabledisable_networkd" lineno="754">
<summary>
Allow specified domain to enable systemd-networkd units
</summary>
@@ -120077,7 +121147,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_startstop_networkd" lineno="663">
+<interface name="systemd_startstop_networkd" lineno="773">
<summary>
Allow specified domain to start systemd-networkd units
</summary>
@@ -120087,7 +121157,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_status_networkd" lineno="682">
+<interface name="systemd_status_networkd" lineno="792">
<summary>
Allow specified domain to get status of systemd-networkd
</summary>
@@ -120097,7 +121167,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="701">
+<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="811">
<summary>
Relabel systemd_networkd tun socket.
</summary>
@@ -120107,7 +121177,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="719">
+<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="829">
<summary>
Read/Write from systemd_networkd netlink route socket.
</summary>
@@ -120117,7 +121187,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_list_networkd_runtime" lineno="737">
+<interface name="systemd_list_networkd_runtime" lineno="847">
<summary>
Allow domain to list dirs under /run/systemd/netif
</summary>
@@ -120127,7 +121197,7 @@ domain permitted the access
</summary>
</param>
</interface>
-<interface name="systemd_watch_networkd_runtime_dirs" lineno="756">
+<interface name="systemd_watch_networkd_runtime_dirs" lineno="866">
<summary>
Watch directories under /run/systemd/netif
</summary>
@@ -120137,7 +121207,7 @@ Domain permitted the access
</summary>
</param>
</interface>
-<interface name="systemd_read_networkd_runtime" lineno="775">
+<interface name="systemd_read_networkd_runtime" lineno="885">
<summary>
Allow domain to read files generated by systemd_networkd
</summary>
@@ -120147,7 +121217,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_state" lineno="794">
+<interface name="systemd_read_logind_state" lineno="904">
<summary>
Allow systemd_logind_t to read process state for cgroup file
</summary>
@@ -120157,7 +121227,7 @@ Domain systemd_logind_t may access.
</summary>
</param>
</interface>
-<interface name="systemd_start_power_units" lineno="813">
+<interface name="systemd_start_power_units" lineno="923">
<summary>
Allow specified domain to start power units
</summary>
@@ -120167,7 +121237,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="systemd_status_power_units" lineno="832">
+<interface name="systemd_status_power_units" lineno="942">
<summary>
Get the system status information about power units
</summary>
@@ -120177,7 +121247,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfiles_conf_file" lineno="852">
+<interface name="systemd_stream_connect_socket_proxyd" lineno="961">
+<summary>
+Allows connections to the systemd-socket-proxyd's socket.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_tmpfiles_conf_file" lineno="980">
<summary>
Make the specified type usable for
systemd tmpfiles config files.
@@ -120188,7 +121268,7 @@ Type to be used for systemd tmpfiles config files.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfiles_creator" lineno="873">
+<interface name="systemd_tmpfiles_creator" lineno="1001">
<summary>
Allow the specified domain to create
the tmpfiles config directory with
@@ -120200,7 +121280,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfiles_conf_filetrans" lineno="909">
+<interface name="systemd_tmpfiles_conf_filetrans" lineno="1037">
<summary>
Create an object in the systemd tmpfiles config
directory, with a private type
@@ -120227,7 +121307,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="systemd_list_tmpfiles_conf" lineno="928">
+<interface name="systemd_list_tmpfiles_conf" lineno="1056">
<summary>
Allow domain to list systemd tmpfiles config directory
</summary>
@@ -120237,7 +121317,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="946">
+<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="1074">
<summary>
Allow domain to relabel to systemd tmpfiles config directory
</summary>
@@ -120247,7 +121327,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="964">
+<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="1092">
<summary>
Allow domain to relabel to systemd tmpfiles config files
</summary>
@@ -120257,7 +121337,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfilesd_managed" lineno="987">
+<interface name="systemd_tmpfilesd_managed" lineno="1115">
<summary>
Allow systemd_tmpfiles_t to manage filesystem objects
</summary>
@@ -120272,7 +121352,7 @@ object class to manage
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_resolved" lineno="1006">
+<interface name="systemd_dbus_chat_resolved" lineno="1134">
<summary>
Send and receive messages from
systemd resolved over dbus.
@@ -120283,7 +121363,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_resolved_runtime" lineno="1026">
+<interface name="systemd_read_resolved_runtime" lineno="1154">
<summary>
Allow domain to read resolv.conf file generated by systemd_resolved
</summary>
@@ -120293,7 +121373,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_getattr_updated_runtime" lineno="1044">
+<interface name="systemd_getattr_updated_runtime" lineno="1172">
<summary>
Allow domain to getattr on .updated file (generated by systemd-update-done
</summary>
@@ -120303,7 +121383,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_search_all_user_keys" lineno="1062">
+<interface name="systemd_search_all_user_keys" lineno="1190">
<summary>
Search keys for the all systemd --user domains.
</summary>
@@ -120313,7 +121393,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_create_all_user_keys" lineno="1080">
+<interface name="systemd_create_all_user_keys" lineno="1208">
<summary>
Create keys for the all systemd --user domains.
</summary>
@@ -120323,7 +121403,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_all_user_keys" lineno="1098">
+<interface name="systemd_write_all_user_keys" lineno="1226">
<summary>
Write keys for the all systemd --user domains.
</summary>
@@ -120333,6 +121413,33 @@ Domain allowed access.
</summary>
</param>
</interface>
+<interface name="systemd_domtrans_sysusers" lineno="1245">
+<summary>
+Execute systemd-sysusers in the
+systemd sysusers domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_run_sysusers" lineno="1270">
+<summary>
+Run systemd-sysusers with a domain transition.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
<tunable name="systemd_tmpfiles_manage_all" dftval="false">
<desc>
<p>
@@ -120357,6 +121464,22 @@ BootLoaderEntries, etc.)
</p>
</desc>
</tunable>
+<tunable name="systemd_socket_proxyd_bind_any" dftval="false">
+<desc>
+<p>
+Allow systemd-socket-proxyd to bind any port instead of one labelled
+with systemd_socket_proxyd_port_t.
+</p>
+</desc>
+</tunable>
+<tunable name="systemd_socket_proxyd_connect_any" dftval="false">
+<desc>
+<p>
+Allow systemd-socket-proxyd to connect to any port instead of
+labelled ones.
+</p>
+</desc>
+</tunable>
</module>
<module name="tmpfiles" filename="policy/modules/system/tmpfiles.if">
<summary>Policy for tmpfiles, a boot-time temporary file handler</summary>
@@ -120580,7 +121703,7 @@ Domain allowed access.
</interface>
<interface name="udev_dontaudit_search_db" lineno="236">
<summary>
-Do not audit search of udev database directories.
+Do not audit search of udev database directories. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -120588,13 +121711,13 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="udev_read_db" lineno="260">
+<interface name="udev_read_db" lineno="256">
<summary>
-Read the udev device table.
+Read the udev device table. (Deprecated)
</summary>
<desc>
<p>
-Allow the specified domain to read the udev device table.
+Allow the specified domain to read the udev device table. (Deprecated)
</p>
</desc>
<param name="domain">
@@ -120604,9 +121727,9 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="udev_rw_db" lineno="288">
+<interface name="udev_rw_db" lineno="270">
<summary>
-Allow process to modify list of devices.
+Allow process to modify list of devices. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -120614,7 +121737,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_create_db_dirs" lineno="307">
+<interface name="udev_create_db_dirs" lineno="284">
<summary>
Create udev database directories
</summary>
@@ -120624,7 +121747,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_pid_filetrans_db" lineno="338">
+<interface name="udev_pid_filetrans_db" lineno="315">
<summary>
Write in /var/run/udev with the udev_tbl_t (udev database) file type
</summary>
@@ -120644,9 +121767,9 @@ Name of the directory that the file transition will work on
</summary>
</param>
</interface>
-<interface name="udev_relabelto_db" lineno="357">
+<interface name="udev_relabelto_db" lineno="334">
<summary>
-Allow process to relabelto udev database
+Allow process to relabelto udev database (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -120654,9 +121777,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_relabelto_db_sockets" lineno="377">
+<interface name="udev_relabelto_db_sockets" lineno="348">
<summary>
-Allow process to relabelto sockets in /run/udev
+Allow process to relabelto sockets in /run/udev (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -120664,9 +121787,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_search_pids" lineno="395">
+<interface name="udev_search_pids" lineno="362">
<summary>
-Search through udev pid content
+Search through udev pid content (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -120674,9 +121797,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_list_pids" lineno="414">
+<interface name="udev_list_pids" lineno="377">
<summary>
-list udev pid content
+list udev pid content (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -120684,10 +121807,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_manage_pid_dirs" lineno="434">
+<interface name="udev_manage_pid_dirs" lineno="393">
<summary>
Create, read, write, and delete
-udev run directories
+udev pid directories (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -120695,9 +121818,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_read_pid_files" lineno="453">
+<interface name="udev_read_pid_files" lineno="408">
<summary>
-Read udev pid files
+Read udev pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -120705,9 +121828,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_dontaudit_rw_pid_files" lineno="473">
+<interface name="udev_dontaudit_rw_pid_files" lineno="423">
<summary>
-dontaudit attempts to read/write udev pidfiles
+dontaudit attempts to read/write udev pidfiles (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -120715,10 +121838,10 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_manage_pid_files" lineno="492">
+<interface name="udev_manage_pid_files" lineno="439">
<summary>
Create, read, write, and delete
-udev pid files.
+udev pid files. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -120726,10 +121849,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_generic_pid_filetrans_run_dirs" lineno="517">
+<interface name="udev_generic_pid_filetrans_run_dirs" lineno="459">
<summary>
-Write dirs in /var/run with the udev_runtime file type.
-This method is deprecated in favor of the init_daemon_run_dir call.
+Create directories in the run location with udev_runtime_t type (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -120738,11 +121860,73 @@ Domain allowed access.
</param>
<param name="name" optional="true">
<summary>
-Name of the directory that the file transition will work on
+Name of the directory that is created
+</summary>
+</param>
+</interface>
+<interface name="udev_search_runtime" lineno="473">
+<summary>
+Search through udev runtime dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="udev_list_runtime" lineno="492">
+<summary>
+List udev runtime dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="udev_manage_runtime_dirs" lineno="512">
+<summary>
+Create, read, write, and delete
+udev runtime directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udevadm_domtrans" lineno="531">
+<interface name="udev_read_runtime_files" lineno="531">
+<summary>
+Read udev runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="udev_dontaudit_rw_runtime_files" lineno="551">
+<summary>
+dontaudit attempts to read/write udev runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="udev_manage_runtime_files" lineno="570">
+<summary>
+Create, read, write, and delete
+udev runtime files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="udev_domtrans_udevadm" lineno="589">
<summary>
Execute udev admin in the udevadm domain.
</summary>
@@ -120752,7 +121936,34 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="udevadm_run" lineno="556">
+<interface name="udevadm_domtrans" lineno="607">
+<summary>
+Execute udev admin in the udevadm domain. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="udevadm_run" lineno="629">
+<summary>
+Execute udevadm in the udevadm domain, and
+allow the specified role the udevadm domain. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="udev_run_udevadm" lineno="651">
<summary>
Execute udevadm in the udevadm domain, and
allow the specified role the udevadm domain.
@@ -120769,7 +121980,17 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="udevadm_exec" lineno="575">
+<interface name="udevadm_exec" lineno="670">
+<summary>
+Execute udevadm in the caller domain. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="udev_exec_udevadm" lineno="685">
<summary>
Execute udevadm in the caller domain.
</summary>
@@ -120779,7 +122000,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="udev_pid_filetrans_rules" lineno="605">
+<interface name="udev_pid_filetrans_rules" lineno="715">
<summary>
Write in /var/run/udev with the udev_rules_t (udev rules) file type
</summary>
@@ -120799,7 +122020,7 @@ Name of the directory that the file transition will work on
</summary>
</param>
</interface>
-<interface name="udev_create_rules_dirs" lineno="624">
+<interface name="udev_create_rules_dirs" lineno="734">
<summary>
Create udev rules directories
</summary>
@@ -120812,7 +122033,17 @@ Domain allowed access.
</module>
<module name="unconfined" filename="policy/modules/system/unconfined.if">
<summary>The unconfined domain.</summary>
-<interface name="unconfined_domain_noaudit" lineno="13">
+<interface name="unconfined_stub" lineno="13">
+<summary>
+Unconfined stub interface. No access allowed.
+</summary>
+<param name="domain" unused="true">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="unconfined_domain_noaudit" lineno="29">
<summary>
Make the specified domain unconfined.
</summary>
@@ -120822,7 +122053,7 @@ Domain to make unconfined.
</summary>
</param>
</interface>
-<interface name="unconfined_domain" lineno="133">
+<interface name="unconfined_domain" lineno="150">
<summary>
Make the specified domain unconfined and
audit executable heap usage.
@@ -120850,7 +122081,7 @@ Domain to make unconfined.
</summary>
</param>
</interface>
-<interface name="unconfined_domtrans" lineno="151">
+<interface name="unconfined_domtrans" lineno="168">
<summary>
Transition to the unconfined domain.
</summary>
@@ -120860,7 +122091,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="unconfined_run" lineno="174">
+<interface name="unconfined_run" lineno="191">
<summary>
Execute specified programs in the unconfined domain.
</summary>
@@ -120875,7 +122106,7 @@ The role to allow the unconfined domain.
</summary>
</param>
</interface>
-<interface name="unconfined_shell_domtrans" lineno="193">
+<interface name="unconfined_shell_domtrans" lineno="210">
<summary>
Transition to the unconfined domain by executing a shell.
</summary>
@@ -120885,7 +122116,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="unconfined_domtrans_to" lineno="231">
+<interface name="unconfined_domtrans_to" lineno="248">
<summary>
Allow unconfined to execute the specified program in
the specified domain.
@@ -120912,7 +122143,7 @@ Domain entry point file.
</summary>
</param>
</interface>
-<interface name="unconfined_run_to" lineno="268">
+<interface name="unconfined_run_to" lineno="285">
<summary>
Allow unconfined to execute the specified program in
the specified domain. Allow the specified domain the
@@ -120941,7 +122172,7 @@ Domain entry point file.
</summary>
</param>
</interface>
-<interface name="unconfined_use_fds" lineno="289">
+<interface name="unconfined_use_fds" lineno="306">
<summary>
Inherit file descriptors from the unconfined domain.
</summary>
@@ -120951,7 +122182,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="unconfined_sigchld" lineno="307">
+<interface name="unconfined_sigchld" lineno="324">
<summary>
Send a SIGCHLD signal to the unconfined domain.
</summary>
@@ -120961,7 +122192,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="unconfined_signull" lineno="325">
+<interface name="unconfined_signull" lineno="342">
<summary>
Send a SIGNULL signal to the unconfined domain.
</summary>
@@ -120971,7 +122202,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="unconfined_signal" lineno="343">
+<interface name="unconfined_signal" lineno="360">
<summary>
Send generic signals to the unconfined domain.
</summary>
@@ -120981,7 +122212,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="unconfined_read_pipes" lineno="361">
+<interface name="unconfined_read_pipes" lineno="378">
<summary>
Read unconfined domain unnamed pipes.
</summary>
@@ -120991,7 +122222,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="unconfined_dontaudit_read_pipes" lineno="379">
+<interface name="unconfined_dontaudit_read_pipes" lineno="396">
<summary>
Do not audit attempts to read unconfined domain unnamed pipes.
</summary>
@@ -121001,7 +122232,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="unconfined_rw_pipes" lineno="397">
+<interface name="unconfined_rw_pipes" lineno="414">
<summary>
Read and write unconfined domain unnamed pipes.
</summary>
@@ -121011,7 +122242,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="unconfined_dontaudit_rw_pipes" lineno="416">
+<interface name="unconfined_dontaudit_rw_pipes" lineno="433">
<summary>
Do not audit attempts to read and write
unconfined domain unnamed pipes.
@@ -121022,7 +122253,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="unconfined_stream_connect" lineno="435">
+<interface name="unconfined_stream_connect" lineno="452">
<summary>
Connect to the unconfined domain using
a unix domain stream socket.
@@ -121033,7 +122264,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="unconfined_dontaudit_rw_stream_sockets" lineno="454">
+<interface name="unconfined_dontaudit_rw_stream_sockets" lineno="471">
<summary>
Do not audit attempts to read and write
unconfined domain stream.
@@ -121044,7 +122275,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="unconfined_dontaudit_rw_tcp_sockets" lineno="483">
+<interface name="unconfined_dontaudit_rw_tcp_sockets" lineno="500">
<summary>
Do not audit attempts to read or write
unconfined domain tcp sockets.
@@ -121065,7 +122296,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="unconfined_search_keys" lineno="501">
+<interface name="unconfined_search_keys" lineno="518">
<summary>
Search keys for the unconfined domain.
</summary>
@@ -121075,7 +122306,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="unconfined_create_keys" lineno="519">
+<interface name="unconfined_create_keys" lineno="536">
<summary>
Create keys for the unconfined domain.
</summary>
@@ -121085,7 +122316,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="unconfined_write_keys" lineno="537">
+<interface name="unconfined_write_keys" lineno="554">
<summary>
Write keys for the unconfined domain.
</summary>
@@ -121095,7 +122326,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="unconfined_dbus_send" lineno="555">
+<interface name="unconfined_dbus_send" lineno="572">
<summary>
Send messages to the unconfined domain over dbus.
</summary>
@@ -121105,7 +122336,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="unconfined_dbus_chat" lineno="575">
+<interface name="unconfined_dbus_chat" lineno="592">
<summary>
Send and receive messages from
unconfined_t over dbus.
@@ -121116,7 +122347,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="unconfined_dbus_connect" lineno="596">
+<interface name="unconfined_dbus_connect" lineno="613">
<summary>
Connect to the the unconfined DBUS
for service (acquire_svc).
@@ -121151,7 +122382,7 @@ is the prefix for user_t).
</param>
<rolebase/>
</template>
-<template name="userdom_user_content_access_template" lineno="175">
+<template name="userdom_user_content_access_template" lineno="179">
<summary>
Template for handling user content through standard tunables
</summary>
@@ -121180,7 +122411,7 @@ The application domain which is granted the necessary privileges
</param>
<rolebase/>
</template>
-<interface name="userdom_ro_home_role" lineno="266">
+<interface name="userdom_ro_home_role" lineno="270">
<summary>
Allow a home directory for which the
role has read-only access.
@@ -121206,7 +122437,7 @@ The user domain
</param>
<rolebase/>
</interface>
-<interface name="userdom_manage_home_role" lineno="337">
+<interface name="userdom_manage_home_role" lineno="347">
<summary>
Allow a home directory for which the
role has full access.
@@ -121232,7 +122463,7 @@ The user domain
</param>
<rolebase/>
</interface>
-<interface name="userdom_manage_tmp_role" lineno="417">
+<interface name="userdom_manage_tmp_role" lineno="433">
<summary>
Manage user temporary files
</summary>
@@ -121248,7 +122479,7 @@ Domain allowed access.
</param>
<rolebase/>
</interface>
-<interface name="userdom_exec_user_tmp_files" lineno="444">
+<interface name="userdom_exec_user_tmp_files" lineno="460">
<summary>
The execute access user temporary files.
</summary>
@@ -121259,7 +122490,7 @@ Domain allowed access.
</param>
<rolebase/>
</interface>
-<interface name="userdom_manage_tmpfs_role" lineno="480">
+<interface name="userdom_manage_tmpfs_role" lineno="496">
<summary>
Role access for the user tmpfs type
that the user has full access.
@@ -121285,7 +122516,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<template name="userdom_basic_networking_template" lineno="506">
+<template name="userdom_basic_networking_template" lineno="522">
<summary>
The template allowing the user basic
network permissions
@@ -121298,7 +122529,7 @@ is the prefix for user_t).
</param>
<rolebase/>
</template>
-<template name="userdom_change_password_template" lineno="547">
+<template name="userdom_change_password_template" lineno="562">
<summary>
The template for allowing the user to change passwords.
</summary>
@@ -121310,7 +122541,7 @@ is the prefix for user_t).
</param>
<rolebase/>
</template>
-<template name="userdom_common_user_template" lineno="577">
+<template name="userdom_common_user_template" lineno="592">
<summary>
The template containing rules common to unprivileged
users and administrative users.
@@ -121328,7 +122559,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_login_user_template" lineno="906">
+<template name="userdom_login_user_template" lineno="914">
<summary>
The template for creating a login user.
</summary>
@@ -121346,7 +122577,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_restricted_user_template" lineno="1029">
+<template name="userdom_restricted_user_template" lineno="1037">
<summary>
The template for creating a unprivileged login user.
</summary>
@@ -121364,7 +122595,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_restricted_xwindows_user_template" lineno="1070">
+<template name="userdom_restricted_xwindows_user_template" lineno="1078">
<summary>
The template for creating a unprivileged xwindows login user.
</summary>
@@ -121385,7 +122616,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_unpriv_user_template" lineno="1157">
+<template name="userdom_unpriv_user_template" lineno="1161">
<summary>
The template for creating a unprivileged user roughly
equivalent to a regular linux user.
@@ -121408,7 +122639,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_admin_user_template" lineno="1255">
+<template name="userdom_admin_user_template" lineno="1281">
<summary>
The template for creating an administrative user.
</summary>
@@ -121437,7 +122668,7 @@ is the prefix for sysadm_t).
</summary>
</param>
</template>
-<template name="userdom_security_admin_template" lineno="1429">
+<template name="userdom_security_admin_template" lineno="1456">
<summary>
Allow user to run as a secadm
</summary>
@@ -121463,7 +122694,28 @@ The role of the object to create.
</summary>
</param>
</template>
-<interface name="userdom_user_application_type" lineno="1509">
+<template name="userdom_xdg_user_template" lineno="1554">
+<summary>
+Allow user to interact with xdg content types
+</summary>
+<desc>
+<p>
+Create rules to allow a user to manage xdg
+content in a user home directory with an
+automatic type transition to those types.
+</p>
+<p>
+This is a templated interface, and should only
+be called from a per-userdomain template.
+</p>
+</desc>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</template>
+<interface name="userdom_user_application_type" lineno="1603">
<summary>
Make the specified type usable as
a user application domain type.
@@ -121474,7 +122726,7 @@ Type to be used as a user application domain.
</summary>
</param>
</interface>
-<interface name="userdom_user_application_domain" lineno="1530">
+<interface name="userdom_user_application_domain" lineno="1624">
<summary>
Make the specified type usable as
a user application domain.
@@ -121490,7 +122742,7 @@ Type to be used as the domain entry point.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_content" lineno="1547">
+<interface name="userdom_user_home_content" lineno="1641">
<summary>
Make the specified type usable in a
user home directory.
@@ -121502,7 +122754,7 @@ user home directory.
</summary>
</param>
</interface>
-<interface name="userdom_user_tmp_file" lineno="1573">
+<interface name="userdom_user_tmp_file" lineno="1667">
<summary>
Make the specified type usable as a
user temporary file.
@@ -121514,7 +122766,7 @@ temporary directories.
</summary>
</param>
</interface>
-<interface name="userdom_user_tmpfs_file" lineno="1590">
+<interface name="userdom_user_tmpfs_file" lineno="1684">
<summary>
Make the specified type usable as a
user tmpfs file.
@@ -121526,7 +122778,7 @@ tmpfs directories.
</summary>
</param>
</interface>
-<interface name="userdom_attach_admin_tun_iface" lineno="1605">
+<interface name="userdom_attach_admin_tun_iface" lineno="1699">
<summary>
Allow domain to attach to TUN devices created by administrative users.
</summary>
@@ -121536,7 +122788,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_setattr_user_ptys" lineno="1624">
+<interface name="userdom_setattr_user_ptys" lineno="1718">
<summary>
Set the attributes of a user pty.
</summary>
@@ -121546,7 +122798,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_create_user_pty" lineno="1642">
+<interface name="userdom_create_user_pty" lineno="1736">
<summary>
Create a user pty.
</summary>
@@ -121556,7 +122808,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_getattr_user_home_dirs" lineno="1660">
+<interface name="userdom_getattr_user_home_dirs" lineno="1754">
<summary>
Get the attributes of user home directories.
</summary>
@@ -121566,7 +122818,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1679">
+<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1773">
<summary>
Do not audit attempts to get the attributes of user home directories.
</summary>
@@ -121576,7 +122828,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_home_dirs" lineno="1697">
+<interface name="userdom_search_user_home_dirs" lineno="1791">
<summary>
Search user home directories.
</summary>
@@ -121586,7 +122838,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1724">
+<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1818">
<summary>
Do not audit attempts to search user home directories.
</summary>
@@ -121604,7 +122856,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="userdom_list_user_home_dirs" lineno="1742">
+<interface name="userdom_list_user_home_dirs" lineno="1836">
<summary>
List user home directories.
</summary>
@@ -121614,7 +122866,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1761">
+<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1855">
<summary>
Do not audit attempts to list user home subdirectories.
</summary>
@@ -121624,7 +122876,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_create_user_home_dirs" lineno="1779">
+<interface name="userdom_create_user_home_dirs" lineno="1873">
<summary>
Create user home directories.
</summary>
@@ -121634,7 +122886,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_dirs" lineno="1797">
+<interface name="userdom_manage_user_home_dirs" lineno="1891">
<summary>
Manage user home directories.
</summary>
@@ -121644,7 +122896,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabelto_user_home_dirs" lineno="1815">
+<interface name="userdom_relabelto_user_home_dirs" lineno="1909">
<summary>
Relabel to user home directories.
</summary>
@@ -121654,7 +122906,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_home_filetrans_user_home_dir" lineno="1839">
+<interface name="userdom_home_filetrans_user_home_dir" lineno="1933">
<summary>
Create directories in the home dir root with
the user home directory type.
@@ -121670,7 +122922,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_domtrans" lineno="1876">
+<interface name="userdom_user_home_domtrans" lineno="1970">
<summary>
Do a domain transition to the specified
domain when executing a program in the
@@ -121699,7 +122951,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_search_user_home_content" lineno="1896">
+<interface name="userdom_dontaudit_search_user_home_content" lineno="1990">
<summary>
Do not audit attempts to search user home content directories.
</summary>
@@ -121709,7 +122961,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_list_all_user_home_content" lineno="1914">
+<interface name="userdom_list_all_user_home_content" lineno="2008">
<summary>
List all users home content directories.
</summary>
@@ -121719,7 +122971,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_list_user_home_content" lineno="1933">
+<interface name="userdom_list_user_home_content" lineno="2027">
<summary>
List contents of users home directory.
</summary>
@@ -121729,7 +122981,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_dirs" lineno="1952">
+<interface name="userdom_manage_user_home_content_dirs" lineno="2046">
<summary>
Create, read, write, and delete directories
in a user home subdirectory.
@@ -121740,7 +122992,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_home_content_dirs" lineno="1971">
+<interface name="userdom_delete_all_user_home_content_dirs" lineno="2065">
<summary>
Delete all user home content directories.
</summary>
@@ -121750,7 +123002,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_home_content_dirs" lineno="1991">
+<interface name="userdom_delete_user_home_content_dirs" lineno="2085">
<summary>
Delete directories in a user home subdirectory.
</summary>
@@ -121760,7 +123012,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2009">
+<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2103">
<summary>
Set attributes of all user home content directories.
</summary>
@@ -121770,7 +123022,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2029">
+<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2123">
<summary>
Do not audit attempts to set the
attributes of user home files.
@@ -121781,7 +123033,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_map_user_home_content_files" lineno="2047">
+<interface name="userdom_map_user_home_content_files" lineno="2141">
<summary>
Map user home files.
</summary>
@@ -121791,7 +123043,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_mmap_user_home_content_files" lineno="2065">
+<interface name="userdom_mmap_user_home_content_files" lineno="2159">
<summary>
Mmap user home files.
</summary>
@@ -121801,7 +123053,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_home_content_files" lineno="2084">
+<interface name="userdom_read_user_home_content_files" lineno="2178">
<summary>
Read user home files.
</summary>
@@ -121811,7 +123063,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2103">
+<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2197">
<summary>
Do not audit attempts to read user home files.
</summary>
@@ -121821,7 +123073,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_all_user_home_content" lineno="2122">
+<interface name="userdom_read_all_user_home_content" lineno="2216">
<summary>
Read all user home content, including application-specific resources.
</summary>
@@ -121831,7 +123083,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_manage_all_user_home_content" lineno="2144">
+<interface name="userdom_manage_all_user_home_content" lineno="2238">
<summary>
Manage all user home content, including application-specific resources.
</summary>
@@ -121841,7 +123093,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2166">
+<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2260">
<summary>
Do not audit attempts to append user home files.
</summary>
@@ -121851,7 +123103,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2184">
+<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2278">
<summary>
Do not audit attempts to write user home files.
</summary>
@@ -121861,7 +123113,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_home_content_files" lineno="2202">
+<interface name="userdom_delete_all_user_home_content_files" lineno="2296">
<summary>
Delete all user home content files.
</summary>
@@ -121871,7 +123123,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_home_content_files" lineno="2222">
+<interface name="userdom_delete_user_home_content_files" lineno="2316">
<summary>
Delete files in a user home subdirectory.
</summary>
@@ -121881,7 +123133,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2240">
+<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2334">
<summary>
Do not audit attempts to relabel user home files.
</summary>
@@ -121891,7 +123143,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_home_content_symlinks" lineno="2258">
+<interface name="userdom_read_user_home_content_symlinks" lineno="2352">
<summary>
Read user home subdirectory symbolic links.
</summary>
@@ -121901,7 +123153,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_exec_user_home_content_files" lineno="2278">
+<interface name="userdom_exec_user_home_content_files" lineno="2372">
<summary>
Execute user home files.
</summary>
@@ -121912,7 +123164,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2305">
+<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2399">
<summary>
Do not audit attempts to execute user home files.
</summary>
@@ -121922,7 +123174,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_files" lineno="2324">
+<interface name="userdom_manage_user_home_content_files" lineno="2418">
<summary>
Create, read, write, and delete files
in a user home subdirectory.
@@ -121933,7 +123185,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2345">
+<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2439">
<summary>
Do not audit attempts to create, read, write, and delete directories
in a user home subdirectory.
@@ -121944,7 +123196,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_symlinks" lineno="2364">
+<interface name="userdom_manage_user_home_content_symlinks" lineno="2458">
<summary>
Create, read, write, and delete symbolic links
in a user home subdirectory.
@@ -121955,7 +123207,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2384">
+<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2478">
<summary>
Delete all user home content symbolic links.
</summary>
@@ -121965,7 +123217,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_home_content_symlinks" lineno="2404">
+<interface name="userdom_delete_user_home_content_symlinks" lineno="2498">
<summary>
Delete symbolic links in a user home directory.
</summary>
@@ -121975,7 +123227,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_pipes" lineno="2423">
+<interface name="userdom_manage_user_home_content_pipes" lineno="2517">
<summary>
Create, read, write, and delete named pipes
in a user home subdirectory.
@@ -121986,7 +123238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_sockets" lineno="2444">
+<interface name="userdom_manage_user_home_content_sockets" lineno="2538">
<summary>
Create, read, write, and delete named sockets
in a user home subdirectory.
@@ -121997,7 +123249,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_dir_filetrans" lineno="2481">
+<interface name="userdom_user_home_dir_filetrans" lineno="2575">
<summary>
Create objects in a user home directory
with an automatic type transition to
@@ -122024,7 +123276,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_content_filetrans" lineno="2518">
+<interface name="userdom_user_home_content_filetrans" lineno="2612">
<summary>
Create objects in a directory located
in a user home directory with an
@@ -122052,7 +123304,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2549">
+<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2643">
<summary>
Automatically use the user_cert_t label for selected resources
created in a users home directory
@@ -122073,7 +123325,7 @@ Name of the resource that is being created
</summary>
</param>
</interface>
-<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2579">
+<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2673">
<summary>
Create objects in a user home directory
with an automatic type transition to
@@ -122095,7 +123347,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_certs" lineno="2599">
+<interface name="userdom_read_user_certs" lineno="2693">
<summary>
Read user SSL certificates.
</summary>
@@ -122106,7 +123358,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="userdom_dontaudit_manage_user_certs" lineno="2622">
+<interface name="userdom_dontaudit_manage_user_certs" lineno="2716">
<summary>
Do not audit attempts to manage
the user SSL certificates.
@@ -122118,7 +123370,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="userdom_manage_user_certs" lineno="2642">
+<interface name="userdom_manage_user_certs" lineno="2736">
<summary>
Manage user SSL certificates.
</summary>
@@ -122128,7 +123380,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_write_user_tmp_sockets" lineno="2663">
+<interface name="userdom_write_user_tmp_sockets" lineno="2757">
<summary>
Write to user temporary named sockets.
</summary>
@@ -122138,7 +123390,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_list_user_tmp" lineno="2683">
+<interface name="userdom_list_user_tmp" lineno="2777">
<summary>
List user temporary directories.
</summary>
@@ -122148,7 +123400,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_list_user_tmp" lineno="2705">
+<interface name="userdom_dontaudit_list_user_tmp" lineno="2799">
<summary>
Do not audit attempts to list user
temporary directories.
@@ -122159,7 +123411,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_dirs" lineno="2723">
+<interface name="userdom_delete_user_tmp_dirs" lineno="2817">
<summary>
Delete users temporary directories.
</summary>
@@ -122169,7 +123421,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2742">
+<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2836">
<summary>
Do not audit attempts to manage users
temporary directories.
@@ -122180,7 +123432,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_tmp_files" lineno="2760">
+<interface name="userdom_read_user_tmp_files" lineno="2854">
<summary>
Read user temporary files.
</summary>
@@ -122190,7 +123442,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_map_user_tmp_files" lineno="2781">
+<interface name="userdom_map_user_tmp_files" lineno="2875">
<summary>
Map user temporary files.
</summary>
@@ -122200,7 +123452,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_read_user_tmp_files" lineno="2800">
+<interface name="userdom_dontaudit_read_user_tmp_files" lineno="2894">
<summary>
Do not audit attempts to read users
temporary files.
@@ -122211,7 +123463,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_append_user_tmp_files" lineno="2819">
+<interface name="userdom_dontaudit_append_user_tmp_files" lineno="2913">
<summary>
Do not audit attempts to append users
temporary files.
@@ -122222,7 +123474,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_rw_user_tmp_files" lineno="2837">
+<interface name="userdom_rw_user_tmp_files" lineno="2931">
<summary>
Read and write user temporary files.
</summary>
@@ -122232,7 +123484,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_files" lineno="2858">
+<interface name="userdom_delete_user_tmp_files" lineno="2952">
<summary>
Delete users temporary files.
</summary>
@@ -122242,7 +123494,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="2877">
+<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="2971">
<summary>
Do not audit attempts to manage users
temporary files.
@@ -122253,7 +123505,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_tmp_symlinks" lineno="2895">
+<interface name="userdom_read_user_tmp_symlinks" lineno="2989">
<summary>
Read user temporary symbolic links.
</summary>
@@ -122263,7 +123515,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_symlinks" lineno="2916">
+<interface name="userdom_delete_user_tmp_symlinks" lineno="3010">
<summary>
Delete users temporary symbolic links.
</summary>
@@ -122273,7 +123525,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_dirs" lineno="2935">
+<interface name="userdom_manage_user_tmp_dirs" lineno="3029">
<summary>
Create, read, write, and delete user
temporary directories.
@@ -122284,7 +123536,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_named_pipes" lineno="2955">
+<interface name="userdom_delete_user_tmp_named_pipes" lineno="3049">
<summary>
Delete users temporary named pipes.
</summary>
@@ -122294,7 +123546,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_files" lineno="2974">
+<interface name="userdom_manage_user_tmp_files" lineno="3068">
<summary>
Create, read, write, and delete user
temporary files.
@@ -122305,7 +123557,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmp_named_sockets" lineno="2994">
+<interface name="userdom_delete_user_tmp_named_sockets" lineno="3088">
<summary>
Delete users temporary named sockets.
</summary>
@@ -122315,7 +123567,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_symlinks" lineno="3013">
+<interface name="userdom_manage_user_tmp_symlinks" lineno="3107">
<summary>
Create, read, write, and delete user
temporary symbolic links.
@@ -122326,7 +123578,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_pipes" lineno="3034">
+<interface name="userdom_manage_user_tmp_pipes" lineno="3128">
<summary>
Create, read, write, and delete user
temporary named pipes.
@@ -122337,7 +123589,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_sockets" lineno="3055">
+<interface name="userdom_manage_user_tmp_sockets" lineno="3149">
<summary>
Create, read, write, and delete user
temporary named sockets.
@@ -122348,7 +123600,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_user_tmp_filetrans" lineno="3092">
+<interface name="userdom_user_tmp_filetrans" lineno="3186">
<summary>
Create objects in a user temporary directory
with an automatic type transition to
@@ -122375,7 +123627,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_tmp_filetrans_user_tmp" lineno="3124">
+<interface name="userdom_tmp_filetrans_user_tmp" lineno="3218">
<summary>
Create objects in the temporary directory
with an automatic type transition to
@@ -122397,7 +123649,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_map_user_tmpfs_files" lineno="3142">
+<interface name="userdom_map_user_tmpfs_files" lineno="3236">
<summary>
Map user tmpfs files.
</summary>
@@ -122407,7 +123659,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_tmpfs_files" lineno="3160">
+<interface name="userdom_read_user_tmpfs_files" lineno="3254">
<summary>
Read user tmpfs files.
</summary>
@@ -122417,7 +123669,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3180">
+<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3274">
<summary>
dontaudit Read attempts of user tmpfs files.
</summary>
@@ -122427,7 +123679,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3199">
+<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3293">
<summary>
relabel to/from user tmpfs dirs
</summary>
@@ -122437,7 +123689,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_tmpfs_files" lineno="3218">
+<interface name="userdom_relabel_user_tmpfs_files" lineno="3312">
<summary>
relabel to/from user tmpfs files
</summary>
@@ -122447,7 +123699,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_content" lineno="3240">
+<interface name="userdom_user_runtime_content" lineno="3334">
<summary>
Make the specified type usable in
the directory /run/user/%{USERID}/.
@@ -122459,7 +123711,7 @@ user_runtime_content_dir_t.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_runtime" lineno="3260">
+<interface name="userdom_search_user_runtime" lineno="3354">
<summary>
Search users runtime directories.
</summary>
@@ -122469,7 +123721,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_runtime_root" lineno="3279">
+<interface name="userdom_search_user_runtime_root" lineno="3373">
<summary>
Search user runtime root directories.
</summary>
@@ -122479,7 +123731,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_runtime_root_dirs" lineno="3299">
+<interface name="userdom_manage_user_runtime_root_dirs" lineno="3393">
<summary>
Create, read, write, and delete user
runtime root dirs.
@@ -122490,7 +123742,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3318">
+<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3412">
<summary>
Relabel to and from user runtime root dirs.
</summary>
@@ -122500,7 +123752,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_runtime_dirs" lineno="3337">
+<interface name="userdom_manage_user_runtime_dirs" lineno="3431">
<summary>
Create, read, write, and delete user
runtime dirs.
@@ -122511,7 +123763,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_mounton_user_runtime_dirs" lineno="3357">
+<interface name="userdom_mounton_user_runtime_dirs" lineno="3451">
<summary>
Mount a filesystem on user runtime dir
directories.
@@ -122522,7 +123774,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabelto_user_runtime_dirs" lineno="3375">
+<interface name="userdom_relabelto_user_runtime_dirs" lineno="3469">
<summary>
Relabel to user runtime directories.
</summary>
@@ -122532,7 +123784,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3393">
+<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3487">
<summary>
Relabel from user runtime directories.
</summary>
@@ -122542,7 +123794,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_runtime_files" lineno="3411">
+<interface name="userdom_delete_user_runtime_files" lineno="3505">
<summary>
delete user runtime files
</summary>
@@ -122552,7 +123804,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_search_all_user_runtime" lineno="3430">
+<interface name="userdom_search_all_user_runtime" lineno="3524">
<summary>
Search users runtime directories.
</summary>
@@ -122562,7 +123814,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_list_all_user_runtime" lineno="3449">
+<interface name="userdom_list_all_user_runtime" lineno="3543">
<summary>
List user runtime directories.
</summary>
@@ -122572,7 +123824,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_dirs" lineno="3468">
+<interface name="userdom_delete_all_user_runtime_dirs" lineno="3562">
<summary>
delete user runtime directories
</summary>
@@ -122582,7 +123834,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_files" lineno="3486">
+<interface name="userdom_delete_all_user_runtime_files" lineno="3580">
<summary>
delete user runtime files
</summary>
@@ -122592,7 +123844,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3505">
+<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3599">
<summary>
delete user runtime symlink files
</summary>
@@ -122602,7 +123854,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3524">
+<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3618">
<summary>
delete user runtime fifo files
</summary>
@@ -122612,7 +123864,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3543">
+<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3637">
<summary>
delete user runtime socket files
</summary>
@@ -122622,10 +123874,32 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3574">
+<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3668">
<summary>
Create objects in the pid directory
with an automatic type transition to
+the user runtime root type. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="object_class">
+<summary>
+The class of the object to be created.
+</summary>
+</param>
+<param name="name" optional="true">
+<summary>
+The name of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3695">
+<summary>
+Create objects in the runtime directory
+with an automatic type transition to
the user runtime root type.
</summary>
<param name="domain">
@@ -122644,7 +123918,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_filetrans" lineno="3610">
+<interface name="userdom_user_runtime_filetrans" lineno="3731">
<summary>
Create objects in a user runtime
directory with an automatic type
@@ -122672,7 +123946,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3641">
+<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3762">
<summary>
Create objects in the user runtime directory
with an automatic type transition to
@@ -122694,7 +123968,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="3671">
+<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="3792">
<summary>
Create objects in the user runtime root
directory with an automatic type transition
@@ -122716,7 +123990,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_run_filetrans_user_runtime" lineno="3702">
+<interface name="userdom_user_run_filetrans_user_runtime" lineno="3823">
<summary>
Create objects in the user runtime root
directory with an automatic type transition
@@ -122738,7 +124012,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_rw_user_tmpfs_files" lineno="3720">
+<interface name="userdom_rw_user_tmpfs_files" lineno="3841">
<summary>
Read and write user tmpfs files.
</summary>
@@ -122748,7 +124022,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmpfs_files" lineno="3741">
+<interface name="userdom_delete_user_tmpfs_files" lineno="3862">
<summary>
Delete user tmpfs files.
</summary>
@@ -122758,7 +124032,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmpfs_files" lineno="3760">
+<interface name="userdom_manage_user_tmpfs_files" lineno="3881">
<summary>
Create, read, write, and delete user tmpfs files.
</summary>
@@ -122768,7 +124042,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_getattr_user_ttys" lineno="3780">
+<interface name="userdom_getattr_user_ttys" lineno="3901">
<summary>
Get the attributes of a user domain tty.
</summary>
@@ -122778,7 +124052,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_getattr_user_ttys" lineno="3798">
+<interface name="userdom_dontaudit_getattr_user_ttys" lineno="3919">
<summary>
Do not audit attempts to get the attributes of a user domain tty.
</summary>
@@ -122788,7 +124062,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_setattr_user_ttys" lineno="3816">
+<interface name="userdom_setattr_user_ttys" lineno="3937">
<summary>
Set the attributes of a user domain tty.
</summary>
@@ -122798,7 +124072,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_setattr_user_ttys" lineno="3834">
+<interface name="userdom_dontaudit_setattr_user_ttys" lineno="3955">
<summary>
Do not audit attempts to set the attributes of a user domain tty.
</summary>
@@ -122808,7 +124082,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_use_user_ttys" lineno="3852">
+<interface name="userdom_use_user_ttys" lineno="3973">
<summary>
Read and write a user domain tty.
</summary>
@@ -122818,7 +124092,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_user_ptys" lineno="3870">
+<interface name="userdom_use_user_ptys" lineno="3991">
<summary>
Read and write a user domain pty.
</summary>
@@ -122828,7 +124102,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_inherited_user_terminals" lineno="3905">
+<interface name="userdom_use_inherited_user_terminals" lineno="4026">
<summary>
Read and write a user TTYs and PTYs.
</summary>
@@ -122854,7 +124128,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="userdom_use_user_terminals" lineno="3946">
+<interface name="userdom_use_user_terminals" lineno="4067">
<summary>
Read, write and open a user TTYs and PTYs.
</summary>
@@ -122886,7 +124160,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="userdom_dontaudit_use_user_terminals" lineno="3962">
+<interface name="userdom_dontaudit_use_user_terminals" lineno="4083">
<summary>
Do not audit attempts to read and write
a user domain tty and pty.
@@ -122897,7 +124171,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_spec_domtrans_all_users" lineno="3983">
+<interface name="userdom_spec_domtrans_all_users" lineno="4104">
<summary>
Execute a shell in all user domains. This
is an explicit transition, requiring the
@@ -122909,7 +124183,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4006">
+<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4127">
<summary>
Execute an Xserver session in all user domains. This
is an explicit transition, requiring the
@@ -122921,7 +124195,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_spec_domtrans_unpriv_users" lineno="4029">
+<interface name="userdom_spec_domtrans_unpriv_users" lineno="4150">
<summary>
Execute a shell in all unprivileged user domains. This
is an explicit transition, requiring the
@@ -122933,7 +124207,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4052">
+<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4173">
<summary>
Execute an Xserver session in all unprivileged user domains. This
is an explicit transition, requiring the
@@ -122945,7 +124219,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_rw_unpriv_user_semaphores" lineno="4073">
+<interface name="userdom_rw_unpriv_user_semaphores" lineno="4194">
<summary>
Read and write unpriviledged user SysV sempaphores.
</summary>
@@ -122955,7 +124229,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_unpriv_user_semaphores" lineno="4091">
+<interface name="userdom_manage_unpriv_user_semaphores" lineno="4212">
<summary>
Manage unpriviledged user SysV sempaphores.
</summary>
@@ -122965,7 +124239,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4110">
+<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4231">
<summary>
Read and write unpriviledged user SysV shared
memory segments.
@@ -122976,7 +124250,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4129">
+<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4250">
<summary>
Manage unpriviledged user SysV shared
memory segments.
@@ -122987,7 +124261,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4149">
+<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4270">
<summary>
Execute bin_t in the unprivileged user domains. This
is an explicit transition, requiring the
@@ -122999,7 +124273,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4172">
+<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4293">
<summary>
Execute all entrypoint files in unprivileged user
domains. This is an explicit transition, requiring the
@@ -123011,7 +124285,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_home_content" lineno="4193">
+<interface name="userdom_search_user_home_content" lineno="4314">
<summary>
Search users home directories.
</summary>
@@ -123021,7 +124295,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_signull_unpriv_users" lineno="4212">
+<interface name="userdom_signull_unpriv_users" lineno="4333">
<summary>
Send signull to unprivileged user domains.
</summary>
@@ -123031,7 +124305,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_signal_unpriv_users" lineno="4230">
+<interface name="userdom_signal_unpriv_users" lineno="4351">
<summary>
Send general signals to unprivileged user domains.
</summary>
@@ -123041,7 +124315,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_unpriv_users_fds" lineno="4248">
+<interface name="userdom_use_unpriv_users_fds" lineno="4369">
<summary>
Inherit the file descriptors from unprivileged user domains.
</summary>
@@ -123051,7 +124325,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4276">
+<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4397">
<summary>
Do not audit attempts to inherit the file descriptors
from unprivileged user domains.
@@ -123071,7 +124345,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="userdom_dontaudit_use_user_ptys" lineno="4294">
+<interface name="userdom_dontaudit_use_user_ptys" lineno="4415">
<summary>
Do not audit attempts to use user ptys.
</summary>
@@ -123081,7 +124355,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_relabelto_user_ptys" lineno="4312">
+<interface name="userdom_relabelto_user_ptys" lineno="4433">
<summary>
Relabel files to unprivileged user pty types.
</summary>
@@ -123091,7 +124365,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4331">
+<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4452">
<summary>
Do not audit attempts to relabel files from
user pty types.
@@ -123102,7 +124376,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_write_user_tmp_files" lineno="4349">
+<interface name="userdom_write_user_tmp_files" lineno="4470">
<summary>
Write all users files in /tmp
</summary>
@@ -123112,7 +124386,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4368">
+<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4489">
<summary>
Do not audit attempts to write users
temporary files.
@@ -123123,7 +124397,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_use_user_ttys" lineno="4386">
+<interface name="userdom_dontaudit_use_user_ttys" lineno="4507">
<summary>
Do not audit attempts to use user ttys.
</summary>
@@ -123133,7 +124407,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_all_users_state" lineno="4404">
+<interface name="userdom_read_all_users_state" lineno="4525">
<summary>
Read the process state of all user domains.
</summary>
@@ -123143,7 +124417,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_getattr_all_users" lineno="4423">
+<interface name="userdom_getattr_all_users" lineno="4545">
<summary>
Get the attributes of all user domains.
</summary>
@@ -123153,7 +124427,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_all_users_fds" lineno="4441">
+<interface name="userdom_use_all_users_fds" lineno="4563">
<summary>
Inherit the file descriptors from all user domains
</summary>
@@ -123163,7 +124437,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_use_all_users_fds" lineno="4460">
+<interface name="userdom_dontaudit_use_all_users_fds" lineno="4582">
<summary>
Do not audit attempts to inherit the file
descriptors from any user domains.
@@ -123174,7 +124448,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_signal_all_users" lineno="4478">
+<interface name="userdom_signal_all_users" lineno="4600">
<summary>
Send general signals to all user domains.
</summary>
@@ -123184,7 +124458,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_sigchld_all_users" lineno="4496">
+<interface name="userdom_sigchld_all_users" lineno="4618">
<summary>
Send a SIGCHLD signal to all user domains.
</summary>
@@ -123194,7 +124468,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_all_users_keys" lineno="4514">
+<interface name="userdom_read_all_users_keys" lineno="4636">
<summary>
Read keys for all user domains.
</summary>
@@ -123204,7 +124478,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_write_all_users_keys" lineno="4532">
+<interface name="userdom_write_all_users_keys" lineno="4654">
<summary>
Write keys for all user domains.
</summary>
@@ -123214,7 +124488,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_rw_all_users_keys" lineno="4550">
+<interface name="userdom_rw_all_users_keys" lineno="4672">
<summary>
Read and write keys for all user domains.
</summary>
@@ -123224,7 +124498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_create_all_users_keys" lineno="4568">
+<interface name="userdom_create_all_users_keys" lineno="4690">
<summary>
Create keys for all user domains.
</summary>
@@ -123234,7 +124508,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_all_users_keys" lineno="4586">
+<interface name="userdom_manage_all_users_keys" lineno="4708">
<summary>
Manage keys for all user domains.
</summary>
@@ -123244,7 +124518,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dbus_send_all_users" lineno="4604">
+<interface name="userdom_dbus_send_all_users" lineno="4726">
<summary>
Send a dbus message to all user domains.
</summary>
@@ -123254,7 +124528,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_chr_files" lineno="4626">
+<interface name="userdom_manage_user_tmp_chr_files" lineno="4748">
<summary>
Create, read, write, and delete user
temporary character files.
@@ -123265,7 +124539,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_certs" lineno="4647">
+<interface name="userdom_relabel_user_certs" lineno="4769">
<summary>
Allow relabeling resources to user_cert_t
</summary>
@@ -123275,7 +124549,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="4670">
+<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="4792">
<summary>
Do not audit attempts to read and write
unserdomain stream.
@@ -123391,7 +124665,27 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_cache_files" lineno="96">
+<interface name="xdg_watch_cache_dirs" lineno="96">
+<summary>
+Watch the xdg cache home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_watch_all_cache_dirs" lineno="114">
+<summary>
+Watch all the xdg cache home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_read_cache_files" lineno="132">
<summary>
Read the xdg cache home files
</summary>
@@ -123401,7 +124695,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_all_cache_files" lineno="119">
+<interface name="xdg_read_all_cache_files" lineno="155">
<summary>
Read all xdg_cache_type files
</summary>
@@ -123411,7 +124705,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_cache_filetrans" lineno="159">
+<interface name="xdg_cache_filetrans" lineno="195">
<summary>
Create objects in an xdg_cache directory
with an automatic type transition to
@@ -123438,7 +124732,7 @@ Name of the file or directory created
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_cache" lineno="192">
+<interface name="xdg_generic_user_home_dir_filetrans_cache" lineno="228">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_cache_t type.
@@ -123459,7 +124753,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_create_cache_dirs" lineno="210">
+<interface name="xdg_create_cache_dirs" lineno="246">
<summary>
Create xdg cache home directories
</summary>
@@ -123469,7 +124763,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_cache" lineno="228">
+<interface name="xdg_manage_cache" lineno="264">
<summary>
Manage the xdg cache home files
</summary>
@@ -123479,7 +124773,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_manage_all_cache" lineno="253">
+<interface name="xdg_manage_all_cache" lineno="289">
<summary>
Manage all the xdg cache home files regardless of their specific type
</summary>
@@ -123489,7 +124783,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_cache" lineno="278">
+<interface name="xdg_relabel_cache" lineno="314">
<summary>
Allow relabeling the xdg cache home files
</summary>
@@ -123499,7 +124793,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_all_cache" lineno="302">
+<interface name="xdg_relabel_all_cache" lineno="338">
<summary>
Allow relabeling the xdg cache home files, regardless of their specific type
</summary>
@@ -123509,7 +124803,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_search_config_dirs" lineno="326">
+<interface name="xdg_search_config_dirs" lineno="362">
<summary>
Search through the xdg config home directories
</summary>
@@ -123519,7 +124813,27 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_config_files" lineno="346">
+<interface name="xdg_watch_config_dirs" lineno="382">
+<summary>
+Watch the xdg config home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_watch_all_config_dirs" lineno="400">
+<summary>
+Watch all the xdg config home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_read_config_files" lineno="418">
<summary>
Read the xdg config home files
</summary>
@@ -123529,7 +124843,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_all_config_files" lineno="369">
+<interface name="xdg_read_all_config_files" lineno="441">
<summary>
Read all xdg_config_type files
</summary>
@@ -123539,7 +124853,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_config_filetrans" lineno="409">
+<interface name="xdg_config_filetrans" lineno="481">
<summary>
Create objects in an xdg_config directory
with an automatic type transition to
@@ -123566,7 +124880,7 @@ Name of the file or directory created
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_config" lineno="442">
+<interface name="xdg_generic_user_home_dir_filetrans_config" lineno="514">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_config_t type.
@@ -123587,7 +124901,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_create_config_dirs" lineno="460">
+<interface name="xdg_create_config_dirs" lineno="532">
<summary>
Create xdg config home directories
</summary>
@@ -123597,7 +124911,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_config" lineno="478">
+<interface name="xdg_manage_config" lineno="550">
<summary>
Manage the xdg config home files
</summary>
@@ -123607,7 +124921,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_manage_all_config" lineno="503">
+<interface name="xdg_manage_all_config" lineno="575">
<summary>
Manage all the xdg config home files regardless of their specific type
</summary>
@@ -123617,7 +124931,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_config" lineno="528">
+<interface name="xdg_relabel_config" lineno="600">
<summary>
Allow relabeling the xdg config home files
</summary>
@@ -123627,7 +124941,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_all_config" lineno="552">
+<interface name="xdg_relabel_all_config" lineno="624">
<summary>
Allow relabeling the xdg config home files, regardless of their specific type
</summary>
@@ -123637,7 +124951,27 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_data_files" lineno="576">
+<interface name="xdg_watch_data_dirs" lineno="648">
+<summary>
+Watch the xdg data home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_watch_all_data_dirs" lineno="666">
+<summary>
+Watch all the xdg data home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_read_data_files" lineno="684">
<summary>
Read the xdg data home files
</summary>
@@ -123647,7 +124981,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_all_data_files" lineno="599">
+<interface name="xdg_read_all_data_files" lineno="707">
<summary>
Read all xdg_data_type files
</summary>
@@ -123657,7 +124991,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_data_filetrans" lineno="639">
+<interface name="xdg_data_filetrans" lineno="747">
<summary>
Create objects in an xdg_data directory
with an automatic type transition to
@@ -123684,7 +125018,7 @@ Optional name of the file or directory created
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_data" lineno="672">
+<interface name="xdg_generic_user_home_dir_filetrans_data" lineno="780">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_data_t type.
@@ -123705,7 +125039,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_create_data_dirs" lineno="690">
+<interface name="xdg_create_data_dirs" lineno="798">
<summary>
Create xdg data home directories
</summary>
@@ -123715,7 +125049,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_data" lineno="708">
+<interface name="xdg_manage_data" lineno="816">
<summary>
Manage the xdg data home files
</summary>
@@ -123725,7 +125059,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_manage_all_data" lineno="733">
+<interface name="xdg_manage_all_data" lineno="841">
<summary>
Manage all the xdg data home files, regardless of their specific type
</summary>
@@ -123735,7 +125069,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_data" lineno="758">
+<interface name="xdg_relabel_data" lineno="866">
<summary>
Allow relabeling the xdg data home files
</summary>
@@ -123745,7 +125079,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_all_data" lineno="782">
+<interface name="xdg_relabel_all_data" lineno="890">
<summary>
Allow relabeling the xdg data home files, regardless of their type
</summary>
@@ -123755,7 +125089,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_documents" lineno="817">
+<interface name="xdg_watch_documents_dirs" lineno="914">
+<summary>
+Watch the xdg documents home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_generic_user_home_dir_filetrans_documents" lineno="943">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_documents_t type.
@@ -123776,7 +125120,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_manage_documents" lineno="835">
+<interface name="xdg_manage_documents" lineno="961">
<summary>
Manage documents content
</summary>
@@ -123786,7 +125130,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_relabel_documents" lineno="856">
+<interface name="xdg_relabel_documents" lineno="982">
<summary>
Allow relabeling the documents resources
</summary>
@@ -123796,7 +125140,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_downloads" lineno="878">
+<interface name="xdg_watch_downloads_dirs" lineno="1004">
+<summary>
+Watch the xdg downloads home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_read_downloads" lineno="1022">
<summary>
Read downloaded content
</summary>
@@ -123806,7 +125160,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_create_downloads" lineno="901">
+<interface name="xdg_create_downloads" lineno="1045">
<summary>
Create downloaded content
</summary>
@@ -123816,7 +125170,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_write_downloads" lineno="924">
+<interface name="xdg_write_downloads" lineno="1068">
<summary>
Write downloaded content
</summary>
@@ -123826,7 +125180,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_downloads" lineno="958">
+<interface name="xdg_generic_user_home_dir_filetrans_downloads" lineno="1102">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_downloads_t type.
@@ -123847,7 +125201,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_manage_downloads" lineno="976">
+<interface name="xdg_manage_downloads" lineno="1120">
<summary>
Manage downloaded content
</summary>
@@ -123857,7 +125211,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_relabel_downloads" lineno="997">
+<interface name="xdg_relabel_downloads" lineno="1141">
<summary>
Allow relabeling the downloads resources
</summary>
@@ -123867,7 +125221,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_pictures" lineno="1019">
+<interface name="xdg_watch_pictures_dirs" lineno="1163">
+<summary>
+Watch the xdg pictures home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_read_pictures" lineno="1181">
<summary>
Read user pictures content
</summary>
@@ -123877,7 +125241,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_pictures" lineno="1053">
+<interface name="xdg_generic_user_home_dir_filetrans_pictures" lineno="1215">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_pictures_t type.
@@ -123898,7 +125262,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_manage_pictures" lineno="1071">
+<interface name="xdg_manage_pictures" lineno="1233">
<summary>
Manage pictures content
</summary>
@@ -123908,7 +125272,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_relabel_pictures" lineno="1092">
+<interface name="xdg_relabel_pictures" lineno="1254">
<summary>
Allow relabeling the pictures resources
</summary>
@@ -123918,7 +125282,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_music" lineno="1114">
+<interface name="xdg_watch_music_dirs" lineno="1276">
+<summary>
+Watch the xdg music home directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_read_music" lineno="1294">
<summary>
Read user music content
</summary>
@@ -123928,7 +125302,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_music" lineno="1148">
+<interface name="xdg_generic_user_home_dir_filetrans_music" lineno="1328">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_pictures_t type.
@@ -123949,7 +125323,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_manage_music" lineno="1166">
+<interface name="xdg_manage_music" lineno="1346">
<summary>
Manage music content
</summary>
@@ -123959,7 +125333,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_relabel_music" lineno="1187">
+<interface name="xdg_relabel_music" lineno="1367">
<summary>
Allow relabeling the music resources
</summary>
@@ -123969,7 +125343,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_videos" lineno="1209">
+<interface name="xdg_watch_videos_dirs" lineno="1389">
+<summary>
+Watch the xdg video content
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xdg_read_videos" lineno="1407">
<summary>
Read user video content
</summary>
@@ -123979,7 +125363,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_videos" lineno="1243">
+<interface name="xdg_generic_user_home_dir_filetrans_videos" lineno="1441">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_videos_t type.
@@ -124000,7 +125384,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_manage_videos" lineno="1261">
+<interface name="xdg_manage_videos" lineno="1459">
<summary>
Manage video content
</summary>
@@ -124010,7 +125394,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_relabel_videos" lineno="1282">
+<interface name="xdg_relabel_videos" lineno="1480">
<summary>
Allow relabeling the videos resources
</summary>
@@ -124020,7 +125404,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_cache_home_content" lineno="1308">
+<interface name="xdg_cache_home_content" lineno="1506">
<summary>
Mark the selected type as an xdg_cache_home_type
</summary>
@@ -124030,7 +125414,7 @@ Type to give the xdg_cache_home_type attribute to
</summary>
</param>
</interface>
-<interface name="xdg_config_home_content" lineno="1322">
+<interface name="xdg_config_home_content" lineno="1520">
<summary>
Mark the selected type as an xdg_config_home_type
</summary>
@@ -124040,7 +125424,7 @@ Type to give the xdg_config_home_type attribute to
</summary>
</param>
</interface>
-<interface name="xdg_data_home_content" lineno="1336">
+<interface name="xdg_data_home_content" lineno="1534">
<summary>
Mark the selected type as an xdg_data_home_type
</summary>
@@ -124050,7 +125434,7 @@ Type to give the xdg_data_home_type attribute to
</summary>
</param>
</interface>
-<interface name="xdg_read_cache_home_files" lineno="1350">
+<interface name="xdg_read_cache_home_files" lineno="1548">
<summary>
Read the xdg cache home files
</summary>
@@ -124060,7 +125444,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_all_cache_home_files" lineno="1364">
+<interface name="xdg_read_all_cache_home_files" lineno="1562">
<summary>
Read all xdg_cache_home_type files
</summary>
@@ -124070,7 +125454,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_cache_home_filetrans" lineno="1395">
+<interface name="xdg_cache_home_filetrans" lineno="1593">
<summary>
Create objects in an xdg_cache_home directory
with an automatic type transition to
@@ -124097,7 +125481,7 @@ Name of the file or directory created
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_cache_home" lineno="1420">
+<interface name="xdg_generic_user_home_dir_filetrans_cache_home" lineno="1618">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_cache_home_t type.
@@ -124118,7 +125502,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_create_cache_home_dirs" lineno="1434">
+<interface name="xdg_create_cache_home_dirs" lineno="1632">
<summary>
Create xdg cache home directories
</summary>
@@ -124128,7 +125512,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_cache_home" lineno="1448">
+<interface name="xdg_manage_cache_home" lineno="1646">
<summary>
Manage the xdg cache home files
</summary>
@@ -124138,7 +125522,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_manage_all_cache_home" lineno="1462">
+<interface name="xdg_manage_all_cache_home" lineno="1660">
<summary>
Manage all the xdg cache home files regardless of their specific type
</summary>
@@ -124148,7 +125532,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_cache_home" lineno="1476">
+<interface name="xdg_relabel_cache_home" lineno="1674">
<summary>
Allow relabeling the xdg cache home files
</summary>
@@ -124158,7 +125542,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_all_cache_home" lineno="1490">
+<interface name="xdg_relabel_all_cache_home" lineno="1688">
<summary>
Allow relabeling the xdg cache home files, regardless of their specific type
</summary>
@@ -124168,7 +125552,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_search_config_home_dirs" lineno="1504">
+<interface name="xdg_search_config_home_dirs" lineno="1702">
<summary>
Search through the xdg config home directories
</summary>
@@ -124178,7 +125562,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_config_home_files" lineno="1518">
+<interface name="xdg_read_config_home_files" lineno="1716">
<summary>
Read the xdg config home files
</summary>
@@ -124188,7 +125572,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_all_config_home_files" lineno="1532">
+<interface name="xdg_read_all_config_home_files" lineno="1730">
<summary>
Read all xdg_config_home_type files
</summary>
@@ -124198,7 +125582,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_config_home_filetrans" lineno="1563">
+<interface name="xdg_config_home_filetrans" lineno="1761">
<summary>
Create objects in an xdg_config_home directory
with an automatic type transition to
@@ -124225,7 +125609,7 @@ Name of the file or directory created
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_config_home" lineno="1588">
+<interface name="xdg_generic_user_home_dir_filetrans_config_home" lineno="1786">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_config_home_t type.
@@ -124246,7 +125630,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_create_config_home_dirs" lineno="1602">
+<interface name="xdg_create_config_home_dirs" lineno="1800">
<summary>
Create xdg config home directories
</summary>
@@ -124256,7 +125640,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_config_home" lineno="1616">
+<interface name="xdg_manage_config_home" lineno="1814">
<summary>
Manage the xdg config home files
</summary>
@@ -124266,7 +125650,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_manage_all_config_home" lineno="1630">
+<interface name="xdg_manage_all_config_home" lineno="1828">
<summary>
Manage all the xdg config home files regardless of their specific type
</summary>
@@ -124276,7 +125660,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_config_home" lineno="1644">
+<interface name="xdg_relabel_config_home" lineno="1842">
<summary>
Allow relabeling the xdg config home files
</summary>
@@ -124286,7 +125670,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_all_config_home" lineno="1658">
+<interface name="xdg_relabel_all_config_home" lineno="1856">
<summary>
Allow relabeling the xdg config home files, regardless of their specific type
</summary>
@@ -124296,7 +125680,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_data_home_files" lineno="1672">
+<interface name="xdg_read_data_home_files" lineno="1870">
<summary>
Read the xdg data home files
</summary>
@@ -124306,7 +125690,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_all_data_home_files" lineno="1686">
+<interface name="xdg_read_all_data_home_files" lineno="1884">
<summary>
Read all xdg_data_home_type files
</summary>
@@ -124316,7 +125700,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_data_home_filetrans" lineno="1717">
+<interface name="xdg_data_home_filetrans" lineno="1915">
<summary>
Create objects in an xdg_data_home directory
with an automatic type transition to
@@ -124343,7 +125727,7 @@ Optional name of the file or directory created
</summary>
</param>
</interface>
-<interface name="xdg_generic_user_home_dir_filetrans_data_home" lineno="1742">
+<interface name="xdg_generic_user_home_dir_filetrans_data_home" lineno="1940">
<summary>
Create objects in the user home dir with an automatic type transition to
the xdg_data_home_t type.
@@ -124364,7 +125748,7 @@ Name of the directory created
</summary>
</param>
</interface>
-<interface name="xdg_create_data_home_dirs" lineno="1756">
+<interface name="xdg_create_data_home_dirs" lineno="1954">
<summary>
Create xdg data home directories
</summary>
@@ -124374,7 +125758,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_data_home" lineno="1770">
+<interface name="xdg_manage_data_home" lineno="1968">
<summary>
Manage the xdg data home files
</summary>
@@ -124384,7 +125768,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_manage_all_data_home" lineno="1784">
+<interface name="xdg_manage_all_data_home" lineno="1982">
<summary>
Manage all the xdg data home files, regardless of their specific type
</summary>
@@ -124394,7 +125778,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_data_home" lineno="1798">
+<interface name="xdg_relabel_data_home" lineno="1996">
<summary>
Allow relabeling the xdg data home files
</summary>
@@ -124404,7 +125788,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_relabel_all_data_home" lineno="1812">
+<interface name="xdg_relabel_all_data_home" lineno="2010">
<summary>
Allow relabeling the xdg data home files, regardless of their type
</summary>
@@ -124414,7 +125798,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xdg_read_downloads_home" lineno="1826">
+<interface name="xdg_read_downloads_home" lineno="2024">
<summary>
Read downloaded content
</summary>
@@ -124424,7 +125808,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_read_videos_home" lineno="1840">
+<interface name="xdg_read_videos_home" lineno="2038">
<summary>
Read user video content
</summary>
@@ -124434,7 +125818,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_read_pictures_home" lineno="1854">
+<interface name="xdg_read_pictures_home" lineno="2052">
<summary>
Read user pictures content
</summary>
@@ -124444,7 +125828,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_read_music_home" lineno="1868">
+<interface name="xdg_read_music_home" lineno="2066">
<summary>
Read user music content
</summary>
@@ -124454,7 +125838,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_create_downloads_home" lineno="1882">
+<interface name="xdg_create_downloads_home" lineno="2080">
<summary>
Create downloaded content
</summary>
@@ -124464,7 +125848,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_write_downloads_home" lineno="1896">
+<interface name="xdg_write_downloads_home" lineno="2094">
<summary>
Write downloaded content
</summary>
@@ -124474,7 +125858,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_downloads_home" lineno="1910">
+<interface name="xdg_manage_downloads_home" lineno="2108">
<summary>
Manage downloaded content
</summary>
@@ -124484,7 +125868,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_documents_home" lineno="1924">
+<interface name="xdg_manage_documents_home" lineno="2122">
<summary>
Manage documents content
</summary>
@@ -124494,7 +125878,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_music_home" lineno="1938">
+<interface name="xdg_manage_music_home" lineno="2136">
<summary>
Manage music content
</summary>
@@ -124504,7 +125888,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_pictures_home" lineno="1952">
+<interface name="xdg_manage_pictures_home" lineno="2150">
<summary>
Manage pictures content
</summary>
@@ -124514,7 +125898,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="xdg_manage_videos_home" lineno="1966">
+<interface name="xdg_manage_videos_home" lineno="2164">
<summary>
Manage video content
</summary>
@@ -124622,7 +126006,17 @@ Domain allowed access.
</interface>
<interface name="xen_read_xenstored_pid_files" lineno="189">
<summary>
-Read xenstored pid files.
+Read xenstored pid files. (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="xen_read_xenstored_runtime_files" lineno="204">
+<summary>
+Read xenstored runtime files.
</summary>
<param name="domain">
<summary>
@@ -124630,7 +126024,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xen_dontaudit_rw_unix_stream_sockets" lineno="209">
+<interface name="xen_dontaudit_rw_unix_stream_sockets" lineno="224">
<summary>
Do not audit attempts to read and write
Xen unix domain stream sockets.
@@ -124641,7 +126035,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xen_stream_connect_xenstore" lineno="228">
+<interface name="xen_stream_connect_xenstore" lineno="243">
<summary>
Connect to xenstored with a unix
domain stream socket.
@@ -124652,7 +126046,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xen_stream_connect" lineno="248">
+<interface name="xen_stream_connect" lineno="263">
<summary>
Connect to xend with a unix
domain stream socket.
@@ -124663,7 +126057,27 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xen_pid_filetrans" lineno="280">
+<interface name="xen_pid_filetrans" lineno="295">
+<summary>
+Create in a xend_runtime_t directory (Deprecated)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="private type">
+<summary>
+The type of the object to be created.
+</summary>
+</param>
+<param name="object">
+<summary>
+The object class of the object being created.
+</summary>
+</param>
+</interface>
+<interface name="xen_runtime_filetrans" lineno="320">
<summary>
Create in a xend_runtime_t directory
</summary>
@@ -124683,7 +126097,7 @@ The object class of the object being created.
</summary>
</param>
</interface>
-<interface name="xen_domtrans_xm" lineno="298">
+<interface name="xen_domtrans_xm" lineno="338">
<summary>
Execute a domain transition to run xm.
</summary>
@@ -124693,7 +126107,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="xen_stream_connect_xm" lineno="318">
+<interface name="xen_stream_connect_xm" lineno="358">
<summary>
Connect to xm with a unix
domain stream socket.
@@ -124766,6 +126180,16 @@ Allow unconfined executables to make their stack executable. This should never,
</p>
</desc>
</tunable>
+<tunable name="allow_raw_memory_access" dftval="false">
+<desc>
+<p>
+Allow raw memory device (/dev/mem, /dev/kmem, /dev/mergemem,
+dev/oldmem, /dev/port) access for confined executables. This is
+extremely dangerous as it can bypass the SELinux protections, and
+should only be used by trusted domains.
+</p>
+</desc>
+</tunable>
<tunable name="allow_polyinstantiation" dftval="false">
<desc>
<p>